Communication Systems Network Applications - Electronic Mail
|
|
|
- Coral Martha Alexander
- 10 years ago
- Views:
Transcription
1 Scope Communication Systems Network s - Electronic Mail Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, Braunschweig, Germany [email protected] L5 L4 L3 L2 L1 Complementary Courses: Multimedia Systems, Distributed Systems, Mobile Communications, Security, Web, Mobile+UbiComp, QoS s Layer (Anwendung) Transport Layer (Transport) Network Layer (Vermittlung) Data Link Layer (Sicherung) Physical Layer (Bitübertragung) & Addressing Transitions P2P Files Telnet Internet: TCP, UDP Internet: IP Web LAN, MAN High-Speed LAN, WAN IP-Tel: Signal. H.323 SIP Moblie IP Mobile Communications MM COM - QoS specific Media Data Flow RT(C)P Transport Network Other Lectures of ET/IT & Computer Science Introduction Security 16-l5_mail_e.fm 1 3.February l5_mail_e.fm 2 3.February.03 Overview 1. Motivation and Overview 1. Motivation and Overview 2. Simple Mail Transfer Protocol SMTP 3. X.400 Mail 4. Multipurpose Internet Mail Extensions (MIME) 5. Other concepts of Multimedia Electronic Mail Function "open memo" as in regular correspondence Some remarks informal way to communicate cheap quantity typically approx s per day in business well established at home in progress at many countries to be established world-wide amount?? l5_mail_e.fm 3 3.February l5_mail_e.fm 4 3.February.03
2 History Address 1972 first sent between 2 systems Ray Tomlinson left MIT to join BBN, Boston, USA was THE application of the internet until the web was introduced and, more recently, peer-to-peer communication is in place Users previously: by now worldwide: more and more: universities, research companies, usually first within the engineering departments general population Electronic mailbox person/addressee is assigned to an electronic mailbox address form is MAILBOX@COMPUTER unique split in "MAILBOX": Mailbox name assigned only locally in accordance with the respective local at "COMPUTER" for file transfer between systems address today in Internet is usually MAILBOX@DOMAINNAME "DOMAINNAME" name of the destination domain "domainname" is assigned the appropriate "computer" by using the MX-record (MX = Mail exchange) of the domain s DNS server 16-l5_mail_e.fm 5 3.February l5_mail_e.fm 6 3.February Simple Mail Transfer Protocol SMTP 2.1 SMTP - Message Format SMTP (Simple Mail Transfer Protocol) consists of 1. message format (ASCII presentation) in 1982 defined in RFC 822 how the messages are structured 2. data transfer protocol (ASCII presentation) in 1982 defined in RFC 821 how the messages are transfered Defined in RFC 822 Messages consist of: an envelope; defined in RFC 821 SMTP commands: HELO, MAIL, RCPT, DATA, QUIT,... header fields (see the following table) one blank line message text originally only 7 bit, i.e (extension see also MIME) 16-l5_mail_e.fm 7 3.February l5_mail_e.fm 8 3.February.03
3 SMTP - Message Format: Header Fields (2) SMTP - Message Format: Other Optional Header Fields (3) Header Field To: Cc: Bcc: From: Sender: Received: Return- Path: Meaning Recipient s address (several addresses may be given). Carbon Copy. address of second recipient (several addresses may be given). Blind Carbon Copy. address of recipients not supposed to be visible to the other recipients (deleted before delivery). Originator of the message. Sender of the message. Displays the route a message has followed until then. A new line is added for each transfer agent. May be used to list a path back to the sender. difference To: and Cc: solely psychologically difference Cc: and Bcc: bcc line will be removed from the message and is thus not visible for the recipient Sender: and From: if these are one & the same, then sender omitted Return-Path: optional Header Field Date: Reply-To: Message-Id: In-Reply-To: References: Keywords: Subject: Meaning Day and time when message was sent. address to which the response is to be sent. Unique number by which the message may be identified. Id of the message to which this message is a reply. Other relevant message Ids. User defined keywords. Short summary of the contents. Based on RFC 822, additional (later defined) fields may be defined these fields have to start with X examples: X-No-Archive: X-Auth: X-SPAM: 16-l5_mail_e.fm 9 3.February l5_mail_e.fm 10 3.February SMTP - Data/Mail Transmission SMTP - Data/Mail Transmission (2) e.g. simple example (one hop in between) Sender Client Message Transfer Agent SMTP (Protocol) over 1 TCP connection Internet Recipient Mailbox Server Message Transfer Agent TCP Port 25 Steps 1. sender: application generates the message in the correct format (often also the "mail user agent") may store a copy of the message that was sent 2. sender: transmission program distributes a copy of each message to each recipient e.g., "sendmail" in UNIX systems 3. receiver: server receives message and files it in the appropriate mailbox 4. receiver: application reads mailbox converts the messages into an adequate presentation Transfer protocol (RFC 821) in the internet is transfered over a TCP connection to Port l5_mail_e.fm 11 3.February l5_mail_e.fm 12 3.February.03
4 Transfer Over Several MTAs 2.3 SMTP Characteristics i.e., route sender to receiver over several Message Transfer Agents (MTA) SMTP uses the store-and-forward principle to transfer messages identifies the sender verifies if receiver s mailbox exists system name not always known, but domain is address usually mailbox@domainname domain name server resource records: information about the systems among others: Mail exchange Record (MX-Record) with information about preferred system nodes for accepting mail i.e., possibly different systems with different priorities Characteristics all transfered characters are 7 bit ASCII commands consist out of 4 letters forwarding option mailing list administration receiver confirms command with numerical value Example: HELO mysystem.org (establish contact) 250 chianti.ibr.cs.tu-bs.de Hello... Problems: message length limited to 64KB (in older versions) if sender and receiver have different timeouts it may result in misunderstandings "mailstorms" may occur for example because mailing lists refer to each other Improvements on some of the above mentioned SMTP problems ESMTP (extended SMTP), defined initially in RFC 1425 differentiation by contacting (same syntax as HELO) EHLO <systemname> 16-l5_mail_e.fm 13 3.February l5_mail_e.fm 14 3.February SMTP: Example Protocol of Direct Interaction [hansa] >TELNET MAIL 25 Trying Connected to agitator.ibr.cs.tu-bs.de. Escape character is '^]'. 220 agitator.ibr.cs.tu-bs.de ESMTP Sendmail / tubsibr; Tue, 28 Jan :59: HELO MAIL.IBR.CS.TU-BS.DE HELO mail.ibr.cs.tu-bs.de 250 agitator.ibr.cs.tu-bs.de Hello [email protected] [ ], pleased to meet you MAIL FROM: <[email protected]> <[email protected]>... Sender ok RCPT TO: <DIEDERICH> <diederich>... Recipient ok DATA: Command unrecognized DATA 354 Enter mail, end with "." on a line by itself TESTMAIL THIS MAIL TESTS THE MAIL SYSTEM h0sc0jjo Message accepted for delivery QUIT agitator.ibr.cs.tu-bs.de closing connection [Connection closed by foreign host.] [hansa]~ > 16-l5_mail_e.fm 15 3.February l5_mail_e.fm 16 3.February.03
5 16-l5_mail_e.fm 17 3.February SMTP: Example Messages Sent Message: From - Fri Jan 03 12:08: X-Mozilla-Status: 0001 X-Mozilla-Status2: Message-ID: <3E156F @ibr.cs.tu-bs.de> Date: Fri, 03 Jan :08: From: Lars Wolf <[email protected]> Organization: IBR TUBS User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-us; rv:1.1) Gecko/ X-Accept-Language: de-de, de, en-us, en MIME-Version: 1.0 To: Joerg Diederich <[email protected]> Subject: Re: Vorlesung References: <3E0ADFD @ibr.cs.tu-bs.de> < [email protected]> Content-Type: text/plain; charset=iso ; format=flowed Content-Transfer-Encoding: 8bit Hallo,... SMTP: Example of Received Message From - Sun Jan 05 17:17: X-UIDL: LpO!!4dn"!0=p!!]Q1!! X-Mozilla-Status: 0001 X-Mozilla-Status2: Return-Path: <[email protected]> Received: from mailhost.rz.uni-karlsruhe.de ([email protected] [ ]) by agitator.ibr.cs.tu-bs.de (8.12.6/8.12.6/Debian-6Woody) with ESMTP id h04l9xbt for <[email protected]>; Sat, 4 Jan :09: Received: from mail.listserv.dfn.de (mail.listserv.dfn.de [ ]) by mailhost.rz.uni-karlsruhe.de with esmtp (Exim 3.36 #1) id 18UvYB-0006qo-00 for [email protected]; Sat, 04 Jan :09: Received: from mail.listserv.dfn.de ( ) by mail.listserv.dfn.de (LSMTP for OpenVMS v1.1a) with SMTP id <[email protected]>; Sat, 4 Jan :09: Date: Sat, 4 Jan :09: Reply-To: Andreas Terzis <[email protected]> Sender: ACM SIGCOMM organizational discussions <[email protected]> From: Andreas Terzis <[email protected]> Subject: SIGCOMM MEMBERS List Digest: January 2003 To: [email protected] Message-Id: <[email protected]> X-Spam-Status: No, hits=0.0 required=5.0 tests= version=2.20 X-Spam-Level: X-UIDL: LpO!!4dn"!0=p!!]Q1!! Dear SIGCOMM Community Members: l5_mail_e.fm 18 3.February Post Office Protocol (POP3) Post Office Protocol (POP3) (2) Sender Message Transfer Program Receiver: Mailbox Server Internet Mailbox POP- Server POP3- Protocol Recipient: self POP Client Defined in RFC 1225, 1939, 2449 Motivation user (mail recipient) uses different systems but his mailbox should always be the same server has to run reliably for 24 hours but not necessarily his system mailbox and applications often on different systems Protocol for remote mailbox access: user (usually) transfers mail for further processing to his local system this transfer is defined in a protocol: Post Office Protocol (POP) characteristics access permitted only after authentication can provide information about contents without actually transfering them port uses Port 110 SSL encrypted Port l5_mail_e.fm 19 3.February l5_mail_e.fm 20 3.February.03
6 Alternatively: Interactive Mail Access Protocol (IMAP) 2.7 Electronic Mail: Critical Issues of Classical SMTP IMAP: Interactive Mail Access Protocol alternatively to POP RFC 1056 Motivation electronic letters remain on the server that means that server management is necessary characteristics port port 143 SSL encrypted Port 993 security problem access to server data possible actions: copy, delete, move With SMTP and original message format sending a message to various recipients done by sending the same data to all of them individually messages do not have an internal structure Makes automatic processing difficult no acknowledgement: sender does not know whether the message he sent has actually been received by the recipient message rerouting arduous? user interface not integrated in transfer system no way to send message containing a mixture of text, graphics and audio messages may contain ASCII characters only no accents or special characters ä, ö, ü, etc. (e.g. French, German) no non-latin alphabets e.g. Hebrew no possibility to present languages without alphabets e.g. Chinese, Japanese 16-l5_mail_e.fm 21 3.February l5_mail_e.fm 22 3.February X.400 Mail 4. Multipurpose Internet Mail Extensions (MIME) History defined 2 years after RFC 821 and RFC 822 (1984) idea: to correct the disadvantages of the above RFC s Supported by: CCITT (ITU) telecommunication corporations, governments, industry Defacto today: X.400 not very widespread anymore reasons: poor design extremely complex SMTP had prevailed Pragmatic decision simple but functioning system (YES) or beautiful but very complex functioning system Defined in RFC 1341 and RFC 1521 Possibilities: messages may contain non ASCII character accents or special characters ä, ö, ü, etc. (e.g. French, German) non-latin alphabets e.g. Hebrew languages without alphabet e.g. Chinese, Japanese messages that may contain audio data, video data or general data Idea: using the format defined in RFC 822 for messages define a structure for the message text define rules for coding non-ascii messages only programs for generating and displaying messages to be modified Programs for sending and receiving remain unmodified 16-l5_mail_e.fm 23 3.February l5_mail_e.fm 24 3.February.03
7 MIME Messages MIME Message: Example Chosen approach: MIME messages consist of multiple parts Each part may have a different type: text, audio, image,... Content types: Text (subtypes: plain, richtext) Image (subtypes: gif, jpeg) Audio (subtypes: basic) Video (subtypes: mpeg, h261) Message (subtypes: partial, external-body) Multipart (subtypes: mixed, alternative, parallel) (subtypes: postscript, oda) Subtypes: Additional subtypes can be registered Designated subtypes for private usage Header Body Part 1 Body Part 2... Body Part n Structure of an example message: First message part in plain ASCII This is richtext 1.) ASCII text MIME message must include Data in multiple message parts Definition of content types of individual parts Boundaries between parts 2.) audio and video in parallel 3.) Richtext text sequential display 16-l5_mail_e.fm 25 3.February l5_mail_e.fm 26 3.February.03 MIME Message: Example (cont.) 4.1 MIME: Header Fields... Content-type: multipart/mixed; boundary=unique-boundary-1 --unique-boundary-1 Content-type: text/plain First message part in plain ASCII. --unique-boundary-1 Content-type: multipart/parallel; boundary=unique-boundary-2 --unique-boundary-2 Content-Type: audio-basic Content-Transfer-Encoding: base64... base64-encoded audio data goes here... --unique-boundary-2 Content-Type: image/jpeg Content-Transfer-Encoding: base64... base64-encoded image data goes here... --unique-boundary unique-boundary-1 Content-Type: text/richtext This is <italic>richtext.</italic> --unique-boundary-1-- Boundaries between message parts Definition of content types Data Header Field MIME-Version: Content-Description: Content-Id: Content-Transfer- Encoding: Content-Type: Meaning Identifies the MIME version Legible description of the message Unique number to identify the message Encoding type Message type MIME version: is necessary to identify the message as a MIME message example: MIME-Version: 1.0 Content description: example: Content-Description: A picture of my guinea pig 16-l5_mail_e.fm 27 3.February l5_mail_e.fm 28 3.February.03
8 16-l5_mail_e.fm 29 3.February.03 Header Fields: Content-Transfer-Encoding Content-Transfer-Encoding in 5 different types: Type ASCII text ASCII text with 8 bit binary quoted-printable base64 (ASCII armor) Way 7-bit ASCII 8-bit ASCII violates protocol specification any desired 8-bit violates protocol specification ASCII presentation for short 8-bit information ASCII presentation for 8 bit information e.g. quoted-printable: 7-bit ASCII all characters > 127: presented as XXh with XXh as a hexadecimal number representing the character 16-l5_mail_e.fm 30 3.February.03 Header Fields: Content-Transfer-Encoding: base64 (2) e.g. base64: information viewed as a data stream 64 characters are used (i.e. 2 6 =64) = has special function, i.e. == last group contained only 8 bits = last group contained only 16 bits 3 bytes which need to be coded (24 Bit) are divided into four 6-bit groups line breaks are ignored example Content-type: application/msword; name="a doc" Content-Disposition: attachment; filename=a doc Content-transfer-encoding: base64 0M8R4KGxGuEAAAAAAAAAAAAAAAAAAAAAPgADAP7/ CQAGAAAAAAAAAAAAAAACAAAAhgAAAA AAAAAAEAAAiAAAAAEAAAD+////AAAAAIQAAACFAAAA///////////////////////// /// /////////////////////////////////////////////////////////////////// /// //////////////////////////////////////////////////// spceacqahbaaacbk/ AAAAAAAAEAAAAAAABAAAm0YAAA4AYmpianQrdCsAAAAAAAAAAAAAAAAAAAAAAAAHBBY AQo 0AABZBAQAWQQEANUIAAAAAAABlAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD// w8aaaaaaaaa Header Fields: Content-Type (Examples) 4.2 MIME: Examples Type Subtype Description Text Plain Unformatted text Richtext Text containing simple formatting commands Image Gif Image in GIF format Jpg Image in JPG format Audio Basic Audio Video Mpeg Video in MPEG format Message Multipart Octet-Stream Uninterpreted byte stream Postscript Printable document in Postscript format Rfc822 A MIME RFC 822 message Partial This message has been split for transmission External-body This message has to be retrieved from the network Mixed Independent parts in the specified order Alternative Same message but different formats Parallel Parts have to be presented parallel Digest Each part is a full RFC 822 message Example: Content-Type: text/targettext "I am an <bold>owl </bold>", said the <italic>walrus</italic>. results in "I am an owl", said the walrus. 16-l5_mail_e.fm 31 3.February l5_mail_e.fm 32 3.February.03
9 MIME Example: Sent Text Message MIME Example: Sent Audio Message From: To: MIME-Version: 1.0 Message-Id: Content-Type: multipart/alternative; boundary= " DA8FCD5D4D" This is a preamble, ignored by the user agent DA8FCD5D4D Content-Type: text/targettext "I am an <bold>owl</bold>", said the <italic>walrus</italic>. The marabu nodded <italic>wisely</italic> and said: "I am an owl, too!" From: [email protected] To: [email protected] MIME-Version: 1.0 Message-Id: < [email protected]> Content-Type: multipart/alternative; boundary= " DA8FCD5D4D" This is the preamble, ignored by the user agent DA8FCD5D4D Content-Type: message/external-body; access-type="anon-ftp"; site="ftp.kom.e-technik.tu-darmstadt.de"; directory="/pub/eulen"; name="am_owls_too.snd" Content-Type: audio/basic content-transfer-encoding: base64 16-l5_mail_e.fm 33 3.February l5_mail_e.fm 34 3.February Other concepts of Multimedia Electronic Mail Secure Electronic Mail Problem: many objects have a high amount of data (e.g. video) receiver has only a limited storage capacity Solution: global store can be realized by url but: contents may not necessarily be available Reference large video object Reference Motivation ASCII text is easy to read (by e.g. any sniffer) is the sender really the one he claims he is? S/MIME based on strictly hierarchical certification, X.509 certificates (just like SSL) OpenPGP Open Pretty Good Privacy based on web of trust user decides which certification entity he can trust 16-l5_mail_e.fm 35 3.February l5_mail_e.fm 36 3.February.03
Networking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access
Email. MIME is the protocol that was devised to allow non-ascii encoded content in an email and attached files to an email.
Email Basics: Email protocols were developed even before there was an Internet, at a time when no one was anticipating widespread use of digital graphics or even rich text format (fonts, colors, etc.),
Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
CPSC 360 - Network Programming. Email, FTP, and NAT. http://www.cs.clemson.edu/~mweigle/courses/cpsc360
CPSC 360 - Network Programming E, FTP, and NAT Michele Weigle Department of Computer Science Clemson University [email protected] April 18, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
Network Services. Email SMTP, Internet Message Format. Johann Oberleitner SS 2006
Network Services Email SMTP, Internet Message Format Johann Oberleitner SS 2006 Agenda Email SMTP Internet Message Format Email Protocols SMTP Send emails POP3/IMAPv4 Read Emails Administrate mailboxes
Internet Technology 2/13/2013
Internet Technology 03r. Application layer protocols: email Email: Paul Krzyzanowski Rutgers University Spring 2013 1 2 Simple Mail Transfer Protocol () Defined in RFC 2821 (April 2001) Original definition
Mail system components. Electronic Mail MRA MUA MSA MAA. David Byers
Electronic Mail PRINCIPLES DNS ARCHITECTURES SPAM Mail system components () () David Byers MRA [email protected] IDA/ADIT/IISLAB Mail User Agent Reads and writes e-mail Writes e-mail to using (usually)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Internet Technologies Internet Protocols and Services
QAFQAZ UNIVERSITY Computer Engineering Department Internet Technologies Internet Protocols and Services Dr. Abzetdin ADAMOV Chair of Computer Engineering Department [email protected] http://ce.qu.edu.az/~aadamov
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
Communication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: [email protected]
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
19531 - Telematics. 13th Tutorial - Application Layer Protocols
19531 - Telematics 13th Tutorial - Application Layer Protocols Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 03. February, 2011 Institute of Computer Science
Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW
Application Example WWW Communication in the WWW In the following application protocol examples for WWW and E-Mail World Wide Web (WWW) Access to linked documents, which are distributed over several computers
Electronic mail security. MHS (Message Handling System)
Electronic mail security Diana Berbecaru < diana.berbecaru @ polito.it> Politecnico di Torino Dip. Automatica e Informatica MHS (Message Handling System) MS MS MUA MUA (Message Transfer ) MS (Message Store)
Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections
: the file transfer protocol Protocolo at host interface local file system file transfer remote file system utilizes two ports: - a 'data' port (usually port 20...) - a 'command' port (port 21) SISTEMAS
Domain Name System (DNS)
Application Layer Domain Name System Domain Name System (DNS) Problem Want to go to www.google.com, but don t know the IP address Solution DNS queries Name Servers to get correct IP address Essentially
Simple Mail Transfer Protocol
Page 1 of 6 Home : Network Programming Simple Mail Transfer Protocol Contents What is SMTP? Basics of SMTP SMTP Commands Relaying of Messages Time Stamps and Return Path in Message Header Mail Exchangers
FTP and email. Computer Networks. FTP: the file transfer protocol
Computer Networks and email Based on Computer Networking, 4 th Edition by Kurose and Ross : the file transfer protocol transfer file to/from remote host client/ model client: side that initiates transfer
Sending MIME Messages in LISTSERV DISTRIBUTE Jobs
Whitepaper Sending MIME Messages in LISTSERV DISTRIBUTE Jobs August 25, 2010 Copyright 2010 L-Soft international, Inc. Information in this document is subject to change without notice. Companies, names,
The Application Layer. CS158a Chris Pollett May 9, 2007.
The Application Layer CS158a Chris Pollett May 9, 2007. Outline DNS E-mail More on HTTP The Domain Name System (DNS) To refer to a process on the internet we need to give an IP address and a port. These
CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015
CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
SMTP (Simple Mail Transfer Protocol)
SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Fundamentals 1 SMTP Model and Protocol 2 User Agent 4 Sending e-mail 4 Mail Header Format 4 Receiving e-mail
Prof. Sead Muftic Feng Zhang. Lecture 10: Secure E-mail Systems
Prof. Sead Muftic Feng Zhang Lecture 10: Secure E-mail Systems Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 10: Application Layer 2 Application Layer Where our applications are running Using services provided by
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
E-Mail Security. Raj Jain. Washington University in St. Louis
E-Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
The Application Layer: DNS
Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)
Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders
Mail agents Introduction to Internet Mail Philip Hazel University of Cambridge MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom, Mulberry,
Email Management CSCU9B2 CSCU9B2 1
Email Management CSCU9B2 CSCU9B2 1 Contents Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP,
Network Working Group. Category: Informational January 1994. Principles of Operation for the TPC.INT Subdomain: Radio Paging -- Technical Procedures
Network Working Group M. Rose Request for Comments: 1569 Dover Beach Consulting, Inc. Category: Informational January 1994 Status of this Memo Principles of Operation for the TPC.INT Subdomain: Radio Paging
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
FTP: the file transfer protocol
FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that initiates transfer
Applications and Services. DNS (Domain Name System)
Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between
Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach
Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles
Security Analysis of DNS & Applications/Email
Security Analysis of DNS & Applications/Email EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/
Introduction to LAN/WAN. Application Layer (Part II)
Introduction to LAN/WAN Application Layer (Part II) Application Layer Topics Domain Name System (DNS) (7.1) Electronic Mail (Email) (7.2) World Wide Web (WWW) (7.3) Electronic Mail (Email) Mostly used
Electronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th)
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th) YOUR ASSIGNMENT Your assignment is to write an SMTP (Simple
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 1 Solutions Due by 9:00 AM MT on January 31 st 2012 Important: No cheating will be tolerated. No extension. CS 5480 total points = 32 CS 6480 total
EE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry [email protected] [email protected] Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
Table of Contents. Electronic mail. History of email (2) History of email (1) Email history. Basic concepts. Aka e-mail (or email according to Knuth)
Table of Contents Electronic mail Aka e-mail (or email according to Knuth) Karst Koymans / Jeroen van der Ham Informatics Institute University of Amsterdam Tuesday, September 25, 2011 Email history Basic
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
Integrating Fax Sending Services
Integrating Fax Sending Services Developer Guide Enabled by Popfax Integrating Fax Sending Services Using SMTP API (mail to fax) DEVELOPER GUIDE Enabled by Popfax We recommend developers to register as
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
NAME smtp zmailer SMTP client transport agent
NAME smtp zmailer SMTP client transport agent SYNOPSIS smtp [ 1678deEHMrPsVxXW ] [ A /path/to/smtp-auth-secrets.txt ] [ c channel] [ h heloname] [ l logfile] [ O options] [ p remote-port] [ T timeouts]
Communication Systems Network Applications - Online Services
Scope Communication Systems Network Applications - Online Services Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany
Lecture 10: 1. Secure E mail E systems. Systems. Page 1
1 2 Prof. Sead Matei Ciobanu Morogan Abdul Ghafoor Abbasi Lecture 10: Secure E-mailE Lecture 10 : Secure E mail E Subjects / opics : 1. Secure E mail E systems 2. Secure, rusted, Authorized and eliable
Simple Scan to Email Setup Guide
Simple Scan to Email Setup Guide Document Centre 555/545/535 Dc04cc0336 Scan to Email Scanning to email from a Xerox DC 555/545/535 requires the support of external email services on a network. These services
Huffman Code. Information Theory
Layer 5: Session Layer Application Protocols Chapter 3: Internet Protocols Chapter 2: Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer
Introduction. -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services
Introduction -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services (c) Levente Buttyán ([email protected]) Attack, threat, and vulnerability security
Security and privacy in public WLAN networks
Security and privacy in public WLAN networks Savio Lau [email protected] March 01, 2005 Roadmap Introduction of public WLAN networks Network security User privacy Experiments and analysis Conclusion March
A New Approach to Enhance E-mail Performance Through SMTP Protocol
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April 2008 299 A New Approach to Enhance E-mail Performance Through SMTP Protocol Hussein A.Al bazar,sureswaran Ramadass,
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Workflow Configuration on R12/R11. High Level Steps. SENDMAIL configuration mostly done by System Administrator Workflow configuration for R12
Workflow Configuration on R12/R11 High Level Steps SENDMAIL configuration mostly done by System Administrator Workflow configuration for R12 SENDMAIL Configuration tested on RedHat 4 update 5 -------------------------------------------------------------------
FTP: the file transfer protocol
File Transfer: FTP FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that
Communicating Applications
Communicating Applications Network Applications The raison d'être of computer networks Innovation happens in the application layer There is always a killer application Remote login -> Email -> Web -> P2P
EE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60
EE 7376: Introduction to Computer Networks Homework #3: Network Security, Email, Web, DNS, and Network Management Maximum Points: 60 1. Network security attacks that have to do with eavesdropping on, or
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
How To Write An Email On A Linux Computer (No Mail) (No Email) (For Ahem) (Or Ahem, For Ahem). (For An Email) Or Ahem.Org) (Ahem) Or An Email
Electronic mail Aka email (Knuth) dr. C. P. J. Koymans Informatics Institute Universiteit van Amsterdam November 20, 2007 dr. C. P. J. Koymans (UvA) Electronic mail November 20, 2007 1 / 31 History of
Appendix. Web Command Error Codes. Web Command Error Codes
Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
MailEnable Web Mail End User Manual V 2.x
MailEnable Web Mail End User Manual V 2.x MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 486 Neerim Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61
CSI 3140. Lab 1 : Exercise 1. 1.1 Find the IP address of www.whitehouse.gov www.site.uottawa.ca www.pastis.org. Or, another way:
CSI 3140 Lab 1 : Exercise 1 1.1 Find the IP address of www.whitehouse.gov www.site.uottawa.ca www.pastis.org C:\Documents and Settings\gvj>nslookup www.whitehouse.org Name: www.whitehouse.org Address:
Amazon Simple Email Service. Developer Guide API Version 2010-12-01
Amazon Simple Email Service Developer Guide Amazon Web Services Amazon Simple Email Service: Developer Guide Amazon Web Services Copyright 2014 Amazon Web Services, Inc. and/or its affiliates. All rights
Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
DATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
StreamServe Persuasion SP4 Connectors
StreamServe Persuasion SP4 Connectors User Guide Rev A StreamServe Persuasion SP4 Connectors User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520 No part of
Terminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check http://kuix.
Spam Salt aka Message Salt An invention against email abuse (Spam), introducing an email sender authentication mechanism. Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to
CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
Linux Network Administration
Linux Network Administration Sendmail Evolution of Email The birth of electronic mail (email) occurred in the early 1960s The mailbox was a file in a user's home directory that was readable only by that
Amazon Simple Email Service. Developer Guide API Version 2010-12-01
Amazon Simple Email Service Developer Guide Amazon Simple Email Service: Developer Guide Copyright 2014 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Technical papers How email works
Technical papers How email works This document has now been archived How email works Contents How email works What is email? What makes up an email? How does email work? The client The server How do email
CSCI-1680 SMTP Chen Avin
CSCI-1680 Chen Avin Based on Computer Networking: A Top Down Approach - 6th edition Electronic Three major components: s s simple transfer protocol: User Agent a.k.a. reader composing, editing, reading
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 11: Email security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14, 2012 1 Email
