Documente Academic
Documente Profesional
Documente Cultură
KHADARV ALI,
WHAT IS E-MAIL . DIFFERENT E-MAIL PROVIDERS. WHAT MAKES UP AN E-MAIL. DIFFERENT ARCHITECTURAL MODELS. HOW E-MAIL REALLY TRAVEL. BOUNCING OF E-MAIL. THREATS TO E-MAIL. OVERCOMING THREATS. CONCLUSION.
WHAT IS E-MAIL
Electronic mail, often abbreviated as email or e-mail. Email an electronic message transmitted over a network from one user to another. Can be as simple as a few lines of text, or include attachments such as pictures or documents. It is the method of exchanging digital messages between two or more systems. E-mail systems are based on a store-and-forward model. In which e-mail computer server systems accept, forward, deliver and store messages on behalf of user.
WHAT IS E-MAIL
The first email systems were developed at SCD and MIT in 1965. Incompatible with each other, each system was designed to facilitate message delivery between users on a single machine. Ray Tomlinson invented email back in 1971 essentially fostering global business communication. It is the easy & cheapest comm.
Client
Required Interface
Client
Required Interface
Client
Required Interface
Provided Interface
Server
Required Interface
An email client is an email program such as Outlook Express, for sending, receiving and organizing your email messages. Email servers are used to process, store and send, and receive email messages. There are different types of email servers, such as POP 3, SMTP and IMAP servers. The most popular email servers are POP 3 (incoming mail servers for your incoming mail) and SMTP (outgoing mail servers for your outgoing mail).
Step B: Sender's MDA/MTA routes the email The sender's MUA transfers the email to a Mail Delivery Agent (MDA). Frequently, the sender's MTA also handles the responsibilities of an MDA.
BOUNCING OF E-MAIL.
THREATS TO E-MAIL
E-mail spoofing occurs when the header information of an email is altered to make the message appear to come from a known or trusted source. E-mail bombing is the intentional sending of large volumes of messages to a target address. The overloading of the target email address can render it unusable and can even cause the mail server to crash.
OVERCOMING THREATS
E-mail messages have to go through intermediate computers before reaching their destination. many Internet Service Providers (ISP) store copies of e-mail messages on their mail servers before they are delivered. Using encryption techniques.
CONCLUSION
There are many uses of e-mail in our daily life. We should not misuse the e-mail for illegal activities. We should have our own moral values.