Sunteți pe pagina 1din 16

BY, SHAIK.

KHADARV ALI,

WHAT IS E-MAIL . DIFFERENT E-MAIL PROVIDERS. WHAT MAKES UP AN E-MAIL. DIFFERENT ARCHITECTURAL MODELS. HOW E-MAIL REALLY TRAVEL. BOUNCING OF E-MAIL. THREATS TO E-MAIL. OVERCOMING THREATS. CONCLUSION.

WHAT IS E-MAIL
Electronic mail, often abbreviated as email or e-mail. Email an electronic message transmitted over a network from one user to another. Can be as simple as a few lines of text, or include attachments such as pictures or documents. It is the method of exchanging digital messages between two or more systems. E-mail systems are based on a store-and-forward model. In which e-mail computer server systems accept, forward, deliver and store messages on behalf of user.

WHAT IS E-MAIL

The first email systems were developed at SCD and MIT in 1965. Incompatible with each other, each system was designed to facilitate message delivery between users on a single machine. Ray Tomlinson invented email back in 1971 essentially fostering global business communication. It is the easy & cheapest comm.

DIFFERENT E-MAIL PROVIDERS.


Now a days there many e-mail providers. Gmail. Yahoomail. Rediffmail. Hotmail &etc.

WHAT MAKES UP AN E-MAIL.


Internet e-mail messages consist of two major sections: Header Structured into fields such as summary, sender(from), receiver(to), subject, date , cc ,Bcc, reply, message-id about the e-mail. Body The message itself as unstructured text; sometimes containing a signature block at the end. This is exactly the same as the body of a regular letter.

DIFFERENT ARCHITECTURAL MODELS.


Different Architectural Models exist for constructing computer systems. Some models include:
Peer-Peer Pipe

and Filter Implicit Invocation Client-Server

DIFFERENT ARCHITECTURAL MODELS.


The model that works best for email is the ClientServer model. Clients carry out user interactions with the email server.
Provided Interface Provided Interface Provided Interface

Client
Required Interface

Client
Required Interface

Client
Required Interface

Provided Interface

Server
Required Interface

An email client is an email program such as Outlook Express, for sending, receiving and organizing your email messages. Email servers are used to process, store and send, and receive email messages. There are different types of email servers, such as POP 3, SMTP and IMAP servers. The most popular email servers are POP 3 (incoming mail servers for your incoming mail) and SMTP (outgoing mail servers for your outgoing mail).

HOW E-MAIL REALLY WORKS


Step A: Sender creates and sends an email
The originating sender creates an email in their Mail User Agent (MUA) and clicks 'Send'.

Step B: Sender's MDA/MTA routes the email The sender's MUA transfers the email to a Mail Delivery Agent (MDA). Frequently, the sender's MTA also handles the responsibilities of an MDA.

The MDA/MTA accepts the email, then routes it to local mailboxes.

HOW E-MAIL REALLY WORKS


Step C: Network Cloud The network cloud may encompass a multitude of mail servers, DNS servers, routers and other devices and services too numerous to mention. These devices may be protected by firewalls, spam filters and malware detection software that may bounce or even delete an email. Step D: Email Queue so it enters an email queue with other outgoing email messages.

HOW E-MAIL REALLY WORKS


Step E: MTA to MTA Transfer When transferring an email, the sending MTA handles all aspects of mail delivery until the message has been either accepted or rejected by the receiving MTA. Step F: Firewalls, Spam and Virus Filters An email encountering a firewall may be tested by spam and virus filters before it is allowed to pass inside the firewall. If the message contains malware, the file is usually quarantined and the sender is notified. If the message is identified as spam, it will probably be deleted without notifying the sender.

BOUNCING OF E-MAIL.

THREATS TO E-MAIL
E-mail spoofing occurs when the header information of an email is altered to make the message appear to come from a known or trusted source. E-mail bombing is the intentional sending of large volumes of messages to a target address. The overloading of the target email address can render it unusable and can even cause the mail server to crash.

OVERCOMING THREATS
E-mail messages have to go through intermediate computers before reaching their destination. many Internet Service Providers (ISP) store copies of e-mail messages on their mail servers before they are delivered. Using encryption techniques.

CONCLUSION
There are many uses of e-mail in our daily life. We should not misuse the e-mail for illegal activities. We should have our own moral values.

S-ar putea să vă placă și