熊本大学学術リポジトリ. Kumamoto University Repositor

Size: px
Start display at page:

Download "熊本大学学術リポジトリ. Kumamoto University Repositor"

Transcription

1 熊本大学学術リポジトリ Kumamoto University Repositor Title Based Updates Delivery in Un Content Synchronization among Learn Sy Author(s) Ijtihadie, Royyana M.; Chisaki, Yos Tsuyoshi; Hidayantoy, Bekti Cahyo; CitationIEEE Region 10 Annual International Issue date 2011 Proceedings/TENCON, 2011: Type URL Right Conference Paper IEEE. Personal use of this m permitted. Permission from IEEE mus for a

2 Based Updates Delivery in Unidirectional Content Synchronization among Learning Management Systems Over Limited Bandwidth Environment Royyana M. Ijtihadie, Yoshifumi Chisaki, Tsuyoshi Usagawa Graduate School of Science and Technology Kumamoto University, Japan Bekti Cahyo Hidayanto, Achmad Affandi Institut Teknologi Sepuluh Nopember Surabaya, Indonesia Abstract As the usage of Learning Management System (LMS) becomes popular in academic institution, demands for sharing learning content among them are getting higher. Such a way could be an alternative way of resource sharing in order to reduce the cost and effort instead of building a high quality material of e-learning content by themselves. Despite the leverage of Internet has been massive, not all places covered by sufficient infrastructure. Some parts of developing country, for example, eastern part of Indonesia, are still suffering unstable connection, availability, frequent disconnection and limited bandwidth. In addition, technology has been used widely as one of the popular communication tool. Also, its capability of transporting different types of digital content message across multiple and separated network makes it sufficient to be employed in such limited network. This paper discusses the concept and architecture of based delivery for distributing updates between LMSs in terms of content synchronization among LMSs over limited bandwidth network. A running example on how the system works is described and shows that this system managed to synchronize course content between LMSs by means of system. Index Terms Electronic learning, Courseware, Educational technology, Electronic mail, Narrow band. I. INTRODUCTION While the usage of Moodle[1] as Learning Management System (LMS) becomes popular in academic institution, demands for sharing learning content among them are getting higher. Such a way could be an alternative way of resource sharing in order to reduce the cost and effort instead of building a high quality material of e-learning content by themselves. Despite the leverage of Internet has been massive, not all places are covered by sufficient infrastructure. Some parts of developing country, for example, eastern part of Indonesia, are still suffering unstable connection, availability, frequent disconnection and limited bandwidth. Given such concerns, continuous direct access remote LMS may fail at times which could disrupt learning activities. To address such problems, one of the efficient ways is to let users to access similar content in local LMS (local copy) instead of accessing it directly to remote LMS. In order to make the both contents in remote and local identical, both sides need to be synchronized. This means whenever modifications occur at remote LMS s content, the local LMS s content should follow. However, as the contents grow bigger, the larger amount of data needs to be delivered which will take sufficient amount of time in a limited bandwidth link. To deal with, several efforts has been carried out by synchronizing local copy of content with remote origin content in unidirectional way by sending differential parts of learning contents whenever modifications take place [2][3][4]. Recently, despite the popularity of instant messaging applications, system is still widely used either for formal correspondence or casual communication. The system has a capability of transporting message across multiple networks; an can be transported between mail servers located in separate or firewall-ed network by means of mail relaying [5]. Even, the users side is not necessarily had their own mail server. Such capability allows to retrieve a mail message on demand based on network condition. This capability is very useful to implement the message passing over a narrow band network or a dial-up networking using mobile phone or PSTN line. Because of those advantages, a usage of system is very attractive as a media for delivering content. This paper discusses the concept and architecture of e- mail based delivery for distributing updates between LMSs in terms of content synchronization among LMSs over limited bandwidth network. Section 2 describes some related and previous works regarding this research. Section 3 describes brief overview about system. Section 4 describes concept and methods as well as implementation. Section 5 describes the screen-shot of running example, and finally, conclusions. II. RELATED WORK First idea of synchronization among Moodle LMS has been discussed in [3], and has been implemented in [4][6] while system architecture for content synchronization was introduced in [7]. Two-way message exchange between Master LMS and Slave LMS was employed to determine the updates. However, this way is not efficient because an extra message containing Slave LMS information needs to be sent first to Master LMS to retrieve the updates. In the other hand, the

3 updates might be empty if the Master LMS finds out that the content is already identical. Current work tries to reduce such overheads by sending the updates from Master LMS in one way only. Instead of sending a request , Slave LMS only needs to check whether new updates exists in its mailbox. Should content update exists, Slave LMS can proceed to synchronization process. Furthermore, this work also tries to provide a web user interface to help course author and teacher to announce and do the synchronization, respectively. III. SYSTEM This section describes basic overview about service. Basically, is transported in plain text form [5]. The communicating mail servers interact by exchanging short commands which are so-called SMTP (simple mail transfer protocol). SMTP requires reliable channel of transport protocol (TCP) to deliver message even though other transports are possible [5]. SMTP provides mail-relaying, capability of transporting mail across multiple networks even though the intended recipient mail servers are located separately (no direct route). In this way, an message may pass through a number of intermediate relays or gateways to reach the ultimate recipients. SMTP client is responsible to send message to one or more SMTP servers and gives reports on its result. E- mail sender interact with SMTP client through an application called MUA (Mail user agent) whereas both SMTP clients and SMTP servers is called Mail Transfer Agent (MTA). Destination SMTP server is identified by address [8] which will be the final destination of an message. Commonly, destination users can access their mailbox either directly or using application that implements POP [9] or IMAP [10] protocol. SMTP allows plain text message only to be transported. In order to be able to carry various types of digital content, usage of MIME (Multipurpose Internet Mail Extensions) specification [11] has been taken into consideration. MIME allows various types of digital object to be transformed into plain text by particular encoding method therefore it can be transported over SMTP. IV. CONCEPT AND METHODS A. Unidirectional Synchronization between Learning Management Systems This section describes the concept of unidirectional synchronization. Consider that LMS represents Moodle Learning Management System. Also, the terms Master LMS and Slave LMS are used for distinguishing entities involved. Either side will be the course content provider (Master LMS) while the other end are Slave LMSs, which are expected to have similar content with Master LMS. Unidirectional term indicates direction the content towards to. During academic year, as a result of teaching process, the course authors and teachers at the Master LMS may make some changes in their content. Such modifications usually come at small part rather than large part. For example, create Fig. 1. Interactions among schools certain groups of quiz questions, reviewing and revising last term questions, making new quiz, adding reference book links, etc. Modifications is announced to respective Slave LMSs by sending the differential updates. At the other end (Slave LMSs), teachers who use the synchronized course as their course material may check whether modifications have taken place by checking the assigned e- mail address s mailbox. Should the message containing updates exist, teachers can carry out synchronization process by executing a button in the Slave LMS web user interface. Figure 1 illustrates the synchronization among LMSs in three schools (A,B,C). School A behaves as a Master LMS which shares the course to group of Slave LMSs (School B and C). When the modification has been made at School A, the updates will be sent through system immediately after the author announced. A notification will appear at the receiving end of respective course when the updates reach the Slave LMS s mailbox. Update arrival might be vary between School B and C which depends on network condition and availability, for example, some schools with dial-up connection may check the mailbox periodically rather than continuously. B. Differential Synchronization Differential synchronization is employed to address the bandwidth concern and the growing content size. Synchronization process will not deal with the whole latest version of the content. Instead, only the changed parts are taken into account. Because of dissimilar structure among tables within LMS s database, normalized form so-called synchronization table is necessary. The changed parts are the relative complement between the latest synchronization table s set of hashes and versions with the previously saved one [12], and later being sent to Slave LMSs by means of infrastructure. C. Implementation This subsection describes the components of the system. LMS term refers to Moodle, the open source Learning Management System. Moodle is chosen due to its modularity and

4 (a) Fig. 2. Components of synchronization open source. In essence, Master LMS and Slave LMS communicate in order to maintain the consistency of replicas of both sides by exchanging partial information through several components as a regard of optimistic replication [13]. Figure 2 shows the general architecture and interactions among the components. Master LMS is responsible for providing course updates whenever modifications take place. The replicas are actually the latest version of course content in normalized form socalled synchronization table which is generated by Course Packer. In short, Course Packer transforms a raw Moodle s table into synchronization table. Later, Moodle synchronizer will determine the updates, and send them to Slave LMS s assigned mail address through specified MTA. Slave LMS takes place as the passive side of such synchronization scheme. The assigned address s mailbox will receive updates coming from Master LMS. Slave synchronizer is responsible for both check the updates on mailbox and applying them into the respective LMS. After the particular message containing updates is retrieved, Slave synchronizer will store it in the synchronization table and mark it in order to avoid further retrieval in the future. Up until this point, the teacher at Slave LMS will be notified whether the new updates has been arrived, furthermore it is teacher s decision whether to apply the updates or not. More detailed diagram of relationship between system and synchronization components is shown in Fig 3. V. RUNNING EXAMPLE This section describes a running example scenario to show the functionality of the system. This section comprises several parts to show for each step of operation. Before going further, consider about the case of synchronization between School A and School B which acts as a Master LMS and Slave LMS respectively. School B has provided address to hold all the updates that will come while School A has already set the B s address as one of its Slave LMS. The objective is to synchronize course content of School A into School B. (b) Fig. 4. Screenshot of School A and School B before synchronization: (a) course list of School A; (b) course list of School B A. Initial condition Firstly, School A will have several courses, and, one of those courses will be regularly sent to the Slave LMS (Introduction to Geometry). At the beginning, School B does not have such course. Please notice, that course named HOLD1 and HOLD2 are meant to be the temporary empty holder for the synchronization. Each particular course will have its own holder in Slave LMS which remains throughout the synchronization. Figure 5 shows the screenshot of both School A and School B before synchronization. B. First time updates Master synchronizer configuration display as shown in Fig 5(a) provides options of which courses are meant to be provided. To make it ready for synchronization, particular course needs to be turned on in this configuration. After clicking apply, the preferred courses will be processed as shown in Fig 5(b). C. First time synchronization, at School B Before synchronization takes place, a course map needs to be assigned. Such map describes map between remote course and local course id which is used for holding up the synchronized content. To check if updates already arrived, the user/teacher at School B needs to click the Check

5 Fig. 3. Detailed diagram of components (a) Fig. 7. content of updates for course Introduction to Geometry (b) Fig. 5. The process of sending updates: (a) Master synchronizer; (b) Progress during sending updates Fig. 8. Course list at School B after synchronization Fig. 6. Course mapper after particular updates arrive Mailbox link. Should the updates exist, the link Sync (E- Mail mechanism) will be shown at respective course id. Figure 6 shows the display after mailbox has been checked and ready for course Introduction to Geometry to be synchronized through . Figure 7 shows some parts of the content. To apply the updates into the actual course, the user/teacher needs to click Sync ( mechanism) link. Afterwards, the respective course content will updated with the latest change as shown in Fig 8. Up to this point, a cycle of synchronization process has completed. D. Modification takes place at School A, course description and title are changed Modification may happen in School A as a course provider due to the process of reviewing and correction. In this subsection, changing course description and course title is carried out to show the result of differential synchronization. After getting through the same process as above, the updates are sent. School B receives the updates and apply it to the

6 as a result of process described in subsection D, size is very small since the modification only take a small part. (a) (b) Fig. 9. Screenshot of School A and School B after the last synchronization: (a) course list of School A; (b) course list of School B Fig size comparison between the first synchronization and the last synchronization respective course. The result of such process can be seen at Fig 9. The course title at School A has changed to Basic Geometry while School B have the similar change after performing synchronization. Figure 10 shows the list of updates received in School B mailbox viewed using Mozilla Thunderbird [14]. First reflects to the process described in subsection B. The size is quite large since it is the first synchronization process. However, in the second VI. CONCLUSION AND FUTURE WORKS In this paper, a new architecture of based course synchronization system between distributed learning management systems is presented. The objective is met when distributed learning management systems provide the same courses and their courses and contents are the result of synchronization performed by means of the differential content delivery using system. In the examined prototype system, the synchronization of contents between only two learning management systems, from server to client, is examined using system. As future works, the proposed architecture would be expanded to multiple clients environment. Also, data compression algorithm is necessary to be implemented in order to reduce the size of differential content while delivering. REFERENCES [1] Moodle website. accessed April [2] J. Watanabe, T. Ishimura, Y. Chisaki, T. Usagawa, Technical Report of IEICE, ET , pp ( ) (In Japanese). [3] Tsuyoshi Usagawa, Achmad Affandi, Bekti Cahyo Hidayanto, Meita Rumbayan, Toshiro Ishimura, Yoshifumi Chisaki. Dynamic Synchronization of Learning Contents among Distributed Moodle Systems, In Proceeding of the 25th Annual Conference of JSET, e2a , pp , [4] Achmad Affandi, Arif Firmansyah, Bekti Cahyo Hidayanto, Toshiro Ishimura,Yoshifumi Chisaki, Tsuyoshi Usagawa. Performance of unidirectional LMS synchronization in various network capacity. In Proceeding of The Asian Conference on Education 2009, pp , [5] Klensin, J., Simple Mail Transfer Protocol, RFC 5321, October [6] Kazuyoshi Sonoda,Toshiro Ishimura, Bekti Cahyo Hidayanto, Achmad Affandi, Yoshifumi Chisaki, Tsuyoshi Usagawa. Synchronization of Multiple Learning Management Systems in order to share the learning contents over band limited network, In Proceeding of the 3rd International Student Conference on Advanced Science and Technology (ICAST), pp , [7] Royyana Muslim Ijtihadie, Bekti Cahyo Hidayanto, Achmad Affandi, Yoshifumi Chisaki, Tsuyoshi Usagawa. Using System For Delivering Unidirectional Synchronization Among Learning Management Systems in Limited Bandwidth Environment, Proc. The 6th International Conference on Information and Communication Technology and Systems, pp , [8] P. Resnick. Internet Message Format, RFC 5322, October [9] Myers, J.,Rose, M., Post Office Protocol version 3, RFC 1939, May [10] Crispin, M., Internet Message Access Protocol - Version 4rev1, RFC 3501, March [11] Borenstein, N., Freed, N., Multipurpose Internet Mail Extension (MIME) part one: Format of Internet Message Bodies, RFC 2045, November [12] Royyana M. Ijtihadie, Achmad Affandi, Bekti Cahyo Hidayanto, Yoshifumi Chisaki, Tsuyoshi Usagawa. Using Hash Based Method for Efficient Delivery in Content Synchronization among Learning Management Systems Over Limited Bandwidth Network. In Proceeding of the 5th International Student Conference on Advanced Science and Technology (ICAST), Kumamoto, pp , [13] Yasushi Saito, Marc Shapiro. Optimistic replication. ACM Computing Surveys Volume 37 Issue 1, pp , [14] Thunderbird, Mozilla Messaging. US/thunderbird/. accessed April 2011.

Green Infrastructure Architecture for an Integrated E-Learning, Edutainment and Communications Service in Rural Area

Green Infrastructure Architecture for an Integrated E-Learning, Edutainment and Communications Service in Rural Area Green Infrastructure Architecture for an Integrated E-Learning, Edutainment and Communications Service in Rural Area Achmad Affandi* 1, Diana Purwitasari* 1, Bekti Cahyo Hidayanto* 1, Royyana M Ijtidahie*

More information

System: Basic Functionality

System: Basic Functionality E-mail System: Basic Functionality E-mail systems support five basic functions: Composition: Creating messages Transfer: Moving messages from the originator to the recipient E-mail transfer is a connection-oriented

More information

Electronic Mail

Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

Internet Engineering Task Force (IETF) Request for Comments: 6858 March 2013 Updates: 3501 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6858 March 2013 Updates: 3501 Category: Standards Track ISSN: Internet Engineering Task Force (IETF) A. Gulbrandsen Request for Comments: 6858 March 2013 Updates: 3501 Category: Standards Track ISSN: 2070-1721 Simplified POP and IMAP Downgrading for Internationalized

More information

Internet Mail: The SMTP Model

Internet Mail: The SMTP Model Internet Mail: The SMTP Model User File System Sender- SMTP SMTP Commands Replies Receiver- SMTP File System Simple Mail Transfer Protocol (SMTP) to transfer e-mails Depending on the operating system,

More information

Adapting Functionality for Mobile Terminals

Adapting  Functionality for Mobile Terminals Adapting Email Functionality for Mobile Terminals Jon-Finngard Moe 1, Eivind Sivertsen 1, and Do van Thanh 2 1 Norwegian University of Science and Technology, 7491 Trondheim, Norway {jonfinng, eivindsi}@stud.ntnu.no

More information

Experience in implementing an /web gateway

Experience in implementing an  /web gateway Experience in implementing an e-mail/web gateway Francesco Gennai, Marina Buzzi, Laura Abba Istituto per le Applicazioni Telematiche, National Research Council (CNR) - Pisa, Italy E-mail: {F.Gennai, M.Buzzi,

More information

FTP. FTP offers many facilities :

FTP. FTP offers many facilities : FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP

More information

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1 Lecture 25 Reminders: Homework 7 due today. Homework 8 posted. Due at the beginning of the last day of class for final exam review. Programming Project 6 posted. Final project worth double. Due by 4:30pm,

More information

Computational Electronic Mail And Its Application In Library Automation

Computational Electronic Mail And Its Application In Library Automation Computational electronic mail and its application in library automation Foo, S. (1997). Proc. of Joint Pacific Asian Conference on Expert Systems/Singapore International Conference on Intelligent Systems

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

Electronic Mail (SMTP)

Electronic Mail (SMTP) Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,

More information

LearnMate 7 Student s Quick Start Guide November 2015 Catalog # Rev B

LearnMate 7 Student s Quick Start Guide November 2015 Catalog # Rev B Student s Quick Start Guide November 2015 Catalog # 200068 Rev B Contents 1. ENTERING LEARNMATE... 3 2. JOINING A COURSE... 5 3. THE LEARNMATE INTERFACE... 6 4. NAVIGATING IN LEARNMATE... 7 5. LEARNMATE

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

Telemetry Data Sharing Using S/MIME

Telemetry Data Sharing Using S/MIME Telemetry Data Sharing Using S/MIME Item Type text; Proceedings Authors Kalibjian, Jeffrey R. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings

More information

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

Efficient Mail Submission and Delivery (EMSD) On Windows CE

Efficient Mail Submission and Delivery (EMSD) On Windows CE Efficient Mail Submission and Delivery (EMSD) On Windows CE Neda Document Number: 103-101-01.02 Last Updated: Author unspecified Doc. Revision: source unspecified Neda Communications, Inc. First Published:

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Computer Network 1 1

Computer Network 1 1 Computer Network 1 1 Chapter 10: Application Layer Advanced Principal Concepts Samples and Techniques Foundation Summary Question and Answer 2 Outline Application Layer There is a need for support protocols,

More information

Category: Standards Track January 1999

Category: Standards Track January 1999 Network Working Group P. Hoffman Request for Comments: 2487 Internet Mail Consortium Category: Standards Track January 1999 Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

Network Working Group. Updates: 1894 June 2000 Category: Standards Track

Network Working Group. Updates: 1894 June 2000 Category: Standards Track Network Working Group D. Newman Request for Comments: 2852 Sun Microsystems Updates: 1894 June 2000 Category: Standards Track Status of this Memo Deliver By SMTP Service Extension This document specifies

More information

Electronic Mail. Electronic Mailboxes

Electronic Mail. Electronic Mailboxes Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

RFCs Supported by Mirapoint

RFCs Supported by Mirapoint Mirapoint adheres to industry RFCs throughout its product line, as listed in the following tables: Supported Standards on page 1 Security Supported Standards on page 3 International Supported Standards

More information

Fig (1) sending and receiving s

Fig (1) sending and receiving  s Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and

More information

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET 1. INTRODUCTION Hello friends are topic is Internet and World Wide Web the most popular services of our topic is social networking and online shopping

More information

Internet Engineering Task Force (IETF) Request for Comments: 6857 Category: Standards Track March 2013 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6857 Category: Standards Track March 2013 ISSN: Internet Engineering Task Force (IETF) K. Fujiwara Request for Comments: 6857 JPRS Category: Standards Track March 2013 ISSN: 2070-1721 Post-Delivery Message Downgrading for Internationalized Email Messages

More information

Product Overview. Revision 5

Product Overview. Revision 5 Product Overview Revision 5 Copyright 2010-2011 Autek Ingeniería. All rights reserved. No part of this document may be reproduced, even for personal use, by any means and in any form, whether permanent

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

Lab 3.4.3: Services and Protocols

Lab 3.4.3:  Services and Protocols Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5

More information

perdition: Mail Retrieval Proxy

perdition: Mail Retrieval Proxy perdition: Mail Retrieval Proxy Horms (Simon Horman) Verge Networks horms@verge.net.au VA Linux Systems Japan, K.K. horms@valinux.co.jp January 2003 http://verge.net.au/linux/perdition/ Introduction Perdition

More information

Applications FTP. FTP offers many facilities :

Applications FTP. FTP offers many facilities : Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

Application of a Visual Computer Simulator into Collaborative Learning

Application of a Visual Computer Simulator into Collaborative Learning Journal of Computing and Information Technology - CIT 14, 2006, 4, 267 273 doi:10.2498/cit.2006.04.01 267 Application of a Visual Computer Simulator into Collaborative Learning Yoshiro Imai 1, Keiichi

More information

End-To-End Signaling and Routing for Optical IP Networks

End-To-End Signaling and Routing for Optical IP Networks End-To-End Signaling and Routing for Optical IP Networks Mark Joseph Francisco, Lambros Pezoulas, Changcheng Huang, Ioannis Lambadaris Carleton University Department of Systems and Computer Engineering

More information

Request for Comments: 5551 Category: Informational August 2009

Request for Comments: 5551 Category: Informational August 2009 Network Working Group R. Gellens, Ed. Request for Comments: 5551 Qualcomm Category: Informational August 2009 Abstract Lemonade Notifications Architecture Notification and filtering mechanisms can make

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

FTP,HTTP. By Nidhi Jindal

FTP,HTTP. By Nidhi Jindal APPLICATION LAYER: SMTP, POP, IMAP, FTP,HTTP By Nidhi Jindal. MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Cisco Exam Integrating Cisco Unified Communications Applications v8.0 (CAPPS v8.0) Version: 40.0 [ Total Questions: 203 ]

Cisco Exam Integrating Cisco Unified Communications Applications v8.0 (CAPPS v8.0) Version: 40.0 [ Total Questions: 203 ] s@lm@n Cisco Exam 642-467 Integrating Cisco Unified Communications Applications v8.0 (CAPPS v8.0) Version: 40.0 [ Total Questions: 203 ] Cisco 642-467 : Practice Test Question No : 1 In Cisco Unified Communications

More information

Introduction to 9.0. White Paper. Sync and Surf FirstClass Support for Mobile Users. November Powering collaborative online communities.

Introduction to 9.0. White Paper. Sync and Surf FirstClass Support for Mobile Users. November Powering collaborative online communities. Introduction to 9.0 White Paper Sync and Surf FirstClass Support for Mobile Users November 2007 Powering collaborative online communities. FirstClass Support for Mobile Users The widespread availability

More information

Chapter 7 (Week 13) The Application Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 7 (Week 13) The Application Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 7 (Week 13) The Application Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 579-611 1 PREVIOUS LAYERS THE PURPOSE OF THE PHYSICAL LAYER IS TO TRANSPORT A RAW BIT STREAM FROM ONE

More information

CSCE 813 Internet Security Secure Services I

CSCE 813 Internet Security Secure  Services I CSCE 813 Internet Security Secure E-Mail Services I Professor Lisa Luo Fall 2017 Previous Class Why do we need cloud computing? Three models of cloud service Software as a service (SaaS) Platform as a

More information

Chapter 9: Internet

Chapter 9: Internet Chapter 9: Internet Email Internet email has become one of the most popular applications on the Internet. An Internet experience is not complete without the usage of email. In this chapter we shall be

More information

ing With PHP History of Applications or Use

ing With PHP History of  Applications or Use Emailing With PHP What is Email? E mail, short for electronic mail and often abbreviated to e mail, email or simply mail, is a store and forward method of composing, sending, receiving and storing messages

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

DOWNLOAD PDF API TO ELECTRONIC MAIL (X,400, ISSUE 2)

DOWNLOAD PDF API TO ELECTRONIC MAIL (X,400, ISSUE 2) Chapter 1 : Fixing Magento USPS API issue with First-Class Mail Parcel Plumrocket Inc Blog Grandparents and looters mothballed than sped opposite the late hsien stillness, quantized over glib doorkeepers

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

Configuring Virtual Servers

Configuring Virtual Servers 3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

inode Fax Relay Agent Integrated with Windows Fax Services

inode Fax Relay Agent Integrated with Windows Fax Services inode Fax Relay Agent Integrated with Windows Fax Services Users Guide 2008 Dataways Communications inode Fax Relay Agent v1.2.2 October 2008 inode Fax Relay Agent 1.2.2, Published October 2008. Copyright

More information

Standardizing Information and Communication Systems

Standardizing Information and Communication Systems Standard ECMA-143 4th Edition - December 2001 Standardizing Information and Communication Systems Private Integrated Services Network (PISN) - Circuit Mode Bearer Services - Inter-Exchange Signalling Procedures

More information

Information Network Systems The application layer. Stephan Sigg

Information Network Systems The application layer. Stephan Sigg Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012

More information

CISNTWK-492e. Microsoft Exchange Server 2003 Administration. Chapter Eight Managing Routing and Internet Connectivity

CISNTWK-492e. Microsoft Exchange Server 2003 Administration. Chapter Eight Managing Routing and Internet Connectivity CISNTWK-492e Microsoft Exchange Server 2003 Administration Chapter Eight Managing Routing and Internet Connectivity 1 Objectives Understand SMTP and how it works Understand how Exchange Server 2003 makes

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression, Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen

More information

User Manual. Admin Report Kit for Exchange Server

User Manual. Admin Report Kit for Exchange Server User Manual Admin Report Kit for Exchange Server Table of Contents 1 About ARKES-Admin Report Kit for Exchange Server 1 1.1 System requirements 2 1.2 How to activate the software? 3 1.3 ARKES Reports Primer

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

Request for Comments: 5437 Category: Standards Track Isode Limited January 2009

Request for Comments: 5437 Category: Standards Track Isode Limited January 2009 Network Working Group Request for Comments: 5437 Category: Standards Track P. Saint-Andre Cisco A. Melnikov Isode Limited January 2009 Status of This Memo Sieve Notification Mechanism: Extensible Messaging

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

MailEnable System Overview

MailEnable System Overview MailEnable System Overview MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 59 Murrumbeena Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61 3 9530 4066

More information

Network Applications Electronic Mail

Network Applications Electronic Mail Network Applications Electronic Mail The OSI way to do this is specified in X.400 (84 & 88) Overall Architecture UA P3 UA MS P7 P1 MTS At the core of the X.400 Message Handling System (MHS) is the Message

More information

Request for Comments: Category: Standards Track April 2006

Request for Comments: Category: Standards Track April 2006 Network Working Group R. Gellens Request for Comments: 4409 QUALCOMM Obsoletes: 2476 J. Klensin Category: Standards Track April 2006 Status of This Memo Message Submission for Mail This document specifies

More information

Chat and Instant Messaging

Chat and Instant Messaging In the intranet website book.com of "Palm Tree Publications", as an administrator, you are required to provide an environment for employees to enjoy chatting, instant messaging, mailing, and SMS text messaging

More information

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4 Lotus Protector Mail Security and Mail Encryption Interop Guide Lotus Protector Interop Guide Mail Encryption 2.1.0.1 Mail Security 2.5.1 Version 1.4 Lotus Protector Mail Security and Mail Encryption Configuration

More information

Simulation Study of elearning Classroom using ipads Based on Wireless LAN with IEEE b

Simulation Study of elearning Classroom using ipads Based on Wireless LAN with IEEE b Simulation Study of elearning Classroom using ipads Based on Wireless LAN with IEEE 802.11b Matthew Young Kim and Victor Clincy Kennesaw State University Kennesaw, GA, USA Abstract - This paper presents

More information

Capabiilty-based Egress Network Access Control by using DNS Server

Capabiilty-based Egress Network Access Control by using DNS Server Capabiilty-based Egress Network Access Control by using DNS Server Shinichi Suzuki a, Yasushi Shinjo a,,1, Toshio Hirotsu b,1, Kozo Itano a,1, Kazuhiko Kato a,1 a Department of Computer Science, University

More information

Internet Engineering Task Force (IETF) September Indicating Handling States in Trace Fields

Internet Engineering Task Force (IETF) September Indicating  Handling States in Trace Fields Internet Engineering Task Force (IETF) Request for Comments: 6729 Category: Standards Track ISSN: 2070-1721 D. Crocker Brandenburg InternetWorking M. Kucherawy Cloudmark, Inc. September 2012 Indicating

More information

Internet Engineering Task Force (IETF) Request for Comments: Obsoletes: 1652 Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: Obsoletes: 1652 Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6152 STD: 71 Obsoletes: 1652 Category: Standards Track ISSN: 2070-1721 J. Klensin N. Freed Oracle M. Rose Dover Beach Consulting, Inc. D. Crocker,

More information

Request for Comments: 4142 Category: Standards Track Nine by Nine November 2005

Request for Comments: 4142 Category: Standards Track Nine by Nine November 2005 Network Working Group Request for Comments: 4142 Category: Standards Track D. Crocker Brandenburg G. Klyne Nine by Nine November 2005 Status of This Memo Full-mode Fax Profile for Internet Mail (FFPIM)

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Chapter 20 SMTP. Slides from TCP/IP - Forouzan. User Agent (UA) Addressing Delayed Delivery Aliases Mail Transfer Agent (MTA) MIME POP.

Chapter 20 SMTP. Slides from TCP/IP - Forouzan. User Agent (UA) Addressing Delayed Delivery Aliases Mail Transfer Agent (MTA) MIME POP. Chapter 20 SMTP User Agent () Addressing Delayed Delivery Aliases Mail Transfer Agent () MIME POP 20-1 Figure 20-1 SMTP concept User User SMTP client TCP ephemeral port SMTP server TCP well-known port

More information

Internet Engineering Task Force (IETF) Request for Comments: 5983 Category: Experimental October 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5983 Category: Experimental October 2010 ISSN: Internet Engineering Task Force (IETF) R. Gellens Request for Comments: 5983 Qualcomm Category: Experimental October 2010 ISSN: 2070-1721 Abstract Mailing Lists and Internationalized Email Addresses This

More information

Request for Comments: 2304 Category: Standards Track March 1998

Request for Comments: 2304 Category: Standards Track March 1998 Network Working Group C. Allocchio Request for Comments: 2304 GARR-Italy Category: Standards Track March 1998 Minimal FAX address format in Internet Mail Status of this Memo This document specifies an

More information

AmosConnect Service Description

AmosConnect Service Description AmosConnect Service Description 1. INTRODUCTION 2 2. BACKGROUND AND PHILOSOPHY 2 2.1 Background 2 2.2 Philosophy 3 3. THE PROBLEMS WE SOLVE 3 3.1 Responsibility 3 3.2 Cost Control 3 3.3 System Administration

More information

Network Working Group Request for Comments: 4161 Category: Informational K. Watanabe C. Kanaide TOYO Communication Equipment August 2005

Network Working Group Request for Comments: 4161 Category: Informational K. Watanabe C. Kanaide TOYO Communication Equipment August 2005 Network Working Group Request for Comments: 4161 Category: Informational K. Mimura K. Yokoyama T. Satoh K. Watanabe C. Kanaide TOYO Communication Equipment August 2005 Guidelines for Optional Services

More information

SMTP. George Porter CSE 124 February 12, 2015

SMTP. George Porter CSE 124 February 12, 2015 SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,

More information

Application: Electronic Mail

Application: Electronic Mail Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-

More information

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification: Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,

More information

WWW: the http protocol

WWW: the http protocol Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC

More information

Implementation Guide for Delivery Notification in Direct

Implementation Guide for Delivery Notification in Direct Implementation Guide for Delivery Notification in Direct Contents Change Control... 2 Status of this Guide... 3 Introduction... 3 Overview... 3 Requirements... 3 1.0 Delivery Notification Messages... 4

More information

Standardizing Information and Communication Systems

Standardizing Information and Communication Systems Standard ECMA-143 3rd Edition - June 1997 Standardizing Information and Communication Systems Private Integrated Services Network (PISN) - Circuit Mode Bearer Services - Inter-Exchange Signalling Procedures

More information

Enhancement of Plotting Environment of STACK with Gnuplot

Enhancement of Plotting Environment of STACK with Gnuplot Enhancement of Plotting Environment of STACK with Gnuplot Kenji Fukazawa fukazawa@kure-nct.ac.jp Department of General Education National Institute of Technology, Kure College 737-8506 Japan Yasuyuki Nakamura

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (2 nd Week) 2. Protocol Architecture, TCP/IP, and Internet-Based Applications 2.Outline The Need for a Protocol Architecture

More information

How Internet Works

How Internet  Works How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

USING CAPTCHAs TO MITIGATE THE VoIP SPAM PROBLEM

USING CAPTCHAs TO MITIGATE THE VoIP SPAM PROBLEM Second International Conference on Computer Research and Development USING CAPTCHAs TO MITIGATE THE VoIP SPAM PROBLEM Ismail Ahmedy Department of Computer System and Communication Faculty of Computer Science

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Request for Comments: 7912 Category: Informational June 2016 ISSN:

Request for Comments: 7912 Category: Informational June 2016 ISSN: Independent Submission A. Melnikov Request for Comments: 7912 Isode Ltd Category: Informational June 2016 ISSN: 2070-1721 Abstract Message Authorizing Email Header Field and Its Use for the Draft and Release

More information

MOODLE MANUAL TABLE OF CONTENTS

MOODLE MANUAL TABLE OF CONTENTS 1 MOODLE MANUAL TABLE OF CONTENTS Introduction to Moodle...1 Logging In... 2 Moodle Icons...6 Course Layout and Blocks...8 Changing Your Profile...10 Create new Course...12 Editing Your Course...15 Adding

More information

Gorakh Laxman Wakhare Asst. Professor, Jayawant Institute of Management Studies, Research Student at IndSearch affiliated to S.P.P.U, Pune.

Gorakh Laxman Wakhare Asst. Professor, Jayawant Institute of Management Studies, Research Student at IndSearch affiliated to S.P.P.U, Pune. IJMSS Vol.4 Issue-2 (February, 216) ISSN: 2321-1784 (Impact Factor- 5.276) COMPARATIVE STUDY OF EMAIL APPLICATIONS PERFORMANCE FOR MULTI-PROTOCOLS ON WIRELESS NETWORK Gorakh Laxman Wakhare Asst. Professor,

More information

Migrating from Cisco Unity to Cisco Unity Connection

Migrating from Cisco Unity to Cisco Unity Connection Migrating from Cisco Unity to Cisco Unity Connection When migrating from Cisco Unity to Cisco Unity Connection there are two distinct strategies to choose from: flash cut or gradual. A gradual migration

More information