Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Similar documents
Electronic Mail

Application: Electronic Mail

Electronic Mail Paradigm

Applications & Application-Layer Protocols: FTP and (SMTP & POP)

Simple Network Management Protocol (SNMP)

The Application Layer: & SMTP

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Chapter 20 SMTP. Slides from TCP/IP - Forouzan. User Agent (UA) Addressing Delayed Delivery Aliases Mail Transfer Agent (MTA) MIME POP.

FTP. FTP offers many facilities :

Electronic Mail (SMTP)

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

Internet and Intranet Protocols and Applications

Simple Network Management Protocol (SNMP)

WWW: the http protocol

Electronic Mail. Electronic Mailboxes

Lecture 6: Application Layer Web proxies, , and SMTP

CS 43: Computer Networks. 12: and SMTP September 28, 2018

Chapter 2 Application Layer

SMTP. George Porter CSE 124 February 12, 2015

13. Internet Applications 최양희서울대학교컴퓨터공학부

CSC 4900 Computer Networks:

Outline. EEC-484/584 Computer Networks. Slow Start Algorithm. Internet Congestion Control Algorithm

FTP,HTTP. By Nidhi Jindal

Applications FTP. FTP offers many facilities :

CSC 401 Data and Computer Communications Networks

Electronic mail, usually called , consists of simple text messages a piece of text sent to a recipient via the internet.

Header- A Forensic Key to Examine an

System: Basic Functionality

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Fig (1) sending and receiving s

Network Applications Electronic Mail

The Application Layer: SMTP, FTP

Agenda. What is ? Brief Introduction To . History Of . Components Of System. Basics

Computer Network 1 1

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

CISNTWK-492e. Microsoft Exchange Server 2003 Administration. Chapter Eight Managing Routing and Internet Connectivity

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1

Internet Architecture

CSCE 463/612 Networks and Distributed Processing Spring 2018

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang

Layered Model. DoD Model. ISO/OSI Model

Summary of PGP Services

What is ? TCP/IP Standard Applications for Electronic Mail. Agenda. History

Basics BUPT/QMUL

Basics BUPT/QMUL

. SMTP, POP, and IMAP

Lecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Network Applications Principles of Network Applications

Internet Mail: The SMTP Model

Objectives. What Is and How Does It Work? Objectives. and How Does It Work? and How Does It Work?

Appendix. Web Command Error Codes. Web Command Error Codes

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

Computer Networks. Wenzhong Li. Nanjing University

CHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS ANSWERS TO PROBLEMS

Application Protocol Examples

CS321: Computer Networks ELECTRONIC MAIL

Application Inspection and Control for SMTP

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Internet Protocols. Robin Sharp

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Internet Electronic Mail

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET

CSCE 813 Internet Security Secure Services I

21.1 FTP. Connections

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

CS 3516: Computer Networks

The Application Layer

Application-layer Protocols and Internet Services

4. The transport layer

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

. indigoo.com INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R.

Project 3: Base64 Content-Transfer-Encoding

Chapter 7 (Week 13) The Application Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

What is ? A method of composing, sending, and receiving messages over electronic communication systems. Internet addresses

Cryptography and Network Security. Sixth Edition by William Stallings

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

XI Internet Agent. Internet Agent 659

Application Level Protocols

SCS3004 Networking Technologies Application Layer Protocols

ing With PHP History of Applications or Use

Chapter 2: Application layer

UNIT V APPLICATION LAYER Traditional Applications: Electronic Mail: SMTP. Major application layer components

Chapter 2 Application Layer

Internet Technology 2/10/2016

Overview. Electronic mail. History Format of . Sending . Retrieving . RFC 822, MIME, addresses SMTP, DNS. POP, IMAP, Web-based

Chapter 2. Application Layer

Application Layer Chapter 2

Application Layer Services Omer F. Rana. Networks and Data Communications 1

Chapter 4. Internet Applications

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Telemetry Data Sharing Using S/MIME

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

How Internet Works

Protocols and Software. Nixu Ltd.

Part 4: Message delivery protocols (POP and IMAP) Network News (Usenet News)

, Network Management, Future

Transcription:

Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1

Introduction Most heavily used application on the Internet. Simple Mail Transfer Protocol (SMTP) Uses TCP/IP Delivery of simple text messages Multi-purpose Internet Mail Extension (MIME) Delivery of other types of data Voice, images, video clips 2

Simple Mail Transfer Protocol (SMTP) Based on RFC 821. Not concerned with format of messages or data. Transmits simple text messages only. SMTP uses information written on envelope of mail. Message header Does not look at contents. Message body Except: Standardize message character set to 7 bit ASCII. Add log information to start-of-message. Shows path taken. 3

Basic Operation Mail created by user agent program (mail client). Message consists of: Header containing recipient s address and other information. Body containing user data. Messages queued and sent as input to SMTP sender program. Typically a server process (daemon on UNIX). 4

SMTP Mail Flow 5

Mail Message Contents Each queued message has: Message text RFC 822 header with message envelope and list of recipients. Message body, composed by user. A list of mail destinations Derived by user agent / SMTP server from header. May be listed in header. May require expansion of mailing lists. 6

SMTP Sender Takes message from queue. Transmits to proper destination host. Via SMTP transaction. Over one or more TCP connections to port 25. When delivery complete, sender deletes destination from list for that message. When all destinations processed, message is deleted. 7

Possible Errors Host unreachable Host out of operation TCP connection fail during transfer Sender can re-queue mail Give up after a period Faulty destination address User error Target user address has changed Redirect if possible Inform user if not 8

SMTP Receiver Accepts arriving message. Places in user mailbox or copies to outgoing queue for forwarding. Receiver must: Verify local mail destinations. Deal with errors Transmission Lack of disk space Sender responsible for message until receiver confirm complete transfer. Indicates mail has arrived at host, not user. 9

SMTP Forwarding Mostly direct transfer from sender host to receiver host. May go through intermediate machine via forwarding capability. Sender can specify route. 10

SMTP Mail Flow 11

SMTP System Overview Commands and responses between sender and receiver. Initiative with sender. Establishes TCP connection. Sender sends commands to receiver. e.g. HELO <domain><crlf> Each command generates exactly one reply. e.g. 250 requested mail action ok; completed. 12

SMTP Replies Leading digit indicates category. Positive completion reply (2xx) Positive intermediate reply (3xx) Transient negative completion reply (4xx) Permanent negative completion reply (5xx) 13

Operation Phases Connection setup Exchange of command-response pairs Connection termination 14

Connection Setup Sender opens TCP connection with receiver. Once connected, receiver identifies itself. 220 <domain> service ready Sender identifies itself. HELO Receiver accepts sender s identification. 250 OK If mail service not available, the second step above becomes: 421 service not available 15

Mail Transfer Sender may send one or more messages to receiver. MAIL command identifies originator. Gives reverse path to be used for error reporting. Receiver returns 250 OK or appropriate fail/error message. One or more RCPT commands identifies recipients for the message. Separate reply for each recipient. DATA command transfers message text. End of message indicated by line containing just period (.) 16

Closing Connection Two steps: Sender sends QUIT and waits for reply. Then initiate TCP close operation. Receiver initiates TCP close after sending reply to QUIT. 17

An Example SMTP Session S: 220 hotmail.com Simple Mail Transfer Service Ready C: HELO yahoo.com S: 250 hotmail.com C: MAIL FROM: <isg@yahoo.com> S: 250 OK C: RCPT TO: <myfriend@hotmail.com> S: 250 OK C: RCPT TO: <somebody@hotmail.com> S: 250 OK 18

C: DATA S: 354 Start mail input; end with (.) C: actual contents of the message C: C: C: (.) S: 250 OK C: QUIT S: 221 hotmail.com Service closing transmission channel 19

Mail Access Protocols Two mail access protocols are widely used: 1. Post Office Protocol, version 3 (POP3) 2. Internet Mail Access Protocol version 4 (IMAP4). 20

POP3 The client POP3 software is installed on the recipient machine, and the server POP3 software installed on mail server. The client (user agent) opens a connection with the server on TCP/110. Sends user name and password. Can access the mails, one by one. Two modes: Delete mode mails deleted as they are read Keep mode mails remain in the mailbox 21

IMAP4 Provides the following extra features: A user can check the email header before downloading. A user can search the contents of the email for a specific string prior to downloading. A user can create, delete, or rename mailboxes on the mail server. A user can create a hierarchy of mailboxes in a folder for email storage. 22

Multipurpose Internet Mail Extension (MIME) SMTP can not transmit nontext / executables. Uuencode and other schemes are available. Not standardized. Cannot transmit text including international characters (e.g. â, å, ä, è, é, ê, ë). Need 8 bit ASCII. Servers may reject mail over certain size. Some SMTP implementations do not adhere to standard. CRLF, truncate or wrap long lines, removal of white space, etc. 23

Overview of MIME Five new message header fields: MIME version Content type Content transfer encoding Content Id Content Description Number of content formats defined. Transfer encoding defined. 24

Content Types Text body Multipart Mixed, Parallel, Alternative, Digest Message RFC 822, Partial, External-body Image jpeg, gif Video mpeg Audio Basic Application Postscript octet stream 25

MIME Transfer Encodings Reliable delivery across wide largest range of environments. Content transfer encoding field: Six values Three (7bit, 8bit, binary) no encoding done Provide info about nature of data Quoted-printable Data largely printable ASCII characters. Non-printing characters represented by hex code. Base64 Maps arbitrary binary input onto printable output. X-token Named nonstandard encoding. 26

Base 64 Encoding Expands the message by 33%. Uses the symbols A..Z,a..z,0..9,+,/ 27