Internet Architecture

Similar documents
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

Internet Architecture

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Internet Architecture

Application Layer: OSI and TCP/IP Models

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

Chapter 10: Application Layer

FTP. FTP offers many facilities :

Electronic Mail

Electronic Mail Paradigm

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

Applications FTP. FTP offers many facilities :

Electronic Mail (SMTP)

CS321: Computer Networks ELECTRONIC MAIL

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

Different Layers Lecture 21

The Application Layer

Internet and Intranet Protocols and Applications

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

FTP,HTTP. By Nidhi Jindal

The Application Layer: & SMTP

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

System: Basic Functionality

Simple Network Management Protocol (SNMP)

CS 43: Computer Networks. 12: and SMTP September 28, 2018

Internet Architecture

Lecture (03) Network Model

CS 356 Internet Security Protocols. Fall 2013

Electronic Mail. Electronic Mailboxes

Simple Network Management Protocol (SNMP)

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

Fig (1) sending and receiving s

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

4. The transport layer

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Lecture (03) Networking Model (TCP/IP) Networking Standard (OSI) cont.,..

Internet Architecture

1. Which OSI layers offers reliable, connection-oriented data communication services?

TCP/IP protocol suite

How Internet Works

Unit 28 Website Production ASSIGNMENT 1

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

Lotus Protector Interop Guide. Mail Encryption Mail Security Version 1.4

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. Managing a HTTP request. transport session. Step 1 - opening transport

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Chapter -4 OSI Reference Model

BEST PRACTICES FOR PERSONAL Security

The Application Layer: SMTP, FTP

Chapter Two. The OSI Model

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

CSC 4900 Computer Networks:

Lecture (02) Network Protocols and Standards

3.2 COMMUNICATION AND INTERNET TECHNOLOGIES

EEC-682/782 Computer Networks I

Overview of Networking Concepts

Intranets 4/4/17. IP numbers and Hosts. Dynamic Host Configuration Protocol. Dynamic Host Configuration Protocol. CSC362, Information Security

Security and Privacy

Chapter 7. Local Area Network Communications Protocols

(electronic mail) is the exchange of computer-stored messages by telecommunication.

CSC Network Security

Cisco Encryption

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1

. SMTP, POP, and IMAP

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Network Model: Each layer has a specific function.

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Internet Security: Firewall

The OSI Model and the TCP/IP Protocol Suite Outline: 1. Protocol Layers 2. OSI Model 3. TCP/IP Model 4. Addressing

Application Layer Services Omer F. Rana. Networks and Data Communications 1

Reading Headers with MX Tool Box By Matt Flederbach

Using Trustwave SEG Cloud with Cloud-Based Solutions

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

Defining Networks with the OSI Model. Module 2

SMTP. George Porter CSE 124 February 12, 2015

Transport Layer TCP & UDP Week 7. Module : Computer Networks Lecturers : Lucy White Office : 324

Objectives CINS/F1-01

Hands-On Ethical Hacking and Network Defense

IT 341: Introduction to System

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

CS3600 SYSTEMS AND NETWORKS

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

Application Layer. Presentation Layer. Session Layer. Transportation Layer. Network Layer. Physical Layer

User Manual of Webmail Version 5

Security by Any Other Name:

Network Protocols - Revision

Special expressions, phrases, abbreviations and terms of Computer Networks

Transcription:

Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1

How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use it to send messages to anyone who is connected to the Internet or connected to a computer network that has a connection to the Internet, such as an online service. Millions of people send and receive email every day. Email is a great way to keep up with far-flung relatives, friends, co-workers in different branches of your company, and colleagues in your field. Email messages are sent in the same way as most Internet data. The TCP protocol breaks your messages into packets, the IP protocol delivers the packets to the proper location, and then the TCP reassembles the message on the receiving mail server so it can be read. Assistant Teacher Samraa Adnan Al-Asadi 2

How Email Works You can also attach binary files, such as pictures, videos, sounds, and executable files to your email messages. Because the Internet isn't capable of directly handling binary files in email, the file first must be encoded in one of a variety of encoding schemes. Popular schemes are MIME and uuencode. The person who receives the attached binary file (called an attachment) must decode the file with the same scheme that was used to encode the file. Many email software packages do this automatically. When you send email to someone on the Internet, that message often has to travel through a series of networks before it reaches the recipient networks that might use different email formats. Gateways perform the job of translating email formats from one network to another so that the messages can make their way through all the networks of the Internet. Assistant Teacher Samraa Adnan Al-Asadi 3

How Email Works A mailing list is one of the most intriguing uses of email. It connects a group of people who are interested in the same topic, such as Japanese cartoons or home schooling. When one person sends email to the mailing list, that message is automatically sent to everyone on the list. You can meet others and talk to them on a regular basis about your shared interests, hobbies, or professions. To get onto a mailing list, you send an email note to the mailing list administrator and include your email address. One problem with email is that it's not secure, snoopers and hackers can read it as it gets sent along the public wires that make up the Internet. To ensure that no one except the sender and receiver can read it, encryption can be used software that scrambles the mail so only those with the proper encryption keys can read Assistant Teacher it. Samraa Adnan Al-Asadi 4

How Email Is Delivered Over the Internet 1* After you create and send an email message, it is sent as a stream of packets using the Internet's TCP/IP protocol. Each packet bears the address of the destination, among many other kinds of information, such as the address of the sender. Assistant Teacher Samraa Adnan Al-Asadi 5

How Email Is Delivered Over the Internet Assistant Teacher Samraa Adnan Al-Asadi 6

How Email Is Delivered Over the Internet Assistant Teacher Samraa Adnan Al-Asadi 7

How Email Is Delivered Over the Internet Assistant Teacher Samraa Adnan Al-Asadi 8

How Email Is Delivered Over the Internet Assistant Teacher Samraa Adnan Al-Asadi 9

How Email Software Works 1* After the Internet delivers mail to your email box, you need some way to read the mail, compose new mail, and respond to your messages. To do all this, you use email software, sometimes called mailers or readers. Assistant Teacher Samraa Adnan Al-Asadi 10

How Email Software Works Assistant Teacher Samraa Adnan Al-Asadi 11

How Email Software Works Assistant Teacher Samraa Adnan Al-Asadi 12

How Email Software Works Assistant Teacher Samraa Adnan Al-Asadi 13

How Email Software Works Assistant Teacher Samraa Adnan Al-Asadi 14

How Email Software Works Assistant Teacher Samraa Adnan Al-Asadi 15

MUAs, MTAs, and MDAs There are three main parts of the E-mail system: Mail User Agent (MUA) Mail Transfer Agent (MTA) Mail Delivery Agent (MDA) Assistant Teacher Samraa Adnan Al-Asadi 16

Mail User Agent (MUA) The MUA is the program which the user uses to read and send e-mail. It reads incoming messages that have been delivered to the user's mailbox, and passes outgoing messages to an MTA for sending. Assistant Teacher Samraa Adnan Al-Asadi 17

Mail Transfer Agent (MTA) The MTA basically acts as a "mail router". It accepts a message passed to it by either an MUA or another MTA, decides based upon the message header which delivery method it should use, and then passes the message to the appropriate MDA for that delivery method. Assistant Teacher Samraa Adnan Al-Asadi 18

Mail Delivery Agent (MDA) The MDA accepts a piece of mail from an MTA and performs the actual delivery. Assistant Teacher Samraa Adnan Al-Asadi 19

E-mail Services and SMTP/POP Protocols Two Application layer protocols are Post Office Protocol (POP) and Simple Mail Transfer Protocol (SMTP). As with HTTP, these protocols define client/server processes. When people compose e-mail messages, they typically use an application called a Mail User Agent (MUA), or e-mail client. The MUA allows messages to be sent and places received messages into the client's mailbox, both of which are distinct processes. In order to receive e-mail messages from an e-mail server, the e-mail client can use POP. Sending e-mail from either a client or a server uses message formats and command strings defined by the SMTP protocol. Usually an e-mail client provides the functionality of both protocols within one application. Assistant Teacher Samraa Adnan Al-Asadi 20

E-mail Services and SMTP/POP Protocols Assistant Teacher Samraa Adnan Al-Asadi 21

E-mail Server Processes MTA and MDA Assistant Teacher Samraa Adnan Al-Asadi 22

E-mail Server Processes MTA and MDA The Mail Transfer Agent (MTA) process is used to forward e-mail. As shown in the figure, the MTA receives messages from the MUA or from another MTA on another e-mail server. If the mail is addressed to a user whose mailbox is on the local server, the mail is passed to the MDA. If the mail is for a user not on the local server, the MTA routes the e-mail to the MTA on the appropriate server. In the figure, we see that the Mail Delivery Agent (MDA) accepts a piece of e-mail from a Mail Transfer Agent (MTA) and performs the actual delivery. Assistant Teacher Samraa Adnan Al-Asadi 23

E-mail Server Processes MTA and MDA The MDA receives all the inbound mail from the MTA and places it into the appropriate users' mailboxes. The MDA can also resolve final delivery issues, such as virus scanning, spam filtering, and return-receipt handling. Most e-mail communications use the MUA, MTA, and MDA applications. However, there are other alternatives for e-mail delivery. Assistant Teacher Samraa Adnan Al-Asadi 24

E-mail Server Processes MTA and MDA The e-mail can use the protocols, POP and SMTP. POP and POP3 (Post Office Protocol, version 3) are inbound mail delivery protocols and are typical client/server protocols. They deliver e-mail from the e- mail server to the client (MUA). The MDA listens for when a client connects to a server. Once a connection is established, the server can deliver the e-mail to the client. Assistant Teacher Samraa Adnan Al-Asadi 25

E-mail Server Processes MTA and MDA The Simple Mail Transfer Protocol (SMTP), on the other hand, governs the transfer of outbound e-mail from the sending client to the e-mail server (MDA), as well as the transport of e-mail between e-mail servers (MTA). SMTP enables e-mail to be transported across data networks between different types of server and client software and makes e-mail exchange over the Internet possible. The SMTP protocol message format uses a rigid set of commands and replies. These commands support the procedures used in SMTP, such as session initiation, mail transaction, forwarding mail, verifying mailbox names, expanding mailing lists, and the opening and closing exchanges. Assistant Teacher Samraa Adnan Al-Asadi 26

How Encryption Can Keep Email Private 1* Encryption can be used to encode email messages so snoopers and hackers can't read them as they are sent across the Internet. Many types of encryption exist, but in the most common one, keys are used. Everyone gets a public and private keys. The public key is available for anyone to use to encrypt mail; the private key is used only by the recipient to decrypt it. The following steps show how to encrypt email with the popular encryption program Pretty Good Privacy (PGP). To start using PGP, someone uses her normal email program to compose a piece of mail. After she composes the mail, she decides whether she wants to encrypt the message. Assistant Teacher Samraa Adnan Al-Asadi 27

How Encryption Can Keep Email Private Assistant Teacher Samraa Adnan Al-Asadi 28

How Encryption Can Keep Email Private Assistant Teacher Samraa Adnan Al-Asadi 29

How Encryption Can Keep Email Private Assistant Teacher Samraa Adnan Al-Asadi 30

How Encryption Can Keep Email Private Assistant Teacher Samraa Adnan Al-Asadi 31

How Encryption Can Keep Email Private Assistant Teacher Samraa Adnan Al-Asadi 32

Thank you Assistant Teacher Samraa Adnan Al-Asadi 33