It Unit4
It Unit4
4.1 E-mail
Email is a service which allows us to send the message in electronic mode over the internet. It offers an
efficient, inexpensive and real time mean of distributing information among people.
E-Mail Address
Each user of email is assigned a unique name for his email account. This name is known as E-mail address.
Different users can send and receive messages according to the e-mail address.
E-mail is generally of the form username@domainname. For example, [email protected] is
an e-mail address where webmaster is username and tutorialspoint.com is domain name.
The username and the domain name are separated by @ (at) symbol.
E-mail addresses are not case sensitive.
Spaces are not allowed in e-mail address.
Following example will take you through the basic steps involved in sending and receiving emails and will
give you a better understanding of working of email system:
Suppose person A wants to send an email message to person B.
Person A composes the messages using a mailer program i.e. mail client and then select
Send option.
The message is routed to Simple Mail Transfer Protocol to person B’s mail server.
The mail server stores the email message on disk in an area designated for person B.
The disk space area on mail server is called mail spool.
Now, suppose person B is running a POP client and knows how to communicate with B’s
mail server.
It will periodically poll the POP server to check if any new email has arrived for B.As in this
case, person B has sent an email for person B, so email is forwarded over the network to B’s
PC. This is message is now stored on person B’s PC.
The following diagram gives pictorial representation of the steps discussed above:
Example:
A sender using an Apple email client with a Gmail server can send an email to another user using a Zoho mail
server on an Outlook email client. This is possible because the servers and the email clients follow the rules and
standards defined by the email protocols.
Email protocols
1. SMTP: This stands for Simple Mail Transfer Protocol. This is a standard protocol for sending emails
over the Internet. This is a protocol which is used by a Mail Transfer Agent to deliver emails to a
recipient’s email server. This is a protocol which defines mail sending and cannot be used for mail
receiving.
SMTP is the most commonly used protocol for mail transfer between two servers. This requires no
authentication to function, unlike POP3 and IMAP. Certain Internet Service Providers block the default
port 25 of SMTP. In such cases, the mail server also provides an alternate secondary port.
2. POP3: POP3 stands for Post Office 3 protocol. POP simply reaches out to the mail server and brings
back the mail contents. This is a simple yet standardized way which allows users to access mailboxes
and quickly download messages to their device.
With POP3, users can configure the server settings. This can be used to allow mail copies to be left on
the server or move all emails without leaving any copy on the server. This is
usually configurable in most cases. The biggest advantage of POP3 is the low dependency over the
Internet. Users can download all emails and read them at leisure even if they are accessing this offline.
The way these emails are stored in local depends on the email client. For instance, Outlook utilizes .pst,
while Thunderbird uses .mbox. This is a good option in case you choose to read emails offline. Apart
from this, this helps you reduce the server space by storing messages locally.
3. IMAP: This stands for Internet Message Access Protocol. This again is a standard protocol for
accessing emails and is a client/server protocol. Here the emails are received and held by the Internet
server. Unlike POP, this does not move the emails. The biggest difference between POP3 and IMAP is
the mail sync up. POP3 assumes that a user will be connected to a single device. However, IMAP is
suitable for different devices simultaneously.
IMAP requires users to be constantly connected to the Internet. When a user accesses the mailbox, the
user is actually connected to an external server. This is more beneficial when there are multiple users.
IMAP can work over a relatively low internet connection since it only downloads email messages from
the server when a user has requested to read a specific email.
4. MIME: The MIME stands for Multi-Purpose Internet Mail Extensions. As the name indicates, it is
an extension to the Internet email protocol that allows it’s users to exchange different kinds of data files
over the Internet such as images, audio, and video. The MIME is required if text in character sets other
than ASCII.
Virtually all human-written Internet email and a fairly large proportion of automated email is transmitted
via SMTP in MIME format. Actually, MIME was designed mainly for SMTP, but the content types
defined by MIME standards are important also in communication protocols outside of email, such as
HTTP. In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that
Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII
text. As a result, new file types were added to “mail” as a supported Internet Protocol file type.
E-mail address identifies an “E-mail box” to which E-mail messages are to be delivered.
An e-mail address is composed of several elements, for example "[email protected]".
The first part of all E-mail is user group or department of a company or organization, the
"@" is divider of E-mail address and to the right is the domain name of the user belong to
i.e. "example.com".
A domain name is a unique name that identifies a website and it serves as an address,
which is used to access the website.
Domain names provide an easy way to remember internet address which is translated into
its numeric address (IP address) by the domain name system (DNS).
Second-level domain.
organization.
Top-level domains are
.in - India
User name
To the left of the "@" character is the user name.
The user name designates who at a domain is the owner of the E-mail address, for
example "rock".
Creating a live E-mail account with mail provider like Gmail, Yahoo, Hotmail & etc.
Creating a virtual mailbox, or E-mail forwarding feature.
The Header
The email header gives us common details about the message such as the unique identity of the message.
The details of the users of the ‘from’ and ‘to’ ends are also stored here. The email header consists of the
RASC- DEPARTMENT COMPUTER SCIENCE AND APPLICATION-N. MANIMOZHI 6
INTERNET TECHNOLOGY UNIT-IV
following parts. However, the exact contents of the header can vary according to the email systems that
generate the email message.
1) Subject
2) Sender (From:)
4) Reply-to
5) Recipient (To:)
7) Attachments
Subject
The subject part is the topic of the message. In most email systems, if the content view of the folders is
set to view each messages separately, the subject part also will be visible with the user’s name. These
subject fields are scanned by the spam scanners to evaluate the messages.
Sender (From:)
This field describes the ‘from’ address of the email. This will specify the sender’s email address.
Usually, it will be the “reply-to” address.
Reply-to
This field describes the email address that will become the recipient of the reply to the particular email.
When you reply, it will go to this email address despite the sender email address.
Recipient (To:)
This is the first/last name of the email recipient as configured by the sender.
Attachments
Some emails could be attached with files such as text, image, audio, video etc. These files are specified
here.
Body
The actual content is stored in this part. This will be in the format of text. This field could also include
signatures or text generated automatically by the sender’s email system. As we mentioned earlier, the
contents of the emails can be varied according to the different email systems used by each user.
Email client is a desktop application that enables configuring one or more email addresses to receive,
read, compose and send emails from that email address(s) through the desktop interface. It provides a
central interface for receiving, composing and sending emails of configured email address(s).
Email client is also known as email reader or mail user agent (MUA).
Outlook Express has long been a friend to those who use a PC at home or at work, in particular
machines that run with Microsoft. We at Mail.com believe there is no need to sacrifice that
familiarity just so you can use our services such as spam filters and high attachment limit. Once
you’ve set up your mail.com account, you can simply add the account to Outlook Express and
continue to send and receive emails in the mail client you prefer.
Web-based email
Webmail (or web-based email) is an email service that can be accessed using a standard web
browser. It contrasts with email service accessible through a specialised email client software.
Examples of webmail providers are AOL Mail, Gmail, Mailfence, Outlook.com/Hotmail.com,
Yahoo! Mail and IceWarp Mail Server. Additionally, many internet service providers provide webmail
as part of their internet service package. Similarly, some web hosting providers also provide webmail as
a part of their hosting package.
Mail Server
A mail server (sometimes also referred to an e-mail server) is a server that handles and delivers e-mail
over a network, usually over the Internet. A mail server can receive e-mails from client computers and
deliver them to other mail servers. A mail server can also deliver e-mails to client computers. A client
computer is normally the computer where you read your e-mails, for example your computer at home or in
your office. Also, an advanced mobile phone or Smartphone, with e-mail capabilities, can be regarded as a
client computer in these circumstances.
There are many list servers available, each having its own commands for subscribing to the list. Some of
them are described in the following table:
A Sense of Immediacy
In addition to verifying the email's header, you should also check the email's body. If you receive
an unusual request that makes you feel compelled to act, it's likely that it includes malware. As a
result, examine the email's wording for any feeling of urgency. Check for grammar and spelling
Suspicious Links
Malware might be contained in an email with an unexpected attachment that asks you to open
it. .zip, .xls, .js, .pdf, .ace, .arj, .wsh, .scr, .exe, .com, .bat, and .doc are examples of suspicious
attachment file extensions.