PRESENTER:
FPI/CSC/20/1-002
SUBMITTED TO:
DR. EGWUCHE S. O.
Communication doesn’t belong solely to the human species. Still, human communication is
the most important feature that distinguishes humans from other living species. However,
only the human being demonstrates a need for speech respectively verbal communication.
Finally, with the discovery of computers and simultaneous development of computer sciences
and technical possibilities, communication has become a segment of web and global
networking of all levels: private and professionals. The Internet has revolutionized the
computer and communications world like nothing before. The invention of the telegraph,
telephone, radio, and computer set the stage for this unprecedented integration of capabilities.
This seminar is to focus on electronic mail (E-Mail); it’s history and usefulness.
Contrary to popular belief, email did not arrive on the scene with the Internet. Email predates
the Internet, and even the ARPANET. The first email system, a messaging system for
System, was deployed in 1965. Email message exchange between distinct computers by
means of a computer network started in 1971. Jeroeon (2017) already described a (probably
never implemented) email system, while Ray Tomlinson sent the first actual network email
message in late 1971. The vehicle for these early email exchanges was ARPANET where
messages piggybacked on the already available File Transfer Protocol (FTP). Email was not
yet a first-class-citizen, but it was a very powerful mechanism for communication. (Richter,
2016).
The early 1970’s saw the birth and procreation of Unix. As an asynchronous way of loosely
interconnecting otherwise unconnected computers, the Unix to Unix Copy. We follow Knuth
in writing email instead of e-mail. Protocol (UUCP) was invented in 1978 at Bell Labs.
UUCP provides data exchange between computers on the basis of ad-hoc connectivity, such
as direct dial-up connections between computer systems. Based upon UUCP, store-and-
forward protocols for message exchange and message routing were designed and globally
implemented. This included not only (or even primarily) email messaging: UUCP’s first-class
citizen, one could say, was in fact not email, but Usenet News. This is the email and news as
we know them today, although both have long since transitioned to data transfer using
Similar to UUCP, the ‘Because It’s Time Network’ (BITNET) interconnected IBM
started on BITNET in 1981. Unlike UUCP, and much more like today’s Internet, the then
connectivity for its own computers by the name of DECnet, which started in 1975. DECnet
included full message exchange and message routing facilities (Gaurav, 2019).
In the early 1980’s, the Internet mail infrastructure was created. Most important here were the
efforts made by Postel and colleagues in creating SMTP, the Simple Mail Transfer Protocol,
within the IETF. In 1982, while the ARPANET was still transitioning from the old NCP
protocol to TCP/IP, the first widespread implementation of mail over SMTP was
implemented by Eric Allman. Sendmail, the followup of delivermail, was shipped with 4.1c
BSD Unix, which promoted email to a first-class citizen on the then emerging TCP/IP-based
Internet. At that time, several message exchange networks existed already. In order to cope
with all these different networks and addressing systems, an elaborate system for rewriting
was introduced into sendmail. This powerful rewrite engine is still present in modern versions
Email (electronic mail) is a way to send and receive messages across the Internet. It's similar
to traditional mail, but it also has some key differences. To get a better idea of what email is
all about, take a look at the infographic below and consider how you might benefit from its
These main architectural components for an email infrastructure. These components are
1. Mail Address: The oldest mail address format was the one used in ARPANET, which
was later also used in BITNET, being user@host. Again, this presupposes a flat
namespace, where every host throughout ARPANET had a unique name. In the
beginning that was reasonable, but with the explosive growth of the Internet no longer
2. Mail Protocol: Email became a firstclass citizen only after the specification of SMTP
in august 1982 in RFC 821. This protocol is used for mail transport. Later on
protocols like POP 2 and IMAP 3 were introduced to facilitate a network based
interaction with mail readers. SMTP was indeed a very simple protocol intended for
mail transport. It lacked some of the more advanced features of the X.400 message
Traditionally mailboxes were accessed by a user using a mail reader that opened the
user’s mailbox as a local file. Later mechanisms were introduced to be able to access
a mailbox stored on a server using a mail reader that accesses it over the network.
Several versions of the ‘Post Office Protocol (POP) have been defined. It is mostly
used to transfer complete messages from a server to a client to be read and reacted
3. Mail User Agent: The task of the mail user agent is to present an interface to the
user for reading, composing and replying to email. In order to read mail, a MUA can
either access mail on a local or remote store via the filesystem or contact a mail access
4. Mail Message Format: A companion document to RFC 2821 on SMTP is RFC 2822,
titled ‘Internet Message Format’ 6. In this specification the format of the actual
message itself, which is transferred during the SMTP DATA phase, is defined. The
empty line, followed by the message body. Lines consist of US-ASCII (1-127)
characters and are terminated by the combination CRLF of a carriage return followed
characters in order for the mail to be readable on 80 character wide terminal displays.
i. Productivity tools: Email is usually packaged with a calendar, address book, instant
ii. Access to web services: If you want to sign up for an account like Facebook or order
products from services like Amazon, you will need an email address so you can be
label, prioritize, find, group, and filter your emails for easy management. You can
iv. Privacy: Your email is delivered to your own personal and private account with a
v. Communication with multiple people: You can send an email to multiple people at
once, giving you the option to include as few as or as many people as you want in a
conversation.
vi. Accessible anywhere at any time: You don’t have to be at home to get your mail.
You can access it from any computer or mobile device that has an Internet connection
vii. Contacts basics: Online contacts lists help you organize contact information for your
friends, family, and coworkers, just like an address book. Once people are added to
your contacts list, it's easy to access their information anytime and anywhere
viii. Creating appointments: It's easy to schedule, track, and edit upcoming appointments
or events. When you create a new appointment, you should (at the very least) include
a title, start and end time, and location, but you can also include other information,
ix. Sharing calendars: You can share your calendar with anyone who uses the same
webmail provider. Once you've shared a calendar, you'll be able to view and even edit
x. Attachment: Attachments are an easy way to share files, photos, and more, but many
people aren't aware of some of the most common attachment mistakes. Be sure to
Email would definitely require the sender interface which contains some major components
i. Inbox The inbox is where you'll view and manage emails you receive. Emails are
listed with the name of the sender, the subject of the message, and the date received.
ii. Message pane When you select an email in the inbox, it will open in the Message
pane. From here, you can read the message and choose how to respond with a variety
of commands.
iii. Compose pane 1/3 You can click the Compose or New button from your inbox to
open the Compose pane to create your own email message. From here, you'll need to
enter the recipient's email address and a subject. You'll also have the option to upload
files (photos, documents, etc.) as attachments and add formatting to the message.
iv. Forward Whenever you want to share an email you've received, you can use the
Internet Explorer (IE) is a product from software giant Microsoft. This is the most commonly
sed browser in the universe. This was introduced in 1995 along with Windows 95 launch and
it has passed Netscape popularity in 1998. This browser is existing between the desktop and
mobile interface (We have desktop version of it and mobile version of it too).
In addition to email services, most webmail providers offer an online calendar and address
book. These features make it easy to stay organized and access your important information
from anywhere.
Online contacts list help you organize contact information for your friends, family, and co-
workers, just like an address book. Once people are added to your contacts list, it's easy to
i. Adding contacts: It's easy to add people to your contacts list. When you create a new
contact, you should (at the very least) enter a first and last name, as well as an email
address. However, you can also enter other information, like a phone number, home
ii. Selecting contacts: Once you've added people to your contacts list, you'll never have
to worry about remembering an email address. Whenever you create a new email, you
can select the To or Add Recipients button. Then choose recipients from your contacts
list. The contacts' email addresses will be added automatically to the message. You'll
even be able to use the same contact information for other webmail services, like
iii. Linking contacts: If you already have a lot of contacts saved in another web-based
service, such as Facebook or LinkedIn, it's easy to link them between accounts, which
can save you a lot of time. For example, you could import your Facebook contacts to
your webmail service or use your existing contacts list to search for friends on
iv. Contact groups: If you frequently connect with the same group of people, you can
create contact groups for quick access. This 3/6 allows you to quickly sort your
contacts by type. For example, you might use one group to organize your personal
Online calendars make it easy to schedule appointments, organize tasks, and manage your
time, just like a desk calendar. But unlike a physical calendar, online calendars give you
the freedom to quickly edit and rearrange your schedule whenever you want. You'll even
be able to access your calendar on the go and sync it across multiple devices, like your
mobile phone and personal computer. Services render from online Calendar
appointments or events. When you create a new appointment, you should (at the
very least) include a title, start and end time, and location, but you can also
include other information, such as reminder preferences, detailed notes, and more.
ii. Switching views: You can choose a variety of view options for your calendar,
iii. Using multiple calendars: If you keep a lot of different appointments, you can
create multiple calendars to help organize your schedules. For example, you might
use one calendar to keep track of your personal tasks and another to manage your
family's schedule. Each calendar is assigned its own color, so it's easy to organize
lots of different appointments. You can even toggle calendars on and off to easily
iv. Sharing calendars: You can share your calendar with anyone who uses the same
webmail provider. Once you've shared a calendar, you'll be able to view and even
i. Spam: Spam is another term for junk email or unwanted email advertisements. It's
best to ignore or delete these messages. Luckily, most email services offer some
protection, including spam filtering. Cheap and easy to send this spam may be, but it
ii. Phishing: Certain emails pretend to be from a bank or trusted source in order to steal
your personal information. It's easy for someone to create an email that looks like it's
response. Phishing scams are messages that try to trick you into providing sensitive
information. These often appear to come from a bank or another trusted source, and
they'll usually want you to re-enter a password, verify a birth date, or confirm a credit
card number.
iii. Worms: Poor security design in popular email clients added fuel to this fire. As a
result, hordes of infected systems are used for any purpose, including spam
when the user tries to view the attachment using an insecure mail program. Typically,
the worm plunders the user’s address book, spreads itself – often using entries from
that address book as sender address – and makes modifications to the running system
iv. Spoofing and Send Authenticity: Based upon the assumption that the spam problem
is caused by a lack of accountability, a few mechanisms have been proposed that are
(SPF) and Sender ID, it is also assumed that there is a strong relation between the
network address of the system from which a message originates and the (domain part
v. Filtering: Filtering can be invasive, and when applied naively prove counter-
effective. For example, a virus scanner may refuse encrypted mail messages. On the
one hand, that may be a good thing. Nothing goes through unless checked. On the
other hand, this policy may unintentionally give rise to the dissemination of
vi. Logo Fraud: It's easy to make a copy of any logo. This one looks identical to Bank of
America's official logo, but it doesn't make it any more authentic. Other common
5.0 CONCLUSION
people using electronic devices. Email was thus conceived as the electronic (digital) version
of, or counterpart to, mail, at a time when "mail" meant only physical mail (hence e- + mail).
Architectural Component of Email are addresses, protocols, agents and message formats
REFERENCES
Abraham C. (2020), “Getting Started with Email”, gcflearnfree International, Retrieved from
Communications/Peterborough Incorporated
Jeoreon Scheender (2017): “Email”, TUNIX Internet Security & Opleidingen, Nijmegen,
Richter, Bernd (2016). "UdiWWW: Coming soon". University of Ulm. Archived from the
Vetter R. J. (2014). "Mosaic and the World-Wide Web" (PDF). North Dakota State
University. Archived from the original (PDF) on 24 August 2014. Retrieved 10 October
2021.