0% found this document useful (0 votes)
7 views

Email

email marketing strategy

Uploaded by

oluwoleayomide00
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Email

email marketing strategy

Uploaded by

oluwoleayomide00
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

FEDERAL POLYTECHNNIC ILE-OLUJI, ONDO STATE

DEPARTMENT OF COMPUTER SCIENCE

SEMINAR TOPIC: ELECTRONIC MAIL

PRESENTER:

ADEOBA STEPHEN OLUWAPELUMI

FPI/CSC/20/1-002

SUBMITTED TO:
DR. EGWUCHE S. O.

COURSE CODE: COM 222

COURSE TITLE: SEMINAR ON THE IMPORTANCE OF COMPUTER

AND THE SOCIETY


1.0 INTRODUCTION

Communication doesn’t belong solely to the human species. Still, human communication is

the most important feature that distinguishes humans from other living species. However,

only the human being demonstrates a need for speech respectively verbal communication.

Finally, with the discovery of computers and simultaneous development of computer sciences

and technical possibilities, communication has become a segment of web and global

networking of all levels: private and professionals. The Internet has revolutionized the

computer and communications world like nothing before. The invention of the telegraph,

telephone, radio, and computer set the stage for this unprecedented integration of capabilities.

This seminar is to focus on electronic mail (E-Mail); it’s history and usefulness.

2.0 BRIEF HISTORY OF ELECTRONIC MAIL

Contrary to popular belief, email did not arrive on the scene with the Internet. Email predates

the Internet, and even the ARPANET. The first email system, a messaging system for

multiple users on a single time-sharing mainframe system, MIT’s Compatible Time-Sharing

System, was deployed in 1965. Email message exchange between distinct computers by

means of a computer network started in 1971. Jeroeon (2017) already described a (probably

never implemented) email system, while Ray Tomlinson sent the first actual network email

message in late 1971. The vehicle for these early email exchanges was ARPANET where

messages piggybacked on the already available File Transfer Protocol (FTP). Email was not

yet a first-class-citizen, but it was a very powerful mechanism for communication. (Richter,

2016).

The early 1970’s saw the birth and procreation of Unix. As an asynchronous way of loosely

interconnecting otherwise unconnected computers, the Unix to Unix Copy. We follow Knuth

in writing email instead of e-mail. Protocol (UUCP) was invented in 1978 at Bell Labs.
UUCP provides data exchange between computers on the basis of ad-hoc connectivity, such

as direct dial-up connections between computer systems. Based upon UUCP, store-and-

forward protocols for message exchange and message routing were designed and globally

implemented. This included not only (or even primarily) email messaging: UUCP’s first-class

citizen, one could say, was in fact not email, but Usenet News. This is the email and news as

we know them today, although both have long since transitioned to data transfer using

Internet transmission protocols rather than UUCP.

Similar to UUCP, the ‘Because It’s Time Network’ (BITNET) interconnected IBM

mainframes in academia, and similar store-and-forward message exchange services were

started on BITNET in 1981. Unlike UUCP, and much more like today’s Internet, the then

prevalent computer company Digital Equipment Corporation offered inter-computer network

connectivity for its own computers by the name of DECnet, which started in 1975. DECnet

included full message exchange and message routing facilities (Gaurav, 2019).

In the early 1980’s, the Internet mail infrastructure was created. Most important here were the

efforts made by Postel and colleagues in creating SMTP, the Simple Mail Transfer Protocol,

within the IETF. In 1982, while the ARPANET was still transitioning from the old NCP

protocol to TCP/IP, the first widespread implementation of mail over SMTP was

implemented by Eric Allman. Sendmail, the followup of delivermail, was shipped with 4.1c

BSD Unix, which promoted email to a first-class citizen on the then emerging TCP/IP-based

Internet. At that time, several message exchange networks existed already. In order to cope

with all these different networks and addressing systems, an elaborate system for rewriting

was introduced into sendmail. This powerful rewrite engine is still present in modern versions

of sendmail, although there is a tendency to replace it by tabledriven lookups in modern

MTA’s like postfix, qmail and the upcoming sendmail X.


3.0 CONCEPT OF ELECTRONIC MAIL

3.1 Definition of Electronic Mail

Email (electronic mail) is a way to send and receive messages across the Internet. It's similar

to traditional mail, but it also has some key differences. To get a better idea of what email is

all about, take a look at the infographic below and consider how you might benefit from its

use. (Guarav, 2019).

3.2 Architecture of Electronic Mail

These main architectural components for an email infrastructure. These components are

addresses, protocols, agents and message formats (Vetter, 2021).

1. Mail Address: The oldest mail address format was the one used in ARPANET, which

was later also used in BITNET, being user@host. Again, this presupposes a flat

namespace, where every host throughout ARPANET had a unique name. In the

beginning that was reasonable, but with the explosive growth of the Internet no longer

maintainable. Hence a new, hierarchical scheme was desperately needed

2. Mail Protocol: Email became a firstclass citizen only after the specification of SMTP

in august 1982 in RFC 821. This protocol is used for mail transport. Later on

protocols like POP 2 and IMAP 3 were introduced to facilitate a network based

interaction with mail readers. SMTP was indeed a very simple protocol intended for

mail transport. It lacked some of the more advanced features of the X.400 message

service. In the original specification only, a few commands were defined.

Traditionally mailboxes were accessed by a user using a mail reader that opened the

user’s mailbox as a local file. Later mechanisms were introduced to be able to access

a mailbox stored on a server using a mail reader that accesses it over the network.
Several versions of the ‘Post Office Protocol (POP) have been defined. It is mostly

used to transfer complete messages from a server to a client to be read and reacted

upon online or offline

3. Mail User Agent: The task of the mail user agent is to present an interface to the

user for reading, composing and replying to email. In order to read mail, a MUA can

either access mail on a local or remote store via the filesystem or contact a mail access

agent. Examples of MUA’s are Outlook, Thunderbird and Eudora (GUI-based) or

mutt and pine (terminal-based)

4. Mail Message Format: A companion document to RFC 2821 on SMTP is RFC 2822,

titled ‘Internet Message Format’ 6. In this specification the format of the actual

message itself, which is transferred during the SMTP DATA phase, is defined. The

first part of a message consists of a number of mail header lines, followed by an

empty line, followed by the message body. Lines consist of US-ASCII (1-127)

characters and are terminated by the combination CRLF of a carriage return followed

by a line feed, as is prescribed customary in text-oriented Internet protocols. Lines are

allowed to contain up to 998 characters, but it is good practice to limit lines to 78

characters in order for the mail to be readable on 80 character wide terminal displays.

3.3 Benefits of Electronic Mail

i. Productivity tools: Email is usually packaged with a calendar, address book, instant

messaging, and more for convenience and productivity.

ii. Access to web services: If you want to sign up for an account like Facebook or order

products from services like Amazon, you will need an email address so you can be

safely identified and contacted.


iii. Easy mail management: Email service providers have tools that allow you to file,

label, prioritize, find, group, and filter your emails for easy management. You can

even easily control spam, or junk email.

iv. Privacy: Your email is delivered to your own personal and private account with a

password required to access and view emails.

v. Communication with multiple people: You can send an email to multiple people at

once, giving you the option to include as few as or as many people as you want in a

conversation.

vi. Accessible anywhere at any time: You don’t have to be at home to get your mail.

You can access it from any computer or mobile device that has an Internet connection

vii. Contacts basics: Online contacts lists help you organize contact information for your

friends, family, and coworkers, just like an address book. Once people are added to

your contacts list, it's easy to access their information anytime and anywhere

viii. Creating appointments: It's easy to schedule, track, and edit upcoming appointments

or events. When you create a new appointment, you should (at the very least) include

a title, start and end time, and location, but you can also include other information,

such as reminder preferences, detailed notes, and more.

ix. Sharing calendars: You can share your calendar with anyone who uses the same

webmail provider. Once you've shared a calendar, you'll be able to view and even edit

a friend's calendar, depending on your sharing preferences

x. Attachment: Attachments are an easy way to share files, photos, and more, but many

people aren't aware of some of the most common attachment mistakes. Be sure to

follow these basic rules when including attachments in your emails.


4.0 FEATURES OF ELECTRONIC MAIL

4.1 Email Interface

Email would definitely require the sender interface which contains some major components

of sending email messages. These components are;

i. Inbox The inbox is where you'll view and manage emails you receive. Emails are

listed with the name of the sender, the subject of the message, and the date received.

ii. Message pane When you select an email in the inbox, it will open in the Message

pane. From here, you can read the message and choose how to respond with a variety

of commands.

iii. Compose pane 1/3 You can click the Compose or New button from your inbox to

open the Compose pane to create your own email message. From here, you'll need to

enter the recipient's email address and a subject. You'll also have the option to upload

files (photos, documents, etc.) as attachments and add formatting to the message.

iv. Forward Whenever you want to share an email you've received, you can use the

Forward command to send the message to another person.

Internet Explorer (IE) is a product from software giant Microsoft. This is the most commonly

sed browser in the universe. This was introduced in 1995 along with Windows 95 launch and

it has passed Netscape popularity in 1998. This browser is existing between the desktop and

mobile interface (We have desktop version of it and mobile version of it too).

4.2 Online Contact

In addition to email services, most webmail providers offer an online calendar and address

book. These features make it easy to stay organized and access your important information

from anywhere.
Online contacts list help you organize contact information for your friends, family, and co-

workers, just like an address book. Once people are added to your contacts list, it's easy to

access their information anytime and anywhere.

i. Adding contacts: It's easy to add people to your contacts list. When you create a new

contact, you should (at the very least) enter a first and last name, as well as an email

address. However, you can also enter other information, like a phone number, home

address, and more.

ii. Selecting contacts: Once you've added people to your contacts list, you'll never have

to worry about remembering an email address. Whenever you create a new email, you

can select the To or Add Recipients button. Then choose recipients from your contacts

list. The contacts' email addresses will be added automatically to the message. You'll

even be able to use the same contact information for other webmail services, like

instant messaging and calendar sharing

iii. Linking contacts: If you already have a lot of contacts saved in another web-based

service, such as Facebook or LinkedIn, it's easy to link them between accounts, which

can save you a lot of time. For example, you could import your Facebook contacts to

your webmail service or use your existing contacts list to search for friends on

Facebook

iv. Contact groups: If you frequently connect with the same group of people, you can

create contact groups for quick access. This 3/6 allows you to quickly sort your

contacts by type. For example, you might use one group to organize your personal

contacts and another for professional contacts

4.3 Online Calendar

Online calendars make it easy to schedule appointments, organize tasks, and manage your

time, just like a desk calendar. But unlike a physical calendar, online calendars give you
the freedom to quickly edit and rearrange your schedule whenever you want. You'll even

be able to access your calendar on the go and sync it across multiple devices, like your

mobile phone and personal computer. Services render from online Calendar

i. Creating appointments: It's easy to schedule, track, and edit upcoming

appointments or events. When you create a new appointment, you should (at the

very least) include a title, start and end time, and location, but you can also

include other information, such as reminder preferences, detailed notes, and more.

ii. Switching views: You can choose a variety of view options for your calendar,

including a daily, weekly, and monthly summary of your upcoming appointments.

iii. Using multiple calendars: If you keep a lot of different appointments, you can

create multiple calendars to help organize your schedules. For example, you might

use one calendar to keep track of your personal tasks and another to manage your

family's schedule. Each calendar is assigned its own color, so it's easy to organize

lots of different appointments. You can even toggle calendars on and off to easily

sort your appointments.

iv. Sharing calendars: You can share your calendar with anyone who uses the same

webmail provider. Once you've shared a calendar, you'll be able to view and even

edit a friend's calendar, depending on your sharing preferences.

4.4 Electronic Mail Abuse

This could be also considered the disadvantages of Electronic Mail

i. Spam: Spam is another term for junk email or unwanted email advertisements. It's

best to ignore or delete these messages. Luckily, most email services offer some

protection, including spam filtering. Cheap and easy to send this spam may be, but it

is a considerable nuisance to many. The frequent routine of deleting spam takes up


precious time, and the network capacity and storage space needed to handle the extra

resources taken by spam can also add up to non-negligible costs.

ii. Phishing: Certain emails pretend to be from a bank or trusted source in order to steal

your personal information. It's easy for someone to create an email that looks like it's

from a specific business. Be especially cautious of any emails requesting an urgent

response. Phishing scams are messages that try to trick you into providing sensitive

information. These often appear to come from a bank or another trusted source, and

they'll usually want you to re-enter a password, verify a birth date, or confirm a credit

card number.

iii. Worms: Poor security design in popular email clients added fuel to this fire. As a

result, hordes of infected systems are used for any purpose, including spam

propagation and propagation of messages containing ‘worms’. A mail worm is a

message that contains an attachment that is an executable program, which is executed

when the user tries to view the attachment using an insecure mail program. Typically,

the worm plunders the user’s address book, spreads itself – often using entries from

that address book as sender address – and makes modifications to the running system

that enable some or other remotely initiated operation.

iv. Spoofing and Send Authenticity: Based upon the assumption that the spam problem

is caused by a lack of accountability, a few mechanisms have been proposed that are

meant to provide a more reliable sender identification. Sender Policy Framework

(SPF) and Sender ID, it is also assumed that there is a strong relation between the

network address of the system from which a message originates and the (domain part

of the) sender mail address.

v. Filtering: Filtering can be invasive, and when applied naively prove counter-

effective. For example, a virus scanner may refuse encrypted mail messages. On the
one hand, that may be a good thing. Nothing goes through unless checked. On the

other hand, this policy may unintentionally give rise to the dissemination of

confidential information. If the only way to send information is to do it insecurely,

then people will be forced to do so.

vi. Logo Fraud: It's easy to make a copy of any logo. This one looks identical to Bank of

America's official logo, but it doesn't make it any more authentic. Other common

email

5.0 CONCLUSION

Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between

people using electronic devices. Email was thus conceived as the electronic (digital) version

of, or counterpart to, mail, at a time when "mail" meant only physical mail (hence e- + mail).

Architectural Component of Email are addresses, protocols, agents and message formats
REFERENCES

Abraham C. (2020), “Getting Started with Email”, gcflearnfree International, Retrieved from

gcflearnfree.org/print/email101/introduction-to-email on 1 November 2022.

Gaurav A. (2019): “An Analysis of Private Browsing Modes in Modern Browsers”,

Communications/Peterborough Incorporated

Jeoreon Scheender (2017): “Email”, TUNIX Internet Security & Opleidingen, Nijmegen,

October 2017, pg 14 -21 vol 1.

Richter, Bernd (2016). "UdiWWW: Coming soon". University of Ulm. Archived from the

original on 9 July 1997. Retrieved 8 October, 2021.

Vetter R. J. (2014). "Mosaic and the World-Wide Web" (PDF). North Dakota State

University. Archived from the original (PDF) on 24 August 2014. Retrieved 10 October

2021.

You might also like