Open Course Module3
Open Course Module3
URL
URL is the character string (address) which is used to access data from the
internet. The URL is the type of URI (Uniform Resource Identifier).
Syntax of URL:
protocol://hostname/filename
( A protocol is the standard set of rules that are used to allow electronic devices to
communicate with each other.”
Protocol name
Example:
2
E-Mail Address
Each user of email is assigned a unique name for his email account. This
name is known as E-mail address. Different users can send and receive messages
according to the e-mail address.
The username and the domain name are separated by @ (at) symbol.
E-mail addresses are not case sensitive.
Spaces are not allowed in e-mail address.
E-mail Header
The first five lines of an E-mail message is called E-mail header. The header part
comprises of following fields:
From
Date
To
Subject
CC
BCC
From
The From field indicates the sender’s address i.e. who sent the e-mail.
Date
The Date field indicates the date when the e-mail was sent.
4
To
The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject
The Subject field indicates the purpose of e-mail. It should be precise.
CC
CC stands for Carbon copy. Recipient’s email address is entered in CC
field.Email is sent with visible CC recipient addresses. CC recipients receive
email, but are not expected to respond.
BCC
BCC stands for Blind Carbon Copy. Recipient’s email address is entered in BCC
field.Email is sent without displaying BCC recipient’s address.
BCC recipient receives email without seeing other recipients.
Greeting
Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.
Text
Signature
This is the final part of an e-mail message. It includes Name of Sender, Address,
and Contact Number.
Advantages
Reliable
Many of the mail systems notify the sender if e-mail message was undeliverable.
Convenience
There is no requirement of stationary and stamps. One does not have to go to post
office. But all these things are not required for sending or receiving an mail.
Speed
E-mail is very fast. However, the speed also depends upon the underlying network.
Inexpensive
Printable
Global
E-mail can be sent and received by a person sitting across the globe.
Generality
Disadvantages
Apart from several benefits of E-mail, there also exists some disadvantages as
discussed below:
Forgery
Overload
Misdirection
Junk
No response
6
Forgery
E-mail doesn’t prevent from forgery, that is, someone impersonating the sender,
since sender is usually not authenticated in any way.
Overload
Misdirection
Junk
Junk emails are undesirable and inappropriate emails. Junk emails are sometimes
referred to as spam.
No Response
It may be frustrating when the recipient does not read the e-mail and respond on a
regular basis.
7
E-mail System
Mailer
Mail Server
Mailbox
Mailer
Mail Server
The function of mail server is to receive, store and deliver the email. It is
must for mail servers to be Running all the time because if it crashes or is down,
email can be lost.
Mailboxes
8
Working of E-mail
Email working follows the client server approach. In this client is the mailer
i.e. the mail application or mail program and server is a device that manages
emails.
Following example will take you through the basic steps involved in sending
and receiving emails and will give you a better understanding of working of email
system:
E-mail Protocols are set of rules that help the client to properly transmit the
information to or from the mail server. Here in this tutorial, we will discuss various
protocols such as SMTP, POP, and IMAP.
SMTP
SMTP stands for Simple Mail Transfer Protocol. It was first proposed in
1982. It is a standard protocol used for sending e-mail efficiently and reliably over
the internet.
9
Key Points:
SMTP is application level protocol.
SMTP is connection oriented protocol.
SMTP is text based protocol.
It handles exchange of messages between e-mail servers over TCP/IP
network.
Apart from transferring e-mail, SMPT also provides notification regarding
incoming mail.
When you send e-mail, your e-mail client sends it to your e-mail server
which further contacts the recipient mail server using SMTP client.
These SMTP commands specify the sender’s and receiver’s e-mail address,
along with the message to be send.
The exchange of commands between servers is carried out without
intervention of any user.
In case, message cannot be delivered, an error report is sent to the sender
which makes SMTP a reliable protocol.
IMAP
IMAP stands for Internet Message Access Protocol. It was first proposed in
1986. There exist five versions of IMAP as follows:
1. Original IMAP
2. IMAP2
3. IMAP3
4. IMAP2bis
5. IMAP4
Key Points:
IMAP allows the client program to manipulate the e-mail message on the
server without downloading them on the local computer.
The e-mail is hold and maintained by the remote server.
It enables us to take any action such as downloading, delete the mail without
reading the mail.It enables us to create, manipulate and delete remote
message folders called mail boxes.
IMAP enables the users to search the e-mails.
It allows concurrent access to multiple mailboxes on multiple mail servers.
POP
10
POP stands for Post Office Protocol. It is generally used to support a single
client. There are several versions of POP but the POP 3 is the current standard.
Key Points
POP is an application layer internet standard protocol.
Since POP supports offline access to the messages, thus requires less
internet usage time.
POP does not allow search facility.
In order to access the messaged, it is necessary to download them.
It allows only one mailbox to be created on server.
It is not suitable for accessing non mail data.
POP commands are generally abbreviated into codes of three or four letters.
Eg. STAT.
S.N
POP IMAP
.
Generally used to Designed to handle
1
support single client. multiple clients.
Messages are
accessed online
Messages are
2 although it also
accessed offline.
supports offline
mode.
POP does not allow It offers ability to
3
search facility. search emails.
It allows selective
All the messages
transfer of
4 have to be
messages to the
downloaded.
client.
Multiple
Only one mailbox
mailboxes can be
5 can be created on the
created on the
server.
server.
11
Suitable for
Not suitable for
accessing non-mail
6 accessing non-mail
data i.e.
data.
attachment.
POP commands are IMAP commands
generally abbreviated are not
7 into codes of three or abbreviated, they
four letters. Eg. are full. Eg.
STAT. STATUS.
It requires minimum Clients are totally
8 use of server dependent on
resources. server.
Mails once
Allows mails to be
downloaded cannot
9 accessed from
be accessed from
multiple locations.
some other location.
Users can view the
The e-mails are not headings and
10 downloaded sender of e-mails
automatically. and then decide to
download.
IMAP requires
POP requires less
10 more internet
internet usage time.
usage time.
The Open Systems Interconnection (OSI) model describes seven layers that
computer systems use to communicate over a network. OSI was introduced in 1983
by representatives of the major computer and telecom companies, and was adopted
by ISO as an international standard in 1984.
We’ll describe OSI layers “top down” from the application layer that directly
serves the end user, down to the physical layer.
7. Application Layer
The application layer is used by end-user software such as web browsers and
email clients. It provides protocols that allow software to send and receive
information and present meaningful data to users. A few examples of application
layer protocols are the Hypertext Transfer Protocol (HTTP), File Transfer Protocol
(FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and
Domain Name System (DNS).
13
6. Presentation Layer
The presentation layer prepares data for the application layer. It defines how
two devices should encode, encrypt, and compress data so it is received correctly
on the other end. The presentation layer takes any data transmitted by the
application layer and prepares it for transmission over the session layer.
5. Session Layer
4. Transport Layer
The transport layer takes data transferred in the session layer and breaks it
into “segments” on the transmitting end. It is responsible for reassembling the
segments on the receiving end, turning it back into data that can be used by the
session layer. The transport layer carries out flow control, sending data at a rate
that matches the connection speed of the receiving device, and error control,
checking if data was received incorrectly and if not, requesting it again.
3. Network Layer
The network layer has two main functions. One is breaking up segments into
network packets, and reassembling the packets on the receiving end. The other is
routing packets by discovering the best path across a physical network. The
network layer uses network addresses (typically Internet Protocol addresses) to
route packets to a destination node.
The data link layer establishes and terminates a connection between two
physically-connected nodes on a network. It breaks up packets into frames and
sends them from source to destination.
14
1. Physical Layer
The OSI model helps network device manufacturers and networking software
vendors:
Create devices and software that can communicate with products from any other
vendor, allowing open interoperability
Define which parts of the network their products should work with.
Communicate to users at which network layers their product operates – for
example, only at the application layer, or across the stack.
Slack
Skype
Google Meet and Google Chat
Microsoft Teams
Internet Relay Chat
Discord
Chat rooms vs. video conferencing software
Chat rooms and chat applications are typically used for one-on-one or small-
group communication, while video conferencing software is designed for more
formal meetings with multiple participants.
Some software offers both video conferencing and chat options, such as
Skype and Microsoft Teams.
To use a chat room, users must create an account with the online platform
and log in. Sometimes, users may also be prompted to download a
software client to facilitate the use of the chat room. They can then join chat rooms
or chat with other members who are currently logged in.
16
Chat room conversations take place in a chat box, which is visible to all
participants. Many chat rooms provide features such as private messaging, chat
rooms specific to certain interests and topics, or the ability to customize chat room
colors or backgrounds.
Site hosts typically post an FAQ list to guide users to appropriate chat room
behavior, such as introducing yourself when you enter a room, making it clear
when you are directing a question or response to a specific user, and reporting
disruptive users.
Chat room etiquette requires users to be respectful of one another, even when
discussing controversial topics.
With a few simple rules of etiquette, chat rooms can be safe spaces that connect
people.
Below mentioned are some of the features that make the TCP/IP model stand out
in the network concepts:
The TCP/IP model is among one of the most important network concepts that
contributed to the working of ARPANET.
The TCP/IP model comprises four layers: the network access layer, the internet
layer, the transport layer, and the application layer (going from bottom to top).
The network model is implemented during network and communication-related
issues.
Communication between different modes of network devices is possible through
the application of various layers.
The layers in the model provide maintenance of communication channels, flow
control, and reliability check format, among other applications in the form of
protocols.
18
Application layer
Transport layer
Internet layer
Network Access layer
Each layer performs a specific task on the data that is being transmitted over the
network channel, and data moves from one layer to another in a preset pattern as
mentioned below:
The above model represents the flow of data when it is being transmitted from the
sender side. In the case of data being received, the layers of the model work in
reverse order.
19
1. Application Layer
This is the topmost layer which indicates the applications and programs that utilize
the TCP/IP model for communicating with the user through applications and
various tasks performed by the layer, including data representation for the
applications executed by the user and forwards it to the transport layer.
2. Transport Layer
This layer is responsible for establishing the connection between the sender
and the receiver device and also performs the task of dividing the data from
the application layer into packets, which are then used to create sequences.
It also performs the task of maintaining the data, i.e., to be transmitted
without error, and controls the data flow rate over the communication
channel for smooth transmission of data.
3. Internet Layer
The Internet layer performs the task of controlling the transmission of the
data over the network modes and enacts protocols related to the various steps
related to the transmission of data over the channel, which is in the form of packets
sent by the previous layer.