We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAngel Coverdale
Modified over 2 years ago
Copyright © 2004, Tim Moors Email dependability Tim Moors School of Electrical Engineering and Telecom. University of New South Wales Sydney, NSW, Australia http://www.eet.unsw.edu.au/~timm UNSW
Copyright © 2004, Tim Moors 2 Importance of email >0.5B users of business email worldwide 1 Tens of billions of messages sent daily (60B, 30%+ spam, by 2006) 1 Top message sources 2 : 300M/day: Yahoo >100M messages/day: 13+ service providers Comparable systems: Australia Post 3 : 5B items p.a. Reliability is required by law, and audited. For domestic letters: 96.5% on time or early 98.9% less than one day late. What about the remaining 1.1%?! Short Message Service (SMS): Typical day for an Australian telco SMS Center 4 : 1.2M messages delivered (0.5M after temporary failure), 10k (1%) abandoned 7.5% of SMS messages lost between carriers in US in Dec. 2002 5 How reliable are email systems? 1. IDC: Worldwide Email Usage Forecast, 2003-2007 2. www.senderbase.org Image from www.gbod.org 3. Australia Post: Annual Report, 2003 4. Personal communication 5. Keynote Study of Wireless Text Messaging, 2003
Copyright © 2004, Tim Moors 3 Outline Importance of email Email features affecting dependability Asynchrony Indirection Email outcomes Positive / negative Difficulties with notifications Contributing factors Degeneration of email Sources of errors Measurement study Tools for enhancing dependability
Copyright © 2004, Tim Moors 4 Email features 1: Asynchronous Available? Available? Time SYN SYN+ACK ACK 220: [welcome] DATA msg 250: Message OK QUIT ACK FIN ACK SMTPPOP email@example.com@cheap.com TCP SMTP Available? Dependable?
Copyright © 2004, Tim Moors 5 Consequences of asynchrony Mail servers are entrusted with responsibility to forward messages. “the protocol requires that a server accept responsibility for either delivering a message or properly reporting the failure to do so.” [RFC 2822] Nothing protects against server failure, e.g. crashing or overload. Server can lose messages. End-users can’t determine the trustworthiness of a remote server. Mail servers may persist in attempting to deliver messages Persistence is unpredictable since it varies with the server e.g. Sendmail warns after 4 hours and persists for 5 days Server persistence may delay source awareness of problems Failure notifications may be tardy, e.g. 1 month!
Copyright © 2004, Tim Moors 6 Email features 2: Indirection An email address indicates where a message will go next. The message may then be forwarded elsewhere. e.g. aliases (firstname.lastname@example.org email@example.com) mail that is redirected (firstname.lastname@example.org@eg.com) mail to a mailing list A sender may be oblivious to identity of ultimate recipient(s). If a sender expects a delivery notification, then who does it expect it from? Notification from next address doesn’t imply message has reached ultimate destination(s) and had desired impact. Receiver’s delivery concerns extend beyond those of the source. Need receiver-oriented mechanisms as well as source-oriented mechanisms. POP email@example.com@cheap.com
Copyright © 2004, Tim Moors 7 Spectrum of possible email outcomes Action Acknowledgement No loss Delay = quality DeliveredNot delivered But still trying Parties are aware Sender Receiver(s) Silent discard None Extensive delay From: Mail Delivery Subsystem Subject: Warning: could not send message for past 4 hours The original message was received at... from foo.com ----- The following addresses had transient non-fatal errors ----- Transcript of session follows -----... Deferred: Connection reset by example.com. Warning: message still undelivered after 4 hours Will keep trying until message is 5 days old From: Mail Delivery Subsystem Subject: Returned mail: see transcript for details The original message was received at... from foo.com ----- The following addresses had permanent fatal errors ----- ----- Transcript of session follows ----- 550 5.1.2... Host unknown...
Copyright © 2004, Tim Moors 8 Notification challenges Events of interest: delivery (Delivery Service Notifications – RFC 3461-4) disposition (Message Disposition Notifications – RFC 3798) aka “read receipts” “acknowledgements” etc Notifications may be positive, negative, or missing Challenges: Notification may come from intermediary, not end-system. End-system disposition is what matters, but impinges on privacy. What does “received” mean? Downloaded, skim read, acted on? Notifications are not delivered reliably Lack of notification proves nothing. Scalability: Source can be inundated with positive notifications from many mailing list recipients
Copyright © 2004, Tim Moors 9 Degeneration of email Malicious worms and nefarious spammers cause: Discard of messages by filters. False detection rate is: Low for virus/worm filters Substantial for spam filters, particularly when applied to commercial messages by overflow of storage systems: Spam/worms fills mailboxes/servers and blocks legitimate email Users ignore failure notifications Users get flooded with failure notifications about messages they didn’t send. Forged notifications: Sent by worms (spammers next?) to entice users to open infected messages. e.g. by Netsky, Evaman, Klez, Mydoom Genuine notifications in response to forged messages: Spammers and worms harvest addresses and use them to send forged email. Users receive non-delivery notifications. Appropriate client software could filter out unsolicited notifications.
Copyright © 2004, Tim Moors 10 Sources of errors 1.Misaddressing by source e.g. firstname.lastname@example.org vs email@example.com 2.Improper sending by source e.g. stuck in drafts folder 3.Discard by servers, e.g. due to storage overflow crashes buggy implementation... 4.Filtering of spam/viruses (Of particular concern for messages with commercial content.) 5.Incorrect download e.g. inadvertent deletion Our initial focus
Copyright © 2004, Tim Moors 11 Email measurements † Periodically send innocuous probe messages to accounts with several mail providers: 2 large portals (Yahoo, Hotmail) 2 ISPs (Bigpond, Optusnet) 2 universities 12 free mail providers Each probe includes a sequence number and time stamps enabling measurement of loss/duplication and delay. Each provider lost some messages during the experiment. Overall, 1.57% lost, about 0.5% lost silently Loss rate as high as 10% over a month for one provider. Received: from x.com by y.edu for ; Wed, 18 Aug 2004 22:14:07 +1000 (EST) Received:... Date: Wed, 18 Aug 2004 08:14:00 -0400 (EDT) From: Tim Moors To: A@B Subject: 4638 Wed Aug 18 08:14:00 EDT 2004 † Work done with Anthony Lang, 4 th year engineering student
Copyright © 2004, Tim Moors 12 6 months of measurements Hour Day Loss: 3 silent (650ppm) + 15 notified (0.3%) 59 delay warnings (1.3%), 3 duplicates (650ppm) (4630 messages in total) 10 100 1k 0.1M 10k 1M
Copyright © 2004, Tim Moors 13 Delay of all messages 92% of all messages delayed < 30 sec Hour Day 10 100 1k 0.1M 10k 1M Email feature 3: Source usually can’t measure performance (delay) because of lack of feedback
Copyright © 2004, Tim Moors 14 Our work 1: Measure and store Measurement of: email delays, loss, duplication server availability reliability need for asynchronous protocols prevalence of servers with alternate MX records Massive (TB) storage systems (e.g. for email) based on peer-to-peer “file sharing” technology (robust and growable)
Copyright © 2004, Tim Moors 15 Our work 2: Client add-ins New tools to help users cope with unreliability Implemented as mail client add-ins and proxies Assuming we can’t change the world of mail servers overnight. At sources: Automatically retransmit mail to backup accounts in case primary account fails (effectively X.400 “alternate recipients”) Match incoming to outgoing email Highlight outgoing mail that hasn’t been responded to ?=? lost (Using Message-IDs and In-Reply-To: fields) Filter out notifications regarding messages client did not send SMTP traceroute: Allow a source to determine which servers a message passes through, suggesting possible failure points At destinations: Trails of message meta-information (e.g. time, source/destination) in case of accidental message deletion Sequence numbers to detect loss, particularly for mailing lists Real-time monitoring and notification of transfer delays
Copyright © 2004, Tim Moors 16 Conclusions Email does get lost. Sometimes (0.1%?) silently. Store-and-forward email (even with notifications) fundamentally can’t guarantee delivery. New tools can enable end-users to cope with unreliability. For more information, see http://uluru.ee.unsw.edu.au/~tim/dependable/email or try your luck emailing firstname.lastname@example.org We’re looking for collaborators.
Basic Communication on the Internet:
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Lesson 7: Business, , & Personal Information Management
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Silicon & Software Systems (S3) Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
CCNA – Network Fundamentals
Chapter 30 Electronic Mail Representation & Transfer
6.1. Transport Control Protocol (TCP) It is the most widely used transport protocol in the world. Provides reliable end to end connection between two hosts.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
(or ?) Short for Electronic Mail The transmission of messages over networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
© 2017 SlidePlayer.com Inc. All rights reserved.