TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 22 Simple Mail Transfer Protocol (SMTP)
Advertisements

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 22 World Wide Web and HTTP.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 The OSI Model and the TCP/IP.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Electronic Mail: SMTP, POP, and IMAP
The OSI Model and the TCP/IP Protocol Suite
Electronic Mail (SMTP, POP, IMAP, MIME)
1 What is Electronic Mail Exchanging information via computer networks Electronic mail addresses SMTP (Simple Mail Transfer Protocol) Client/Server based.
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
School of Electronics and Telecommunications 1/25 Presented by: Pham Van Chi Bui Thi The Ha Electronic Mail: SMTP.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
Simple Mail Transfer Protocol (SMTP)
The OSI Model and the TCP/IP Protocol Suite
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
File Transfer Protocol (FTP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BZUPAGES.COM 2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Electronic Mail: SMTP, POP IMAP, and MIME.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 22 World Wide Web and HTTP.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
Chapter 26 Standard Client-Server Protocols Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 26 Standard Client-Server Protocols
Networking Applications
Remote Logging, Electronic Mail, and File Transfer
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Security at the Application Layer: PGP and S/MIME
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 2 Network Models
Remote Logging, Electronic Mail,
Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
2.1 Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Presentation transcript:

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP, POP IMAP, and MIME

TCP/IP Protocol Suite 2OBJECTIVES:  To explain the architecture of electronic mail using four scenarios.  To explain the user agent (UA), services provided by it, and two types of user agents.  To explain the mechanism of sending and receiving s.  To introduce the role of a message transfer agent and Simple Mail  Transfer Protocol (SMTP) as the formal protocol that handles MTA.  To explain transfer phases.  To discuss two message access agents (MAAs): POP and IMAP.

TCP/IP Protocol Suite 3 OBJECTIVES (continued):  To discuss MIME as a set of software functions that transforms non-ASCII data to ASCII data and vice versa.  To discuss the idea of Web-based .  To explain the security of the system.

TCP/IP Protocol Suite 4 Chapter Outline 23.1 Architecture 23.2 User Agent 23.3 Message Transfer Agent 23.4 Message Access Agent 23.5 MIME 23.6 Web-Based Mail 23.7 Electronic Mail Security

TCP/IP Protocol Suite ARCHITECTURE To explain the architecture of , we give four scenarios. We begin with the simplest situation and add complexity as we proceed. The fourth scenario is the most common in the exchange of .

TCP/IP Protocol Suite 6 Topics Discussed in the Section First Scenario Second Scenario Third Scenario Fourth Scenario

TCP/IP Protocol Suite 7 Figure 23.1 First scenario

TCP/IP Protocol Suite 8 When the sender and the receiver of an are on the same mail server, we need only two user agents. Note

TCP/IP Protocol Suite 9 Figure 23.2 Second scenario

TCP/IP Protocol Suite 10 When the sender and the receiver of an are on different mail servers, we need two UAs and a pair of MTAs (client and server). Note

TCP/IP Protocol Suite 11 Figure 23.3 Third scenario

TCP/IP Protocol Suite 12 When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). Note

TCP/IP Protocol Suite 13 Figure 23.4 Fourth scenario

TCP/IP Protocol Suite 14 When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair of MAAs (client and server). This is the most common situation today. Note

TCP/IP Protocol Suite 15 Figure 23.5 Push versus pull

TCP/IP Protocol Suite USER AGENT The first component of an electronic mail system is the user agent (UA). It provides service to the user to make the process of sending and receiving a message easier.

TCP/IP Protocol Suite 17 Topics Discussed in the Section Services Provided by a User Agent User Agent Types Sending Mail Receiving Mail Addresses Mailing List or Group List

TCP/IP Protocol Suite 18 Some examples of command-driven user agents are mail, pine, and elm. Note

TCP/IP Protocol Suite 19 Some examples of GUI-based user agents are Eudora, Outlook, And Netscape. Note

TCP/IP Protocol Suite 20 Figure 23.6 Format of an

TCP/IP Protocol Suite 21 Figure address

TCP/IP Protocol Suite MESSAGE TRANSFER AGENT The actual mail transfer is done through message transfer agents (MTAs). To send mail, a system must have the client MTA, and to receive mail, a system must have a server MTA. The formal protocol that defines the MTA client and server in the Internet is called Simple Mail Transfer Protocol (SMTP). As we said before, two pairs of MTA client-server programs are used in the most common situation (fourth scenario). Figure 23.8 shows the range of the SMTP protocol in this scenario.

TCP/IP Protocol Suite 23 Topics Discussed in the Section Commands and Responses Mail Transfer Phases

TCP/IP Protocol Suite 24 Figure 23.8 SMTP range

TCP/IP Protocol Suite 25 Figure 23.9 Commands and responses

TCP/IP Protocol Suite 26

TCP/IP Protocol Suite 27

TCP/IP Protocol Suite 28 Figure Connection establishment

TCP/IP Protocol Suite 29 Figure Message transfer

TCP/IP Protocol Suite 30 Figure Connection termination

TCP/IP Protocol Suite 31 Let us see how we can directly use SMTP to send an and simulate the commands and responses we described in this section. We use TELNET to log into port 25 (the well-known port for SMTP). We then use the commands directly to send an . In this example, is sending an to himself. The first few lines show TELNET trying to connect to the adelphia mail server. Example Example 23.1 After connection, we can type the SMTP commands and then receive the responses as shown below. We have shown the commands in black and the responses in color. Note that we have added for clarification some comment lines, designated by the “=” sign. These lines are not part of the procedure.

TCP/IP Protocol Suite 32 Example Example 19.1 Continued

TCP/IP Protocol Suite MESSAGE ACCESS AGENT The first and the second stages of mail delivery use SMTP. However, SMTP is not involved in the third stage because SMTP is a push protocol; it pushes the message from the client to the server. In other words, the direction of the bulk data (messages) is from the client to the server. On the other hand, the third stage needs a pull protocol; the client must pull messages from the server. The direction of the bulk data are from the server to the client. The third stage uses a message access agent.

TCP/IP Protocol Suite 34 Topics Discussed in the Section POP3 IMAP4

TCP/IP Protocol Suite 35 Figure Pop3 and IMAP4

TCP/IP Protocol Suite 36 Figure Pop3

TCP/IP Protocol Suite MIME Electronic mail has a simple structure. Its simplicity, however, comes with a price. It can send messages only in NVT 7-bit ASCII format. In other words, it has some limitations. Multipurpose Internet Mail Extensions (MIME) is a supplementary protocol that allows non- ASCII data to be sent through . MIME transforms non-ASCII data at the sender site to NVT ASCII data and delivers it to the client MTA to be sent through the Internet. The message at the receiving site is transformed back to the original data.

TCP/IP Protocol Suite 38 Topics Discussed in the Section MIME Headers

TCP/IP Protocol Suite 39 Figure MIME

TCP/IP Protocol Suite 40 Figure MIME header

TCP/IP Protocol Suite 41

TCP/IP Protocol Suite 42

TCP/IP Protocol Suite 43 Figure Base64

TCP/IP Protocol Suite 44

TCP/IP Protocol Suite 45 Figure Quoted printable

TCP/IP Protocol Suite WEB-BASED MAIL is such a common application that some websites today provide this service to anyone who accesses the site. Three common sites are Hotmail, Yahoo, and Google. The idea is very simple. Let us go through two cases:

TCP/IP Protocol Suite 47 Topics Discussed in the Section Case I Case II

TCP/IP Protocol Suite 48 Figure Web-based , case 1

TCP/IP Protocol Suite 49 Figure Web-based , case 2

TCP/IP Protocol Suite SECURITY The protocol discussed in this chapter does not provide any security provisions per se. However, e- mail exchanges can be secured using two application-layer securities designed in particular for systems. Two of these protocols, Pretty Good Privacy (PGP) and Secure MIME (SMIME) are discussed in Chapter 30 after we have discussed the basic network security.