WXET1143 Lecture7: Email, Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.

Slides:



Advertisements
Similar presentations
Kalpesh Vyas & Seward Khem
Advertisements

Basic Communication on the Internet:
® Microsoft Office 2010 Browser and Basics.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Introduction to Your Name Goes Here
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
Internet…issues Managing the Internet
Remote mailbox access gateway Software lab project.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Chapter 30 Electronic Mail Representation & Transfer
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
1 What is Electronic Mail Exchanging information via computer networks Electronic mail addresses SMTP (Simple Mail Transfer Protocol) Client/Server based.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
(2) C OMPUTER AND I NTERNET T ECHNICAL J ARGON. (2)C OMPUTER AND I NTERNET T ECHNICAL T ERMS (J ARGONS ) access : connection to the Internet account:
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
DATA COMMUNICATION DONE BY: ALVIN SAMPATH CARLVIN SAMPATH.
© Anthony J. Nowakowski, Ph.D. Communications © Anthony J. Nowakowski, Ph.D. EDC 601 Instructional Technologies .
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Simple Mail Transfer Protocol (SMTP)
Internet Application. understanding Addresses Routing of Instant Messaging Collaborative Computing Grid Social networking Forums Societies.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
(or ?) Short for Electronic Mail The transmission of messages over networks.
CS101 Introduction to Computing Lecture 7 Internet Services.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
WXET1143 Lecture5: Internet: How it Works? (Continuation)
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
Introduction to Student Name Student Class.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
XP Browser and Basics COM111 Introduction to Computer Applications.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
A SSIGNMENT #3 Com tech. ANSL HTML Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
(class #2) CLICK TO CONTINUE done by T Batchelor.
Using Using Computers Safely, Effectively and Responsibly.
Internet Business Associate v2.0
How Works Ameera Al Ghamdi ID:
Introduction to Computers
Introduction to Your Name Goes Here
Introduction to Computers
CHAPTER 2 Application Layer.
Introduction to Justin R. Scott CIS Introduction to .
Introduction to Your Name Goes Here
How Works Ameera Al Ghamdi ID:
Chapter 7 Network Applications
The Internet and Electronic mail
Presentation transcript:

WXET1143 Lecture7: , Chat and Messaging

Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use more than the telephone to communicate with their colleagues.  has been around since the Internet was formed but was first popular only on LAN.

Internet  Uses two main standard: Simple Mail Transfer Protocol (SMTP)  To send messages Post Office Protocol  To receive messages  These standards are universal.  Can run on a variety of incompatible computers and operating system.

 AOL (American Online) doesn’t use SMTP or POP  Uses its own propriety protocols to send and receive s  AOL users can communicate with people outside of AOL is because it uses gateway software that translates between different protocols.

Multipurpose Internet Mail Extension (MIME)  Body of now can accommodate graphics, sound, documents and video.  You can add it either in the body or attach it.  When you enclose a file, your software encodes it and turns all multimedia data into ASCII.  The receiving end will then turn the ASCII into meaningful data.  MIME is one of the encoding scheme used.

Junk mail  Spam or junk mail is another set of standard that enables communication which can also annoy the other party.  Electronic mailing lists automatically sends messages to a large number of users.  Can be done on a one-time basis or a regular schedule.  Mail reflector: A server that distributes mails to member of the mailing list.  List server: Individuals send messages to subscribe or unsubscribe to a mailing list.

File sharing  A file sharing program user logs on to a file-sharing server.  The client software sends the server a list of files in the user’s library.  Other users can then search and download the file.  When a user searches for music, the host filters the new list to remove any song titles that match lists of copyrighted songs supplied by record companies.  Then the host posts the list in a database where other users can search it.

 Another client enters a search term.  This can be a song title, artist’s name or anything else relevant to a song.  The client looks at all the library records in the server.  Displays the title that matches at least some of the search criteria.  The results include the name of the file, type of internet connection, the IP address of the client that makes the file available and so on.

 The user selects one or more of the files for transfer.  His client software sends a message to the other client using its IP address.  The message asks permission to download the song.  The remote client obliges by becoming a server and sending the file to the computer that requested it.  At the same time someone is downloading a file, other users are finding songs on the person’s hardisk and downloading them.  Downloads/Uploads can be done simultaneously by taking turns sharing the Internet connection.

Sending  Using an client software, Jane creates a message to go to Bob.  She attaches an image of herself which is encoded using MIME.  The encoding turns the data into ASCII text.  The software might also compress the enclosure before attaching it so that the message takes less time to send.

 The client software contacts the ISP’s computer server over a modem or network connection.  The client software connects to a software called the SMTP server.  The server acknowledges that it has been contacted.  The client tells the server that it has a message to be sent to a certain address.  SMTP replies with a message either saying “Send it now” or “Too busy, send it later”

 Client sends the message to the SMTP and asks for confirmation.  Server confirms that it has received the message.  SMTP server asks another software, a domain name server, how to route the message.  The server looks up the domain name to locate the recipient’s server.  The domain name server tells the SMTP the best path for the message.

 After the SMTP sends the message, the mail travels through various Internet routers.  Routers decide which electronic pathway to send the along based on how busy the routes are.  The message also passes through one or more gateways.  Gateways: translates data from one type of computer system such as Windows to the type of computer system that’s the next pass-through point on the route.

 When arrives at Bob’s SMTP server, the server transfers the message to another server called a POP (Post Office Protocol).  POP holds the message until Bob asks for it.  Using his client, Bob logs on to the POP server with a username and password and then asks the server to check for mail.

 The POP server retrieves Jane’s stored message and transmits it to Bob’s client software.  Some software decodes and decompresses any enclosures.  So now Bob can read Jane’s message and see what it looks like.

Chat rooms  Chats are held in a chat room, a virtual room that’s really software running on an Internet server.  The chat software is designed to let several computer users, all online at the same time, type messages that are seen simultaneously by all the other chatters.

 To join a chat, you must first run a chat client software.  The first time you use a chat program, you need to set up a screen name.  People usually pick something that reflects them or even maybe their alter-ego.  After you log in under your screen name, you choose the room you want to enter.  Rooms usually have names devoted to a particular subject of interest.

 When room is selected, the chat server associates you with the path you took to it so that it will recognize any other messages from you.  It then adds your screen name to a lost of other people who are already in the room.  It then send a line of text that appears on the screen of everyone in the room to announce that you have joined them.

 Then everything you type will be sent to the server.  The server adds your screen name to the words you type so other will know it’s you talking.  This message is then sent out to the computers of everyone that is logged on in the chat room.  They see everything you write and also vice-versa.

Instant messaging  Chat rooms are for public use, instant messaging are a more private way to communicate.  It lets you and a selected friend write messages that appear instantly on the screen.  To use instant messaging, you must sign up with one of the instant messaging service (AIM, MSN, Yahoo, etc…).  Then you can create a buddy list of your contacts.

 Once installed, whenever you log onto the message service, the software running on your computer send both your handle (ID) and buddy list to a central computer.  This central computer (or messaging server) takes care of thousands of users simultaneously.  The message server adds your name to a list of people who are online. It also compares your buddy list with the handles of people online.  This way you will know which of your buddies are also online.