© 2010 computer science faculty, kabul university electronice mail continued… 6 th lecture 9,...

13
© 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

Upload: gertrude-gibson

Post on 11-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

ELECTRONICE MAIL CONTINUED… 6TH

LECTURE

9, May, 2010 Baseer Ahmad Baheer

Page 2: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

The Received Message

• Indeed, the receiving server, appends a Received:

header line to the top of the message; this header line

specifies the name of the SMTP server that sent

• the message ("from"), the name of the SMTP server that

received the message ("by") and the time at which the

receiving server received the message.

Page 3: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

Page 4: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

• A single message sometimes has multiple Received: header lines

and a more complex Return-Path: header line. This is because a

message may be received by more than one SMTP server in the

path between sender and recipient.

Page 5: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

Mail Access Protocols

• There are currently two popular mail access

• protocols: POP3 (Post Office Protocol - Version 3) and IMAP

(Internet Mail Access Protocol).

• POP3 or IMAP are used to transfer mail from the recipient's mail

server to the recipient's user agent.

Page 6: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

POP3

Page 7: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

• POP3 Uses two different modes:

• Download and delete (cannot re-read email if he changes client)

• Download and Keep (copies of messages on different clients)

Page 8: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

Page 9: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

IMAP

• Keep all messages in one place: the server

• Allows user to organize messages in folders

Page 10: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

Page 11: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

1. telnet mailserver 143

2. <tag1> login <username> <password>

3. <tag2> select foldername

4. <tag3> fetch email number body[text]

5. <tag4> close

6. <tag5> logout

Page 12: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

Page 13: © 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer

© 2010 Computer Science Faculty, Kabul University

References