Unit 4
Unit 4
UNIT-5
MAIL SERVICES
Components of an Email:
1. Sender: The sender creates an email in which he records the information that
needs to be transferred to the receiver.
2. Receiver: The receiver gets the information sent by the sender via email.
3. Email address: An email address is just like a house address where the
communication arrives for the sender and receiver and they communicate with
each other.
4. Mailer: The mailer program contains allows the ability to read, write, manage
and delete the emails like Gmail, Outlook, etc.
5. Mail Server: The mail server is responsible for sending, receiving, managing,
and recording all the data proceeded by their respective mail programs and then
processing them to their respective users.
6. SMTP: SMTP stands for Simple mail transfer protocol. SMTP basically uses the
internet network connection to send and receive email messages over the
Internet.
Protocols of Email:
Emails basically use two types of standard protocols for communication over the
Internet. They are:-
1. POP: POP stands for post office protocol for email. Similar to a post office, our
approach is just to drop the email over the service mail provider and then leave it
for services to handle the transfer of messages. We can be even disconnected from
the Internet after sending the email via POP. Also, there is no requirement of
leaving a copy of the email over the web server as it uses very little memory. POP
allows using concentrate all the emails from different email addresses to
accumulate on a single mail program. Although, there are some disadvantages of
POP protocol like the communication medium is unidirectional, i.e it will transfer
information from sender to receiver but not vice versa.
2. IMAP: IMAP stands for Internet message access protocol. IMAP has some
special advantages over POP like it supports bidirectional communication over
email and there is no need to store conversations on servers as they are already
well-maintained in a database. It has some advanced features like it tells the
sender that the receiver has read the email sent by him.
Working of Email:
1. When the sender sends the email using the mail program, then it gets redirected to
the simple mail transfer protocol which checks whether the receiver’s email
address is of another domain name or it belongs to the same domain name as that
of the sender (Gmail, Outlook, etc.). Then the email gets stored on the server for
later purposes transfer using POP or IMAP protocols.
2. If the receiver has another domain name address then, the SMTP protocol
communicates with the DNS (domain name server) of the other address that the
receiver uses. Then the SMTP of the sender communicates with the SMTP of the
receiver which then carries out the communication and the email gets delivered in
this way to the SMTP of the receiver.
3. If due to certain network traffic issues, both the SMTP of the sender and the
receiver are not able to communicate with each other, the email to be transferred is
put in a queue of the SMTP of the receiver and then it finally gets receiver after
the issue resolves. And if due to very bad circumstances, the message remains in a
queue for a long time, then the message is returned back to the sender as
undelivered.
The sender first needs the email address of the receiver to send the information to be
communicated via email. When the sender writes all the information in the email along
with the email address of the receiver and clicks on the send button, the mail program
transfers the message to the MTA (Mail Transfer Agent) which is transferred from the
local computer of the sender to the mail server via the SMTP protocol.
Then the webmail server looks out for the similar mail transfer agent of the receiver and
locates it whether it is using the same DNS (domain name server) or a different service.
The DNS looks for the mail exchanger service of the receiver. Now, the SMTP protocol
transfers the message between both mail servers through their mailing agents. Then the
receiver’s MTA finally transfers this message to the receiver’s local computer.
In case, the receiver uses POP protocol then when he receives the email, then the copy
of the email at the web server will get deleted. And if he uses IMAP then the copy of
the email gets stored on the web server and it can be changed at any time by the user.
Types of URL: URL gives the address of files created for webpages or other documents like
an image, pdf for a doc file, etc.
There are two types of URL:
Absolute URL
Relative URL
Absolute URL: This type of URL contains both the domain name and directory/page path. An
absolute URL gives complete location information. It begins with a protocol
like “http://” and continues, including every detail. An absolute URL
typically comes with the following syntax.
protocol://domain/path
For web browsing, absolute URL’s are types in the address bar of a web
browser. For example, if it is related to customer support page link
of amazon website, the URL should be mentioned
as https://www.amazon.in/gp/help/customer/display.html/ this gives the
complete information about the file location path.
Note: The protocol may be of following types.
http://, https://, ftp://, gopher://, etc.
Relative URL: This type of URL contains the path excluding the domain name. Relative
means “in relation to”, and a relative URL tells a URL location on terms of
the current location. Relative path is used for reference to a given link of a
file that exist within the same domain.
Let us assume a web developer setting up a webpage and want to link an
image called “amazon.jpg”.
<img src="amazon.jpg">
It would internally be interpreted like the following.
<img src="./amazon.jpg">
The dot(.) before the “/” in the src attribute is a “special character”. It means
the location should be started from the current directory to find the file
location.
The URL sends users to a specific resource online such as video, webpage, or
other resources. When you search any query on Google, it will display the
multiple URLs of the resource that are all related to your search query. The
displayed URLs are the hyperlink to access the webpages.
The additional information about the URL is described below with the help
of an example:
http:// or https://
The http is a protocol that stands for Hypertext Transfer Protocol. It tells the
browser to which protocol will be preferred to use for accessing the
information that is specified in the domain.
www.
The www is used to distinguish the content, which stands for World Wide
Web. This portion of the URL can be left out many times, as it is not
required. For instance, if you type "http://amazon.co.in," you will still get the
amazon website. For an important subpage, this portion can also be
substituted, which is known as a subdomain.
amazon.co.in
The amazon.co.in is the domain name for the website, and the .co.in is called
TLD or suffix. It helps to identify the location or type of the website. For
example, ".org" stands for an organization, ".co.uk" stands for the United
Kingdom, and ".com" is for commercial. There are various types of domain
suffixes available; you are required to register the name through a domain
registrar to get a domain.
contact.htm
The contact.htm is the name of the web page, and the .htm is the file
extension of the web page, which describes the file is an HTML file. There
are many other file extensions available on the internet such as .php, .html,
.xml, .jpg, .gif, .asp, .cgi, etc.
Diagram with laptop on left and server on right. Laptop has browser window and
arrow going to server that's labeled "www.example.com = ?". Server is labeled
"DNS resolver" and has arrow going back to laptop that says "93.184.216.34"
Diagram with laptop on left and server on right. Laptop has browser window and
arrow going to server with packet above it that contains HTTP request. Server is
labeled with "www.example.com" and its IP address "93.184.216.34".
An HTTP request can be as short as two lines of text:
The next part specifies the path: "/index.html". The host computer stores the
content of the entire website, so the browser needs to be specific about which page
to load.
The final part of the first line specifies the protocol and the version of the protocol:
"HTTP/1.1".
The second line specifies the domain of the requested URL. That's helpful in case a
host computer stores the content for multiple websites.
Types of Protocols
1. TCP/IP: TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic
point-to-point meaning each communication is from one point (or host computer) in
the network to another point or host computer communication protocol on the
Internet. It is used as a communication protocol in all types of networks. When you
are connected to the Internet, your computer provides you a copy of the TCP/IP
program when you need to send messages to or get information from the other
computer.
TCP/IP is a two-layer protocol. The top layer, TCP(Transmission Control
Protocol) manages the assembling of a message or file divided into smaller packets
that are transmitted over the Internet and received by a TCP that reassembles the
packets into the original message on the destination computer. The lower layer,
Internet Protocol, handles the address part of each packet so that it gets to the right
destination. Each gateway computer on the network checks for the address to
forward the message. Some packets from the same message are routed differently
than others, but they are reassembled at the destination.
2. HTTP stands for Hypertext Transfer Protocol, is a set of standards that allows
users of the World Wide Web to exchange information found on web pages on the
internet. HTTP defines how messages are formatted and transmitted, and what
actions web server and browsers should take in response to various commands.
Today’s modern browsers no longer require HTTP in front of the URL since it is the
default method of communication. But, it is still used in browsers because of the
need to access other protocols such as FTP through the browser. The HTTP provides
a standard for Web browsers and servers to communicate.
3. File Transfer Protocol (FTP) is a standard protocol used on a network to transfer
the files from one host computer to another host computer using a TCP based
network, such as the Internet.
FTP uses separate control and data connections between the client and the server. To
use FTP server, users need to authenticate themselves using a sign-in protocol, using
a username and password but can connect anonymously if the server is configured to
allow it. For secured transmission the data encrypts (hides) the username and
password, and even encrypt the content, using SSL.
To transfer files with FTP, use a program often called the client. An FTP client
program initiates a connection to a remote computer running FTP server software.
After the connection is established, the client can choose to send and/or receive files.
To connect to an FTP server, a client requires a username and password as set on the
server. Many FTP servers use a username as “anonymous”. Using FTP, you can also
update (delete, rename, move, and copy) files to a server. You need to login to an
FTP server. However, publicly available files are easily accessed using anonymous
1. Crawling: Search engines have a number of computers programs that are responsible
for finding information that is publicly available on the internet. These programs scan
the web and create a list of all available websites. Then they visit each website and by
reading HTML code they try to understand the structure of the page, the type of the
content, the meaning of the content, and when it was created or updated.
Why crawling is important? Because your first concern when optimizing
your website for search engines is to make sure that they can access it
correctly. If they cannot find your content you won’t get any ranking or
search engine traffic.
3. Ranking: Ranking is the position by which your website is listed in any Search
Engine. There is following three steps in which how ranking works.
beach. So she searches “Palolem beach” on the search engine and then the
search engine gives the best route to reach Palolem beach.
Searching people: Search engines are also used to find people on the internet
around the world.
Shopping: Search engines are also used for shopping. Search engines optimize
the pages to meet the needs of the user and give the lists of all the websites that
contain the specified product according to the best price, reviews, free
shipping, etc.
Entertainment: Search engines are also used for entertainment purposes. It is
used to search videos, movies, games, movie trailers, reviews of movies, social
networking sites, etc. For example, Rohan wants to watch a movie named
“Ram”, then he searches this movie on a search engine and the search engine
returns a list of links (of the websites) that contain the Ram movie.
Education: Search engines are also used for education. With the help of search
engines, people can learn anything they wanted to learn like cooking,
programming languages, home decorations, etc. It is like an open school where
you can learn anything for free.