Unit 13
Unit 13
Unit 13
13.7 Messaging
13.7.1 Instant Messaging
13.7.2 Unified Messaging
13.1 INTRODUCTION
Electronic Mail is one of the most prominent uses of networked communication
technology. Better known as email, this is one of the most widely used forms of
communication today. Electronic mail (email) has many advantages over other forms of
communication: it is easy to use, free of charge, fast, and delivers information in a digital
format. With suitable encoding methods, email can be used to send any kind of computer
file, including pictures, sounds, programs, and movies.
Email started in 1965 as a way for multiple users of a time-sharing mainframe computer
to communicate among themselves. ARPANET had a significant role in popularising
email. The foundation for today’s global Internet email service was created in the early
ARPANET.
13.2 EMAIL
Email is the most popular and the quickest method of transferring message over network.
There are several service providers over WWW, offering free email services. However,
organisation can offer own mailing service for the stakeholders of organisation. The
service is so popular and effective that many of the organisations operate only on email
for internal and external communication.
6
1) An email ensures faster/easier delivery of messages as long as email address is E-mail and
correct. E-Messaging
8
13.4.5 Email Bouncer E-mail and
E-Messaging
An email bouncer enables to send a ‘fake’ bounce message to the sender. Thus, the
spammer is led to believe that the email account is inactive or unrecognised by the
server, and in many cases will remove the email address from its mailing list.
13.5.1 Header
The header of an email is structured into various fields such as summary, sender, receiver,
and other information about the email. The header of an email can be easily distinguished
from the body of the email.
Various fields included within header are:
1) From: Contains the email address, and optionally name, of the sender of the
message.
2) To: The email address(es), and optionally name(s), of the receiver(s) of the message.
3) Subject: A brief summary of the contents of the message.
4) Date: The local time and date when the message was originally sent.
5) CC: Stands for Carbon Copy. It contains email address(es) of those who will
receive a copy of the message in addition to receiver(s) mentioned in To field.
6) Message-ID: It shows the number assigned to the message by the mail program
at the host machine.
7) A series of Received: These are the lines, showing details of the systems through
which the email has passed (useful for troubleshooting if mail bounces back).
8) A Reply-to: gives the preferred address for replies (usually but not always the
same as the sender’s address).
9
Internet Tools and Services Note: Blank spaces are not allowed in an email address. Also, an email address is not
case-sensitive.
Header
13.5.2 Body
The Body of an email contains the message itself mostly in text form. An account may
be configured to automatically assign a signature (of the user) at the end. Signature is
the text appearing at the end of the body by default in each message. Normally, it is the
name of the sender and other contact details.
Body
Signature
13.5.3 Features
1) Email is based on push technology, i.e. Email is delivered to the recipient so they
don’t have to work to get it — they just need to open their Inbox to access the
email.
10
2) Most of the email clients do offer to create MIME (Multipurpose Internet Mail E-mail and
Extensions) and HTML emails with colorful fonts, graphics and links. E-Messaging
13.6.1 Protocols
Protocol can be defined as a set of rules to perform a specific task. The mail server and
its client exchange information with each other using a variety of protocols. A protocol
is a standardised mechanism used at each end of a communication channel, to achieve
11
Internet Tools and Services proper transmission of information. The most common of these email protocols is
listed below:
IMAP Protocol
IMAP (Internet Message Access Protocol) is used by the client, which is used to
read the email like Firebird, Outlook express, Apple Mail etc. (also called as Access
Client). In this, email is received and held on Internet server for email account holder is
read through a client. IMAP4 is the latest version in use. Only specific email messages
requested by the user get downloaded from the server. It works well even for slower
connection to Internet as it requires only a small data transfer. Also, one can create and
manipulate folders or mailboxes on the server, make a keyword search through email,
delete messages etc.
POP3 Protocol
The POP (Post Office Protocol 3) protocol provides a simple, standardised way for
users to access their mailboxes and download messages on their computers using email
clients.
This protocol permits to download all email messages from the mail server to a local
computer. One can also choose to leave copies of their emails on the server as well.
The advantage is that once the messages are downloaded mail can be read without an
internet connection. Most current email client applications support POP3.
SMTP Protocol
The SMTP (Simple Mail Transfer Protocol) protocol is used by the Mail Transfer
Agent (MTA) to deliver an email to the recipient’s mail server. The SMTP protocol can
only be used to send emails, not to receive them. The vast majority of mail servers use
SMTP.
HTTP Protocol
The HTTP protocol is not a protocol dedicated for email communications, but it can
be used for accessing mailbox. This protocol can be used to compose or retrieve
emails from an email account. Hotmail, Yahoo are few examples which are using HTTP
as an email protocol.
Click Here
13
Internet Tools and Services
New folders
can be added
here
Click Here to
Add Folder
16
E-mail and
New name is
E-Messaging
assigned
Task Panel
Fig. 13.13: The Empty Inbox and FORMS Folder with Message
Self-Check Exercise
Note: i) Write your answers in the space given below.
ii) Check your answers with the answers given at the end of this Unit.
4) What is Mail Transfer Agent?
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
13.7 MESSAGING
Messaging is a method of communication between two people or organisation.
Messaging could be done using the power of Internet or through cell phones. Messaging
software connects two people and facilitates them to communicate through text or
voice or both of them.
18
Two types of Messaging E-mail and
E-Messaging
a) Asynchronous Messaging: The term “asynchronous messaging” means a method
of communication between programs in which a program places a message on a
message queue and leaves. It really does not bother how the message will be
delivered. It is the delivery agent or the kind of infrastructure ensures delivery of
message, even if the recipient is offline. For example, delivery of emails.
b) Synchronous messaging: In this kind of communication sender and receiver
both have to be in connectivity while transferring the message. For example,
telephonic conversation. Hence, a program places a message in a message queue
and then waits for a reply to its message before resuming further.
13.8.1 Spamming
Often in the email accounts one receives lot of unwanted mails which includes threats,
promotional mails and so on. These messages are called Spam. There are two kinds
of spams, mail lists and individual mails. Often users subscribe mail lists where lots of
promotional materials are posted in bulk. These materials are of generic nature. There
is another type of spamming where individual users are targeted for example, individual
messages from unknown for illegal business or receipt of some unknown prize. Almost
all the service providers have mechanism for filtering such messages based on the content
or the subject line of the messages.
19
Internet Tools and Services 13.8.2 Privacy
Many Email service providers have their own privacy policies. Most of the free web
based email services have financial dependency on advertisers and in return they share
user information such as their email address information with advertisers. Also, details
of the communication can be shared with government agencies on demand. Thus, one
must be aware of the privacy policies of an email service provider before going for their
services.
13.8.3 Security
Email /Instant messaging account are vulnerable to hijacking or spoofing. Spoofing is a
phenomenon where an attacker hijacks another user’s email/IM account and
impersonates as user with others. Things apart the information exchanged over network
can also be read over network by a third party. Hence, it is important to ensure
information exchange.
There are several ways which have been devised to overcome all these problems which
are enlisted below:
1) One of the best ways to secure the information being transmitted along an IM
network is to encrypt it.
2) Keeping message logs for tracing any kind of mischief.
3) If file transfer via the instant messaging network is not required, then an instant
messaging system that does not allow for files to be transferred should be utilised.
Self-Check Exercise
Note: i) Write your answers in the space given below.
ii) Check your answers with the answers given at the end of this Unit.
5) What is a Spam?
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
.....................................................................................................................
A web
widget
21
Internet Tools and Services Widgets can be delivered as:
Graphics: Used to create banners, unusual fonts and animated images or text.
Gadgets: hit counters, weather forecasts, calendars and maps
Entertainment: Streaming of TV listings, daily quotes, interesting facts or games
Social: provides link to social bookmarking or networking pages such as Facebook
or Twitter e.g. Addthis.com
Audio Visual: e.g. Streaming of YouTube videos directly to a web page
Utilities:
Utilities are useful for fixing minor problems or mis-configurations and handle day-to-
day chores associated with computers. They are designed to help manage and tune the
computer hardware, operating system or application software by performing a single
task or a small range of tasks. Hence, the objective is to keep a system running at peak
performance. It is also known as service program, service routine, tool, or utility
routine.
Some of the examples of mail utilities are:
Cryptographic utilities encrypt streams and files;
Mail Send Utility to send multiple mails to a desired mail list from command line;
Email Finder Pro n/a Fast and simple email address extraction utility;
JPEE Email Utility Lite 5.3.2 is known as a tool to merge and extract email,
parsing data. JPEE is available as a free, easy to use, highly configurable, email
communications software implementation;
Google Email Uploader is a useful and smart desktop utility for Windows with
the ability to upload email and contacts from other desktop email programs (like
Microsoft Outlook) into your Google Apps mailbox. The Email Uploader preserves
information such as sent dates and sender/recipient data, as well as the folder
structure used by the other email program.
13.10 SUMMARY
Email is the most used service on Internet. It has become the fastest medium for
transferring the message as well as data. The importance and authenticity of email is
now being recognised officially and many organisation use email for day-to-day
communication and do broadcast there circulars and orders by email. The service is
offered by several service providers free of cost however, one can set his own mail
server for communication. In this chapter we have learnt about the email systems and
different types of email addresses. In due course we have also learnt about Instant
Messaging services. There are some issues like individual privacy and security which
has been discussed in detail in order to give insight of the problems.
13.12 KEYWORDS
Attachments : Files, which can be sent along with email.
Blacklist : This is a list of email addresses, which are
blocked for sending mails. In other words, mail
server refuses to accept mails from blacklisted
email addresses.
Blind Carbon Copy (BCC) : Copy of an email message sent to recipients but
his email address does not appear in the message.
Bounce : Returned messages that do not reach to
destinations.
Carbon Copy (CC) : Carbon copy is a copy of an email sent to
addresses other than the main recipient.
DNS : Stands for Domain Name Server, which
translates domain names into IP addresses.
Download Message : Allows saving a copy of email message on local
computer
Email harvesting : A program to scan Web pages for the purpose
of collecting email addresses.
23
Internet Tools and Services Email headers : Section of an email message contains the sender
and recipient’s email addresses and routing
information.
Filters : Filters automatically filter incoming emails into
designated folders. Filtering is done based on
different fields of an email like, recipient address,
subject, domain name and so on.
Forwards : Feature of an service which automatically
forwards incoming emails to another email
account.
MIME (Multi-Purpose : An extension of the email standard that allows
Internet Mail Extensions) users to exchange multimedia files.
Plain text : Text in an email message that contains no
formatting elements (i.e., color, bold, italics, etc.),
pictures, or HTML.
Post Office Protocol (POP3) : A standard that enables emails to be retrieved
from a remote mailbox. It allows to collect emails
from an account to an email client program like,
Outlook.
Proxy : A computer system or router that breaks the
connection between sender and receiver, giving
anonymity.
Reminders : Added feature of email systems that allows setting
up reminders on a certain date.
Search Facility : A feature within the email system to search an
email based on keywords/phrase as well as on
certain criteria.
Signature : Section in the email message which goes by
default with the sent email normally carrying
name, address, website, address, phone number,
etc. It appears at the end of the message.
SMTP : A protocol standard that enables emails to be
transferred from sender machine to destination
machine.
SMTP(Simple Mail : Stands for Simple Mail Transfer Protocol, used
Transfer Protocol) to send email on the Internet.
Snail mail : Postal service delivers letters at home in paper
format via postman.
Soft bounces : Bounce of a mail with a message due to temporary
network congestion.
Spam : Unsolicited, unwelcome email sent in a large
volumes.
24
Spell Check : Feature with email service to correct any spelling E-mail and
errors. E-Messaging
25