Content of the lesson:
This is a basic network service used for mutual communication between users of a network (home, company or inside Internet). The owner of a mailbox (and e-mail address) is allowed to create, send and receive messages including attached files, use his directory or participate at electronic conferences etc.
Electronic mail was founded intentionally as a very simple service designed for transferring small and exclusively text messages. Of course programmers expected usage of ASCII code (suitable for English but not for Czech which uses diacritical marks).
As the time passed and electronic mail became more popular it was improved in many ways. Support for more languages (character sets) was introduced, the way of adding attachments was unified and also the repertoire of formats which could be used for the content of a message was extended. Thanks to these changes the electronic mail became much more universal service which was used as a platform for offering additional services.
The principle of electronic mail is that a user has dedicated memory space (mailbox) for incoming and outgoing mail at a mail server of his provider (ISP – Internet Service Provider). To be able to read his messages he has to connect to this server and save messages to his computer. The size of mailbox is limited and differs according to the price.
The exact place where a message should be send is recognized from the electronic address in the heading of a message. The heading contains information about the identification of computer where an email should be delivered and also the name of the recipient.
Recipient finds new messages usually after launching a special program (e-mail client). The process of receiving e-mails is done also without the presence of user - the server runs a program which saves all incoming messages and allows all users to read them later.
The recipient has several possibilities how to handle with his message. He can simply read it on screen, print it or save it to file, he can forward it to another user, use the sender address to write a response, etc. He also can delete messages which are not interesting for him or which bother him.
Each user of this service has his address of electronic mail. The address consists of two parts - username which is unique within the server, then the @ sign and the name of server which is followed by an extension (.cz for Czech servers). The address cannot contain spaces or characters with diacritical marks. A dot is allowed inside the username. For example:
svetlik@gjszlin.cz
this means that a mailbox for user svetlik was created at the server gjszlin.cz. One user can have many addresses and mailboxes at different servers.
Electronic addresses allow you to add additional comments as their content - this is usually used to add a real name. Practically it is done by adding a text in rounded brackets after the text of address or this text is inserted before and the e-mail address is inserted into angle brackets <...>. An alternative form of email address which was mentioned before could be one of the following ones:
To: svetlik@gjszlin.cz (Jaromír Světlík)
To: Jaromír Světlík
E-mail messages usually consist of these parts:
The header contains particular number of definitions for message attributes (address, subject, etc.) which are added in the following order: name or attribute, semicolon and the value of attribute.
A typical header of electronic message contains at least 4 arrays:
Example of a header:
From: Jaromír Světlík
To: Michal Miklas
Subject: Pozdrav
Date: Wed, 24 Feb 10 01:24:00 +0100
Additional attributes which can be found in header:
The header cannot contain any fatal mistakes which could not be repaired for correct delivery. These fields are usually prepared and filled by programs which are used for composing and sending messages.
The introduction of MIME standard (Multipurpose Internet Mail Extensions) brought the possibility to use "richer" formats of text inside the body. In the past only plain text e-mails could be sent without any adjustments, types or sizes of fonts, images etc. but nowadays an email message can contain practically the same as a simple web page - for example wrapping to columns, different fonts, illustrations etc. This possibility is used especially for sending several electronic periodicals using the electronic mail.
Thanks to the MIME standard you can add any non-text attachments to the email messages.
It is also possible to attach more files to one message. However, you should pay attention because transferring large files might fill the mailbox of the recipient. To transfer larger files (in MB) you should use other services of the Internet like FTP.
They are used for communication between computer and mail server and between mail servers. POP3 or IMAP protocols are used for incoming mails and SMTP protocol is used for outgoing mails.
This protocol allows downloading electronic mail from the mailbox at mail server to end users. It is suitable for users who work with their mail on one computer. All mail is downloaded to the local drive and after disconnecting from the Internet all emails are available.
There is a large disadvantage because this protocol downloads mails without knowing the recipient and sender. This can be a problem in case that a mailbox is shared by more users and they get messages with universal "To" header (for example from conferences). In this case the IMAP protocol is better.
The protocol IMAP is suitable for users who have to access their email on more computers. E-mails are saved at server and they can access them and manipulate with the electronic mail on that server, archive it to a local computer because the IMAP protocol only downloads headers compared to POP3 which downloads the whole messages. IMAP allows connection of many users to one mailbox (unlike the POP3). The last version is IMAP4.
After disconnecting from a computer network the emails are not available in case that the offline mode is not activated inside your mail client.
SMTP protocol is designed for transferring messages from client to mail server and between mail servers.
It is an Internet protcool designed for transferring electronic mails between stations. This protocol delivers mail using a direct connection between the sender and the recipient. The message is delivered to your mailbox and you can access it later (read mails) using POP3 or IMAP protocols.
Graphical diagram of e-mail communication:
A client program is used to work with electronic mail. It is used for creating, editing, reading and sending emails. You have to set all parameters of connection with a server which provides the incoming and outgoing of your mail. Mail clients provide a particular comfort because you can set to automatically sort emails according to the sender or create a sending groups to send emails to more users at once.
There are many programs to work with e-mails which are based on the principle client – server.
When the WWW service was spread several freemail services were founded. These services offer using free electronic mail in a web browser.
Each post client has to be able to:
Spam is unwanted advertising mail. Low costs for sending emails allow spammers to send hundreds of millions mails daily using a cheap internet connection. Hundreds of active spammers cause overloading computers in the Internet which usually get tens or hundreds of unwanted emails each day. Spammers get addresses using different ways, for example from internet pages, forms on www or using the try-fault method, ...
Mass distribution of unwanted mails using the electronic mail is in professional terminology called as spamming.
The reasons are clear - money. Spammer who sends spams hopes that several people will response and buy the advertised product or service.
Most of nowadays e-mail servers have their antispam filter which helps you to be protected from unwanted mails. However, the success is not 100%.
Spam is harmful especially because
Another type of e-mail messages is co called hoax. This is name for false string messages which are send around the Internet - they contain false, distorting information, adjusted semi-truths or mix of lies.
A classical text of hoax usually contains these points:
Hoax usually uses people who are not informed or naive and it tries to manipulate with them. There are several typical types of hoax:
Sample of HOAX message (taken from www.hoax.cz)
Charging or ICQ
From 1. July the ICQ will cost 50 Kč per month. Fight against it and send this text to at least 15 people from your contact list. In case you do it, press F1 and your flower will be blue which means you will not have to pay anything.
Phishing is a fraudulent technique used in the Internet to get sensitive details (passwords, numbers of credit cards, pin codes etc.) from victims of this attack. Its principle is to send e-mail messages which look like official requests of banks or other similar institutions and it asks the recipient to enter his details to a website. This website can look like a correct login page to internet banking and the user enters his username and password into it. These details allow attackers to use his bank account to get rich.
E-mail worms are used to spread electronic mails. After a computer is infected it starts sending e-mails to various addresses which are taken from the e-mail contact list from the infected computer or by searching through saved files and extracting those strings which look like an e-mail address. The advantage of this procedure is to use the e-mail account of the victim so the mail looks like a reliable correspondence.
A special case are networks Botnet which consist of computers which are infected by a special worm. These computers send SPAM in bulk or make DoS attacks when a command is received. DoS are network attacks which deny access to several services - these attacks block services of networks by overloading their connection which can result in server collapse or terminating running programs on servers.
The content of infected message usually contains the infected program as an attachment or it contains links to web pages which are able to infect the computer of a visitor.
Think about an influence of an e-mail on environment.
Compare enviromental hazard of common letter and an e-mail.
Calculate the amount of sent and delivered e-mails in your mailbox and what could be the cost of such communication with common paper letters in envelopes.
End of environmental box.