Date: 04-06-2020
Prepared By: Dr. Asra Amidi
Topics Covered:
Internet Service Providers (ISP)
Introduction to Electronic Mail
Email Message Components
Advantages and Disadvantages of Email
Email Protocols and Systems
Email Functionalities, Features, and Providers
Email Security
Email Etiquettes
Definition: Companies offering access to the internet.
Services Offered:
Internet Access
Domain name registration
Dial-up access
Leased line access
Access Providers: Connect users via telephone lines, cable, Wi-Fi, or fiber optics.
Mailbox Providers: Host mailbox services for users.
Hosting ISPs: Provide hosting services like email and virtual machines.
Virtual ISPs: Offer internet access through other ISPs.
Free ISPs: Provide services at no cost.
Utilizes a telephone line for connectivity.
Requires a modem to connect.
Operates using:
Serial Line Internet Protocol (SLIP)
Point to Point Protocol (PPP)
Uses phone lines to transmit digital signals.
Techniques:
Basic Rate Interface (BRI)
Primary Rate Interface (PRI)
Provides broadband over standard phone lines.
Variations include:
Asymmetric DSL (ADSL)
Symmetric DSL (SDSL)
High bit-rate DSL (HDSL)
Rate adaptive DSL (RDSL)
Very high bit-rate DSL (VDSL)
ISDN DSL (IDSL)
Offers high-speed access faster than dial-up.
Uses infrastructure like:
Coaxial cable
Radio signals
Optical fibre
Twisted pair cable
Delivered through cable TV lines, using coaxial cable.
Requires a cable modem for access.
Bandwidth is shared among users, affecting speed.
Offers high-speed internet access.
Types:
One way: Only download capability; uploads via dial-up.
Two way: Supports both download and upload without dial-up.
No need for cables or telephone lines.
Uses radio frequency, offering an always-on connection.
Two technologies for wireless connection:
Wi-Fi: Based on IEEE 802.11 standards.
Bluetooth: Creates personal area networks using short-range radio waves.
Definition: A service for sending messages electronically over the Internet.
Benefits: Quick, inexpensive, and real-time communication.
Email Address Format: username@domain_name (e.g., munir@lincoln.edu.my).
Not case-sensitive, no spaces allowed.
Components:
Email Header: Shows sender, recipients, date, and subject.
Greeting: Introductory salutation.
Text: Main content of the email.
Signature: Sender's sign-off with additional information.
Reliable: Confirmation of message delivery.
Convenient: No need for stationary or post office.
Speed: High speed, depending on the network.
Inexpensive: Low cost for sending messages.
Global Accessibility: Communicate internationally easily.
General Functionality: Support for multimedia attachments.
Forgery: Hard to verify the sender's authenticity.
Overload: Risk of email floods and missed important messages.
Misdirection: Emails may be sent to unintended recipients.
Spam: Unwanted messages clutter inboxes.
No Response: Possible frustration from non-responsive recipients.
Rules for transmitting messages to/from mail servers.
Major Protocols:
SMTP (Simple Mail Transfer Protocol): Used for sending emails reliably.
IMAP (Internet Mail Access Protocol): Retrieves email, allows remote management without downloading.
POP (Post Office Protocol): Downloads emails for single-client access.
MIME (Multipurpose Internet Mail Extensions): Enables transmission of multimedia files.
Mailer: Program to manage email functions (read, compose, delete).
Mail Server: Receives and stores emails. Must be operational at all times.
Mailboxes: Folders containing emails and related information.
Sender composes email using mailer and selects Send.
Email routed to recipient's mail server via SMTP.
Server stores email in designated area (mail spool).
Recipient retrieves email.
Visit gmail.com and click "Create an account."
Fill in required information and proceed.
Option to upload profile picture is provided.
Welcome message appears; continue to Gmail.
Required fields:
Sender’s address (To field)
Cc and Bcc (if necessary)
Subject of the email
Main text and signature
Basic Actions:
Reading, Replying, Forwarding, Deleting emails.
Hacking Methods:
Phishing: Fraudulent attempts to obtain sensitive information.
Quishing: Malicious QR codes leading to phishing sites.
Malware: Viruses and worms attached to emails.
Spam: Unsolicited bulk emails causing productivity loss and risks.
Authentication Attacks: Password cracking to access accounts.
Botnets & DDoS Attacks: Networked malware used for large-scale attacks.
Problems Caused:
Inbox clutter; risk of missing important messages.
Time-consuming to manage spam.
Resource waste and potential virus exposure.
Prevention Tips:
Use separate email for public postings.
Avoid displaying email publicly.
Do not respond to unknown source emails.
Refrain from purchasing via spam advertisements.
Guidelines:
Keep messages concise and clear.
Check spelling and grammar.
Use emoticons appropriately.
Ensure the correct email address is used.
Provide clear, descriptive subject lines.
Follow formal letter writing rules.
Remove unnecessary content such as angled brackets.
Use BCC for privacy in group emails.
Keep attachment sizes small.
Include a signature.
Review before sending.
Steps:
Copy the video link.
Open the browser.
Paste the link.
Change root to "mbasic" and click Go.
Long press the video for download options.