Conducted by: Dr. Asra Amidi
Date of Lecture: 04-06-2020
Topics Covered:
Internet Service Providers (ISP)
Introduction to Electronic Mail
Email Message Components
Advantages and Disadvantages of Email
Email Protocols and Systems
Email Functionalities, Features, and Providers
Email Security
Email Etiquettes
Definition: A company that offers access to the internet.
Services Provided:
Internet Access
Domain Name Registration
Dial-up Access
Leased Line Access
Access Providers:
Provide internet via telephone lines, cable, Wi-Fi, or fiber optics.
Mailbox Providers:
Offer mailbox hosting services.
Hosting ISPs:
Provide email and web hosting services.
Virtual ISPs:
Deliver internet access using infrastructure from other ISPs.
Free ISPs:
Offer internet services at no charge.
Utilizes telephone lines and requires a modem.
Protocols Used:
Serial Line Internet Protocol (SLIP)
Point to Point Protocol (PPP)
Integrated Services Digital Network; connects via phone lines carrying digital signals.
Types:
Basic Rate Interface (BRI)
Primary Rate Interface (PRI)
Digital Subscriber Line; broadband connection over telephone lines.
Variants:
Asymmetric DSL (ADSL)
Symmetric DSL (SDSL)
High bit-rate DSL (HDSL)
Rate adaptive DSL (RDSL)
Very high bit-rate DSL (VDSL)
ISDN DSL (IDSL)
Offers higher speeds than dial-up; uses cable or phone line infrastructure.
Mediums Include:
Coaxial cable
Radio signals
Optical fiber cable
Twisted pair cable
Utilizes cable TV lines for fast internet access.
Requires a cable modem provided by the operator.
High-speed internet connection via satellite.
Types:
One-way connection (download only)
Two-way connection (both upload and download)
Do not require physical cables; use radio signals for connectivity.
Consistently accessible with varying speeds based on location.
Email: A service for sending messages electronically.
Characteristics:
Fast and inexpensive.
Structure of an email address: username@domain_name.
Example: munir@lincoln.edu.my
Email addresses are not case sensitive and spaces are not allowed.
Email Header: sender and recipient information
Greeting: initial salutation
Text: main message body
Signature: closing remarks and sender’s information
Reliable: Notification of undelivered messages.
Convenient: No physical materials required.
Speed: Quick message delivery, dependent on network conditions.
Inexpensive: Low cost to send emails.
Global Reach: Send and receive messages worldwide.
Generality: Supports various file types including graphics and audio.
Forgery Risks: Potential for impersonating senders.
Overload: Influx of messages may overwhelm inboxes.
Misdirection: Sending to the wrong recipient.
Spam: Unwanted and irrelevant messages.
No Guaranteed Response: Lack of replies can be frustrating.
Protocols: Set of rules for transmitting information to/from mail servers.
SMTP (Simple Mail Transfer Protocol):
For sending emails, reliable delivery mechanisms.
Uses TCP as transport layer protocol.
IMAP (Internet Mail Access Protocol):
For accessing emails from multiple clients without downloading.
Allows email searching and management on the server side.
POP (Post Office Protocol, current version: POP3):
Used for retrieving emails for a single client.
Needs messages to be downloaded for access.
MIME (Multipurpose Internet Mail Extensions):
Supports multimedia attachments and large message sizes.
Mailer: Software to manage, read, and compose emails.
Mail Server: Stores and delivers emails, must be operational.
Mailboxes: Folders for holding emails.
User composes message and sends it.
Message is routed to the recipient's mail server via SMTP.
Email is stored on the server until retrieved by the recipient.
Recipient accesses and reads the email.
Visit gmail.com, click "create an account".
Fill out personal information and proceed through setup.
Manage emails across different categories: Primary, Social, Promotions.
Specifying the sender's address, Cc, Bcc, subject, text, and signature.
Essential Activities:
Reading
Replying
Forwarding
Deleting
Phishing: Fraudulent emails attempting to steal information.
Quishing: Malware via QR codes.
Malware: Attachments and links that compromise security.
Spam: Unsolicited bulk emails.
Authentication Attacks: Methods to gain unauthorized access.
Botnets & DDoS Attacks: Networked systems used for large-scale attacks.
Flooding inboxes, wasting resources, and harboring viruses.
Use separate email addresses for public listings.
Avoid revealing emails online.
Do not respond to unknown senders.
Be cautious about engaging with spam offers.
Keep messages concise.
Pay attention to spelling and grammar.
Use emoticons judiciously.
Ensure email address accuracy.
Use clear subject lines.
Follow formal writing rules.
Regularly clean up forwarded emails.
Utilize BCC for privacy in group emails.
Keep attachments small.
Include a signature at the end.
Verify message content before sending.