Professional Documents
Culture Documents
503 UNIT 5 Mail Services 1
503 UNIT 5 Mail Services 1
This step allows you to add your picture. If you don’t want to upload now, you can do it
later. Click Next Step.
Now a welcome window appears. Click Continue to Gmail.
You will see your Gmail account as shown in the following image:
Key Points:
Gmail manages the mail into three categories namely Primary, Social and Promotions.
Compose option is given at the right to compose an email message.
Inbox, Starred, Sent mail, Drafts options are available on the left pane which allows you
to keep track of your emails.
Reading Email
Every email program offers you an interface to access email messages. Like in Gmail, emails are
stored under different tabs such as primary, social, and promotion. When you click one of tab, it
displays a list of emails under that tab.
In order to read an email, you just have to click on that email. Once you click a particular email,
it gets opened.
The opened email may have some file attached with it. The attachments are shown at the bottom
of the opened email with an option called download attachment.
Replying Email
After reading an email, you may have to reply that email. To reply an email, click Reply option
shown at the bottom of the opened email.
Once you click on Reply, it will automatically copy the sender’s address in to the To field.
Below the To field, there is a text box where you can type the message.
Once you are done with entering message, click Send button. It’s that easy. Your email is sent.
Forwarding Email
It is also possible to send a copy of the message that you have received along with your own
comments if you want. This can be done using forward button available in mail client software.
The difference between replying and forwarding an email is that when you reply a message to a
person who has send the mail but while forwarding you can send it to anyone.
When you receive a forwarded message, the message is marked with a > character in front of
each line and Subject: field is prefixed with Fw.
Deleting Email
If you don’t want to keep email into your inbox, you can delete it by simply selecting the
message from the message list and clicking delete or pressing the appropriate command.
Some mail clients offers the deleted mails to be stored in a folder called deleted items or trash
from where you can recover a deleted email.
For e.g., the website of mywork website has an address or URL called https://www.mywork.org/
type: It specifies the type of the server in which the file is located.
address: It specifies the address or location of the internet server.
path: It specifies the location of the file on the internet server.
Types of URL: URL gives the address of files created for webpages or other documents like an
image, pdf for a doc file, etc.
Relative URL: This type of URL contains the path excluding the domain name. Relative means
“in relation to”, and a relative URL tells a URL location on terms of the current location.
Relative path is used for reference to a given link of a file that exist within the same domain.
Let us assume a web developer setting up a webpage and want to link an image called
“mywork.jpg”.
<img src="mywork.jpg">
It would internally be interpreted like the following.
<img src="./mywork.jpg">
The dot(.) before the “/” in the src attribute is a “special character”. It means the location should
be started from the current directory to find the file location.
Data-Link Layer
The data-link layer identifies the network protocol type of the packet, in this case
TCP/IP. It also provides error control and "framing." Examples of data-link layer
protocols are Ethernet IEEE 802.2 framing and Point-to-Point Protocol (PPP) framing.
Internet Layer
This layer, also known as the network layer, accepts and delivers packets for the
network. It includes the powerful Internet protocol (IP), the Address Resolution
Protocol (ARP) protocol, and the Internet Control Message Protocol (ICMP) protocol.
IP Protocol
The IP protocol and its associated routing protocols are possibly the most significant
of the entire TCP/IP suite. IP is responsible for:
ARP Protocol
The Address Resolution Protocol (ARP) conceptually exists between the data link and
Internet layers. ARP assists IP in directing datagrams to the appropriate receiving host
by mapping Ethernet addresses (48 bits long) to known IP addresses (32 bits long).
ICMP Protocol
Internet Control Message Protocol (ICMP) is the protocol responsible for detecting
network error conditions and reporting on them. ICMP reports on:
The "ping Command" contains more information on the operating system commands
that use ICMP for error detection.
Transport Layer
The TCP/IP transport layer protocols ensure that packets arrive in sequence and
without error, by swapping acknowledgments of data reception, and retransmitting
lost packets. This type of communication is known as "end-to-end." Transport layer
protocols at this level are Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP).
TCP Protocol
TCP confirms that a packet has reached its destination by establishing an end-to-end
connection between sending and receiving hosts. TCP is therefore considered a
"reliable, connection-oriented" protocol.
UDP Protocol
UDP, the other transport layer protocol, provides datagram delivery service. It does
not provide any means of verifying that connection was ever achieved between
receiving and sending hosts. Because UDP eliminates the processes of establishing
and verifying connections, applications that send small amounts of data use it rather
than TCP.
Application Layer
The application layer defines standard Internet services and network applications that
anyone can use. These services work with the transport layer to send and receive data.
There are many applications layer protocols, some of which you probably already use.
Some of the protocols include:
Standard TCP/IP services such as the ftp, tftp, and telnet commands
UNIX "r" commands, such as rlogin and rsh
Name services, such as NIS+ and Domain Name System (DNS)
File services, such as the NFS service
Simple Network Management Protocol (SNMP), which enables network
management
RIP and RDISC routing protocols
FTP and Anonymous FTP - The File Transfer Protocol (FTP) transfers files
to and from a remote network. The protocol includes the ftp command (local
machine) and the in.ftpd daemon (remote machine). FTP enables a user to
specify the name of the remote host and file transfer command options on the
local host's command line. The in.ftpd daemon on the remote host then
handles the requests from the local host. Unlike rcp, ftp works even when the
remote computer does not run a UNIX-based operating system. A user must log
in to the remote computer to make an ftp connection unless it has been set up
to allow anonymous FTP.
You can now obtain a wealth of materials from anonymous FTP
servers connected to the Internet. These servers are set up by universities and
other institutions to make certain software, research papers, and other
information available to the public domain. When you log in to this type of
server, you use the login name anonymous, hence the term "anonymous FTP
servers."
TFTP - The trivial file transfer protocol (tftp) provides functions similar
to ftp, but it does not establish ftp's interactive connection. As a result, users
cannot list the contents of a directory or change directories. This means that a
user must know the full name of the file to be copied. The tftp(1) man page
describes the tftp command set.
The UNIX "r" commands enable users to issue commands on their local machines that
are actually carried out on the remote host that they specify. These commands include
rcp
rlogin
rsh
Name Services
Two name services are available from the Solaris implementation of TCP/IP: NIS+
and DNS.
Domain Name System - The Domain Name System (DNS) provides host
names to the IP address service. It also serves as a database for mail
administration. For a complete description of this service, see Solaris Naming
Administration Guide. See also the in.named(1M) man page.
File Services
The NFS application layer protocol provides file services for the Solaris operating
environment.
Network Administration
The Simple Network Management Protocol (SNMP) enables you to view the layout of
your network, view status of key machines, and obtain complex network statistics
from graphical user interface based software. Many companies offer network
management packages that implement SNMP; SunNet ManagerTM software is an
example.
Routing Protocols
The Routing Information Protocol (RIP) and the Router Discovery Protocol (RDISC)
are two routing protocols for TCP/IP networks.
Search Engine:
A search engine is a service that allows Internet users to search for content via the World Wide
Web (WWW). Search Engine refers to a huge database of internet resources such as web pages,
newsgroups, programs, images etc. It helps to locate information on World Wide Web.
A user enters keywords or key phrases into a search engine and receives a list of Web content
results in the form of websites, images, videos or other online data that semantically match with
the search query.
Following are the steps that are performed by the search engine:
The search engine looks for the keyword in the index for predefined database instead of
going directly to the web to search for the keyword. Indexing is an online library of
websites, which is used to sort, store, and organize the content that we found during the
crawling. Once a page is indexed, it appears as a result of the most valuable and most
relevant query.
It then uses software to search for the information in the database. This software
component is known as web crawler.
Once web crawler finds the pages, the search engine then shows the relevant web pages
as a result. These retrieved web pages generally include title of page, size of text portion,
first several sentences etc.
These search criteria may vary from one search engine to the other. The retrieved
information is ranked according to various factors such as frequency of keywords,
relevancy of information, links etc.
User can click on any of the search results to open it.
Advantages:
1. Time-Saving
Search engine helps us to save time by the following two ways -
Eliminate the need to find information manually.
Perform search operations at a very high speed.
2. Variety of information
The search engine offers various variety of resources to obtain relevant and valuable information
from the Internet. By using a search engine, we can get information in various fields such as
education, entertainment, games, etc. The information which we get from the search engine is in
the form of blogs, pdf, ppt, text, images, videos, and audios.
3. Precision
All search engines have the ability to provide more precise results.
4. Free Access
Mostly search engines such as Google, Bing, and Yahoo allow end-users to search their content
for free. In search engines, there is no restriction related to a number of searches, so all end users
(Students, Job seekers, IT employees, and others) spend a lot of time to search valuable content
to fulfill their requirements.
5. Advanced Search
Search engines allow us to use advanced search options to get relevant, valuable, and informative
results. Advanced search results make our searches more flexible as well as sophisticated. For
example, when you want to search for a specific site, type "site:" without quotes followed by the
site's web address.
Suppose we want to search for some networking notes on xyz site then type "networking
site:www.xyz.com" to get the advanced result quickly.
To search about education institution sites (colleges and universities) for B.Tech in
computer science engineering, then use "computer science engineering site:.edu." to get
the advanced result.
6. Relevance
Search engines allow us to search for relevant content based on a particular keyword. For
example, a site "xyz" scores a higher search for the term "network tutorial" this is because a
search engine sorts its result pages by the relevance of the content; that's why we can see the
highest-scoring results at the top of SERP.
Ref:
https://www.javatpoint.com/how-to-backup-iphone-to-computer
https://www.tutorialspoint.com/internet_technologies/e_mail_working.htm
https://www.geeksforgeeks.org/types-of-url/
https://www.techtarget.com/whatis/definition/mail-server-mail-transfer-transport-agent-MTA-
mail-router-Internet-mailer
https://www.javatpoint.com/search-
engines#:~:text=A%20search%20engine%20is%20an,%2Dusers%20(internet%20user)
https://www.tutorialspoint.com/internet_technologies/search_engines.htm
URL
A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the
Internet. It is also referred to as a web address. URLs consist of multiple parts -- including a
protocol and domain name -- that tell a web browser how and where to retrieve a resource.
End users use URLs by typing them directly into the address bar of a browser or by clicking a
hyperlink found on a webpage, bookmark list, in an email or from another application
The URL contains the name of the protocol needed to access a resource, as well as a resource
name. The first part of a URL identifies what protocol to use as the primary access medium. The
second part identifies the IP address or domain name -- and possibly subdomain -- where the
resource is located.
URL protocols include HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) for web
resources, mail to for email addresses, FTP for files on a File Transfer Protocol (FTP) server, and
telnet for a session to access remote computers. Most URL protocols are followed by a colon and
two forward slashes; "mail to" is followed only by a colon.
a specific reference point within a file, such as a named anchor in an HTML file; and
a query or search parameters used -- commonly found in URLs for search results.
URLs can only be sent over the Internet using the ASCII character-set. Because URLs often
contain non-ASCII characters, the URL must be converted into a valid ASCII format. URL
encoding replaces unsafe ASCII characters with a "%" followed by two hexadecimal digits.
URLs cannot contain spaces.
URL examples
When designing URLs, there are different theories about how to make the syntax most usable for
readers and archivists. For example, in the URL's path, dates, authors, and topics can be included
in a section referred to as the "slug." Consider, for example, the URL for this definition:
https://www.techtarget.com/searchnetworking/definition/URL
Look past the protocol (identified as HTTPS) and the permalink (www.techtarget.com) and we
see the file path includes two paths (searchnetworking and definition) and the title of the
definition (URL).
Additionally, some URL designers choose to put the date of the post, typically, as
(YYYY/MM/DD).
Components of a URL
A typical website has at least 3 parts in its URL like www.google.com but some complex URLs
might also have 8 to 9 parts namely scheme, subdomain, domain name, top-level domain, port
number, path, query, parameters, and fragment.
Components of a URL
1. Scheme :
https://
The protocol or scheme part of the URL and indicates the set of rules that will decide the
transmission and exchange of data. HTTPS which stands for Hyper Text Transfer Protocol
Secure tells the browser to display the page in Hyper Text (HTML) format as well as encrypt
any information that the user enters in the page. Other protocols include the FTP or File Transfer
Protocol which is used for transferring files between client and server, SMTP or Single Mail
Transfer Protocol which is used for sending emails.
2. Subdomain :
https://www.
The subdomain is used to separate different sections of the website as it specifies the type of
resource to be delivered to the client. Here the subdomain used ‘www’ is a general symbol for any
resource on the web. Subdomains like ‘blog’ direct to a blog page, ‘audio’ indicates the resource
type as audio.
3. Domain Name :
https://www.example.
Domain name specifies the organization or entity that the URL belongs to. Like
in www.facebook.com the domain name ‘facebook’ indicates the organization that owns the site.
4. Top-level Domain :
https://www.example.co.uk
The TLD (top-level domain) indicates the type of organization the website is registered to.
Like the .com in www.facebook.com indicates a commercial entity. Similarly, .org indicates
organization, .co.uk a commercial entity in the UK.
5. Port Number :
https://www.example.co.uk:443
A port number specifies the type of service that is requested by the client since servers often
deliver multiple services. Some default port numbers include 80 for HTTP and 443 for HTTPS
servers.
6. Path :
https://www.example.co.uk:443/blog/article/search
Path specifies the exact location of the web page, file, or any resource that the user wants
access to. Like here the path indicates a specific article in the blog webpage.
7. Query String Separator :
https://www.example.co.uk:443/blog/article/search?
The query string which contains specific parameters of the search is preceded by a question
mark (?). The question mark tells the browser that a specific query is being performed.
8. Query String :
https://www.example.co.uk:443/blog/article/search?docid=720&hl=en
The query string specifies the parameters of the data that is being queried from a website’s
database. Each query string is made up of a parameter and a value joined by the equals (=)
sign. In case of multiple parameters, query strings are joined using the ampersand (&) sign. The
parameter can be a number, string, encrypted value, or any other form of data on the database.
9. Fragment :
https://www.example.co.uk:443/blog/article/search?docid=720&hl=en#dayo
ne
The fragment identifier of a URL is optional, usually appears at the end, and begins with a hash
(#). It indicates a specific location within a page such as the ‘id’ or ‘name’ attribute for an
HTML element.
You might be surprised that though URLs seem to be trivial in nature, what your URL looks like is
actually a significant factor in Search Engine Optimization (SEO). Feel free to check out more on
URLs from here:
https://developer.mozilla.org/enUS/docs/Learn/Common_questions/What_is_a_URL
https://www.hostgator.com/blog/best-url-structure-seo/
Source: https://amberwilson.co.uk/blog/urls/
Both HTTP and HTTPS are used to retrieve data from a web server to view content in a browser.
The difference between them is that HTTPS uses a Secure Sockets Layer (SSL) certificate to
encrypt the connection between the end user and the server.
HTTPS is vital to protecting sensitive information, such as passwords, credit card numbers and
identity data, from unauthorized access.
HTTPS uses TCP/IP port number 443 by default, whereas HTTP uses port 80.
A URL is the most common type of Uniform Resource Identifier (URI). URIs are strings of
characters used to identify a resource over a network. URLs are essential to navigating the
internet.
URL shorteners
URL shortening is a technique in which an URL may be made substantially shorter in length and
still direct to the required page. A shortener achieves this using a redirect on a domain name that
is short.
There are many URL shortener services available. While many are free, those that offer
capabilities such as Web analytics, charge a fee. Companies that offer URL shorteners include
Rebrandly, Bitly, Ow.ly, clicky.me and Budurl.com.
Some Web site hosts, such as GoDaddy.com, offer URL shorteners. Other service providers,
including search engines, have begun turning away from URL shorteners because they are often
subject to abuse by spammers, who hide malware inside shortened URLs.