Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

Coursecode Web Programming L T P C

Core/Elective/Supportive
Skill based Subject –1 4 0 0 3
Students should have basic Syllabus
Pre-requisite
knowledge on internet and world Version
wide web.
Course Objectives:
The main objectives of this course are to:
1. To enhance the knowledge of students in web programming
2. To learn about the scripting languages HTML and its elements
3. To understand concept of DHTML to integrate dynamic web pages
4. To understand XML, CS Sand XSLfor formatting the web pages

Expected Course Outcomes:


On the successful completion of the course, student will be able to:
1 Understand the basic concepts of Internet, WWW, browsers and Email and K1
protocols.
2 Understand and apply the HTML, HTML elements and formatting styles K1-K3
3 Knowledge on creating tables,forms and DHTML K3
4 Understand the structure of XML document, DTD and Schema K1-K3
5 Knowledge on working with SML, Style sheets and XSL K1-K4
K1–Remember;K2 –Understand;K3 –Apply;K4– Analyze;K5– Evaluate; K6–Create

Unit:1 Introduction to Internet 15hours


Introduction to Internet – World Wide Web – Browsers: Introduction – Popular Web Browsers –knows
your browsers – Electronic Mail: Introduction – E-mail networks and servers – E-mailprotocols–
Structure of an E-mail.

Unit:2 HTML 12hours


HTML: Introduction–Getting started–Creating and saving HTML document–Document Layout of
HTML Page–HTML elements– Some other formatting Styles–Hyper text Links.

Unit:3 HTML&DHTML 15hours


HTML (contd): URLs – Images – HTML tables – Forms – Special Characters –
Metatages.Interactivity Tools and Multimedia: Introduction– DHTML – Scripting Languages – Java
–ASP.

Unit:4 XMLbasicsand DTD 15hours


XML: XML basics–Introduction–need for XML–Advantages–Working with an XML Document–
Structure of an XML Document–DTD-XML Schema.

Unit:5 XMLSchema and XSL 15hours

Page 22 of 80
XML (contd) :Working with XML Schema –Declaring Attributes –XML name spaces–Reusing
Schema Components–Group in gelements an dattributes.XMLStyle sheets:Introduction–CSS
–e X tensible Style Sheet language–Formatting Databased on controls–Displaying data in a Tabular
Format.

Unit:6 ContemporaryIssues 3hours


Expert lectures,online seminars–webinars

Total Lecture hours 75hours


Text Book(s)
1 Internet and Web Design,ITLEducation,Macmillan India Ltd.
2 HTML and XML an Introduction,NIIT, Prentice Hall of India Pvt.Ltd
3

Reference Books
1 World Wide Web Design with HTML, C .Xavier ,2007, TMH.
2

Related Online Contents [MOOC,SWAYAM,NPTEL,Websites etc.]


1
2
3

Course Designed By:

Mapping with Programme Outcomes


COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S M M M S M S L
CO2 L M S M M L S L S L
CO3 S S L M M M S M S M
CO4 S M S M S M S M S M
CO5 M S S M M M S M S M

*S-Strong;M-Medium;L-Low

Page 23 of 80
uniti.md 2023-10-15

LESSON NOTES
WEB PROGRAMMING
Subject Code:
3ZA
Year:
II
Semester:
III
Unit:
I

Syllabus
1. Introduction to Internet

2. World Wide Web

3. Browsers: Introduction

4. Popular Web Browsers

5. Know your browsers

6. Electronic Mail : Introduction

7. E-mail networks and servers

8. E-mail protocols

9. Structure of an E-mail

1 / 25
uniti.md 2023-10-15

Introduction to Internet

Introduction

The Internet is an increasingly important part of everyday life for people around the world. But if you've
never used the Internet before, all of this new information might feel a bit confusing at first.

What is the Internet?

The Internet is a global network of billions of computers and other electronic devices.
With the Internet, it's possible to access almost any information, communicate with anyone else in the
world, and do much more.
You can do all of this by connecting a computer to the Internet, which is also called going online.
When someone says a computer is online, it's just another way of saying it's connected to the Internet.

What is the Web?

The World Wide Web—usually called the Web for short—is a collection of different websites you can
access through the Internet.
A website is made up of related text, images, and other resources.
Websites can resemble other forms of media—like newspaper articles or television programs—or they
can be interactive in a way that's unique to computers.
Once you are connected to the Internet, you can access and view websites using a type of application
called a web browser. Just keep in mind that the web browser itself is not the Internet; it only displays
websites that are stored on the Internet.

2 / 25
uniti.md 2023-10-15

Other things you can do on the Internet

One of the best features of the Internet is the ability to communicate almost instantly with anyone in
the world.
Email is one of the oldest and most universal ways to communicate and share information on the
Internet, and billions of people use it.
Social media allows people to connect in a variety of ways and build communities online.
There are many other things you can do on the Internet.
There are thousands of ways to keep up with news or shop for anything online.
You can pay your bills, manage your bank accounts, meet new people, watch TV, or learn new skills. You
can learn or do almost anything online.

What Can You Do Online?

Finding information online

With billions of websites online today, there is a lot of information on the Internet. Search engines make this
information easier to find. All you have to do is type one or more keywords, and the search engine will look
for relevant websites.

For example, let's say you're looking for a new pair of shoes. You could use a search engine to learn about
different types of shoes, get directions to a nearby shoe store, or even find out where to buy them online!

3 / 25
uniti.md 2023-10-15

Email

Short for electronic mail, email is a way to send and receive messages across the Internet.
Almost everyone who uses the Internet has their own email account, usually called an email address.
This is because you'll need an email address to do just about anything online, from online banking to
creating a Facebook account.

Social networking

Social networking websites are another way to connect and share with your family and friends online.
Rather than sharing with just a few people over email, social networks make it easier to connect and
share with many people at the same time.
Facebook is the world's largest social networking site, with more than 1 billion users worldwide.

Chat and instant messaging

Chat and instant messaging (IM) are short messages sent and read in real time, allowing you to
converse more quickly and easily than email.

4 / 25
uniti.md 2023-10-15

These are generally used when both (or all) people are online, so your message can be read
immediately. By comparison, emails won't be seen until recipients check their inboxes.
Examples of instant messaging applications include Yahoo Messenger and Google Hangouts. Some
sites, like Gmail and Facebook, even allow you to chat within your web browser.

Online media

There are many sites that allow you to watch videos and listen to music.
For example, you can watch millions of videos on YouTube or listen to Internet radio on Pandora.
Other services, like Netflix and Hulu, allow you to watch movies and TV shows.
And if have a set-top streaming box, you can even watch them directly on your television instead of a
computer screen.

Everyday tasks

You can also use the Internet to complete many everyday tasks and errands. For example, you can manage
your bank account, pay your bills, and shop for just about anything. The main advantage here is convenience.

How do I connect to the Internet?

Once you've set up your computer, you may want to purchase home Internet access so you can send and
receive email, browse the Web, stream videos, and more. You may even want to set up a home wireless
network, commonly known as Wi-Fi, so you can connect multiple devices to the Internet at the same time.

Types of Internet service

The type of Internet service you choose will largely depend on which Internet service providers (ISPs) serve
your area, along with the types of service they offer. Here are some common types of Internet service.

Dial-up: This is generally the slowest type of Internet connection, and you should probably avoid it
unless it is the only service available in your area. Dial-up Internet uses your phone line, so unless you
have multiple phone lines you will not be able to use your landline and the Internet at the same time.
DSL: DSL service uses a broadband connection, which makes it much faster than dial-up. DSL connects
to the Internet via a phone line but does not require you to have a landline at home. And unlike dial-up,
you'll be able to use the Internet and your phone line at the same time.
Cable: Cable service connects to the Internet via cable TV, although you do not necessarily need to
have cable TV in order to get it. It uses a broadband connection and can be faster than both dial-up
and DSL service; however, it is only available where cable TV is available.
Satellite: A satellite connection uses broadband but does not require cable or phone lines; it connects
to the Internet through satellites orbiting the Earth. As a result, it can be used almost anywhere in the
world, but the connection may be affected by weather patterns. Satellite connections are also usually
slower than DSL or cable.
3G and 4G: 3G and 4G service is most commonly used with mobile phones, and it connects wirelessly
through your ISP's network. However, these types of connections aren't always as fast as DSL or cable.
They will also limit the amount of data you can use each month, which isn't the case with most
broadband plans.

Choosing an Internet service provider

5 / 25
uniti.md 2023-10-15

Now that you know about the different types of Internet service, you can do some research to find out
what ISPs are available in your area.
If you're having trouble getting started, we recommend talking to friends, family members, and
neighbors about the ISPs they use.
This will usually give you a good idea of the types of Internet service available in your area.
Most ISPs offer several tiers of service with different Internet speeds, usually measured in Mbps (short
for megabits per second). If you mainly want to use the Internet for email and social networking, a
slower connection (around 2 to 5 Mbps) might be all you need. However, if you want to download
music or stream videos, you'll want a faster connection (at least 5 Mbps or higher).

Hardware needed

Modem

Once you have your computer, you really don't need much additional hardware to connect to the Internet.
The primary piece of hardware you need is a modem.

The type of Internet access you choose will determine the type of modem you need. Dial-up access uses a
telephone modem, DSL service uses a DSL modem, cable access uses a cable modem, and satellite service
uses a satellite adapter. Your ISP may give you a modem—often for a fee—when you sign a contract, which
helps ensure that you have the right type of modem. However, if you would prefer to shop for a better or less
expensive modem, you can choose to buy one separately.

Router

6 / 25
uniti.md 2023-10-15

A router is a hardware device that allows you to connect several computers and other devices to a single
Internet connection, which is known as a home network. Many routers are wireless, which allows you to create
a home wireless network, commonly known as a Wi-Fi network.

Setting up your Internet connection

Once you've chosen an ISP, most providers will send a technician to your house to turn on the connection. If
not, you should be able to use the instructions provided by your ISP—or included with the modem—to set up
your Internet connection.

After you have everything set up, you can open your web browser and begin using the Internet. If you have
any problems with your Internet connection, you can call your ISP's technical support number.

Home networking

If you have multiple computers at home and want to use all of them to access the Internet, you may want to
create a home network, also known as a Wi-Fi network. In a home network, all of your devices connect to your
router, which is connected to the modem. This means everyone in your family can use the Internet at the
same time.

World Wide Web

Overview

The World Wide Web is abbreviated as WWW and is commonly known as the web. The WWW was
initiated by CERN (European library for Nuclear Research) in 1989.
WWW can be defined as the collection of different websites around the world, containing different
information shared via local servers(or computers).

7 / 25
uniti.md 2023-10-15

History

It is a project created, by Timothy Berner Lee in 1989, for researchers to work together effectively at
CERN. is an organization, named the World Wide Web Consortium (W3C), which was developed for
further development of the web.
This organization is directed by Tim Berner’s Lee, aka the father of the web.

System Architecture

From the user’s point of view, the web consists of a vast, worldwide connection of documents or web pages.
Each page may contain links to other pages anywhere in the world. The pages can be retrieved and viewed by
using browsers of which internet explorer, Netscape Navigator, Google Chrome, etc are the popular ones. The
browser fetches the page requested interprets the text and formatting commands on it, and displays the
page, properly formatted, on the screen.

The basic model of how the web works are shown in the figure below. Here the browser is displaying a web
page on the client machine. When the user clicks on a line of text that is linked to a page on the abd.com
server, the browser follows the hyperlink by sending a message to the abd.com server asking it for the page.

Working of WWW

The World Wide Web is based on several different technologies: Web browsers, Hypertext Markup
Language (HTML) and Hypertext Transfer Protocol (HTTP).
A Web browser is used to access web pages. Web browsers can be defined as programs which display
text, data, pictures, animation and video on the Internet.
Hyperlinked resources on the World Wide Web can be accessed using software interfaces provided by
Web browsers.
Initially, Web browsers were used only for surfing the Web but now they have become more universal.
Web browsers can be used for several tasks including conducting searches, mailing, transferring files,
and much more. Some of the commonly used browsers are Internet Explorer, Opera Mini, and Google
Chrome.

8 / 25
uniti.md 2023-10-15

Features of WWW

1. HyperText Information System


2. Cross-Platform
3. Distributed
4. Open Standards and Open Source
5. Uses Web Browsers to provide a single interface for many services
6. Dynamic, Interactive and Evolving.
7. “Web 2.0”

Components of the Web

1. Uniform Resource Locator (URL): serves as a system for resources on the web.
2. HyperText Transfer Protocol (HTTP): specifies communication of browser and server.
3. Hyper Text Markup Language (HTML): defines the structure, organisation and content of a webpage.

Browsers: Introduction

What is a Browser?

A browser is a software program that is used to explore, retrieve, and display the information available
on the World Wide Web.
This information may be in the form of pictures, web pages, videos, and other files that all are
connected via hyperlinks and categorized with the help of URLs (Uniform Resource Identifiers). For
example, you are viewing this page by using a browser.
A browser is a client program as it runs on a user computer or mobile device and contacts the
webserver for the information requested by the user.
The web server sends the data back to the browser that displays the results on internet supported
devices.
On behalf of the users, the browser sends requests to web servers all over the internet by using HTTP
(Hypertext Transfer Protocol).
A browser requires a smartphone, computer, or tablet and internet to work.

History of Web Browser

1. The WorldWideWeb was the first web browser. It was created by W3C Director Tim Berners-Lee in 1990.
Later, it was renamed Nexus to avoid confusion caused by the actual World Wide Web.
2. The Lynx browser was a text-based browser, which was invented in 1992. It was not able to display the
graphical content.
3. Although, the first graphical user interface browser was NCSA Mosaic. It was the first most popular
browser in the world, which was introduced in 1993.
4. In 1994, there were some improvements occurred in Mosaic and came to Netscape Navigator.
5. In 1995, Microsoft introduced the Internet Explorer It was the first web browser developed by Microsoft.
6. A research project started on Opera in 1994. Later, it was publicly introduced in 1996.
7. Apple's Safari browser was introduced in 2003. It was specifically released for Macintosh computers.
8. In 2004, Mozilla introduced Firefox as Netscape Navigator.

9 / 25
uniti.md 2023-10-15

9. In 2007, a browser Mobile Safari was released as Apple mobile web browser.
10. The popular browser Google Chrome was launched in 2008.
11. The fast-growing mobile-based browser Opera Mini was released in 2011.
12. The Microsoft Edge browser was launched in 2015.

Features of Web Browser

Most Web browsers offer common features such as:

Refresh button: Refresh button allows the website to reload the contents of the web pages. Most of
the web browsers store local copies of visited pages to enhance the performance by using a caching
mechanism. Sometimes, it stops you from seeing the updated information; in this case, by clicking on
the refresh button, you can see the updated information.
Stop button: It is used to cancel the communication of the web browser with the server and stops
loading the page content. For example, if any malicious site enters the browser accidentally, it helps to
save from it by clicking on the stop button.
Home button: It provides users the option to bring up the predefined home page of the website.
Web address bar: It allows the users to enter a web address in the address bar and visit the website.
Tabbed browsing: It provides users the option to open multiple websites on a single window. It helps
users to read different websites at the same time. For example, when you search for anything on the
browser, it provides you a list of search results for your query. You can open all the results by right-
clicking on each link, staying on the same page. Bookmarks: It allows the users to select particular
website to save it for the later retrieval of information, which is predefined by the users.

Component of a Web browser

1. User Interface: The user interface is an area where the user can use several options like address bar,
back and forward button, menu, bookmarking, and many other options to interact with the browser.
2. Browser Engine: It connects the UI (User Interface) and the rendering engine as a bridge. It queries and
manipulates the rendering engine based on inputs from several user interfaces.
10 / 25
uniti.md 2023-10-15

3. Rendering Engine: It is responsible for displaying the requested content on the browser screen. It
translates the HTML, XML files, and images, which are formatted by using the CSS. It generates the
layout of the content and displays it on the browser screen. Although it can also display the other types
of content by using different types of plugins or extensions. such as:
Internet Explorer uses Trident
Chrome & Opera 15+ use Blink
Chrome (iPhone) & Safari use Webkit
Firefox & other Mozilla browsers use Gecko
4. Networking: It retrieves the URLs by using internet protocols like HTTP or FTP. It is responsible for
maintaining all aspects of Internet communication and security. Furthermore, it may be used to cache a
retrieved document to reduce network traffic.
5. JavaScript Interpreter: As the name suggests, JavaScript Interpreter translates and executes the
JavaScript code, which is included in a website. The translated results are sent to the rendering engine
to display results on the device screen.
6. UI Backend: It is used to draw basic combo boxes and Windows (widgets). It specifies a generic
interface, which is not platform-specific.
7. Data Storage: The data storage is a persistence layer that is used by the browser to store all sorts of
information locally, like cookies. A browser also supports different storage mechanisms such as
IndexedDB, WebSQL, localStorage, and FileSystem. It is a database stored on the local drive of your
computer where the browser is installed. It handles user data like cache, bookmarks, cookies, and
preferences.

How does a browser work?

When a user enters a web address or URL in the search bar like javatpoint.com, the request is passed to
a domain name servers (DNS).
All of these requests are routed via several routers and switches.
The domain name servers hold a list of system names and their corresponding IP addresses. Thus, when
you type something in the browser search bar, it gets converted into a number that determines the
computers to which the search results are to be displayed.

In Brief:

When a user enters something (like javatpoint.com) in the browser. This request goes to a domain
name server.
The browser sends the user request to the server using an IP address, which is described by the domain
name server.
The domain name server sends an IP address to the web server that hosts the website.
The server sends the information back to the IP address, which is defined by the browser at the time of
the request. The requested page may include links to other files on the same server, like images, for
which the browser also requests the server.
The browser gathers all the information requested by the user, and displays on your device screen in
the form of web pages.

Popular Web Browsers

11 / 25
uniti.md 2023-10-15

Internet Explorer

One of the first and most well-known web browsers during the early years of the Internet was Internet
Explorer (IE), which Microsoft created. The Windows operating system made it the default browser after its
first 1995 release. Internet Explorer used to be a major player in web browsing, but over time, its importance
has waned for a variety of reasons. Microsoft no longer actively updates or supports it as a result.

Pros

Compatibility: Internet Explorer is well renowned for having a high level of compatibility with older
websites and web apps. It was once widely used, which prompted many developers to optimize their
websites for IE.
Integration: Internet Explorer was tightly integrated with Windows operating systems because it was a
Microsoft product, giving Windows users a seamless browsing experience.

Cons

Outdated Technology: Internet Explorer's support for current web standards and technologies slipped
behind over time. Because of this, it was less suited for using more recent, feature-rich websites and
web apps.
Security flaws: Due to a history of security problems, Internet Explorer is more vulnerable to viruses
and online attacks. Due to Microsoft's priority shifting to Microsoft Edge, IE is no longer actively
supported or updated, thus posing security threats to users.
Performance: Internet Explorer frequently performs slower than more recent browsers, resulting in
slower web browsing and longer load times.

Mozilla Firefox

Mozilla is one of the names of different types of web browser. Foundation created the open-source web
browser Mozilla Firefox. Since its initial release in 2004, it has grown to rank among the most widely used
browsers worldwide. The dedication of Firefox to user privacy, security, and customization possibilities is well
known.

Pros

Focus on User Privacy: Mozilla Firefox prioritizes user privacy. It has features like Enhanced Tracking
Protection, which disables third-party trackers, and the choice to use Private Browsing mode, which
prevents cookies or history from being saved as you browse the internet.
Customization: Firefox offers a wide range of add-ons and extensions that users can choose from in
the Mozilla Add-ons store to customize their browser experience completely. Users can customize the
browser to their tastes by adding new features or changing the way it looks.
Security Updates: The Mozilla Foundation regularly updates Firefox to address security flaws and give
users a safer surfing environment.

Cons

Performance: Although Firefox normally performs well, it can occasionally be a little slower than
Chrome and Edge. Recent versions have, however, made performance gains.
Resource Usage: When more add-ons or extensions are installed, Firefox may consume more system
resources, which could affect system performance as a whole.
12 / 25
uniti.md 2023-10-15

Google Chrome

When we want to explain different types of web browser, Google Chrome is on top! This is a popular web
browser created by Google. Due to its quickness, brevity, and seamless interaction with the Google ecosystem,
it soon became popular after its initial release in 2008. Millions of users all around the world like Chrome due
to its effective operation and large extension library.

Pros:

Speed and Performance: Google Chrome is well known for its rapid and effective performance,
making it a top pick for individuals looking for seamless surfing and quick web page loading. Its V8
JavaScript engine helps it run quickly and execute sophisticated web applications without difficulty.
Seamless Integration: Google services and accounts, like Gmail, Google Drive, and YouTube, are all
effortlessly integrated with Chrome. Google's portfolio of products and services are accessible with ease
because to this close connection.
Huge Extension Library: The Chrome Web Store offers a wide selection of extensions and apps for
Chrome. By including productivity tools, ad blockers, password managers, and other features, users can
improve their browsing experience.

Cons

Resource Usage: Chrome is renowned for utilizing a lot of resources, particularly while several tabs are
open or when using devices with constrained system resources. This can affect the device's overall
performance by increasing memory and CPU use.
Battery Drain: Chrome's resource utilization on mobile devices, especially on smartphones and
laptops, might result in a greater loss of battery life. Users who depend on their smartphones a lot
when traveling may find this to be concerning.

Safari

The default web browser created by Apple Inc. is called Safari. The default browser for iOS, macOS, and other
Apple products was originally made available in 2003. When it comes to consumer privacy, energy efficiency,
and integration with the Apple ecosystem, Safari is renowned.

Pros

Seamless Apple Ecosystem Integration: Integrating seamlessly with the iOS and macOS operating
systems, Safari offers a seamless browsing experience for Apple users. It has functions like Handoff,
iCloud Tabs, and Shared Links that simplify switching between devices and accessing bookmarks and
browser history.
Energy-efficient: Safari uses less energy on Apple hardware because it has been optimized for it. It is
the best option for laptop users who wish to preserve battery life because of this. Features for
protecting your privacy: Safari contains a number of privacy-protecting tools, such as Intelligent
Tracking Prevention, which disables third-party trackers, and Privacy Report, which reveals how websites
collect user data. While browsing, these elements aid in preserving user privacy.

Cons

Limited Availability: Safari is not formally offered on other systems like Windows or Android because
it was primarily created for Apple devices. Users who prefer a consistent browsing experience across all
13 / 25
uniti.md 2023-10-15

devices may find this to be a disadvantage.


Feature Set: Safari's feature set may not be as extensive as some other browsers, such as Chrome or
Firefox, despite the fact that it nevertheless provides a reliable browsing experience. Some users might
be missing out on key customization or extension possibilities.

Microsoft Edge

Microsoft created the Microsoft Edge web browser, which replaced Internet Explorer in 2015. Microsoft
switched to the Chromium engine in 2020 from its original proprietary engine, which is the same open-source
project that drives Google Chrome. This modification enhanced its functionality, compatibility, and general
browsing experience.

Pros

Chromium Engine: Microsoft Edge's performance, rendering capabilities, and support for current web
standards all significantly improved after switching to the Chromium engine. Users may now browse
more quickly and easily thanks to this.
Integration with Windows 10: Cortana integration, Windows Timeline compatibility, and easy
synchronization with Microsoft accounts are just a few of the features that Microsoft Edge offers as part
of its tight connection with Windows 10. This connection improves productivity and gives Windows
users a unified experience.
Compatibility with Chrome Extensions: Microsoft Edge is now compatible with Google Chrome
extensions thanks to the switch to the Chromium engine. A sizable collection of Chrome extensions are
now available to users through the Microsoft Edge Add-ons store.

Cons

Add-on Library: Microsoft Edge does allow Chrome extensions, although its add-on catalogue may
not be as robust as Firefox's or Chrome's. The Edge Add-ons marketplace might not carry some
specialized or less well-known addons.
Resource Usage: When numerous tabs are open, Microsoft Edge can use a lot of system resources,
same to how Chrome can. Performance may be impacted, especially on systems with less RAM.

Opera

Opera Software created this feature-rich web browser. Since its initial 1995 release, it has developed to offer a
variety of distinctive features with a focus on speed, security, and user customization.

Pros

Free VPN and built-in ad blocker: Opera has an ad blocker that efficiently eliminates annoying
adverts, resulting in a faster and cleaner browsing experience. Additionally, Opera provides a free VPN
service that enables users to access geo-restricted material and browse the web more securely.
User-Friendly Interface with Customizable Themes: A user-friendly interface with customizable
themes is offered by Opera. These customization options include a variety of themes that allow users to
alter the browser's appearance to suit their preferences.
Turbo Mode: Opera's Turbo mode reduces the amount of data delivered to the user's device by
compressing web traffic. Users with slow internet connections will notably benefit from this because it
will result in speedier loading times on limited bandwidth.

14 / 25
uniti.md 2023-10-15

Cons

Smaller Market Share: Despite having a competent browser, Opera has a smaller market share than
popular browsers like Chrome, Firefox, and Edge. Because of this, some websites and web apps could
give priority to compatibility with and support for the more widely used browsers.
Limited Developer Support: Due to its lower market share, Opera could not get as much attention
from developers as other browsers that are more popular. Compatibility problems with specific
websites or online applications could come from this.

Electronic Mail : Introduction

Introduction

Electronic mail, commonly known as email, is a method of exchanging messages over the internet. Here are
the basics of email:

1. An email address: This is a unique identifier for each user, typically in the format of
name@domain.com.
2. An email client: This is a software program used to send, receive and manage emails, such as Gmail,
Outlook, or Apple Mail.
3. An email server: This is a computer system responsible for storing and forwarding emails to their
intended recipients.

To send an email:

1. Compose a new message in your email client.


2. Enter the recipient’s email address in the “To” field.
3. Add a subject line to summarize the content of the message.
4. Write the body of the message.
5. Attach any relevant files if needed.
6. Click “Send” to deliver the message to the recipient’s email server.
7. Emails can also include features such as cc (carbon copy) and bcc (blind carbon copy) to send copies of
the message to multiple recipients, and reply, reply all, and forward options to manage the
conversation.

Electronic Mail (e-mail) is one of most widely used services of Internet. This service allows an Internet user to
send a message in formatted manner (mail) to the other Internet user in any part of world. Message in mail
not only contain text, but it also contains images, audio and videos data. The person who is sending mail is
called sender and person who receives mail is called recipient. It is just like postal mail service.

Components of E-Mail System

The basic components of an email system are : User Agent (UA), Message Transfer Agent (MTA), Mail Box,
and Spool file.

User Agent (UA) : The UA is normally a program which is used to send and receive mail. Sometimes, it
is called as mail reader. It accepts variety of commands for composing, receiving and replying to
messages as well as for manipulation of the mailboxes.

15 / 25
uniti.md 2023-10-15

Message Transfer Agent (MTA): MTA is actually responsible for transfer of mail from one system to
another. To send a mail, a system must have client MTA and system MTA. It transfer mail to mailboxes
of recipients if they are connected in the same machine. It delivers mail to peer MTA if destination
mailbox is in another machine. The delivery from one MTA to another MTA is done by Simple Mail
Transfer Protocol.

Mailbox : It is a file on local hard drive to collect mails. Delivered mails are present in this file. The user
can read it delete it according to his/her requirement. To use e-mail system each user must have a
mailbox . Access to mailbox is only to owner of mailbox.
Spool file : This file contains mails that are to be sent. User agent appends outgoing mails in this file
using SMTP. MTA extracts pending mail from spool file for their delivery. E-mail allows one name, an
alias, to represent several different e-mail addresses. It is known as mailing list, Whenever user have to
sent a message, system checks recipient’s name against alias database. If mailing list is present for
defined alias, separate messages, one for each entry in the list, must be prepared and handed to MTA. If
for defined alias, there is no such mailing list is present, name itself becomes naming address and a
single message is delivered to mail transfer entity.

Services provided by E-mail system

1. Composition – The composition refer to process that creates messages and answers. For composition
any kind of text editor can be used.
2. Transfer – Transfer means sending procedure of mail i.e. from the sender to recipient.
3. Reporting – Reporting refers to confirmation for delivery of mail. It help user to check whether their
mail is delivered, lost or rejected.

16 / 25
uniti.md 2023-10-15

4. Displaying – It refers to present mail in form that is understand by the user.


5. Disposition – This step concern with recipient that what will recipient do after receiving mail i.e save
mail, delete before reading or delete after reading.

Advantages

1. Convenient and fast communication with individuals or groups globally.


2. Easy to store and search for past messages.
3. Ability to send and receive attachments such as documents, images, and videos.
4. Cost-effective compared to traditional mail and fax.
5. Available 24/7.

Disdvantages

1. Risk of spam and phishing attacks.


2. Overwhelming amount of emails can lead to information overload.
3. Can lead to decreased face-to-face communication and loss of personal touch.
4. Potential for miscommunication due to lack of tone and body language in written messages.
5. Technical issues, such as server outages, can disrupt email service.
6. It is important to use email responsibly and effectively, for example, by keeping the subject line clear
and concise, using proper etiquette, and protecting against security threats.

E-mail networks and servers

What is an email server?

An email server, also called a mail server, is essentially a computer system that sends and receives
emails.
When you send an email, it goes through a series of servers to reach its final destination.
While this process is lightning fast and efficient (thanks, technology!), there is a significant amount of
complexity behind sending and receiving emails.
Email communication involves complex protocols and processes.
Usually, the email server is a computer or machine that has a complete system with different
applications or services.
Based on the type of action they perform, email servers can be categorized into incoming and outgoing
email servers.
In the early days of the internet, during the Web1 phase, email senders had to rely on their own servers.
This led to the most widely-known email platforms that operate on private servers.
Today, anyone can still host their own server to effectively dodge any concerns related to security and
privacy on big email providers. And Axigen was designed to help everyone to do just that.

How Does An Email Server Work?

17 / 25
uniti.md 2023-10-15

For a computer system to function as a mail server, it must have mail server software installed. This software
then allows the system administrator to manage and create email accounts for any of the domains hosted on
the server.

Alongside that, you have protocols. Protocols are networking-software rules that allow computers to connect
to networks everywhere so you may shop online, send emails, and browse the internet freely. These protocols
are a vital component of your networking activity.

SMTP

The SMTP protocol handles any outgoing mail requests and sends emails.
So SMTP is short for Simple Mail Transfer Protocol and is the outgoing mail server.
We can think of SMTP as moving your email on and across networks. Without it, your emails wouldn’t
go anywhere.

POP / IMAP

For incoming mail servers, there are two main varieties — POP3 and IMAP.
POP3 servers, short for Post Office Protocol version 3, are best known for fetching the content of the
Inbox on your computer’s hard drive.
IMAP servers, short for Internet Message Access Protocol, are used for o way synchronization of the
entire mailbox.
IMAP can also function as a mail server’s alternate protocol retrieval program. And although there are
newer POP versions, which offer more features, the preferred protocol remains POP3 because it’s
simple, has a high rate of success, and gets the job done with a minimum of errors.
It even allows you to download your emails and read them while offline.
Without one of these protocols working correctly, your email would not reach your computer.

18 / 25
uniti.md 2023-10-15

What Is the Purpose of an Email Server?

At its simplest, a mail server collects and distributes emails to their intended destination. You can think
of it as a computer that acts as an electronic post office for email, which allows you to control the
transfer of emails within a network through different protocols.
A mail server can also encrypt the transfer of emails, so nobody can gain access to the information in
your personal email inbox.
Today’s mailboxes can include a treasure-trove of sensitive information from social media details to
financial data that hackers are eager to sell.
So it’s more important than ever to secure your emails.
To do just that, some email servers and server software can also provide additional security features to
guard against cybersecurity attacks.
Whether you’re checking your emails from your phone, at work, on the web, or by using a software
solution, your email is handled by both incoming and outgoing email servers.
Without this well-oiled machine of protocols and server software, you wouldn’t receive all of your
important messages or time-sensitive emails.
Additionally, problems with your incoming mail server may present challenges for your emails coming
in on time or at all.

E-mail Protocols

What is an email protocol?

An email protocol is a group of rules which ensure that emails are properly transmitted over the
Internet. In fact, there is a list of email protocols that handle email transactions. Thanks to them we are
able to send and receive emails from different machines, networks, and operating systems. Moreover,
these mail protocols allow you to access and manage your emails from various email programs and
devices.

The standard email protocol list includes:

1. SMTP
2. POP3
3. IMAP

What is SMTP?

SMTP stands for Simple Mail Transfer Protocol, and it is responsible for sending email messages. This
protocol is used by email clients and mail servers to exchange emails between computers.

19 / 25
uniti.md 2023-10-15

A mail client and the SMTP server communicate with each other over a connection established through
a particular email port.
Both entities are using SMTP commands and replies to process your outgoing emails.
Thanks to the Simple Mail Transfer Protocol, messages can be sent from the same account on different
email applications.

What is POP3?

The POP3 abbreviation stands for Post Office Protocol version 3, which provides access to an inbox
stored in an email server. It executes the download and deletes operations for messages.
Thus, when a POP3 client connects to the mail server, it retrieves all messages from the mailbox.
Then it stores them on your local computer and deletes them from the remote server.

20 / 25
uniti.md 2023-10-15

Thanks to this protocol, you are able to access the messages locally in offline mode as well.
Modern POP3 clients allow you to keep a copy of your messages on the server if you explicitly select
this option.

What is IMAP?

The Internet Message Access Protocol (IMAP) allows you to access and manage your email messages
on the email server.
This protocol permits you to manipulate folders, permanently delete and efficiently search through
messages.
It also gives you the option to set or remove email flags, or fetch email attributes selectively.
By default, all messages remain on the server until the user specifically deletes them.
IMAP supports the connection of multiple users to a single mail server.

Default email ports

Email ports are communication endpoints that define how a message should be transmitted. That
includes whether a message should be encrypted and exchanged securely.
To establish a connection between your email client and your mail server, you need the latter’s IP
address and a port number. These attributes are assigned by IANA (Internet Assigned Numbers
Authority).
Each protocol has its own port numbers to connect through and each port supports a different type of
encryption.

SMTP Ports

The available SMTP ports are four and each of them underlies a different type of encryption for email sending.

21 / 25
uniti.md 2023-10-15

25 – This port serves to send messages in plain text, although if the mail server supports it, it can be
encrypted with TLS. Therefore, many Internet service providers block it, as it represents a security risk.
Port 25 is an alternative to the SMTP port 25 and can be encrypted over TLS.
587 – This is the port IANA registered as the secure SMTP port, and it requires an explicit TLS
connection. However, if the email server does not support TLS, the message will be sent in plain text.
Port 465 works over an implicit SSL connection and if the server does not support it, the operation will
be aborted.

POP3 ports

Port 110 is the default POP3 port and it is not encrypted.


The encrypted port for POP3 is 995 and works over TLS/SSL.

IMAP ports

By default IMAP works on two ports like POP3:

143 – this is the default port which does not provide any encryption.
Port 993 is the secure port for IMAP and it works over TLS/SSL encryption.

What is the difference between SMTP, POP3, and IMAP?

Incoming vs. outgoing protocols

POP3 and IMAP are handling the incoming emails and they operate in different ways to retrieve or
access your email messages. Thus, they are considered mail access protocols.
On the other hand, the Simple Mail Transfer Protocol is behind the message transfer from server to
server, or mail client to server. As this is the protocol handling the email sending from an email account,
it is labeled as the outgoing protocol.
In short, thanks to IMAP and POP3, you are able to receive emails, and SMTP allows you to send
messages.

IMAP vs. POP3

As we already mentioned, both of these protocols relate to email retrieval. All modern servers support
both protocols, although they function in different manners.
While the POP3 protocol assumes that your email is being accessed only from one application, IMAP
allows simultaneous access by multiple clients.
This is why IMAP is more suitable for you, if you’re going to access your email from different locations
or if multiple users manage your messages.
On the other hand, POP3 downloads your emails to your local computer, deleting them from the server.
Thus, it reduces the space your email account uses on your web server.

To sum it up, there are 3 email protocols – SMTP, POP3, and IMAP. Each of them works on specific port
numbers and operates differently. If you are having trouble connecting to an incoming or outgoing
server, try using an alternative port number.

Structure of an E-mail
22 / 25
uniti.md 2023-10-15

Electronic Mail (e-mail) is one of the most widely used services of the Internet.
This service allows an Internet user to send a message in a formatted manner (mail) to other Internet
users in any part of the world.
Message in the mail not only contain text, but it also contains images, audio and videos data.
The person who is sending mail is called sender and person who receives mail is called the recipient. It
is just like postal mail service.

Format of E-mail

An e-mail consists of three parts that are as follows :

1. Envelope
2. Header
3. Body

Envelope:

The envelope part encapsulates the message.


It contains all information that is required for sending any e-mail such as destination address, priority
and security level.
The envelope is used by MTAs for routing message.

Header:

The header consists of a series of lines. Each header field consists of a single line of ASCII text specifying field
name, colon and value. The main header fields related to message transport are :

1. To: It specifies the DNS address of the primary recipient(s).


2. Cc : It refers to carbon copy. It specifies address of secondary recipient(s).
3. BCC: It refers to blind carbon copy. It is very similar to Cc. The only difference between Cc and Bcc is
that it allow user to send copy to the third party without primary and secondary recipient knowing
about this.
4. From : It specifies name of person who wrote message.
5. Sender : It specifies e-mail address of person who has sent message.
6. Received : It refers to identity of sender’s, data and also time message was received. It also contains the
information which is used to find bugs in routing system.
7. Return-Path: It is added by the message transfer agent. This part is used to specify how to get back to
the sender.

Body:

The body of a message contains text that is the actual content/message that needs to be sent, such as
“Employees who are eligible for the new health care program should contact their supervisors by next Friday if
they want to switch.” The message body also may include signatures or automatically generated text that is
inserted by the sender’s email system.

The above-discussed field is represented in tabular form as follows :

23 / 25
uniti.md 2023-10-15

Header Meaning

To: E-mail address of primary receipt(s).

Cc: E-mail address of secondary receipt(s).

Bcc: E-mail address for blind carbon copies.

From: Person or people who have created a message.

Sender: E-mail address of the actual sender.

Received: It is used to specify how to get back to the sender.

Return-Path It can be used to identify a path back to the sender.

In addition to above-discussed fields, the header may also contain a variety of other fields which are as
follows :

Header Meaning

Date: Date and time when the message was sent.

Reply-To: It contains e-mail address to which replies should be sent.

Message-Id: It refers to the unique number for referencing this message later.

24 / 25
uniti.md 2023-10-15

Header Meaning

In-Reply-To: Message-Id of a message to which this is as a reply.

References: It contains other relevant message-ids.

Keywords: User-chosen keywords.

Subject: It contains short summary of message for one-line display.

25 / 25

You might also like