Tag Archives: GSM

E-mail. Advatages and Disadvateages of E-mail.

E-mail

The abbreviated form of an Electronic mail is ‘E-mail’. E-mail is a system of creating, sending and storing textual data in digital form over a network. Earlier, the e-mail system was based on Simple Mail Transfer Protocol (SMTP) mechanism, a protocol used in sending the e-mails from one server to another. Today’s e-mail technology uses the store-and-forward model. In this model, the users sends and receives information on their own computer terminal. However, the computer is used only for connecting to the e-mail architecture. The creation, transmission and storage of e-mail takes place, only when the connection with this e-mail architecture is established.

E-mail is one of the many technological developments that has influenced our lives. It has changed the medium of communication. So, it becomes necessary for us to check out the benefits and harmful effects of this popular tool used on the Internet.

Advantages of Email
The benefits of e-mail are huge in number.

  • Easy to use: E-mail frees us from the tedious task of managing data of daily use. It helps us to manage our contacts, send mails quickly, maintain our mail history, store the required information, etc.
  • Speed: The e-mail is delivered instantly, anywhere across the globe. No other service matches the e-mail in terms of speed.
  • Easy to prioritize: Since the mails have subject lines, it is easy to prioritize them and ignore unwanted mails.
  • Reliable and secure: Constant efforts are being taken to improve the security in electronic mails. Thus making it one of the secured ways of communication.
  • Informal and conversational: The language used in e-mails is generally simple and thus makes the communication informal. Sending and receiving e-mails takes less time, so it can be used as a tool for interaction.
  • Easier for reference: When one needs to reply to a mail, there is a provision in the mailing system to attach the previous mails as references. This refreshes the recipient’s knowledge, on what he is reading.
  • Automated e-mails: It is possible to send automated e-mails using special programs like the autoresponders. The autoresponders reply back to the sender with generalized pre-written text messages.
  • Environment friendly: Postal mails use paper as a medium to send letters. Electronic mail thus, saves a lot of trees from being axed. It also saves fuel needed in transportation.
  • Use of graphics: Colorful greeting cards and interesting pictures can be sent through e-mails. This adds value to the e-mail service.
  • Advertising tool: Many individuals and companies are using e-mails to advertise their products, services, etc.

Disadvantages of Email
The e-mails, though beneficial in our day-to-day life, has got its own drawbacks that are off late coming to the fore.

  • Viruses: These are computer programs having the potential to harm a computer system. These programs copy themselves and further infect the computer. The recipient needs to scan the mails, as viruses are transmitted through them and have the potential to harm computer systems.
  • Spam: E-mails when used to send unsolicited messages and unwanted advertisements create nuisance and is termed as Spam. Checking and deleting these unwanted mails can unnecessarily consume a lot of time, and it has become necessary to block or filter the unwanted e-mails by means of spam filters. Spamming includes, sending hoax e-mails. E-mail spoofing is another common practice, used for spamming. Spoofing involves deceiving the recipient by altering the e-mail headers or the addresses from which the mail is sent.
  • Hacking: The act of breaking into computer security is termed as hacking. After the e-mail is sent and before it is received by the desired recipient, it “bounces” between servers located in different parts of the world. Hence, the e-mail can be hacked by a professional hacker.
  • Misinterpretation: One has to be careful while posting any kind of content through an e-mail. If typed in a hurry, the matter could be misinterpreted.
  • Lengthy mails: If the mail is too long and not properly presented the reader may lose interest in reading it.
  • Not suitable for business: Since the content posted via e-mails is considered informal, there is a chance of business documents going unnoticed. Thus, urgent transactions and especially those requiring signatures are not managed through e-mails.
  • Crowded inbox: Over a period of time, the e-mail inbox may get crowded with mails. It becomes difficult for the user to manage such a huge chunk of mails.
  • Need to check the inbox regularly: In order to be updated, one has to check his e-mail account regularly.

 

 

                   Parts of an email message

An email message consists of the following general components:

Headers

The message headers contain information concerning the sender and recipients. The exact content of mail headers can vary depending on the email system that generated the message. Generally, headers contain the following information:

  • Subject. This is what appears in most email systems that list email messages individually. A subject line could be something like “2005 company mission statement” or, if your spam filtering application is too lenient, “Lose weight fast!!! Ask me how.”
  • Sender (From). This is the senders Internet email address. It is usually presumed to be the same as the Reply-to address, unless a different one is provided.
  • Date and time received (On). The time the message was received.
  • Reply-to. This is the Internet email address that will become the recipient of your reply if you click the Reply button.
  • Recipient (To:). First/last name of email recipient, as configured by the sender.
  • Recipient email address. The Internet mail address of the recipient, or where the message was actually sent.

Body

The body of a message contains text that is the actual content, such as “Employees who are eligible for the new health care program should contact their supervisors by next Friday if they want to switch.”  The message body also may include signatures or automatically generated text that is inserted by the sender’s email system.

AttachmentsThese are optional and include any separate files that may be part of the mess

Internet Mail Protocols

Internet Mail Protocols

There are currently three main Internet Email Protocols, SMTP, POP3, and IMAP4. Also there is ODMR which is a variation of SMTP. (There are several other mail protocols, eg UUCP which are currently less widely used, and aren’t currently supported by VPOP3). IMAP4 is only supported by VPOP3 Enterprise, not by VPOP3 Standard.

SMTP Protocol

SMTP (Simple Mail Transfer Protocol) is really intended for permanent connections to the Internet. The SMTP ‘client’ connects to an SMTP ‘server’ to send a message. There is no way to request a specific message using SMTP, but there are extensions to request a server to start sending any messages it has.

When messages are sent using SMTP it is sent in two parts:

1) An Envelope – this contains the email address it was sent from (typically for error reports) and a list of people to receive the message. This is not normally seen by users.

2) The message Data – this contains the message that you typically see.

The Envelope may contain a copy of the information in the Data’s From: and To: header fields, but it may contain other information which is not contained in the message at all (for instance, for mailing list messages or if BCC addressing is used).

If you have an SMTP account with your Internet Provider, then you need to run an SMTP ‘server’ (e.g. VPOP3) on your PC, and then somehow tell your Internet Provider to start sending messages to it after you’ve connected. Some Internet Providers can automatically detect you dialing into them, and immediately start sending mail to your SMTP server. Other Internet Providers need you to issue an SMTP command such as ETRN to their server to trigger mail delivery.

A few Internet Providers require a non-standard action, such as sending a ‘Finger’ command  to their server to trigger mail delivery. You can use an external program, set as the VPOP3 Post-Connection Extension to issue this command.

Once SMTP mail delivery has started there is really no way for the server to reject messages based on any other criteria apart from the data contained in the Envelope (i.e. From or To addresses). Also, once the message has been sent to an SMTP server, the client typically discards its copy.

This means that if VPOP3 is running as your SMTP server to receive mail from your Internet Provider, some useful features such as being able to limit message download size, the Download Rules, leaving messages on the ISP server etc, cannot be used. VPOP3’s SMTP Rules can perform many actions you may require, but they are not as flexible as Download Rules, because VPOP3 cannot see the message header without receiving the entire message.

When sending messages to another site, there are really two ways of doing this, both of which are typically accepted:

The mail server can send the message directly to the destination site’s mail server

The mail server can send the message to a relay-server which then sends the message to the destination site.

We recommend the use of the second method. Some of the reasons for this are:

It is easier to configure, and fits in with most users’ understanding of how mail works.

It is a lot quicker over a dial-up connection. If the first method is used, then any message to more than one recipient typically has to be sent multiple times (once for each recipient). There is also a lot of querying of DNS servers which can be time consuming.

Many Internet Providers (eg AOL) will reject mail that comes directly from a computer on a dial-up connection, as an anti-spam protection method.

 

ODMR Protocol

The ODMR (On Demand Mail Relay) protocol is a variation on SMTP which has been designed to allow SMTP mail delivery to a dynamic IP address. With ODMR, the ODMR client (VPOP3) connects to an ODMR server (at the ISP), logs on with the ISP account details, and from then on acts identically to an SMTP server (so the ODMR client becomes the SMTP server, and the ODMR server becomes the SMTP client).

This allows the advantages of SMTP without requiring a static IP address.

POP3 Protocol

POP3 (Post Office Protocol Version 3) was created for dial-up Internet accounts because of the limitations with the SMTP protocol. When collecting mail from an ISP using POP3, the ‘client’ is the PC at the user’s end, and it is in total control of what messages it receives and which ones it doesn’t.

The POP3 client can also typically view message headers without downloading the entire message, see the message size before downloading it, delete messages without downloading them, or leave messages on the server after downloading them. Because of these POP3 facilities, VPOP3 can do a lot more to help you.

One of the normal problems which occurs if multiple email addresses are directed to a single POP3 mailbox is that the SMTP Envelope (see above) is lost when the message is placed in the mailbox. This means that the explicit message routing information is lost, and all that VPOP3 has to go on is the data in the message headers (eg To, Cc etc). This can cause problems if you receive messages from mailing lists or which include Bccs. Some ISPs get around these problems by extending the POP3 protocol (eg Demon Internet Services do this) or adding special message header fields which VPOP3 can use if you tell it about them.

 

IMAP4 Protocol

IMAP4 (Internet Mail Access Protocol V4) is an email protocol which is sometimes used instead of the POP3 protocol. With IMAP4 email is stored on the mail server and can be accessed from any IMAP4 email client on the network. With POP3 email is downloaded to the mail client where it is accessed.

When using IMAP4 many of the functions of the email client are performed by the mail server instead. This includes things such as searching for messages, moving messages between folders etc.

In most cases the user will not know any difference between using IMAP4 or using POP3, so use whichever is more appropriate.

IMAP4 has some advantages in some situations:

  1. Because all email is stored on the mail server it is easier to backup all email in one batch.
  2. Users can access their email from anywhere on the network, so if your users do not have a fixed computer to use, IMAP4 can be the solution
  3. Users can share mailboxes. The IMAP4 protocol allows several people to log onto a mailbox at once to read messages. This can be useful for ‘noticeboard’ type applications. Access Control Lists allow you to restrict which users can do which tasks in a mailbox.

There are some disadvantages to using IMAP4:

  1. Because all mail has to be transferred over the network as it is read it can be slower than reading mail from the local PC where it has been downloaded to using POP3
  2. The load on the network is usually much more. Mail is transferred every time it is read, so if a user reads a message at 10 different times, the message is transferred over the network 10 times rather than just once.

 

  1. The load on the mail server is much more than with the POP3 protocol. Searching for messages etc will increase the load even more
  2. The mail server needs much more mail storage space. When using POP3 the mail is stored on a user’s own PC so the server is not usually affected by large amounts of mail.
  3. IMAP4 was not originally designed for remote users. Some email clients allow offline access to IMAP4 mailboxes but because this is not what the protocol was designed for, it can sometimes be unintuitive. The POP3 protocol was designed for remote users, so it is often more efficient and more intuitive.
  4. The IMAP4 protocol is not supported by the Standard VPOP3 software, only by VPOP3 Enterprise.

 

 

Internet Routing Protocol

Internet Routing

How does Internet routing work? IP addresses and packet switching provide the technical infrastructure which routing protocols use to transmit packets across the Internet. The Internet Protocol transfers packets between networks and provides the software bridge that knits the whole thing together.

Robert Kahn and Vinton Cerf invented the basic architecture of Internet routing along with their development of the TCP/IP networking protocol

TYPES OF INTERNET ROUTING PROTOCOLS;

Interior Gateway Protocols (IGP)

Exterior Gateway Protocol (EGP)

INTERIOR GATEWAY PROTOCOLS

Interior Gateway protocols (IGP) are used to route Internet communications within a local area network, such as within an office building. The two main types of IGP protocols are described in the following sections, along with an example proprietary protocol for comparison purposes.

Routing Information Protocol (RIP)

Open Shortest Path First (OSPF)

Interior Gateway Routing Protocol (IGRP).

 

ROUTING INFORMATION PROTOCOL

The Routing Information Protocol (RIP) provides the standard IGP protocol for local area networks, and provides great network stability, guaranteeing that if one network connection goes down the network can quickly adapt to send packets through another connection. All RIP routing protocols are based on a distance vector algorithm called the Bellman-Ford algorithm, after Bellman’s development of the equation used as the basis of dynamic programming, and Ford’s early work in the area.

What makes RIP work is a routing database that stores information on the fastest route from computer to computer, an update process that enables each router to tell other routers which route is the fastest from its point of view, and an update algorithm that enables each router to update its database with the fastest route communicated from neighboring routers.

OPEN SHORTEST PATH FIRST

Open Shortest Path First (OSPF) is a particularly efficient IGP routing protocol that is faster than RIP, but also more complex.

The OSPF routing algorithm was created to provide an alternative to RIP, based on Shortest Path First algorithms instead of the Bellman-Ford algorithm. It uses a tree that describes the network topology to define the shortest path from each router to each destination address. Since OSPF keeps track of entire paths, it has more overhead than RIP, but provides more options. The main difference between OSPF and RIP is that RIP only keeps track of the closest router for each destination address, while OSPF keeps track of a complete topological database of all connections in the local network..

Interior Gateway Routing Protocol (IGRP)

Enhanced IGRP uses the same distance vector algorithm and distance information as IGRP. However, the convergence properties and the operating efficiency of enhanced IGRP have improved significantly.

The convergence technology is based on research conducted at SRI International and employs an algorithm referred to as the Diffusing Update Algorithm (DUAL). This algorithm guarantees loop-free operation at every instant throughout a route computation and allows all routers involved in a topology change to synchronize at the same time. Routers that are not affected by topology changes are not involved in re-computations.

The convergence time with DUAL rivals that of any other existing routing protocol. The initial implementation of IGRP operated in Internet Protocol (IP) networks. Enhanced IGRP extends IGRP so that it is independent of the network-layer protocol. In addition to IP, it now also operates in AppleTalk and Novell IPX networks.

Exterior Gateway Protocols (EGP)

While IGP protocols are used within local networks, Exterior Gateway Protocols (EGP) are used for routing between networks, generally on the Internet backbone itself, linking the different networks together. The following sections provide more information on the two common EGP protocols:

Border Gateway Protocol (BGP)

Exterior Gateway Protocol (EGP).

Border Gateway Protocol (BGP)

The most common Exterior Gateway Protocol in use on the Internet is the Border Gateway Protocol (BGP), ensuring that packets get to their destination network regardless of current network conditions.

Like RIP, the BGP algorithm provides great network stability, guaranteeing that if one Internet network line goes down, BGP routers can quickly adapt to send packets through another connection.

When a BGP router first comes up on the Internet, either for the first time or after being turned off, it establishes connections with the other BGP routers with which it directly communicates. The first thing it does is download the entire routing table of each neighboring router. After that it only exchanges much shorter update messages with other routers.

BGP routers send and receive update messages to indicate a change in the preferred path to reach a computer with a given IP address. If the router decides to update its own routing tables because this new path is better, then it will subsequently propagate this information to all of the other neighboring BGP routers to which it is connected, and they will in turn decide whether to update their own tables and propagate the information further.

Exterior Gateway Protocol (EGP)

This protocol is used throughout the 1980’s and into the mid-1990 was also somewhat confusingly named EGP. However, the EGP protocol had several problems, most notably an inability to scale up to support the growth in the size of the Internet Gateway Protocol (EGP).

Gulzar group of Institutes

Gulzar Group of Institutes has been set up under the aegis of Gulzar Educational & Charitable Trust. The corner stone of any enterprising and progressive society is strong fundamental education that empowers its youth to take risks, innovate and have the courage of their convictions to pursue their dreams and achieve success.

Vision:
To be ranked amongst the best private tertiary education institutions in the country.

Bird Eye View of GGI

Mission:
Our mission is to evolve, synthesize and spread the power of knowledge to arm generations to come through world class initiatives and academic practices that focuses on overall development of students. GGI college also equally emphasizes on developing develop competent, committed and compassionate leaders who will make a difference to the people among whom they work. It constantly scans the developments in business and in society and tries proactively to meet the challenges. Our unrelenting focus on providing education is relevant to current and future industry requirements:

  • Adhering to our stringent quality policy. Adopting the latest and well researched teaching pedagogy.
  • Constantly liaising with industry and adapting course content to meet their human resource requirements.
  • Consistently maintaining our core values of Transparency, Innovation, Trust and Excellence in all our actions.
  • Excel as an intellectually vibrant, technologically advanced & research-centered institution, which will be dynamically proactive to the ever-changing needs of the field of engineering and society.

Quality Policy & Objective

  • To create a conducive teaching environment.
  • To provide quality education to the students and access to the advanced work culture.
  • To provide exposure to new and emerging technologies.
  • To prepare technocrats who can compete successfully with the best in the world.
  • To develop strong links with other academic and research institutes in the country and abroad.
  • To develop a close collaboration with industry and develop an effective placement organization.