Mail Server Documentation
Mail Server Documentation
Mail Server Documentation
INTRODUCTION
The Intranet mail server is communication software that helps the users of
an Intranet to communicate with electronic mails. The mail service in the Internet
is the most useful facility that enables the users of the Internet to send mails to any
one who can be anywhere in the world. There is some free mail service providers
such as HOTMAIL, YAHOO etc in the Internet. An user can have his account in
over its Intranet to facilitate electronic mail service. Also, the Intranet Mail
Since the system is a mail service. The system has to follow the Internet
standards. In technical point of view, there are two modules that are the Client
module and the Server module. There are two protocols that have to be
1
These protocols are nothing but set of commands. In IMS, both the server
and the client used these protocols i.e. the commands that are defined in these
The following figure shows the place where POP 3 and SMTP fit into the
1. Server
User Agent
2. Client
User Agent
2
HARDWARE SPECIFICATION
MEMORY : 64 MB RAM
3
SOFTWARE SPECIFICATION
LANGUAGE : JAVA
Features of Java
wanted the language to be not only reliable, portable and distributed but also
simple, compact and interactive. Sun Microsystems officially describes Java with
4
Compiled and Interpreted
combines both these approaches thus making Java a two-stage system. First, Java
compiler translates source code into what is known as byte code instructions. Byte
codes are not machine instructions and therefore, in the second stage, Java
interpreter generates machine code that can be directly executed by the machine
that is running the Java program. We can thus say that Java is both a compiled and
an interpreted language.
portability. Java programs can be easily moved from one computer system to
processors and system resources will not force any changes in Java programs. This
is the reason why Java has become a popular language for programming on
download a Java applet from a remote computer onto out local system via Internet
and execute it locally. This makes the Internet an extension of the user’s basic
applications.
Java ensures portability in two ways. First, Java compiler generates byte
code instructions that can be implemented on any machine. Secondly, the sizes of
Object-Oriented
5
Java is a true object-oriented language. Almost everything in Java is an
object. All program code and data reside within objects and classes. Java comes
with an extensive set of classes, arranged in packages, that we can use in our
programs by inheritance. The object model in Java is simple and easy to extend.
code. It has strict compile time and run time checking for data types. It is designed
which captures series errors and eliminates any risk of crashing the system.
Java systems not only verify all memory access but also ensure that no viruses are
Distributed
networks. It has the ability to share both data and programs. Java applications can
open and access remote objects on Internet as easily as they can do in a local
6
system. This enables multiple programmers at multiple remote locations to
Java is a small and simple language. Many features of C and C++ that are
either redundant or sources of unreliable code are not part of Java. For example,
Java does not use pointers, preprocessor header files, goto statement and many
Java uses many constructs of C and C++ and therefore, Java code “looks like a
multithreaded programs. This means that we need not wait for the application to
finish one task before beginning another. For example, we can listen to an audio
clip while scrolling a page and at the same time download an applet from a distant
applications.
The Java runtime comes with tools that support multiprocess synchronization and
7
High Performance
the use of intermediate byte code. According to Sun, Java speed is comparable to
the native C/C++. Java architecture is also designed to reduce overheads during
class libraries, methods, and objects. Java can also determine the type of class
C++. These functions are known as native methods. This facility enables the
8
2. SYSTEM ANALYSIS
PROBLEM DEFINITION
The initial state of the project is to either enter as an Administrator or
already registered user. The Administrator has the rights to create or delete a
particular user name, change the password and a separate inbox, compose, address
book is provided for the Administrator. After creating id for the user by the
administrator the user has the rights to enter into Intranet. The user alone is also
The main aim is to provide all the information that are needed by the user
SYSTEM STUDY
System survey is a general term that refers an orderly, structural process for
methodology, since it relates to four significant phase in the life cycle of all
Definition of system analysis includes not only the process of analysis but also
synthesis, which is the process of putting part together to form a new whole.
system. Mailing System enables one to send not only instant message but also to
exchange files with anyone across the network. This project was developed using
9
The other mailing system wholly relies on the mail server for its entire
This project handles all the jobs related to mails. The man-hours involved
for transferring data can be reduced within an organization by using this mail
facility. By entering the id and password the user or administrator can directly look
into the information regarding mails. Hence, the security is maintained in the
proposed system.
the difficulties faced in the other mailing system. Hence, the mailing system is
and password.
An address book provision is given for each user to store address and
mail ids.
The users are also provided with the facility to reply and forward
communication gap between users whether it may be between higher authority and
since its basic modules can be enhanced. JAVA supports the security system and
11
3. SYSTEM DESIGN
The system design is the most creative and challenging phase. This is the
implementation. Design is the first step in the development phase for any
The design will determine the success of the system. Based on the proposed
system objectives, the major modules are identified and the operations to be
System design involves first logical design and then physical construction
of the system. The first step in the design phase is to determine how the output
produced and in what format and the second step consider about the input data.
testing. Software design resides at the technical kernel of the software engineering
12
process and is applied regardless of the development paradigm that is used.
Software design is the first of three technical activities – design, code and test that
SENDER MODULE
NO
IS THE
OUT BASKET USER
LOGIN
YES
RECEIVER MODULE
IN BASKET
13
3.1.1 DATA FLOW DIAGRAM
Mail
Server
Server
Main
SMTP SMTP
Listener Listener
POP3 POP3
Listener Listener
SMTP SMTP
Handler Handler
POP3 POP3
Handler Handler
Server Server
SMTP SMTP
Server Server
POP3 POP3
14
Client Client
SMTP SMTP
Client Client
MODULE SPECIFICATION
There are two modules in the intranet mail server. They are
Client module and
Server module
CLIENT MODULE
15
some of the topics in this documentation apply only when Outlook is used in
conjunction with Microsoft Exchange Server, because that is the mode most
commonly used to develop solutions based on Outlook.
The mailing client is Out Look Express. Some of the features of Out Look
Express are:
Microsoft Office Outlook 2003 introduces a new file format for Personal
Folders files (.pst) that offers greater storage capacity for items and folders and
supports multilingual Unicode data. A file created with the new Microsoft Outlook
Personal Folders file (.pst) format is not compatible with earlier versions of
Outlook. For compatibility with earlier versions of Outlook, create a file by using
the Microsoft Outlook 97-2002 Personal Folders file (.pst) format. Outlook
Express can view and create files of either type.
Unicode Support
View a Share Point event list next to your Calendar and drag events from
the Share Point event list to your Calendar. We can also view Share Point contact
lists from within Outlook and copy and link these to your Contacts. If we have
access to a Microsoft Share Point Portal Server Web site, we can store a central
calendar or contacts list on the server, for easy sharing of information.
POP enhancements
16
Download speed has been significantly increased, and we now get detailed
progress information.
Tablet PC support
On a Tablet PC, you can quickly provide input using your own handwriting
directly into Office documents as we would use a pen and a printout. Additionally,
we can now view task panes horizontally to help we do our work on the Tablet PC
the way we want to do our work.
The new Research task pane offers a wide variety of reference information
and expanded resources if we have an Internet connection. We can conduct
research on topics using an encyclopedia, Web search, or by accessing third-party
content.
17
Additionally, error reporting and error messages have been improved so that we
are provided with the easiest approach to reporting errors and the most helpful
information about alerts at the time you encounter a problem. Finally, with an
Internet connection, we can give Microsoft customer feedback about an Office
program; help content, or Microsoft Office Online content. Microsoft is
continually adding and improving content based on our feedback.
Global Address Book (GAB) module. Centralized address book which can be
accessed through a web browser from any machine in the network.
Improved handling of various email clients.
Behavior of "Retrieve new mails only" option. Earlier mails were marked as
"read".
Web-based access to users' mailbox. - Intranet Mail Server users can access
their mailbox from anywhere in the LAN.
2. POP3 polling under automatic mode - Checks for mails at regular intervals.
18
1. Support for multiple mailboxes within your own domain name. eg:
(anyusername@yourcompany.com) Typically when your ISP gives a POP3
mailbox which does the "catch all" for the mails received for
anyuser@yourdomain.com Intranet Mail Server turns these individual
mailboxes into virtual POP3 boxes with in the network.
2. Supports multiple POP3 accounts even from different domain names
3. Password protected mailboxes for each user.
4. Intranet email server - Routes mail to the same email domain locally,
without the need to access your ISP
5. "Auto responder" facility for each user account to send a custom message
automatically.
6. Email forwarding: Option to forward mails received by an user to another
email address. This feature can be used for several purposes by the user. To
mark a copy of messages received by an user to another user,
7. Rules Manager to filter messages based on keywords or phrases. we can
also use this mail filtering facility to choose important/confidential
messages to be delivered to your inbox or just trash those messages with
abusive or junk content.
Other features:-
19
SERVER MODULE
It is important to realize that transport systems (or IPCEs) are not one-to-
one with networks. A process can communicate directly with another process
through any mutually known IPCE. Mail is an application or use of interprocess
communication. Mail can be communicated between processes in different IPCEs
by relaying through a process connected to two (or more) IPCEs. More
specifically, mail can be relayed between hosts on different transport systems by a
host on both transport systems.
The mail commands and replies have a rigid syntax. Replies also have a
numeric code. In the following, examples appear which use actual commands and
replies. The complete lists of commands and replies appears in Section 4 on
21
specifications.
Commands and replies are not case sensitive. That is, a command or
reply word may be upper case, lower case, or any mixture of upper and lower case.
Note that this is not true of mailbox user names. For some hosts the user name is
case sensitive, and SMTP implementations must take case to preserve the case of
user names as they appear in mailbox arguments. Host names are not case
sensitive. Commands and replies are composed of characters from the ASCII
character set [1]. When the transport service provides an 8-bit byte (octet)
transmission channel, each 7-bit character is transmitted right justified in an octet
with the high order bit cleared to zero.
This section presents the procedures used in SMTP in several parts. First
comes the basic mail procedure defined as a mail transaction. Following this are
descriptions of forwarding mail, verifying mailbox names and expanding mailing
The <reverse-path> can contain more than just a mailbox. The <reverse-
path> is a reverse source routing list of hosts and source mailbox. The first host in
the <reverse-path> should be the host sending this command. The second step in
the procedure is the RCPT command.
the destination mailbox. The first host in the <forward-path> should be the host
receiving this command. The third step in the procedure is the DATA command.
DATA <CRLF>
Since the mail data is sent on the transmission channel the end of the mail
data must be indicated so that the command and reply dialog can be resumed.
SMTP indicates the end of the mail data by sending a line containing only a
period. A transparency procedure is used to prevent this.
The mail data includes the memo header items such as Date, Subject, To,
Cc and from. The end of mail data indicator also confirms the mail transaction and
tells the receiver-SMTP to now process the stored recipients and mail data. If
accepted, the receiver-SMTP returns OK reply. The DATA command should fail
23
only if the mail transaction was incomplete (for example, no recipients), or if
resources are not available.
Basic Operation
Initially, the server host starts the POP3 service by listening on TCP port
110. When a client host wishes to make use of the service, it establishes a TCP
connection with the server host. When the connection is established, the POP3
server sends a greeting. The client and POP3 server then exchange commands and
responses (respectively) until the connection is closed or aborted.
begins with the termination octet, the line is "byte-stuffed" by pre-pending the
termination octet to that line of the response.
A POP3 server MAY have an inactivity auto logout timer. Such a timer
MUST be of at least 10 minutes' duration. The receipt of any command from the
client during that interval should suffice to reset the auto logout timer. When the
timer expires, the session does NOT enter the UPDATE state--the server should
close the TCP connection without removing any messages or sending any response
to the client.
26
4. SYSTEM TESTING AND IMPLEMENTATION
TESTING
Testing is the set of activities that can be planned in advance and conducted
errors.
SYSTEM TESTING
represents the ultimate view of specification, design and coding. The user tests the
developed system and changes are made according to their needs. The testing
phase involves the testing of developed system using various kinds of data.
system tested with the best case values and worst case values for its response and
not produce an undesirable runtime errors and providing the user with proper
works at all levels and effective before live operation starts. The system test
before implementation should give confirmation that all is correct and it provides
27
is to fully exercise the computer-based system. System testing is the state of
implementation that is aimed at assuring that the system works accurately and
efficiently before the operations commence. Testing is vital to the success of the
system. System testing makes the logical assumption that if all the parts of the
system are correct, the goal will be successfully achieved. The candidate system is
subject to variety of tests. A series of testing is performed for the proposed system
1. Module Testing
2. Integration Testing
Module Testing
Unit testing focuses verification effort on the smallest unit of the software
design module. This is known as module testing. The modules of the Job
Consultancy Management System are tested separately. This testing was carried
out during programming stage itself. In this testing step each module was found to
be working satisfactorily with regard to the expected output from the module.
Integration Testing
Data can be lost across an interface; one module can have an adverse effect
on another, sub functions when combined, may not produce the desired major
associated with in the interface. The objective is to take unit tested modules and to
28
build a program structure. All the modules are combined and tested as a whole.
vast expenses of the entire program. Thus in the integration testing step, all the
User acceptance is a key factor for a success of any system. The system
with the perspective system users at the time of developing and making changes
whenever required. Preparation of test data plays a vital role in the system testing.
After preparing the test data, the system under study is tested using the test data.
While testing the system using the test data errors are again uncovered. These
errors are again corrected by using the above testing steps and corrections are also
IMPLEMENTATION
operation.
29
1. Implementation of computer system to the replacement of manual
system.
existing one.
30
5. CONCLUSION AND SUGGESTIONS
CONCLUSION
tested and documented completely. Hence, the same project could be used so far
chosen JAVA. The server module is coded using JAVA Servlets. This software is
attractive and it allows easy way to use mail for the user. The online time project is
SUGGESTIONS
31
Including certain needs can extend this project. Amidst a lot of advantages,
Express.
Creation, deletion and updating of folders can be done. Also, an e group can
BIBLIOGRAPHY
32
33
A-1 CREATING AN IDENTITY
34
A-2 GIVING THE DETAILS OF THE CLIENT
35
A-3 CREATING THE MAILING ADDRESS
36
SETTING THE IP ADDRESS TO THE CLIENT
37
SETTING THE PASSWORD TO THE CLIENT
38
GIVING THE DETAILS OF THE CLIENT
39
SETTING THE IP ADDRESS TO THE CLIENT
40
SETTING THE PASSWORD TO THE CLIENT
41
SENDING THE MESSGAGE
42
RECEIVING THE MESSAGE
43
B-1 SERVER FORM
44
B-2 DETAILS OF THE MESSAGE
45