Final year project report on Internet And Interanet Emailing server

59
Page | 1 INTRODUCTION 1.1. PROJECT DESCRIPTION This project is about developing a web based mail client connecting to windows server running a Mail Server. Today’s world is all depend upon email system. It also becomes a significant need of the businesses. That’s where, professionals must know mailing system and aware with that, how it works, how can to create a self-hosted mailing system and other technical aspects To give learners a wide knowledge about it, here, we make available Free Php projects for students along with source code. Students can download this free source from the website easily. Source code will help you to understand and modify the software in an effortless manner. This project has the following main functionality. Electronic mail, most commonly referred to as email or e-mail since c 1993, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required the author and the recipient to both be online at the same time, in common with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to a mail server, for as long as it takes to send or receive messages. Historically, the term electronic mail was used generically for any electronic document transmission. For example, several writers in the early 1970s used the term to describe fax document transmission. As a result, it is difficult to find the first citation for the use of the term with the more specific meaning it has today. An Internet email message consists of three components, the message envelope, the message header, and the message body. The message header contains control information, including, minimally, an originator's email address and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp. Originally a text-only (ASCII) communications medium, Internet email was extended to carry, e.g. text in other character sets, multi-media content attachments, a process standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called Multipurpose Internet Mail Extensions (MIME). Subsequent RFCs have proposed standards for internationalized email addresses using UTF-8. Electronic mail predates the inception of the Internet and was in fact a crucial tool in creating it,[5] but the history of modern, global Internet email services reaches back to the early ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC 561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the current services. An email message sent in the early 1970s looks quite similar to a basic text message sent on the Internet today.

Transcript of Final year project report on Internet And Interanet Emailing server

Page 1: Final year project report on Internet And Interanet Emailing server

Page | 1

INTRODUCTION

1.1. PROJECT DESCRIPTION

This project is about developing a web based mail client connecting to windows server

running a Mail Server. Today’s world is all depend upon email system. It also becomes a

significant need of the businesses. That’s where, professionals must know mailing system and

aware with that, how it works, how can to create a self-hosted mailing system and other

technical aspects To give learners a wide knowledge about it, here, we make available Free

Php projects for students along with source code. Students can download this free source

from the website easily. Source code will help you to understand and modify the software in

an effortless manner. This project has the following main functionality.

Electronic mail, most commonly referred to as email or e-mail since c 1993, is a method of

exchanging digital messages from an author to one or more recipients. Modern email operates

across the Internet or other computer networks. Some early email systems required the author

and the recipient to both be online at the same time, in common with instant messaging.

Today's email systems are based on a store-and-forward model. Email servers accept,

forward, deliver, and store messages. Neither the users nor their computers are required to be

online simultaneously; they need connect only briefly, typically to a mail server, for as long

as it takes to send or receive messages. Historically, the term electronic mail was used

generically for any electronic document transmission. For example, several writers in the

early 1970s used the term to describe fax document transmission. As a result, it is difficult to

find the first citation for the use of the term with the more specific meaning it has today.

An Internet email message consists of three components, the message envelope, the message

header, and the message body. The message header contains control information, including,

minimally, an originator's email address and one or more recipient addresses. Usually

descriptive information is also added, such as a subject header field and a message

submission date/time stamp.

Originally a text-only (ASCII) communications medium, Internet email was extended to

carry, e.g. text in other character sets, multi-media content attachments, a process

standardized in RFC 2045 through 2049. Collectively, these RFCs have come to be called

Multipurpose Internet Mail Extensions (MIME). Subsequent RFCs have proposed standards

for internationalized email addresses using UTF-8.

Electronic mail predates the inception of the Internet and was in fact a crucial tool in creating

it,[5] but the history of modern, global Internet email services reaches back to the early

ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC

561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the

current services. An email message sent in the early 1970s looks quite similar to a basic text

message sent on the Internet today.

Page 2: Final year project report on Internet And Interanet Emailing server

Page | 2

Email is an information and communications technology. It uses technology to communicate

a digital message over the Internet. Users use email differently, based on how they think

about it. There are many software platforms available to send and receive. Popular email

platforms include Gmail, Hotmail, Yahoo! Mail, Outlook, and many others.

Network-based email was initially exchanged on the ARPANET in extensions to the File

Transfer Protocol (FTP), but is now carried by the Simple Mail Transfer Protocol (SMTP),

first published as Internet standard 10 (RFC 821) in 1982. In the process of transporting email

messages between systems, SMTP communicates delivery parameters using a message

envelope separate from the message (header and body) itself.

1. Receiving/Sending/Organizing mails.

2. Sending mail using send mail.

3. Performing Admin functions like managing new user, resetting passwords etc.

4. Compose an email.

5. Send an email

6. Receive an email

7. Saving an email in the form of draft

8. Showing the detail of the received mail

9. Saving the email ids in contact list

10. Secured by password

11. Recovery of the password

1.1.1 What is E-mail?

1. What is Email?

Electronic mail (email) is the term given to an electronic message, usually a form of simple

text message,that a user types at a computer system and is transmitted over some form of

computer network to another user, who can read it.

Email once consisted of a number of proprietary email systems. Originally these email

systems could only send and receive email in an office where every person was equipped

with the same software. With the expansion of the Internet, some manufacturers of these

proprietary email systems introduced the capability of connecting to the Internet for the

transfer of messages outside of the local network. This can take the form of a software

interface that converts the local messages into a recognized standard form suitable for

transfer over the Internet. These systems are more common in establishments that have used

email for longer than most, and are renowned for minor problems with access to global

Internet email, (e.g. problems with sending or receiving attachments) however such problems

are slowly disappearing. There is a page containing a brief history of email if you are

interested. Since the Internet has grown in popularity, proprietary systems have become less

popular, with more businesses moving over to Internet standards for local network mail

services. This has the advantages of usually being less expensive, simpler, no longer being

tied to a particular vendor and allows the IT Manager to have a wider choice of email client

applications, or different hardware platforms.

Page 3: Final year project report on Internet And Interanet Emailing server

Page | 3

2. What are the benefits of Email?

Email has become one of the driving forces behind connecting businesses to the Internet. It

offers fast, economical transfer of messages anywhere in the world. As local telephone calls

are free in most parts of the US, messages destined to long-distance destinations become

effectively free to send. Outside of the US, local calls tend to be chargeable, therefore the

email system can reduce the telephone bill considerably. The substantial cost-cutting

associated with these facts have encouraged many businesses to invest in an implementation

of email services. Email has considerable benefits over traditional paper based memo's and

postal systems:

Messages can be sent at any time across the world as easily as across the office, to a group of

people or a single recipient, without the sender leaving their desk. Messages can be logged,

ensuring some form of record is held, and messages are stored when the recipient is away

from their desk. The recipient can collect their mail when they want, from wherever they are.

Mobile users can collect their mail whilst out visiting customers, or at other locations. The

person you are sending the message to gets it directly, without passing through any third

party. Environmentally friendly! Unless requested, email messages require no paper or

resources other than storage space on a computer disk drive.

3. What is an email client?

An email client is an application that is used to read, write and send email. In simple terms it

is the user interface to the email system. The client usually consists of a combination of a

simple text editor, address book, filing cabinet and communications module. The text editor

allows for the creation of the message itself, and usually includes simple spell checking and

formatting facilities. The ability to allow files or documents to be attached to the message is

also available. For example a diagram or schematic could be attached to an email message,

offering the recipient the chance to see a project's progress, and comment on it with a reply.

The address book allows the users to store commonly used email addresses in an easy to get

at format, reducing the chance of addressing errors.

The filing cabinet allows for the storage of email messages, both sent and received, and

usually gives some form of search function, allowing the easy retrieval of a desired message.

The final, but most important, section of the email client is the element that deals with the

actual communication of email messages to and from an email server. How this actually

occurs will be described later in this.

4. What is a mail server?

A mail server is an application that receives email from email clients or other mail servers. It

is the workhorse of the email system.

Page 4: Final year project report on Internet And Interanet Emailing server

Page | 4

A mail server usually consists of a storage area, a set of user definable rules, a list of users

and a series of communication modules.

The storage area is where mail is stored for local users, and where messages that are in transit

to another destination are temporarily stored. It usually takes the form of a simple database of

information.

The user defined rules determine how the mail server should react when determining the

destination of a specific message, or possibly react to the sender of the message. For

example: specific email addresses can be barred, or certain users can be restricted to only

sending messages within the company. The list of users is a database of user accounts that the

mail server recognizes and will deal with locally.

The communications modules are the components that actually handle the transfer of

messages to and from other mail servers and email clients. Depending upon the requirements

of the mail server there may be a number of different modules installed for use. What these

modules do and how they communicate will be dealt with later in this.

A person, sometimes called a Postmaster, maintains the mail server and the list of user

accounts that it supports.

Most mail servers are designed to operate without any manual intervention during normal

operation. They wait for a message to be sent to them and process it accordingly, or collect

messages from other mail servers at predetermined intervals.

Email Basics - Overview of Email Services

The following examples will start with a fictional computer network, and will lead through

the basics of how email functions, and it's relevance to the Internet. An example email system

to illustrate the basics could be as follows:

a. Simple office email system

Fig-1.1

Email is required within a company, but not out to the rest of the world. A very simple email

system could be installed and maintained, giving interoffice communications:

Simple office email system

In the above example, the three workstations are connected to a computer network within a

company office. If one user wishes to send email to another user, then the message is simply

Page 5: Final year project report on Internet And Interanet Emailing server

Page | 5

typed and sent to the mail server, addressed to the recipient using their email name, which

would simply be the first name of a user, such as "Tom".

For example: if Fred wants to send a message to Tom, he types his message on his email

client, addressing it to Tom. His email client then sends the message to the mail server, where

it is stored for Tom. When Tom next checks to see if there is any mail for him, his email

client will collect his messages and allow him to read them. Because this email system works

only within the office, each recipient can be referred to using only their email name.

This system could easily be expanded to allow for remote users if some form of dial in

support is added to the network using a modem (A modem is a device that sends computer

signals down a telephone line, effectively making a telephone system a part of a computer

network). This would increase the flexibility of the system enormously.

b. Remote user with access to office email

Fig-1.2

Remote user with access to office email When John wants to send email to Paul, he types his

message within his email client, then, when he wants it to, his email client dials into his

company computer network using a modem and telephone line, sends his message to Paul,

then collects any waiting messages for him. Once the messages have been collected, the

modem disconnects from the phone line, and John can read any messages that were collected.

Because John's computer connected using the telephone lines, he can collect his mail from

anywhere he can plug his modem into a telephone socket. If the company also had another

remote user who also connected through the telephone network, then messages could also be

transferred to them as easily as to one of the workstations in the office. The advantages and

flexibility of an email system starts to become clearer when compared against traditional

memo and telephone systems.The next step is to allow email messages to be able to be sent to

another office or company.

c. Simple email between two offices

Page 6: Final year project report on Internet And Interanet Emailing server

Page | 6

Fig-1.3

Simple email between two offices This diagram shows a simple email system to give internal

email between two offices, which are connected via a telephone line.

Mail is sent internally within an office using the same methods as discussed earlier, but as

there are two separate sites, this adds an additional complication in addressing the recipient.

As can be seen in the above diagram, there are two Toms available to send email to. How can

you specify the correct Tom to send your message to? There are two ways:

Change Tom's email name to be something else. This usually is implemented by using the

users second name or initial, such as "S" of the second name "Smith", so the second Tom's

email name would be "Tom.S" (there is no actual standard way of implementing email

names, other than trying to keep them short and easy to remember).

Refer to users at a separate office or site with an additional piece of information which

defines their location, such as "local office." So to send mail to Tom at the Local Office, you

would address his messages to "[email protected]". Notice the "@" symbol which is read as

"at" and that there are no spaces allowed within an email name or address.

The second method is the preferred option as it allows for future expansion of the system,

especially if there is the potential for a number of local offices. These could be referred to as

"Local.Office.A" "Local.Office.B" or possibly by location, such as "New.York.Office" and

so forth. These addresses are known as "Domains" and simply give the location of the user

who the message is destined for within the company. (Note that these are not "Internet

Domains", but internal company ones).Note that the telephone line would only be used

intermittently, when mail was destined for the other office, and could also be used for remote

users as well. Using a combination of the discussed options so far, it can be seen that a

comprehensive company email system can be assembled without too many problems.The

Page 7: Final year project report on Internet And Interanet Emailing server

Page | 7

options discussed so far only allow for internal email with a company or organization. The

next example is to allow for email access to the global Internet.

d. A single user dialling into an Internet Service Provider (ISP)

Fig-1.4

A single user dialling into an Internet Service Provider (ISP) When a single user dials into the

Internet via an Internet Service Provider (ISP) they are effectively dialling into the ISP's

network in the same way as in the earlier example Remote user with access to office email.

The only major difference is that the ISP's computer network is itself connected to the

Internet, and may have a large number of modems to support their users. The home users

email is stored at the ISP's mail server in exactly the same way as within the simple company

email system introduced above. The home user can connect to the ISP's network, send their

messages and collect their waiting email, then disconnect. The only complexity added is for

the actual addressing of the Home user, and the recipients of the messages that the home user

wants to send. Due to the Internet actually consisting of a large number of smaller networks,

much like the ones shown in Simple email between two offices, an email address needs to be

specific in defining the recipients Domain. Can you imagine how many "Toms" exist on the

Internet!

This brings us back to the subject of "Domains".

Each network connected to the Internet has a Domain name associated with it, to ensure

email --and other traffic-- gets directed to the right recipient. In the above diagram the ISP

would have their own domain name, which points any email destined for a user in their

domain to their mail server.

So, for example, if the ISP is called "Provider" and the domain that they own on the Internet

could be called "provider.com" (We'll go into more details on the domain name later in this

FAQ) then all email to the home user is directed to "[email protected]" which will

Page 8: Final year project report on Internet And Interanet Emailing server

Page | 8

result in the mail being stored on the ISP's mail server, ready to collect by the home user

email client.

A single office user could also use the same system to collect and send mail using an ISP, but

this would not have any direct relationship, or link, to the internal email systems that have

already been discussed.

e. Multiple user dialling in to an ISP

Fig-1.5

A number of users on a network dialling in to an ISP

In this example Fred and Paul have two email addresses: One for internal mail within a

company, and one for Internet email. This can sometimes occur if most of the email that a

user reads or sends is internal within a company network, yet the user wants access to global

Internet email. Each user would have an email account on both the company mail server and

the ISP's mail server.

An Internet email user can contact Fred and Paul using email directly. However if an Internet

user wanted to send a message to Tom, then they could not without having to send it to either

Fred or Paul and asking them to forward the message.

This arrangement allows for company email within the confines of the office network, but

gives Internet email facilities to users who need them, in this case Fred and Paul. If Tom

wanted to send email to an Internet address, rather than within the confines of the company,

then he would have to ask either Fred or Paul to send it on his behalf.

Note that there may not actually be individual modems for all users, but some form of

modem sharing may occur.

If there were more than two Internet email users, then connecting the office network mail

server --rather than individual machines--to the Internet would probably be more efficient and

flexible. Tom would then have been able to send his email message to another company

himself, rather than asking another user to do it for him.

Page 9: Final year project report on Internet And Interanet Emailing server

Page | 9

f. A company network connected to an ISP

Fig-1.6

A company network connected to an ISP In this example the company network is connected

to the ISP's network by modem.

This adds the additional complication that the email addresses within the company network

must be of a form that other users on the Internet can use. As the company network is

connected to the Internet through an ISP, then the company could use the "Internet Domain"

of the ISP for addressing their own email -- which means that each user could be addressed in

the form "[email protected]" (note that this is one possible method of addressing:

each service provider may have their own way of addressing individual companies) or they

could register their own Internet Domain. This would mean that a user is addressed as

"[email protected]" where "company.com" is the Internet domain registered.

When Fred, Paul or Tom want to send email to a recipient on the Internet, they send the

message in the same way as sending it internally within the office, but also must specify the

"Domain" of the person they are trying to contact within the email address.

For example, if Tom wants to send a message to "Fred" who is an email user within another

company in the US, then he would address the mail message to "[email protected]"

where "thecompany.com" is the domain for the company where Fred is based. (Domains will

be discussed more fully later in this FAQ).

With this arrangement the company mail server sends and collects email on behalf of the

office network users. The users themselves never actually connect to the Internet. This allows

the local Company Network and telephone connection to be used efficiently with the most

flexibility.

Page 10: Final year project report on Internet And Interanet Emailing server

Page | 10

Used in conjunction with dial-in remote users to the company network, as discussed earlier,

this system would allow for remote users to have access to global Internet email when

dialling in to the Company Network.

g. A Company Network connected to the Internet

Fig-1.7

A Company Network connected to the Internet

This gives all the flexibility of internal email within the company, but also allows Internet

access for remote users to the company mail server for collecting and sending messages. The

Internet connection would have to be full time in order to implement this arrangement.

Note that the actual physical "Internet Connection" could be one of a number of different

connection methods, depending upon the potential traffic requirements to and from the

Internet. Also some form of Firewall protection would be a sensible option. (A Firewall

allows specified traffic through it, preventing unauthorised access both into the company

network, and out onto the Internet).

Remote users could access the company network either via a direct dialled connection, or via

the Internet. Also local dial-in users could access the Internet through the Internet

Connection, effectively turning the Company into a private ISP!

h. More on Domain Names

Domains were introduced earlier, with the examples "Local.Office.A" ,"Local.Office.B" or

"New.York.Office." which would allow the easy addressing of users within a department.

Page 11: Final year project report on Internet And Interanet Emailing server

Page | 11

Taking the "New York Office" as an example, it is fine for use internally within a company,

but does not give enough information to be used on the Internet.

As can be seen, these domain names are suitable for internal use within a company, but as

there are potentially a large number of company with a New York Office, this cannot be used

on its own. This description is simply not sufficient for Internet Email, which has to give an

unique address for every user.

The way to expand on this would be to add the company name to the domain: So the example

"New York Office" could become "ny.office.company.com" which would be fine for

addressing Internet email, as it would give a legal usable address, for example:

Tom, based at the Company New York Office, would be addressed to on the Internet as

"[email protected]." This gives full information on how to address a message to

Tom, with no chance of it going to the wrong person. If you are wondering what the "com"

part of the domain name is for, it simply specifies the type of domain, or the location of the

network that the domain is referring to. This section of the domain name is referred to as the

"top level" of the domain.

"Com" specifies "commercial organisation" and tends to refer to an American company,

although other non-US companies also have "com" top levels to their domain. Some

examples of these are: apple.com, microsoft.com or pepsi.com

A few other possible variations of "Top Level" domains are:

GOV Government

ORG Non-Profit Organisation

EDU Educational Establishment

Please note that recently a number of new top level domains have been made available, but

are not get in general use. A few of the new domains are: firm, store, web, arts, rec, info,

nom.

Other endings available give the country of the network, in two letter format. A few examples

are:

UK United Kingdom

JP Japan

GM Gambia

AQ Antarctica

Note that top level domains, normally outside the of the US, are sometimes combined and

that "co." (referring to "Company" ) is usually also added before the country, for example:

Page 12: Final year project report on Internet And Interanet Emailing server

Page | 12

open.gov government office in the United Kingdom. nissan.co.jp The Nissan Car company

in Japan.

6. What is an Email address?

An example email address looks like this:

Example email address diagram

This address is made up of two parts:

Email account -This is a particular users email account name that, in this case, the

vicomsoft.com mail server can deal with.

Domain name - This is a name that a company has registered so that they can use it on the

Internet. Other examples are: apple.com, or microsoft.com.

If a person or company has not registered their own domain name then they may be using

their Internet Service Provider's (ISP) domain name, for example: netcom.com, or aol.com.

This is usually a less expensive option than registering your own domain name, but does

mean that you have to use your ISP's domain name all the time.

In the above example "vicomsoft.com" is the domain name that has been registered so that

Vicomsoft can use it on the Internet.

For further information on registering domain names please see the reference URLs at the

end of section 2.

7. How does email get from one email client to another email client?

Email client diagram

Fig-1.8

Fred wants to send an email message to [email protected]. The email client on Fred's

machine sends the message to the email server as shown in fig 1.8

The mail server checks to see if it has an account with the user name "Joe." If this account

exists then the message is stored, ready for Joe to collect. If there is not an account for Joe,

the message is returned, with an explanation that Joe does not have an account, so the

message could not be delivered.

Page 13: Final year project report on Internet And Interanet Emailing server

Page | 13

Joe checks his email at a later time. Joe's email client asks the email server if there is any

mail for Joe.

As there is mail waiting for Joe--from Fred-- the email client downloads the waiting

message from the mail server. Joe can then read the email message and reply to Fred, if he

wants, using his email client.

If Fred had sent mail to "[email protected]", instead of "[email protected]" and

Tom did not have an email account created on the mail server, Fred would receive a message

back telling him that Tom did not have an email account, so his message could not be

delivered.

8. How does email get from one email client to another when they are at different locations?

Email clients at different locations

Fig-1.9

Fred wants to send an email message across the world to "[email protected]"

He creates his email message with his email client, which sends the message to the

acompany.com mail server.

The mail server compares the domain name of the destination email address (i.e.

bcompany.com) with the domain name it has been told to look after (i.e. acompany.com).

These domain names are different, therefore the acompany.com mail server will send the

message to the mail server that looks after email for the bcompany.com domain. (How it

finds the bcompany.com mail server will be dealt with in Part two of this FAQ)

Paul checks his email at a later time. His email client asks his email server if there is any

mail for Paul.

Page 14: Final year project report on Internet And Interanet Emailing server

Page | 14

As there is mail waiting for Paul --from Fred-- the email client downloads the waiting

message from the mail server. Paul can then read the email message and reply to Fred, if he

wants, using his email client.

If Fred had sent mail to "[email protected]", instead of "[email protected]" and

Tom did not have an email account created on bcompany.com's mail server, Fred would

receive a message back telling him that Tom did not have an email account on the

bcompany.com mail server, so his message could not be delivered.

9. But what happens when a destination mail server cannot be found by the sending mail

server?

If the destination mail server cannot be found or is extremely busy, a number of different

things can happen:

If the sending mail server cannot find any information at all regarding the destination, then

the message is returned to sender, stating the reason for failure. This usually means that the

message had an incorrectly spelt email address.

If the sending mail server can find information regarding the domain it is trying to contact,

but cannot actually contact the mail server that maintains the destination domain, it will hold

the message for a specified time, before trying again. If it has tried to send the same message

a number of times without success, then it will return the message to the sender, warning that

it had tried a number of times, but failed.

This can happen if the destination mail server is unavailable for some reason, (such as on a

part time connection) or has crashed.

To assist against this type of problem, it is possible for more than one mail server to look

after a domain. If the first mail server cannot be found, then a second machine can be

specified to accept mail on it's behalf. If this mail server cannot be found then a third mail

server can be specified, and so forth. If no mail server at all can be found to contact, then the

sending mail server will wait for a specified time before trying again.

Some larger organizations can have 10 or more mail servers looking after their domain, each

passing mail to the final destination mail server.

This method also makes allowances for when a mail server is extremely busy, as can be the

case with large ISP's mail servers which can process many thousands of messages an hour.

1.2. PURPOSE OF THE PROJECT

This project is developed to create a Mail Server. A Mail server is an application which used

to send and receive mails. This type of application needs to manage mails which send by

registered users. A message has to be composed in compose boxes. This message is stored in

inbox directory of receiver. This file should be combination of the sender’s user-id and sub.

The file transmitted is moved from sender compose to receiver inbox. The recipient can view

the message by selecting the appropriate file no. The main objective is that the working in the

Page 15: Final year project report on Internet And Interanet Emailing server

Page | 15

organization will be well planned and organized. The data will be stored properly in data

stores, which will help in retrieval of information as well as its storage. The level of accuracy

in the proposed system will be higher. All operation would be done correctly and it ensures

that whatever information is coming from the center is accurate. This is also provision for the

replying and deleting the message. This utility also enables users, working under different

login names to communicate with each other. We can send files through attachments. In this

we attach the files to the mail by browsing option. From desktop or any drive we can select

files and we will attach them to the mail that we want to send presently and then we send

them to the receiver. Get started quickly with a familiar experience that improves

participation and helps teams get more done. Use the new visual tiles in Project Web App

(PWA), your web app to access Project Server, to quickly begin or flex project portfolio

management capabilities. Choose between devices and browsers – Internet Explorer, Firefox,

Safari, Chrome, and more – to view, edit, submit, and collaborate on project, portfolio, and

everyday work. In professional world all the communications are being done by emails. Now

a day’s mailing server is playing a very important role in our social and economical life. It is

one of the secure and fast communicating mediums for a modern era. The mail server is also

a good source to connect with your friends; it helps people to be active in social life. Social

network helps a person both continue their existing relationship and finding new friends by

reaching out the people you never met before. What is mailing server?

Mailing server is programmed by which you can send emails to your friends, who are

registered with that server. It allows a user to transfer text and data like picture, video, mp3,

etc. However, it has some limitations for the size of the attachment, but you can change it for

your server and as per business needs.

In mailing server, a user can register herself/himself. After registration, they can login with

their existing user id and password. The mailing server allows the user to customize their

profile, change themes as per own interest.

Mailing server is also a very secure system. It provides you security as you needed your

profile is protected with a password. You can change the password when you feel insecure

with the old password. There is also the password recovery system in case you forgot your

password you can recover your profile by verifying your alternate email or phone number.

1. Capability to create user Email Accounts by an Administrator or by End users after

registering themselves

2. Administrator functionality to Delete User Accounts, Change passwords

3. Capability for End users to login into the system using a browser

4. Capability for logged in users to send/receive/forward/reply/delete mails

5. Invalidate user login on inactive for more than 10mts

6. Address book capability

7. Mark mails as junk

8. Apply Label to mail

Page 16: Final year project report on Internet And Interanet Emailing server

Page | 16

1.3 PROBLEM IN EXISTING SYSTEM

1. Cannot Upload and Download the latest updates.

2. No use of Web Services and Remitting.

3. Risk of mismanagement of data when the project is under development.

4. Less Security

5. Stress to handle many users at a time.

6. Communication between Patient and administration is a tough job.

7. Overwhelming volumes of mail.

1.4 SOLUTION OF THESE PROBLEMS

The development of the new system contains the following activities, which try to automate

the entire process keeping in view of the database integration approach.

1. User friendliness is provided in the application with various controls.

2. The system makes the overall project management much easier and flexible.

3. Readily upload the latest updates, allows user to download the alerts by clicking the

URL.

4. There is no risk of data mismanagement at any level while the project development is

under process.

5. It provides high level of security with different level of authentication.

6. Usage of light databases.

Page 17: Final year project report on Internet And Interanet Emailing server

Page | 17

LITERATURE REVIEW

After analyzing the requirements of the task to be performed, the next step is to analyze the

problem and understand its context. The first activity in the phase is studying the existing

system and other is to understand the requirements and domain of new system. Both the

activities are equally important, but the first activity serves as a basis of giving the functional

specifications and then successful design of the proposed system. Understanding the

properties and requirements of a new system is more difficult and requires creative thinking

and understanding of existing running system is also difficult, improper understanding of

present system can lead diversion from solution. In professional world all the

communications are being done by emails.

Short for electronic mail, the transmission of messages over communications networks. The

messages can be notes entered from the keyboard or electronic files stored on disk. Most

mainframes, minicomputers, and computer networks have an e-mail system. Some electronic-

mail systems are confined to a single computer system or network, but others have gateways

to other computer systems, enabling users to send electronic mail anywhere in the world.

Companies that are fully computerized make extensive use of e-mail because it is fast,

flexible, and reliable.

Most e-mail systems include a rudimentary text editor for composing messages, but many

allow you to edit your messages using any editor you want. You then send the message to the

recipient by specifying the recipient's address. You can also send the same message to several

users at once. This is called broadcasting.

Sent messages are stored in electronic mailboxes until the recipient fetches them. To see if

you have any mail, you may have to check your electronic mailbox periodically, although

many systems alert you when mail is received. After reading your mail, you can store it in a

text file, forward it to other users, or delete it. Copies of memos can be printed out on a

printer if you want a paper copy.

All online services and Internet Service Providers (ISPs) offer e-mail, and most also support

gateways so that you can exchange mail with users of other systems. Usually, it takes only a

few seconds or minutes for mail to arrive at its destination. This is a particularly effective

way to communicate with a group because you can broadcast a message or documentto

everyone in the group at once.

Although different e-mail systems use different formats, there are some emerging standards

that are making it possible for users on all systems to exchange messages. In the PC world, an

important e-mail standard is MAPI. The CCITT standards organization has developed the

X.400 standard, which attempts to provide a universal way of addressing messages. To date,

though, the de facto addressing standard is the one used by the Internet system because

almost all e-mail systems have an Internet gateway. Another common spelling for e-mail is

email.

Page 18: Final year project report on Internet And Interanet Emailing server

Page | 18

Now a day’s mailing server is playing a very important role in our social and economic life. It

is one of the secure and fast communicating mediums for a modern era. The mail server is

also a good source to connect with your friends; it helps people to be active in social life.

Social network helps a person both continue their existing relationship and finding new

friends by reaching out the people you never met before. What is mailing server?

1. Mailing server is programmed by which you can send emails to your friends, who are

registered with that server. It allows a user to transfer text and data like picture, video,

mp3, etc. However, it has some limitations for the size of the attachment, but you can

change it for your server and as per business needs.

2. In mailing server, a user can register herself/himself. After registration, they can login

with their existing user id and password. The mailing server allows the user to customize

their profile, change themes as per own interest.

3. Mailing server is also a very secure system. It provides you security as you needed your

profile is protected with a password. You can change the password when you feel

insecure with the old password. There is also the password recovery system in case you

forgot your password you can recover your profile by verifying your alternate email or

phone number.

2.1 ANALYSIS MODEL

This document play a vital role in the development of life cycle (SDLC) as it describes the

complete requirement of the system. It means for use by developers and will be the basic

during testing phase. Any changes made to the requirements in the future will have to go

through formal change approval process. SPIRAL MODEL was defined by Barry Boehm in

his 1988 article. “A spiral model of software development and enhancement. This model was

not the first model to discuss iterative development, but it was the first model to explain

why the iteration models. As originally envisioned, the iterations were typically 6 months to 2

years long. Each phase starts with a design goal and ends with a client reviewing the progress

thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye

toward the end goal of the project. The steps for Spiral Model can be generalized as follows:

1. The new system requirements are defined in as much details as possible. This usually

involves interviewing a number of users representing all the external or internal users and

other aspects of the existing system.

2. A preliminary design is created for the new system.

3. A first prototype of the new system is constructed from the preliminary design. This is

usually a scaled down system, and represents an approximation of the characteristics of

the final product.

4. A second prototype is evolved by a fourfold procedure:

I. Evaluating the first prototype in terms of its strengths, weakness and risks.

Page 19: Final year project report on Internet And Interanet Emailing server

Page | 19

II. Defining the requirements of the second prototype.

III. Planning and designing the second prototype.

IV. Constructing and testing the second prototype

5. At the customer option, the entire project can be aborted if the risk is deemed too great.

Risk factors might involved development cost overruns, operating-cost miscalculation, or

any factor that could, in the customer’s judgment, result in a less than satisfactory final

product.

6. The existing prototype is evaluated in the same manner as was the previous prototype,

and if necessary, another prototype is developed from it according to the fourfold

procedure outlined above.

Table.2.1 Survey Paper

Installed in Software

Name

Installation

year

Functionality Disadvantage

1. IIT, Kanpur Webmail

Service

1997 Make student

aware about

networking

through email

Not

authenticated

2. TATA institute of

social science

Webmail 2000 Maintain all the

information of

patent and cases

Not secured

3. Institute of

information

science, Frame

Email system 2003 Maintain all the

information of

crimes and cases

Not secure

4. European

University

Institute

365 mail

client

2005 Manage details of

student

Error to

generate a

complete detail

in the college

5. University of

Mexico

Emailing

service

2012 Manage details of

student

Poor

authentication

6. University of

France

Network

Emailing

2013 Manage details

faculty and mailing

it to the head

No

authentication

Page 20: Final year project report on Internet And Interanet Emailing server

Page | 20

2.2 A BRIEF HISTORY OF ELECTRONIC SURVEYS

Beginning in the late 1980s and early 1990s, prior to the widespread use of the Web, e-mail

was explored as a survey mode. As with the Web today, e-mail offered the possibility of

nearly instantaneous transmission of surveys at little or no cost. Unlike the Web, however,

early e-mail was essentially static, consisting of a basic ASCII (text-only) message that was

livered via the Internet.4 E-mail surveys tended to resemble the linear structure of a paper

survey and were generally limited in length. Furthermore, because e-mail surveys were

primarily text-based, document formatting was rudimentary at best. The only significant

advantage they offered over only) message that was delivered via the Internet.4 E-mail

surveys tended to resemble the linear structure of a paper survey and were generally limited

in length. Furthermore, because e-mail surveys were primarily text-based, document

formatting was rudimentary at best. The only significant advantage they offered over paper

surveys was a potential decrease in delivery and response time and cost, although some

observers also hypothesized that the novelty of the new medium might actually have

enhanced response rates (Parker, 1992; Zhang, 2000).paper surveys was a potential decrease

in delivery and response time and cost, although some observers also hypothesized that the

novelty of the new medium might actually have enhanced response rates (Parker,1992;

Zhang, 2000).) 1The literature contains far more information about response rates than about

any other topic related to surveying, such as timeliness or data quality. Appendix B contains a

more detailed discussion of response rates in the literature and Appendix C lists the survey

topic, sample size, type of sample, contact/response/follow-up mode, and response rate for

each study referenced in this report. We do not address other electronic survey modes that are

currently in use, such as computerized self-administered questionnaires (CSAQs), which are

surveys distributed via computer diskette. Two other electronic modes, CAPI and CATI, as

we noted earlier, are unrelated to the development of the Internet and therefore we do not

discuss them in this report. 3It is worth noting that the survey literature as late as the early- to

mid-1990s could not anticipate the eventual influence of the Web on the practice of

surveying. The Web started to become widely available in the early- to mid- 1990s and

quickly supplanted e-mail as the Internet survey medium of choice. Whereas early e-mail was

all ASCII-based, the Web offered the possibility of multimedia surveys containing audio and

video, as well as an enhanced user interface and more interactive features. For convenience

samples, the Web also offered a way around the necessity of having to know respondents’ e-

mail addresses.

2.3 RESPONSE RATES OF INTERNET SURVEYS

Response rates for Internet surveys in the literature are summarized graphically in Figure 3.1

by survey mode (more-exact numbers can be found in Appendix B). Overall, Figure 3.1

suggests that surveys using a mail response mode and surveys using both a mail and Web

response mode tend to have higher response rates than those using just an e-mail or Web

response mode. Response rates range from 7 to 44 percent for Web surveys and from 6 to 68

percent for e-mail surveys. Some studies in the literature gave respondents the choice of

responding by either mail or via the Web. Of the seven studies we examined, five reported

that respondents. Since the early days of e-mail, the ability to send attachments and

executable files with e-mail has greatly expanded. Today, e-mail can be used to send a survey

Page 21: Final year project report on Internet And Interanet Emailing server

Page | 21

program to a user to run on his or her computer. The user can then return the completed

survey electronically or by mail. These CSAQ surveys can be delivered via a number of

different types of media, including e-mail attachments, downloading from the Web, or via

diskette or CD-ROM. More often chose to respond by mail than through the Web and two

studies found just the reverse. Above all else, the context of the individual study seems to

matter. For example, respondents for the study with the highest percentage of Web

respondents were recruited through advertising in Internet discussion groups (Schleyerand

Forrest, 2000). Several studies in the literature involve conducting experiments to determine

whether e-mail surveys have lower or higher response rates than postal mail surveys. In such

studies, identical questionnaires were sent to different portions (or study arms) of the same

population. The only difference between the study arms was in whether the respondent was

asked to respond via e-mail or by mail. In most studies, the mail response rate was higher by

as much as 21 percent. Only one study resulted in a lower mail response rate. However, that

study was in many respects unusual and fell at a time when the novelty of e-mail may have

influenced the results (Parker, 1992).

Page 22: Final year project report on Internet And Interanet Emailing server

Page | 22

PROBLEM IDENTIFICATION

1. Sometimes an email message gets lost in transit, or it can take a lot longer than

expected for delivery, and your users can wonder what happened. The message trace

feature lets you follow messages as they pass through your Exchange Online service.

With message tracing, you can determine whether a targeted email message was

received, rejected, deferred, or delivered by the service. It also shows what events

have occurred to the message before reaching its final status. Getting detailed

information about a specific message lets you efficiently answer your user’s

questions, troubleshoot mail flow issues, validate policy changes, and alleviates the

need to contact technical support for assistance.

2. After you run a message trace, try to diagnose and resolve the problem yourself using

the information that the message trace tool provides. If you are unable to resolve the

problem, post a question to the Office 365 Community, or ask for customer support

by filling a service request. For information about how to open up a service request

for a message delivery issue, see Still can’t figure out what went wrong.

3. Your outgoing mail server is used to send emails from your computer. Depending on

where your email account is hosted, you may or may not be able to use your email

provider’s outgoing mail server. Email addresses based on public email services

such as Hotmail, Google, Yahoo, etc. will use their own outgoing mail servers. If

your email is hosted on your own website, you may want to use your hosting

provider’s mail server. For example, websites hosted on example.com may use

mail.example.com as both their incoming and outgoing mail servers.

4. Some ISP’s (Internet Service Providers) will not allow you to make use of your own

outgoing mail server. In this situation, you’ll need to use your ISP’s outgoing mail

server. Find the name of your ISP and use the chart below to find your outgoing mail

server.

5. If you are intent on using your own site’s mail server, you may want to contact your

ISP. You can also try outgoing mail (SMTP) port number to 26 (default is 25), as

some ISP’s will block port 25 because it is often used for spamming..

6. Misspelling the outgoing server name (for example, typing smtp.gail.com instead of

smtp.gmail.com).

Page 23: Final year project report on Internet And Interanet Emailing server

Page | 23

7. Some server require outgoing authentication. There should be a box you can check to

enable this (it will have your email client use your email address and password to

authenticate any emails that you send)..

8. Some setups require an SSL connection. If this is the case, your outgoing port will

most likely change (from 25 or 26 to 465).

In most cases, you will not need SPA (Secure Password Authentication).

9. Be sure that your emails don’t look like typical spam emails: don’t insert only a large

image; check that the character-set is set correctly; don’t insert “IP-address only”

links. Write your communication as you would write a normal email. Make it really

easy to unsubscribe or opt-out. Otherwise, your users will unsubscribe by pressing the

“spam” button, and that will affect your reputation.

10. On the technical side: if you can choose your SMTP server, be sure it is a “clean”

SMTP server. IP addresses of spamming SMTP servers are often blacklisted by other

providers. If you don’t know your SMTP servers in advance, it’s a good practice to

provide configuration options in your application for controlling batch sizes and delay

between batches. Some mail servers don’t accept large sending batches or continuous

activity. A case is discussed as the first one makes reference to the use of data

collected in the On the technical side: if you can choose your SMTP server, be sure it

is a “clean” SMTP server. IP addresses of spamming SMTP servers are often

blacklisted by other providers. If you don’t know your SMTP servers in advance, it’s

a good practice to provide configuration options in your application for controlling

batch sizes and delay between batches. Some mail servers don’t accept large sending

batches or continuous activity. Second one concerns a typical ethnographic study in a

large hospital structure for the identification of most relevant areas of intervention.

Page 24: Final year project report on Internet And Interanet Emailing server

Page | 24

METHODOLOGY

4.1 Introduction to PHP

PHP is an “HTML-embedded scripting language” primarily used for dynamic web

application. The first part of this definition means that PHP code can be interspersed with

HTML, making it simple to generate dynamic pieces of Web pages on the fly. As a scripting

language, PHP code requires the presence of the PHP processor. PHP code is normally run in

plain-text scripts that will only run on PHP-enabled computers (conversely programming

languages can create standalone binary executable files, a.k.a. programs).PHP takes most of

its syntax from C, Java, and Perl. It is an open source technology and runs on most operating

system and with most Web servers. PHP was written in the C programming language by

Rasmus Lerdorf in 1994 for use in monitoring his online resume and related personal

information. For this reason, PHP originally stood for “Personal Home Page”. Lerdori

combined PHP with his own Form Interpreter, releasing the combination publicly as PHP/FI

(generally referred to as PHP 2.0) on Z June 8, 1995. In 1998, PHP 3 was released, which

was the first widely used version. PHP 4 was released in May 2000, with a new core, known

as Zend Engine 1.0. PHP 4 featured improves speed and reliability over PHP3. In terms of

features, PHP 4 added references the Boolean Type. COM support on the Windows, output

buffering, many new array functions, expanded object-oriented programming, inclusion of

the PCRE library, and many more. Maintenance release ofPHP 4 are still available, primarily

for security updates. PHP 5 was released in July 2004, with the updated Zend Engine 2.0.

Among the many new features in PHP 5 are :-

1. Improved object-oriented programming

2. embedded SOLite

3. support for new MySQL features (see the image at right)

4. exception handling using a try-catch structure

5. integrated SOAP support (see the image at right)

6. the Filter library (I PHP 5.1)

7. better XML tools

8. Iterations

Originally started in 994 as a replacement for various Perl scripts used to maintain his

Personal Web Page (thus the acronym PHP) by the Danish/Greenland programmer Rasmus

Lerdorf, the project has since grown into an open source community effort. Initial uses of

PHP were limited to basic tasks such as counting how many visitors a web site had received,

the introduction of the PHP/FI (The FI stands for Form Interpreter) added additional

functionality including implementation for the C programming language.

In addition to the inclusion of C support, PHP/FI also introduced native support for the

database communications. These two features have become the bedrock for the future

versions of the PHP and together allowed the relatively swift and easy construction of

dynamic web sites.

Page 25: Final year project report on Internet And Interanet Emailing server

Page | 25

In 1995 Lerdorf made the project public in an effort to improve the PHP code base I both

reliability and scope. Tis release would eventually be known as PHP 2. At the time was still

the preeminent language for the performing the tasks that PHP was seeking to perform and

PHP had yet to reach a point where it had the same scope, death, and consistency offered by

Perl.

PHP 3 began in 1997 when a pair of Israeli developers at Technician IIT decided to rewrite

the parser. The two would later form Zend Technologies, a company named after blending

their two names: Zeev (Suraski) and Andi (Gutmans). The company would eventually

produce the Zend Engine, the first public version of which powered PP 4 upon its release in

2000.

The successor to Zend Engine is the Zend Engine 2 which was the basis for PHP 5. PHP 5,

released in 2004, is perhaps the most radical and some consider long overdue revamp to PHP

as it finally brings true Object Oriented Programming (OOP) to developers who have long

since grown used to writing object oriented code.

PHP is a server-side scripting language designed for web development but also used as a

general-purpose programming language. As of January 2013, PHP was installed on more than

240 million websites (39% of those sampled) and 2.1 million web servers. Originally created

by Rasmus Lerdorf in 1994, the reference implementation of PHP (powered by the Zend

Engine) is now produced by The PHP Group. While PHP originally stood for Personal Home

Page, it now stands for PHP: Hypertext Preprocessor, which is a recursive backronym.

PHP code can be simply mixed with HTML code, or it can be used in combination with

various tinplating engines and web frameworks. PHP code is usually processed by a PHP

interpreter, which is usually implemented as a web server's native module or a Common

Gateway Interface (CGI) executable. After the PHP code is interpreted and executed, the web

server sends resulting output to its client, usually in form of a part of the generated web page;

for example, PHP code can generate a web page's HTML code, an image, or some other data.

PHP has also evolved to include a command-line interface (CLI) capability and can be used

in standalone graphical applications.

The canonical PHP interpreter, powered by the Zend Engine, is free software released under

the PHP License. PHP has been widely ported and can be deployed on most web servers on

almost every operating system and platform, free of charge.

Despite its popularity, no written specification or standard existed for the PHP language until

2014, leaving the canonical PHP interpreter as a de facto standard. Since 2014, there is

ongoing work on creating a formal PHP specification.

4.2 Normalization

A database is a structure that comes in two flavors: a flat database and a relational database.

A relational database is much more oriented to the human mind and is often preferred over

the gabble-de-gook flat databases that are just stored on hard drives like a text file. MySQL is

a relational database. MySQL is a powerful database. It's very good and free of charge.

Page 26: Final year project report on Internet And Interanet Emailing server

Page | 26

Database normalization is the process of organizing the attributes and tables of a relational

database to minimize data redundancy. Normalization involves refactoring a table into less

redundant (and smaller) tables but without losing information; defining foreign keys in the

old table referencing the primary keys of the new ones. The objective is to isolate data so that

additions, deletions, and modifications of an attribute can be made in just one table and then

propagated through the rest of the database using the defined foreign keys.

Edgar F. Codd, the inventor of the relational model (RM), introduced the concept of

normalization and what we now know as the First normal form (1NF) in 1970. Codd went on

to define the Second normal form (2NF) and Third normal form (3NF) in 1971, and Codd

and Raymond F. Boyce defined the Boyce-Codd Normal Form (BCNF) in 1974. Informally,

a relational database table is often described as "normalized" if it is in the Third Normal

Form. Most 3NF tables are free of insertion, update, and deletion anomalies.

The relational model separates the logical design from the physical design: DBMS

performance is a matter of physical designer using indexes, view materialization, big buffers,

etc. It is not a matter of changing the logical design.

A typical example of normalization is that an entity's unique ID is stored everywhere in the

system but its name is held in only one table. The name can be updated more easily in one

row of one table. A typical update in such an example would be the RIM company changing

its name to BlackBerry. That update would be done in one place and immediately the correct

"BlackBerry" name would be displayed throughout the system

Advantages:

1. Scalability and Flexibility: The MySQL database server provides the ultimate in

scalability, sporting the capacity to handle deeply embedded applications with a footprint of

only 1MB to running massive data warehouses holding terabytes of information. Platform

flexibility is a stalwart feature of MySQL with all flavors of Linux, UNIX, and Windows

being supported. And, of course, the open source nature of MySQL allows complete

customization for those wanting to add unique requirements to the database server.

2. High Performance: A unique storage-engine architecture allows database professionals to

configure the MySQL database server specifically for particular applications, with the end

result being amazing performance results. Whether the intended application is a high-speed

transactional processing system or a high-volume web site that services a billion queries a

day, MySQL can meet the most demanding performance expectations of any system. With

high-speed load utilities, distinctive memory caches, full text indexes, and other performance-

enhancing mechanisms, MySQL offers all the right ammunition for today's critical business

systems.

3. High Availability: Rock-solid reliability and constant availability are hallmarks of

MySQL, with customers relying on MySQL to guarantee around-the-clock uptime. MySQL

offers a variety of high-availability options from high-speed master/slave replication

Page 27: Final year project report on Internet And Interanet Emailing server

Page | 27

configurations, to specialized Cluster servers offering instant failover, to third party vendors

offering unique high-availability solutions for the MySQL database server.

4. Robust Transactional Support: MySQL offers one of the most powerful transactional

database engines on the market. Features include complete ACID (atomic, consistent,

isolated, durable) transaction support, unlimited row-level locking, distributed transaction

capability, and multi-version transaction support where readers never block writers and vice-

versa. Full data integrity is also assured through server-enforced referential integrity,

specialized transaction isolation levels, and instant deadlock detection.

5. Web and Data Warehouse Strengths: MySQL is the de-facto standard for high-traffic web

sites because of its high-performance query engine, tremendously fast data insert capability,

and strong support for specialized web functions like fast full text searches. These same

strengths also apply to data warehousing environments where MySQL scales up into the

terabyte range for either single servers or scale-out architectures. Other features like main

memory tables, B-tree and hash indexes, and compressed archive tables that reduce storage

requirements by up to eighty-percent make MySQL a strong standout for both web and

business intelligence applications.

6. Strong Data Protection: Because guarding the data assets of corporations is the number one

job of database professionals, MySQL offers exceptional security features that ensure

absolute data protection. In terms of database authentication, MySQL provides powerful

mechanisms for ensuring only authorized users have entry to the database server, with the

ability to block users down to the client machine level being possible. SSH and SSL support

are also provided to ensure safe and secure connections. A granular object privilege

framework is present so that users only see the data they should, and powerful data

encryption and decryption functions ensure that sensitive data is protected from unauthorized

viewing. Finally, backup and recovery utilities provided through MySQL and third party

software vendors allow for complete logical and physical backup as well as full and point-in-

time recovery.

7. Comprehensive Application Development: One of the reasons MySQL is the world's most

popular open source database is that it provides comprehensive support for every application

development need. Within the database, support can be found for stored procedures, triggers,

functions, views, cursors, ANSI-standard SQL, and more. For embedded applications, plug-in

libraries are available to embed MySQL database support into nearly any application.

MySQL also provides connectors and drivers (ODBC, JDBC, etc.) that allow all forms of

applications to make use of MySQL as a preferred data management server. It doesn't matter

if it's PHP, Perl, Java, Visual Basic, or .NET. MySQL offers application developers

everything they need to be successful in building database-driven information systems.

8. Open Source Technology: Many corporations are hesitant to fully commit to open source

software because they believe they can't get the type of support or professional service safety

nets they currently rely on with proprietary software to ensure the overall success of their key

applications. The questions of indemnification come up often as well. These worries can be

Page 28: Final year project report on Internet And Interanet Emailing server

Page | 28

put to rest with MySQL as complete around-the-clock support as well as indemnification is

available through MySQL Network. MySQL is not a typical open source project as all the

software is owned and supported by MySQL AB, and because of this, a unique cost and

support model are available that provides a unique combination of open source freedom and

trusted software with support.

9. Management Ease: MySQL offers exceptional quick-start capability with the average time

from software download to installation completion being less than fifteen minutes. This rule

holds true whether the platform is Microsoft Windows, Linux, Macintosh, or UNIX. Once

installed, self-management features like automatic space expansion, auto-restart, and dynamic

configuration changes take much of the burden off already overworked database

administrators. MySQL also provides a complete suite of graphical management and

migration tools that allow a DBA to manage, troubleshoot, and control the operation of many

MySQL servers from a single workstation. Many third party software vendor tools are also

available for MySQL that handle tasks ranging from data design and ETL, to complete

database administration, job management, and performance monitoring.

ADVANTAGES OF RDBMS

1. Redundancy can be avoided

2. Inconsistency can be eliminated

3. Data can be Shared

4. Standards can be enforced

5. Security restrictions can be applied

6. Integrity can be maintained

7. Conflicting requirements can be balanced

8. Data independence can be achieved.

DISADVANTAGES OF DBMS:

A significant disadvantage of the DBMS system is cost. In addition to the cost

of purchasing of developing the software, the hardware has to be upgraded to allow for the

extensive programs and the workspace required for their execution and storage. While

centralization reduces duplication, the lack of duplication requires that the database be

adequately backed up so that in case of failure the data can be recovered.

4.3 E-R DIAGRAMS

In software engineering, an entity–relationship model (ER model) is a data model for

describing the data or information aspects of a business domain or its process requirements,

in an abstract way that lends itself to ultimately being implemented in a database such as a

Page 29: Final year project report on Internet And Interanet Emailing server

Page | 29

relational database. The main components of ER models are entities (things) and the

relationships that can exist among them.

Entity–relationship modeling was developed by Peter Chen and published in a 1976 paper.

However, variants of the idea existed previously, and have been devised subsequently such

as super type and subtype data entities and commonality relationships.

Introduction: An entity–relationship model is a systematic way of describing and defining

a business process. The process is modeled as components (entities) that are linked with

each other by relationships that express the dependencies and requirements between them,

such as: one building may be divided into zero or more apartments, but one apartment can

only be located in one building. Entities may have various properties (attributes) that

characterize them. Diagrams created to represent these entities, attributes, and relationships

graphically are called entity–relationship diagrams.

An ER model is typically implemented as a database. In the case of a relational database,

which stores data in tables, every row of each table represents one instance of an entity.

Some data fields in these tables point to indexes in other tables; such pointers represent the

relationships.

An ERD is a model that identifies the concepts or entities that exist in a system and the

relationships between those entities. An ERD is often used as a way to visualize a

relational database: each entity represents a database table, and the relationship lines

represent the keys in one table that point to specific records in related tables. ERDs may

also be more abstract, not necessarily capturing every table needed within a database, but

serving to diagram the major concepts and relationships.

This ERD is of the latter type, intended to present an abstract, theoretical view of the major

entities and relationships needed for management of electronic resources. It may assist the

database design process for an e-resource management system, but does not identify every

table that would be necessary for an electronic resource management database.

The ERD presents a visual representation of e-resource management concepts and the

relationships between them. The Data Element Dictionary identifies and defines the

individual data elements that an e-resource management system must contain and manage,

but leaves the relationship between the elements to be inferred by the reader.ER Diagram is

shown in fig. 4.2

Entities

Entities are equivalent to database tables in a relational database, with each row of the

table representing an instance of that entity. An entity is something that exists in itself,

actually or potentially, concretely or abstractly, physically or not. It need not be of material

Page 30: Final year project report on Internet And Interanet Emailing server

Page | 30

existence. In particular, abstractions and legal fictions are usually regarded as entities. In

general, there is also no presumption that an entity is animate.

The word may refer, for example, to Bucephalus, the horse of Alexander; to a stone; to a

cardinal number; to a language; or to ghosts or other spirits.

The word estimative is the adjective form of the noun entity. Something that is entitative is

considered in its own right.

In philosophy, ontology is about the recognition of entities. The words ontic and entity are

derived respectively from the ancient Greek and Latin present participles that mean 'being'.

Relationship

Relationships are represented by lines between entities. Relationship lines indicate that

each instance of an entity may have a relationship with instances of the connected entity,

and vice versa. In relational database theory, a relation, as originally defined by E. F.

Codd,[1] is a set of tuples (d1, d2, ..., dn), where each element dj is a member of Dj, a data

domain. Codd's original definition notwithstanding, and contrary to the usual definition in

mathematics, there is no ordering to the elements of the tuples of a relation.[2][3] Instead,

each element is termed an attribute value. An attribute is a name paired with a domain

(nowadays more commonly referred to as type or data type). An attribute value is an

attribute name paired with an element of that attribute's domain, and a tuple is a set of

attribute values in which no two distinct elements have the same name. Thus, in some

accounts, a tuple is described as a function, mapping names to values. A set of attributes in

which no two distinct elements have the same name is called a heading. A set of tuples

having the same heading is called a body. A relation is thus a heading paired with a body,

the heading of the relation being also the heading of each tuple in its body. The number of

attributes constituting a heading is called the degree, which term also applies to tuples and

relations. The term n-tuple refers to a tuple of degree n (n>=0). E. F. Codd used the term

relation in its mathematical sense of a finitary relation, a set of tuples on some set of n sets

S1, S2, .... ,Sn.[4] Thus, an n-ary relation is interpreted, under the Closed World

Assumption, as the extension of some n-adic predicate: all and only those n-tuples whose

values, substituted for corresponding free variables in the predicate, yield propositions that

hold true, appear in the relation. The term relation schema refers to a heading paired with a

set of constraints defined in terms of that heading. A relation can thus be seen as an

instantiation of a relation schema if it has the heading of that schema and it satisfies the

applicable constraints. Sometimes a relation schema is taken to include a name.[5][6] A

relational database definition (database schema, sometimes referred to as a relational

schema) can thus be thought of as a collection of named relation schemas.

In implementations, the domain of each attribute is effectively a data type[9] and a named

relation schema is effectively a relation variable or relvar for short (see Relation Variables

below). In SQL, a database language for relational databases, relations are represented by

tables, where each row of a table represents a single tuple, and where the values of each

attribute form a column.

Page 31: Final year project report on Internet And Interanet Emailing server

Page | 31

Fig 4.1 E-R diagram

4.4 Data Flow Process

A data flow diagram is graphical tool used to describe and analyze movement of data

through a system. These are the central tool and the basis from which the other components

are developed. The transformation of data from input to output, through processed, may be

described logically and independently of physical components associated with the system.

These are known as the logical data flow diagrams. The physical data flow diagrams show

the actual implements and movement of data between people, departments and workstations.

A full description of a system actually consists of a set of data flow diagrams. Using two

familiar notations Yourdon, Gane and Sarson notation develops the data flow diagrams. Each

component in a DFD is labeled with a descriptive name. Process is further identified with a

Page 32: Final year project report on Internet And Interanet Emailing server

Page | 32

number that will be used for identification purpose. The development of DFD’S is done in

several levels. Each process in lower level diagrams can be broken down into a more

detailed DFD in the next level. The lop-level diagram is often called context diagram. It

consists a single process bit, which plays vital role in studying the current system. The

process in the context level diagram is exploded into other process at the first level DFD.

The idea behind the explosion of a process into more process is that understanding at one

level of detail is exploded into greater detail at the next level. This is done until further

explosion is necessary and an adequate amount of detail is described for analyst to understand

the process.

Larry Constantine first developed the DFD as a way of expressing system requirements in a

graphical from, this lead to the modular design.

A DFD is also known as a “bubble Chart” has the purpose of clarifying system requirements

and identifying major transformations that will become programs in system design. So it is

the starting point of the design to the lowest level of detail. A DFD consists of a series of

bubbles joined by data flows in the system.

It is common practice to draw the context-level data flow diagram first, which shows the

interaction between the system and external agents which act as data sources and data sinks.

This helps to create an accurate drawing in the context diagram. The system's interactions

with the outside world are modelled purely in terms of data flows across the system

boundary. The context diagram shows the entire system as a single process, and gives no

clues as to its internal organization.

This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the

detail of the system being modeled. The Level 1 DFD shows how the system is divided into

sub-systems (processes), each of which deals with one or more of the data flows to or from an

external agent, and which together provide all of the functionality of the system as a whole. It

also identifies internal data stores that must be present in order for the system to do its job,

and shows the flow of data between the various parts of the system.

Data flow diagrams are one of the three essential perspectives of the structured-systems

analysis and design method SSADM. The sponsor of a project and the end users will need to

be briefed and consulted throughout all stages of a system's evolution. With a data flow

diagram, users are able to visualize how the system will operate, what the system will

accomplish, and how the system will be implemented. The old system's dataflow diagrams

can be drawn up and compared with the new system's data flow diagrams to draw

comparisons to implement a more efficient system. Data flow diagrams can be used to

provide the end user with a physical idea of where the data they input ultimately has an effect

upon the structure of the whole system from order to dispatch to report. How any system is

developed can be determined through a data flow diagram model.

Page 33: Final year project report on Internet And Interanet Emailing server

Page | 33

In the course of developing a set of levelled data flow diagrams the analyst/designers is

forced to address how the system may be decomposed into component sub-systems, and to

identify the transaction data in the data model.

Data flow diagrams can be used in both Analysis and Design phase of the SDLC.

There are different notations to draw data flow diagrams (Yourdon & Coad and Gane &

Sarson), defining different visual representations for processes, data stores, data flow, and

external entities.

4.4.1 DFD SYMBOLS:

In the DFD, there are four symbols

1. A square defines a source(originator) or destination of system data

2. An arrow identifies data flow. Data Flow Diagram is shown in fig. 5.3

3. It is the pipeline through which the information flows

4. A circle or a bubble represents a process that transforms incoming data flow into outgoing

data flows.

5. An open rectangle is a data store, data at rest or a temporary repository of data

Fig:-4.2: Symbols Used In DFD’S

4.3.2 CONSTRUCTING A DFD:

Several rules of thumb are used in drawing DFD’S:

Page 34: Final year project report on Internet And Interanet Emailing server

Page | 34

1. Process should be named and numbered for an easy reference. Each name should be

representative of the process.

2. The direction of flow is from top to bottom and from left to right. Data traditionally

flow from source to the destination although they may flow back to the source. One way

to indicate this is to draw long flow line back to a source. An alternative way is to repeat

the source symbol as a destination. Since it is used more than once in the DFD it is

marked with a short diagonal.

3. When a process is exploded into lower level details, they are numbered.

4. The names of data stores and destinations are written in capital letters. Process and

dataflow names have the first letter of each work capitalized. A DFD typically shows the

minimum contents of data store. Each data store should contain all the data elements

that flow in and out. Questionnaires should contain all the data elements that flow in and

out. Missing interfaces redundancies and like is then accounted for often through

interviews.

4.5 HARDWARE SPECIFICATIONS

The selection of hardware is very important in the existence and proper working of any

software. In the selection of hardware, the size and the capacity requirements are also

important.

The job portal can be efficiently run on Pentium system with at least 128mb ram and hard

disk drive having 20 GB floppy disk drive of 1.44MB.

4.5.1 HARDWARE REQUIREMENT:-

1.RAM capacity ------- 128 MB

2.Hard disk -------- 20GB

3.Floppy disk ------1.44MB

4.CD-ROM Drive ----32HZ

5.KEYBOARD------ 108 Standard

4.6 SOFTWARE SPECIFICATIONS

Some of the most difficult tasks is that, the selection of the software, once system

requirement is known is determining whether a particular software package fits the

requirements. After initial selection further security is needed to determine the desirability of

Page 35: Final year project report on Internet And Interanet Emailing server

Page | 35

particular software compared with other candidates. This section first summarizes the

application requirement question and then suggests more detailed comparisons.

4.6.1 SOFTWARE REQIREMENT:-

1. Operating System: - Windows 2000 & above

2. Application Server: - Apache Server

3. Database: - MySQL .

4. Browser Specification:- Internet Explorer, Chrome, Opera.

4.7 ANALYSIS MODEL:-

1. The model that is basically being followed is the INCREMENTAL MODEL, which

combines elements of the linear sequential model with the iterative philosophy of

prototyping.

2. First of all the feasibility study is done. Once that part is over the requirement analysis and

project planning begins.

3. If system exists one and modification and addition of new module is needed, analysis of

present system can be used as basic model.

4. The design starts after the requirement analysis is complete and the coding begins after the

design is complete.

5. Once the programming is completed, the testing is done. In this model the sequence of

activities performed in a software development project are: -

i) Requirement Analysis

ii) Project Planning

iii) System design

iv) Detail design

v) Coding

vi) Unit testing

vii) System integration & testing

6. End of the phase and the output of one phase is the input of other phase.

7. The output of each phase is to be consistent with the overall requirement of the system.

8. Some of the qualities of spiral model are also incorporated like after the people concerned

with the project review completion of each of the phase the work done.

SPIRAL MODEL was being chosen because all requirements were known beforehand and

the objective of our software development is the computerization/automation of an already

Page 36: Final year project report on Internet And Interanet Emailing server

Page | 36

existing manual working system and further enhancement on the project need to be done after

basic model. Perform four basic activities in every cycle

1. This invariant identifies the four basic activities that should occur in each cycle of the

spiral model:

Consider the win conditions of all success-critical stakeholders. Identify and evaluate

alternative approaches for satisfying the win conditions. Identify and resolve risks that stem

from the selected approach(es).Obtain approval from all success-critical stakeholders, plus

commitment to pursue the next cycle.Project cycles that omit or shortchange any of these

activities risk wasting effort by pursuing options that are unacceptable to key stakeholders, or

are too risky. Some "hazardous spiral look-alike" processes violate this invariant by

excluding key stakeholders from certain sequential phases or cycles. For example, system

maintainers and administrators might not be invited to participate in definition and

development of the system. As a result, the system is at risk of failing to satisfy their win

conditions.

2. Risk determines level of effort

For any project activity (e.g., requirements analysis, design, prototyping, testing), the project

team must decide how much effort is enough. In authentic spiral process cycles, these

decisions are made by minimizing overall risk. For example, investing additional time testing

a software product often reduces the risk due to the marketplace rejecting a shoddy product.

However, additional testing time might increase the risk due to a competitor's early market

entry. From a spiral model perspective, testing should be performed until the total risk is

minimized, and no further. "Hazardous spiral look-alikes" that violate this invariant include

evolutionary processes that ignore risk due to scalability issues, and incremental processes

that invest heavily in a technical architecture that must be redesigned or replaced to

accommodate future increments of the product.

3. Risk determines degree of detail

For any project artifact (e.g., requirements specification, design document, test plan), the

project team must decide how much detail is enough. In authentic spiral process cycles, these

decisions are made by minimizing overall risk.

Considering requirements specification as an example, the project should precisely specify

those features where risk is reduced through precise specification (e.g., interfaces between

hardware and software, interfaces between prime and sub-contractors). Conversely, the

project should not precisely specify those features where precise specification increases risk

(e.g., graphical screen layouts, behavior of off-the-shelf components).

4. Use anchor point milestones

Boehm's original description of the spiral model did not include any process milestones. In

later refinements, he introduces three anchor point milestones that serve as progress

indicators and points of commitment. These anchor point milestones can be characterized by

Page 37: Final year project report on Internet And Interanet Emailing server

Page | 37

key questions. Life Cycle Objectives. Is there a sufficient definition of a technical and

management approach to satisfying everyone's win conditions? If the stakeholders agree that

the answer is "Yes", then the project has cleared this LCO milestone. Otherwise, the project

can be abandoned, or the stakeholders can commit to another cycle to try to get to "Yes." Life

Cycle Architecture. Is there a sufficient definition of the preferred approach to satisfying

everyone's win conditions, and are all significant risks eliminated or mitigated? If the

stakeholders agree that the answer is "Yes", then the project has cleared this LCA milestone.

Otherwise, the project can be abandoned, or the stakeholders can commit to another cycle to

try to get to "Yes." Initial Operational Capability. Is there sufficient preparation of the

software, site, users, operators, and maintainers to satisfy everyone's win conditions by

launching the system? If the stakeholders agree that the answer is "Yes", then the project has

cleared the IOC milestone and is launched. Otherwise, the project can be abandoned, or the

stakeholders can commit to another cycle to try to get to "Yes.""Hazardous spiral look-

alikes" that violate this invariant include evolutionary and incremental processes that commit

significant resources to implementing a solution with a poorly defined

architecture.[clarification needed]

The three anchor point milestones fit easily into the Rational Unified Process (RUP), with

LCO marking the boundary between RUP's Inception and Elaboration phases, LCA marking

the boundary between Elaboration and Construction phases, and IOC marking the boundary

between Construction and Transition phases.

5. Focus on the system and its life cycle

This invariant highlights the importance of the overall system and the long-term concerns

spanning its entire life cycle. It excludes "hazardous spiral look-alikes" that focus too much

on initial development of software code. These processes can result from following published

approaches to object-oriented or structured software analysis and design, while neglecting

other aspects of the project's process needs.

Page 38: Final year project report on Internet And Interanet Emailing server

Page | 38

Fig 4.3: Spiral Model

Phases Involved in SPIRAL MODEL

1. Communicated Requirements (Analysis Phase)

It consists of planning and requirement definition activities. The end products of planning

are:

a) System Definition:-It is expressed in English. Ti incorporates charts, figures, graphs,

tables, etc. The notations used here are highly dependent on problem area.

b) Project Plan:-It contains the life-cycle model to be used at the beginning of development

schedule, beginning cost estimates and resource estimates, tools and techniques to be used

and standard practice to be followed.

There are two types of designing techniques followed in designing phase:-

i) Architectural Designing

Identifies various software components like functions data streams, data source.

Decouples and decomposes software components into modules and conceptual data

Specifies the inter connections between various software components.

ii) Detailed Debugging

Page 39: Final year project report on Internet And Interanet Emailing server

Page | 39

It is concerned with detail designing and implementation procedures to process the algorithm,

structure and interconnection between the modules and data structures. The various activities

that this phase includes are:

a) Adaption of the existing codes.

b) Modification of existing codes.

c) Design of data representation.

d) Packaging of software products.

2. Implementation Phase

It involves the translation of the designing specifications into source code. It involves activity

such as debugging, documentation and unit testing of source code.

In this stage, various programming can be followed like built in and user defined data types,

source type checking, flexible rules, concurrency construction.

3. Maintenance Phase

In this phase the activities include:

a) Corrective maintenance:-Correcting errors that were not discovered during the

product development phase.

b) Perfective Maintenance:-Improving the implementation of the system and enhancing

the functionality of the system according to customer’s requirements.

Page 40: Final year project report on Internet And Interanet Emailing server

Page | 40

PROJECT ANALYSIS

5.1 FRONT END

5.1.1 PHP

PHP is a server-side scripting language designed for web development but also used as a

general-purpose programming language. PHP stands for “hypertext pre-processor”

scripting language linked with apache server can be installed as an apache module.PHP

was created by “RASMUS LERDORF” in 1995.PHP originally stood for “personal

home page”. PHP is scripting language that was originally designed for web

development to produce dynamic web pages. PHP acts as an intermediate between the

server and the database. There is a request respond cycle between and the server. PHP is

a server side scripting language that is embedded in HTML. It is used to manage

dynamic content, databases, session tracking, even build entire e-commerce sites. It is

integrated with a number of popular databases, including MySQL, Oracle, Sybase,

Informix, and Microsoft SQL Server.

1. PHP stands for “hypertext preprocessor” scripting language linked with apache server

can be installed as an apache module.

2. PHP was created by “RASMUS LERDORF” in 1995.PHP originally stood for

“personal home page”.

3. PHP is scripting language that was originally designed for web development to

produce dynamic web pages.

PHP acts as an intermediate between the server and the database. There is a request

respond cycle between and the server.

5.5.2 HTML

HTML stands for “Hypertext Markup Language”. HTML is a set of markup language

tags. The tags describe document content. The html documents contain html tags and

plain text. Html is coded in the form of tags which are enclosed in angular bracket <>.

“Body” is the tag element. By using This tag we can start the body of the html page. In

html there are opening and closing tags. the closing tag is always slightly different from

the opening tag in that it has a forward slash after the first angled bracket :</html >.

A Web browser can read HTML files and compose them into visible or audible Web

pages. The browser does not display the HTML tags and scripts, but uses them to

interpret the content of the page. HTML describes the structure of

a Website semantically along with cues for presentation, making it a markup language,

rather than a programming language. Hypertext Markup Language, commonly referred to

as HTML, is the standard markup language used to create web pages.[1] It is written in

the form of HTML elements consisting of tags enclosed in angle brackets (like <html>).

HTML tags most commonly come in pairs like <h1> and </h1>, although some represent

Page 41: Final year project report on Internet And Interanet Emailing server

Page | 41

empty elements and so are unpaired, for example <img>. The first tag in such a pair is the

start tag, and the second is the end tag (they are also called opening tags and closing tags.

Web browsers can read HTML files and render them into visible or audible web pages.

Browsers do not display the HTML tags and scripts, but use them to interpret the content

of the page. HTML describes the structure of a website semantically along with cues for

presentation, making it a markup language, rather than a programming language.

HTML elements form the building blocks of all websites. HTML allows images and

objects to be embedded and can be used to create interactive forms. It provides a means to

create structured documents by denoting structural semantics for text such as headings,

paragraphs, lists, links, quotes and other items. It can embed scripts written in languages

such as JavaScript which affect the behavior of HTML web pages.

Web browsers can also refer to Cascading Style Sheets (CSS) to define the look and

layout of text and other material. The World Wide Web Consortium (W3C), maintainer

of both the HTML and the CSS standards, has encouraged the use of CSS over explicit

presentational HTML since 1999

i. < html > Tag

< html > tag tells the browser that it is an HTML element. It represents the root of HTML document.

ii. Heading Tags

Any document starts with a heading. You can use different sizes for your headings.

HTML also has six levels of headings, which use the elements <h1>, <h2>, <h3>, <h4>,

<h5>, and <h6>. While displaying any heading, browser adds one line before and one line

after that heading.

iii. Paragraph Tag

The <p> tag offers a way to structure your text into different paragraphs. Each

paragraph of text should go in between an opening and a closing.

iv. Line Break Tag

Whenever you use the <br /> element, anything following it starts from the next line.

This tag is an example of an empty element, where you do not need opening and closing

tags, as there is nothing to go in between them.

Page 42: Final year project report on Internet And Interanet Emailing server

Page | 42

The < br /> tag has a space between the characters br and the forward slash. If you omit this

space, older browsers will have trouble rendering the line break, while you miss the forward

slash it is not valid in XHTML.

5.1.3 CSS

A CSS stands for “Cascading Style Sheet”. A CSS file allows you to separate your web

sites(x) html from its style. As always you use your (x) html file to arrange the content, but

all of the presentation (font, color, background...) are accomplished within a CSS.CSS works

by allowing you to associate rules with the elements that appear in a web page. These rules

govern how the content of those elements should be rendered.CSS rule, which is made up of

two parts: the selector, which indicates which element or elements that appear in a web

page. This applies to more than one element, you can have a comma- separated list of

several elements).The decoration, which sets out how the elements referred to in the

selector, should be styled. The padding property allows you to specify how much space

should appear between the content of an element and its border.

The value of this property is most often specified in pixels, although it can use any of the

units of length we met earlier, a percentage, or the word inherit. The padding of an element

will not inherit by default, so if the <body> element inside it. If the value inherit is applied to

any elements, only then will they have the same padding and their parent element.

If a percentage is used, the percentage is of the containing box, and if the value of 10 percent

is specified, there would be 5 percent of each side of the box as padding. You can specify

different amounts of padding inside each side of a box using the following properties:

1.padding – bottom

2.padding – top

3.padding- left

4.padding-right

5.1.4 JAVASCRIPT

JavaScript is the world most popular programming language. JavaScript is a scripting

language. JavaScript is a programming code that can be inserted in to html pages. JavaScript

inserted to html page, can be executed by all modern web browsers. Along with refusing

other people scripts and folders, you can also write code that you can reuse yourself.

For example, you might build several sites that use a similar from that allows people to

contact the site owners. On each contact from there might be several fields that are required,

and you might decide to write a script to ensure that people fill in the required fields. Rather

than writing a new script that you can use on my contact from you write.

1. Beginnings at Netscape

JavaScript was originally developed by Brendan Eich, while he was working for Netscape

Communications Corporation. Indeed, while competing with Microsoft for user adoption of

Page 43: Final year project report on Internet And Interanet Emailing server

Page | 43

web technologies and platforms, Netscape considered their client-server offering a distributed

OS with a portable version of Sun Microsystems' Java providing an environment in which

applets could be run.[citation needed] Because Java was a competitor of C++ and aimed at

professional programmers, Netscape also wanted a lightweight interpreted language that

would complement Java by appealing to nonprofessional programmers, like Microsoft's

Visual Basic (see JavaScript and Java).Although it was developed under the name Mocha, the

language was officially called Live Script when it first shipped in beta releases of Netscape

Navigator 2.0 in September 1995, but it was renamed JavaScript when it was deployed in the

Netscape browser version 2.0B3.

The change of name from Live Script to JavaScript roughly coincided with Netscape adding

support for Java technology in its Netscape Navigator web browser. The final choice of name

caused confusion, giving the impression that the language was a spin-off of the Java

programming language, and the choice has been characterized as a marketing ploy by

Netscape to give JavaScript the cachet of what was then the hot new web programming

language

There is a common misconception that the JavaScript language was influenced by an earlier

web page scripting language developed by Nombas named C--, not to be confused with the

later C-- created in 1997. Brendan Eich, however, had never heard of C-- before he created

LiveScript.[17] Nombas did pitch their embedded web page scripting to Netscape, though

web page scripting was not a new concept, as shown by ViolaWWW. Nombas later switched

to offering JavaScript instead of C-- in their ScriptEase product and was part of the TC39

group that standardized ECMAScript.

2. Server-side JavaScript

Netscape introduced an implementation of the language for server-side scripting with

Netscape Enterprise Server in December, 1994, soon after releasing JavaScript for

browsers.[21][22] Since the mid-2000s, there has been a resurgence of server-side JavaScript

implementations, such as Node.js.

3. Adoption by Microsoft

Microsoft Windows script technologies including VBScript and JScript were released in

1996. JScript, a port of Netscape's JavaScript, was released on July 16, 1996 and was part of

Internet Explorer 3, as well as being available server-side in Internet Information Server. IE3

also included Microsoft's first support for Cascading Style Sheets and various extensions to

HTML, but in each case the implementation was noticeably different to that found in

Netscape Navigator at the time. These differences made it difficult for designers and

programmers to make a single website work well in both browsers leading to the use of 'best

viewed in Netscape' and 'best viewed in Internet Explorer' logos that characterised these early

years of the browser wars. JavaScript began to acquire a reputation for being one of the

Page 44: Final year project report on Internet And Interanet Emailing server

Page | 44

roadblocks to a cross-platform and standards-driven web. Some developers took on the

difficult task of trying to make their sites work in both major browsers, but many could not

afford the time. With the release of Internet Explorer 4, Microsoft introduced the concept of

Dynamic HTML, but the differences in language implementations and the different and

proprietary Document Object Models remained, and were obstacles to widespread take-up of

JavaScript on the web.

4. Standardization

In November 1996, Netscape announced that it had submitted JavaScript to Ecma

International for consideration as an industry standard, and subsequent work resulted in the

standardized version named ECMAScript. In June 1997, Ecma International published the

first edition of the ECMA-262 specification. In June 1998, some modifications were made to

adapt it to the ISO/IEC-16262 standard, and the second edition was released. The third

edition of ECMA-262 was published on December 1999.Development of the fourth edition

of the ECMAScript standard was never completed.[29] The fifth edition was released in

December 2009. The current edition of the ECMAScript standard is 5.1, released in June

2011.

5. Later developments

JavaScript has become one of the most popular programming languages on the Web. Initially,

however, many professional programmers denigrated the language because its target

audience consisted of Web authors and other such "amateurs", among other reasons.[31] The

advent of Ajax returned JavaScript to the spotlight and brought more professional

programming attention. The result was a proliferation of comprehensive frameworks and

libraries, improved JavaScript programming practices, and increased usage of JavaScript

outside Web browsers, as seen by the proliferation of server-side JavaScript platforms.

In January 2009, the CommonJS project was founded with the goal of specifying a common

standard library mainly for JavaScript development outside the browserWith the rise of the

single-page web app and JavaScript-heavy sites, it is increasingly being used as a compile

target for source-to-source compilers from both dynamic languages and static languages. In

particular, Emscripten and highly optimised JIT compilers, in tandem with asm.js that is

friendly to AOT compilers like OdinMonkey, have enabled C and C++ programs to be

compiled into JavaScript and execute at near-native speeds, causing JavaScript to be

considered the "assembly language of the web", according to its creator and others.

JavaScript, also known as ECMAScript (the trademarked name used for the standard), is a

dynamic programming language. It is most commonly used as part of web browsers, whose

implementations allow client-side scripts to interact with the user, control the browser,

communicate asynchronously, and alter the document content that is displayed. It is also used

in server-side network programming with runtime environments such as Node.js, game

development and the creation of desktop and mobile applications.

Page 45: Final year project report on Internet And Interanet Emailing server

Page | 45

JavaScript is classified as a prototype-based scripting language with dynamic typing and first-

class functions. This mix of features makes it a multi-paradigm language, supporting object-

oriented, imperative, and functional programming styles.

Despite some naming, syntactic, and standard library similarities, JavaScript and Java are

otherwise unrelated and have very different semantics. The syntax of JavaScript is actually

derived from C, while the semantics and design are influenced by the Self and Scheme

programming languages.

JavaScript is also used in environments that aren't web-based, such as PDF documents, site-

specific browsers, and desktop widgets. Newer and faster JavaScript virtual machines (VMs)

and platforms built upon them have also increased the popularity of JavaScript for server-side

web applications. On the client side, JavaScript has been traditionally implemented as an

interpreted language, but more recent browsers perform just-in-time compilation.

JavaScript has been standardized in the ECMAScript language specification.

5.2 BACK END

5.2.1 MYSQL

The commands we’ll use to direct MySQL throughout the rest of this book are part of a

standard called structured query language, or sql (pronounced as either “sequel” or “ess-cue-

ell”—take your pick). Commands in sql are also referred to as queries; I’ll use these two

terms interchangeably.

Sql is the standard language for interacting with most databases, so, even if you move from

MySQL to a database like Microsoftsql server in the future, you’ll find that the majority of

commands are identical. It’s important that you understand the distinction between sql and

MySQL. MySQL is the database server software that you’re using. Sql is the language that

you use to interact with that database. A database server (in our case, MySQL) is a program

that can store large amounts of information in an organized format that’s easily accessible

through programming languages like PHP.

MySQL officially, but also called "My Sequel" is (as of July 2013) the world's second most

widely used relational database management system (RDBMS)and most widely used open-

source RDBMS. It is named after co-founder Michael Wideness’s daughter, MySql. The

SQL acronym stands for Structured Query Language.

The MySQL development project has made its source code available under the terms of the

GNU General Public License, as well as under a variety of proprietary agreements. MySQL

was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB,

now owned by Oracle Corporation.

Page 46: Final year project report on Internet And Interanet Emailing server

Page | 46

MySQL is a popular choice of database for use in web applications, and is a central

component of the widely used LAMP open source web application software stack (and other

'AMP' stacks). LAMP is an acronym for "Linux, Apache, MySQL, Perl/PHP/Python." Free-

software-open source projects that require a full-featured database management system often

use MySQL.

For proprietary use, several paid editions are available, and offer additional functionality.

Applications which use MySQL databases include: TYPO3, MODx, Joomla, WordPress,

phpBB, MyBB, Drupal and other software. MySQL is also used in many high-profile, large-

scale websites, including Google (though not for searches), Facebook, Twitter, Flickr, and

YouTube.

For example, you could tell PHP to look in the database for a list of jokes that you’d like to

appear on your website. In this example, the jokes would be stored entirely in the database.

Page 47: Final year project report on Internet And Interanet Emailing server

Page | 47

RESULT AND RESULT ANALYSIS

6.1 SNAP-SHOTS

These are the snapshots which will show the various project functioning.The project is

divided into two section sone is admin and other one is user.firstly each one have to create a

account before accesing. This is login window of project for user and administrator i.e shown

in fig 6.1. Both have assigned a username and password then after authenticating from the

database, they are accesible for further operations which are shown.

6.1.1 Login Page

Fig 6.1: Login Page

Page 48: Final year project report on Internet And Interanet Emailing server

Page | 48

6.1.2 Account page

Once the user has been authenticated by its username and password then administrator

provide it’s further functioning of the mailing that may be of receving and sending. This

is home page of services i.e provided to user to access as shown in fig 6.2. The one

major feature here is that during sending of message if user want to acceess the google

there is link provided to get the information from internet.

Fig 6.2 Account page

Page 49: Final year project report on Internet And Interanet Emailing server

Page | 49

6 .1.3 HOME PAGE

The home page of the project is a page which contain list of various functioinig i.e provided

in your project same as shown in fig 6.3. These are the features which are provided in intranet

mailing system. There are major categories are:- registration, login panel,it’s features and

home. There will be next snapshot that will provide information about registration process.

Fig 6.3 Home Page

Page 50: Final year project report on Internet And Interanet Emailing server

Page | 50

6.1.4 SENDING MAIL

Once the user enter in email system , it can access any type of services that is provided to

them including sending and receiving email as shown in fig 6.4 which shows the sending of

email process. In this system user can attach any type of file including image, text and video

also. But there is limitation of file size that is up to 4 Mb. In future it may extended.

Fig 6.4 sending of mail

Page 51: Final year project report on Internet And Interanet Emailing server

Page | 51

6.2 Database snapshots

The figure 6.5 describing about the data of the database mail client. All the user

information is recorded in the database.

Fig 6.5 database of mail client

Page 52: Final year project report on Internet And Interanet Emailing server

Page | 52

This is the database of the admin information having username and password as shown in fig

6.6. All the information are recorded in the database about admin.

Fig 6.6 Database of admin info

Page 53: Final year project report on Internet And Interanet Emailing server

Page | 53

This database contains lot of information related to structure and key value pairs. It also tell

us about the data format of different fields as shown in below figure 6.7

Fig 6.7 Database of contact table

Page 54: Final year project report on Internet And Interanet Emailing server

Page | 54

The database of the message that the user get it from the other user is shown in fig 6.8 below.

This snapshot having complete information about the email transaction including user and

receiver address.

Fig 6.8 Database of Inbox

Page 55: Final year project report on Internet And Interanet Emailing server

Page | 55

Figure 6.9 describe us about the news that the user get it on the regular basis. This figure will

shows different answers of queries on the basis of user input and google search.

Fig 6.9- Database of news information

Page 56: Final year project report on Internet And Interanet Emailing server

Page | 56

6.3 DISCUSSIONS

The home page contains various links like login for user, administrator and google search

links. Once the user authenticated by entering the username and password it will enter into

login panel where further more services are provided.

The user home page contains following links like inbox, sent, trash, compose and last one is

logout. After performing following functions as per requirement user may choose logout

option link.

If in any case user is not logged out itself, and stopped working on it at last from 10 min then

itself be logged out. This is totally handled by session mechanism, which enhance security

feature in it.

Even Home page provides feedback mechanism also, in case user is not satisfied with

provided services it can provide suggestion with its feedback.

Once the user entered, It can send mails directly by using compose link, but it have entered

required email id. Even it provide facilities to send text, pdf, audio and video files.

Page 57: Final year project report on Internet And Interanet Emailing server

Page | 57

CONCLUSION

7.1 Introduction

It has been a great pleasure for me to work on this exciting and challenging project. This

project proved good for me as it provided practical knowledge of not only programming in

PHP web based application and no some extent Windows Application and SQL Server, but

also about all handling procedures related with emailing. It also provides knowledge about

the latest technology used in developing web enabled application and client server technology

that will be grate demand in future. This will provide better opportunities and guidance in

future in developing projects independently.

7.1.1 Benefits:

The project is identified by the merit of the system offered to the user. The merits of the

project are as follows:

1. It is a web enabled project.

2. This project offers users to enter the data through simple and interactive forms. This is

very helpful for the client to enter the desired information through so much simplicity.

3. The user is mainly more concerned about the validity of the data, whatever he is entering.

There are checks on every stages of any new creation, data entry or updating so that the

user cannot enter the invalid data, on which can create problem at later data.

4. Sometimes the user find in later stages of using project that he needs to update some of

the information that he entered earlier. There are options for him by which he can update

the records. Moreover there is restriction for his that he cannot change the primary data

field. This keeps the validity of the data to longer extent.

5. User is provided the option of monitoring the records he entered earlier. He can see the

desires records with the variety of options provided by him.

6. From every part of the project the user is provided with the links through framing so that

he can go from one option of project to other as per the requirement. This is bound to be

simple and very friendly as per the user is concerned. That is, we can say that the project

is user friendly which is one of the primary concerns of any good projects.

7. Data storage and retrieval will become faster and easier to maintain because data is stored

in a systematic manner and in a single database.

8. Easier and faster data transfer through latest technology associated with the computer and

communication.

9. Through these features it will increase the efficiency, accuracy and transparency.

7.1.2 Limitations:

1. The size of the database increases day by day, increasing the load on the database backup

and maintenance activity.

2. The functionality of an instant chat application is not yet implemented

Page 58: Final year project report on Internet And Interanet Emailing server

Page | 58

3. Comparing to other email applications, the facility of SHTTP and SSL encryption is not

implemented due to lack of resources.

This system being web based and an undertaking of Cyber Security Division needs to be

thoroughly tested to find out any security gaps.

1. A console for the data center may be may be made available to allow the personnel to

monitor on the sites which were cleared for hosting during a particular period.

2. An instant chat application

3. More security featured like SSL encryption and SHTTP protocol selection.

4. Forget password system.

5. Moreover, it is just a beginning; further the system may be utilized in various other types

of auditing operation viz. Network auditing or similar process/workflow based

application.

7.2 FUTURE SCOPE OF THE PROJECT

1. This project will enhance the security of the mailing server by using secured connection

2. This project can be enhanced more by applying cryptographic effect to the data that is

sent over the network

3. The project will provide a secure connection over a network by authenticating the user so

that there is more security in this project

Page 59: Final year project report on Internet And Interanet Emailing server

Page | 59

BIBLIOGRAPHY

Website Reference:

1. http://www.myprojects.com/sms.php

2. http://www.w3schools.com

3. http://www.wikipedia.org

4. www.projectguidance.com

5. http://e-library.net/

6. www.sourcecodeonline.com

7. www.developers.net

8. www.codeproject.com

Books:

1. Networking and Management:-James H. Greene

2. A focus on Forecasting, Lot Sizing, Safety emailing systems:-David J Plasocki

3. Principles of Networking:-Richard J. Tersine

RESEARCH PAPERS REFERENCE

1. Indian Institute of Technology, Kanpur (1997). The webmail service. pp 120-122, 140-

146

2. TATA Institute of social science (2000), 124(1–4): 125–137.

3. Institute of information science (2003) 18: pp. 153-171, 1999.

4. European University Institute (2005): pp. 9-282, 1984.