You are on page 1of 3

Concept and Design of a Things Mail System

By Neng-Geng Huang Bing-Liang Zhang

APPROACH:
This paper proposes a mail control system, which manage and control the delivery of physical mails based on the TCP/IP network. This mail system consist of mail servers and mail boxes, which store physical mails for users temporally and are supervised by mail servers through the Internet. In order to achieve the interoperation of mail systems, this paper proposes concepts of Universal Traceable Identifier (UTID) and Identifier Tracing Protocol (IDTP). All mail addresses and mail boxes are identified by UTIDs and all the communications between mail servers and mail boxes are based on IDTP protocol.

Pros & Cons:

TCP/IP have some advantages than UDP protocol such are o Good failure recovery o The ability to add networks without interrupting existing services o High error-rate handling o Platform independence o Low data overhead

And it also have some serious disadvantages, some are Security is the main disadvantage in this mail system Implementing SSL for any communication has one disadvantage: it requires both parties to the communication to do extra work in exchanging handshakes and encrypting and decrypting the messages, making this form of communication slower than communication without SSL.

Development of Multimedia E-mail System Providing an Integrated Message View


Seh-Joon Dokko, Sung-Hyun Yun, Tai-Yun Kim

APPROACH:
Multimedia E-mail system has been developed according to the MIME standard in order to solve the limitations of transportation of multimedia messages. The redefined hypertext mark-up language (HTML) syntax is applied to the E-mail system for the purpose of viewing a multimedia message as an integrated form. It makes users understand a message better: The proposed E-mail system also provides convenient functions of message authoring and displaying for users.

Pros & Cons:


One of the advantages is that MIME tells which category a file belongs to: application, text, video etc. Another advantage is that MIME type is usually detected based on the file contents, not just the name; it is therefore more exact. Disadvantage of this particularly is that some compound formats are considered an application when they are indeed not one.

An Object-Oriented, Locally Distributed Mail System


GUY T, CARA L. HOLMAN

APPROACH:
This Project conducts research in the design and implementation of a distributed computing environment for a local area network. A specific goal in designing Eden was to provide users the advantages of both physical distribution and logical integration. This mail system provided an early test as a base for building distributed applications. This paper discusses and shows how advanced functionality aided us in structuring a distributed mail system, particularly in the areas of replying and distribution lists.

Pros & Cons:


Distributed computing have several advantages o Cost-efficient

o Use of a communication network that connects several computers o Improved performance o Easier to expand and manage

Disadvantages of Distributed Systems over Centralized ones o Inherent security issue. o If the network gets saturated then problems with transmission will surface. o Software: There is currently very little less software support for Distributed system. o Troubleshooting: Troubleshooting and diagnosing problems in a distributed system can also become more difficult, because the analysis may require connecting to remote nodes or inspecting communication between nodes.

E-mail System based on Dynamic Password and Fingerprint Recognition


Liu Cuilin, Shen Yongjun

APPROACH:
In this paper, they designed a high-security email system using dynamic password and fingerprint recognition to solve the shortages of traditional system. In order to guarantee the security of users fingerprint characteristic value, we encrypt it with dynamic password. Using a two-way authentication method, not only ensure authentication server can recognize the users, but also guarantee the users can verify authentication server, effectively prevent e-mail from counterfeiting and tampering.

Pros & Cons:


Constructing this type of system requires high cost. Implementation of this system is hard. Casual users may not require this kind of heavy security.

In the other hand we also have some advantages too When it is implemented in large companies who needs privacy this system may give what they wanted. Makes difficult to hack confidential informations. Guarantees that server is authentic.

You might also like