Basic functions of e-mail system, Computer Network Security

Assignment Help:

Basic functions of e-mail system are given as follows:

Composition refers to the procedure of creating messages and the answers. Though any text editor can be used for the body of the message, the system itself can give support with addressing and the numerous header fields attached to each message.  For example, when answering the message, the e-mail system can extract the originator's address from incoming e- mail and automatically put in it into the proper place in the reply.

Transfer It refers to the moving messages from the originator to the recipient. In large part, this  requires  establishing  the  connection  to  the  destination  or  any  o9f the intermediate  machine, outputting the message, and releasing the connection. The e-mail system should perform this automatically, without bothering and disturbing the user.

Reporting:  It has to perform with telling the originator what happened to the message. Was it delivered or is still pending? Was it rejected or accepted by the person? Was it lost due to some reasons? Number of applications exists in which confirmation of delivery is significant and may even have legal significance (''Well, Your Honour, my e-mail system is not very much reliable, so I guess the electronic subpoena just got lost somewhere'').

Displaying incoming messages is required so the people can read their e-mail. Sometimes conversion is needed or a special viewer should be invoked, for instance, if the message is a PostScript file or the digitized voice. Easy conversions and formatting are sometimes attempted as well.

Disposition is the last step and concerns what the recipient does with message after receiving it. Possibilities contain throwing it away before reading, throwing it away after reading the content, saving it, etc. It must also be possible to retrieve and reread the saved messages, forward them, or process them in the other ways.

Additionally to these basic services, some of the e-mail systems, especially internal corporate ones, provide a variety of advanced features. Move or when they are away for some time,  they  may  desire  their  e-mail  forwarded,  so  the  system  must  be  able  to  do  this automatically.

Most systems permit users to create mailboxes to the store incoming e-mail. Commands are required to create and destroy mailboxes, check the contents of mailboxes, insert and delete messages from the mailboxes, and so on.

Corporate  managers  frequently  require  to  send  a  message  to  each  of  their  customers, subordinates, or suppliers. This gives rise to the idea of the mailing list, which is a list of e-mail addresses. When the message is sent to the mailing list, alike copies are delivered to everyone in the list.

Other advanced features are carbon copies, high-priority e-mail, secret (i.e., encrypted) e-mail, blind carbon copies, alternative recipients if the primary one is not presently available, and the ability for secretaries to read and reply their bosses' e-mail.


Related Discussions:- Basic functions of e-mail system

Direct point-to-point communication:, Early networks used simple point-to...

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

Explain possible attacks on rsa encryption, Problem (a) Describe RSA a...

Problem (a) Describe RSA algorithm with an example. (b) Answer the following RSA encryption, given the values of the primes are: p = 17, q = 11 and choosing e = 7. (c)

Define packet, CONCEPT OF PACKET : Network systems splits data in small ...

CONCEPT OF PACKET : Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to

Important features of application layer, Describe the important features of...

Describe the important features of application layer. The features of the application layer are as follows. 1. Efficient User Interface Design is explained below: Appli

Guided media, Guided Media These are those that give a conduit from on...

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

Collision, COLLISION: The receiver can get simultaneous requests, which gi...

COLLISION: The receiver can get simultaneous requests, which gives in collision at receivers and both service lost and in this way no transmitter accepts reservations and both use

Base lining-risk management, Base lining •    Organizations do not have ...

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

Develop a preliminary simulation model, Question: (a) State the strong ...

Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

Tree decomposition, (a) Define what you understand by the following terms ...

(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

Attacks on cryptosystems-cryptography, Attacks on Cryptosystems Attacks a...

Attacks on Cryptosystems Attacks are attempts to achieve unauthorized access to secure communications have characteristically used brute force attacks. Attacker may alternatively

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd