Electronic mail - application layer, Computer Networking

Assignment Help:

Electronic Mail

One  of the  most popular internet  services is electronic mail ( e mail). At  the beginning  of the internet era teh message sent by  electronic  mail were short and  consisted of text  only they let people  exchange  quick  memos. Today  electronic  mail is such  more  complex. It allows  a message  to include  text audio  and video  it also  allows one message to sent  to one or more  recipients.

Figure presents a high  level  view of the internet  of the  internet mail  system. It has  three major components user agents mail servers, and  the simple  mail  transfer protocol (SMTP). We now  assume  that a  sender  heena sending an e mail  message  to a recipient Harish. User  agents allow users to read reply to forward save and compose message. When  server when Harish  wants to read a message his user agent retrieves the message from his mailbox in his mail server.

262_electronic mail.jpg

                                                                figure A high  level view of the Internet e- mail system

 

Each recipient  such as harsh  has a mailbox  located in one of the servers. Harish  mail box manages  and maintains the messages that have been sent to him. A  messages  starts its journey in the sender user agent  travels to the sender mail server and travels  to the recipient mail  server where  it is deposited in the recipient mail box  when  box  authenticates Harish  ( with  user name and password).  If Heena serve cannot  deliver mail to  Harish  server Heena  server holds the message in a message  queue  and attempts to transfer the message  later.


Related Discussions:- Electronic mail - application layer

When would we use isdn, We use IDSN supports high speed voice, data and vid...

We use IDSN supports high speed voice, data and video and is a good choice for many small businesses.

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Explain the term instruction pipelines, Instruction Pipelines The strea...

Instruction Pipelines The stream of instructions in instruction execution cycle may be realized by a pipeline where overlapped executions of various operations are performed. T

Verify vlans and trunking - ccna, Verify VLANs and trunking. Use the sh...

Verify VLANs and trunking. Use the show ip interface trunk command on S1 and the show vlan command on S2 to determine that the switches are trunking correctly and the proper VL

Tech ed, can you help me convert binary into decimals?

can you help me convert binary into decimals?

Determine the major advantages of ring topology, Point out the major advant...

Point out the major advantages of Ring Topology. The benefits of ring topologies are: a. They are very simple to troubleshoot because every device incorporates a repeater.

operational amplifier and peak detector circuit, Question The operatio...

Question The operational amplifier in the peak detector circuit shown in the figure below is powered from plus and minus 15 V. If Vout is at 1V and Vin is at 0.5V, at approxima

FTP, study on FTP

study on FTP

Key features of spontaneous networking, QUESTION a) Give a detailed exp...

QUESTION a) Give a detailed explanation of the following: Some dynamics systems can be built as variations on the client server model. b) Give one main drawback of the "Thin

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd