Electronic mail - application layer, Computer Networking

Assignment Help:

Electronic Mail

One  of the  most popular internet  services is electronic mail ( e mail). At  the beginning  of the internet era teh message sent by  electronic  mail were short and  consisted of text  only they let people  exchange  quick  memos. Today  electronic  mail is such  more  complex. It allows  a message  to include  text audio  and video  it also  allows one message to sent  to one or more  recipients.

Figure presents a high  level  view of the internet  of the  internet mail  system. It has  three major components user agents mail servers, and  the simple  mail  transfer protocol (SMTP). We now  assume  that a  sender  heena sending an e mail  message  to a recipient Harish. User  agents allow users to read reply to forward save and compose message. When  server when Harish  wants to read a message his user agent retrieves the message from his mailbox in his mail server.

262_electronic mail.jpg

                                                                figure A high  level view of the Internet e- mail system

 

Each recipient  such as harsh  has a mailbox  located in one of the servers. Harish  mail box manages  and maintains the messages that have been sent to him. A  messages  starts its journey in the sender user agent  travels to the sender mail server and travels  to the recipient mail  server where  it is deposited in the recipient mail box  when  box  authenticates Harish  ( with  user name and password).  If Heena serve cannot  deliver mail to  Harish  server Heena  server holds the message in a message  queue  and attempts to transfer the message  later.


Related Discussions:- Electronic mail - application layer

Which steps are used at receiver end by check sum, Q. Which steps are used ...

Q. Which steps are used at receiver end by check sum? The receiver follows these steps: The unit is divided into "k" sections each of "n" bits All sections are

Describe about cryptography, Q. Describe about Cryptography? - Some med...

Q. Describe about Cryptography? - Some media cannot be protected from unauthorized reception (or interception) - Encryption involves transforming the original information in

Networking, What is the implication of increasing and decreasing subnet Bit...

What is the implication of increasing and decreasing subnet Bits?

Protocol layers and their service models - computer network, Protocol Laye...

Protocol Layers and their Service Models The  internet is an extremely complicated system. It  consists of many  pieces like  numerous  applications and protocols  various  t

Process server, Using a process server (such as inetd or xinetd) to listen ...

Using a process server (such as inetd or xinetd) to listen on a set of well-popular ports and start one another server.  I said that it had much to do with overhead.  Say you set u

Ip, what is dce

what is dce

Explain the hubs and repeaters, Hubs/Repeaters Hubs/Repeaters are used ...

Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exc

Logged into a router, You are logged into a router, what command would repr...

You are logged into a router, what command would represent you the IP addresses of routers linked to you? Ans)show cdp neighbors detail

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd