Electronic mail - application layer, Computer Networking

Assignment Help:

Electronic Mail

One  of the  most popular internet  services is electronic mail ( e mail). At  the beginning  of the internet era teh message sent by  electronic  mail were short and  consisted of text  only they let people  exchange  quick  memos. Today  electronic  mail is such  more  complex. It allows  a message  to include  text audio  and video  it also  allows one message to sent  to one or more  recipients.

Figure presents a high  level  view of the internet  of the  internet mail  system. It has  three major components user agents mail servers, and  the simple  mail  transfer protocol (SMTP). We now  assume  that a  sender  heena sending an e mail  message  to a recipient Harish. User  agents allow users to read reply to forward save and compose message. When  server when Harish  wants to read a message his user agent retrieves the message from his mailbox in his mail server.

262_electronic mail.jpg

                                                                figure A high  level view of the Internet e- mail system

 

Each recipient  such as harsh  has a mailbox  located in one of the servers. Harish  mail box manages  and maintains the messages that have been sent to him. A  messages  starts its journey in the sender user agent  travels to the sender mail server and travels  to the recipient mail  server where  it is deposited in the recipient mail box  when  box  authenticates Harish  ( with  user name and password).  If Heena serve cannot  deliver mail to  Harish  server Heena  server holds the message in a message  queue  and attempts to transfer the message  later.


Related Discussions:- Electronic mail - application layer

Persistent and no persistent connections, Persistent and No persistent Conn...

Persistent and No persistent Connections HTTP can use  both  persistent  and non persistent connection. By defaults  uses persistent  connections. Persistent Connections

Inductor, #clasification of inductor

#clasification of inductor

Connectionless service, In connectionless schema, there is no connection re...

In connectionless schema, there is no connection required. The source of data includes destination information in data and transmit to the network. Network transmit each data item

Discuss network interface using any os, Question 1 List 10 common ActiveX ...

Question 1 List 10 common ActiveX controls Question 2 Discuss Network Interface using any OS Question 3 Explain BGP components and its working Question 4 G

How intranets encourage integration of applications, How Intranets encourag...

How Intranets encourage integration of applications Intranets encourage integration of applications; such as the simple word processing application could be easily linked with

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Global positioning system (gps) tracking, By utilizing measurements of the ...

By utilizing measurements of the so-called pseudo range between an object and each of several earth orbiting GPS satellites, the object can be very accurately located in space. A g

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd