Mail access protocols - application layer, Computer Networking

Assignment Help:

Mail Access Protocols

The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves message  with either  a web  browser  or an e mail client  that uses one of a number of mail  retrieval protocols.

Some clients  and servers preferentially use  vendor  specific  proprietary protocols. But  most  support  the internet  protocols, SMTP for sending  e mail  and POP3 ( post  office protocols version 3) and IMP4 ( internet Mail Access protocols , version 4 for  retrieving email  allowing mterprebability  with other servers and clients. SMTP can also  be used  for retrieving  email. It  is more  suitable for permanent  internet connection than  say a dialup connection and is not supported by most  e mail  client  software.


Related Discussions:- Mail access protocols - application layer

Unix for multiprocessor system, UNIX For Multiprocessor System:- The UN...

UNIX For Multiprocessor System:- The UNIX operating system for a multiprocessor system has a number of additional features as compared to the normal UNIX operating system.  Let

What is proxy ARP, What is Proxy ARP? Is using a router to give answer ...

What is Proxy ARP? Is using a router to give answer ARP requests. This will be completed when the originating host believes that a destination is local, when in fact is lies be

Point out the drawbacks of token ring, Point out the drawbacks of Token Rin...

Point out the drawbacks of Token Ring. Few of the drawbacks of Token Ring are: a. Token Ring is very costly. All topology components cost much more than other more popular s

Packet switching and virtual circuit packet switching, Describe Circuit swi...

Describe Circuit switching, Packet switching and Virtual Circuit Packet switching. Explain their suitability for different applications such as telephone and internet. Packet S

Define about the term - hackers, Define about the term - hackers Every ...

Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are

Explain how contract net works, Question 1 Contract Net Protocol is the...

Question 1 Contract Net Protocol is the best known and most widely used cooperation protocol Explain how contract net works Discuss the benefits and limitations of con

How can data to be exchanged between networks, Q. How can data to be exchan...

Q. How can data to be exchanged between Networks? Internetwork Links in an internetwork

State in brief about the local area network, State in brief about the Local...

State in brief about the Local Area Network (LAN) LAN is an interconnection of computers and associated peripherals as well as to the communications system as shown in Figure

Tcp connections - transport layer, TCP Connections TCP  is an end to e...

TCP Connections TCP  is an end to end point to point  transport  used in internet. being a point  to point  protocols  means that  there is always  s single  sender  a single

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd