Process of an e-mail transfer across the internet, Computer Engineering

Assignment Help:

Q. Process of An e-mail transfer across the Internet?

When you open your mail client to read your e-mail, this is what normally happens:

1. Mail client (Netscape Mail, Microsoft Outlook, Lotus Notes etc.) opens a connection to its default mail server. Mail server's IP address or domain name is typically setup when mail client is installed.

2. Mail server will always transmit first message to identify itself.

3. Client will send an SMTP HELO command to which the server would respond with a 250 OK message.

4. Depending on whether client is checking mail, sending mail etc. the appropriate SMTP commands would be sent to the server, which will respond accordingly.

5. This response/request transaction will continue until the client sends an SMTP QUIT command. Server will then say goodbye and connection will be closed.

Likewise, when you send an e-mail message your computer sends it to an SMTP server. Server forwards it to the recipient's mail server depending on email address. Received message is stored at the destination mail server until addressee retrieves it. To receive E-mail a user Internet account includes an electronic mailbox. A message sent for you is received at your Internet host computer, where it is stored in your electronic mailbox. The instant you login into your Internet account, one of the first things you must do is to check your mailbox.

868_Process of An e-mail transfer across the Internet.png

Figure: An e-mail transfer across the Internet uses two programs: client and server

E-mail system follows client-server approach to transfer messages across the Internet. When a user sends an E-mail message a program on the sender's computer becomes a client. It contacts an e-mail server program on recipient's computer and transfers a copy of message. Some of the mail programs those exist on Internet are UCB mail, Pine, Elm etc. Though, one thing, which you should emphasize when selecting a mail program, is user friendliness of that program. Through E-mail on Internet you can be in direct touch of your friend and colleagues.


Related Discussions:- Process of an e-mail transfer across the internet

Discuss about second generation electronic computers, Second Generation (19...

Second Generation (1954-1962) The second generation saw various significant developments at every level of computer system design, from technology used to build the basic circu

What is simd, What is SIMD? Single Instruction stream, Multiple Data st...

What is SIMD? Single Instruction stream, Multiple Data stream (SIMD) shows an organization that contains many processing units under the supervision of a common control unit. A

Two different ways of building a match code object, What are the two differ...

What are the two different ways of building a match code object? A match code can be built in two dissimilar ways: Logical structure: The matchcode data is set up not pe

Show the connections used in sound cards, Q. Show the Connections used in S...

Q. Show the Connections used in Sound cards? Sound cards must have connections to allow different functions.  One of the most significant is MIDI port (MIDI signifies Musical I

Explain vector-scalar instructions, Vector-Scalar Instructions In this ...

Vector-Scalar Instructions In this category, when combination of vector and scalar are fetched and stored in vector register. These instructions are referred with the subsequen

more data items and methods, Create a class called ticket that records the...

Create a class called ticket that records the information of a performance ticket.The class should include at least six data items: performanceId, seatRow, seatNo, class, price, da

A digital signature, A digital signature is   encrypting information

A digital signature is   encrypting information

Scsi bus - computer architecture, SCSI Bus:   Defined by ANSI - X3....

SCSI Bus:   Defined by ANSI - X3.131   50, 68 or 80 pins   Max. transfer rate - 160 MB/s, 320 MB/s. SCSI Bus Signals   Small Computer System Interface

Big – endian and little- endian representations, Explain Big - Endian and L...

Explain Big - Endian and Little- Endian representations Ans: The Big- endian is used where lower byte addresses are used for the more significant bytes (leftmost bytes) of the

What is a virtual address, Q. What is a virtual address? Von Neumann ha...

Q. What is a virtual address? Von Neumann had suggested that execution of a program is possible only if program and data are residing in memory. In such a condition program len

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd