Process of an e-mail transfer across the internet, Computer Engineering

Assignment Help:

Q. Process of An e-mail transfer across the Internet?

When you open your mail client to read your e-mail, this is what normally happens:

1. Mail client (Netscape Mail, Microsoft Outlook, Lotus Notes etc.) opens a connection to its default mail server. Mail server's IP address or domain name is typically setup when mail client is installed.

2. Mail server will always transmit first message to identify itself.

3. Client will send an SMTP HELO command to which the server would respond with a 250 OK message.

4. Depending on whether client is checking mail, sending mail etc. the appropriate SMTP commands would be sent to the server, which will respond accordingly.

5. This response/request transaction will continue until the client sends an SMTP QUIT command. Server will then say goodbye and connection will be closed.

Likewise, when you send an e-mail message your computer sends it to an SMTP server. Server forwards it to the recipient's mail server depending on email address. Received message is stored at the destination mail server until addressee retrieves it. To receive E-mail a user Internet account includes an electronic mailbox. A message sent for you is received at your Internet host computer, where it is stored in your electronic mailbox. The instant you login into your Internet account, one of the first things you must do is to check your mailbox.

868_Process of An e-mail transfer across the Internet.png

Figure: An e-mail transfer across the Internet uses two programs: client and server

E-mail system follows client-server approach to transfer messages across the Internet. When a user sends an E-mail message a program on the sender's computer becomes a client. It contacts an e-mail server program on recipient's computer and transfers a copy of message. Some of the mail programs those exist on Internet are UCB mail, Pine, Elm etc. Though, one thing, which you should emphasize when selecting a mail program, is user friendliness of that program. Through E-mail on Internet you can be in direct touch of your friend and colleagues.


Related Discussions:- Process of an e-mail transfer across the internet

What is a program counter, It is a 16 bit special function register in the ...

It is a 16 bit special function register in the 8085 microprocessor. It remains track of the next memory address of the instruction that is to be implemented once the implementatio

Differentiate traditional commerce and electronics commerce, Differentiate ...

Differentiate Traditional Commerce verses Electronics Commerce. Identity: Into traditional commerce customers can simply authenticate the identity of a merchant simply throug

Id3 algorithm, ID3 algorithm: Further for the calculation for informat...

ID3 algorithm: Further for the calculation for information gain is the most difficult part of this algorithm. Hence ID3 performs a search whereby the search states are decisio

Mobility management in mobile systems, Instruction 1. You can do this i...

Instruction 1. You can do this individually or in groups of 2-3 students. 2. Any material copied and pasted from anywhere (e.g., figures and text) is considered plagiarism even

Applications of thermodynamics, Discuss the applications of thermodynamics ...

Discuss the applications of thermodynamics in field of energy technology Sol: Thermodynamics has wide applications as basis of thermal engineering. Nearly all process and engi

Advantages offered by data mining, Advantages offered by Data Mining: 1...

Advantages offered by Data Mining: 1.  Facilitates discovery of knowledge from big, massive data sets. 2.  Can be used within dissimilar application areas by Fraud detection

Write decoder functionality in only one statement in verilog, Write decoder...

Write decoder functionality in only one statement in verilog module decoder( // Outputs dout, // Inputs din ); input [3:0] din; output [15:0] dout;

Determine the handles data rate of broad band isdn, Broad Band ISDN handles...

Broad Band ISDN handles data rate of about (A) 64 kbps                                      (B) 100 mbps (C) 5.4 mbps                                    (D) 2.048 mbps

What is debate - architecture, What is Debate Debate took place in the ...

What is Debate Debate took place in the 1980s and first half of the 1990s. It was resolved as RISC the winner since it allows more efficient pipelining, results in simpler hard

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd