Process of an e-mail transfer across the internet, Computer Engineering

Assignment Help:

Q. Process of An e-mail transfer across the Internet?

When you open your mail client to read your e-mail, this is what normally happens:

1. Mail client (Netscape Mail, Microsoft Outlook, Lotus Notes etc.) opens a connection to its default mail server. Mail server's IP address or domain name is typically setup when mail client is installed.

2. Mail server will always transmit first message to identify itself.

3. Client will send an SMTP HELO command to which the server would respond with a 250 OK message.

4. Depending on whether client is checking mail, sending mail etc. the appropriate SMTP commands would be sent to the server, which will respond accordingly.

5. This response/request transaction will continue until the client sends an SMTP QUIT command. Server will then say goodbye and connection will be closed.

Likewise, when you send an e-mail message your computer sends it to an SMTP server. Server forwards it to the recipient's mail server depending on email address. Received message is stored at the destination mail server until addressee retrieves it. To receive E-mail a user Internet account includes an electronic mailbox. A message sent for you is received at your Internet host computer, where it is stored in your electronic mailbox. The instant you login into your Internet account, one of the first things you must do is to check your mailbox.

868_Process of An e-mail transfer across the Internet.png

Figure: An e-mail transfer across the Internet uses two programs: client and server

E-mail system follows client-server approach to transfer messages across the Internet. When a user sends an E-mail message a program on the sender's computer becomes a client. It contacts an e-mail server program on recipient's computer and transfers a copy of message. Some of the mail programs those exist on Internet are UCB mail, Pine, Elm etc. Though, one thing, which you should emphasize when selecting a mail program, is user friendliness of that program. Through E-mail on Internet you can be in direct touch of your friend and colleagues.


Related Discussions:- Process of an e-mail transfer across the internet

Show the liability of cpu in interrupt cycle, Q. Show the liability of CPU ...

Q. Show the liability of CPU in interrupt cycle? In the interrupt cycle the liability of CPU/Processor is to ensure whether any interrupts have happened checking presence of in

What is schedulers, What is schedulers?  A process migrates between the...

What is schedulers?  A process migrates between the various scheduling queues throughout its life time. The OS must select processes from these queues in some fashion. This sel

Add multiple layout cells, Q. Add Multiple Layout Cells ? Next you will...

Q. Add Multiple Layout Cells ? Next you will add three layout cells below the logo cell you just created. Afterwards you will insert page's navigation buttons in these cells.

SERVER, How to configure TSM server

How to configure TSM server

Segment combinations, Segment Combinations In 8086 assembler provides a...

Segment Combinations In 8086 assembler provides a means for combining segments declared in various modules. Some typical combine types are: 1.   PUBLIC: This combine directi

Calculations for a standard vga graphics screen, Q. Calculations for a stan...

Q. Calculations for a standard VGA graphics screen? Let's do the calculations for a standard VGA graphics screen (640×480) using 16 colours. Total number of Pixels = 640 ×48

What is meant by maskable interrupts, A interrupt that can be turned off by...

A interrupt that can be turned off by the programmer is called as Maskable interrupt.

Towers of hanoi problem, The Towers of Hanoi Problem Towers of Hanoi pro...

The Towers of Hanoi Problem Towers of Hanoi problem is described. There are three pegs on which disks are "threaded" (there are holes in the disks to allow them to be placed on

Differentiate between protection and security, Differentiate between Protec...

Differentiate between Protection and Security Operating system contains a collection of objects, hardware or software. Every object has a unique name and can be accessed via a

Explain vector-vector instructions, Vector-Vector Instructions In this...

Vector-Vector Instructions In this category, vector operands are fetched from vector register and accumulated in another vector register. These instructions are indicated with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd