Process of an e-mail transfer across the internet, Computer Engineering

Assignment Help:

Q. Process of An e-mail transfer across the Internet?

When you open your mail client to read your e-mail, this is what normally happens:

1. Mail client (Netscape Mail, Microsoft Outlook, Lotus Notes etc.) opens a connection to its default mail server. Mail server's IP address or domain name is typically setup when mail client is installed.

2. Mail server will always transmit first message to identify itself.

3. Client will send an SMTP HELO command to which the server would respond with a 250 OK message.

4. Depending on whether client is checking mail, sending mail etc. the appropriate SMTP commands would be sent to the server, which will respond accordingly.

5. This response/request transaction will continue until the client sends an SMTP QUIT command. Server will then say goodbye and connection will be closed.

Likewise, when you send an e-mail message your computer sends it to an SMTP server. Server forwards it to the recipient's mail server depending on email address. Received message is stored at the destination mail server until addressee retrieves it. To receive E-mail a user Internet account includes an electronic mailbox. A message sent for you is received at your Internet host computer, where it is stored in your electronic mailbox. The instant you login into your Internet account, one of the first things you must do is to check your mailbox.

868_Process of An e-mail transfer across the Internet.png

Figure: An e-mail transfer across the Internet uses two programs: client and server

E-mail system follows client-server approach to transfer messages across the Internet. When a user sends an E-mail message a program on the sender's computer becomes a client. It contacts an e-mail server program on recipient's computer and transfers a copy of message. Some of the mail programs those exist on Internet are UCB mail, Pine, Elm etc. Though, one thing, which you should emphasize when selecting a mail program, is user friendliness of that program. Through E-mail on Internet you can be in direct touch of your friend and colleagues.


Related Discussions:- Process of an e-mail transfer across the internet

Why is fragmentation needed on internet not on a typical wan, Why is fragme...

Why is fragmentation needed on Internet not on a typical WAN? TCP/IP protocol utilizes the name IP datagram to demote to an Internet packet. The amount of data carried into a d

Handling interrupts - computer architecture, Handling Interrupts: Pre...

Handling Interrupts: Precise interrupts (sequential semantics) Complete instructions before the offending instructions o   Force trap instruction into IF o

Explain their characteristics and limitations of grammar, Identify the diff...

Identify the different classes of grammar. Explain their characteristics and limitations. As proposed through Noam Chomsky that Chomsky hierarchy contains the subsequent level

What is basic working of modem, Q. What is basic working of Modem? A mo...

Q. What is basic working of Modem? A modem (modulator/demodulator) is an electronic device that takes digital data as a serial stream of bits and produces a modulated carrier s

What is a thread, What is a thread? A thread otherwise called a lightwe...

What is a thread? A thread otherwise called a lightweight process (LWP) is a basic unit of CPU utilization, it comprises of a thread id, a program counter, a register set and a

Find the nyquist rate, Find the Nyquist rate for the following signals: (a)...

Find the Nyquist rate for the following signals: (a) x(t) = 5 sin 3000πt cos 4000πt (b) A binary channel with bit rate 36000 bps is available for PCM voice transmission. Fi

Describe the modes of wave propagation, Question : a) Describe the foll...

Question : a) Describe the following modes of wave propagation: - Line of sight - Ground waves - Skywaves b) Why can waves with a very low frequency be used for submar

Environment of the packet flow, Q. Environment of the Packet Flow? Prot...

Q. Environment of the Packet Flow? Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!"

Explain real time operating system, Explain Real Time Operating System? ...

Explain Real Time Operating System? Real time operating System: A real-time operating system has suitably-defined, fixed time constraints. Processing should be done in the d

Explain management information base variables, Explain MIB (Management Info...

Explain MIB (Management Information Base) variables. MIB is a set of named items which an SNMP agent knows. To control or monitor a remote computer, a manager should fetch or s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd