Simple mail transfer protocol ( smtp), Computer Networking

Assignment Help:

Simple Mail Transfer Protocol ( SMTP)

SMTP is the principal  application layer protocol for  internet electronic  mail. It uses the reliable data transfer  service of TCP  to transfer  mail from  the sender mail  from the  sender small server the recipient mail  server. SMTP has two sides a client side which  executes on the sender mail server and a server side which executes on the recipient mail  server both  the client  and server sides  of SMTP run on  every mail server when  a mail server  sends mail to other mail  servers it acts  as an SMTP client. When  a mail  server  receive  mail  from other mail  servers it acts as an SMTP  server.

To  illustrate the basic  operation of SMTP let go through  a common  scenario  suppose  heena  wants  to send Harish a simple  ASCII  message to Harish.

1.Heena  invokes her user agent for e mail provides Harish e mail address compose  a message and instructs the user agent to send to message.

2.Heena  user agent sends the message to her mail server wher it is placed in  message  queue.

3.The client side of SMTP running  on heena  mail server see the message in the message queue. It  opens TCP connection to an SMTP server  running on Harish  mail server.

4. After  some initial  SMTP handshaking the SMTP receives the message Harish  mail server then  places the message in Harish mail box.

5.Harish  invokes  his  user agent  to read the message at his convenience.

 

 

 


Related Discussions:- Simple mail transfer protocol ( smtp)

Explain systolic array interconnection networks, Systolic Array : This inte...

Systolic Array : This interconnection network is a kind of pipelined array architecture and it's intended for multidimensional flow of data. It is used for applying fixed algorithm

How to configure a wireless mac filter - ccna, Configure a Wireless MAC Fil...

Configure a Wireless MAC Filter Step: Add a Mac filter. Navigate back to the web utility page of the router (http://172.17.30.1). Navigate to the Wireless section a

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Networking, can we correct errors using crc?

can we correct errors using crc?

Redundant routing information, Notice repetition of information in routing ...

Notice repetition of information in routing table for node 1 as given above in the figure. We can see that switch has only outgoing connection, all traffic must goes that connec

What are all the base services provided by the os, What are all the Base se...

What are all the Base services provided by the OS? Interprocess communications (IPC) Task preemption Task priority Local/Remote Interprocess communication Semaphor

Prepare a lan from a set of stand-alone computers, Question 1: Describe...

Question 1: Describe the following terms in your own words: a. Internet b. WWW c. Intranet

Distribution system from bss, To Distribution System from BSS We requir...

To Distribution System from BSS We require to identify the AP as the first hop to the destination (B) A will receive an ACK from the AP - indicates frame successfully on

Cdma gsm back haul network, S t d "B" 6.4 m Ku-BAND EARTH STATION (2004) ...

S t d "B" 6.4 m Ku-BAND EARTH STATION (2004)   D-Sat (District Satellite Project) circuits for rural connectivity via satellite are in operation. Purpose of this project i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd