Simple mail transfer protocol ( smtp), Computer Networking

Assignment Help:

Simple Mail Transfer Protocol ( SMTP)

SMTP is the principal  application layer protocol for  internet electronic  mail. It uses the reliable data transfer  service of TCP  to transfer  mail from  the sender mail  from the  sender small server the recipient mail  server. SMTP has two sides a client side which  executes on the sender mail server and a server side which executes on the recipient mail  server both  the client  and server sides  of SMTP run on  every mail server when  a mail server  sends mail to other mail  servers it acts  as an SMTP client. When  a mail  server  receive  mail  from other mail  servers it acts as an SMTP  server.

To  illustrate the basic  operation of SMTP let go through  a common  scenario  suppose  heena  wants  to send Harish a simple  ASCII  message to Harish.

1.Heena  invokes her user agent for e mail provides Harish e mail address compose  a message and instructs the user agent to send to message.

2.Heena  user agent sends the message to her mail server wher it is placed in  message  queue.

3.The client side of SMTP running  on heena  mail server see the message in the message queue. It  opens TCP connection to an SMTP server  running on Harish  mail server.

4. After  some initial  SMTP handshaking the SMTP receives the message Harish  mail server then  places the message in Harish mail box.

5.Harish  invokes  his  user agent  to read the message at his convenience.

 

 

 


Related Discussions:- Simple mail transfer protocol ( smtp)

What are the unix-based firewalls, What are the Unix-based firewalls T...

What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Find the main problems with access points in a wireless lan, Question: ...

Question: Wireless Access points have been known to have various security vulnerabilities that can lead to breach of Secured wired networks. IEEE 802.11 standards have identifi

Advantages of ls over dv algorithm, Advantages of LS over DV algorithm ...

Advantages of LS over DV algorithm There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. The

Explain how a cdma system works, (a) Explain how a CDMA system works? (b...

(a) Explain how a CDMA system works? (b) Explain howWelsh-Hadamard codes are generated. Explain why orthogonality between different spreading codes is important. (c) Consider

Explain the OSI Model Facts, OSI Model Facts The OSI model classifies a...

OSI Model Facts The OSI model classifies and organizes the methods that hosts perform to maintain data for transport across the network. You should be familiar with the OSI m

Different models of computation-parallel algorithms, There are various comp...

There are various computational models for representing the parallel computers. In this part, we discuss various models. These models would give a platform for the designing as wel

Merits of shared memory and drawbacks, Merits of Shared Memory Programming ...

Merits of Shared Memory Programming Global address space gives a user-friendly programming perspective to memory. Data sharing among processes is both fast and uniform

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd