Electronic mail - application layer, Computer Networking

Electronic Mail

One  of the  most popular internet  services is electronic mail ( e mail). At  the beginning  of the internet era teh message sent by  electronic  mail were short and  consisted of text  only they let people  exchange  quick  memos. Today  electronic  mail is such  more  complex. It allows  a message  to include  text audio  and video  it also  allows one message to sent  to one or more  recipients.

Figure presents a high  level  view of the internet  of the  internet mail  system. It has  three major components user agents mail servers, and  the simple  mail  transfer protocol (SMTP). We now  assume  that a  sender  heena sending an e mail  message  to a recipient Harish. User  agents allow users to read reply to forward save and compose message. When  server when Harish  wants to read a message his user agent retrieves the message from his mailbox in his mail server.

262_electronic mail.jpg

                                                                figure A high  level view of the Internet e- mail system

 

Each recipient  such as harsh  has a mailbox  located in one of the servers. Harish  mail box manages  and maintains the messages that have been sent to him. A  messages  starts its journey in the sender user agent  travels to the sender mail server and travels  to the recipient mail  server where  it is deposited in the recipient mail box  when  box  authenticates Harish  ( with  user name and password).  If Heena serve cannot  deliver mail to  Harish  server Heena  server holds the message in a message  queue  and attempts to transfer the message  later.

Posted Date: 3/7/2013 10:13:40 PM | Location : United States







Related Discussions:- Electronic mail - application layer, Assignment Help, Ask Question on Electronic mail - application layer, Get Answer, Expert's Help, Electronic mail - application layer Discussions

Write discussion on Electronic mail - application layer
Your posts are moderated
Related Questions
no ip domain-lookupcommand is use to disable domain lookup

XYZ company's executives have approached you to architect, design, and recommend if they should use an IP network infrastructure for all their applications. Here is some informa

Why it is necessary to have layering in a network? A computer network is a very complex system. It becomes very difficult to execute as a single entity. The layered approach di

Enumerate about the Virtual Private Network (VPN) Even though, many firewalls also include the features of the virtual private network, the functionality and capabilities of V

INTERNETWORKING - TCP/IP 1. State the following terminologies: a) Node b) Router c) Host d) Subnet e) Network 2. What do you understand by IEEE 802 Local Area network 3.

Coaxial Cable Coaxial  cable  carries signals  of higher  frequency ranges than those in twisted pair cable. In part  because the two media are constructed quite  differently.

What is use of Carrier sense multiple access Carrier sense multiple access with collision detection (CSMA/CD) is a form of medium access control in which a station listens to

I am taking a computer information systems class for which I have an online test I need done. It will not let me attach all the material that is on the test but someone well versed

Line Layer The line layer provides the synchronization multiplexer, multiplexing and automatic  protection switching for the layer . primary  concerned with the  reliable trans

What are reasons behind using layered protocols  Reasons for using layered protocols, using them leads to breaking up design problem into smaller more manageable pieces and lay