Electronic mail - application layer, Computer Networking

Electronic Mail

One  of the  most popular internet  services is electronic mail ( e mail). At  the beginning  of the internet era teh message sent by  electronic  mail were short and  consisted of text  only they let people  exchange  quick  memos. Today  electronic  mail is such  more  complex. It allows  a message  to include  text audio  and video  it also  allows one message to sent  to one or more  recipients.

Figure presents a high  level  view of the internet  of the  internet mail  system. It has  three major components user agents mail servers, and  the simple  mail  transfer protocol (SMTP). We now  assume  that a  sender  heena sending an e mail  message  to a recipient Harish. User  agents allow users to read reply to forward save and compose message. When  server when Harish  wants to read a message his user agent retrieves the message from his mailbox in his mail server.

262_electronic mail.jpg

                                                                figure A high  level view of the Internet e- mail system

 

Each recipient  such as harsh  has a mailbox  located in one of the servers. Harish  mail box manages  and maintains the messages that have been sent to him. A  messages  starts its journey in the sender user agent  travels to the sender mail server and travels  to the recipient mail  server where  it is deposited in the recipient mail box  when  box  authenticates Harish  ( with  user name and password).  If Heena serve cannot  deliver mail to  Harish  server Heena  server holds the message in a message  queue  and attempts to transfer the message  later.

Posted Date: 3/7/2013 10:13:40 PM | Location : United States







Related Discussions:- Electronic mail - application layer, Assignment Help, Ask Question on Electronic mail - application layer, Get Answer, Expert's Help, Electronic mail - application layer Discussions

Write discussion on Electronic mail - application layer
Your posts are moderated
Related Questions
Q. Describe about Domain Name Space ? - Structure for systematize the name space in which names are defined in an inverted-tree structure with the root at the top - Every l

How an Ethernet Worked? The operation of Ethernet can be explained in simple terms as follows: Each computer on the Ethernet Network, also called as a node, operates indepen

Question: a) In route-optimized communication, a mobile node sends packets to a correspondent using the home address present in the destination option. Why does the design use

What are the Call routers Call routers A, B, C, D, and E. There are ten potential lines: AB, AC, AD, AE, BC, BD, BE, CD, CE, and DE. Each of these lines has four possibilities

Write the Generic Name of the OSI Layer a)  The figures below illustrate, side by side, the OSI 7-layer reference model and the Internet protocol stack. Inside each box represen

Token Bus Sublayer Protocol Send for some time then pass token If no data after that pass token right away Traffic classes 0, 2, 4 and 6 (highest) Internal s

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Enumerate about the server modules WebDAV is one of the best-used server modules and many companies developing Intranet software or groupware as well as various publishing and

Satellite Radio Channels A communication  satellite links two or more  earth  microwave transmitter receiver, know  as ground  stations. The satellite receives transmission on

DISTANCE-VECTOR ROUTING: It is easy to implement. Packet switch modifies its own routing table first. It is used in RIP. LINK-STATE ALGORITHM: It is ve