Mail access protocols - application layer, Computer Networking

Mail Access Protocols

The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves message  with either  a web  browser  or an e mail client  that uses one of a number of mail  retrieval protocols.

Some clients  and servers preferentially use  vendor  specific  proprietary protocols. But  most  support  the internet  protocols, SMTP for sending  e mail  and POP3 ( post  office protocols version 3) and IMP4 ( internet Mail Access protocols , version 4 for  retrieving email  allowing mterprebability  with other servers and clients. SMTP can also  be used  for retrieving  email. It  is more  suitable for permanent  internet connection than  say a dialup connection and is not supported by most  e mail  client  software.

Posted Date: 3/8/2013 6:12:06 AM | Location : United States







Related Discussions:- Mail access protocols - application layer, Assignment Help, Ask Question on Mail access protocols - application layer, Get Answer, Expert's Help, Mail access protocols - application layer Discussions

Write discussion on Mail access protocols - application layer
Your posts are moderated
Related Questions
NetWare IPX addressing uses a network number and a node number. Which  statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi

What is logical link control? One of two sublayers of the data link layer of OSI reference model, as explained by the IEEE 802 standard. This sublayer is responsible for mainta

Which form of PPP error detection on Cisco routers monitors data dropped on a link?  Ans) The Quality protocol monitors data dropped on a link. Magic Number avoids frame looping

Determine the term- Cyberspace The conceptual or virtual area where pages, data, images, and all the rest are stored. It is the area from where requests are accepted and ful

So how packets do determines their way across the Internet? Does each computer linked to the Internet know where the other computers are? Do packets just get 'broadcast' to every c

The Internet protocol mentions the rules that describe the details of how computers communicate. It exactly mentions how a packet should be formed & how a router should forward eac

Simplicity The advantage of this approach is the simplicity  of receiver buffering. The  receiver need not  buffer out of  order packets the sender must maintain the upper an

Header  length This  field  specifies the  length of the TCP header  in 32 bit  words. This  information  allows  the receiver to know  the beginning of the data area becau