Mail access protocols - application layer, Computer Networking

Mail Access Protocols

The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves message  with either  a web  browser  or an e mail client  that uses one of a number of mail  retrieval protocols.

Some clients  and servers preferentially use  vendor  specific  proprietary protocols. But  most  support  the internet  protocols, SMTP for sending  e mail  and POP3 ( post  office protocols version 3) and IMP4 ( internet Mail Access protocols , version 4 for  retrieving email  allowing mterprebability  with other servers and clients. SMTP can also  be used  for retrieving  email. It  is more  suitable for permanent  internet connection than  say a dialup connection and is not supported by most  e mail  client  software.

Posted Date: 3/8/2013 6:12:06 AM | Location : United States







Related Discussions:- Mail access protocols - application layer, Assignment Help, Ask Question on Mail access protocols - application layer, Get Answer, Expert's Help, Mail access protocols - application layer Discussions

Write discussion on Mail access protocols - application layer
Your posts are moderated
Related Questions
Problem: (a) Explain how TCP handles connection-setup management. (b) Each host on the Internet is currently assigned an IP address 32 bits long (IPv4). IPv4 addresses are u

When it comes to networking, what are rights? Rights refer to the authorized permission to perform exact actions on the network. Every user on the network can be assigned indiv

What is virtual channel? Virtual channel is normally a connection from one source to one destination, although multicast connections are also allowed. The other name for virtua


Determine the definition of HDLC HDLC has only one address field. In a LAN, any station may transmit to any other station. The receiving station needs to see its own address in

Q. Show the Go-back-N - Control Variables? - S- holds the series number of the recently sent frame - SF - holds sequence number of the first frame in the window - SL - ho

Most real-life applications are built on top of the UDP and TCP transport protocols. UDP, which stands for User Datagram Protocol, provides the capability of delivering individual

Firewall is a device or a component that restricts access between a protected or an internal network from an external or untrustworthy network .A firewall basically limits unautho

Advantages of Bridges By forwarding  frames  only to  the segment  where  host  resides  a bridge server the  following  purpose. a.Unwanted  traffic  as well  as network  c

What are major types of networks and explain? Server-based network: Give centralized control of network resources and depend on server computers to give security and network