Simple mail transfer protocols (smtp), Computer Networking

Simple Mail Transfer Protocols (SMTP)

The application  layer  protocols  for electronic  mail is SMTP( Simple mail  transfer protocols).

Internet  electronic  mail  has many components  including mail services  that house user  mailboxes   mail  readers that allow  users to read and write messages a standard for  defining the structure of an e mail message  and application layer protocols. Thais  define  how  messages are passed between  servers, how  message are  passed between  servers and mail  readers, and how the  contents  of certain parts  of the mail  message ( for example  a mail message header) are to be interpreted.

Posted Date: 3/6/2013 11:42:02 PM | Location : United States







Related Discussions:- Simple mail transfer protocols (smtp), Assignment Help, Ask Question on Simple mail transfer protocols (smtp), Get Answer, Expert's Help, Simple mail transfer protocols (smtp) Discussions

Write discussion on Simple mail transfer protocols (smtp)
Your posts are moderated
Related Questions
802.11b HR DSSS a) High-rate DSSS using a 2.4 GHz band b) Similar to DSSS excluding for encoding method c) Uses complementary code keying (CCK), encoding 4 or 8 bits to


Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are

What are the key functions of data link layer? Data link layer transfers data in a structured and reliable manner so that the service given by the physical layer is utilized by

Options Negotiation To use any of the options first  requires option  negotiation between the client  and server. Four  control  characters are used for  this purpose.

Describe about the Server and browser software Most of the server and browser software developed by various vendors carry out encryption using either a 40-bit or a 128-bit sec

what is similarity of wifi and 3g

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

Recognize the access-list range for an extended IP access-list? Ans) IP extended access-lists use the number range of 100-199.