Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Simple Mail Transfer Protocol ( SMTP)
SMTP is the principal application layer protocol for internet electronic mail. It uses the reliable data transfer service of TCP to transfer mail from the sender mail from the sender small server the recipient mail server. SMTP has two sides a client side which executes on the sender mail server and a server side which executes on the recipient mail server both the client and server sides of SMTP run on every mail server when a mail server sends mail to other mail servers it acts as an SMTP client. When a mail server receive mail from other mail servers it acts as an SMTP server.
To illustrate the basic operation of SMTP let go through a common scenario suppose heena wants to send Harish a simple ASCII message to Harish.
1.Heena invokes her user agent for e mail provides Harish e mail address compose a message and instructs the user agent to send to message.
2.Heena user agent sends the message to her mail server wher it is placed in message queue.
3.The client side of SMTP running on heena mail server see the message in the message queue. It opens TCP connection to an SMTP server running on Harish mail server.
4. After some initial SMTP handshaking the SMTP receives the message Harish mail server then places the message in Harish mail box.
5.Harish invokes his user agent to read the message at his convenience.
Interconnection Network An interconnection network is designed for transferring data between two processors in a Multi-stage network. Memory bottleneck is a fundamental limitat
Latest Internet and Intranet technologies Even though the security capabilities of the latest Internet and Intranet technologies have enabled the companies to control the avail
Q. Illustrate about RSA Encryption? RSA Encryption - Public key encryption technique - Encryption steps: - Encode data to be encrypted as a number to create the pla
UDP sends packets 'blind' down the network, and relies on upper-layer protocols to form connections and identify errors. TCP is a connection-oriented protocol that can give reliabl
Which command saves the configuration stored in RAM to NVRAM Ans) copy running-config startup-config is the command which saves the configuration stored in RAM to NVRAM
Tunnelling To guarantee privacy for the organization, VPN specifies that each IP datagram destined for private use of the organization, must first be encrypted and then en
The steps of forwarding the packets of information is known routing. The information about receivers is saved in routing tables. Note that several entries have same next hop. It is
Intranets are fundamentally "small" Internets. They employ the same network facilities which the Internet does, however access is limited to a restricted sphere. For example, a com
What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalf
using binary adition, what is the result of 1010 + 10? Using binary addition, how would you repeatedly increment a number by 2?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd