Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Simple Mail Transfer Protocol ( SMTP)
SMTP is the principal application layer protocol for internet electronic mail. It uses the reliable data transfer service of TCP to transfer mail from the sender mail from the sender small server the recipient mail server. SMTP has two sides a client side which executes on the sender mail server and a server side which executes on the recipient mail server both the client and server sides of SMTP run on every mail server when a mail server sends mail to other mail servers it acts as an SMTP client. When a mail server receive mail from other mail servers it acts as an SMTP server.
To illustrate the basic operation of SMTP let go through a common scenario suppose heena wants to send Harish a simple ASCII message to Harish.
1.Heena invokes her user agent for e mail provides Harish e mail address compose a message and instructs the user agent to send to message.
2.Heena user agent sends the message to her mail server wher it is placed in message queue.
3.The client side of SMTP running on heena mail server see the message in the message queue. It opens TCP connection to an SMTP server running on Harish mail server.
4. After some initial SMTP handshaking the SMTP receives the message Harish mail server then places the message in Harish mail box.
5.Harish invokes his user agent to read the message at his convenience.
Benefits of Building up a well-designed Intranet Building up a well-designed Intranet can help the companies in the following activities that would improve their overall perfor
RIP and IGRP are Distance Vectoring protocols that send their whole routing tables to their neighbours. In some Cisco literature, EIGRP is listed as an 'advanced distance vector
Question: a) Briefly describe the purpose of Windows Powershell? b) Name ways software can be installed on Linux? c) What is an interrupt request? d) As the Networ
The following information was obtained from a host computer: 00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.25: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 2096
detail discusion
CONNECTION-ORIENTED: Accounting is simpler. Application can learn of network causes immediately. CONNECTIONLESS: It has fewer load. It is easier to cre
What is Remote Procedure Call (RPC)? RPC hides the intricacies of the network by using the ordinary process call mechanism familiar to every programmer. A client process calls
You are requested to design a secure home or small scale network (Fig. 1) to satisfy the key concepts underlying computer and network security: confidentiality, integrity, availabi
Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the
Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd