Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Simple Mail Transfer Protocol ( SMTP)
SMTP is the principal application layer protocol for internet electronic mail. It uses the reliable data transfer service of TCP to transfer mail from the sender mail from the sender small server the recipient mail server. SMTP has two sides a client side which executes on the sender mail server and a server side which executes on the recipient mail server both the client and server sides of SMTP run on every mail server when a mail server sends mail to other mail servers it acts as an SMTP client. When a mail server receive mail from other mail servers it acts as an SMTP server.
To illustrate the basic operation of SMTP let go through a common scenario suppose heena wants to send Harish a simple ASCII message to Harish.
1.Heena invokes her user agent for e mail provides Harish e mail address compose a message and instructs the user agent to send to message.
2.Heena user agent sends the message to her mail server wher it is placed in message queue.
3.The client side of SMTP running on heena mail server see the message in the message queue. It opens TCP connection to an SMTP server running on Harish mail server.
4. After some initial SMTP handshaking the SMTP receives the message Harish mail server then places the message in Harish mail box.
5.Harish invokes his user agent to read the message at his convenience.
In this example we will see the use of parallel construct with private and firstprivate clauses. At the end of the program i and j remain undefined as these are private to thread i
Which form of PPP error detection on Cisco routers monitors data dropped on a link? Ans) The Quality protocol monitors data dropped on a link. Magic Number avoids frame looping
Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen
To accept its goals, ATM uses fixed, small sized packets known cells. Every cell has 53 octets. VPI/VCI fields shows the cells destination. PRIO say if cell can be discarded CRC
In collective message passing, all the processes of a set participate in communication. MPI gives a number of functions to execute the collective message passing. Some of them are
Explain the Acknowledged connectionless service This is a cross between the previous two services. It provides that datagrams are to be acknowledged, but no prior logical conne
Gives excellent low-level control of parallelism; Portable; Minimal overhead in data distribution and parallel synchronisation; and It is less error prone. Drawb
Q. Show the Importance of Security? The Internet presents enormous business opportunities. The Internet is open to public, vulnerable to various attacks. One of the major
What are the main categories based on which applications of computer network can be categorized? The major areas under which the applications for computer network can be divide
Q. Show VPNs Security and the Internet Model? - VPN's Security and the Internet Model - Application layer - provide for each application protocol (other layers may be left v
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd