Simple mail transfer protocol ( smtp), Computer Networking

Assignment Help:

Simple Mail Transfer Protocol ( SMTP)

SMTP is the principal  application layer protocol for  internet electronic  mail. It uses the reliable data transfer  service of TCP  to transfer  mail from  the sender mail  from the  sender small server the recipient mail  server. SMTP has two sides a client side which  executes on the sender mail server and a server side which executes on the recipient mail  server both  the client  and server sides  of SMTP run on  every mail server when  a mail server  sends mail to other mail  servers it acts  as an SMTP client. When  a mail  server  receive  mail  from other mail  servers it acts as an SMTP  server.

To  illustrate the basic  operation of SMTP let go through  a common  scenario  suppose  heena  wants  to send Harish a simple  ASCII  message to Harish.

1.Heena  invokes her user agent for e mail provides Harish e mail address compose  a message and instructs the user agent to send to message.

2.Heena  user agent sends the message to her mail server wher it is placed in  message  queue.

3.The client side of SMTP running  on heena  mail server see the message in the message queue. It  opens TCP connection to an SMTP server  running on Harish  mail server.

4. After  some initial  SMTP handshaking the SMTP receives the message Harish  mail server then  places the message in Harish mail box.

5.Harish  invokes  his  user agent  to read the message at his convenience.

 

 

 


Related Discussions:- Simple mail transfer protocol ( smtp)

Define the terms unicasting and multiccasting, Define the terms Unicasting,...

Define the terms Unicasting, Multiccasting and Broadcasting? If the message is sent from a source to a one destination node, it is called Unicasting. If the message is sent

LTE, What is LTE ?

What is LTE ?

Routing protocol used in design a banking network, You have been asked to d...

You have been asked to design a Banking Network with two primary types of locations.  Branches that will have 3 subnets, one /25 subnet one /26 subnet for ABMS and one /26 s

Vector-distance algorithm, Vector-Distance algorithm illustrated in more d...

Vector-Distance algorithm illustrated in more detail below: Packet switches wait for next update message and they goes by entries in packet. If entry has least path to destinat

Advantage of ip sec tunnelling mode, Advantage of IP sec  Tunnelling Mode ...

Advantage of IP sec  Tunnelling Mode IP Sec  tunnelling mode  has the  following  advantages: a.Security : Ts IP sec tunnelling mode  secure somewhat but  not the best. In a

Explain the term- congestion, Explain the term- congestion The average ...

Explain the term- congestion The average queue size over the last cycle and the current cycle is calculated. This value is the threshold. By averaging over two cycles instead o

Layer on which layer does l2f, Write the layer on which layer does L2F, PPT...

Write the layer on which layer does L2F, PPTP and L2TP operate?

Transport protocols - udp and tcp, Most real-life applications are built on...

Most real-life applications are built on top of the UDP and TCP transport protocols. UDP, which stands for User Datagram Protocol, provides the capability of delivering individual

Hybrid of client server and p2p architecture, Hybrid  of Client Server and...

Hybrid  of Client Server and P2P Architecture Both of  the architecture  are  commonly used  architecture. However  many  applications  are organized as by brides of the  clie

Program for two library methods with thread , #include void subdomain(...

#include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+i] = 123.456; } void sub(float x[ 10000], int npoints) {

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd