Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Simple Mail Transfer Protocol ( SMTP)
SMTP is the principal application layer protocol for internet electronic mail. It uses the reliable data transfer service of TCP to transfer mail from the sender mail from the sender small server the recipient mail server. SMTP has two sides a client side which executes on the sender mail server and a server side which executes on the recipient mail server both the client and server sides of SMTP run on every mail server when a mail server sends mail to other mail servers it acts as an SMTP client. When a mail server receive mail from other mail servers it acts as an SMTP server.
To illustrate the basic operation of SMTP let go through a common scenario suppose heena wants to send Harish a simple ASCII message to Harish.
1.Heena invokes her user agent for e mail provides Harish e mail address compose a message and instructs the user agent to send to message.
2.Heena user agent sends the message to her mail server wher it is placed in message queue.
3.The client side of SMTP running on heena mail server see the message in the message queue. It opens TCP connection to an SMTP server running on Harish mail server.
4. After some initial SMTP handshaking the SMTP receives the message Harish mail server then places the message in Harish mail box.
5.Harish invokes his user agent to read the message at his convenience.
VPN Technology For an organization VPN technology uses some main techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls
how does PPTP express the data?
Describe at one disadvantage of a peer to peer network. When you are accessing the resources that are shared by one of the workstations on the network, that workstation takes
What is Client/Server? Clients and Servers are part logical entities that work together over a network to accomplish a task. Lots of systems with very dissimilar architectures
Define the term - public knowledge information It is essential to distinguish between public knowledge information and the more detailed pieces of information relating to spec
Identify the purpose of the TCP three step handshakes Ans) The three step handshake establishes the parameters needed for a TCP connection. During the handshake process series n
Discuss an example of threats in computer software Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can det
When using access lists, it is important where those access lists are placed. Which Statement best defines access list placement Ans) Put standard access lists as near the desti
Security Security is the protection of hardware software and data from unauthorized access. Restricted physical access to computer password protection limiting user priv
What is the method of NLRI?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd