Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Simple Mail Transfer Protocol ( SMTP)
SMTP is the principal application layer protocol for internet electronic mail. It uses the reliable data transfer service of TCP to transfer mail from the sender mail from the sender small server the recipient mail server. SMTP has two sides a client side which executes on the sender mail server and a server side which executes on the recipient mail server both the client and server sides of SMTP run on every mail server when a mail server sends mail to other mail servers it acts as an SMTP client. When a mail server receive mail from other mail servers it acts as an SMTP server.
To illustrate the basic operation of SMTP let go through a common scenario suppose heena wants to send Harish a simple ASCII message to Harish.
1.Heena invokes her user agent for e mail provides Harish e mail address compose a message and instructs the user agent to send to message.
2.Heena user agent sends the message to her mail server wher it is placed in message queue.
3.The client side of SMTP running on heena mail server see the message in the message queue. It opens TCP connection to an SMTP server running on Harish mail server.
4. After some initial SMTP handshaking the SMTP receives the message Harish mail server then places the message in Harish mail box.
5.Harish invokes his user agent to read the message at his convenience.
What is routing region? When hierarchical routing is used, the routers are separated into what we call regions, with each router knowing all the details about how to route pack
simple introduction,defination and with example & digram
ROLE OF DESIGN IN ACHIEVING RELIABILITY One of the most important methods for achieving high reliability is through design. Use reliability cannot be higher than the design re
Network Allocation Vector Timer which shows how much time must pass before a station is allowed to check the channel
Q. Explain the Communication Channel Threats? Secrecy Threat - Secrecy is the avoidance of unauthorized information disclosure - Privacy is the guard of individua
What is meant by Middleware? Middleware is a distributed software needed to support interaction between clients and servers. In short, it is the software that is in the middle
Sole Access Protocol The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:
In formation sharing at regular intervals For example every 30 seconds each router sends its information about the whole network to its neighbours. This sharing occurs
Mail Access Protocols The e mail message are usually sent to an email server that stores received message in the recipient e mail mailbox. The user retrieves messa
Question: a) Compare Bluetooth and WIFI based networks over the following factors: Data rate, Range, Application Focus, Battery Power, Frequency Band, Security. b) Differe
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd