1. What is the function of SMTP?
The TCP/IP
protocol supports electronic mail on the Internet is called Simple Mail
Transfer (SMTP). It is a system for sending messages to other computer users
based
on e-mail addresses. SMTP
provides mail exchange between users on the same or different computers.
2. What is the difference between a user agent (UA) and a mail transfer
agent (MTA)?
The
UA prepares the message, creates the envelope, and puts the message in the
envelope. The MTA transfers the mail across the Internet.
3. How does MIME enhance SMTP?
MIME
is a supplementary protocol that allows non-ASCII data to be sent through SMTP.
MIME transforms non-ASCII data at the sender site to NVT ASCII data and
deliverers it to the client SMTP to be sent through the Internet. The server
SMTP at the receiving side receives the NVT ASCII data and delivers it to MIME
to be transformed back to the original data.
4. Why is an application such as POP needed for electronic messaging?
Workstations
interact with the SMTP host, which receives the mail on behalf of every host in
the organization, to retrieve messages by using a client-server protocol such
as Post Office Protocol, version 3(POP3). Although POP3 is used to download
messages from the server, the SMTP client still needed on the desktop to
forward messages from the workstation user to its SMTP mail server.
5. What is the purpose of
Domain Name System?
Domain Name System
can map a name to an address and conversely an address to name.
6. Discuss the three main division of the domain name space.
Domain name
space is divided into three different sections: generic domains, country
domains & inverse domain.
Generic domain: Define
registered hosts according to their generic behavior, uses generic suffixes.
Country domain: Uses two
characters to identify a country as the last suffix.
Inverse domain: Finds the
domain name given the IP address.
7. Discuss the TCP connections needed in FTP.
FTP establishes
two connections between the hosts. One connection is used for data transfer,
the other for control information. The control connection uses very simple
rules of communication. The data connection needs more complex rules due to the
variety of data types transferred.
8. Discuss the basic model of FTP.
The client has
three components: the user interface, the client control process, and the
client data transfer process. The server has two components: the server control
process and the server data transfer process. The control connection is made
between the control processes. The data connection is made between the data
transfer processes.
9. Name four factors needed for a secure network?
Privacy: The sender and the receiver
expect confidentiality.
Authentication: The receiver is
sure of the sender’s identity and that an imposter has not sent the message.
Integrity: The data must arrive
at the receiver exactly as it was sent.
Non-Reputation: The receiver must
able to prove that a received message came from a specific sender.
No comments:
Post a Comment