Network Working Group Ftp and Network Mail System

نویسنده

  • A. Bhushan
چکیده

FTP currently provides two commands for handling mail. The MAIL command allows a user to send mail via the TELNET connection (the server collects the mail and determines its end by searching for the character sequence "CRLF.CRLF"). The MLFL (mail file) command allows a user to send mail via the data connection (requires a user-FTP to handle the command but transfer is more efficient as server need not search for a special character sequence). These commands are being used to provide network mailing facilities. Local mail and SNDMSG programs have been modified at many sites to include network mailing (e.g., USER@HOST at BBN_TENEX and MAIL host user at MIT-DMCG).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Resource Management for Improving Users Quality of experience in Software Defined Network by Weighted Fuzzy Petri-NetMethod

The rapid rise in popularity of multimedia applications, such as VoIP, IPTV and Video Conferencing, intensifies the need to consider resource management for user satisfaction. Furthermore, improving Quality of Experience (QoE) in Software Defined Networks (SDNs) services is one of the important issues to be addressed by provisioning optimum resource management. In this paper, resource allocatio...

متن کامل

Network Resource Management for Improving Users Quality of experience in Software Defined Network by Weighted Fuzzy Petri-NetMethod

The rapid rise in popularity of multimedia applications, such as VoIP, IPTV and Video Conferencing, intensifies the need to consider resource management for user satisfaction. Furthermore, improving Quality of Experience (QoE) in Software Defined Networks (SDNs) services is one of the important issues to be addressed by provisioning optimum resource management. In this paper, resource allocatio...

متن کامل

Design of a VPN Software Solution Integrating TCP and UDP Services

Virtual Private Network (VPN) solutions mainly focus on security aspects. Their main aims are to isolate a distributed network from outsiders and to protect the confidentiality and integrity of sensitive information traversing a non-trusted network such as the Internet. But when security is considered the unique problem, some collateral ones arise. VPN users suffer from restrictions in their ac...

متن کامل

Hospital information system and working process of both managers and network users in Ali ibn Abi Talib Hospital of Rafsanjan, Iran

Background: The present study was conducted with the aim to determine the effect of hospital information system (HIS) on the performance and working process of managers and network users of Ali ibn Abi Tileb Hospital of Rafsanjan, Iran. Materials and Methods: This research was conducted on employees of Ali ibn Abi Talib Hospital in Rafsanjan (n = 650 individuals). The study sample volume was d...

متن کامل

Internet Surveillance: Recent U.S. Developments

Congress revisited the issue of Internet surveillance days after the September 11 attacks when the Attorney General presented draft legislation addressing " new surveillance authorities; " the USA Patriot Act developed from this proposal. The executive branch of the Federal government has since pursued a number of policies and strategies dealing with Internet surveillance and data mining. Many ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010