Tuesday, April 23, 2019

E-mail protocol Research Paper Example | Topics and Well Written Essays - 2500 words

E- send protocol - Research Paper ExampleAnonymity of all the parties together with meaning security and integrity can be ensured by use of digital signature protocols that make it practicable for delivery of electronic mail to be certified. i. Several reasons make it necessary to certify delivery of electronic mail. These include a. To eliminate the danger of hacking, reverse engineering and eavesdropping. b. To ensure that the parties to an electronic nub remain unnamed to each other for security reasons. c. To make it possible to safely transfer information from one political party to a nonher or from one sender to multiple recipients while at the same time addressing the sheer of repudiation. ii. Certifying delivery of electronic mail has several advantages over conventional mail because a. It improves efficiency of mail delivery while at the same time taking cargon of security concerns. b. Either of the parties to the message is blockaded by the protocol from ever denyi ng having received or sent the message. iii. The protocol ensures that just the intended message is sent. E-mail Protocol Abstract The issue of security can never be overlooked in this digital age when it comes to corporate netmails. A simple leakage of confidential information can render a huge social, economical and political scene that can be costly in cost of money. Therefore, the need to add value to delivery of important data over the internet to safeguard exclusive and corporate interests cannot be overemphasized. To guarantee delivery of email messages, it would be paramount to consider using certified mail and lay down stringent rules to govern employee conduct towards the use of conventional email. However, there are controversies that surround the use of certified mail in that it deals only with a single sender and a single recipient. So, what happens when there is the need to send an email message to more than one recipient? The do lies in the use of a multi party certified e-mail protocol with multiple recipient capabilities. It enables the sender to realize his intention of sending standardised message to multiple recipients. Any recipient who acknowledges receipt of the senders message is guaranteed to have received the email. To appreciate the role of email protocols best, it would suffice to not only consider how security loopholes can be sealed in the current internet infrastructure only when also look at possible ways of curtailing weaknesses and optimizing on strengths of email protocol. Introduction Without email protocols, it would not be possible to maintain a consistent and orderly system for transporting, routing, handling, retrieval and storage of email messages. Email protocols provide the rules for governing such activities. There are several protocols that enable a mail server and a mail client to exchange information but this will be dealt with by and by on in this document. Though these protocols differ in some ways, yet they all follow similar pattern. First, one computer will normally start a conversation with another. Second, as the conversation is taking place, the server acknowledges the command using a certain code. The code informs about the success of the command or if an error occurred and finally the conversation is ended. The email protocol helps eliminate communication barriers in email systems thereby making it unnecessary to rely on proprietary protocols. This has the overall effects of making communication to be efficient by eliminating the need of

No comments:

Post a Comment