How Email Works Amarillo TX
M-F 8-9, Sa 9-7, Su 11-6*
San Antonio, TX
Internet Products and Services, Internet Services, Computer Hardware and Supplies, Computer Software, Internet Software Design and Services
Computer Hardware and Supplies, Computer Software, Computer and Software Stores
Computers Recycling, Computers and Equipment Repair and Maintenance, Computer Peripherals, Computer Software, Plastic and Plastic Products Retail
Computer Software, Computer Network Hardware, Computer Networks
Computer and Equipment Dealers, Help Desk Services, Computer Software, Computer and Software Stores
Computer Consultants, Help Desk Services, Computer Software, Computer and Software Stores, Computer Systems Consultants and Designers
San Antonio, TX
Information Technology Services, Computer Software, Computer Service Bureaus, Manufacturers' Agents and Representatives
Home Improvement Stores, Lumber Dealers, Help Desk Services, Computer Software, Hardware Dealers
How Email Works
Traveling by air these days is a lengthy adventure. Check-in procedures, protocols, security checks-these often take you hours. But the email you send out each day goes through similar procedures, yet an email's entire journey takes only seconds.
When you send an email, the information from the sender is delivered through your Internet connection in tiny pieces. These conveniently transferable chunks are called packets.
Packets are small, from 20 bytes to about 1500 bytes. Packets must be small to allow many to share network lines efficiently. One typed character takes up one computer byte of computer storage/transfer space.
Even the smallest email message is broken down into dozens of packets. Large transfers*—such as clicking a link to view a webpage—require thousands of packets.
Interestingly, packets delivering different chunks of the message travel to the same destination independently, by the most convenient route possible at the moment of transmission. This means packets almost always split up as they race their way toward their destination. (The first sentence of your email comes in one packet routed through Minneapolis; the next sentence comes in a separate packet routed through Denver.)
In essence, your email is treated like a massive jigsaw puzzle, but without the box. You put the puzzle in whole when you create the email, then your computer operating system breaks the puzzle into pieces for palatable delivery. Instead of a box to keep the puzzle pieces together, a code number is written on the top of each piece so that all the pieces are individually labeled with the correct destination and are numbered so that the receiving computer can reassemble them easily.
Each packet (puzzle piece) has three parts: the header, the payload (often called the body or the data), and a trailer (often called the footer).
In short, the header includes the email's origin and destination addresses. The header also contains the code number that allows packets reunite when the journey is complete.
The payload is the actual data being sent, the text of the email. Some routers require the payload to be a specific size; when this happens the remaining space will automatically be padded with blank information to make the packet match the size requirement. This requirement keeps data uniform so that if data is lost, the loss is easy to detect.
The trailer of the packet tells the receiver that it has reached the end of that piece. Some trailer packets also have built-in error checking that make sure the packet data has arrived intact.
Firewalls monitor data packets with tools called packet filters. The packet filter analyzes incoming and outgoing packets, partially reassembling the puzzle to check the contents.
Having someone plant a bomb in your luggage at the airport is rare, but receiving malicious programs via email is far more common. If this happens, a firewall packer filter can detect trouble and block the receiving area to protect your computer from harm. Like a vigilant airline security barrier (only far faster), a firewall guards entry into your system, allowing only acceptable data to pass.
When shopping for a firewall program, make sure the firewall has packet filtering features and the ability to actively monitor your system ports.
To learn more about the best personal firewalls available, please see our HomePage .
Click to read more from TopTenReviews.com