Commands and responses - application layer, Computer Networking

Commands

SMTP uses commands  and response  to transfer  message between a client  and a  server.

 Each  commands  or reply  is terminated by a two character ( carriage return and lien feel)  end of line token .

Commands

Commands  are sent from the client to the server. The  format of a command is shown below it consists  of a keyword followed by  zero or more arguments. SMTP define 14 commands. The first five are  mandatory. Every  implementation must support these  fie commands.  The next  three are often  used and highly recommended. The last six  are seldom used.

Posted Date: 3/7/2013 10:23:55 PM | Location : United States







Related Discussions:- Commands and responses - application layer, Assignment Help, Ask Question on Commands and responses - application layer, Get Answer, Expert's Help, Commands and responses - application layer Discussions

Write discussion on Commands and responses - application layer
Your posts are moderated
Related Questions
Network  Control  protocols ( NCP) The first  ARPANET  networking protocols  was named  simply the network  control protocols in 1970,and  was created by  created by  network

Tools for Digital Sound Sound is the oscillation of pressure that propagates in the form of a wave. Sound waves are transmitted through some medium (solid, liquid, or gas); th

What is region? When hierarchical routing is used, the routers are separated into what we will call regions, with every router knowing all the details about how to route packet

Q. What are the important benefits of computer network? Ans: Important benefits of computer networks are: -  Resource sharing -  Higher reliability -  Higher flexibili

Hyper Cube: A Hypercube interconnection network is an expansion of cube network. For n=3, Hypercube interconnection network may be described recursively in this manner:  For n

Screening Router In this setup network router acts as a firewall. It checks all incoming and outgoing packets according to the predefined rules. This filter is placed at the c

Error Detection-- CRC Powerful error detection system Rather than addition, binary division is utilized A series of redundant bits called "CRC" or else "CRC remai

How do I draw a flowchart and psuedocode that allows the user to input two different values and complete the sum and display the results?

BRIDGES:  A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all tr

To model a WAN, we need a graph in which the nodes model switches and the edges model direct join between switches. The modeling saves essence of network, and it ignores attached d