Commands and responses - application layer, Computer Networking

Commands

SMTP uses commands  and response  to transfer  message between a client  and a  server.

 Each  commands  or reply  is terminated by a two character ( carriage return and lien feel)  end of line token .

Commands

Commands  are sent from the client to the server. The  format of a command is shown below it consists  of a keyword followed by  zero or more arguments. SMTP define 14 commands. The first five are  mandatory. Every  implementation must support these  fie commands.  The next  three are often  used and highly recommended. The last six  are seldom used.

Posted Date: 3/7/2013 10:23:55 PM | Location : United States







Related Discussions:- Commands and responses - application layer, Assignment Help, Ask Question on Commands and responses - application layer, Get Answer, Expert's Help, Commands and responses - application layer Discussions

Write discussion on Commands and responses - application layer
Your posts are moderated
Related Questions
With a transaction server, the client requests remote procedures that reside on the server with an SQL database engine. These remote processes on the server execute a group of SQL

In formation  sharing at  regular intervals For example  every 30 seconds each router sends its information  about the  whole  network  to its  neighbours. This sharing  occurs

Q. Comparison and Contrast between the OSI and TCP-IP Model? This presentation would discuss a few comparison and contrast between the 2 main reference models which use the con

Configure IP Settings for the Linksys WRT300N The best way to understand the following settings is to think of the WRT300N as being same to a Cisco IOS-based router with two di

Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exc

Document the Switch Configuration When you have done your troubleshooting, capture the output of the show run command and save it to a text document for each switch.



However what if you don't know about the IP address of the computer you wished to connect to? What if you have to access a web server referred to as www.abc.com? How does your web

Screened Host Architecture This architecture consists of two host machines: a Screening Router and a Screening Host. Screening Router is placed between a local network and the