Commands and responses - application layer, Computer Networking


SMTP uses commands  and response  to transfer  message between a client  and a  server.

 Each  commands  or reply  is terminated by a two character ( carriage return and lien feel)  end of line token .


Commands  are sent from the client to the server. The  format of a command is shown below it consists  of a keyword followed by  zero or more arguments. SMTP define 14 commands. The first five are  mandatory. Every  implementation must support these  fie commands.  The next  three are often  used and highly recommended. The last six  are seldom used.

Posted Date: 3/7/2013 10:23:55 PM | Location : United States

Related Discussions:- Commands and responses - application layer, Assignment Help, Ask Question on Commands and responses - application layer, Get Answer, Expert's Help, Commands and responses - application layer Discussions

Write discussion on Commands and responses - application layer
Your posts are moderated
Related Questions
FIBER OPTIC EXTENSION:  The LAN extension using fiber optic is given in the figure below:   Figure The fiber-modem translates digital data into pulses of light the

The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv

Question: (a) What do you understand by the following terms related to LCDs: Reflective LCDs Backlit LCDs (b) By using an example, explain the main steps of the B

Deadlock Avoidance To avoid deadlocks two types of strategies are used: 1) Static prevention: It uses V and P operators and Semaphores to allocate and deallocate shared res

Q. Explain about Error Detection? Data can be corrupted during transmission because of accidents, Storms, sudden increase in electricity and voltage / decrease in signal power

explain the appropriateness of economic and behavioral feasibility

Internet Client Control Task A distributed system is to be implemented using networked PCs. The role of the system in this task is to implement an environmental control sys

Q. Subnet layer of the TCP-IP model? These two layers of the OSI correspond straight to the subnet layer of the TCP/IP model. Majority of the time the lower layers under the

NETWORK ANALYZERS: A network analyzer also known network monitor or a network sniffer is used to calculate the performance of or debug a network. It may report statistics s