Mail message format - application layer, Computer Networking

Mail Message  Format

When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained  information is contained in a series of header lines. The header liens and  the body of the message are separated by a blank line. Each header line contains readable ext consisting of a keyword followed  by  a colon  followed by value. some  of the  keyword  are required and others  are optional. Every header  must have  a from header line and  a to header line  a header may include a subject header line as  well as other  optional header liens  a message header looks like this.

The to field  gives the  address  of the primary recipient. Having multiple recipients is also  allowed. The  cc field gives  the addresses of any secondary recipients. In  terms  of  delivery  there is  o distinction  between  the primary and secondary recipients. The  terms cc ( carbon copy0 is a bit dated  since computers do not use cardoon paper but it is well established. The  Bcc( Billed carbon copy) field is like the cc field except that this  line  is deleted from all the copies  sent to the primary and secondary recipients. This feature  allows people  to send copies to third parties without the primary and  secondary recipients knowing this. The next two  field from and sender tell who wrote and sent  the message  respectively. A line containing  received is added by each message transfer agent along  the way. The  lien contains the agents identify the date and  data and time the message was received and other  information that can be used for finding  bugs in the routing  systems. The return path field is added  by the final message  transfer agent and was intended to tell how to get back  to  the sender.


Posted Date: 3/7/2013 10:27:25 PM | Location : United States

Related Discussions:- Mail message format - application layer, Assignment Help, Ask Question on Mail message format - application layer, Get Answer, Expert's Help, Mail message format - application layer Discussions

Write discussion on Mail message format - application layer
Your posts are moderated
Related Questions
Shared Programming Using Library Routines The most well-liked of them is the use of combo function called fork() and join(). Fork() function is used to make a new child proces

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Output Port The function of the  port is  take  the packets that have  been stored in the out  put port  memory and transmits them over the out going  link. The queuing  and bu

Most real-life applications are built on top of the UDP and TCP transport protocols. UDP, which stands for User Datagram Protocol, provides the capability of delivering individual

QUESTION (a) Briefly describe the steps involved in Network Simplex Method. (b) In Radix Heap Algorithm, the technique of buckets is employed. However this idea is an extens

Link State Packet When  a router floods  the network  with information about its  neighbourhood. It is said to  be advertising. The basis of this  advertising is  a short  pack

We use IDSN supports high speed voice, data and video and is a good choice for many small businesses.

Will like to know what is the standard industrial practice for a bank network design? Preferably with complete paper on the network design covering security, domain segregation, vi

The IP class procedure does not split the 32-bit address space into same size class and the classes do not have the same value of networks. A prefix of n bits gives 2n unique ne