Mime the multipurpose internet mail extensions, Computer Networking

Assignment Help:

MIME The Multipurpose Internet Mail Extensions

While  the message  headers described in are satisfactory for sending  ordinary  ASCII text they are  not sufficiently Reich for multimedia messages(for example messages with  images audio and video) or for carrying  non ASCII  text formats ( for  example  characters used by language other then English ). To  send  content  other then  ASCII text the sending user agent must include additional headers  in the message.

MIME  defines  five  new message headers as show in table 8. These are described  below  one by one:

1.MIME version simply  identifies the version of MIME.

2.The content description Header is an ASCII string  telling  what is  in the message .

3.The content id heard identifies the content.

4.The content transfer  encoding : Header alerts the receiving user agent that the  message  body  has been ASCII encoded and indicates the type of encoding used. Thus when  a user agent receives a message with these two header if first  uses the  value  of the content transfer encoding heard to convert the message body  to its original non ASCII form and then  uses.

5.The content type header to determine  what  action it should  take on the message  body. Let  take  an example of MIME  message.

From : heena@yahoo.

To : harish@rediff. Com

Subject : Picture of monalisa

MIME : Version  : 1.0

Content  transfer encoding  : base 64

Content   - Type  image  jpeg

 Base 64 encoded date ................

.....................................................

............................ base 64 encoded data)

We  observer form  the above  MIME message  that heena user agent  encoded the JPEG  image  using  base 64 encoding. This is one of the  several encoding techniques  standardized  in MIME for conversion to  an acceptable 7 bit  ASCII format.

When  Harish  reads his mail  with his  user agent his user agent operates on this game  MIME message  when Harish use agent observes the content transfer encoding base64 header line. It proceeds to decode the base  640 encoded message body.

The message  also  includes a content type  image jpeg  header line his  indicates to Harish  user agent that the  message body  should be JPEG decompressed. Finally the message includes the MIME version. Header which indicates the MIME version that  is being  used. In  particular  after the message  header  there is  blank  lien and  then the message body.


Related Discussions:- Mime the multipurpose internet mail extensions

Explain types of networking and internetworking device, What is the differe...

What is the different type of networking / internetworking devices? 1. Repeater: Also known as a regenerator, it is an electronic device that operates only at physical layer.

Explain about switching networks, Question 1: a. Differentiate between ...

Question 1: a. Differentiate between the several types of switching networks together with illustration. b. With the help of a diagram explain the two modes of operation un

Describe the architecture of the tcp/ip protocol suite, Problem 1 Descr...

Problem 1 Describe the architecture of the TCP/IP protocol suite Problem 2 Describe the principle of operation of REXEC protocol Problem 3 Describe the concept

Nfs, what is this ?

what is this ?

Show the vulnerability of the internet, Q. Show the Vulnerability of the In...

Q. Show the Vulnerability of the Internet? More vulnerable than private network. Wide inter-network connection. Easy access by mass public world-wide. Lack of build in

What are three ways to give login access to router, The three ways to give ...

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

Discuss your strategy to test wlpc system, Wireless Phone Company (WLPC) is...

Wireless Phone Company (WLPC) is a provider of wireless phone service in the US with 100,000 customers serving mostly small markets. WLPC has just purchased additional airwaves in

Access-list range for an extended ip access-list, Recognize the access-list...

Recognize the access-list range for an extended IP access-list? Ans) IP extended access-lists use the number range of 100-199.

eigrp protocol update route information, How does EIGRP protocol update ro...

How does EIGRP protocol update route information to its neighbors

Classification of access networks - computer network, Classification of Ac...

Classification of Access Networks Access  networks  can loosely  be classified into three  categories 1. Residential Access 2. Company Access 3. Wireless Access

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd