The received message - application layer , Computer Networking

Assignment Help:

The Received Message

If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message with MIMI header lines  appends a received  header line to the  top of the message  this  header line  specifies  the name  of the SMTP server that the message  (From) the name of the SMTP server that  receive this massage (by) and the  time at which  the receiving  server  received the  message. Thus the  message seen by the destination user takes  server received  the message. Thus  the message seen by the destination user takes the followings  form received: From  yahoo.com by reddiff.com 11 july  08  15: 27:39GMT

From : heena @yahoo.com

To : Harish @ rediffmail.com

Subject : Picture  of monalisa

MIME version  1. 0

Content  transfer encoding : bas  64

Content  type  image / jpeg

 Base 64 encoded date

The  received header  line is  directly seen on the screen  or when the message is sent to a printer.


Related Discussions:- The received message - application layer

How is computer networks used in marketing and sales, How is computer netwo...

How is computer networks used in marketing and sales, financial services, teleconferencing? Computer network have led to a new age of all of these services. They have helped in

Show vpns security and the internet model, Q. Show VPNs Security and the In...

Q. Show VPNs Security and the Internet Model? - VPN's Security and the Internet Model - Application layer - provide for each application protocol (other layers may be left v

Explain different architectures for ieee802.11, Question: (a) Explain a...

Question: (a) Explain and illustrate different architectures for IEEE802.11 (WiFi). (b) The MAC management of IEEE802.11 handles transmitter activity for power management.

Describe various mail protocols, Question 1 Describe the following a. Inte...

Question 1 Describe the following a. Internet Technologies b. Networks c. Media Access Control Question 2 Explain the various classes of networks Question 3 Describe various m

State the security concerns, State the Security concerns The history of...

State the Security concerns The history of security concerns is not new. They have been of great worry to man and for many centuries man has been endeavouring to devise new tec

Ieee report, http://cseweb.ucsd.edu/~savage/papers/CCS12Exploit.pdf

http://cseweb.ucsd.edu/~savage/papers/CCS12Exploit.pdf

Research, I have a research in this topic " Mitigating DoS Attacks against ...

I have a research in this topic " Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks " with simulation

What are the compression protocols for ppp, The compression protocols for P...

The compression protocols for PPP are:- A. Stac   B. Predictor

Header length - transport layer, Header  length This  field  speci...

Header  length This  field  specifies the  length of the TCP header  in 32 bit  words. This  information  allows  the receiver to know  the beginning of the data area becau

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd