The received message - application layer , Computer Networking

The Received Message

If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message with MIMI header lines  appends a received  header line to the  top of the message  this  header line  specifies  the name  of the SMTP server that the message  (From) the name of the SMTP server that  receive this massage (by) and the  time at which  the receiving  server  received the  message. Thus the  message seen by the destination user takes  server received  the message. Thus  the message seen by the destination user takes the followings  form received: From  yahoo.com by reddiff.com 11 july  08  15: 27:39GMT

From : heena @yahoo.com

To : Harish @ rediffmail.com

Subject : Picture  of monalisa

MIME version  1. 0

Content  transfer encoding : bas  64

Content  type  image / jpeg

 Base 64 encoded date

The  received header  line is  directly seen on the screen  or when the message is sent to a printer.

Posted Date: 3/8/2013 6:06:11 AM | Location : United States







Related Discussions:- The received message - application layer , Assignment Help, Ask Question on The received message - application layer , Get Answer, Expert's Help, The received message - application layer Discussions

Write discussion on The received message - application layer
Your posts are moderated
Related Questions
List the layers of OSI There are seven layers in OSI model a. Physical Layer b. Data Link Layer c. Network Layer d. Transport Layer e. Session Layer f. Presen

Determine about the Security Systems If the company intends to connect to the Internet, then it should pay great attention to the configuration of firewalls. Just as no one wo

What are Stored procedures? A stored procedure is s named collection of SQL statements and procedural logic that is compiled, verified and kept in a server database. It is typi

Determine the Difficulties arise with database connectivity A number of difficulties arise with database connectivity and the company may have to shell out an enormous amount

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

I WOULD LIKE TO MAKE MY SELF CLEAR WHETHER THIS TYPE OF PROGRAMS ARE BASED ON COMPLETE SEVER RELATED AND MAINTENANCE OF AN ENTIRE SMALL ENTERPRISE NETWORK.

State the Disadvantages of adaptive routing process  (1) The routing decision is more difficult; thus, the processing burden on network nodes enhances. (2) In most cases, ad

Error Detection-- CRC Powerful error detection system Rather than addition, binary division is utilized A series of redundant bits called "CRC" or else "CRC remai

Enumerate the various internetworking facility 1.) Give a link among networks. At minimum, a physical and link control connection is required.   (2) Provide for the routing

Application Layer The  application layer is where  network  applications and their  application layer protocols  reside. The internet application layer includes many protocols