The received message - application layer , Computer Networking

The Received Message

If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message with MIMI header lines  appends a received  header line to the  top of the message  this  header line  specifies  the name  of the SMTP server that the message  (From) the name of the SMTP server that  receive this massage (by) and the  time at which  the receiving  server  received the  message. Thus the  message seen by the destination user takes  server received  the message. Thus  the message seen by the destination user takes the followings  form received: From  yahoo.com by reddiff.com 11 july  08  15: 27:39GMT

From : heena @yahoo.com

To : Harish @ rediffmail.com

Subject : Picture  of monalisa

MIME version  1. 0

Content  transfer encoding : bas  64

Content  type  image / jpeg

 Base 64 encoded date

The  received header  line is  directly seen on the screen  or when the message is sent to a printer.

Posted Date: 3/8/2013 6:06:11 AM | Location : United States







Related Discussions:- The received message - application layer , Assignment Help, Ask Question on The received message - application layer , Get Answer, Expert's Help, The received message - application layer Discussions

Write discussion on The received message - application layer
Your posts are moderated
Related Questions
Q. What is Data Representation? Information Today arrives in different forms such as numbers, text, images, audio and video. Text: Represented like a bit pattern a sequence

(a ) Std "A" 16.4 m C-BAND EARTH STATION (1996) This is the main system of this station and provides connectivity to most of the countries through dedicated transponder channe

How to Perform Basic Switch Configurations Step : Complete basic configuration of switches S1, S2, and S3. Configure the S1, S2, and S3 switches according to the following

Full-Duplex Ethernet 10Base5 as well as 10Base2 are half-duplex Full-duplex raises capacity of each domain No require for CSMA/CD

how to install xp via network



Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

TCP/IP is a name provided to the collection (or suite) of networking protocols that have been used to construct the global Internet. The protocols are also referred to as the DoD (

Gives excellent low-level control of parallelism; Portable; Minimal overhead in data distribution and parallel synchronisation; and It is less error prone. Drawb