The received message - application layer , Computer Networking

The Received Message

If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message with MIMI header lines  appends a received  header line to the  top of the message  this  header line  specifies  the name  of the SMTP server that the message  (From) the name of the SMTP server that  receive this massage (by) and the  time at which  the receiving  server  received the  message. Thus the  message seen by the destination user takes  server received  the message. Thus  the message seen by the destination user takes the followings  form received: From  yahoo.com by reddiff.com 11 july  08  15: 27:39GMT

From : heena @yahoo.com

To : Harish @ rediffmail.com

Subject : Picture  of monalisa

MIME version  1. 0

Content  transfer encoding : bas  64

Content  type  image / jpeg

 Base 64 encoded date

The  received header  line is  directly seen on the screen  or when the message is sent to a printer.

Posted Date: 3/8/2013 6:06:11 AM | Location : United States







Related Discussions:- The received message - application layer , Assignment Help, Ask Question on The received message - application layer , Get Answer, Expert's Help, The received message - application layer Discussions

Write discussion on The received message - application layer
Your posts are moderated
Related Questions
What is Applets Little programs that can make the Web pages more aesthetically beautiful by means of animations, text, and graphics moving across the screen.

Allows for transmission and receiving of data concurrently

How is computer networks used in marketing and sales, financial services, teleconferencing? Computer network have led to a new age of all of these services. They have helped in

State the Security concerns The history of security concerns is not new. They have been of great worry to man and for many centuries man has been endeavouring to devise new tec

Can you do my ccna assignment

Determine about the Complete and proper security Complete and proper security configuration and administration is indeed a complex issue. One should think carefully about the

Q. Example of go back - N protocol? The window size is 4. A sender has sent frame 6 as well as the timer expires for frame 3 (frame 3 not ACKn'd). The sender goes back as we

Question 1 A) Explain briefly the advantages wireless communication systems                   B) What is a cellular network? Question 2 Explain fundamental architecture of

confiriguration,capabilities,implementation

Data Link Layer Sub layers ·  Logical Link Control (LLC) - upper layer · Handles control information, logical addressing and data · MAC (Medium Access Control) - lower layer ·