The received message - application layer , Computer Networking

The Received Message

If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message with MIMI header lines  appends a received  header line to the  top of the message  this  header line  specifies  the name  of the SMTP server that the message  (From) the name of the SMTP server that  receive this massage (by) and the  time at which  the receiving  server  received the  message. Thus the  message seen by the destination user takes  server received  the message. Thus  the message seen by the destination user takes the followings  form received: From by 11 july  08  15: 27:39GMT

From : heena

To : Harish @

Subject : Picture  of monalisa

MIME version  1. 0

Content  transfer encoding : bas  64

Content  type  image / jpeg

 Base 64 encoded date

The  received header  line is  directly seen on the screen  or when the message is sent to a printer.

Posted Date: 3/8/2013 6:06:11 AM | Location : United States

Related Discussions:- The received message - application layer , Assignment Help, Ask Question on The received message - application layer , Get Answer, Expert's Help, The received message - application layer Discussions

Write discussion on The received message - application layer
Your posts are moderated
Related Questions
Connectionless Multiplexing  and De multiplexing Java program running in a host can create a UDP socket  with the  line Datagram's socket my socket =  new datagram's socket

What is the juncture at which the CPE ends and the local loop portion of the service starts?  Ans) The demarcation or demarc is the juncture at which the CPE ends and the local

On which languages Intranet works Language Support The Intranet works on the basis of scripts written in any of the following languages, viz., SGML, HTML, DHTML, XML, AS

What is meant by horizontal scaling and vertical scaling? Ans) Horizontal scaling means adding or removing client workstations with only a small performance impact. Vertical

An ATM network is created from interconnected ATM switches. The attachment ports or points can be connected to computers or other ATM switches. As cells reach at an ATM switch, the

Determine the computing infrastructure One solution for the protection of the computing infrastructure is to use digital certificate-based solutions. Users can be given access

Reliability Reliability  is the measure of how  often  a network is usable. MTSF( Mean time  Between Failure) is a measure of the average time  a component  is expected to ope

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Q. Explain Full Duplex data transmission? - Have two separate Communication channels as well as use each one for simplex Data traffic (in different directions). - If this is