The received message - application layer , Computer Networking

The Received Message

If  we didn't mention  another  class of header lines that are  inserted by the SMTP receiving  server. The receiving  server upon receiving a message with MIMI header lines  appends a received  header line to the  top of the message  this  header line  specifies  the name  of the SMTP server that the message  (From) the name of the SMTP server that  receive this massage (by) and the  time at which  the receiving  server  received the  message. Thus the  message seen by the destination user takes  server received  the message. Thus  the message seen by the destination user takes the followings  form received: From  yahoo.com by reddiff.com 11 july  08  15: 27:39GMT

From : heena @yahoo.com

To : Harish @ rediffmail.com

Subject : Picture  of monalisa

MIME version  1. 0

Content  transfer encoding : bas  64

Content  type  image / jpeg

 Base 64 encoded date

The  received header  line is  directly seen on the screen  or when the message is sent to a printer.

Posted Date: 3/8/2013 6:06:11 AM | Location : United States







Related Discussions:- The received message - application layer , Assignment Help, Ask Question on The received message - application layer , Get Answer, Expert's Help, The received message - application layer Discussions

Write discussion on The received message - application layer
Your posts are moderated
Related Questions
Determine the Application areas of intranet The uses of an Intranet are only limited by imagination. Some of the larger sectors where the Intranet can be easily and success fu

Q. Error Detection-Redundancy? In its place of repeating the entire data stream a shorter group of bits may be appended to the end of each unit. Called as -redundancy?

What is the Gateway A Gateway is a device like a mini or microcomputer capable of operating on a standalone basis but which also gives connection for communication with the oth

what are usages of gogle and internet

1.  Consider these two potential additions to the MIPS instruction set and explain how they would restrict pipelining. a)  cp d1(r1), d2(r2) copy contents of word at address

How does dynamic host configuration protocol aid in network administration? Instead of having to visit every client computer to configure a static IP address, the network admin

can you make the assignment plagiarism free and when you give me back the assignment. Thanks

Which protocol comes under Hybrid dynamic type? Ans)  EIGRP (ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL) comes under hybrid dynamic.

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Hyper  Text Transfer Protocols ( HTTP) The Hyper text  protocols ( HTTP) is at  the heart  of the  web. If a browser  developer follows  the rules  of the HTTP, the  browser w