Mail message format - application layer, Computer Networking

Assignment Help:

Mail Message  Format

When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained  information is contained in a series of header lines. The header liens and  the body of the message are separated by a blank line. Each header line contains readable ext consisting of a keyword followed  by  a colon  followed by value. some  of the  keyword  are required and others  are optional. Every header  must have  a from header line and  a to header line  a header may include a subject header line as  well as other  optional header liens  a message header looks like this.

The to field  gives the  address  of the primary recipient. Having multiple recipients is also  allowed. The  cc field gives  the addresses of any secondary recipients. In  terms  of  delivery  there is  o distinction  between  the primary and secondary recipients. The  terms cc ( carbon copy0 is a bit dated  since computers do not use cardoon paper but it is well established. The  Bcc( Billed carbon copy) field is like the cc field except that this  line  is deleted from all the copies  sent to the primary and secondary recipients. This feature  allows people  to send copies to third parties without the primary and  secondary recipients knowing this. The next two  field from and sender tell who wrote and sent  the message  respectively. A line containing  received is added by each message transfer agent along  the way. The  lien contains the agents identify the date and  data and time the message was received and other  information that can be used for finding  bugs in the routing  systems. The return path field is added  by the final message  transfer agent and was intended to tell how to get back  to  the sender.

 


Related Discussions:- Mail message format - application layer

Enable wireless security - ccna, Enable Wireless Security Step : Confi...

Enable Wireless Security Step : Configure Windows to use WEP authentication.  Navigate to the Network Connections page again and right-click the Wireless Network Connection

Topologies, discuss communication isolation and privatization in network to...

discuss communication isolation and privatization in network topologies

Process management, Bootstrapping all the processes and establishing correc...

Bootstrapping all the processes and establishing correct lines of communication is, by itself, the toughest aspect of this assignment. Before writing any code you should think care

Determine the connection to backbone lan, Connection to backbone LAN In...

Connection to backbone LAN In most cases, interconnection with stations on a wired backbone LAN is needed. For infrastructure wireless LANs, this is simply accomplished by the

Determine theoretical data capacity of the wireless channel, Consider a sim...

Consider a simple wireless data link using channel bandwidth of 40 kHz. The transmit power level is 20 dBm, the link attenuation is 40 dB and the SNRdB at the receiver is 20 dB.

Urgent pointer - transport layer, Urgent Pointer This 16 bite whic...

Urgent Pointer This 16 bite which is valid  only f the urgent  flag is set is used  when the segment  contains  urgent data. If  defines  the number  that must be  added  t

Sole access protocol in parallel programming , Sole Access Protocol Th...

Sole Access Protocol The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd