Mime the multipurpose internet mail extensions, Computer Networking

Assignment Help:

MIME The Multipurpose Internet Mail Extensions

While  the message  headers described in are satisfactory for sending  ordinary  ASCII text they are  not sufficiently Reich for multimedia messages(for example messages with  images audio and video) or for carrying  non ASCII  text formats ( for  example  characters used by language other then English ). To  send  content  other then  ASCII text the sending user agent must include additional headers  in the message.

MIME  defines  five  new message headers as show in table 8. These are described  below  one by one:

1.MIME version simply  identifies the version of MIME.

2.The content description Header is an ASCII string  telling  what is  in the message .

3.The content id heard identifies the content.

4.The content transfer  encoding : Header alerts the receiving user agent that the  message  body  has been ASCII encoded and indicates the type of encoding used. Thus when  a user agent receives a message with these two header if first  uses the  value  of the content transfer encoding heard to convert the message body  to its original non ASCII form and then  uses.

5.The content type header to determine  what  action it should  take on the message  body. Let  take  an example of MIME  message.

From : heena@yahoo.

To : harish@rediff. Com

Subject : Picture of monalisa

MIME : Version  : 1.0

Content  transfer encoding  : base 64

Content   - Type  image  jpeg

 Base 64 encoded date ................

.....................................................

............................ base 64 encoded data)

We  observer form  the above  MIME message  that heena user agent  encoded the JPEG  image  using  base 64 encoding. This is one of the  several encoding techniques  standardized  in MIME for conversion to  an acceptable 7 bit  ASCII format.

When  Harish  reads his mail  with his  user agent his user agent operates on this game  MIME message  when Harish use agent observes the content transfer encoding base64 header line. It proceeds to decode the base  640 encoded message body.

The message  also  includes a content type  image jpeg  header line his  indicates to Harish  user agent that the  message body  should be JPEG decompressed. Finally the message includes the MIME version. Header which indicates the MIME version that  is being  used. In  particular  after the message  header  there is  blank  lien and  then the message body.


Related Discussions:- Mime the multipurpose internet mail extensions

How is an intranet different from an internet, QUESTION a) How is an In...

QUESTION a) How is an Intranet different from an Internet? b) State the main differences between a router and a switch c) Explain the function of a modem d) Calculate

C, #questionWrite a program to find the area under the curve y = f(x) betwe...

#questionWrite a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two poi

What is the effect on the security of the password, Question: (a) What...

Question: (a) What is a script kiddie? Is it a significant security threat, and why? (b) Assume that UNIX uses the user login name in lieu of the traditional salt, what is

Describe about packet switching, Q. Describe about Packet Switching? P...

Q. Describe about Packet Switching? Packet Switching - Data are transmitted in separate units - Called Packet - Packets are variable length blocks - The max leng

Ipx traffic on a network, To monitor ipx traffic on a network, what command...

To monitor ipx traffic on a network, what command would we use? Ans) show ipx traffic

Ethernet cable, what is max length of cable I can use

what is max length of cable I can use

Odd-even transposition algorithem, Algorithm:  Odd-Even Transposition //...

Algorithm:  Odd-Even Transposition //Input: N numbers that are in the unsorted form //Assume that element bi is assigned to pi for I=1 to N { If (I%2 != 0) //i.e Odd

Programs for implement tools for digital sound, You must write the 6 progra...

You must write the 6 programs described below. All of these are command-line tools that follow the Unix style of passing switches and arguments on the command line. As such, your p

Residential access - computer network, Residential Access Residential ...

Residential Access Residential  access is connecting home  end  systems ( typically a PC but increasingly a home network) into the network. One form  of residential  access  i

Bandwidth allocation , Consider figure.  Assume a new flow E is added that ...

Consider figure.  Assume a new flow E is added that takes a path from R1 to R2 to R6. How does the max-min bandwidth allocation change for the 5 flows?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd