Mime the multipurpose internet mail extensions, Computer Networking

Assignment Help:

MIME The Multipurpose Internet Mail Extensions

While  the message  headers described in are satisfactory for sending  ordinary  ASCII text they are  not sufficiently Reich for multimedia messages(for example messages with  images audio and video) or for carrying  non ASCII  text formats ( for  example  characters used by language other then English ). To  send  content  other then  ASCII text the sending user agent must include additional headers  in the message.

MIME  defines  five  new message headers as show in table 8. These are described  below  one by one:

1.MIME version simply  identifies the version of MIME.

2.The content description Header is an ASCII string  telling  what is  in the message .

3.The content id heard identifies the content.

4.The content transfer  encoding : Header alerts the receiving user agent that the  message  body  has been ASCII encoded and indicates the type of encoding used. Thus when  a user agent receives a message with these two header if first  uses the  value  of the content transfer encoding heard to convert the message body  to its original non ASCII form and then  uses.

5.The content type header to determine  what  action it should  take on the message  body. Let  take  an example of MIME  message.

From : heena@yahoo.

To : harish@rediff. Com

Subject : Picture of monalisa

MIME : Version  : 1.0

Content  transfer encoding  : base 64

Content   - Type  image  jpeg

 Base 64 encoded date ................

.....................................................

............................ base 64 encoded data)

We  observer form  the above  MIME message  that heena user agent  encoded the JPEG  image  using  base 64 encoding. This is one of the  several encoding techniques  standardized  in MIME for conversion to  an acceptable 7 bit  ASCII format.

When  Harish  reads his mail  with his  user agent his user agent operates on this game  MIME message  when Harish use agent observes the content transfer encoding base64 header line. It proceeds to decode the base  640 encoded message body.

The message  also  includes a content type  image jpeg  header line his  indicates to Harish  user agent that the  message body  should be JPEG decompressed. Finally the message includes the MIME version. Header which indicates the MIME version that  is being  used. In  particular  after the message  header  there is  blank  lien and  then the message body.


Related Discussions:- Mime the multipurpose internet mail extensions

What is egp, What is EGP (Exterior Gateway Protocol)? It is the protoco...

What is EGP (Exterior Gateway Protocol)? It is the protocol the routers in neighboring autonomous systems use to recognize the set of networks that can be reached within or by

How does intranet work, How does Intranet Work? An Intranet can be def...

How does Intranet Work? An Intranet can be defined as a private network which uses Internet tools. The principal tool is the Web browser, but there are other Internet tools su

Determine power dissipated in resistor, Question: With Vout not connect...

Question: With Vout not connected to any additional circuitry, what power is dissipated in the 7 kW resistor?

Application layer - computer network, Application Layer The  applicati...

Application Layer The  application layer is where  network  applications and their  application layer protocols  reside. The internet application layer includes many protocols

R-sat networks for pstn and stm v-sat network, S t d "B" 9 m C-BAND EARTH...

S t d "B" 9 m C-BAND EARTH STATION (2001)   This  Earth  Station  is  aligned  with  INTEL  SAT  IOR  66°  and  provide domestic connectivity. R-Sat (Regional Satellite) i

Difference between routable and non- routable protocols, What is the differ...

What is the difference between routable and non- routable protocols? Routable protocols can work with a router and can be used to make huge networks. Non-Routable protocols

Shortest path - network layer and routing , Shortest path  The  dijkst...

Shortest path  The  dijkstra algorithms  four steps to discover what it called  the shortest path  tree . a.The algorithm  beings  to build  the tree identifying  its root.

Analysis of parallel algorithms, A generic algorithm is mostly analyzed on ...

A generic algorithm is mostly analyzed on the basis of the following parameters: the time complexity (implementation time) and the space complexity (amount of space necessary). Usu

Simple mail transfer protocoland secure sockets layer, Simple Mail Transfer...

Simple Mail Transfer Protocoland Secure Sockets Layer SMTP: Simple Mail Transfer Protocol is a server-to-server protocol for delivering electronic mail. SSL: Secure Sockets

Explain the authentication header (ah) protocol, Can you explain the Authen...

Can you explain the Authentication Header (AH) Protocol?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd