Mail message format - application layer, Computer Networking

Assignment Help:

Mail Message  Format

When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained  information is contained in a series of header lines. The header liens and  the body of the message are separated by a blank line. Each header line contains readable ext consisting of a keyword followed  by  a colon  followed by value. some  of the  keyword  are required and others  are optional. Every header  must have  a from header line and  a to header line  a header may include a subject header line as  well as other  optional header liens  a message header looks like this.

The to field  gives the  address  of the primary recipient. Having multiple recipients is also  allowed. The  cc field gives  the addresses of any secondary recipients. In  terms  of  delivery  there is  o distinction  between  the primary and secondary recipients. The  terms cc ( carbon copy0 is a bit dated  since computers do not use cardoon paper but it is well established. The  Bcc( Billed carbon copy) field is like the cc field except that this  line  is deleted from all the copies  sent to the primary and secondary recipients. This feature  allows people  to send copies to third parties without the primary and  secondary recipients knowing this. The next two  field from and sender tell who wrote and sent  the message  respectively. A line containing  received is added by each message transfer agent along  the way. The  lien contains the agents identify the date and  data and time the message was received and other  information that can be used for finding  bugs in the routing  systems. The return path field is added  by the final message  transfer agent and was intended to tell how to get back  to  the sender.

 


Related Discussions:- Mail message format - application layer

Difference between routable and non- routable protocols, What is the differ...

What is the difference between routable and non- routable protocols? Routable protocols can work with a router and can be used to make huge networks. Non-Routable protocols

Explain tree interconnection network, Tree interconnection network:   In tr...

Tree interconnection network:   In tree interconnection network, processors are organised in a complete binary tree pattern. Figure: Tree interconnection network

Approach for client - server communication, Client Once the GUI applicat...

Client Once the GUI application is loaded, it will send a request (instance/object of Commands class) to server for a list of files from the server's shared directory.Client wil

Control flow in distributed enrollment protocol , Control Flow: Once the c...

Control Flow: Once the client has established a network connection with a server, the server must instantiate a new, empty, BasicEnrollmentManager implementation for this client,

Explain about mesh topology, Q. Explain about Mesh Topology? - Dedicate...

Q. Explain about Mesh Topology? - Dedicated point-to-point links to each other device - n (n-1)/2 links an every device will have n-1 I/O ports - Advantages - Dedic

State the specification of high-end server, State the specification of high...

State the specification of high-end server A mid-range or high-end server with the following specifications would be sufficient for a medium to large organisation: A Pentiu

How to identify connectivity problems- ccna, Identify Connectivity Problems...

Identify Connectivity Problems  Step 1: Use the ping command to test network connectivity. Use the following table to test the connectivity of every network device.

Explain multipurpose internet mail extensions, Q. Explain Multipurpose Inte...

Q. Explain Multipurpose Internet Mail Extensions? - The Multipurpose Internet Mail Extensions is an extension of SMTP that allows the transfer of multimedia and other non-ASCII

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Define the bulletin board intranet, Define the Bulletin Board Intranet ...

Define the Bulletin Board Intranet This type of Intranet in an organisation extends to everyone the capability to review or update information that would normally be placed

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd