Mail message format - application layer, Computer Networking

Assignment Help:

Mail Message  Format

When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained  information is contained in a series of header lines. The header liens and  the body of the message are separated by a blank line. Each header line contains readable ext consisting of a keyword followed  by  a colon  followed by value. some  of the  keyword  are required and others  are optional. Every header  must have  a from header line and  a to header line  a header may include a subject header line as  well as other  optional header liens  a message header looks like this.

The to field  gives the  address  of the primary recipient. Having multiple recipients is also  allowed. The  cc field gives  the addresses of any secondary recipients. In  terms  of  delivery  there is  o distinction  between  the primary and secondary recipients. The  terms cc ( carbon copy0 is a bit dated  since computers do not use cardoon paper but it is well established. The  Bcc( Billed carbon copy) field is like the cc field except that this  line  is deleted from all the copies  sent to the primary and secondary recipients. This feature  allows people  to send copies to third parties without the primary and  secondary recipients knowing this. The next two  field from and sender tell who wrote and sent  the message  respectively. A line containing  received is added by each message transfer agent along  the way. The  lien contains the agents identify the date and  data and time the message was received and other  information that can be used for finding  bugs in the routing  systems. The return path field is added  by the final message  transfer agent and was intended to tell how to get back  to  the sender.

 


Related Discussions:- Mail message format - application layer

Troubleshoot and correct vtp and configuration errors-ccna, Troubleshoot an...

Troubleshoot and Correct VTP and Configuration Errors When all errors are corrected, you should be capable to ping PC4 from PC1, PC5 from PC2, and PC6 from PC3. You should also

Which protocol resolves an ip address to a mac address, The Address Resolut...

The Address Resolution Protocol (ARP) sends out a broadcast to verify the MAC address from the IP address.

What is sockets, A socket is an abstraction that shows an endpoint of commu...

A socket is an abstraction that shows an endpoint of communication. Most applications that consciously use TCP and UDP do so by making a socket of the appropriate type and then per

Define internet network address, Q. Define internet network address? ...

Q. Define internet network address? The internet network address is additional commonly called the -IP address.? It consists of 32 bits a few of which are allocated to a hi

Explain bus topology, Explain Bus Topology. The physical Bus topology i...

Explain Bus Topology. The physical Bus topology is the easiest and most widely used of the network designs. It having of one continuous length of cable (trunk) and a terminatin

What are the key elements of protocols, What are the key elements of protoc...

What are the key elements of protocols? The key elements of protocols are a. Syntax   It refers to the structure or format of the data that is the order in which they a

Conversion binary to hexadecimal, Qustion: Convert the binary number 10...

Qustion: Convert the binary number 10111100 to hexadecimal.

Illustrate 802.11b HR DSSS, 802.11b HR DSSS a) High-rate DSSS using a ...

802.11b HR DSSS a) High-rate DSSS using a 2.4 GHz band b) Similar to DSSS excluding for encoding method c) Uses complementary code keying (CCK), encoding 4 or 8 bits to

Hybrid of client server and p2p architecture, Hybrid  of Client Server and...

Hybrid  of Client Server and P2P Architecture Both of  the architecture  are  commonly used  architecture. However  many  applications  are organized as by brides of the  clie

Which applications of computer network can be categorized, What are the mai...

What are the main categories based on which applications of computer network can be categorized? The major areas under which the applications for computer network can be divide

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd