Mail message format - application layer, Computer Networking

Assignment Help:

Mail Message  Format

When an e mail  is sent from one person  to another  a header containing peripheral information precedes  the body  of the message itself. This contained  information is contained in a series of header lines. The header liens and  the body of the message are separated by a blank line. Each header line contains readable ext consisting of a keyword followed  by  a colon  followed by value. some  of the  keyword  are required and others  are optional. Every header  must have  a from header line and  a to header line  a header may include a subject header line as  well as other  optional header liens  a message header looks like this.

The to field  gives the  address  of the primary recipient. Having multiple recipients is also  allowed. The  cc field gives  the addresses of any secondary recipients. In  terms  of  delivery  there is  o distinction  between  the primary and secondary recipients. The  terms cc ( carbon copy0 is a bit dated  since computers do not use cardoon paper but it is well established. The  Bcc( Billed carbon copy) field is like the cc field except that this  line  is deleted from all the copies  sent to the primary and secondary recipients. This feature  allows people  to send copies to third parties without the primary and  secondary recipients knowing this. The next two  field from and sender tell who wrote and sent  the message  respectively. A line containing  received is added by each message transfer agent along  the way. The  lien contains the agents identify the date and  data and time the message was received and other  information that can be used for finding  bugs in the routing  systems. The return path field is added  by the final message  transfer agent and was intended to tell how to get back  to  the sender.

 


Related Discussions:- Mail message format - application layer

Ccna, Can you do my ccna assignment

Can you do my ccna assignment

Determine about the security systems, Determine about the Security Systems ...

Determine about the Security Systems If the company intends to connect to the Internet, then it should pay great attention to the configuration of firewalls. Just as no one wo

How to identify connectivity problems- ccna, Identify Connectivity Problems...

Identify Connectivity Problems  Step 1: Use the ping command to test network connectivity. Use the following table to test the connectivity of every network device.

Factor price, who are experts who lecter on factor price?

who are experts who lecter on factor price?

Give the types of firewalls, Give the types of firewalls Conceptually,...

Give the types of firewalls Conceptually, there are two types of firewalls: 1.  Network Level 2.  Application Level Network Level Firewall/Packet Filters The Net

Explain point-to-point protocol in ccna, An industry standard suite of prot...

An industry standard suite of protocols for the use of point-to-point links to transport multiprotocol datagrams.

Explain fully connected interconnection networks, Fully connected : It is t...

Fully connected : It is the most powerful interconnection topology.  In this every node is directly associated to all other nodes. The limitation of this network is that it needs t

DHCP, Describe DHCP concept

Describe DHCP concept

What is full-duplex ethernet, Full-Duplex Ethernet 10Base5 as well ...

Full-Duplex Ethernet 10Base5 as well as 10Base2 are half-duplex Full-duplex raises capacity of each domain No require for CSMA/CD

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd