Mime the multipurpose internet mail extensions, Computer Networking

Assignment Help:

MIME The Multipurpose Internet Mail Extensions

While  the message  headers described in are satisfactory for sending  ordinary  ASCII text they are  not sufficiently Reich for multimedia messages(for example messages with  images audio and video) or for carrying  non ASCII  text formats ( for  example  characters used by language other then English ). To  send  content  other then  ASCII text the sending user agent must include additional headers  in the message.

MIME  defines  five  new message headers as show in table 8. These are described  below  one by one:

1.MIME version simply  identifies the version of MIME.

2.The content description Header is an ASCII string  telling  what is  in the message .

3.The content id heard identifies the content.

4.The content transfer  encoding : Header alerts the receiving user agent that the  message  body  has been ASCII encoded and indicates the type of encoding used. Thus when  a user agent receives a message with these two header if first  uses the  value  of the content transfer encoding heard to convert the message body  to its original non ASCII form and then  uses.

5.The content type header to determine  what  action it should  take on the message  body. Let  take  an example of MIME  message.

From : heena@yahoo.

To : harish@rediff. Com

Subject : Picture of monalisa

MIME : Version  : 1.0

Content  transfer encoding  : base 64

Content   - Type  image  jpeg

 Base 64 encoded date ................

.....................................................

............................ base 64 encoded data)

We  observer form  the above  MIME message  that heena user agent  encoded the JPEG  image  using  base 64 encoding. This is one of the  several encoding techniques  standardized  in MIME for conversion to  an acceptable 7 bit  ASCII format.

When  Harish  reads his mail  with his  user agent his user agent operates on this game  MIME message  when Harish use agent observes the content transfer encoding base64 header line. It proceeds to decode the base  640 encoded message body.

The message  also  includes a content type  image jpeg  header line his  indicates to Harish  user agent that the  message body  should be JPEG decompressed. Finally the message includes the MIME version. Header which indicates the MIME version that  is being  used. In  particular  after the message  header  there is  blank  lien and  then the message body.


Related Discussions:- Mime the multipurpose internet mail extensions

Repeaters, REPEATERS:  Repeaters are needed when copper wire communica...

REPEATERS:  Repeaters are needed when copper wire communication is takes place. According to the fact that electrical signal goes weaker while travelling over copper lines. A

Identify three characteristics of switches, Switches operate at layer 2. Th...

Switches operate at layer 2. They enhance bandwidth by decreasing the number of devices sharing the media. They isolate collisions. Like a bridge they forward traffic based upon la

Process server, Using a process server (such as inetd or xinetd) to listen ...

Using a process server (such as inetd or xinetd) to listen on a set of well-popular ports and start one another server.  I said that it had much to do with overhead.  Say you set u

Show the distribution of name space, Q. Show the Distribution of Name Space...

Q. Show the Distribution of Name Space? Distribution of Name Space --Information for domain name space must be stored on multiple servers (DNS servers) to be efficient

What are triggers and rules, Triggers are special user defined actions usua...

Triggers are special user defined actions usually in the form of stored procedures, that are automatically requested by the server based on data related events. It can perform diff

What are instance variables, What are instance variables? Instance vari...

What are instance variables? Instance variables are those which are explained at the class level. Instance variables require not be initialized before using them as they are au

#title.assignment., hii i want to make a assignment from you. please help m...

hii i want to make a assignment from you. please help me.

Sole access protocol in parallel programming , Sole Access Protocol Th...

Sole Access Protocol The atomic operations, which have conflicts, are handled using sole access protocol. The process used for synchronization in this protocol is given below:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd