blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
3.4.10. NETWORK-SPECIFIC TRANSFORMATIONS Connected: An Internet Encyclopedia
3.4.10. NETWORK-SPECIFIC TRANSFORMATIONS

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 822
Up: 3. LEXICAL ANALYSIS OF MESSAGES
Up: 3.4. CLARIFICATIONS
Prev: 3.4.9. BACKSPACE CHARACTERS
Next: 4. MESSAGE SPECIFICATION

3.4.10. NETWORK-SPECIFIC TRANSFORMATIONS

3.4.10. NETWORK-SPECIFIC TRANSFORMATIONS

During transmission through heterogeneous networks, it may be necessary to force data to conform to a network's local conventions. For example, it may be required that a CR be followed either by LF, making a CRLF, or by <null>, if the CR is to stand alone). Such transformations are reversed, when the message exits that network.

When crossing network boundaries, the message should be treated as passing through two modules. It will enter the first module containing whatever network-specific transformations that were necessary to permit migration through the "current" network. It then passes through the modules:

  • Transformation Reversal

    The "current" network's idiosyncracies are removed and the message is returned to the canonical form specified in this standard.

  • Transformation

    The "next" network's local idiosyncracies are imposed on the message.

                                    ------------------
                        From   ==>  | Remove Net-A   |
                        Net-A       | idiosyncracies |
                                    ------------------
                                           ||
                                           \/
                                      Conformance
                                      with standard
                                           ||
                                           \/
                                    ------------------
                                    | Impose Net-B   |  ==>  To
                                    | idiosyncracies |       Net-B
                                    ------------------
    


Next: 4. MESSAGE SPECIFICATION

Connected: An Internet Encyclopedia
3.4.10. NETWORK-SPECIFIC TRANSFORMATIONS

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609