• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Post Office Protocol (POP)

Extracts from this document...

Introduction

��ࡱ�>�� 9;����8�������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������5@ ��0�*bjbj�2�2 (>�X�X �������������������8 <��v\\\\\\\\$Ra�>�\\\\\>��\\S���\�\�\�\������\P rE�]���\d�i0�� � ������� �� \\�\\\\\>>�Introduction The Post Office Protocol (POP) was first issued on October 1984. The protocol suggests a simple method for workstations to access mail from a mailbox server. The protocol is dependent upon TCP (Transfer Control Protocol) and assumes that mail is posted by SMTP. POP in more detail, is a way for a server machine to store and serve mail for various client machines that are not connected to the Internet 24 hours a day. This makes it like an electronic Post Office Box, where your email is held in the POP server until you login and retrieve it. For example, if somebody sends you e-mail it usually cannot be delivered directly to your computer unless it is permanently connected to the Internet and has its own mail delivery system. The messages have to be stored somewhere. An Internet Service Provider is on-line 24 hours on 7 days of the week and can do that job. This is where the message will stay until either you retrieve it or the Internet Service Provider administrator (ISP) finds a pile of large storage files from messages. The ISP then deletes them because you have gone past your limit of space available for incoming messages and cannot receive any more. ...read more.

Middle

1. The Authorisation Stage (This how POP3 handles Authentication) Once the client has opened the TCP connection and the server has issued a greeting message starting with a positive response (+OK). Then the client has two possibilities. Either sending a user name and a password by USER and PASS commands or sending an encrypted password by the APOP command, as PASS does not hide the password on the screen. After verifying the identity of the client, the server acquires an exclusive access lock on the mail drop. If the lock isn't acquired the server responds with a negative status and may close the connection or stay in the authorisation stage in order to allow issuing new authentication commands. After the lock is acquired the server assigns each message, a message number starting with 1. 2. The Transaction Stage After the client has successfully identified itself to the server, the server enters the transaction stage. Tthe client may issue commands and get responses from the server to each command. When the client issues a QUIT command the server enters the Update stage. Some Commands in the Transaction Stage � STAT � How many messages in the mailbox. � LIST [msg] � List a particular message. ...read more.

Conclusion

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 7h((o(p(�(�(S)T)�)�)7*8*�*�*�*�*�������������h"h"OJQJh"h"CJOJQJ%h"h"OJQJfHq� ����)h"h"CJOJQJfHq� ����h"h=ih"h"mHsH h=ih" �� 6 7 8 9 | } ~ � � � � � � � � � � � �����������������������������gd=i(�*��� � ����opqr����HIVWXY1234�����������������������������������gd=i�������������UVWX��������-./�����������������������������gd=i/0[\������67efgh�������������������������������������������gd=i�����������q!r!s!t!�!�!�!�!S#T#U#V#�$�$�$�$�&�&�&�����������������������������gd=i�&�&�'�'((p(q(r(s(�(�(�(�(T)U)V)W)�)�)�)�)8*9*:*;*�*��������������������������$a$gd"$a$gd"gd=i�*�*�*�*�*�*�����gd=i&1�h:p=i��/ ��=!�'"�'#��$��%��D@�D NormalCJ_H aJmH nHsH tHDA@�D Default Paragraph FontRi�R Table Normal�4� l4�a� (k�(No ListDZ@�D =i Plain TextCJOJQJ^JaJ4@4 "Header ���!4 @4 "Footer ���!`�o"` "watermark header$a$CJOJQJfHq� ����N�o2N "watermark footer$a$ CJOJQJ�">�������"r�V�:���*� �/��&�*�*�*7h q s � � U!W!�!�!9";"�"�"h �" �"��alex�"=i�@ @���"P@��Unknown������������G��z ��Times New Roman5V��Symbol3&� �z ��Arial7&�� �VerdanaG5�� �����h�MS Mincho-�3� fg?5� �z ��Courier New"1���h�J�f�J�f�J�f��1���1�\�������4d d 3�� H�?������������������=i�� IntroductionTCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedTCoursework.Info Coursework - http://www.coursework.info/ - Redistribution Prohibitedalexalex�� ��Oh��+'��0l���(��� � ( 4 @LT\d� IntroductionoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedualexewoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution Prohibitedu>Downloaded from Coursework.Info - http://www.coursework.info/is Normal.dotfalexl.d2exMicrosoft Word 10.0@@H϶]��@H϶]��@H϶]������ ��Õ.��+,��D��Õ.��+,��l(���H����� ���� � �UCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution Prohibitedo� �1d A Introduction Titled@���+K_PID_LINKBASE CopyrightDownloaded FromCan RedistributeOwner�A4http://www.coursework.comcoursework.comehttp://www.coursework.com -No, do not redistributecoursework.com/ ����!"#$%&'����)*+,-./����1234567��������:����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������Root Entry�������� �F�GP�]��<�1Table�������� WordDocument��������(>SummaryInformation(����(DocumentSummaryInformation8������������0CompObj������������j������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������ ���� �FMicrosoft Word Document MSWordDocWord.Document.8�9�q ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    replace HTML and HTTP with other languages and protocols better adapted to a wireless environment, such as Handheld Device Transport Protocol (HDTP) and the Handheld Device Markup Language (HDML). ? Push technologies: Instead of polling the content from a server, the server could alsoo push content to the client.

  2. ICT Systems in Everyday Life: Your Local Community

    We also offer and extremely thorough education for both the novice and professional, arming we with knowledge to service our own ATM. If we manage a large estate Triton offers cutting edge ATM monitoring software that puts us in complete control of our ATMs from a personal computer.

  1. OCR GCSE Business &amp;amp; Communication Task 7 Report

    as clients are entitled to compensation. This would therefore be an unnecessary cause and would needlessly cost the company money, which could be prevented from spending money purchasing security features. Some websites are often misleading and can cause misinterpretation, friction and unsettlement not only for my company, but client's aswel.

  2. Ict ocr unit 8 ao1

    New phones let people access their emails, this is very useful especially for business people, because they always need to keep up speed with their business and they mainly do this with email, so if they Can check them when they are away from a computer with their mobile it

  1. Ict Access Coursework

    A second option could be that using a standard computer with widows 98 or XP and Microsoft office. Using Microsoft word processor Mrs Dickinson can insert all the data and save it on the computer hard drive and also on a disk in case of a virus, or being stolen etc.

  2. Observing Interactions between carers and clients

    Rest of the class: Theeeeee Ennnd. Mrs. Padley: for god's sake! Here we go again (to another teacher). I do not know where they've got it from, honestly, I do wish they stop saying it; it's getting on my nerves. After listening to this conversation, I realized that Mrs.

  1. Unit 23: Investigating Communications and Networks

    * It is difficult to troubleshoot. * Adding and removing computers disrupts the network. Mesh - In a mesh topology, each computer on network has redundant data paths. The mesh topology provides fault tolerance-if a wire, hub, switch, or other component fails, data can travel along an alternate path.

  2. Internet Protocol V6

    128-bit addressing will theoretically offer 340,282,366,920,938,463,463,374,607,431,768,211,456 or (2128) addresses. The developers of Ipv6 say that the new addressing structure will make available an address for every proton on earth, and as such, is therefore expected to meet the predicted growth rates of the Internet.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work