• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Post Office Protocol (POP)

Extracts from this document...

Introduction

��ࡱ�>�� 9;����8�������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������5@ ��0�*bjbj�2�2 (>�X�X �������������������8 <��v\\\\\\\\$Ra�>�\\\\\>��\\S���\�\�\�\������\P rE�]���\d�i0�� � ������� �� \\�\\\\\>>�Introduction The Post Office Protocol (POP) was first issued on October 1984. The protocol suggests a simple method for workstations to access mail from a mailbox server. The protocol is dependent upon TCP (Transfer Control Protocol) and assumes that mail is posted by SMTP. POP in more detail, is a way for a server machine to store and serve mail for various client machines that are not connected to the Internet 24 hours a day. This makes it like an electronic Post Office Box, where your email is held in the POP server until you login and retrieve it. For example, if somebody sends you e-mail it usually cannot be delivered directly to your computer unless it is permanently connected to the Internet and has its own mail delivery system. The messages have to be stored somewhere. An Internet Service Provider is on-line 24 hours on 7 days of the week and can do that job. This is where the message will stay until either you retrieve it or the Internet Service Provider administrator (ISP) finds a pile of large storage files from messages. The ISP then deletes them because you have gone past your limit of space available for incoming messages and cannot receive any more. ...read more.

Middle

1. The Authorisation Stage (This how POP3 handles Authentication) Once the client has opened the TCP connection and the server has issued a greeting message starting with a positive response (+OK). Then the client has two possibilities. Either sending a user name and a password by USER and PASS commands or sending an encrypted password by the APOP command, as PASS does not hide the password on the screen. After verifying the identity of the client, the server acquires an exclusive access lock on the mail drop. If the lock isn't acquired the server responds with a negative status and may close the connection or stay in the authorisation stage in order to allow issuing new authentication commands. After the lock is acquired the server assigns each message, a message number starting with 1. 2. The Transaction Stage After the client has successfully identified itself to the server, the server enters the transaction stage. Tthe client may issue commands and get responses from the server to each command. When the client issues a QUIT command the server enters the Update stage. Some Commands in the Transaction Stage � STAT � How many messages in the mailbox. � LIST [msg] � List a particular message. ...read more.

Conclusion

This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ 7h((o(p(�(�(S)T)�)�)7*8*�*�*�*�*�������������h"h"OJQJh"h"CJOJQJ%h"h"OJQJfHq� ����)h"h"CJOJQJfHq� ����h"h=ih"h"mHsH h=ih" �� 6 7 8 9 | } ~ � � � � � � � � � � � �����������������������������gd=i(�*��� � ����opqr����HIVWXY1234�����������������������������������gd=i�������������UVWX��������-./�����������������������������gd=i/0[\������67efgh�������������������������������������������gd=i�����������q!r!s!t!�!�!�!�!S#T#U#V#�$�$�$�$�&�&�&�����������������������������gd=i�&�&�'�'((p(q(r(s(�(�(�(�(T)U)V)W)�)�)�)�)8*9*:*;*�*��������������������������$a$gd"$a$gd"gd=i�*�*�*�*�*�*�����gd=i&1�h:p=i��/ ��=!�'"�'#��$��%��D@�D NormalCJ_H aJmH nHsH tHDA@�D Default Paragraph FontRi�R Table Normal�4� l4�a� (k�(No ListDZ@�D =i Plain TextCJOJQJ^JaJ4@4 "Header ���!4 @4 "Footer ���!`�o"` "watermark header$a$CJOJQJfHq� ����N�o2N "watermark footer$a$ CJOJQJ�">�������"r�V�:���*� �/��&�*�*�*7h q s � � U!W!�!�!9";"�"�"h �" �"��alex�"=i�@ @���"P@��Unknown������������G��z ��Times New Roman5V��Symbol3&� �z ��Arial7&�� �VerdanaG5�� �����h�MS Mincho-�3� fg?5� �z ��Courier New"1���h�J�f�J�f�J�f��1���1�\�������4d d 3�� H�?������������������=i�� IntroductionTCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedTCoursework.Info Coursework - http://www.coursework.info/ - Redistribution Prohibitedalexalex�� ��Oh��+'��0l���(��� � ( 4 @LT\d� IntroductionoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedualexewoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution Prohibitedu>Downloaded from Coursework.Info - http://www.coursework.info/is Normal.dotfalexl.d2exMicrosoft Word 10.0@@H϶]��@H϶]��@H϶]������ ��Õ.��+,��D��Õ.��+,��l(���H����� ���� � �UCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution ProhibitedoUCoursework.Info Coursework - http://www.coursework.info/ - Redistribution Prohibitedo� �1d A Introduction Titled@���+K_PID_LINKBASE CopyrightDownloaded FromCan RedistributeOwner�A4http://www.coursework.comcoursework.comehttp://www.coursework.com -No, do not redistributecoursework.com/ ����!"#$%&'����)*+,-./����1234567��������:����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������Root Entry�������� �F�GP�]��<�1Table�������� WordDocument��������(>SummaryInformation(����(DocumentSummaryInformation8������������0CompObj������������j������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������ ���� �FMicrosoft Word Document MSWordDocWord.Document.8�9�q ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together ...

    replace HTML and HTTP with other languages and protocols better adapted to a wireless environment, such as Handheld Device Transport Protocol (HDTP) and the Handheld Device Markup Language (HDML). ? Push technologies: Instead of polling the content from a server, the server could alsoo push content to the client.

  2. ICT Systems in Everyday Life: Your Local Community

    The purpose is simple to ensure that we reach the biggest return possible on our investment. This "maximum - return" philosophy has made Triton one the largest off-premise ATM manufacturers in the world, with ATMs ideally suited for financial institutions and retail environments.

  1. OCR GCSE Business &amp;amp; Communication Task 7 Report

    By contributing to minimising pollution, I am promoting my companies ethos aswel as engineering a more sustainable and manoeuvrable company which should only require one or two buildings to run, due to the dependency of the internet and my website.

  2. Ict ocr unit 8 ao1

    New phones let people access their emails, this is very useful especially for business people, because they always need to keep up speed with their business and they mainly do this with email, so if they Can check them when they are away from a computer with their mobile it

  1. Ict Access Coursework

    A second option could be that using a standard computer with widows 98 or XP and Microsoft office. Using Microsoft word processor Mrs Dickinson can insert all the data and save it on the computer hard drive and also on a disk in case of a virus, or being stolen etc.

  2. Observing Interactions between carers and clients

    Padley's weaknesses were that her tone of voice towards the other children was not good, she shouted at them to show that she was strong and powerful, she wanted all the attention, she towered the children when she had something to say wearing her big heels made her even taller.

  1. Unit 23: Investigating Communications and Networks

    data travels in one direction * Ring networks can be easier to establish * Ring networks represent low initial overhead (that is, no need to purchase a hub, and each wire only has to connect to the next workstation instead of having all wires come back to the hub).

  2. Internet Protocol V6

    128-bit addressing will theoretically offer 340,282,366,920,938,463,463,374,607,431,768,211,456 or (2128) addresses. The developers of Ipv6 say that the new addressing structure will make available an address for every proton on earth, and as such, is therefore expected to meet the predicted growth rates of the Internet.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work