Imap and pop functions, Computer Network Security

Assignment Help:

 

How does the POP functions? What are the advantages/benefits of IMAP over POP?

POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protocol available which needs installation of POP3 software on the client machine as well as server machine both.

The below drawn figure shows the architectural view of thecommunication which takes place between a POP3 client and a POP3 mail server.

 

766_POP_functions.png

Figure PUP3 Communication

In POP3 communication, the client is required to bring out the e-mails from the mailbox which resides on the mail server. At first, client sends username and password for authorization. The  mail  server  checks  the  username  and  password  and  then  provides  privileges  and permissions o that particular client. The client requests a list of e-mails to which the mail server gives the e- mail information catalogue (including e-mail numbers, sizes and many more). Finally, client retrieves e-mail from mailbox based on the requirement.

POP3 comprises of two message access modes such as keep the mode and delete mode. In the keep mode context, the mail remains in the mailbox once it is retrieved for future reviewing. This mode is generally used when user is remotely accessing mails.
In delete the mode context, the mail gets deleted from mailbox as soon as it is retrieved. This mode is generally used when user is accessing mails from its personal computer( pc), where it can store the mails for future use.
The Internet Mail Access Protocol version 4 (IMAP4) gives certain advantages to the user over the POP3 which are stated below,
(i) E-mail header can be seen before retrieval.
(ii) E-mail contents can be identified with the given string of characters before the retrieval. 
(iii) E-mail can be partially retrieved when the bandwidth is quite low and the multimedia contained in e-mail requires high bandwidth.
(iv) A user can have the accessing privileges such as deleting, creating and renaming the mailboxes on mail server.
(v) A collection of the mailboxes can be created in the folder for storing the e-mails.


Related Discussions:- Imap and pop functions

Systems development life cycle security-information security, The Role of t...

The Role of the Investigation The first phase, investigation is the most significant. What problem is the system being developed to solve? During investigation phase, objectives

Differences between a hacker and a cracker, Question: (a) Which of the...

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you

Securities Issues in a company, 'Near Field Communication' (NFC) technologi...

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

Explain how can we achieved privacy in an e-mail system, Explain how can we...

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

Why use an ids, WHY USE AN IDS? IDS prevent from problem behaviors by in...

WHY USE AN IDS? IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at

Half-duplex and full-duplex mode of transmission, Question: a. State br...

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

Describe phishing attacks, QUESTION (a) (i) Describe Phishing attacks. ...

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

Difference between flow control and congestion control, (a) Describe briefl...

(a) Describe briefly the difference between flow control and congestion control in relation to a connection-oriented protocol such as TCP. (b)  What is the initial rate of data

What type of rfid tag is more appropriate for ws-pass, Consider the followi...

Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated

Determine the codeword which is transmitted using crc, Question (a) For...

Question (a) For the bit stream 010011, show the waveforms for each of the code indicated. Consider that the signal level for NRZ-L for mark is positive; the signal level for t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd