Imap and pop functions, Computer Network Security

Assignment Help:

 

How does the POP functions? What are the advantages/benefits of IMAP over POP?

POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protocol available which needs installation of POP3 software on the client machine as well as server machine both.

The below drawn figure shows the architectural view of thecommunication which takes place between a POP3 client and a POP3 mail server.

 

766_POP_functions.png

Figure PUP3 Communication

In POP3 communication, the client is required to bring out the e-mails from the mailbox which resides on the mail server. At first, client sends username and password for authorization. The  mail  server  checks  the  username  and  password  and  then  provides  privileges  and permissions o that particular client. The client requests a list of e-mails to which the mail server gives the e- mail information catalogue (including e-mail numbers, sizes and many more). Finally, client retrieves e-mail from mailbox based on the requirement.

POP3 comprises of two message access modes such as keep the mode and delete mode. In the keep mode context, the mail remains in the mailbox once it is retrieved for future reviewing. This mode is generally used when user is remotely accessing mails.
In delete the mode context, the mail gets deleted from mailbox as soon as it is retrieved. This mode is generally used when user is accessing mails from its personal computer( pc), where it can store the mails for future use.
The Internet Mail Access Protocol version 4 (IMAP4) gives certain advantages to the user over the POP3 which are stated below,
(i) E-mail header can be seen before retrieval.
(ii) E-mail contents can be identified with the given string of characters before the retrieval. 
(iii) E-mail can be partially retrieved when the bandwidth is quite low and the multimedia contained in e-mail requires high bandwidth.
(iv) A user can have the accessing privileges such as deleting, creating and renaming the mailboxes on mail server.
(v) A collection of the mailboxes can be created in the folder for storing the e-mails.


Related Discussions:- Imap and pop functions

What is the main security vulnerability of ipv4, Question: (a) What is...

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Risk determination, Risk Determination For purpose of relative risk asse...

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Packet filtering firewall, Packet Filtering Firewall Packet filtering i...

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

Tracing a route, There is another probing methods i-e Trace Route. To get m...

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a

Calculate the total latency, Question (a) Inspect the following ifconfi...

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

What do you understand by the concept web of trust, Question: a) Name ...

Question: a) Name a method to allow a person to send a confidential email to another person, without risks of a third-party reading the email. Describe briefly the operations

Techniques for combating spam mails, Techniques for combating Spam mails ...

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

Briefly explain the following security goals, (a) Briefly explain the fo...

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

Describe how lower bounds on arc flows, QUESTION: (a) Suppose the graph ...

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

Maximum transmission unit (mtu), Maximum Transmission Unit  (MTU) Eac...

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd