Imap and pop functions, Computer Network Security

Assignment Help:

 

How does the POP functions? What are the advantages/benefits of IMAP over POP?

POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protocol available which needs installation of POP3 software on the client machine as well as server machine both.

The below drawn figure shows the architectural view of thecommunication which takes place between a POP3 client and a POP3 mail server.

 

766_POP_functions.png

Figure PUP3 Communication

In POP3 communication, the client is required to bring out the e-mails from the mailbox which resides on the mail server. At first, client sends username and password for authorization. The  mail  server  checks  the  username  and  password  and  then  provides  privileges  and permissions o that particular client. The client requests a list of e-mails to which the mail server gives the e- mail information catalogue (including e-mail numbers, sizes and many more). Finally, client retrieves e-mail from mailbox based on the requirement.

POP3 comprises of two message access modes such as keep the mode and delete mode. In the keep mode context, the mail remains in the mailbox once it is retrieved for future reviewing. This mode is generally used when user is remotely accessing mails.
In delete the mode context, the mail gets deleted from mailbox as soon as it is retrieved. This mode is generally used when user is accessing mails from its personal computer( pc), where it can store the mails for future use.
The Internet Mail Access Protocol version 4 (IMAP4) gives certain advantages to the user over the POP3 which are stated below,
(i) E-mail header can be seen before retrieval.
(ii) E-mail contents can be identified with the given string of characters before the retrieval. 
(iii) E-mail can be partially retrieved when the bandwidth is quite low and the multimedia contained in e-mail requires high bandwidth.
(iv) A user can have the accessing privileges such as deleting, creating and renaming the mailboxes on mail server.
(v) A collection of the mailboxes can be created in the folder for storing the e-mails.


Related Discussions:- Imap and pop functions

Area subdivision, the advantages and disadvantages of area subdivision and ...

the advantages and disadvantages of area subdivision and where it is applicable

Vulnerability scanners, VULNERABILITY SCANNERS Active vulnerability scan...

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

Network design approach, Problem a) Give three reasons why traditional ...

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Mention most relevant clause of iso 27001:2005, QUESTION (In this ques...

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

Network security attacks, (a) Show four Network Security attacks. How do th...

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

Unguided media, Unguided Media This is the wireless media that transfe...

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Venn Diagram Problem, Students were asked about search engine they used.90 ...

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

Network security in an organisation, Network security is an issue for compa...

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interac

Calculate the dynamic range of the 16-bit scanner, You are hired as a consu...

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

Which authorization model could be ideal, Question: (a) Your office ad...

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd