Post office protocols version - application layer, Computer Networking

Assignment Help:

Post Office  Protocols Version

In computing  the post office protocol  version 3 (POP3) is an  application layer internet standard  protocols  used by  local e mail  clients  to retrieve e mail  from a remote  server over  a TCP/ IP connection. POP3 and IMAP4 ( internet  message access protocols ) as the  two most  prevalent internet  standard protocol for e mail  retrieval. Virtually all modern  mail  clients  and servers  support both.

POP3 begins when  the user starts the mail   reader.  The mail  reader calls  up the ISP ( unless there  is already a connection ) and establishes a TCP connection  with the  message transfer agent  at part 110once  the connection has been  established the POP  3 protocol  goes through  three  states in sequence.

a. Authorization

b.Transactions

c.Update

During   the first  phase authorization  the user  agent sends a username and a password  to authenticate the user. During  the second  phase transaction the user agent  retrieves message, also  during  this phase the user agent can mark message for deletion remove deflection  marks. And obtain mail  statistics. The third  phase update occurs after the client has issued the quit command ending the POP3  session at this  time the mail  server deletes the  message  that were  marked  for deflection.

The  authorization phase  has two  principal  commands  user < user name> and pass  to illustrate these  two commands  we suggest that the telnet  is directly applied to a POP3 server using  port 110 and  issue these  commands. Suppose that  mail server is  the name  of your mail  server. You will see something  like  telnet  mail server 110.

S:

 C :

S : + ok POP 3  serer ready

C : USER Harish

 S : + ok  user accepted

 C :  pass vegetables

 S : ok login  successful

Note :  the line  marked  c are from  the client  and those  marked  s are from the  server.

In  transaction phase, the  user agent issues  commands and the  server responds to each  command  with a  reply. There  are two  possible  responses + ok  used by  the server  to indicate that the  previous  command was fine  and ERR used by  the server to  indicate that something  was wrong  with the  previous command. A user agent  using POP3 can often  be configured ( by the  user) to download and delete or to download and keep. The sequence of commands  issued by a POP3. User agent  depends on which  of these  two  mode  the user agent  is operating in. In  the download  and delete  mode  the user agent will issue  the LIST   RETR and DELE commands. As an example  suppose user has two  message in his her mailbox.

C: LIST

 S: + ok  2 messages

S : 1 120

 S : 2 200

S:

 C: RETER 1

 S: < the POP3 server sends  message 1>

 S: .

 C:  DELE 1

 S: ok  message 1 deleted

 C: RETR 2

 S : + ok

 S: < the  POP3  server sends  message >

 C: Quit

 S : + ok Dewey POP3  server signing off ( Mail drop empty)

 C: < close connection >

After  processing the quit  command, the POP3 server enters  the update phase and removes  message 1 and 2  from the mailbox.

A problem  with download  and  delete  mode is  that the  recipient. Harish  of group of people  want  to access  his mail message from  multiple  machines for example  his office PC, his home PC and his portable computer. This mode  partitions  Harish  mail message over these  three  machines  if Harish  first reads a message on his office PC he will  not be able  to read the message  from his  portable at home  late in the evening. In the download and keep  mode the user agent leaves the message  on the mail  server after downloading  them. In this  case Harish  can reread messaged from  different  machines  he can access  a message  from  work  and access  it again  again  later the  week  from home. 


Related Discussions:- Post office protocols version - application layer

What is icmp, What is ICMP? ICMP is Internet Control Message Protocol. ...

What is ICMP? ICMP is Internet Control Message Protocol. It gives messaging and communication for protocols within the TCP/IP stacks. This is also the protocol that manages err

What is the administrative distance for igrp, IGRP is a distance vector rou...

IGRP is a distance vector routing protocol designed by Cisco. The maximum hop count is 255, and it uses a combination of variables to verify a composite metric. IGRP has an adminis

What are the data link protocols, What are the Data link protocols? Dat...

What are the Data link protocols? Data link protocols are sets of specifications used to implement the data link layer. The categories of Data Link protocols are 1. Asynchro

What do you understand by protocol, Q. What do you understand by Protocol? ...

Q. What do you understand by Protocol? Ans:  In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers interchange infor

Explain how would pipeline the four pairs of statements, 3.  Explain how yo...

3.  Explain how you would pipeline the four following pairs of statements.  (4×5 points) a)  add $t0, $s0, $s1 beq $s1,$s2, 300 b)  add $t2, $t0, $t1 sw $t3, 36($t2) c)

Fiber optic cable - computer network, Fiber Optic Cable A fiber  opt...

Fiber Optic Cable A fiber  optic  cable is made  of glass or plastic and transmits signals in the form of light pulses. An optical fiber  is a thin  flexible medium  conducts

Protocol layering - computer network, Protocol Layering To design  str...

Protocol Layering To design  structural  network protocols the designers organize protocol and use the network  hard ware and software to implement  the protocol  in layers. E

What is a database server, With a database server, the client gives SQL req...

With a database server, the client gives SQL requests as messages to the database server. The results of every SQL command are returned over the network. The server uses its own pr

Explain the meaning of negotiation, Explain the meaning of Negotiation ...

Explain the meaning of Negotiation Negotiation is process of getting both sides to agree on some values or parameters to be used during communication. Maximum packet size is on

Dijkstra algorithms - network layer and routing , Dijkstra Algorithms T...

Dijkstra Algorithms To calculate its  routing  table  each router applies an algorithm  called  the dijkstra algorithm to its  state database. The dijkstra algorithm  calculate

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd