Imap and pop functions, Computer Network Security

 

How does the POP functions? What are the advantages/benefits of IMAP over POP?

POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protocol available which needs installation of POP3 software on the client machine as well as server machine both.

The below drawn figure shows the architectural view of thecommunication which takes place between a POP3 client and a POP3 mail server.

 

766_POP_functions.png

Figure PUP3 Communication

In POP3 communication, the client is required to bring out the e-mails from the mailbox which resides on the mail server. At first, client sends username and password for authorization. The  mail  server  checks  the  username  and  password  and  then  provides  privileges  and permissions o that particular client. The client requests a list of e-mails to which the mail server gives the e- mail information catalogue (including e-mail numbers, sizes and many more). Finally, client retrieves e-mail from mailbox based on the requirement.

POP3 comprises of two message access modes such as keep the mode and delete mode. In the keep mode context, the mail remains in the mailbox once it is retrieved for future reviewing. This mode is generally used when user is remotely accessing mails.
In delete the mode context, the mail gets deleted from mailbox as soon as it is retrieved. This mode is generally used when user is accessing mails from its personal computer( pc), where it can store the mails for future use.
The Internet Mail Access Protocol version 4 (IMAP4) gives certain advantages to the user over the POP3 which are stated below,
(i) E-mail header can be seen before retrieval.
(ii) E-mail contents can be identified with the given string of characters before the retrieval. 
(iii) E-mail can be partially retrieved when the bandwidth is quite low and the multimedia contained in e-mail requires high bandwidth.
(iv) A user can have the accessing privileges such as deleting, creating and renaming the mailboxes on mail server.
(v) A collection of the mailboxes can be created in the folder for storing the e-mails.

Posted Date: 7/20/2012 5:46:08 AM | Location : United States







Related Discussions:- Imap and pop functions, Assignment Help, Ask Question on Imap and pop functions, Get Answer, Expert's Help, Imap and pop functions Discussions

Write discussion on Imap and pop functions
Your posts are moderated
Related Questions
The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

QUESTION (a) (i) Describe Phishing attacks. (ii) Distinguish between Phishing and Spear Phishing attacks. (b) Describe two instances where an attacker sniffing on a netwo

Protocols for Secure Communications Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption t

QUESTION There are generally five factors that will influence how you respond to computer security incidents- The effect the incident has on your business Legal issue

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

In BUS topology every computer is directly connected to primary network cable in a single way. Bus networks are the easiest way to connect multiple users, but can have problems