![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
a)
UIDL POP3 Command:
UIDL stands for Unique-Id Listing.
- The fact that optional UIDL command is supported is indicated by the UIDL capability.
- A unique number to each incoming mail message are assigned by POP3 servers.
- When a POP3 client issues the UIDL command, the server responds with the unique message ID in mailbox.
- The UIDL POP3 Command is used for “download and keep”, which allows mail to be left on the server after it has been downloaded to the user. Both the mail client and the POP server must support this feature.
- The client can use the UIDL command to determine which messages on the server has already been seen by maintaining a file that lists the messages received during earlier sessions.
Given transaction:
Suppose one has configured their POP mail client to operate in the download-and-delete mode. The transaction is given as below:
C: list (client asks server to list the size of each of the stored messages)
S: 1 498 (Server lists the size of message 1)
S: 2 912 (Server lists the size of message 2)
S: .
C: retr 1 (Client requests to read message 1)
S: blah blah … (Sends message 1)
S: ………blah
S: .
b)
UIDL POP3 Command:
UIDL stands for Unique-Id Listing.
- The fact that optional UIDL command is supported is indicated by the UIDL capability.
- A unique number to each incoming mail message are assigned by POP3 servers.
- When a POP3 client issues the UIDL command, the server responds with the unique message ID in mailbox.
- The UIDL POP3 Command is used for “download and keep”, which allows mail to be left on the server after it has been downloaded to the user. Both the mail client and the POP server must support this feature.
- The client can use the UIDL command to determine which messages on the server has already been seen by maintaining a file that lists the messages received during earlier sessions.
Given transaction:
Suppose one has configured their POP mail client to operate in the download-and-keep mode. The transaction is given as below:
C: list (client asks server to list the size of each of the stored messages)
S: 1 498 (Server lists the size of message 1)
S: 2 912 (Server lists the size of message 2)
S: .
C: retr 1 (Client requests to read message 1)
S: blah blah … (Sends message 1)
S: ………blah
S: .
c)
UIDL POP3 Command:
UIDL stands for Unique-Id Listing.
- The fact that optional UIDL command is supported is indicated by the UIDL capability.
- A unique number to each incoming mail message are assigned by POP3 servers.
- When a POP3 client issues the UIDL command, the server responds with the unique message ID in mailbox.
- The UIDL POP3 Command is used for “download and keep”, which allows mail to be left on the server after it has been downloaded to the user. Both the mail client and the POP server must support this feature.
- The client can use the UIDL command to determine which messages on the server has already been seen by maintaining a file that lists the messages received during earlier sessions.
Given transaction:
Suppose one configured the POP mail client to operate in the download-and-keep mode. Then using the transcript in part b, suppose one retrieves messages 1 and 2, exit POP, and then five minutes later can again access POP to retrieve new e-mail. The given transaction is:
C: list (client asks server to list the size of each of the stored messages)
S: 1 498 (Server lists the size of message 1)
S: 2 912 (Server lists the size of message 2)
S: .
C: retr 1 (Client requests to read message 1)
S: blah blah … (Sends message 1)
S: ………blah
S: .
C: retr 2
S: blah blah …
S: ………..blah
S: .
C: quit
S: +OK POP3 server signing off
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Chapter 2 Solutions
EBK COMPUTER NETWORKING
- Create a Client/Server using DatagramSocket and DatagramPacket Programming and using RSA (2048) as encryption algorithm. A client and a server. The server receives the encrypted datagram packet over a datagram socket. The client should ask the user to enter the 12-digit number, and then send the encrypted credit number to the server. The datagram packet received by the server should be decrypted and display the unencrypted credit card number to the server screen. When the server receives a datagram, it replies by sending a datagram packet that contains a one-line "received with thanks" back to the client. Note: The key/s should be generated, use the appropriate class to generate the key. Use the IPv4 loopbackarrow_forwardThe Kerberos Authentication Server might reject an AS_REQ message and instead require pre-authentication - that is, it requires the client to send a timestamp encrypted with the client key. Why does it do this? Select one: a. It must not disclose the Ticket Granting Ticket before the client has authenticated b. It is dangerous to respond to an AS_REQ message before the client has authenticated c. Responding to multiple AS_REQ messages would allow a guessed plaintext attack d. It needs the client's public key to check the pre-authentication message was signed correctlyarrow_forwardQ.7. Design and implement a client/ Multi-threaded Server Chat application where a set of clients are able to send their request to the Multithreaded Server. In this application, messages that are exchanged between client and server, must be encrypted using AES encryption algorithm. After receiving the message, each party (client or server) perform decryption operation and show the content of message on the terminal.arrow_forward
- In which of the following applications, UDP is a suitable transport layerprotocol? (a)In SMTP, a user can send a long e-mail message, which may includemultimedia. When a user sends a message, the recipient does not expectto receive a response quickly. (b)A user needs to download a very large text file from the internet. Theuser doesn’t want part of the file to be missing or corrupted when he/sheopens the file. The delay created between the delivery of the parts arenot an overriding concern for him. (c)In DNS, a client needs to send a short request to a server and to receive a quick response from it. The request and response can each fit in one userdatagram.arrow_forwardTasks: 1. Part A: • Develop a UDP/IP server program in java that waits for clients to server. • The server responds to the client with one of the following based on client's request: V Export secret key generated using KeyGenerator V Export Text and Message Digest Export Text and Digital Signature V Send original text for the encrypted text received from client 2. Part B: Develop a UDP/IP client program that make request secret key, Message Digest, Digital Signature and original text by sending the encrypted text to server program developed (in Part A). This program will display the various objects received from server on its console.arrow_forwardIL PCAP Scanner alert udp any 61348 -> any any (content: "109 69 63 61 6e 68 61 7a 69 70 03 63 6f 6d 001; msg: "DNS Test"; Sid:1000001) Question Number 2 Scan The scan results for your snort rule will be displayed below. There is a problem with your rule. Check the alerts below to determine what went wrong and then try again. Something went wrong with your snort rule. Check the Syntax Syntax error please help! Create a rule to detect DNS requests to 'icanhazip', then test the rule with the scanner and submit the token. O Xarrow_forward
- QUESTION 22 The session_start () function in PHP does the following: DA. starts a session automatically OB. looks for a PHPSESSID cookie on the user's hard drive first C. starts a session if there is no PHPSESSID cookie D. automatically crctites a PHPSESSID first E. writes the session variables on the user's hard drive OF. creates a PHPSESSID if there isn't one and writes it as a cookie on the user's hard drive OG. reads the PHPSESSID cookie value if there is already a session started QUESTION 24 the session_start() function in php does the following: CA. starts a session automatically first thing B. looks for a PHPSESSID cookie on the users hard drive first OC. starts a session if there is no PHPSESSID cookie on the users hard drive D. creates a value for the PHPSESSID first E. writes the session variables on the users hard drive OF. creates a PHPSESSID if there isn't one and writes it as a cookie on the users hard drive G. reads the PHPSESSID cookie value if there is already a…arrow_forwardA. “Security is different in wireless”1. Discuss the statement above. The answer needs to take into account allaspects of the debate. Provide example if needed.2. Support your answer with reference.B. In IEEE 802.11, open system authentication simply consists of two communications.An authentication is requested by the client, which contains the station ID (typicallythe MAC address). This is followed by an authentication response from the AP/routercontaining a success or failure message. An example of when a failure may occur isif the client’s MAC address is explicitly excluded in the AP/router configuration.1. What are the benefits of this authentication scheme? 2. What are the security vulnerabilities of this authentication scheme?C. Twitter and Facebook are one of the well-known stay-up-to-date media. Whether youuse it to keep up with news or just to share your thoughts, it’s one of the commonlyused services on the Internet. Therefore, use Wireshark to:1. Capture and analyse Twitter…arrow_forwardsign and Application Assume that Bob (bob@foo.com) wants to send e-mail from his client to his girl friend Alice (alice@bar.com). Please give all steps and needed protocols with explanation in your answer. 7 A▾ B I EE I 30 22arrow_forward
- QUESTION 22 The session_start () function in PHP does the following: DA. starts a session automatically OB. looks for a PHPSESSID cookie on the user's hard drive first DC. starts a session if there is no PHPSESSID cookie D. automatically creates a PHPSESSID first E. writes the session variables on the user's hard drive F. creates a PHPSESSID if there isn't one and writes it as a cookie on the user's hard drive G. reads the PHPSESSID cookie value if there is already a session started QUESTION 23 Session data: A. is stored on the users hard drive only OB. is stored on the servers hard drive C. is available until the user closes the browser D. b and c QUESTION 24 the session_start() function in php does the following: A starts a session automatically first thing B. looks for a PHPSESSID cookie on the users hard drive first C. starts a session if there is no PHPSESSID cookie on the users hard drive D. creates a value for the PHPSESSID first E. writes the session variables on the users hard…arrow_forwardOne of the problems with the Internet email system is that sending forged emails is relatively straightforward, i.e., it is easy to send an email with a fake sender/from address. One solution to this problem would be for a domain’s mail servers to digitally sign any email originating from the domain. For this to be useful, the public key would need to be made available to clients to validate the signatures. It is proposed that the public keys of the mail servers will be verified and signed by a certification authority (same as SSL/TLS certificates) and distributed via a standardised URL for the domain, e.g., https://mybusiness.com/email.pubkey. (a) Explain how the client would obtain the public key and validate the email server’s digital signatures. (b) Discuss the problem of trusting the obtained public key and how this solution results in public keys that can/cannot be trusted. (c) Indicate whether you believe this approach could be used to prevent forged emails and explain why it…arrow_forwardOAuth is an authorization protocol which is also used as an authentication method for the OpenlD Connect (OIDC) protocol. OIDC implements OAuth by performing the following: The user first tries to access the service of a service provider through a browser/app. 1. The service provider will send a request to the OIDC server 2. If the user is already logged in, the OIDC server will send a JWT token to the service provider. If the user is not logged in, then the user will first have to authenticate 3. and then the JWT token is sent 4. After receiving the JWT token, the service provider will use the OIDC's JWKS URI to fetch the certificates used by the authentication server and validate the JWT token 5. If the token is valid the service provider will use the OIDC's user endpoint to fetch the data of the user using the JWT token. If the token is not valid, then the service provider will show an error message. If we create an activity diagram for the above scenario, how many fork nodes will…arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)