EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 2, Problem P17P

a)

Program Plan Intro

UIDL POP3 Command:

UIDL stands for Unique-Id Listing.

  • The fact that optional UIDL command is supported is indicated by the UIDL capability.
  • A unique number to each incoming mail message are assigned by POP3 servers.
  • When a POP3 client issues the UIDL command, the server responds with the unique message ID in mailbox.
  • The UIDL POP3 Command is used for “download and keep”, which allows mail to be left on the server after it has been downloaded to the user. Both the mail client and the POP server must support this feature.
  • The client can use the UIDL command to determine which messages on the server has already been seen by maintaining a file that lists the messages received during earlier sessions.

Given transaction:

Suppose one has configured their POP mail client to operate in the download-and-delete mode. The transaction is given as below:

C: list (client asks server to list the size of each of the stored messages)

S: 1 498 (Server lists the size of message 1)

S: 2 912 (Server lists the size of message 2)

S: .

C: retr 1 (Client requests to read message 1)

S: blah blah …  (Sends message 1)

S: ………blah

S: .

b)

Program Plan Intro

UIDL POP3 Command:

UIDL stands for Unique-Id Listing.

  • The fact that optional UIDL command is supported is indicated by the UIDL capability.
  • A unique number to each incoming mail message are assigned by POP3 servers.
  • When a POP3 client issues the UIDL command, the server responds with the unique message ID in mailbox.
  • The UIDL POP3 Command is used for “download and keep”, which allows mail to be left on the server after it has been downloaded to the user. Both the mail client and the POP server must support this feature.
  • The client can use the UIDL command to determine which messages on the server has already been seen by maintaining a file that lists the messages received during earlier sessions.

Given transaction:

Suppose one has configured their POP mail client to operate in the download-and-keep mode. The transaction is given as below:

C: list (client asks server to list the size of each of the stored messages)

S: 1 498 (Server lists the size of message 1)

S: 2 912 (Server lists the size of message 2)

S: .

C: retr 1 (Client requests to read message 1)

S: blah blah …  (Sends message 1)

S: ………blah

S: .

c)

Program Plan Intro

UIDL POP3 Command:

UIDL stands for Unique-Id Listing.

  • The fact that optional UIDL command is supported is indicated by the UIDL capability.
  • A unique number to each incoming mail message are assigned by POP3 servers.
  • When a POP3 client issues the UIDL command, the server responds with the unique message ID in mailbox.
  • The UIDL POP3 Command is used for “download and keep”, which allows mail to be left on the server after it has been downloaded to the user. Both the mail client and the POP server must support this feature.
  • The client can use the UIDL command to determine which messages on the server has already been seen by maintaining a file that lists the messages received during earlier sessions.

Given transaction:

Suppose one configured the POP mail client to operate in the download-and-keep mode. Then using the transcript in part b, suppose one retrieves messages 1 and 2, exit POP, and then five minutes later can again access POP to retrieve new e-mail. The given transaction is:

C: list (client asks server to list the size of each of the stored messages)

S: 1 498 (Server lists the size of message 1)

S: 2 912 (Server lists the size of message 2)

S: .

C: retr 1 (Client requests to read message 1)

S: blah blah …  (Sends message 1)

S: ………blah

S: .

C: retr 2

S: blah blah …

S: ………..blah

S: .

C: quit

S: +OK POP3 server signing off

Blurred answer
Students have asked these similar questions
Kerberos is a protocol that is based around Needham-Schroeder protocol for many to many authentications. Now answer the following questions. (Use necessary diagrams to justify your answers) i) Explain why the password of the user is not sent over the network and instead session keys are generated and shared in the Kerberos protocol. ii) The information in a TGT (Ticket Granting Ticket) is encrypted so the client cannot access the information in the TGT. However, all information in the ticket is already known to the client. Why is it still necessary to encrypt it? iii) Describe the working mechanism of how a ticket is generated between the client and server by the TGS (Ticket Granting Server) and how it is used for client-server communication.
Create a Client/Server using DatagramSocket and DatagramPacket Programming and using DESede (168) as encryption algorithm. A client and a server. The server receives the encrypted datagram packet over a datagram socket. The client should ask the user to enter the 16-digit credit card number, and then send the encrypted credit number to the server. The datagram packet received by the server should be decrypted and display the unencrypted credit card number to the server screen. When the server receives a datagram, it replies by sending a datagram packet that contains a one-line "thanks for sending" back to the client. Note: The key should be generated, use the appropriate class to generate the key. Use the IPV4 loopback address
PI7. Consider accessing your e-mail with POP3, a. Suppose you have configured your POP mail client to operate in the download-and-delete mode. Complete the following transaction: C: list S: 1 498 S: 2 912 S: . C: retr 1 S: blah blah S: blah S: ? ? b. Suppose you have configured your POP mail client to operate in the download-and-keep mode. Complete the following transaction: C: list S: 1 498 S: 2 912 S: C: retr 1
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education