Explore chapters and articles related to this topic
Services and Applications
Published in Mário Marques da Silva, Cable and Wireless Networks, 2018
In addition to the SMTP, which is used by the server side (to exchange e-mails between successive e-mail servers or to deliver a message to a client) or by a client (to upload an e-mail), there are other two important protocols widely associated with e-mail service: Post office protocol (POP) [RFC 1225]: This allows a client to receive an e-mail from an e-mail server (download) using authentication. The well-known port of POP version 3 (POPv3) is 110.Internet message access protocol (IMAP) [RFC 2045]: This presents some additional features other than those available with the POP, namely the ability to read e-mails located in a server (through downloading or webmail), while leaving a copy in the mail server. It also allows the share of folders among different users, as well as the search of e-mails in a server. IMAP servers listed on well-known TCP port 143.
Communication Modules and Protocols
Published in Franjieh El Khoury, Antoine Zgheib, Building a Dedicated GSM GPS Module Tracking System for Fleet Management, 2018
Franjieh El Khoury, Antoine Zgheib
Post Office Protocol (POP3) is the most popular communication protocol at the level of the application layer of the TCP/IP reference model, as shown in Figure 3.6, used to transfer e-mail messages from a permanent mailbox to a local computer (Alani 2014; Comer 2000; Edwards and Bramante 2009). The user invokes a POP3 client, which creates a TCP connection to a POP3 server on the mailbox computer. The user first sends a login and a password to authenticate the session. Once authentication has been established, the user client sends commands to retrieve a copy of one or more messages and to delete the message from the permanent mailbox or to keep a copy of the message for a predefined number of days. Furthermore, the computer with the permanent mailbox run two servers: an SMTP server to accept mail sent to a user and add each incoming message to the user's permanent mailbox, and a POP3 server to allow a user to extract messages from the mailbox and delete them. To ensure correct operation, it is required that the two servers coordinate when using the mailbox; so that if a message arrives via SMTP while a user is extracting messages via POP3, the mailbox is left in a valid state. POP3 uses the port 110 and the port 995 when connecting securely.
The Internet and TCP/IP
Published in Goff Hill, The Cable and Telecommunications Professionals' Reference, 2012
Application layer protocols form an interface between the network and the application software, so they are not the application software itself. Examples of application layer protocols include: File Transfer Protocol (FTP): This is used to transfer files between a host and a server.Telnet: This allows the user to log in and use a remote machine with a text interface, Simple Mail Transfer Protocol (SMTP), which transfers e-mails between mail servers, and from a host to its mail server.Post Office Protocol version 3 (POP3): This is used by a host to read e-mails on its mail server.Simple Network Management Protocol (SNMP): This facilitates the exchange of management information between network devices, enabling network administrators to manage network performance, find and solve network problems, and plan for network growth.Hypertext Transfer Protocol (HTTP): This is the standard Web transfer protocol, used for transferring Web pages written in HTML from the server to the host that requests them.Domain Name System (DNS): This translates domain names such as www.smithsuni.ac.uk into IP addresses such as 110.22.67.238. This avoids the user having to think in terms of IP addresses.
A Review on Evolution of Symmetric Key Block Ciphers and Their Applications
Published in IETE Journal of Education, 2020
In general, to secure network communication, Secure Socket Layer (SSL) and Transport Layer Security (TLS) [10] are used. The Internet Protocol Security (IPSec) protocol [5] uses standard cryptographic algorithms and it is standard way for secure data exchange at the network level. Mostly TCP/IP-based protocols [7,9] widely use TLS/SSL cryptographic security protocols implemented on OpenSSL library that includes “email (SMTPS/POP3), HTTPS, instant messaging (XMPP), FTPS, VoIP, and VPN” etc. SSL/TLS protocols allow the connection between two media (client–server) to be encrypted and it makes sure that no third party is able to read or modify the data.