EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 2, Problem P17P

a)

Program Plan Intro

UIDL POP3 Command:

UIDL stands for Unique-Id Listing.

  • The fact that optional UIDL command is supported is indicated by the UIDL capability.
  • A unique number to each incoming mail message are assigned by POP3 servers.
  • When a POP3 client issues the UIDL command, the server responds with the unique message ID in mailbox.
  • The UIDL POP3 Command is used for “download and keep”, which allows mail to be left on the server after it has been downloaded to the user. Both the mail client and the POP server must support this feature.
  • The client can use the UIDL command to determine which messages on the server has already been seen by maintaining a file that lists the messages received during earlier sessions.

Given transaction:

Suppose one has configured their POP mail client to operate in the download-and-delete mode. The transaction is given as below:

C: list (client asks server to list the size of each of the stored messages)

S: 1 498 (Server lists the size of message 1)

S: 2 912 (Server lists the size of message 2)

S: .

C: retr 1 (Client requests to read message 1)

S: blah blah …  (Sends message 1)

S: ………blah

S: .

b)

Program Plan Intro

UIDL POP3 Command:

UIDL stands for Unique-Id Listing.

  • The fact that optional UIDL command is supported is indicated by the UIDL capability.
  • A unique number to each incoming mail message are assigned by POP3 servers.
  • When a POP3 client issues the UIDL command, the server responds with the unique message ID in mailbox.
  • The UIDL POP3 Command is used for “download and keep”, which allows mail to be left on the server after it has been downloaded to the user. Both the mail client and the POP server must support this feature.
  • The client can use the UIDL command to determine which messages on the server has already been seen by maintaining a file that lists the messages received during earlier sessions.

Given transaction:

Suppose one has configured their POP mail client to operate in the download-and-keep mode. The transaction is given as below:

C: list (client asks server to list the size of each of the stored messages)

S: 1 498 (Server lists the size of message 1)

S: 2 912 (Server lists the size of message 2)

S: .

C: retr 1 (Client requests to read message 1)

S: blah blah …  (Sends message 1)

S: ………blah

S: .

c)

Program Plan Intro

UIDL POP3 Command:

UIDL stands for Unique-Id Listing.

  • The fact that optional UIDL command is supported is indicated by the UIDL capability.
  • A unique number to each incoming mail message are assigned by POP3 servers.
  • When a POP3 client issues the UIDL command, the server responds with the unique message ID in mailbox.
  • The UIDL POP3 Command is used for “download and keep”, which allows mail to be left on the server after it has been downloaded to the user. Both the mail client and the POP server must support this feature.
  • The client can use the UIDL command to determine which messages on the server has already been seen by maintaining a file that lists the messages received during earlier sessions.

Given transaction:

Suppose one configured the POP mail client to operate in the download-and-keep mode. Then using the transcript in part b, suppose one retrieves messages 1 and 2, exit POP, and then five minutes later can again access POP to retrieve new e-mail. The given transaction is:

C: list (client asks server to list the size of each of the stored messages)

S: 1 498 (Server lists the size of message 1)

S: 2 912 (Server lists the size of message 2)

S: .

C: retr 1 (Client requests to read message 1)

S: blah blah …  (Sends message 1)

S: ………blah

S: .

C: retr 2

S: blah blah …

S: ………..blah

S: .

C: quit

S: +OK POP3 server signing off

Blurred answer
Students have asked these similar questions
Consider accessing your e-mail with POP3. Suppose you have configured your mail client to operate in the 'download-and-delete' mode. When the client (C) fetches all emails from the server (S), the sequence of messages exchanged starts as follows. C: list S: 1 498 S: 2 912 S: C: retr 1 S: blah blah S: How many messages does the server store for the client? blah It cannot be known 912 498 None of the mentioned
The Kerberos Authentication Server might reject an AS_REQ message and instead require pre-authentication - that is, it requires the client to send a timestamp encrypted with the client key. Why does it do this? Select one: a. It must not disclose the Ticket Granting Ticket before the client has authenticated b. It is dangerous to respond to an AS_REQ message before the client has authenticated c. Responding to multiple AS_REQ messages would allow a guessed plaintext attack d. It needs the client's public key to check the pre-authentication message was signed correctly
Kerberos is a protocol that is based around Needham-Schroeder protocol for many to many authentications. Now answer the following questions. (Use necessary diagrams to justify your answers) i) Explain why the password of the user is not sent over the network and instead session keys are generated and shared in the Kerberos protocol. ii) The information in a TGT (Ticket Granting Ticket) is encrypted so the client cannot access the information in the TGT. However, all information in the ticket is already known to the client. Why is it still necessary to encrypt it? iii) Describe the working mechanism of how a ticket is generated between the client and server by the TGS (Ticket Granting Server) and how it is used for client-server communication.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education