0% found this document useful (0 votes)
36 views

Network Mhabad

This document is a report on the POP protocol written by Mhabad Jamal MohammedHassan for a computer networks course. It provides an introduction to POP (Point of Presence/Post Office Protocol), outlines its history and development, describes how POP works by connecting base stations, client equipment, network switches and routers, and lists some key characteristics, advantages and disadvantages of the POP protocol.

Uploaded by

Laween Mohammed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Network Mhabad

This document is a report on the POP protocol written by Mhabad Jamal MohammedHassan for a computer networks course. It provides an introduction to POP (Point of Presence/Post Office Protocol), outlines its history and development, describes how POP works by connecting base stations, client equipment, network switches and routers, and lists some key characteristics, advantages and disadvantages of the POP protocol.

Uploaded by

Laween Mohammed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Duhok Polytechnic University

Shekhan / Technical Institute


Is Department

2022-2021

Prepared By : Mhabad Jamal MohammedHassan

Stage : First / Second Semester

Subject : Computer Network

Report Title: Pop Protocol

Supervised by : Mr. Ali Shakir

Date : 2022/4/9
 Contents ……

 Introduction …… 3

 History Of POP …… 4

 POP Work …… 4

 Characteristics of POP …… 5

 Advantages Of POP …… 6

 Disadvantage Of POP …… 6

 Resources …… 7

2
 Introduction
POP stands for Point of Presence (also known as Post Office
Protocol).
It is a point where many devices share a connection and can
communicate with each other. We can say that it is a man-
made demarcation point (a point where the public network of a
company ends and the private network of the customer begins
for eg. the point at which your broadband cable enters the
house) between communicating entities. It basically consists of
high-speed telecommunications equipment and technologies
helps in bringing together people from all over the internet.

3
 History of POP
The POP(post office protocol) was published in 1984 by
Internet Engineering Task Force. After that, it has been updated
two times, because the backend developers want to make the
layout simple.
The second version of POP was developed in 1985 and known
as POP2 and this version needs the SMTP protocol in order to
push the emails.
Then after the third version of POP was released in 1988 and
known as POP3, this version does not require the SMTP
protocol. The POP (Post office protocol version 3) is also
integrated into famous e-mail software, like Eudora and
Outlook Express.
And since then(1988) the POP3 is the active version.

 POP Work
POP’s working is based on its five important equipment which
are:

1. Base stations – A central point of reference to an access


point and bandwidth management to ensure evenly
distribution of the connection speed of the customer.

2. Client equipment – utilized by customers to link with the


base stations

4
3. Network switches – Used for proper distribution

4. Routers – Provides multiple paths for the data to be shared


in the network

5. Firewall – Used for securing the network from threats


(internal and external)

 Characteristics of POP :

 Post Office Protocol is an open protocol, defined by Internet


RFCs.

 It allows access to new mail from a spread of client platform


types.

 It supports download and delete functions even when


offline.

 It requires no mail gateways due to its native nature.

 POP can handle email access only while the emails are sent
by SMTP.

5
 Advantages of POP

 This protocol does not require any internet connection in order


to access the downloaded emails.
 In order to receive emails on a single device, POP3 is very
useful.
 The Configuration of this protocol is simple and it is easy to
use.
 Less storage space is needed in order to store emails on the hard
disk.
 This protocol is much better for the ones who hardly check their
email on any other computer.

 Disadvantages of POP

 Email cannot be accessed from another computer (unless


configured to do so).
 It can be difficult for a user to export a local mail folder.
 Entire folders of emails can be corrupted, possibly causing you
to lose an entire mailbox at once.
 Email attachments can contain viruses that can cause great harm
to your PC if they are opened and sometimes virus scanners are
unable to detect them.

6
 Recourses …..

https://www.geeksforgeeks.org/pop-full-form/?ref=lbp

https://www.studytonight.com/computer-networks/pop-protocol

https://edifyclue.in/pop3-post-office-protocol/#What_is_POP

You might also like