SlideShare a Scribd company logo
IMAP
Prepared By.
Pabari Shashikant
Pambhar Vishal
INTRODUCTION
 Internet Message Access Protocol(IMAP) for e-mail retrieval and storage developed by
Mark Crispin in 1986 at Stand ford University as an alternative to POP(Post Office Protocol).
 IMAP unlike POP, specifically allows multiple clients simultaneously connected to the same
mailbox, and through flags stored on the server, different clients accessing the same
mailbox at the same or different times can detect state changes made by other clients.
 The IMAP was previously known as INTERACTIVE or INTERIM mail access protocol
implemented as a Xerox list machine and tops-20 server.
DEFINATION
The Internet Message Access Protocol is an Application Layer Internet protocol
that allows an e-mail client to access e-mail on a remote mail server.
IMAP is a standard protocol for accessing e-mail from your local server.
IMAP is client server protocol in which e-mail is received and held for you by
your internet server.
POP DRAWBACKS
-Single Computer and Client.
-Despite the "leave-mail-on-server" enhancements of newer POP servers and
clients, POP is primarily designed for use with a single email client on a single
computer.
-When implemented, the "leave-mai on server"feature forces the
downloading of the same emails multiple times, eating bandwidth, server
resources and client disk space on multiple machines.
Problem solved using IMAP
protocol
- The use of imap protocol You can also create and manipulate multiple
folders or mailboxes on the server, delete messages, or search for certain parts
or an entire note.
-IMAP requires continual access to the server during the time that you are
working with your mail.
IMAP was designed for users to stay connected to one or more email servers
while reading, creating and organizing messages.
 Users can manipulate both mail and mailboxes on the server side. Mailboxes can be
added, nested,renamed, moved and deleted; they can be for private and public
access.
While IMAP email is stored on the server, messages can also be cached on a local
machine for offline use.
-Deleting the cached messages does not delete the messages on the server.
-IMAP can potentially save bandwidth by downloading just the headers (To, From,Subject) of
emails without transferring the message or any attachments to the client.
IMAP ILLUSTRATION
John’s home computer John’s office computer
Mail server (SMTP/IMAP)
IMAP link
IMAP linkIncoming/
Outgoing emails
John
inbox
Advantages Over POP
 Connected and disconnected modes of operation
 Multiple clients simultaneously connected to the same mailbox
 Access to MIME message parts and partial fetch
 Message state information
 Multiple mailboxes on the server
 Server-side searches
 Built-in extension mechanism
Connected and disconnected modes of
operation
 When using POP, clients typically connect to the e-mail server briefly, only
as long as it takes to download new messages.
 When using IMAP4, clients often stay connected as long as the user
interface is active and download message content on demand.
 For users with many or large messages, this IMAP4 usage pattern can result
in faster response times.
Multiple clients simultaneously
connected to the same mailbox
 The POP protocol requires the currently connected client to be the only
client connected to the mailbox.
 In contrast, the IMAP protocol specifically allows simultaneous access by
multiple clients and provides mechanisms for clients to detect changes
made to the mailbox by other, concurrently connected, clients.
Access to MIME message parts and partial
fetch
 These mechanisms allow clients to retrieve the text portion of a message
without retrieving attached files or to stream content as it is being fetched.
Message state information
 Through the use of flags defined in the IMAP4 protocol, clients can keep
track of message state: for example, whether or not the message has been
read, replied to, or deleted. These flags are stored on the server, so
different clients accessing the same mailbox at different times can detect
state changes made by other clients.
 The IMAP4 protocol supports both predefined system flags and client-
defined keywords. System flags indicate state information such as whether
a message has been read. Keywords, which are not supported by all IMAP
servers, allow messages to be given one or more tags whose meaning is up
to the client.
Multiple mailboxes on the server
 IMAP4 clients can create, rename, and/or delete mailboxes (usually
presented to the user as folders) on the server, and copy messages
between mailboxes.
 Multiple mailbox support also allows servers to provide access to shared
and public folders.
 The IMAP4 Access Control List (ACL) Extension (RFC 4314) may be used to
regulate access rights.
Server-side searches
 IMAP4 provides a mechanism for a client to ask the server to search for messages meeting
a variety of criteria. This mechanism avoids requiring clients to download every message
in the mailbox in order to perform these searches.
Built-in extension mechanism
 Reflecting the experience of earlier Internet protocols, IMAP4 defines an explicit
mechanism by which it may be extended.
 IMAP4 extensions to the base protocol have been proposed and are in common use.
IMAP2bis did not have an extension mechanism, and POP now has one defined by RFC
2449.
Imap(internet massege access protocaols)

More Related Content

What's hot

E mail protocols
E mail protocolsE mail protocols
E mail protocols
Archana Dwivedi
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
Vidhu Arora
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
Anagha Ghotkar
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
Parameswaran Selvakumar
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
Smriti Rastogi
 
Smtp protocol
Smtp protocolSmtp protocol
Smtp protocol
alibefkani
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
Umme Jamal
 
Dhcp
DhcpDhcp
What is Ping
What is PingWhat is Ping
What is Ping
Disha Dudhal
 

What's hot (20)

5. icmp
5. icmp5. icmp
5. icmp
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
 
Mail server
Mail serverMail server
Mail server
 
Mail server
Mail serverMail server
Mail server
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
How e mail works
How e mail worksHow e mail works
How e mail works
 
Smtp
SmtpSmtp
Smtp
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Email security
Email securityEmail security
Email security
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Smtp protocol
Smtp protocolSmtp protocol
Smtp protocol
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
 
Dhcp
DhcpDhcp
Dhcp
 
What is Ping
What is PingWhat is Ping
What is Ping
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 

Similar to Imap(internet massege access protocaols)

CFIMAP & CFPOP
CFIMAP & CFPOPCFIMAP & CFPOP
CFIMAP & CFPOP
isummation
 
how email works
how email workshow email works
how email works
harikaveeravalli
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
tumetr1
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
Deepraj Bhujel
 
Electronic Mail.ppt
Electronic Mail.pptElectronic Mail.ppt
Electronic Mail.ppt
MRMATHSACADEMY1
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Internet mail server
Internet mail server Internet mail server
Internet mail server
Akasha Kumar Das
 
Protocols and its standards
Protocols and its standardsProtocols and its standards
Protocols and its standards
Bathshebaparimala
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
Serious_SamSoul
 
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing serverFinal year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
sachin993
 
VARRICH.docx
VARRICH.docxVARRICH.docx
VARRICH.docx
Rabyte itsolutions
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
anwarkade1
 
Online Assignment
Online AssignmentOnline Assignment
Online Assignment
subhamanu1990
 
Email
EmailEmail
Spam Filter
Spam FilterSpam Filter
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
YouTubeCONTRA
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
JAIGANESH SEKAR
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTP
Md Syed Ahamad
 

Similar to Imap(internet massege access protocaols) (20)

CFIMAP & CFPOP
CFIMAP & CFPOPCFIMAP & CFPOP
CFIMAP & CFPOP
 
how email works
how email workshow email works
how email works
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Smtp
SmtpSmtp
Smtp
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Electronic Mail.ppt
Electronic Mail.pptElectronic Mail.ppt
Electronic Mail.ppt
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Internet mail server
Internet mail server Internet mail server
Internet mail server
 
Protocols and its standards
Protocols and its standardsProtocols and its standards
Protocols and its standards
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing serverFinal year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
 
VARRICH.docx
VARRICH.docxVARRICH.docx
VARRICH.docx
 
Email
EmailEmail
Email
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
Online Assignment
Online AssignmentOnline Assignment
Online Assignment
 
Email
EmailEmail
Email
 
Spam Filter
Spam FilterSpam Filter
Spam Filter
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTP
 

More from shashikant pabari

Remote spy(Real Time Spy)
Remote  spy(Real Time Spy)Remote  spy(Real Time Spy)
Remote spy(Real Time Spy)
shashikant pabari
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tables
shashikant pabari
 
Basic shortcut keys of computer or PC
Basic shortcut keys of computer or PCBasic shortcut keys of computer or PC
Basic shortcut keys of computer or PC
shashikant pabari
 
Basic concept of c++
Basic concept of c++Basic concept of c++
Basic concept of c++
shashikant pabari
 
Data representation
Data representationData representation
Data representation
shashikant pabari
 
Newton cotes integration method
Newton cotes integration  methodNewton cotes integration  method
Newton cotes integration method
shashikant pabari
 

More from shashikant pabari (6)

Remote spy(Real Time Spy)
Remote  spy(Real Time Spy)Remote  spy(Real Time Spy)
Remote spy(Real Time Spy)
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tables
 
Basic shortcut keys of computer or PC
Basic shortcut keys of computer or PCBasic shortcut keys of computer or PC
Basic shortcut keys of computer or PC
 
Basic concept of c++
Basic concept of c++Basic concept of c++
Basic concept of c++
 
Data representation
Data representationData representation
Data representation
 
Newton cotes integration method
Newton cotes integration  methodNewton cotes integration  method
Newton cotes integration method
 

Recently uploaded

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 

Recently uploaded (20)

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

Imap(internet massege access protocaols)

  • 2. INTRODUCTION  Internet Message Access Protocol(IMAP) for e-mail retrieval and storage developed by Mark Crispin in 1986 at Stand ford University as an alternative to POP(Post Office Protocol).  IMAP unlike POP, specifically allows multiple clients simultaneously connected to the same mailbox, and through flags stored on the server, different clients accessing the same mailbox at the same or different times can detect state changes made by other clients.  The IMAP was previously known as INTERACTIVE or INTERIM mail access protocol implemented as a Xerox list machine and tops-20 server.
  • 3. DEFINATION The Internet Message Access Protocol is an Application Layer Internet protocol that allows an e-mail client to access e-mail on a remote mail server. IMAP is a standard protocol for accessing e-mail from your local server. IMAP is client server protocol in which e-mail is received and held for you by your internet server.
  • 4. POP DRAWBACKS -Single Computer and Client. -Despite the "leave-mail-on-server" enhancements of newer POP servers and clients, POP is primarily designed for use with a single email client on a single computer. -When implemented, the "leave-mai on server"feature forces the downloading of the same emails multiple times, eating bandwidth, server resources and client disk space on multiple machines.
  • 5. Problem solved using IMAP protocol - The use of imap protocol You can also create and manipulate multiple folders or mailboxes on the server, delete messages, or search for certain parts or an entire note. -IMAP requires continual access to the server during the time that you are working with your mail. IMAP was designed for users to stay connected to one or more email servers while reading, creating and organizing messages.
  • 6.  Users can manipulate both mail and mailboxes on the server side. Mailboxes can be added, nested,renamed, moved and deleted; they can be for private and public access. While IMAP email is stored on the server, messages can also be cached on a local machine for offline use. -Deleting the cached messages does not delete the messages on the server. -IMAP can potentially save bandwidth by downloading just the headers (To, From,Subject) of emails without transferring the message or any attachments to the client.
  • 7. IMAP ILLUSTRATION John’s home computer John’s office computer Mail server (SMTP/IMAP) IMAP link IMAP linkIncoming/ Outgoing emails John inbox
  • 8. Advantages Over POP  Connected and disconnected modes of operation  Multiple clients simultaneously connected to the same mailbox  Access to MIME message parts and partial fetch  Message state information  Multiple mailboxes on the server  Server-side searches  Built-in extension mechanism
  • 9. Connected and disconnected modes of operation  When using POP, clients typically connect to the e-mail server briefly, only as long as it takes to download new messages.  When using IMAP4, clients often stay connected as long as the user interface is active and download message content on demand.  For users with many or large messages, this IMAP4 usage pattern can result in faster response times.
  • 10. Multiple clients simultaneously connected to the same mailbox  The POP protocol requires the currently connected client to be the only client connected to the mailbox.  In contrast, the IMAP protocol specifically allows simultaneous access by multiple clients and provides mechanisms for clients to detect changes made to the mailbox by other, concurrently connected, clients.
  • 11. Access to MIME message parts and partial fetch  These mechanisms allow clients to retrieve the text portion of a message without retrieving attached files or to stream content as it is being fetched.
  • 12. Message state information  Through the use of flags defined in the IMAP4 protocol, clients can keep track of message state: for example, whether or not the message has been read, replied to, or deleted. These flags are stored on the server, so different clients accessing the same mailbox at different times can detect state changes made by other clients.  The IMAP4 protocol supports both predefined system flags and client- defined keywords. System flags indicate state information such as whether a message has been read. Keywords, which are not supported by all IMAP servers, allow messages to be given one or more tags whose meaning is up to the client.
  • 13. Multiple mailboxes on the server  IMAP4 clients can create, rename, and/or delete mailboxes (usually presented to the user as folders) on the server, and copy messages between mailboxes.  Multiple mailbox support also allows servers to provide access to shared and public folders.  The IMAP4 Access Control List (ACL) Extension (RFC 4314) may be used to regulate access rights.
  • 14. Server-side searches  IMAP4 provides a mechanism for a client to ask the server to search for messages meeting a variety of criteria. This mechanism avoids requiring clients to download every message in the mailbox in order to perform these searches. Built-in extension mechanism  Reflecting the experience of earlier Internet protocols, IMAP4 defines an explicit mechanism by which it may be extended.  IMAP4 extensions to the base protocol have been proposed and are in common use. IMAP2bis did not have an extension mechanism, and POP now has one defined by RFC 2449.