SlideShare a Scribd company logo
POINT OF PREFERENCE
(POP)
MEGHA KUMARI
201810101120030
B.Sc.IT (5,1)
 Contents:
 Introduction of POP.
 Characteristics.
 Example.
 Working.
 Advantages.
 Disadvantages.
 Conclusion.
 Introduction of pop:
 POP stands for Point of Presence (also known as Post Office Protocol).
 It is a point where many devices share a connection and can communicate with each other. We can say that
it is a man-made demarcation point (a point where the public network of a company ends and the private
network of the customer begins for e.g. the point at which your broadband cable enters the house) between
communicating entities. It basically consists of high-speed telecommunications equipment and technologies
helps in bringing together people from all over the internet.
 An example of this would be the local access point that connects customers via their internet service
provider (ISP) to the rest of the world.
 The size of an ISP can be calculated by seeing the number of POPs that the service provider has. The
normal houses routers, modems, servers, switches, and other such devices that have to share data over
networks all use POPs. Internet Service Providers have multiple POPs.
 Characteristics:
• Post Office Protocol is an open protocol, defined by Internet RFCs.
• It allows access to new mail from a spread of client platform types.
• It supports download and delete functions even when offline.
• It requires no mail gateways due to its native nature.
• POP can handle email access only while the emails are sent by SMTP.
 RFC 918 got published in 1984 which defined the Post Office Protocol (POP). The explanation of why
POP came in the picture was to supply a neater way for a client computer to retrieve e-mail on an SMTP
(Simple Mail Transfer Protocol) server so that it can be used locally. POP Version 2 got published in
1985.
 It improvised the capabilities of POP by defining a far impressive set of commands further as replies.
RFC 1939 was published in 1996 and POP3 has not been improvised since that point.
 Example:
•Carrier hotels :
These buildings are extremely secure with size averaging around 54, 000
square feet. These hotels offer hardware and software installation, updation and
several other services.
•Meet-me rooms :
Meet-Me Rooms (MMRs) are small space inside carrier hotels, averaging
around 5, 000 square feet. These small rooms house interconnects networking
equipment owned by many telecommunication companies.
 Working:
POP’s working is based on its five important equipment which are:
1. Base stations – A central point of reference to an access point and bandwidth management to ensure
evenly distribution of the connection speed of the customer.
2. Client equipment – utilized by customers to link with the base stations
3. Network switches – Used for proper distribution
4. Routers – Provides multiple paths for the data to be shared in the network
5. Firewall – Used for securing the network from threats (internal and external)
 Advantages:
 The latest version of Post Office Protocol (POP3) is that the most widely used protocol and is being
supported by most of the email clients.
 It provides a convenient and standard way for users to access mailboxes and download messages. An
important advantage of this is that the mail messages get delivered to the client PC and they can be read
with or without accessing the web.
 More advantages are:
• Creation of latest messages impossible without being logged onto the web
• All messages get stored on the disc drive of your computer
• As the attachments are already on your PC, opening them may be a quicker process
• There isn’t any maximum size on your mailbox, except as determined by the scale of your disc drive
 Disadvantages:
• Consumes large memory as all the messages are stored on the disc drive
• Opening attachments may be a fast process unless the attachment contains a virus
• Since all attachments get downloaded on your computer, there’s a danger of virus attack if they’re not
scanned by antivirus softwares as these scans are only 60% effective
• Email folders can become corrupted and might even drift.
 conclusion:
 Related with the conventional style. This approach is also known as the top-
down approach. In this approach, a program is divided into functions that
perform specific tasks. This approach is mainly used for medium-sized
applications. Data is global, and all the functions can access global data. The
basic drawback of the procedural programming approach is that data is not
secured because data is global and can be accessed by any function. Program
control flow is achieved through function calls and go to statements.
Thank you

More Related Content

What's hot

M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
Dr.Florence Dayana
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Osama Ghandour Geris
 
IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado
Mark John Lado, MIT
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
Raymond Douglas
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
Prof. Dr. K. Adisesha
 
Presentation5
Presentation5Presentation5
Presentation5
Mohd Yusak
 
Ie20303week1
Ie20303week1Ie20303week1
Ie20303week1
Mohd Yusak
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
victor okoth
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utility
tumetr1
 
Computer Hardware, Software and Firmware
Computer Hardware, Software and FirmwareComputer Hardware, Software and Firmware
Computer Hardware, Software and Firmware
City University, Dhaka, Bangladesh
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
Mark John Lado, MIT
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Nicholas Riungu
 
E-Commerce 11
E-Commerce 11E-Commerce 11
E-Commerce 11
Zarrar Siddiqui
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
tumetr1
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
zanetorserwaah
 
Networks
NetworksNetworks
Networks
Edward Blurock
 
Email
EmailEmail
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
Basma Gamal
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
Osama Yousaf
 
NGN Brochure May 2014
NGN Brochure May 2014NGN Brochure May 2014
NGN Brochure May 2014
Thembelihle Nxumalo
 

What's hot (20)

M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado IT infrastructure and network technologies by Mark John Lado
IT infrastructure and network technologies by Mark John Lado
 
Peer to peer
Peer to peerPeer to peer
Peer to peer
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Presentation5
Presentation5Presentation5
Presentation5
 
Ie20303week1
Ie20303week1Ie20303week1
Ie20303week1
 
Project: Designing a Secure Network
Project: Designing a Secure NetworkProject: Designing a Secure Network
Project: Designing a Secure Network
 
connectivity utility
connectivity utilityconnectivity utility
connectivity utility
 
Computer Hardware, Software and Firmware
Computer Hardware, Software and FirmwareComputer Hardware, Software and Firmware
Computer Hardware, Software and Firmware
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
E-Commerce 11
E-Commerce 11E-Commerce 11
E-Commerce 11
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
 
Networks
NetworksNetworks
Networks
 
Email
EmailEmail
Email
 
Introduction to computer networks
Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 
NGN Brochure May 2014
NGN Brochure May 2014NGN Brochure May 2014
NGN Brochure May 2014
 

Similar to Point of preference (POP)

Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
Janani Ramasamy
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
Serious_SamSoul
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
Serious_SamSoul
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
lime17
 
Kai
KaiKai
Protocols and its standards
Protocols and its standardsProtocols and its standards
Protocols and its standards
Bathshebaparimala
 
this is a power point presentation on chat application
this is a power point presentation on chat applicationthis is a power point presentation on chat application
this is a power point presentation on chat application
mdprince1262
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
Abhishek Kesharwani
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Anish Thomas
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
shankars73
 
it ppt-2.pptx
it ppt-2.pptxit ppt-2.pptx
it ppt-2.pptx
RitikaSharma10949
 
Mcse question
Mcse questionMcse question
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
AdiseshaK
 
Akki
AkkiAkki
Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a company
rosu555
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
francesco1993
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
jajinekkanti
 
client server protocol
client server protocolclient server protocol
client server protocol
bmuhire
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
Lakeisha Jones
 
PeerToPeerComputing (1)
PeerToPeerComputing (1)PeerToPeerComputing (1)
PeerToPeerComputing (1)
MurtazaB
 

Similar to Point of preference (POP) (20)

Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
 
Kai
KaiKai
Kai
 
Protocols and its standards
Protocols and its standardsProtocols and its standards
Protocols and its standards
 
this is a power point presentation on chat application
this is a power point presentation on chat applicationthis is a power point presentation on chat application
this is a power point presentation on chat application
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
it ppt-2.pptx
it ppt-2.pptxit ppt-2.pptx
it ppt-2.pptx
 
Mcse question
Mcse questionMcse question
Mcse question
 
DCN notes adi
DCN notes adiDCN notes adi
DCN notes adi
 
Akki
AkkiAkki
Akki
 
Network Design for a company
Network Design for a companyNetwork Design for a company
Network Design for a company
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
 
Slides for protocol layering and network applications
Slides for protocol layering and network applicationsSlides for protocol layering and network applications
Slides for protocol layering and network applications
 
client server protocol
client server protocolclient server protocol
client server protocol
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
PeerToPeerComputing (1)
PeerToPeerComputing (1)PeerToPeerComputing (1)
PeerToPeerComputing (1)
 

Recently uploaded

哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 

Recently uploaded (20)

哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 

Point of preference (POP)

  • 1. POINT OF PREFERENCE (POP) MEGHA KUMARI 201810101120030 B.Sc.IT (5,1)
  • 2.  Contents:  Introduction of POP.  Characteristics.  Example.  Working.  Advantages.  Disadvantages.  Conclusion.
  • 3.  Introduction of pop:  POP stands for Point of Presence (also known as Post Office Protocol).  It is a point where many devices share a connection and can communicate with each other. We can say that it is a man-made demarcation point (a point where the public network of a company ends and the private network of the customer begins for e.g. the point at which your broadband cable enters the house) between communicating entities. It basically consists of high-speed telecommunications equipment and technologies helps in bringing together people from all over the internet.  An example of this would be the local access point that connects customers via their internet service provider (ISP) to the rest of the world.  The size of an ISP can be calculated by seeing the number of POPs that the service provider has. The normal houses routers, modems, servers, switches, and other such devices that have to share data over networks all use POPs. Internet Service Providers have multiple POPs.
  • 4.  Characteristics: • Post Office Protocol is an open protocol, defined by Internet RFCs. • It allows access to new mail from a spread of client platform types. • It supports download and delete functions even when offline. • It requires no mail gateways due to its native nature. • POP can handle email access only while the emails are sent by SMTP.  RFC 918 got published in 1984 which defined the Post Office Protocol (POP). The explanation of why POP came in the picture was to supply a neater way for a client computer to retrieve e-mail on an SMTP (Simple Mail Transfer Protocol) server so that it can be used locally. POP Version 2 got published in 1985.  It improvised the capabilities of POP by defining a far impressive set of commands further as replies. RFC 1939 was published in 1996 and POP3 has not been improvised since that point.
  • 5.  Example: •Carrier hotels : These buildings are extremely secure with size averaging around 54, 000 square feet. These hotels offer hardware and software installation, updation and several other services. •Meet-me rooms : Meet-Me Rooms (MMRs) are small space inside carrier hotels, averaging around 5, 000 square feet. These small rooms house interconnects networking equipment owned by many telecommunication companies.
  • 6.  Working: POP’s working is based on its five important equipment which are: 1. Base stations – A central point of reference to an access point and bandwidth management to ensure evenly distribution of the connection speed of the customer. 2. Client equipment – utilized by customers to link with the base stations 3. Network switches – Used for proper distribution 4. Routers – Provides multiple paths for the data to be shared in the network 5. Firewall – Used for securing the network from threats (internal and external)
  • 7.  Advantages:  The latest version of Post Office Protocol (POP3) is that the most widely used protocol and is being supported by most of the email clients.  It provides a convenient and standard way for users to access mailboxes and download messages. An important advantage of this is that the mail messages get delivered to the client PC and they can be read with or without accessing the web.  More advantages are: • Creation of latest messages impossible without being logged onto the web • All messages get stored on the disc drive of your computer • As the attachments are already on your PC, opening them may be a quicker process • There isn’t any maximum size on your mailbox, except as determined by the scale of your disc drive
  • 8.  Disadvantages: • Consumes large memory as all the messages are stored on the disc drive • Opening attachments may be a fast process unless the attachment contains a virus • Since all attachments get downloaded on your computer, there’s a danger of virus attack if they’re not scanned by antivirus softwares as these scans are only 60% effective • Email folders can become corrupted and might even drift.
  • 9.  conclusion:  Related with the conventional style. This approach is also known as the top- down approach. In this approach, a program is divided into functions that perform specific tasks. This approach is mainly used for medium-sized applications. Data is global, and all the functions can access global data. The basic drawback of the procedural programming approach is that data is not secured because data is global and can be accessed by any function. Program control flow is achieved through function calls and go to statements.