Understanding TCP/IP: PC Network Advisor
Understanding TCP/IP: PC Network Advisor
Understanding TCP/IP
We conclude our four-part article looking in depth at the TCP/IP protocol.
Here, we examine the difference between the SMTP and POP3 email protocols.
By Julian Moss
File: C04100.14
PC Network Advisor Issue 93 (March 1998) Page 16
Connectivity:Overview
TCP/IP
Conclusion
The command “LIST” can be used The command must include a message In this article it has only been possi-
to determine the size of each message. number (mn). After an “+OK” ac- ble to give an overview of the most
After the “+OK” the server sends, on knowledgement the server sends the important protocols used on the In-
separate lines, the message numbers whole message. Again, the end of the ternet. The full specifications of these
(mn) and the message sizes (ms) sepa- message is indicated by a line contain- and other Internet protocols can be
rated by a space. Waiting messages are ing just a period. found in Requests For Comments
numbered sequentially, starting from (RFCs) published by the Network
1. The command “LIST mn” can be Wiping Working Group. RFCs are freely avail-
used to find out the size of a specific able for download from the Internet.
message. The LIST command is typi- The command “DELE mn” is used Anyone interested in finding out more
cally used by mail clients that imple- to delete a message. In fact, the DELE about TCP/IP, and particularly in im-
ment a user-defined restriction on the command only marks messages for de- plementing their own TCP/IP applica-
size of messages that will be down- letion. Any messages marked for dele- tions, should obtain and study the
loaded, or those that want to display a tion during a session may be undeleted RFCs for the protocols concerned.
progress indicator that shows how by issuing an “RSET” command. The However, even if you never have to
much of each message has been down- messages are only deleted once the cli- write your own Internet software it is
loaded. ent has closed the POP3 session by hoped that this article has piqued your
POP3 provides no commands that issuing a “QUIT” command. If a client interest, and contributed to a better un-
enable a client to find out the subject of never gets to close a session properly derstanding of how TCP/IP and the
a message or who it is from. However, because the connection is lost or timed Internet really work.
the TOP command lets the client out then you may find some messages
download a message’s headers and a being downloaded again the next time
specified number of lines from the you connect to the server.
message body, from which this infor- In order to avoid downloading mes-
mation may be obtained. TOP is an sages twice, a POP3 client can use the
optional POP3 command but its imple- command “UIDL” or “UIDL mn” to
mentation is strongly recommended. obtain unique, server-generated IDs
The format of the command is “TOP for each message. By storing the UIDLs
mn nl” where mn is the message of downloaded messages in a file, a
number and nl the number of lines client can easily determine whether a
PCNA
required. The response is “+OK” (if mn message on the server has been pre-
is valid) followed by a partial down- viously retrieved or not.
load of the message. The end of the Implementation of the UIDL com-
download is indicated by a line con- mand is optional, but most POP3 serv-
taining a single period (full stop). ers seem to support it and most mail
Some spam filtering software - clients use it.
which kills unwanted messages with-
out downloading them - uses the TOP Benefits
command to determine whether a
message meets the criteria for being SMTP and POP3 are two of the most
killed or not. However, the time taken commonly-used Internet protocols, The Author
to get this information for every mes- which is why we have devoted this Julian Moss is a freelance writer
sage may exceed the time it would article to looking at them in some de- and software developer with ex-
have taken simply to download the tail. Their text-based nature, which perience of developing TCP/IP
spam and delete it later. makes it possible to send and receive client software. He can be con-
The command “RETR mn” is used messages by communicating with a tacted as [email protected].
to retrieve messages from the server. server interactively using a simple Tel-
File: C04100.16
PC Network Advisor Issue 93 (March 1998) Page 18
Additional Resources
• IPv6 Explained
• The OSI 7 Layer Model Explained
• Understanding Frame Relay
• Understanding DHCP
• Virtual Private Networking Explained
PCNA
PC Network Advisor
www.pcnetworkadvisor.com
Recent Reviews from Tech Support Alert