History of POP

The Internet Engineering Task Force published the POP (post office protocol) in 1984. The backend developers wanted to simplify the layout, therefore it underwent two updates after that.

POP2, or the second version of POP, was created in 1985 and requires the SMTP protocol in order to push emails. Subsequently, the SMTP protocol was not necessary for POP3, or the third version of POP, which was published in 1988. POP 3, or Post Office Protocol, is also included in well-known email programmes like Outlook Express and Eudora. And the POP3 has been the current version ever since 1988.

POP Full Form

POP stands for Point of Presence (also known as Post Office Protocol)

It is a point where many devices share a connection and can communicate with each other. We can say that it is a man-made demarcation point (a point where the public network of a company ends and the private network of the customer begins for e.g. the point at which your broadband cable enters the house) between communicating entities. It basically consists of high-speed telecommunications equipment and technologies that help in bringing together people from all over the internet. Post Office Protocol is referred to as the POP protocol. SMTP is employed as a message transfer agent, as is well known. When a message is sent, SMPT is used to transfer it from the client to the server and ultimately to the server of the recipient. However, the Message Access Agent facilitates the transmission of the message from the receiving server to the host server. POP3 and IMAP are the two types of protocols that are included in the Message Access Agent.
 

An example of this would be the local access point that connects customers via their internet service provider (ISP) to the rest of the world. The size of an ISP can be calculated by seeing the number of POPs that the service provider has. The normal houses routers, modems, servers, switches, and other such devices that have to share data over networks all use POPs. Internet Service Providers have multiple POPs. 

Similar Reads

Characteristics of POP

Post Office Protocol is an open protocol, defined by Internet RFCs. It allows access to new mail from a spread of client platform types. POP can handle email access only while the emails are sent by SMTP....

Figure – Post Office Protocol (POP)

History of POP...

History of POP

The Internet Engineering Task Force published the POP (post office protocol) in 1984. The backend developers wanted to simplify the layout, therefore it underwent two updates after that....

Working

Until the user logs in using an email client and downloads the message to their computer, all incoming messages are kept on the POP server. The message is removed from the server once it has been downloaded by the user....

Advantages

The latest version of Post Office Protocol (POP3) is the most widely used protocol and is being supported by most email clients. It provides a convenient and standard way for users to access mailboxes and download messages. An important advantage of this is that the mail messages get delivered to the client’s PC and they can be read with or without accessing the web. POP3 has two modes: In Delete mode, the mail is deleted from the mailbox after each retrieval, in the keep mode, the mail remains in the mailbox after retrieval . The Delete mode is normally used when the user is working on a permanent computer and can save and organize the received mail after reading or replying. The keep mode is normally used when the user accesses mail away from the primary computer(eg, laptop). The mail is read but kept in the system for later retrieval and organization.  The creation of the latest messages is impossible without being logged onto the web All messages get stored on the disc drive of your computer Easy to use and configure. There isn’t any maximum size on your mailbox, except as determined by the scale of your disc drive...

Disadvantages

Consumes large memory as all the messages are stored on the disc drive Opening attachments may be a fast process unless the attachment contains a virus Since all attachments get downloaded on your computer, there’s a danger of a virus attack if they’re not scanned by antivirus software  as these scans are only 60% effective Emails cannot be opened by other machines unless they are configured to do so. It is not easy to export a local mail folder to another physical machine or another mail client....

Commands Used in POP

There are basic commands used in Post Office Protocol, some of them are mention below:...

Frequently Asked Questions on POP

What is POP?...