Please Whitelist This Site?
I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)
If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.
If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.
Thanks for your understanding!
Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide
NOTE: Using software to mass-download the site degrades the server and is prohibited.
If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.
|| The TCP/IP Guide|
9 TCP/IP Application Layer Protocols, Services and Applications (OSI Layers 5, 6 and 7)
9 TCP/IP Key Applications and Application Protocols
9 TCP/IP File and Message Transfer Applications and Protocols (FTP, TFTP, Electronic Mail, USENET, HTTP/WWW, Gopher)
9 TCP/IP Electronic Mail System: Concepts and Protocols (RFC 822, MIME, SMTP, POP3, IMAP)
9 TCP/IP Electronic Mail Access and Retrieval Protocols and Methods
9 TCP/IP Internet Message Access Protocol (IMAP/IMAP4)
IMAP Commands, Results and Responses
(Page 2 of 4)
IMAP commands are organized into
groups based on which session
states the IMAP session may be in when
they are used. These groups are:
- Any State Commands: A small
number of commands that can be used at any time during an IMAP session.
- Not Authenticated State Commands:
Commands that can be used only in the Not Authenticated state.
They are usually used for authentication, of course.
- Authenticated State Commands: These
commands are used to perform various actions on mailboxes. (Note that
despite the name, these commands can also be used in the Selected
- Selected State: A set of commands
for accessing and manipulating individual messages that can be used
only in the Selected state.
The reason for having the distinct
Authenticated and Selected states and command groups is
that IMAP is designed specifically to enable the manipulation of multiple
mailboxes. After the session starts and the client is authenticated,
the client is allowed to issue commands that work with entire mailboxes.
However, it may not issue commands that manipulate individual messages
until it tells the server which mailbox it wants to work with, which
puts it in the Selected state. The client can also issue mailbox
commands from the Selected state.
Note: In addition to these four groups, the standard also defines an extension mechanism that allows new commands to be defined. These must begin with the letter X.
|If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support!|
Table Of Contents - Contact Us
The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005
© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.