Please Whitelist This Site?

I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)

If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.

If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.

Thanks for your understanding!

Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide


NOTE: Using software to mass-download the site degrades the server and is prohibited.
If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.

The Book is Here... and Now On Sale!

Searchable, convenient, complete TCP/IP information.
The TCP/IP Guide

Custom Search







Table Of Contents  The TCP/IP Guide
 9  TCP/IP Application Layer Protocols, Services and Applications (OSI Layers 5, 6 and 7)
      9  TCP/IP Key Applications and Application Protocols
           9  TCP/IP File and Message Transfer Applications and Protocols (FTP, TFTP, Electronic Mail, USENET, HTTP/WWW, Gopher)
                9  TCP/IP Electronic Mail System: Concepts and Protocols (RFC 822, MIME, SMTP, POP3, IMAP)
                     9  TCP/IP Electronic Mail Access and Retrieval Protocols and Methods
                          9  TCP/IP Internet Message Access Protocol (IMAP/IMAP4)

Previous Topic/Section
IMAP Not Authenticated State: User Authentication Process and Commands
Previous Page
Pages in Current Topic/Section
1
2
Next Page
IMAP Selected State: Message Manipulation Process and Commands
Next Topic/Section

IMAP Authenticated State: Mailbox Manipulation/Selection Process and Commands
(Page 2 of 2)

The SELECT and EXAMINE Commands

When either the SELECT or EXAMINE command is successfully issued, the server will return to the client a set of useful information about the mailbox, which can be used to guide commands issued from the Selected state. This information includes the following three mandatory responses:

  • <n> EXISTS: Tells the client the number of messages in the mailbox.

  • <n> RECENT: Tells the client the number of recently-arrived (new) messages.

  • FLAGS (<flag-list>): Tells the client which flags are supported in the mailbox. These include the following: “\Seen”, “\Answered”, “\Flagged” (marked for special attention), “\Deleted”, “\Draft” and “\Recent”. (The backslashes are part of the flag names.)

The reply from the server may also contain these optional replies:

  • UNSEEN <n>: The message number of the first unseen message.

  • PERMANENTFLAGS (<flag-list>): A list of flags (as for the FLAGS response above) that the client is allowed to change.

  • UIDNEXT <n>: The next unique identifier value. This is used to check for changes made to the mailbox since the client last accessed it.

  • UIDVALIDITY <n>: The unique identifier validity value, used to confirm valid UID values.

Key Concept: In the Authenticated state, the IMAP client can perform operations on whole mailboxes, such as creating, renaming or deleting mailboxes, or listing mailbox contents. The SELECT and EXAMINE commands are used to tell the IMAP server which mailbox the client wants to open for message-specific access. Successful execution of either command causes the server to provide the client with several pieces of important information about the mailbox, after which the session transitions to the Selected state.



Previous Topic/Section
IMAP Not Authenticated State: User Authentication Process and Commands
Previous Page
Pages in Current Topic/Section
1
2
Next Page
IMAP Selected State: Message Manipulation Process and Commands
Next Topic/Section

If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005

© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.