Java IoT Authors: Yeshim Deniz, Elizabeth White, Roger Strukhoff, Liz McMillan, Pat Romanski

Related Topics: Java IoT

Java IoT: Article

POP Goes the Server

POP Goes the Server

In our last column we addressed one of the most commonly asked questions regarding the sending of e-mail from within a Java applet or application. This was achieved using the SMTP protocol, and by the end of the article a fully functional SMTP class was constructed. Before we continue the development of our column project, Informer, I thought it would be a good idea to complete the e-mail service by presenting the other half of the equation: picking up mail from a mailbox. This article will concentrate on building a class that can be used to interrogate a POP3 mailbox.

If you read last month's column, you may have noticed how easy it was to communicate with the SMTP server. We opened up a socket connection to the server, and then passed commands back and forth using ASCII text strings, terminated in lines.

Well, the good news is that the majority of TCP servers operate in exactly the same way; that is, using ASCII text strings to pass commands. This includes, mail servers, news servers and FTP servers. On the face of it, this doesn't seem to be the most efficient way to communicate with servers, and it isn't. But you have to look at the global picture to understand why it is implemented the way it is.

What's the one greatest strength of the Internet? And, what is the one biggest headache for software developers? The same answer can be applied to both questions: variety of platforms. The Internet is a collection of networks all communicating with one other without having to rely on a single operating system. TCP/IP is a way for a UNIX box to talk to an NT box without having to worry about its operating system. However, when asking a developer to write an application for both platforms, questions about byte and word size will be asked and invariably the answers will be different. One good thing about the computing world is that of all the different standards floating around, nearly every single machine knows of ASCII text. This makes it the ideal data transport for communicating with servers.

POP3 Server
A POP (Post Office Protocol) server is a piece of software that collects and holds mail until a client comes and requests it. Taking the analogy presented last month one step further, a POP server can be thought of as your mailbox at the bottom of your garden. When someone mails you a letter, it is placed into the post office network where it is sorted and delivered, usually by a mail carrier, to your mailbox. It is not the responsibility of the post office to try to tell you how to read it or open it. It is merely a pigeonhole in which incoming mail can be placed and removed. A POP server is no different. It performs the exact same function: providing a holding area until you pick up your mail, using your e-mail package. How the mail actually gets to your mailbox, is of no real concern to you. all you need to worry about is how to pick up the mail once it has arrived.

As stated earlier the POP server sits and listens for connections on port 110 and, once connected, uses a series of commands to communicate with the client. The complete POP version 3 (sometimes referred to as POP3) protocol can be found in the RFC document 1225. You can read this document on the web site http://www.academy97.com. If you do read this specification, you may be surprised by how small it actually is (only 16 pages) with the majority of them showing examples.

Before we can begin to send commands, we must first open a connection to the server, and this can be achieved using the Socket class, as shown in Listing 1.

Just like the SMTP class we developed last month, we create two streams that will make communicating with the server much easier. For example the BufferedReader class gives us the method readLine(), which can be used to receive data back from the server without having to worry about carriage returns, etc.

If a connection is successful, the first line we will receive back is a welcome message which may read something like:

+OK mail.n-ary.com POP server ready; Sun, 21 Sep 1997 12:42:00 GMT

Whereas the SMTP host used status codes to indicate success or failure, the POP server uses +OK and -ERR to flag status values. This makes the receiving function at the client much easier to code.

The next thing we have to do is log on. We pass the username and password of the mailbox addressee and, if it is successful, +OK will be sent back as shown in Listing 2.

We have coded two special functions, sendMessage() and rxdLine(...), that perform some additional error checking. The source for both of these can be found in Listing 3.

Mail Headers
The POP3 server only supports a very small set of commands. We have commands to retrieve just the mail headers, the number of mail messages waiting, the complete mail message and commands to delete mail messages from the server.

Messages are queued at the server one after another, generally in the order in which they arrived. The POP server gives each message an ID starting at 1. Note, that this ID is only unique for that session. If you delete message 3, for instance, and then log off and log back on again, then the message that was ID 4, now has the ID of 3. So be very careful when coding e-mail clients.

One of the most basic things that is very useful, is the ability to see what mail is waiting for us without having to download the complete message. This is especially useful for clients on a dial-up connection, where they can choose whether to accept or not accept delivery of attachments. To achieve this we must first know the number of e-mails waiting for us, so that we can then count forward to that number. We do this by sending the command STAT to the server. The server will then return the result:

+OK 4 3210

The first part of the response is the status flag, and the second is the number of messages waiting in collection. The last value is the total size of all the messages, expressed in octets. This is particularly useful, as one can calculate a very accurate progress monitor for the download status.

Having received the number of messages, we then use the TOP command to download just the message headers. The TOP accepts two parameters: the message ID and a block number. For example, we can return the header for message 2, by issuing the command TOP 2 1' to the server. The server will then return with a mail header for that message, terminated with a single ".".

As you can see, if you refer to the getMailHdr() function in the Listing 3, the header consists of many different fields, of which Subject, Date and From are of particular interest to us. We package this information up into a class wMail and return.

Using this functionality, our e-mail client can display a list of all incoming mail without having to download each one.

Mail Transfer
The next step, is to actually download the complete e-mail. This is performed using the RETR command with the mail ID. For example, to receive the e-mail, complete with header and body, the following command would be issued to the server: RETR 2.'

Again, if you refer to Listing 3, and look at the getMail(...) function, you will see this occurring. Notice how we determine the difference between the main body and the mail header. The mail header is transmitted first, with a blank line indicating the end of the header and the beginning of the main body. For ease of use, we place the body into a Vector, with each line of text as a new entry.

Mail Deletion
Deleting the message on the server, as you may have already guessed, is a simple matter of issuing the DELE command, complete with the message ID. The server will then return with a success or failure depending on whether or not the message exists.

That's it! That is the basic functionality required to implement a POP3 client. Listing 3 shows a couple of extra commands, but the core has been demonstrated in the main article body.

To see this class in action, I converted it into a Java Servlet, which allows you to check, read and delete your e-mail from a Web browser. Visit http://www.academy97.com/email_login.html.

So far, we have implemented a very basic front-end to Informer, complete with database access to a list of contacts. We also have the functionality to send e-mails and, with this article, the ability to receive e-mails as well.

Next month, we will be adding more features to Informer

More Stories By Alan Williamson

Alan Williamson is widely recognized as an early expert on Cloud Computing, he is Co-Founder of aw2.0 Ltd, a software company specializing in deploying software solutions within Cloud networks. Alan is a Sun Java Champion and creator of OpenBlueDragon (an open source Java CFML runtime engine). With many books, articles and speaking engagements under his belt, Alan likes to talk passionately about what can be done TODAY and not get caught up in the marketing hype of TOMORROW. Follow his blog, http://alan.blog-city.com/ or e-mail him at cloud(at)alanwilliamson.org.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
DXWorldEXPO LLC announced today that "Miami Blockchain Event by FinTechEXPO" has announced that its Call for Papers is now open. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expe...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...