A comprehensive study about web-based email implementation

Assignment Help Computer Network Security
Reference no: EM13205 , Length: 8

A. Review full headers of a sample email message you received in your gmail account (create one if you don't have one already): starting upward from the line right on top of the email message body, identify all components, from the sender's info, hop-by-hop, to your inbox (the destination);

B. Outline the process when you enter an URL in your web browser to connect to gmail, which including but not limited to, how DNS works in the background to get you to the destination; how the HTTP url is directed to HTTPs prior to authentication taking place; how the 3-way handshake process played out in this case; OPTIONAL: roles of digit certificate(s) & cookies; security and privacy issues involved;

C. What happened immediately in the background after you enter your credentials; what info is encrypted; OPTIONAL: what authentication mechanism is behind gmail's sign-in process;

D. Based upon your understanding of the responsibilities of each layer in OSI model, give a high level description about, in the above received sample email message, what happened at both the sender and you as recipient ends, from layer to layer.

E. Roles of SMTP, IMAP, FTP(s), MIME, ENCODING or other technologies involved in composing, sending and receiving an email message, uploading or downloading an attachment; OPTIONAL: how a! ntivirus works prior to downloading your attachment;

A project report to present your findings, including support evidences (such as highlighted contents of packets captured, screen shots, diagrams and charts); along with plain English description; summarize with some conclusions in answering the above questions accordingly.

Reference no: EM13205

Questions Cloud

Method for estimating a venture''s value : Evaluate venture's present value, cash and surplus cash and basic venture capital.
Mathematics in computing : Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph
Power transformers and tariffs : Construction of different types of power transformer, significant energy savings
Implementation of algorithms for process management : The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.
A comprehensive study about web-based email implementation : Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.
Finite difference method : Use the finite difference method to calculate the temperature at the point specified since it is easier.
Edmonton tornado 1987 - canadian disaster assignment : Research and write a paper on a devastating catastrophe which has occurred in Canadian history.  In the paper, you must address the following questions: Topic: Edmonton tornado 1987
Cost accounting assignment : Evaluate Method of measuring costs associated with production, budgeting process, normal job-order costing system , master budget, cycle time.
Macroeconomics fourth canadian edition : Answer the following questions as these general questions pertain to the specific issue selected.The questions that you will cover with respect to your choice of broad social issue in the paper are given.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd