Preview

Web Based Email Case Study

Satisfactory Essays
Open Document
Open Document
290 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Web Based Email Case Study
Objective: Web-based email case study---gmail

Methodology:

Review topics covered in lecture hours, from textbook, reference books plus online research, to conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic: you are required to back up your findings with supporting evidence.

Guidelines:

1. Review full headers of a sample email message you received in your gmail account (create one if you don't have one already): starting upward from the line right on top of the email message body, identify all components, from the sender's info, hop-by-hop, to your inbox (the destination);

2. Outline the process when you enter an URL in your web browser to connect to http://gmail.com, ! which including but not limited to, how DNS works in the background to get you to the destination; how the HTTP url is directed to HTTPs prior to authentication taking place; how the 3-way handshake process played out in this case; OPTIONAL: roles of digit certificate(s) & cookies; security and privacy issues involved;

3. What happened immediately in the background after you enter your credentials; what info is encrypted; OPTIONAL: what authentication mechanism is behind gmail's sign-in process;

4. Based upon your understanding of the responsibilities of each layer in OSI model, give a high level description about, in the above received sample email message, what happened at both the sender and you as recipient ends, from layer to layer.

5. Roles of SMTP, IMAP, FTP(s), MIME, ENCODING or other technologies involved in composing, sending and receiving an email message, uploading or downloading an attachment; OPTIONAL: how antivirus works p! rior to downloading your

You May Also Find These Documents Helpful

  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Level 2 Use the OSI model to explain how an email message from you gets read by the recipient on his/her computer.…

    • 1636 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Lab 3.1 Review

    • 505 Words
    • 3 Pages

    The OSI model is not directly implemented in networking and often the distinction between the layers will blur in implementation. Why does it endure despite these issues? Use your textbook and Internet research to justify your answer.…

    • 505 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Labs 3.1-3.4

    • 1882 Words
    • 9 Pages

    1. Why would a three-layer model of communication that has the layers physical, network, and application be insufficient to adequately describe network communication?…

    • 1882 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    Chatp 8 Review Q's

    • 3439 Words
    • 14 Pages

    A Web server that handles e-mail coming in through the Internet must be compatible with the _____ Protocol.…

    • 3439 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Email: Electronic mail. An application in which the user can type text and attach other files to create the electronic equivalent of a postal letter, and send the email to another person using his or her email address.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210

    • 831 Words
    • 4 Pages

    Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…

    • 831 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    1. Explain the purpose of correctly receiving, checking and sorting mail and packages (both incoming and outgoing).…

    • 1620 Words
    • 7 Pages
    Good Essays
  • Good Essays

    10. The top and bottom layers of the OSI model are called the Application and Physical Layer…

    • 440 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    To encrypt a server, you would need to redirect all the incoming web traffic to…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ilm M3.30

    • 3522 Words
    • 15 Pages

    Once the email has been written and the recipients chosen, I will edit the message and ensure I have achieved all my aims in the content of the message. On occasion it may be appropriate to alter the tome of the writing (formal – informal) to aid the delivery, especially as this will be a non-verbal way of communicating. The message will them be sent via email to the recipients. (This is the action part of the above image). The recipients will receive this message when they are next at their computer and decode the message. The process of decoding the message will be open to may inferences and some of these are discussed below. We can add another step to this process in that for most communication in the business world…

    • 3522 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    SHA-1 encryption scheme was broken and was replaced with a third round version of itself.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    2nd post ko na tohh kasi meron nag delete ng thread kohh sa group na ito.,.sa mga nag request ito nah enjoy!!…

    • 166 Words
    • 1 Page
    Satisfactory Essays

Related Topics