Explain the operation and handshake process

Assignment Help Computer Networking
Reference no: EM133008028

Task - Above and Beyond

As you are targeting above the pass grade, you will be expected to gain deeper understanding of the topics we cover in this unit, going above and beyond in your learning journey. For this credit task, you will be expected to demonstrate your deeper understanding of three modules (except Module 1) that you complete in this unit.

Task Requirement
Present evidence that you have been able to gain deeper understanding of the content we cover in three modules of the unit along with a summary and a reflection that indicate how you have demonstrated deeper understanding of the chosen modules.
You need to submit your summary, reflections & evidence to OnTrack.

Task Instruction
For this task, we want you to demonstrate that you have been able to use what you have learnt in the unit to extend your knowledge on the chosen topics. You can go above and beyond in completing more activities in addition to what you have completed in module exercises and active classes relevant to each module. In this task, you need to provide a summary, reflection, and evidence on your deeper understanding of the topics. The evidence can contain the additional activities and analyses you have done, and any other work that you produced. You can take screenshots of your analyses and simulations and include in here. If you have developed an application/ program (for example using Python), then please also provide the code along with the submission labelling the code. Please make sure to include a separate summary, reflection, and evidence for each module that you include in this task.

We provide hints for above and beyond tasks that you can complete in some activity sheets (designed for weekly active class). The following list shows two sample above and beyond tasks that you can complete for Module 2.

Module 2:
• Analysing TLS
o Open your web browser and clear the browser's cache. Open the Wireshark packet sniffer and start the packet capture
o Enter a URL with HTTPS in your browser.
o Stop packet capture and you can start analysing the packets. Explain the operation and handshake process of TLS using the screen captures of Wireshark.

o You need to clearly identify the message sequence and protocols used (including transport layer protocols) before your browser sends the first HTTP GET message to the relevant web server.

o Can you analyse HTTPS in Wireshark? Explain your answer. If yes, provide evidence on how we can do that. If not, is there any alternative method we could use to analyse HTTPS?

• E-mails (another popular application)
o What is the principal application layer protocol used in e-mails?
o What is the underlaying architecture and transport layer protocol used in e- mail application layer protocol?
o Can you list down the basic steps involve in sending an e-mail from user A to B?

Attachment:- Above and Beyond.rar

Reference no: EM133008028

Questions Cloud

How would you feel if an aspect of your identity was removed : How would you feel if an aspect of your identity was removed?
Why is effective written communication important : Why is effective written communication important in the workplace?
What is Pam remaining basis in her partnership interest : The land is encumbered with a $15,000 mortgage (the partnership's only liability). What is Pam's remaining basis in her partnership interest
Explain the control objectives and activities : The control of cash is clearly of prime importance in any business. Explain the control objectives and activities related to cash. Write in paragraphs
Explain the operation and handshake process : Explain the operation and handshake process of TLS using the screen captures of Wireshark - You need to clearly identify the message sequence and protocols
Enhance the performance of cavinkare : Discuss any five human capital interventions that Ranganathan implemented to enhance the performance of Cavinkare.
Identify the message sequence and protocols : Demonstrate that you have been able to use what you have learnt in the unit to extend your knowledge on the chosen topics.
Should you sell to this firm on credit : You are willing to sell inventory to the firm on credit provided that you will be paid within 60 days. Should you sell to this firm on credit
Develop the dns server : Understanding of the topics we cover in this unit, going above and beyond in your learning journey. For this credit task, you will be developing a DNS server

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd