Assignments
Assignments
Q8 Describe DHCP operations, when DHCP client and server on same network.
Client Request (DHCP Discover):
• The DHCP client, needing an IP address, sends a broadcast message (DHCPDISCOVER) to the
entire network since it doesn't know the DHCP server's address.
• This message includes the client's MAC address so the server can identify it.
Server Response (DHCP Offer):
• The DHCP server receives the broadcast and reserves an available IP address from its pool.
• It then sends a DHCP Offer message to the client, offering the reserved IP along with other
settings like the subnet mask, default gateway, and lease duration.
• This message is typically broadcast back because the client may not have an IP address to
receive unicast messages yet.
Client Confirmation (DHCP Request):
• The client, upon receiving the offer, responds with a DHCP Request message, requesting to
officially use the offered IP address and settings.
Server Acknowledgment (DHCP Acknowledge):
• The server confirms the request with a DHCP Acknowledgment (DHCPACK), completing the
process.
• The client can now use the assigned IP and network settings.
Q9 Describe E-mail security over non-secure channel.
Introduction to Email Security
Email (short for electronic mail) is a digital method by using it we exchange messages between people
over the internet or other computer networks. With the help of this, we can send and receive text-based
messages, often an attachment such as documents, images, or videos, from one person or organization
to another. In this article, we will understand the concept of email security, how we can protect our
email, email security policies, and email security best practices, and one of the features of email is an
email that we can use to protect the email from unauthorized access.
What is Email Security?
Basically, Email security refers to the steps where we protect the email messages and the information
that they contain from unauthorized access, and damage. It involves ensuring the confidentiality,
integrity, and availability of email messages, as well as safeguarding against phishing attacks, spam,
viruses, and another form of malware. It can be achieved through a combination of technical and non-
technical measures.
• Status line
The first line of the response, which includes the HTTP version, a status code, and a reason phrase. For
example, "HTTP/1.1 200 OK".
• Headers
A series of key-value pairs that provide additional information about the response, such as the content
type, content length, and caching directives.
• Message body
The actual content of the response, such as HTML, JSON, or an image. If the requested object cannot be
served, an error message will be returned instead.
• CRLF
An additional CRLF after the last HTTP headers