Escolar Documentos
Profissional Documentos
Cultura Documentos
TASK 1a
1. Comparisons and contrasts between HTTP and XML
HTTP Hypertext transfer protocols is the communications rules that allow browsers to connect with web browsers It is an application-level protocol for distributed, collaborative, hypermedia information systems and its used for retrieving inter-linked resources. HTTP is a request/response standard of a client and a server. A client is the end-user; the server is the web site. The XML XML (Extensible Markup Language) is a set of rules for encoding documents electronically. Its a web document tagging and formatting language that two computers can use to exchange information It is widely used for the representation of arbitrary data structures, for example in web services. It is a textual
client makes an HTTP requestusing a data format. web browser HTTP is not constrained to using TCP/IP and its supporting layers, although this is its most popular application on the Internet HTTP only presumes a reliable transport mechanism. Resources to be accessed by HTTP are identified using Uniform Resource Identifiers (URL) It focuses on document designs. It defines a text format for documents to be used on the websites as opposed to being a transport mechanism.
(a high performance machine) running on network can simultaneously act as both one or more server programs hosts all the resources and can share the resources with the clients (machines attached/dependent on the server) upon requests. a client and a server, and each has equivalent responsibilities and status.
All the machines can hold and share resources on an equal status
Clients are able to process data when server is not working. Used for both WAN and LAN
No control to access the resource machine Used for LAN (local area network)
Hosting a web server It gives you control over your site. Its connected to the internet and is given an IP- address. It is secured and monitored and its not used for other tasks.
Has a fixed length header of 40 bytes. IPV6 functionality is built into ICMPV6.This allows for faster processing
TASK 1b
Feasibility report
To analyze the web hosting approaches at hand with regard to the project involved (medium sized estate agent), consider the pros and cons of the hosting approaches.
Cost effectiveness You need expertise and people who are qualified together with network technicians to maintain. This makes it to be expensive, as it also needs very reliable telecommunication link.
6
Dedicated hosting
A dedicated hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. In some cases a dedicated server can offer less overhead and a larger return on investment. Dedicated servers always offer large amounts of bandwidths compared to shared server which translates into faster data transmissions. Cost effectiveness This option is not cost effective since the organization is medium sized and does not require a dedicated server. This option is ideal for very large organizations with massive information traffic.
Collocated hosting
In this case you still have to buy a machine and configure it just like setting up your own web server but instead of having to install a network connection to your office your ISP will house the server for you. ISP that does the co location will place your machine in their server room and connect it to their network. This allows you the flexibility of having your own server and the benefits of having a very fast network connection.
Cost effectiveness The organization will be required to pay fraction of what a dedicated telecommunication line would cost. You have to hire your own web designer to update your website or contract an ISP to do so hence make it to be expensive.
Virtual hosting is a method that servers such as web servers use to host more than one domain name on the same computer, sometimes on the same IP address.
Virtual hosting allows a website owner to have a site hosted on a web server that is shared with other websites. In simple terms, the virtual hosting company's server will allocate out hosting services and bandwidth to more than one website. Virtual web hosting is a cheaper hosting option because you won't have to pay for a dedicated server to host just your website.
Virtual web hosting is a good solution for small- to medium-sized (and even some larger) websites that aren't constantly being visited or that have reasonable bandwidth needs.
There are two basic methods of accomplishing virtual hosting: name-based, and IP address or IP -based.
Cost effectiveness
This option is very cost effective given that the estate agency is a medium sized and therefore does not require a high bandwidth considering the amount of data transfer involved. Its a cheap way to own a domain because there are no servers to maintain.
Free hosting
A free web hosting service is a web service is free usually advertisement-supported. Free web hosts will usually provide a sub domain (yoursite.example.com) or a directory (www.example.com/~yourname). In contrast, paid web hosts will usually provide a second-level domain along with the hosting (www.yourname.com). Many free hosts do
8
allow use of separately purchased domains. Rarely, a free host may also operate as a domain name registrar.
Draw back
The host will only provide a sub domain, which has some limitations, which include limited storage. The host may also make it conditional that they have their banners and advertisement on your website which can compromise on the original objective of you website.
Recommendation(s)
Considering the feasibility of the above mentioned web hosting options in terms of cost effectiveness and technical appropriateness I would recommend the option of Virtual Hosting since it is both cost effective and technically appropriate for the type of enterprise which is a medium sized estate agency.
If you are running Windows XP Professional on your computer you can install Microsoft's web server, Internet Information Server 5.1 (IIS) for free from the Windows XP Pro installation CD and configure it to run on your system by following the instructions below: 9
2. Open 'Add/Remove Windows Components' found in 'Add/Remove Programs' in the 'Control Panel'.
3. Place a tick in the check box for 'Internet Information Services (IIS)' leaving all the default installation settings intact.
4. Once IIS is installed on your machine you can view your home page in a web browser by typing 'http://localhost' (you can substitute 'localhost' for the name of your computer) into the address bar of your web browser. If you have not placed your web site into the default directory you should now be looking at the IIS documentation.
5. If you are not sure of the name of your computer right-click on the 'My Computer' icon on your desktop, select 'Properties' from the shortcut menu, and click on the 'Computer Name' tab.
6. Your default web directory to place your web site in is 'C:\Inetpub\wwwroot', but if you don't want to over write the IIS documentation found in this directory you can set up your own virtual directory through the 'Internet Information Services' console.
7. The 'Internet Information Services' console can be found in the 'Administration Tools' in the 'Control Panel' under 'Performance and Maintenance', if you do not have the control panel in Classic View.
10
11
12
13
APACHE INSTALLATION
14
15
16
17
18
19
20
21
If you try to run apache 2.2 again the following error appears because the IIS is running.
22
23
24
25
One can stop the IIS server at any time, so if you share your PC with your peers or family members, you should make sure that IIS is up and running. Click the Start button, Control Panel button, Performance and Maintenance link, Administrative Tools link, and then double-click the Internet Information Services icon. Expand the plus sign next to the Internet Information Services icon on the left side of the window. Expand the plus sign next to the local computer icon, and then expand the Web Sites icon. Right-click the Default Web Site icon and make sure that the Start option is grayed out. You can see how to stop or pause the IIS server.
26
27
28
29
Instructions
Step 1: In Windows XP, click Start and Run. Then type "cmd" and press Enter. In Windows Vista, click Start, then type "cmd" and press Enter. This will open the command prompt window with a black background.
Step 2:Type "ping <server name>" and press Enter. A server name can be either a computer or website name. For example: ping yahoo.com
Step 3: Read the server IP address. The first line of the ping output contains the server IP address (in brackets). Below is an example of such a line. The IP address 127.0.0.1. "Pinging APACHE [127.0.0.1] with 32 bytes of data or Ping packet internet Gropper you have to ping 172.16.144.192
Step 4: Analyze the ping statistics. The last three lines of the output contain the ping information. For example: "Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate roundtrip times in milliseconds: Minimum = 67ms, Maximum = 68ms, Average = 67ms" Note that shorter roundtrip times mean better connection to a server. A high percentage of lost packages are an indication of a poor connection.
30
This shows that the server is live after ping the two servers
31
32
This show that the server is live after being test ping
4) Testing that the IIS and APACHE servers are running correctly
Testing the local host URL: http://localhost/localstart
33
34
35
36
37
2. Click the plus sign (+) next to your server's name. 3. Right click on Default Web Site, then click Properties. 4. Ensure that the Enable Logging box is checked. 5. Select NCSA Common Log File Format for the Active log format. 6. Click OK
38
39
<IfModule log_config_module> # # The following directives define some format nicknames for use with # a CustomLog directive (see below). # LogFormat "%l %u %t \"%r\" "%{Referer}i\" \"%{User-Agent}i\"" combined LogFormat "%h %l %u %t \"%r\" %>s %b" common
<IfModule logio_module> # You need to enable mod_logio.c to use %I and %O LogFormat " %l %u %t \"%r\" "%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio </IfModule>
40
e) The most common log file formats with their need to have them
h = hostname l = login name u = username t = time r = request (POST and GET) s = status b = bytes (size)
f) How one can achieve the following objectives by logging the web server activity.
1. find out who visited your site 2. find out what was viewed 3. find out when the information was last viewed 4. Monitor attempts to access your sites, virtual folders or files.
5. Determine whether attempts were made to read and write to your files.
41
42
43
44
45
The network Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard.
The network Protocol Suite, like many protocol suites, may be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be transmitted.
46
Ordered data transfer - the destination host rearranges according to sequence number Retransmission of lost packets - any cumulative stream not acknowledged will be retransmitted discarding duplicate packets.
Error-free data transfer Flow control - limits the rate a sender transfers data to guarantee reliable delivery. When the receiving host's buffer fills, the next acknowledgement contains a 0 in the window size, to stop transfer and allow the data in the buffer to be processed.
Congestion control - sliding window. Its an industry standard Its an open protocol that is not controlled by a single organization It contains a set of utilities for connecting dissimilar operating system Its scalable meaning you can expand or shrink the network Its embedded in most modern operating systems
Logical addressing
In a system supporting virtual memory, there may actually not be any physical memory mapped to a logical address until an access is attempted. The access triggers special functions of the operating system that reprogram the Memory Management Unit to map the address to some physical memory, perhaps writing the old contents of
47
that memory to disk and reading back from disk what the memory should contain at the new logical address. In this case, the logical address may be referred to as a virtual address.
Routing
A routing protocol specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network, the choice of the route being done by routing algorithms. Each router has a prior knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbors, and then throughout the network. This way, routers gain knowledge of the topology of the network.
Name service
It enables the look up of a name and information associated with that name. As a word in a dictionary may have multiple definitions, in a directory, a name may be associated with multiple, different pieces of information. A directory service is simply the software system that stores, organizes and provides access to information in a directory.
A simple directory service called a naming service, maps the names of network resources to their respective network addresses. With the name service type of directory, a user doesn't have to remember the physical address of a network resource; providing a name will locate the resource. Each resource on the network is considered an object on the directory server. Information about a particular
48
resource is stored as attributes of that object. Information within objects can be made secure so that only users with the available permissions are able to access it.
Error detection
Each Ethernet frame carries a CRC-32 checksum. The receiver discards frames if their checksums do not match. The IPv4 header contains a header checksum of the contents of the header (excluding the checksum field). Packets with checksums that don't match are discarded.
The checksum was omitted from the IPv6 header, because most current link layer protocols have error detection. UDP has an optional checksum. Packets with wrong checksums are discarded. TCP has a checksum of the payload, TCP header (excluding the checksum field) and source- and destination addresses of the IP header. Packets found to have incorrect checksums are discarded and eventually get retransmitted when the sender receives a triple-ack or a timeout occurs.
Flow control
Flow control is the process of managing the rate of data transmission between two nodes to prevent a fast sender from overrunning a slow receiver. It provides a mechanism for the receiver to control the
49
transmission speed, so that the receiving node is not overwhelmed with data from tranceiving nodes. The transport layer is responsible for making sure that the sending node and the receiving node are well synchronized.
Application support
This is implemented by the application layer in the TCP/IP protocol that enables process-to-process communication between connections in a network.
50
51
This window opens to view the cookies click on the view files option.
52
After a click on the view files the above window opens which shows the cookies that are in the computer.
53
All cookies removed using an appropriate tab at the browser and checking the appropriate file to view the cookies if any are stored in the hard drive
54
55
3) Screen shots of visit on http://www.translink.co.uk/ site, msn.com site,http://www.bonzi.com/ site when prompted to allow cookie settings,
56
57
58
59
60
Removed all the cookies using an appropriate tab at the browser and check the appropriate file to view the cookies if any are stored on my hard drive.
61
62
Visited these sites http://www.translink.co.uk/, msn.com and http://www.bonzi.com/. When prompted, allow cookie setting in NETSCAPE broswer
63
64
65
66
67
68
c) In Internet Explorer, view history of the sites visited. Delete all the history and visit new sites and then view history to see new history being built. Perform the same activities in Netscape browser.
69
70
71
72
73
74
75
76
d) Find cookies and the history files on the hard drive and print samples giving as much explanation as you can.
77
78
79
80
81
Removing cookies
82
83
84
85
86
Viewing cookies after removing the ones stored in the hard drive
87
c) View history of sites visited Go to favorites center tab (yellow star tool bar), click history. To remove the cached Internet address entries, clear the History folder. Close all running instances of Internet Explorer and all browser windows. In Control Panel, click Internet Options. Click the General tab, and then click Clear History.
88
Click yes, and then click OK to close the Internet Options dialog box.
89
90
91
92
93
94
95
96
97
98
99
100
101
102
f) The various options available for managing digital certificates in both Internet Explorer and Netscape browser
http://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.html
103
g) Various options available under the advanced options in both the browsers. In the Internet Explorer this option can be found in Internet options under the tools tab, and in the Netscape browser it can be found in preferences under the tab edit.
104
105
106
Browsing
Contains options to do with browsing operations E.g automatically check for internet explore updates.
HTTP settings
Multimedia
This option allows you to set the multimedia settings to use E.g. whether an image should be resized automatically e.t.c
Printing This option allows you to set printing preferences e.g. whether to have print outs with background images or not.
107
108
109
110
111
112
BIBLIOGRAHY
1. Protocal.com (2009),TCP/IP protocols, retrieved on 4-september from: http://www.protocols.com/pbook/tcpip1.htm 2. Webopedia.com(2009),TCP/IP , retrieved on 4-september from: http://www.webopedia.com/TERM/T/TCP_IP.html 3. Webwizguide.com(2009),INSTALLING-IIS-WINXP, retrieved on 4-september from: http://www.webwizguide.com/kb/asp_tutorials/installing_iis_winXP_pro.asp 4. Microsoft.com (2009),IIS INSTLLATION, retrieved on 4-september from: http://social.msdn.microsoft.com/Search/en-US?query=iis%20installation&ac=8 5. Microsoft.com (2009),TCP, retrieved on 4-september from: http://social.msdn.microsoft.com/Search/en-US?query=tcp%2Fip&ac=8 6. Microsoft.com (2009),WEB SERVICE AND HOSTING, retrieved on 4-september from: http://social.msdn.microsoft.com/Search/en-US?query=web%20service%20hosting&ac=3
113