Você está na página 1de 113

TABLE OF CONTENTS

TASK 1a
1. Comparisons and contrasts between HTTP and XML
HTTP Hypertext transfer protocols is the communications rules that allow browsers to connect with web browsers It is an application-level protocol for distributed, collaborative, hypermedia information systems and its used for retrieving inter-linked resources. HTTP is a request/response standard of a client and a server. A client is the end-user; the server is the web site. The XML XML (Extensible Markup Language) is a set of rules for encoding documents electronically. Its a web document tagging and formatting language that two computers can use to exchange information It is widely used for the representation of arbitrary data structures, for example in web services. It is a textual

client makes an HTTP requestusing a data format. web browser HTTP is not constrained to using TCP/IP and its supporting layers, although this is its most popular application on the Internet HTTP only presumes a reliable transport mechanism. Resources to be accessed by HTTP are identified using Uniform Resource Identifiers (URL) It focuses on document designs. It defines a text format for documents to be used on the websites as opposed to being a transport mechanism.

Table 1 Compare and contrast HTTP with xml

2. Differences between desktop publishing and web publishing


Desktop publishing It describes page layout skills, which involve mixing text and graphics to produce high quality output for commercial printing. Web publishing It deals with organizing WebPages which include text, pictures, sound and video into a coordinated unit (website) and posting it into a web server to render them accessible by the world wide web users through a Uniform Resource Locator (URL). You need a Microcomputer and a mouse, scanner, laser or inkjet printer and desktop publishing software to be able to do desktop publishing.
Table 2 Difference between Desktop and Web Publishing

You need a web server to publish a website

3. Client server architecture and peer-to- peer architecture


Client server architecture It is based on a structure where a server Peer- to peer architecture In this architecture a machine on the

(a high performance machine) running on network can simultaneously act as both one or more server programs hosts all the resources and can share the resources with the clients (machines attached/dependent on the server) upon requests. a client and a server, and each has equivalent responsibilities and status.

Server is dedicated for storage and managing data.

All the machines can hold and share resources on an equal status

Clients are able to process data when server is not working. Used for both WAN and LAN

No control to access the resource machine Used for LAN (local area network)

Table 3 Compare client/server & peer to peer architechture

4. Comparing how a caching server differs from a web server


Caching proxies keep local copies of frequently requested resources, which significantly reduces the upstream bandwidth usage to increase performance while a web server accepts HTTP requests from clients (user agents such as web browsers), and serves them directly with responses.
4

5. Differences between hosting a site and hosting a web server


Hosting a site It is to provide space for individuals or organizations on a server to allow them upload their website to be accessible via the world wide web.
Table 4 Difference server and web hosting

Hosting a web server It gives you control over your site. Its connected to the internet and is given an IP- address. It is secured and monitored and its not used for other tasks.

6. Main features that differentiate IPv6 and IPv 4


IPv6 Has a much larger address space than IPv4. It uses a 128-bit address thus allows for hierarchical structure of the address space and provides enough address Can support upto 2128 address to fulfil future needs with better security and network related features Can support up to 232 address IPv4 It uses a 32-bit IP address that we commonly use

Has a fixed length header of 40 bytes. IPV6 functionality is built into ICMPV6.This allows for faster processing

It has enhanced security and Qos features for permanent connectivity


Table 5 Difference of features in IPV6 from IPV4

TASK 1b

Feasibility report

To analyze the web hosting approaches at hand with regard to the project involved (medium sized estate agent), consider the pros and cons of the hosting approaches.

Setting your own web server


This is an option that gives you control over your site. You need to purchase a suitable machine and get connected to the Internet via an ISP and be given a domain name and also assigned a static public IP address. IP address is given to computers that can access network from anywhere. This machine is dedicated and must be backed up, be secured and also be monitored.

Cost effectiveness You need expertise and people who are qualified together with network technicians to maintain. This makes it to be expensive, as it also needs very reliable telecommunication link.
6

Dedicated hosting

A dedicated hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. In some cases a dedicated server can offer less overhead and a larger return on investment. Dedicated servers always offer large amounts of bandwidths compared to shared server which translates into faster data transmissions. Cost effectiveness This option is not cost effective since the organization is medium sized and does not require a dedicated server. This option is ideal for very large organizations with massive information traffic.

Collocated hosting
In this case you still have to buy a machine and configure it just like setting up your own web server but instead of having to install a network connection to your office your ISP will house the server for you. ISP that does the co location will place your machine in their server room and connect it to their network. This allows you the flexibility of having your own server and the benefits of having a very fast network connection.

Cost effectiveness The organization will be required to pay fraction of what a dedicated telecommunication line would cost. You have to hire your own web designer to update your website or contract an ISP to do so hence make it to be expensive.

Virtual Shared hosting

Virtual hosting is a method that servers such as web servers use to host more than one domain name on the same computer, sometimes on the same IP address.

Virtual hosting allows a website owner to have a site hosted on a web server that is shared with other websites. In simple terms, the virtual hosting company's server will allocate out hosting services and bandwidth to more than one website. Virtual web hosting is a cheaper hosting option because you won't have to pay for a dedicated server to host just your website.

Virtual web hosting is a good solution for small- to medium-sized (and even some larger) websites that aren't constantly being visited or that have reasonable bandwidth needs.

There are two basic methods of accomplishing virtual hosting: name-based, and IP address or IP -based.

Cost effectiveness

This option is very cost effective given that the estate agency is a medium sized and therefore does not require a high bandwidth considering the amount of data transfer involved. Its a cheap way to own a domain because there are no servers to maintain.

Free hosting
A free web hosting service is a web service is free usually advertisement-supported. Free web hosts will usually provide a sub domain (yoursite.example.com) or a directory (www.example.com/~yourname). In contrast, paid web hosts will usually provide a second-level domain along with the hosting (www.yourname.com). Many free hosts do
8

allow use of separately purchased domains. Rarely, a free host may also operate as a domain name registrar.

Draw back

The host will only provide a sub domain, which has some limitations, which include limited storage. The host may also make it conditional that they have their banners and advertisement on your website which can compromise on the original objective of you website.

Recommendation(s)

Considering the feasibility of the above mentioned web hosting options in terms of cost effectiveness and technical appropriateness I would recommend the option of Virtual Hosting since it is both cost effective and technically appropriate for the type of enterprise which is a medium sized estate agency.

TASK 2 Installing the IIS and Apache simultaneously

Install the IIS server

If you are running Windows XP Professional on your computer you can install Microsoft's web server, Internet Information Server 5.1 (IIS) for free from the Windows XP Pro installation CD and configure it to run on your system by following the instructions below: 9

1. Place the Windows XP Professional CD-Rom into your CD-Rom Drive.

2. Open 'Add/Remove Windows Components' found in 'Add/Remove Programs' in the 'Control Panel'.

3. Place a tick in the check box for 'Internet Information Services (IIS)' leaving all the default installation settings intact.

4. Once IIS is installed on your machine you can view your home page in a web browser by typing 'http://localhost' (you can substitute 'localhost' for the name of your computer) into the address bar of your web browser. If you have not placed your web site into the default directory you should now be looking at the IIS documentation.

5. If you are not sure of the name of your computer right-click on the 'My Computer' icon on your desktop, select 'Properties' from the shortcut menu, and click on the 'Computer Name' tab.

6. Your default web directory to place your web site in is 'C:\Inetpub\wwwroot', but if you don't want to over write the IIS documentation found in this directory you can set up your own virtual directory through the 'Internet Information Services' console.

7. The 'Internet Information Services' console can be found in the 'Administration Tools' in the 'Control Panel' under 'Performance and Maintenance', if you do not have the control panel in Classic View.

10

IIS INSTALLATION SCREEN SHOTS

11

12

13

APACHE INSTALLATION

14

15

16

17

18

19

TASK 2 (B) Stop, Restart, activities performed on the servers

20

1. Stop screen shot of APACHE

21

2. Restart screen shot of APACHE

If you try to run apache 2.2 again the following error appears because the IIS is running.

22

23

24

25

Repetition of the same activities on the IIS server

One can stop the IIS server at any time, so if you share your PC with your peers or family members, you should make sure that IIS is up and running. Click the Start button, Control Panel button, Performance and Maintenance link, Administrative Tools link, and then double-click the Internet Information Services icon. Expand the plus sign next to the Internet Information Services icon on the left side of the window. Expand the plus sign next to the local computer icon, and then expand the Web Sites icon. Right-click the Default Web Site icon and make sure that the Start option is grayed out. You can see how to stop or pause the IIS server.

1. Stop activity screen shot of IIS

26

27

Screen shot of IIS when apache is stopped

28

2. Restart screen shot of IIS

If Apache is started IIS will give an error when started.

29

3. Pinging the server to check that it is live

Instructions

Step 1: In Windows XP, click Start and Run. Then type "cmd" and press Enter. In Windows Vista, click Start, then type "cmd" and press Enter. This will open the command prompt window with a black background.

Step 2:Type "ping <server name>" and press Enter. A server name can be either a computer or website name. For example: ping yahoo.com

Step 3: Read the server IP address. The first line of the ping output contains the server IP address (in brackets). Below is an example of such a line. The IP address 127.0.0.1. "Pinging APACHE [127.0.0.1] with 32 bytes of data or Ping packet internet Gropper you have to ping 172.16.144.192

Step 4: Analyze the ping statistics. The last three lines of the output contain the ping information. For example: "Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate roundtrip times in milliseconds: Minimum = 67ms, Maximum = 68ms, Average = 67ms" Note that shorter roundtrip times mean better connection to a server. A high percentage of lost packages are an indication of a poor connection.

30

This shows that the server is live after ping the two servers

31

32

This indicates that the servers are live.

This show that the server is live after being test ping

4) Testing that the IIS and APACHE servers are running correctly
Testing the local host URL: http://localhost/localstart

33

34

Internet information services server test page

35

APACHE server test page

36

C) Simple web page created on IIS server

37

d) Configured Logging for Microsoft's IIS version 5 Server


To view the Web Server statistics (hits, pages viewed, etc.) from ShopSite, the server log format needs to conform to the NCSA format. Follow these steps to set the logging format. 1. Open the Internet Information Services window by clicking Start Administrative Tools Internet Service Manager. Programs

2. Click the plus sign (+) next to your server's name. 3. Right click on Default Web Site, then click Properties. 4. Ensure that the Enable Logging box is checked. 5. Select NCSA Common Log File Format for the Active log format. 6. Click OK

38

39

<IfModule log_config_module> # # The following directives define some format nicknames for use with # a CustomLog directive (see below). # LogFormat "%l %u %t \"%r\" "%{Referer}i\" \"%{User-Agent}i\"" combined LogFormat "%h %l %u %t \"%r\" %>s %b" common

<IfModule logio_module> # You need to enable mod_logio.c to use %I and %O LogFormat " %l %u %t \"%r\" "%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio </IfModule>

40

e) The most common log file formats with their need to have them

h = hostname l = login name u = username t = time r = request (POST and GET) s = status b = bytes (size)

f) How one can achieve the following objectives by logging the web server activity.

1. find out who visited your site 2. find out what was viewed 3. find out when the information was last viewed 4. Monitor attempts to access your sites, virtual folders or files.
5. Determine whether attempts were made to read and write to your files.

41

g) Tool for analyzing logs (IIS Log Parser)

Log parser installation

42

Log Paser 2.2 setup

Click to finish installation

43

Running the parser after the installation

44

Demonstrating the usage of parser by pinging which was successful

45

TASK 3 TCP/IP protocals

Network protocol suite

The network Protocol Suite (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. It is named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard.

The network Protocol Suite, like many protocol suites, may be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be transmitted.

TCP/IP protocol system


It is network communication set of rules defining how data transmission takes place within a network system. Its an industry standard protocol and a layered set of many protocols that enables communication in different networking environments. It also enables computers to communicate across network segments of different platforms. The TCP/IP model consists of four layers (RFC 1122). From lowest to highest, these are the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.

46

Desirability of TCP/IP standards

Ordered data transfer - the destination host rearranges according to sequence number Retransmission of lost packets - any cumulative stream not acknowledged will be retransmitted discarding duplicate packets.

Error-free data transfer Flow control - limits the rate a sender transfers data to guarantee reliable delivery. When the receiving host's buffer fills, the next acknowledgement contains a 0 in the window size, to stop transfer and allow the data in the buffer to be processed.

Congestion control - sliding window. Its an industry standard Its an open protocol that is not controlled by a single organization It contains a set of utilities for connecting dissimilar operating system Its scalable meaning you can expand or shrink the network Its embedded in most modern operating systems

How TCP/IP addresses:

Logical addressing

In a system supporting virtual memory, there may actually not be any physical memory mapped to a logical address until an access is attempted. The access triggers special functions of the operating system that reprogram the Memory Management Unit to map the address to some physical memory, perhaps writing the old contents of
47

that memory to disk and reading back from disk what the memory should contain at the new logical address. In this case, the logical address may be referred to as a virtual address.

Routing

A routing protocol specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network, the choice of the route being done by routing algorithms. Each router has a prior knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbors, and then throughout the network. This way, routers gain knowledge of the topology of the network.

Name service

It enables the look up of a name and information associated with that name. As a word in a dictionary may have multiple definitions, in a directory, a name may be associated with multiple, different pieces of information. A directory service is simply the software system that stores, organizes and provides access to information in a directory.

A simple directory service called a naming service, maps the names of network resources to their respective network addresses. With the name service type of directory, a user doesn't have to remember the physical address of a network resource; providing a name will locate the resource. Each resource on the network is considered an object on the directory server. Information about a particular
48

resource is stored as attributes of that object. Information within objects can be made secure so that only users with the available permissions are able to access it.

Error control and flow control

Error detection

In a typical TCP/IP system, error detection is performed at multiple levels:

Each Ethernet frame carries a CRC-32 checksum. The receiver discards frames if their checksums do not match. The IPv4 header contains a header checksum of the contents of the header (excluding the checksum field). Packets with checksums that don't match are discarded.

The checksum was omitted from the IPv6 header, because most current link layer protocols have error detection. UDP has an optional checksum. Packets with wrong checksums are discarded. TCP has a checksum of the payload, TCP header (excluding the checksum field) and source- and destination addresses of the IP header. Packets found to have incorrect checksums are discarded and eventually get retransmitted when the sender receives a triple-ack or a timeout occurs.

Flow control

Flow control is the process of managing the rate of data transmission between two nodes to prevent a fast sender from overrunning a slow receiver. It provides a mechanism for the receiver to control the
49

transmission speed, so that the receiving node is not overwhelmed with data from tranceiving nodes. The transport layer is responsible for making sure that the sending node and the receiving node are well synchronized.

Application support

This is implemented by the application layer in the TCP/IP protocol that enables process-to-process communication between connections in a network.

TASK 4 To View cookies settings


In Internet Explorer, click Internet Options on the Tools menu, and then click the Security tab. Click the Web content zone you want, and then click Custom Level. Under Cookies, click the options you want, click OK, and then click OK.

50

51

This window opens to view the cookies click on the view files option.

52

After a click on the view files the above window opens which shows the cookies that are in the computer.

53

All cookies removed using an appropriate tab at the browser and checking the appropriate file to view the cookies if any are stored in the hard drive

54

55

3) Screen shots of visit on http://www.translink.co.uk/ site, msn.com site,http://www.bonzi.com/ site when prompted to allow cookie settings,

56

57

4) Cookie setting in the browser and view cookies

58

59

b) Viewing cookies in NETSCAPE MANAGER

60

Removed all the cookies using an appropriate tab at the browser and check the appropriate file to view the cookies if any are stored on my hard drive.

61

62

Visited these sites http://www.translink.co.uk/, msn.com and http://www.bonzi.com/. When prompted, allow cookie setting in NETSCAPE broswer

63

64

65

66

Check cookie setting in the NETSCAPE browser and view cookies.

67

68

c) In Internet Explorer, view history of the sites visited. Delete all the history and visit new sites and then view history to see new history being built. Perform the same activities in Netscape browser.

69

70

71

72

SAMPLES WITH NETSCAPE

73

74

75

76

d) Find cookies and the history files on the hard drive and print samples giving as much explanation as you can.

77

78

79

80

81

Removing cookies

82

83

http://www.translink.co.uk/ site when prompted to allow cookie settings in Netscape browser

84

Msn.com site when prompted to allow cookie settings in Netscape browser

85

http://www.bonzi.com/ site when prompted to allow cookie settings in Netscape browser

86

Viewing cookies after removing the ones stored in the hard drive

87

c) View history of sites visited Go to favorites center tab (yellow star tool bar), click history. To remove the cached Internet address entries, clear the History folder. Close all running instances of Internet Explorer and all browser windows. In Control Panel, click Internet Options. Click the General tab, and then click Clear History.

88

Click yes, and then click OK to close the Internet Options dialog box.

89

90

SAMPLES WITH NETSCAPE

91

92

93

94

95

c) Viewing history of sites visited

96

d) Sample of cookies and the history files on the hard drive

97

98

d) finding cookies and the history

99

100

101

e) Privacy implications of different settings for cookies and history

102

f) The various options available for managing digital certificates in both Internet Explorer and Netscape browser
http://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.html

103

g) Various options available under the advanced options in both the browsers. In the Internet Explorer this option can be found in Internet options under the tools tab, and in the Netscape browser it can be found in preferences under the tab edit.

104

105

106

Brief descriptions of the advanced options on internet explorer Accessibility

Option contains functions to do with browser accessibility

Browsing

Contains options to do with browsing operations E.g automatically check for internet explore updates.

HTTP settings

This option specifies which transfer protocol to use.

Multimedia

This option allows you to set the multimedia settings to use E.g. whether an image should be resized automatically e.t.c

Printing This option allows you to set printing preferences e.g. whether to have print outs with background images or not.

107

108

109

110

111

112

BIBLIOGRAHY
1. Protocal.com (2009),TCP/IP protocols, retrieved on 4-september from: http://www.protocols.com/pbook/tcpip1.htm 2. Webopedia.com(2009),TCP/IP , retrieved on 4-september from: http://www.webopedia.com/TERM/T/TCP_IP.html 3. Webwizguide.com(2009),INSTALLING-IIS-WINXP, retrieved on 4-september from: http://www.webwizguide.com/kb/asp_tutorials/installing_iis_winXP_pro.asp 4. Microsoft.com (2009),IIS INSTLLATION, retrieved on 4-september from: http://social.msdn.microsoft.com/Search/en-US?query=iis%20installation&ac=8 5. Microsoft.com (2009),TCP, retrieved on 4-september from: http://social.msdn.microsoft.com/Search/en-US?query=tcp%2Fip&ac=8 6. Microsoft.com (2009),WEB SERVICE AND HOSTING, retrieved on 4-september from: http://social.msdn.microsoft.com/Search/en-US?query=web%20service%20hosting&ac=3

113

Você também pode gostar