Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Higher Nationals in Computing Unit 2: Networking Assignment Learner’s name:DANGANTHANH ID, Summaries of Network Design

fully completed test plan including an evaluation of results and recommendations for improvements to LAN.  A proposed and justified maintenance schedule. Part 3  Evidence of an implemented network. You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Unit Learning Outcomes LO1: Examine networking principles and their protocols. LO 2: Explain networki

Typology: Summaries

2021/2022

Uploaded on 04/28/2022

nguyen-huy-13
nguyen-huy-13 🇻🇳

5

(2)

5 documents

1 / 18

Toggle sidebar

Related documents


Partial preview of the text

Download Higher Nationals in Computing Unit 2: Networking Assignment Learner’s name:DANGANTHANH ID and more Summaries Network Design in PDF only on Docsity! Assignment Brief 1 (RQF) Higher National Certificate/Diploma in Computing Student Name/ID Number: Unit Number and Title: Unit 2: Networking Academic Year: 2021 – 2022 Unit Assessor: Sam X.Nguyen Assignment Title: Networking Infrastructure Issue Date: April 1st, 2021 Submission Date: Internal Verifier Name: Date: Submission Format: Format: ● The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing system. Submission ● Students are compulsory to submit the assignment in due date and in a way requested by the Tutor. ● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/. ● Remember to convert the word file into PDF file before the submission on CMS. Note: ● The individual Assignment must be your own work, and not copied by or from another student. ● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you must reference your sources, using the Harvard style. ● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply this requirement will result in a failed assignment. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. Assignment Brief and Guidance: Assignment scenario You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking solution development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho. The company has been contracted to implement a networking project from a local educational institute. The specification of the project is given below: • People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the academic heads and the programme managers, and 3 computer network administrators. • Resources: 50 student lab computers, 35 staff computers, and 3 printers. • Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor and another located on the second floor. Task 1 The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles, protocols and devices and submit a report. You will need to produce a report that includes the following: • An introduction to provide an overview of your report. • Benefits and constraints of different types of networks and networking standards. • The impact of network topology, speed of communication and bandwidth requirements. • Effectiveness of networking systems.  Summative Feedback:  Resubmission Feedback: Grade: Assessor Signature: Date: Lecturer Signature: Contents Introduction.......................................................................................................................... 2 Chapter 1: Short discuss one of the protocols (DNS, FTP, HTTP) and explain how it works, using Wireshark and Cisco Packet Tracer to simulate and analyze the protocol? ........................................ 2 A. What is HTTP ( Hypertext Transfer Protocol). ................................................................. 2 B. What is the purpose of HTTP? .......................................................................................... 3 C. How does HTTP work? ..................................................................................................... 3 D. Using Wireshark and Cisco Packet Tracer simulate and analyze the protocol ................. 7 Reference .......................................................................................................................................... 15 Table Of Figure Figure 1. ............................................................................................................................................... 2 Figure 2– HTTP Protocol Basic ........................................................................................................... 2 Figure 3 - How HTTP work. ................................................................................................................ 4 Figure 4 – Simulator With Cisco packet tracer ..................................................................... 7 Figure 5 - DNS IP Address .................................................................................................. 7 Figure 6 - Put the HTTP and HTTPS On ............................................................................. 8 Figure 7 - Set up the DNS property in DNS Server .............................................................. 8 Figure 8 - Put on the IPv4 DNS and ICMP .......................................................................... 8 Figure 9 - Put on the HTTP and HTTPS Protocol. ............................................................... 8 Figure 10 - Enter the URL ................................................................................................... 9 Figure 11 - The Request of PC0 to DNS Server .................................................................. 9 Figure 12 - DNS Response the HTTP to PC0 ................................................................... 10 Figure 13 - Web Response to PC0 .................................................................................... 10 Figure 14 - Catch an http packet with WhireShark ............................................................. 10 Figure 15 - Response example. ......................................................................................... 11 Figure 16 - Response example. ......................................................................................... 11 Figure 17 - Cable Connect ................................................................................................ 12 Figure 18 - IP Adress Table ............................................................................................... 13 Figure 19 – Erase And Reload Router ............................................................................... 13 Figure 20 - Step 1. Basic Router Configutation ................................................................................ 14 Figure 21 - Set Password For Each Router ....................................................................................... 14 Figure 22 - Add The Longging Synchronous ..................................................................... 15 Figure 23 - Add the exec-timeout for each Router ............................................................. 15 1 Introduction: This is my first assignment, but I will do my best to get a P. With the advancement of technology, the application of technology is becoming increasingly popular. As a result, students of information technology must continue to expand their knowledge. In this report, I will define HTTP and explain how it works. Chapter 1: Short discuss one of the protocols (DNS, FTP, HTTP) and explain how it works, using Wireshark and Cisco Packet Tracer simulate and analyse the protocol? - In the introduction I was talk about the HTTP and how it works. So, in this part I will demonstrate what I know about http. A. What is HTTP ( Hypertext Transfer Protocol). o HTTP (Hypertext Transfer Protocol) is a set of rules for transferring files over the internet, such as text, images, sound, video, and other multimedia files. When a user launches a web browser, they are indirectly using HTTP. HTTP is an application protocol that runs on top of the TCP/IP protocol suite, which serves as the internet's foundation. HTTP/2, which was released in May 2015, is the most recent version of HTTP. It is an alternative to HTTP 1.1, but it does not render it obsolete. o The Hypertext Transfer Protocol (HTTP) is a protocol used mainly to access data on the World Wide Web. It is similar to FTP because it transfers files and uses the services of TCP. However, it is much simpler than FTP because it uses only one TCP connection. There is no separate control connection; only data are transferred between the client and the server. HTTP is like SMTP because the data transferred between the client and the server look like SMTP messages. In addition, the format of the messages is controlled by MIME-like headers. Unlike SMTP, the HTTP messages are not destined to be read by humans; they are read and interpreted by the HTTP server and HTTP client (browser). SMTP messages are stored and forwarded, but HTTP messages are delivered immediately. The commands from the client to the server are embedded in a request message.The contents of the requested file or other information are embedded in a response message. HTTP uses the services of TCP on well-known port 80. Figure 2– HTTP Protocol Basic 2 o An HTTP method. This specifies the specific action that the request anticipates receiving from the server in its response. o HTTP request headers. This contains data such as the type of browser being used and the information requested from the server. Cookies, something that show information previously sent from the server handling the request, can also be included. o An HTTP body. This is optional information from the request that the server requires, such as user forms (username/password logins, short responses, and file uploads) submitted to the website. ▪ HTTP responses. The data received by a client device from the webserver is represented by the HTTP response message. The response, as the name implies, is the server's response to an HTTP request. The information in an HTTP response is tailored to the context received by the server from the request. HTTP responses typically contain the following information: o HTTP status code, which indicates the status of the client device's request Responses may indicate success, and informative response, a redirect, or server or client-side errors. o HTTP response headers, which send information about the server and the resources requested Header Description Date Shows the current date Upgrade Specifies the preferred communication protocol Server Gives information about the server Set-Cookie The server asks the client to save a cookie Content- Encoding Specifies the encoding scheme Content- Language Specifies the language Content- Length Shows the length of the document Content-Type Specifies the media type Location To ask the client to send the request to another site Accept- Ranges The server will accept the requested byte-ranges Last-modified Gives the date and time of the last change Table 1. Response header names. o An HTTP body (optional), If a request is successful, this contains the requested data in the form of HTML code, which the client browser will translate into a web page. 5 ❖ HTTP status code Servers frequently issue response codes in response to HTTP requests, indicating that the request is being processed, that there was an error in the request, or that the request is being redirected. Typical response codes include: ❖ Information. ▪ 100 Continue. This is the initial part of the request received, continue. ▪ 101 Switching. The server is complying to switch the protocols. ❖ Success. ▪ 200 OK. This indicates that the request, such as GET or POST, was successful and is being processed. ▪ 201 Created. A new URL is created. ▪ 202 Accepted. The request is accepted, but it is not immediately acted upon. ▪ 204 No content. There is no content in the body. ❖ Redirection. ▪ 301 Moved Permanently. The requested URL is no longer used by the server. ▪ 302 Moved temporarily. The requested URL has moved temporarily. ▪ 304 Not Modified. The document has not been modified. ▪ ❖ Client error. ▪ 400 Bad requests. This is the syntax error in the request. ▪ 401 Unauthorized. The client, or user, making the server request, has not been authenticated. ▪ 403 Forbidden. The client's identity is known but has not been granted access. ▪ 404 Not Found. This is the most frequent error code. It indicates that the URL was not recognized or that the resource at the specified location did not exist. ▪ 405 Method not allowed. The method is not supported in this URL. ▪ 406 Not acceptable. The format requested is not acceptable. ❖ Server error. ▪ 500 Internal Server Error. The server has encountered a situation that it is unsure how to handle. ▪ 501 Not implemented. The action request can not be performed ▪ 503 Service unavailable. The service is temporarily unavailable. ❖ Proxies in HTTP Proxies, also known as proxy servers, are application-layer servers, computers, or other machines that sit between the client and the server. HTTP requests and responses are relayed between the client and server via proxies. For each client-server interaction, one or more proxies are typically used. Proxies can be transparent or non-transparent Transparent proxies do not alter the client's request and instead send it to the server in its original form. Non-transparent proxies will, in some way, modify the client's request. Non-transparent proxies can be used for additional services, most commonly to speed up server retrieval. Proxies can be used by web developers for the following purposes: ▪ Caching. Cache servers can save web pages or other internet content locally, allowing for faster content retrieval and reducing the site's bandwidth demand. ▪ Authentication. Controlling application and online information access privileges. 6 ▪ Logging. Historical data, such as the IP addresses of clients who sent requests to the server, is saved. ▪ Web filtering. Controlling access to web pages that may endanger security or contain offensive content. ▪ Load balancing. Client requests can be handled by multiple servers instead of just one. D. Using Wireshark and Cisco Packet Tracer simulate and analyze the procotol ❖ This is the Figure to simulate how does HTTP work. • First of all, I set up the environment to simulate how does HTTP requests and responses work. Here I use that two server-client ( DNS and Https://Vnexpress.net) and 1 PC and connected together with the cable namely Copper Straight-Through. Figure 4 – Simulator With Cisco packet tracer • In the second step, I going to set the IP for the DNS server is 192.168.1.1, for the Web server is 192.168.1.2, next steps I going to set the IP and DNS Server for the PC to run the simulator. Figure 5 - DNS IP Address • In this case. Because I using Web browser to simulator the HTTP works, I need to be put on the HTTP Server in Web browser and the DNS Server, put on and set up the DNS Address to access on Web browser in PC. After that, I moved to edit ACL filters in the simulation panel and put on the IPv4 DNS 7 Figure 12 - DNS Response the HTTP to PC0 Figure 13 - Web Response to PC0 ❖ This is the Figure for Wireshark Figure 14 - Catch an http packet with Wireshark - As you can see from the Figure 14, when I catch an http packet on web browser, I can get almost everything about web server from Source IP to Destination IP, or I can see the Internet Protocol version of Website, and pretty sure that I can get the URL or maybe call a link of the Website and so on… 10 Figure 15 - Response example. - When I try to access on the web browser, my pc have to be sent the request to that server and this is the figure to simulation this activities that I try to enter the URL: http://gaia.cs.umass.edu/wireshark-labs/HTTP-wireshark-file1.html. Into my web browser to do the lab session. Figure 16 - Response example. - This figure is after I try to request the server and the server responsed information to me. And you can see pretty much the information here. - Date: Sat, 20 Nov 2021 10:16:27 GMT\r\n - Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.25 mod_perl/2.0.11 Perl/v5.16.3\r\n - Last-Modified: Sat, 20 Nov 2021 06:59:02 GMT\r\n… and so on. 11 Reference 1. KUROSE, J. F. 2005. Computer networking: A top-down approach featuring the internet, 3/E, Pearson Education India. [ Accessed 13 December 2021]. 2. Behrouz A. F. 2010. TCPIP protocol suit, 4/E, Higher Education. [ Accessed 14 Dec, 2021] 3. Extrahop.com. (2019). HTTP: Definition & How it Works | Protocol Support Library | ExtraHop. [online] Available at: https://www.extrahop.com/resources/protocols/http/. [ Accessed on 14/12/2021 ] 4. says, K.T. (2020). How Does HTTPS Work? [online] Hashed Out by The SSL StoreTM. Available at: https://www.thesslstore.com/blog/how-does-https-work/. [ Accessed on 14/12/2021 ]
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved