Isa Case Study
-
Upload
georges-otieno -
Category
Documents
-
view
217 -
download
0
Transcript of Isa Case Study
-
7/31/2019 Isa Case Study
1/113
1
TABLE OF CONTENTS
-
7/31/2019 Isa Case Study
2/113
-
7/31/2019 Isa Case Study
3/113
3
2. Differences between desktop publishing and web publishingDesktop publishing Web publishing
It describes page layout skills, whichinvolve mixing text and graphics to
produce high quality output for
commercial printing.
It deals with organizing WebPageswhich include text, pictures, sound and
video into a coordinated unit (website)
and posting it into a web server to render
them accessible by the world wide web
users through a Uniform Resource
Locator (URL).
You need a Microcomputer and a mouse,
scanner, laser or inkjet printer and
desktop publishing software to be able to
do desktop publishing.
You need a web server to publish a
website
Table 2 Difference between Desktop and Web Publishing
-
7/31/2019 Isa Case Study
4/113
4
3. Client server architecture and peer-to- peer architectureClient server architecture Peer- topeer architecture
It is based on a structure where a server(a high performance machine) running on
one or more server programs hosts all the
resources and can share the resources
with the clients (machines
attached/dependent on the server) upon
requests.
In this architecture a machine on thenetwork can simultaneously act as both
a client and a server, and each has
equivalent responsibilities and status.
Server is dedicated for storage and
managing data.
All the machines can hold and share
resources on an equal status
Clients are able to process data when
server is not working.
No control to access the resource
machine
Used for both WAN and LAN Used for LAN (local area network)
Table 3 Compare client/server & peer to peer architechture
4. Comparing how a caching server differs from a web server
Caching proxies keep local copies of frequently requested resources, which significantly
reduces the upstream bandwidth usage to increase performance while a web server
accepts HTTP requests from clients (user agents such as web browsers), and serves them
directly with responses.
-
7/31/2019 Isa Case Study
5/113
5
5. Differences between hosting a site and hosting a web server
Hosting a site Hosting a web server
It is to provide space for individuals or
organizations on a server to allow them
upload their website to be accessible via
the world wide web.
It gives you control over your site. Its
connected to the internet and is given an
IP- address. It is secured and monitored
and its not used for other tasks.
Table 4 Difference server and web hosting
6. Main features that differentiate IPv6 and IPv 4IPv6 IPv4
Has a much larger address space than
IPv4. It uses a 128-bit address thus
allows for hierarchical structure of the
address space and provides enough
address
It uses a 32-bit IP address that we
commonly use
Can support upto 2128 address to fulfil
future needs with better security and
network related features
Can support up to 232 address
Has a fixed length header of 40 bytes.IPV6 functionality is built into
ICMPV6.This allows for faster
processing
-
7/31/2019 Isa Case Study
6/113
6
It has enhanced security and Qos features
for permanent connectivity
Table 5 Difference of features in IPV6 from IPV4
TASK 1b
Feasibility report
To analyze the web hosting approaches at hand with regard to the project involved
(medium sized estate agent), consider the pros and cons of the hosting approaches.
Setting your own web server
This is an option that gives you control over your site. You need to purchase a suitable
machine and get connected to the Internet via an ISP and be given a domain name and
also assigned a static public IP address. IP address is given to computers that can access
network from anywhere. This machine is dedicated and must be backed up, be secured
and also be monitored.
Cost effectiveness
You need expertise and people who are qualified together with network technicians to
maintain. This makes it to be expensive, as it also needs very reliable telecommunication
link.
-
7/31/2019 Isa Case Study
7/113
7
Dedicated hosting
A dedicated hosting service is a type of Internet hosting in which the client leases an
entire server not shared with anyone. This is more flexible than shared hosting, as
organizations have full control over the server(s), including choice of operating system,
hardware, etc. In some cases a dedicated server can offer less overhead and a larger
return on investment. Dedicated servers always offer large amounts of bandwidths
compared to shared server which translates into faster data transmissions.Cost effectiveness
This option is not cost effective since the organization is medium sized and does not
require a dedicated server. This option is ideal for very large organizations with massive
information traffic.
Collocated hosting
In this case you still have to buy a machine and configure it just like setting up your own
web server but instead of having to install a network connection to your office your ISP
will house the server for you. ISP that does the co location will place your machine in
their server room and connect it to their network. This allows you the flexibility of having
your own server and the benefits of having a very fast network connection.
Cost effectiveness
The organization will be required to pay fraction of what a dedicated telecommunication
line would cost. You have to hire your own web designer to update your website or
contract an ISP to do so hence make it to be expensive.
-
7/31/2019 Isa Case Study
8/113
8
Virtual Shared hosting
Virtual hosting is a method that servers such as web servers use to host more than one
domain name on the same computer, sometimes on the same IP address.
Virtual hosting allows a website owner to have a site hosted on a web server that is
shared with other websites. In simple terms, the virtual hosting company's server will
allocate out hosting services and bandwidth to more than one website. Virtual web
hosting is a cheaper hosting option because you won't have to pay for a dedicated server
to host just your website.
Virtual web hosting is a good solution for small- to medium-sized (and even some larger)
websites that aren't constantly being visited or that have reasonable bandwidth needs.
There are two basic methods of accomplishing virtual hosting: name-based, and IP
address or IP -based.
Cost effectiveness
This option is very cost effective given that the estate agency is a medium sized and
therefore does not require a high bandwidth considering the amount of data transfer
involved. Its a cheap way to own a domain because there are no servers to maintain.
Free hostingA free web hosting service is a web service is free usually advertisement-supported. Free
web hosts will usually provide a sub domain (yoursite.example.com) or a directory
(www.example.com/~yourname). In contrast, paid web hosts will usually provide a
second-level domain along with the hosting (www.yourname.com). Many free hosts do
-
7/31/2019 Isa Case Study
9/113
9
allow use of separately purchased domains. Rarely, a free host may also operate as a
domain name registrar.
Draw back
The host will only provide a sub domain, which has some limitations, which include
limited storage.
The host may also make it conditional that they have their banners and advertisement on
your website which can compromise on the original objective of you website.
Recommendation(s)
Considering the feasibility of the above mentioned web hosting options in terms of cost
effectiveness and technical appropriateness I would recommend the option ofVirtual Hosting
since it is both cost effective and technically appropriate for the type of enterprise which is a
medium sized estate agency.
TASK 2 Installing the IIS and Apache simultaneously
Install the IIS server
If you are running Windows XP Professional on your computer you can install Microsoft's web
server, Internet Information Server 5.1 (IIS) for free from the Windows XP Pro installation CD
and configure it to run on your system by following the instructions below: -
-
7/31/2019 Isa Case Study
10/113
10
1. Place the Windows XP Professional CD-Rom into your CD-Rom Drive.
2. Open 'Add/Remove Windows Components' found in 'Add/Remove Programs' in the 'Control
Panel'.
3. Place a tick in the check box for 'Internet Information Services (IIS)' leaving all the default
installation settings intact.
4. Once IIS is installed on your machine you can view your home page in a web browser by
typing 'http://localhost' (you can substitute 'localhost' for the name of your computer) into the
address bar of your web browser. If you have not placed your web site into the default directory
you should now be looking at the IIS documentation.
5. If you are not sure of the name of your computer right-click on the 'My Computer' icon on
your desktop, select 'Properties' from the shortcut menu, and click on the 'Computer Name' tab.
6. Your default web directory to place your web site in is 'C:\Inetpub\wwwroot', but if you don't
want to over write the IIS documentation found in this directory you can set up your own virtual
directory through the 'Internet Information Services' console.
7. The 'Internet Information Services' console can be found in the 'Administration Tools' in the
'Control Panel' under 'Performance and Maintenance', if you do not have the control panel in
Classic View.
-
7/31/2019 Isa Case Study
11/113
11
IIS INSTALLATION SCREEN SHOTS
-
7/31/2019 Isa Case Study
12/113
12
-
7/31/2019 Isa Case Study
13/113
13
-
7/31/2019 Isa Case Study
14/113
14
APACHE INSTALLATION
-
7/31/2019 Isa Case Study
15/113
15
-
7/31/2019 Isa Case Study
16/113
16
-
7/31/2019 Isa Case Study
17/113
17
-
7/31/2019 Isa Case Study
18/113
18
-
7/31/2019 Isa Case Study
19/113
19
-
7/31/2019 Isa Case Study
20/113
20
TASK 2 (B) Stop, Restart, activities performed on the servers
-
7/31/2019 Isa Case Study
21/113
21
1. Stop screen shot of APACHE
-
7/31/2019 Isa Case Study
22/113
22
2. Restart screen shot of APACHE
If you try to run apache 2.2 again the following error appears because the IIS is running.
-
7/31/2019 Isa Case Study
23/113
23
-
7/31/2019 Isa Case Study
24/113
24
-
7/31/2019 Isa Case Study
25/113
25
-
7/31/2019 Isa Case Study
26/113
26
Repetition of the same activities on the IIS server
One can stop the IIS server at any time, so if you share your PC with your peers or family
members, you should make sure that IIS is up and running.
Click the Start button, Control Panel button, Performance and Maintenance link, Administrative
Tools link, and then double-click the Internet Information Services icon.
Expand the plus sign next to the Internet Information Services icon on the left side of the
window. Expand the plus sign next to the local computer icon, and then expand the Web Sites
icon.
Right-click the Default Web Site icon and make sure that the Start option is grayed out. You can
see how to stop or pause the IIS server.
1. Stop activity screen shot of IIS
-
7/31/2019 Isa Case Study
27/113
27
-
7/31/2019 Isa Case Study
28/113
28
Screen shot of IIS when apache is stopped
-
7/31/2019 Isa Case Study
29/113
29
2. Restart screen shot of IIS
If Apache is started IIS will give an error when started.
-
7/31/2019 Isa Case Study
30/113
30
3. Pinging the server to check that it is live
Instructions
Step 1: In Windows XP, click Start and Run. Then type "cmd" and press Enter.
In Windows Vista, click Start, then type "cmd" and press Enter.
This will open the command prompt window with a black background.
Step 2:Type "ping " and press Enter. A server name can be either a
computer or website name. For example:
ping yahoo.com
Step 3: Read the server IP address. The first line of the ping output contains the server IP
address (in brackets). Below is an example of such a line. The IP address 127.0.0.1.
"Pinging APACHE [127.0.0.1] with 32 bytes of data or
Ping packet internet Gropper you have to ping 172.16.144.192
Step 4: Analyze the ping statistics. The last three lines of the output contain the ping
information. For example: "Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate roundtrip times in milliseconds: Minimum = 67ms, Maximum = 68ms,
Average = 67ms"
Note that shorter roundtrip times mean better connection to a server. A high percentage of lost
packages are an indication of a poor connection.
-
7/31/2019 Isa Case Study
31/113
31
This shows that the server is live after ping the two servers
-
7/31/2019 Isa Case Study
32/113
32
-
7/31/2019 Isa Case Study
33/113
33
This indicates that the servers are live.
This show that the server is live after being test ping
4) Testing that the IIS and APACHE servers are running correctly
Testing the local host URL:http://localhost/localstart
http://localhost/localstarthttp://localhost/localstarthttp://localhost/localstarthttp://localhost/localstart -
7/31/2019 Isa Case Study
34/113
34
-
7/31/2019 Isa Case Study
35/113
35
Internet information services server test page
-
7/31/2019 Isa Case Study
36/113
36
APACHE server test page
-
7/31/2019 Isa Case Study
37/113
37
C) Simple web page created on IIS server
-
7/31/2019 Isa Case Study
38/113
38
d) Configured Logging for Microsoft's IIS version 5 Server
To view the Web Server statistics (hits, pages viewed, etc.) from ShopSite, the server log
format needs to conform to the NCSA format. Follow these steps to set the logging format.
1. Open the Internet Information Services window by clicking Start ProgramsAdministrative Tools Internet Service Manager.
2. Click the plus sign (+) next to your server's name.3. Right click on Default Web Site, then click Properties.4. Ensure that the Enable Logging box is checked.5. Select NCSA Common Log File Format for the Active log format.6. ClickOK
-
7/31/2019 Isa Case Study
39/113
-
7/31/2019 Isa Case Study
40/113
40
#
# The following directives define some format nicknames for use with
# a CustomLog directive (see below).
#
LogFormat "%l %u %t \"%r\" "%{Referer}i\" \"%{User-Agent}i\"" combined
LogFormat "%h %l %u %t \"%r\" %>s %b" common
# You need to enable mod_logio.c to use %I and %O
LogFormat " %l %u %t \"%r\" "%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
-
7/31/2019 Isa Case Study
41/113
41
e) The most common log file formats with their need to have them
h = hostname
l = login name
u = username
t = time
r = request (POST and GET)
s = status
b = bytes (size)
f) How one can achieve the following objectives by logging the web server
activity.
1.
find out who visited your site2. find out what was viewed3. find out when the information was last viewed4. Monitor attempts to access your sites, virtual folders or files.5. Determine whether attempts were made to read and write to your files.
-
7/31/2019 Isa Case Study
42/113
42
g) Tool for analyzing logs (IIS Log Parser)
Log parser installation
-
7/31/2019 Isa Case Study
43/113
43
Log Paser 2.2 setup
Click to finish
installation
-
7/31/2019 Isa Case Study
44/113
44
Running the parser after the installation
-
7/31/2019 Isa Case Study
45/113
45
Demonstrating the usage of parser by pinging which was successful
-
7/31/2019 Isa Case Study
46/113
46
TASK 3 TCP/IP protocals
Network protocol suite
The network Protocol Suite (commonly known as TCP/IP) is the set of communications
protocols used for the Internet and other similar networks. It is named from two of the
most important protocols in it: the Transmission Control Protocol (TCP) and the Internet
Protocol (IP), which were the first two networking protocols defined in this standard.
The network Protocol Suite, like many protocol suites, may be viewed as a set of layers.
Each layer solves a set of problems involving the transmission of data, and provides a
well-defined service to the upper layer protocols based on using services from some
lower layers. Upper layers are logically closer to the user and deal with more abstract
data, relying on lower layer protocols to translate data into forms that can eventually be
transmitted.
TCP/IP protocol system
It is network communication set of rules defining how data transmission takes place
within a network system. Its an industry standard protocol and a layered set of many
protocols that enables communication in different networking environments. It also
enables computers to communicate
across network segments of different platforms.
The TCP/IP model consists of four layers (RFC 1122). From lowest to highest, these
are the Link Layer, the Internet Layer, the Transport Layer, and the Application
Layer.
-
7/31/2019 Isa Case Study
47/113
47
Desirability of TCP/IP standards
Ordered data transfer - the destination host rearranges according to sequencenumber
Retransmission of lost packets - any cumulative stream not acknowledged will beretransmitted discarding duplicate packets.
Error-free data transfer Flow control - limits the rate a sender transfers data to guarantee reliable delivery.
When the receiving host's buffer fills, the next acknowledgement contains a 0 in
the window size, to stop transfer and allow the data in the buffer to be processed.
Congestion control - sliding window. Its an industry standard Its an open protocol that is not controlled by a single organization It contains a set of utilities for connecting dissimilar operating system Its scalable meaning you can expand or shrink the network Its embedded in most modern operating systems
How TCP/IP addresses:
Logical addressing
In a system supporting virtual memory, there may actually not be any physical
memory mapped to a logical address until an access is attempted. The access triggers
special functions of the operating system that reprogram the Memory Management
Unit to map the address to some physical memory, perhaps writing the old contents of
-
7/31/2019 Isa Case Study
48/113
48
that memory to disk and reading back from disk what the memory should contain at
the new logical address. In this case, the logical address may be referred to as a
virtual address.
Routing
A routing protocol specifies how routers communicate with each other,
disseminating information that enables them to select routes between any two
nodes on a computer network, the choice of the route being done by routing
algorithms. Each router has a prior knowledge only of networks attached to it
directly. A routing protocol shares this information first among immediate
neighbors, and then throughout the network. This way, routers gain knowledge of
the topology of the network.
Name service
It enables the look up of a name and information associated with that name. As a
word in a dictionary may have multiple definitions, in a directory, a name may be
associated with multiple, different pieces of information. A directory service is
simply the software system that stores, organizes and provides access to
information in a directory.
A simple directory service called a naming service, maps the names of network
resources to their respective network addresses. With the name service type of
directory, a user doesn't have to remember the physical address of a network
resource; providing a name will locate the resource. Each resource on the network
is considered an object on the directory server. Information about a particular
-
7/31/2019 Isa Case Study
49/113
49
resource is stored as attributes of that object. Information within objects can be
made secure so that only users with the available permissions are able to access it.
Error control and flow control
Error detection
In a typical TCP/IP system, error detection is performed at multiple levels:
Each Ethernet frame carries a CRC-32 checksum. The receiver discardsframes if their checksums do not match.
The IPv4 header contains a header checksum of the contents of the header(excluding the checksum field). Packets with checksums that don't match
are discarded.
The checksum was omitted from the IPv6 header, because most currentlink layer protocols have error detection.
UDP has an optional checksum. Packets with wrong checksums arediscarded.
TCP has a checksum of the payload, TCP header (excluding the checksumfield) and source- and destination addresses of the IP header. Packets
found to have incorrect checksums are discarded and eventually get
retransmitted when the sender receives a triple-ack or a timeout occurs.
Flow control
Flow control is the process of managing the rate of data transmission
between two nodes to prevent a fast sender from overrunning a slow
receiver. It provides a mechanism for the receiver to control the
-
7/31/2019 Isa Case Study
50/113
50
transmission speed, so that the receiving node is not overwhelmed with
data from tranceiving nodes. The transport layer is responsible for making
sure that the sending node and the receiving node are well synchronized.
Application support
This is implemented by the application layer in the TCP/IP protocol that enables
process-to-process communication between connections in a network.
TASK 4 To View cookies settings
In Internet Explorer, click Internet Options on the Tools menu, and then click the
Security tab.
Click the Web content zone you want, and then click Custom Level.
Under Cookies, click the options you want, click OK, and then click OK.
-
7/31/2019 Isa Case Study
51/113
51
-
7/31/2019 Isa Case Study
52/113
52
This window opens to view the cookies click on the view files option.
-
7/31/2019 Isa Case Study
53/113
53
After a click on the view files the above window opens which shows the cookies that are in the
computer.
-
7/31/2019 Isa Case Study
54/113
54
All cookies removed using an appropriate tab at the browser and checking the appropriate file to
view the cookies if any are stored in the hard drive
-
7/31/2019 Isa Case Study
55/113
55
-
7/31/2019 Isa Case Study
56/113
56
3) Screen shots of visit onhttp://www.translink.co.uk/site, msn.com
site,http://www.bonzi.com/ site when prompted to allow cookie settings,
http://www.translink.co.uk/http://www.translink.co.uk/http://www.translink.co.uk/http://www.translink.co.uk/ -
7/31/2019 Isa Case Study
57/113
57
-
7/31/2019 Isa Case Study
58/113
58
4) Cookie setting in the browser and view cookies
-
7/31/2019 Isa Case Study
59/113
59
-
7/31/2019 Isa Case Study
60/113
60
b) Viewing cookies in NETSCAPE MANAGER
-
7/31/2019 Isa Case Study
61/113
61
Removed all the cookies using an appropriate tab at the browser and check
the appropriate file to view the cookies if any are stored on my hard drive.
-
7/31/2019 Isa Case Study
62/113
62
-
7/31/2019 Isa Case Study
63/113
63
Visited these siteshttp://www.translink.co.uk/, msn.com andhttp://www.bonzi.com/.
When prompted, allow cookie setting in NETSCAPE broswer
http://www.translink.co.uk/http://www.translink.co.uk/http://www.translink.co.uk/http://www.bonzi.com/http://www.bonzi.com/http://www.bonzi.com/http://www.bonzi.com/http://www.translink.co.uk/ -
7/31/2019 Isa Case Study
64/113
64
-
7/31/2019 Isa Case Study
65/113
65
-
7/31/2019 Isa Case Study
66/113
66
-
7/31/2019 Isa Case Study
67/113
67
Check cookie setting in the NETSCAPE browser and view cookies.
-
7/31/2019 Isa Case Study
68/113
68
-
7/31/2019 Isa Case Study
69/113
69
c) In Internet Explorer, view history of the sites visited. Delete all the history
and visit new sites and then view history to see new history being built.
Perform the same activities in Netscape browser.
-
7/31/2019 Isa Case Study
70/113
70
-
7/31/2019 Isa Case Study
71/113
71
-
7/31/2019 Isa Case Study
72/113
72
-
7/31/2019 Isa Case Study
73/113
73
SAMPLES WITH NETSCAPE
-
7/31/2019 Isa Case Study
74/113
74
-
7/31/2019 Isa Case Study
75/113
75
-
7/31/2019 Isa Case Study
76/113
76
-
7/31/2019 Isa Case Study
77/113
77
d) Find cookies and the history files on the hard drive and print samples giving as much
explanation as you can.
-
7/31/2019 Isa Case Study
78/113
78
-
7/31/2019 Isa Case Study
79/113
79
-
7/31/2019 Isa Case Study
80/113
80
-
7/31/2019 Isa Case Study
81/113
81
-
7/31/2019 Isa Case Study
82/113
82
Removing cookies
-
7/31/2019 Isa Case Study
83/113
83
-
7/31/2019 Isa Case Study
84/113
84
http://www.translink.co.uk/site when prompted to allow cookie settings in Netscape browser
http://www.translink.co.uk/http://www.translink.co.uk/http://www.translink.co.uk/ -
7/31/2019 Isa Case Study
85/113
85
Msn.com site when prompted to allow cookie settings in Netscape browser
-
7/31/2019 Isa Case Study
86/113
86
http://www.bonzi.com/ site when prompted to allow cookie settings in Netscape browser
-
7/31/2019 Isa Case Study
87/113
87
Viewing cookies after removing the ones stored in the hard drive
-
7/31/2019 Isa Case Study
88/113
88
c) View history of sites visited
Go to favorites center tab (yellow star tool bar), click history.
To remove the cached Internet address entries, clear the History folder.
Close all running instances of Internet Explorer and all browser windows.
In Control Panel, click Internet Options.
Click the General tab, and then click Clear History.
-
7/31/2019 Isa Case Study
89/113
89
Click yes, and then click OK to close the Internet Options dialog box.
-
7/31/2019 Isa Case Study
90/113
90
-
7/31/2019 Isa Case Study
91/113
91
SAMPLES WITH NETSCAPE
-
7/31/2019 Isa Case Study
92/113
92
-
7/31/2019 Isa Case Study
93/113
93
-
7/31/2019 Isa Case Study
94/113
94
-
7/31/2019 Isa Case Study
95/113
95
-
7/31/2019 Isa Case Study
96/113
96
c) Viewing history of sites visited
-
7/31/2019 Isa Case Study
97/113
97
d) Sample of cookies and the history files on the hard drive
-
7/31/2019 Isa Case Study
98/113
98
-
7/31/2019 Isa Case Study
99/113
99
d) finding cookies and the history
-
7/31/2019 Isa Case Study
100/113
100
-
7/31/2019 Isa Case Study
101/113
101
-
7/31/2019 Isa Case Study
102/113
102
e) Privacy implications of different settings for cookies and history
-
7/31/2019 Isa Case Study
103/113
103
f) The various options available for managing digital certificates in both Internet Explorer and
Netscape browser
http://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.html
http://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.htmlhttp://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.htmlhttp://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.html -
7/31/2019 Isa Case Study
104/113
104
g) Various options available under the advanced options in both the browsers. In the Internet
Explorer this option can be found in Internet options under the tools tab, and in the Netscape
browser it can be found in preferences under the tab edit.
-
7/31/2019 Isa Case Study
105/113
105
-
7/31/2019 Isa Case Study
106/113
106
-
7/31/2019 Isa Case Study
107/113
107
Brief descriptions of the advanced options on internet explorer
Accessibility
Option contains functions to do with browser accessibility
Browsing
Contains options to do with browsing operations E.g automatically check for
internet explore updates.
HTTP settings
This option specifies which transfer protocol to use.
Multimedia
This option allows you to set the multimedia settings to use E.g. whether an image
should be resized automatically e.t.c
Printing
This option allows you to set printing preferences e.g. whether to have print outs
with background images or not.
-
7/31/2019 Isa Case Study
108/113
108
-
7/31/2019 Isa Case Study
109/113
109
-
7/31/2019 Isa Case Study
110/113
110
-
7/31/2019 Isa Case Study
111/113
111
-
7/31/2019 Isa Case Study
112/113
112
-
7/31/2019 Isa Case Study
113/113
BIBLIOGRAHY
1. Protocal.com (2009),TCP/IP protocols, retrieved on 4-september from:http://www.protocols.com/pbook/tcpip1.htm
2. Webopedia.com(2009),TCP/IP , retrieved on 4-september from:http://www.webopedia.com/TERM/T/TCP_IP.html
3. Webwizguide.com(2009),INSTALLING-IIS-WINXP, retrieved on 4-september from:http://www.webwizguide.com/kb/asp_tutorials/installing_iis_winXP_pro.asp
4. Microsoft.com (2009),IIS INSTLLATION, retrieved on 4-september from:http://social.msdn.microsoft.com/Search/en-US?query=iis%20installation&ac=8
5. Microsoft.com (2009),TCP, retrieved on 4-september from:http://social.msdn.microsoft.com/Search/en-US?query=tcp%2Fip&ac=8
6. Microsoft.com (2009),WEB SERVICE AND HOSTING, retrieved on 4-september from:http://social.msdn.microsoft.com/Search/en-US?query=web%20service%20hosting&ac=3