Isa Case Study

download Isa Case Study

of 113

Transcript of Isa Case Study

  • 7/31/2019 Isa Case Study

    1/113

    1

    TABLE OF CONTENTS

  • 7/31/2019 Isa Case Study

    2/113

  • 7/31/2019 Isa Case Study

    3/113

    3

    2. Differences between desktop publishing and web publishingDesktop publishing Web publishing

    It describes page layout skills, whichinvolve mixing text and graphics to

    produce high quality output for

    commercial printing.

    It deals with organizing WebPageswhich include text, pictures, sound and

    video into a coordinated unit (website)

    and posting it into a web server to render

    them accessible by the world wide web

    users through a Uniform Resource

    Locator (URL).

    You need a Microcomputer and a mouse,

    scanner, laser or inkjet printer and

    desktop publishing software to be able to

    do desktop publishing.

    You need a web server to publish a

    website

    Table 2 Difference between Desktop and Web Publishing

  • 7/31/2019 Isa Case Study

    4/113

    4

    3. Client server architecture and peer-to- peer architectureClient server architecture Peer- topeer architecture

    It is based on a structure where a server(a high performance machine) running on

    one or more server programs hosts all the

    resources and can share the resources

    with the clients (machines

    attached/dependent on the server) upon

    requests.

    In this architecture a machine on thenetwork can simultaneously act as both

    a client and a server, and each has

    equivalent responsibilities and status.

    Server is dedicated for storage and

    managing data.

    All the machines can hold and share

    resources on an equal status

    Clients are able to process data when

    server is not working.

    No control to access the resource

    machine

    Used for both WAN and LAN Used for LAN (local area network)

    Table 3 Compare client/server & peer to peer architechture

    4. Comparing how a caching server differs from a web server

    Caching proxies keep local copies of frequently requested resources, which significantly

    reduces the upstream bandwidth usage to increase performance while a web server

    accepts HTTP requests from clients (user agents such as web browsers), and serves them

    directly with responses.

  • 7/31/2019 Isa Case Study

    5/113

    5

    5. Differences between hosting a site and hosting a web server

    Hosting a site Hosting a web server

    It is to provide space for individuals or

    organizations on a server to allow them

    upload their website to be accessible via

    the world wide web.

    It gives you control over your site. Its

    connected to the internet and is given an

    IP- address. It is secured and monitored

    and its not used for other tasks.

    Table 4 Difference server and web hosting

    6. Main features that differentiate IPv6 and IPv 4IPv6 IPv4

    Has a much larger address space than

    IPv4. It uses a 128-bit address thus

    allows for hierarchical structure of the

    address space and provides enough

    address

    It uses a 32-bit IP address that we

    commonly use

    Can support upto 2128 address to fulfil

    future needs with better security and

    network related features

    Can support up to 232 address

    Has a fixed length header of 40 bytes.IPV6 functionality is built into

    ICMPV6.This allows for faster

    processing

  • 7/31/2019 Isa Case Study

    6/113

    6

    It has enhanced security and Qos features

    for permanent connectivity

    Table 5 Difference of features in IPV6 from IPV4

    TASK 1b

    Feasibility report

    To analyze the web hosting approaches at hand with regard to the project involved

    (medium sized estate agent), consider the pros and cons of the hosting approaches.

    Setting your own web server

    This is an option that gives you control over your site. You need to purchase a suitable

    machine and get connected to the Internet via an ISP and be given a domain name and

    also assigned a static public IP address. IP address is given to computers that can access

    network from anywhere. This machine is dedicated and must be backed up, be secured

    and also be monitored.

    Cost effectiveness

    You need expertise and people who are qualified together with network technicians to

    maintain. This makes it to be expensive, as it also needs very reliable telecommunication

    link.

  • 7/31/2019 Isa Case Study

    7/113

    7

    Dedicated hosting

    A dedicated hosting service is a type of Internet hosting in which the client leases an

    entire server not shared with anyone. This is more flexible than shared hosting, as

    organizations have full control over the server(s), including choice of operating system,

    hardware, etc. In some cases a dedicated server can offer less overhead and a larger

    return on investment. Dedicated servers always offer large amounts of bandwidths

    compared to shared server which translates into faster data transmissions.Cost effectiveness

    This option is not cost effective since the organization is medium sized and does not

    require a dedicated server. This option is ideal for very large organizations with massive

    information traffic.

    Collocated hosting

    In this case you still have to buy a machine and configure it just like setting up your own

    web server but instead of having to install a network connection to your office your ISP

    will house the server for you. ISP that does the co location will place your machine in

    their server room and connect it to their network. This allows you the flexibility of having

    your own server and the benefits of having a very fast network connection.

    Cost effectiveness

    The organization will be required to pay fraction of what a dedicated telecommunication

    line would cost. You have to hire your own web designer to update your website or

    contract an ISP to do so hence make it to be expensive.

  • 7/31/2019 Isa Case Study

    8/113

    8

    Virtual Shared hosting

    Virtual hosting is a method that servers such as web servers use to host more than one

    domain name on the same computer, sometimes on the same IP address.

    Virtual hosting allows a website owner to have a site hosted on a web server that is

    shared with other websites. In simple terms, the virtual hosting company's server will

    allocate out hosting services and bandwidth to more than one website. Virtual web

    hosting is a cheaper hosting option because you won't have to pay for a dedicated server

    to host just your website.

    Virtual web hosting is a good solution for small- to medium-sized (and even some larger)

    websites that aren't constantly being visited or that have reasonable bandwidth needs.

    There are two basic methods of accomplishing virtual hosting: name-based, and IP

    address or IP -based.

    Cost effectiveness

    This option is very cost effective given that the estate agency is a medium sized and

    therefore does not require a high bandwidth considering the amount of data transfer

    involved. Its a cheap way to own a domain because there are no servers to maintain.

    Free hostingA free web hosting service is a web service is free usually advertisement-supported. Free

    web hosts will usually provide a sub domain (yoursite.example.com) or a directory

    (www.example.com/~yourname). In contrast, paid web hosts will usually provide a

    second-level domain along with the hosting (www.yourname.com). Many free hosts do

  • 7/31/2019 Isa Case Study

    9/113

    9

    allow use of separately purchased domains. Rarely, a free host may also operate as a

    domain name registrar.

    Draw back

    The host will only provide a sub domain, which has some limitations, which include

    limited storage.

    The host may also make it conditional that they have their banners and advertisement on

    your website which can compromise on the original objective of you website.

    Recommendation(s)

    Considering the feasibility of the above mentioned web hosting options in terms of cost

    effectiveness and technical appropriateness I would recommend the option ofVirtual Hosting

    since it is both cost effective and technically appropriate for the type of enterprise which is a

    medium sized estate agency.

    TASK 2 Installing the IIS and Apache simultaneously

    Install the IIS server

    If you are running Windows XP Professional on your computer you can install Microsoft's web

    server, Internet Information Server 5.1 (IIS) for free from the Windows XP Pro installation CD

    and configure it to run on your system by following the instructions below: -

  • 7/31/2019 Isa Case Study

    10/113

    10

    1. Place the Windows XP Professional CD-Rom into your CD-Rom Drive.

    2. Open 'Add/Remove Windows Components' found in 'Add/Remove Programs' in the 'Control

    Panel'.

    3. Place a tick in the check box for 'Internet Information Services (IIS)' leaving all the default

    installation settings intact.

    4. Once IIS is installed on your machine you can view your home page in a web browser by

    typing 'http://localhost' (you can substitute 'localhost' for the name of your computer) into the

    address bar of your web browser. If you have not placed your web site into the default directory

    you should now be looking at the IIS documentation.

    5. If you are not sure of the name of your computer right-click on the 'My Computer' icon on

    your desktop, select 'Properties' from the shortcut menu, and click on the 'Computer Name' tab.

    6. Your default web directory to place your web site in is 'C:\Inetpub\wwwroot', but if you don't

    want to over write the IIS documentation found in this directory you can set up your own virtual

    directory through the 'Internet Information Services' console.

    7. The 'Internet Information Services' console can be found in the 'Administration Tools' in the

    'Control Panel' under 'Performance and Maintenance', if you do not have the control panel in

    Classic View.

  • 7/31/2019 Isa Case Study

    11/113

    11

    IIS INSTALLATION SCREEN SHOTS

  • 7/31/2019 Isa Case Study

    12/113

    12

  • 7/31/2019 Isa Case Study

    13/113

    13

  • 7/31/2019 Isa Case Study

    14/113

    14

    APACHE INSTALLATION

  • 7/31/2019 Isa Case Study

    15/113

    15

  • 7/31/2019 Isa Case Study

    16/113

    16

  • 7/31/2019 Isa Case Study

    17/113

    17

  • 7/31/2019 Isa Case Study

    18/113

    18

  • 7/31/2019 Isa Case Study

    19/113

    19

  • 7/31/2019 Isa Case Study

    20/113

    20

    TASK 2 (B) Stop, Restart, activities performed on the servers

  • 7/31/2019 Isa Case Study

    21/113

    21

    1. Stop screen shot of APACHE

  • 7/31/2019 Isa Case Study

    22/113

    22

    2. Restart screen shot of APACHE

    If you try to run apache 2.2 again the following error appears because the IIS is running.

  • 7/31/2019 Isa Case Study

    23/113

    23

  • 7/31/2019 Isa Case Study

    24/113

    24

  • 7/31/2019 Isa Case Study

    25/113

    25

  • 7/31/2019 Isa Case Study

    26/113

    26

    Repetition of the same activities on the IIS server

    One can stop the IIS server at any time, so if you share your PC with your peers or family

    members, you should make sure that IIS is up and running.

    Click the Start button, Control Panel button, Performance and Maintenance link, Administrative

    Tools link, and then double-click the Internet Information Services icon.

    Expand the plus sign next to the Internet Information Services icon on the left side of the

    window. Expand the plus sign next to the local computer icon, and then expand the Web Sites

    icon.

    Right-click the Default Web Site icon and make sure that the Start option is grayed out. You can

    see how to stop or pause the IIS server.

    1. Stop activity screen shot of IIS

  • 7/31/2019 Isa Case Study

    27/113

    27

  • 7/31/2019 Isa Case Study

    28/113

    28

    Screen shot of IIS when apache is stopped

  • 7/31/2019 Isa Case Study

    29/113

    29

    2. Restart screen shot of IIS

    If Apache is started IIS will give an error when started.

  • 7/31/2019 Isa Case Study

    30/113

    30

    3. Pinging the server to check that it is live

    Instructions

    Step 1: In Windows XP, click Start and Run. Then type "cmd" and press Enter.

    In Windows Vista, click Start, then type "cmd" and press Enter.

    This will open the command prompt window with a black background.

    Step 2:Type "ping " and press Enter. A server name can be either a

    computer or website name. For example:

    ping yahoo.com

    Step 3: Read the server IP address. The first line of the ping output contains the server IP

    address (in brackets). Below is an example of such a line. The IP address 127.0.0.1.

    "Pinging APACHE [127.0.0.1] with 32 bytes of data or

    Ping packet internet Gropper you have to ping 172.16.144.192

    Step 4: Analyze the ping statistics. The last three lines of the output contain the ping

    information. For example: "Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),

    Approximate roundtrip times in milliseconds: Minimum = 67ms, Maximum = 68ms,

    Average = 67ms"

    Note that shorter roundtrip times mean better connection to a server. A high percentage of lost

    packages are an indication of a poor connection.

  • 7/31/2019 Isa Case Study

    31/113

    31

    This shows that the server is live after ping the two servers

  • 7/31/2019 Isa Case Study

    32/113

    32

  • 7/31/2019 Isa Case Study

    33/113

    33

    This indicates that the servers are live.

    This show that the server is live after being test ping

    4) Testing that the IIS and APACHE servers are running correctly

    Testing the local host URL:http://localhost/localstart

    http://localhost/localstarthttp://localhost/localstarthttp://localhost/localstarthttp://localhost/localstart
  • 7/31/2019 Isa Case Study

    34/113

    34

  • 7/31/2019 Isa Case Study

    35/113

    35

    Internet information services server test page

  • 7/31/2019 Isa Case Study

    36/113

    36

    APACHE server test page

  • 7/31/2019 Isa Case Study

    37/113

    37

    C) Simple web page created on IIS server

  • 7/31/2019 Isa Case Study

    38/113

    38

    d) Configured Logging for Microsoft's IIS version 5 Server

    To view the Web Server statistics (hits, pages viewed, etc.) from ShopSite, the server log

    format needs to conform to the NCSA format. Follow these steps to set the logging format.

    1. Open the Internet Information Services window by clicking Start ProgramsAdministrative Tools Internet Service Manager.

    2. Click the plus sign (+) next to your server's name.3. Right click on Default Web Site, then click Properties.4. Ensure that the Enable Logging box is checked.5. Select NCSA Common Log File Format for the Active log format.6. ClickOK

  • 7/31/2019 Isa Case Study

    39/113

  • 7/31/2019 Isa Case Study

    40/113

    40

    #

    # The following directives define some format nicknames for use with

    # a CustomLog directive (see below).

    #

    LogFormat "%l %u %t \"%r\" "%{Referer}i\" \"%{User-Agent}i\"" combined

    LogFormat "%h %l %u %t \"%r\" %>s %b" common

    # You need to enable mod_logio.c to use %I and %O

    LogFormat " %l %u %t \"%r\" "%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio

  • 7/31/2019 Isa Case Study

    41/113

    41

    e) The most common log file formats with their need to have them

    h = hostname

    l = login name

    u = username

    t = time

    r = request (POST and GET)

    s = status

    b = bytes (size)

    f) How one can achieve the following objectives by logging the web server

    activity.

    1.

    find out who visited your site2. find out what was viewed3. find out when the information was last viewed4. Monitor attempts to access your sites, virtual folders or files.5. Determine whether attempts were made to read and write to your files.

  • 7/31/2019 Isa Case Study

    42/113

    42

    g) Tool for analyzing logs (IIS Log Parser)

    Log parser installation

  • 7/31/2019 Isa Case Study

    43/113

    43

    Log Paser 2.2 setup

    Click to finish

    installation

  • 7/31/2019 Isa Case Study

    44/113

    44

    Running the parser after the installation

  • 7/31/2019 Isa Case Study

    45/113

    45

    Demonstrating the usage of parser by pinging which was successful

  • 7/31/2019 Isa Case Study

    46/113

    46

    TASK 3 TCP/IP protocals

    Network protocol suite

    The network Protocol Suite (commonly known as TCP/IP) is the set of communications

    protocols used for the Internet and other similar networks. It is named from two of the

    most important protocols in it: the Transmission Control Protocol (TCP) and the Internet

    Protocol (IP), which were the first two networking protocols defined in this standard.

    The network Protocol Suite, like many protocol suites, may be viewed as a set of layers.

    Each layer solves a set of problems involving the transmission of data, and provides a

    well-defined service to the upper layer protocols based on using services from some

    lower layers. Upper layers are logically closer to the user and deal with more abstract

    data, relying on lower layer protocols to translate data into forms that can eventually be

    transmitted.

    TCP/IP protocol system

    It is network communication set of rules defining how data transmission takes place

    within a network system. Its an industry standard protocol and a layered set of many

    protocols that enables communication in different networking environments. It also

    enables computers to communicate

    across network segments of different platforms.

    The TCP/IP model consists of four layers (RFC 1122). From lowest to highest, these

    are the Link Layer, the Internet Layer, the Transport Layer, and the Application

    Layer.

  • 7/31/2019 Isa Case Study

    47/113

    47

    Desirability of TCP/IP standards

    Ordered data transfer - the destination host rearranges according to sequencenumber

    Retransmission of lost packets - any cumulative stream not acknowledged will beretransmitted discarding duplicate packets.

    Error-free data transfer Flow control - limits the rate a sender transfers data to guarantee reliable delivery.

    When the receiving host's buffer fills, the next acknowledgement contains a 0 in

    the window size, to stop transfer and allow the data in the buffer to be processed.

    Congestion control - sliding window. Its an industry standard Its an open protocol that is not controlled by a single organization It contains a set of utilities for connecting dissimilar operating system Its scalable meaning you can expand or shrink the network Its embedded in most modern operating systems

    How TCP/IP addresses:

    Logical addressing

    In a system supporting virtual memory, there may actually not be any physical

    memory mapped to a logical address until an access is attempted. The access triggers

    special functions of the operating system that reprogram the Memory Management

    Unit to map the address to some physical memory, perhaps writing the old contents of

  • 7/31/2019 Isa Case Study

    48/113

    48

    that memory to disk and reading back from disk what the memory should contain at

    the new logical address. In this case, the logical address may be referred to as a

    virtual address.

    Routing

    A routing protocol specifies how routers communicate with each other,

    disseminating information that enables them to select routes between any two

    nodes on a computer network, the choice of the route being done by routing

    algorithms. Each router has a prior knowledge only of networks attached to it

    directly. A routing protocol shares this information first among immediate

    neighbors, and then throughout the network. This way, routers gain knowledge of

    the topology of the network.

    Name service

    It enables the look up of a name and information associated with that name. As a

    word in a dictionary may have multiple definitions, in a directory, a name may be

    associated with multiple, different pieces of information. A directory service is

    simply the software system that stores, organizes and provides access to

    information in a directory.

    A simple directory service called a naming service, maps the names of network

    resources to their respective network addresses. With the name service type of

    directory, a user doesn't have to remember the physical address of a network

    resource; providing a name will locate the resource. Each resource on the network

    is considered an object on the directory server. Information about a particular

  • 7/31/2019 Isa Case Study

    49/113

    49

    resource is stored as attributes of that object. Information within objects can be

    made secure so that only users with the available permissions are able to access it.

    Error control and flow control

    Error detection

    In a typical TCP/IP system, error detection is performed at multiple levels:

    Each Ethernet frame carries a CRC-32 checksum. The receiver discardsframes if their checksums do not match.

    The IPv4 header contains a header checksum of the contents of the header(excluding the checksum field). Packets with checksums that don't match

    are discarded.

    The checksum was omitted from the IPv6 header, because most currentlink layer protocols have error detection.

    UDP has an optional checksum. Packets with wrong checksums arediscarded.

    TCP has a checksum of the payload, TCP header (excluding the checksumfield) and source- and destination addresses of the IP header. Packets

    found to have incorrect checksums are discarded and eventually get

    retransmitted when the sender receives a triple-ack or a timeout occurs.

    Flow control

    Flow control is the process of managing the rate of data transmission

    between two nodes to prevent a fast sender from overrunning a slow

    receiver. It provides a mechanism for the receiver to control the

  • 7/31/2019 Isa Case Study

    50/113

    50

    transmission speed, so that the receiving node is not overwhelmed with

    data from tranceiving nodes. The transport layer is responsible for making

    sure that the sending node and the receiving node are well synchronized.

    Application support

    This is implemented by the application layer in the TCP/IP protocol that enables

    process-to-process communication between connections in a network.

    TASK 4 To View cookies settings

    In Internet Explorer, click Internet Options on the Tools menu, and then click the

    Security tab.

    Click the Web content zone you want, and then click Custom Level.

    Under Cookies, click the options you want, click OK, and then click OK.

  • 7/31/2019 Isa Case Study

    51/113

    51

  • 7/31/2019 Isa Case Study

    52/113

    52

    This window opens to view the cookies click on the view files option.

  • 7/31/2019 Isa Case Study

    53/113

    53

    After a click on the view files the above window opens which shows the cookies that are in the

    computer.

  • 7/31/2019 Isa Case Study

    54/113

    54

    All cookies removed using an appropriate tab at the browser and checking the appropriate file to

    view the cookies if any are stored in the hard drive

  • 7/31/2019 Isa Case Study

    55/113

    55

  • 7/31/2019 Isa Case Study

    56/113

    56

    3) Screen shots of visit onhttp://www.translink.co.uk/site, msn.com

    site,http://www.bonzi.com/ site when prompted to allow cookie settings,

    http://www.translink.co.uk/http://www.translink.co.uk/http://www.translink.co.uk/http://www.translink.co.uk/
  • 7/31/2019 Isa Case Study

    57/113

    57

  • 7/31/2019 Isa Case Study

    58/113

    58

    4) Cookie setting in the browser and view cookies

  • 7/31/2019 Isa Case Study

    59/113

    59

  • 7/31/2019 Isa Case Study

    60/113

    60

    b) Viewing cookies in NETSCAPE MANAGER

  • 7/31/2019 Isa Case Study

    61/113

    61

    Removed all the cookies using an appropriate tab at the browser and check

    the appropriate file to view the cookies if any are stored on my hard drive.

  • 7/31/2019 Isa Case Study

    62/113

    62

  • 7/31/2019 Isa Case Study

    63/113

    63

    Visited these siteshttp://www.translink.co.uk/, msn.com andhttp://www.bonzi.com/.

    When prompted, allow cookie setting in NETSCAPE broswer

    http://www.translink.co.uk/http://www.translink.co.uk/http://www.translink.co.uk/http://www.bonzi.com/http://www.bonzi.com/http://www.bonzi.com/http://www.bonzi.com/http://www.translink.co.uk/
  • 7/31/2019 Isa Case Study

    64/113

    64

  • 7/31/2019 Isa Case Study

    65/113

    65

  • 7/31/2019 Isa Case Study

    66/113

    66

  • 7/31/2019 Isa Case Study

    67/113

    67

    Check cookie setting in the NETSCAPE browser and view cookies.

  • 7/31/2019 Isa Case Study

    68/113

    68

  • 7/31/2019 Isa Case Study

    69/113

    69

    c) In Internet Explorer, view history of the sites visited. Delete all the history

    and visit new sites and then view history to see new history being built.

    Perform the same activities in Netscape browser.

  • 7/31/2019 Isa Case Study

    70/113

    70

  • 7/31/2019 Isa Case Study

    71/113

    71

  • 7/31/2019 Isa Case Study

    72/113

    72

  • 7/31/2019 Isa Case Study

    73/113

    73

    SAMPLES WITH NETSCAPE

  • 7/31/2019 Isa Case Study

    74/113

    74

  • 7/31/2019 Isa Case Study

    75/113

    75

  • 7/31/2019 Isa Case Study

    76/113

    76

  • 7/31/2019 Isa Case Study

    77/113

    77

    d) Find cookies and the history files on the hard drive and print samples giving as much

    explanation as you can.

  • 7/31/2019 Isa Case Study

    78/113

    78

  • 7/31/2019 Isa Case Study

    79/113

    79

  • 7/31/2019 Isa Case Study

    80/113

    80

  • 7/31/2019 Isa Case Study

    81/113

    81

  • 7/31/2019 Isa Case Study

    82/113

    82

    Removing cookies

  • 7/31/2019 Isa Case Study

    83/113

    83

  • 7/31/2019 Isa Case Study

    84/113

    84

    http://www.translink.co.uk/site when prompted to allow cookie settings in Netscape browser

    http://www.translink.co.uk/http://www.translink.co.uk/http://www.translink.co.uk/
  • 7/31/2019 Isa Case Study

    85/113

    85

    Msn.com site when prompted to allow cookie settings in Netscape browser

  • 7/31/2019 Isa Case Study

    86/113

    86

    http://www.bonzi.com/ site when prompted to allow cookie settings in Netscape browser

  • 7/31/2019 Isa Case Study

    87/113

    87

    Viewing cookies after removing the ones stored in the hard drive

  • 7/31/2019 Isa Case Study

    88/113

    88

    c) View history of sites visited

    Go to favorites center tab (yellow star tool bar), click history.

    To remove the cached Internet address entries, clear the History folder.

    Close all running instances of Internet Explorer and all browser windows.

    In Control Panel, click Internet Options.

    Click the General tab, and then click Clear History.

  • 7/31/2019 Isa Case Study

    89/113

    89

    Click yes, and then click OK to close the Internet Options dialog box.

  • 7/31/2019 Isa Case Study

    90/113

    90

  • 7/31/2019 Isa Case Study

    91/113

    91

    SAMPLES WITH NETSCAPE

  • 7/31/2019 Isa Case Study

    92/113

    92

  • 7/31/2019 Isa Case Study

    93/113

    93

  • 7/31/2019 Isa Case Study

    94/113

    94

  • 7/31/2019 Isa Case Study

    95/113

    95

  • 7/31/2019 Isa Case Study

    96/113

    96

    c) Viewing history of sites visited

  • 7/31/2019 Isa Case Study

    97/113

    97

    d) Sample of cookies and the history files on the hard drive

  • 7/31/2019 Isa Case Study

    98/113

    98

  • 7/31/2019 Isa Case Study

    99/113

    99

    d) finding cookies and the history

  • 7/31/2019 Isa Case Study

    100/113

    100

  • 7/31/2019 Isa Case Study

    101/113

    101

  • 7/31/2019 Isa Case Study

    102/113

    102

    e) Privacy implications of different settings for cookies and history

  • 7/31/2019 Isa Case Study

    103/113

    103

    f) The various options available for managing digital certificates in both Internet Explorer and

    Netscape browser

    http://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.html

    http://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.htmlhttp://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.htmlhttp://www.simplysign.co.uk/support/using_outlookexpress5_secure_email.html
  • 7/31/2019 Isa Case Study

    104/113

    104

    g) Various options available under the advanced options in both the browsers. In the Internet

    Explorer this option can be found in Internet options under the tools tab, and in the Netscape

    browser it can be found in preferences under the tab edit.

  • 7/31/2019 Isa Case Study

    105/113

    105

  • 7/31/2019 Isa Case Study

    106/113

    106

  • 7/31/2019 Isa Case Study

    107/113

    107

    Brief descriptions of the advanced options on internet explorer

    Accessibility

    Option contains functions to do with browser accessibility

    Browsing

    Contains options to do with browsing operations E.g automatically check for

    internet explore updates.

    HTTP settings

    This option specifies which transfer protocol to use.

    Multimedia

    This option allows you to set the multimedia settings to use E.g. whether an image

    should be resized automatically e.t.c

    Printing

    This option allows you to set printing preferences e.g. whether to have print outs

    with background images or not.

  • 7/31/2019 Isa Case Study

    108/113

    108

  • 7/31/2019 Isa Case Study

    109/113

    109

  • 7/31/2019 Isa Case Study

    110/113

    110

  • 7/31/2019 Isa Case Study

    111/113

    111

  • 7/31/2019 Isa Case Study

    112/113

    112

  • 7/31/2019 Isa Case Study

    113/113

    BIBLIOGRAHY

    1. Protocal.com (2009),TCP/IP protocols, retrieved on 4-september from:http://www.protocols.com/pbook/tcpip1.htm

    2. Webopedia.com(2009),TCP/IP , retrieved on 4-september from:http://www.webopedia.com/TERM/T/TCP_IP.html

    3. Webwizguide.com(2009),INSTALLING-IIS-WINXP, retrieved on 4-september from:http://www.webwizguide.com/kb/asp_tutorials/installing_iis_winXP_pro.asp

    4. Microsoft.com (2009),IIS INSTLLATION, retrieved on 4-september from:http://social.msdn.microsoft.com/Search/en-US?query=iis%20installation&ac=8

    5. Microsoft.com (2009),TCP, retrieved on 4-september from:http://social.msdn.microsoft.com/Search/en-US?query=tcp%2Fip&ac=8

    6. Microsoft.com (2009),WEB SERVICE AND HOSTING, retrieved on 4-september from:http://social.msdn.microsoft.com/Search/en-US?query=web%20service%20hosting&ac=3