• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36
  37. 37
    37
  38. 38
    38
  39. 39
    39
  40. 40
    40
  41. 41
    41
  42. 42
    42
  43. 43
    43
  44. 44
    44
  45. 45
    45
  46. 46
    46
  47. 47
    47
  48. 48
    48
  49. 49
    49
  50. 50
    50
  51. 51
    51
  52. 52
    52
  53. 53
    53
  54. 54
    54
  55. 55
    55
  56. 56
    56

Coursework 1 (c)Install Apache Web Server on Unix ................................................... p.17Setup Apache Web Server on Unix ................................................

Extracts from this document...

Introduction

CCM2092 Host Operating System and Network Engineering Degree Title: Bachelor of Science (Honours) Computer Networks Student Name: Samuel Kai-tong Cheung Student Number: 2436815 Lecture: Vendeo Leung Assessment: Coursework 1 Campus: Hong Kong SAR Table of content Coursework 1 (a) Lab Report of P2 ................................................................. p.2 Lab Report of P3 ................................................................. p.5 Coursework 1 (b) Network Security Tools ................................................................. p.10 Network Protocol Analyzer ......................................................... p.14 Coursework 1 (c) Install Apache Web Server on Unix ................................................... p.17 Setup Apache Web Server on Unix ................................................ p.19 Startup Apache Web Server ......................................................... p.20 Unix firewall ................................................................ p.21 Security model of Apache ......................................................... p.22 Reference ..................................................................... p.22 Coursework 1 (d) Introduction ................................................................. p.23 Review of TCP ................................................................. p.23 Weakness of Application Protocol .................................................. p.23 Weakness of Application Protocol Design ........................................... p.23 What is BEEP ................................................................. p.24 Characteristic of BEEP ................................................................. p.24 Benefit of BEEP ................................................................. p.24 Disadvantage of BEEP ................................................................. p.24 Application of BEEP ................................................................. p.25 Conclusion ................................................................. p.25 Reference ................................................................. p.25 Coursework 1 (a) Sockets and Pipes Lab Report of P2 This lab has 3 programs, i.e. p2.c, p2_1.c and pipe.c, where p2.c and p2_1.c is a demonstration of socket and pipe.c is demonstration of pipe. Here are the explanations of the programs Program p2.c It is a pipe program. 1 Preprocessor Commands #include <stdio.h> #include <stdlib.h> #include <unistd.h> /* for fork(),pipe()*/ Main Function 10 20 int main() { int orifice[2]; pipe(orifice); /*create a pipe for ipc*/ if (!fork()) { /*create a child*/ close(1); /*father close stdout*/ dup(orifice[1]); close(orifice[0]); execlp("ps", "ps", "-ef", NULL); /*exec cmd*/ } else { close(0); /*child close stdin dup(orifice[0]); close(orifice[1]); execlp("grep", "grep", "httpd", NULL); } } Function of the program The program will create a pipe and fork a child process, then use the child's output to the father's process input. Structure of the program 1. Firstly the program p2.c will create a pipe for interprocess communication; 2. Than it creates a child process; 3. ...read more.

Middle

The program will creates a TCP socket 2. The program will sets the machine address to be "127.0.0.1" and makes the destination port to TCP 6009 3. The program will calls the function 'req' 4. In the program function req, 4.1 The program statement "cnt = read(0, &buf, 1023);" read from the keyboard input into &buf. 4.2 The program statement "write(sockfd, &buf, cnt);" sends out a socket with content from &buf. The destination TCP port is set to 127.0.0.1 and port 6009. 4.3 The program statement "cnt = read(sockfd, &buf, 1024);" is to read a socket. The content is put to &buf. 4.4 The program statement "write(1, &buf, cnt);" is to write the content from &buf onto a screen. Result p3-3c: p3-3s: Conclusion This program allow to calculate the connection between client and server, the program allow show the time connection established on the client. Program s.c , c.c Here is program steaming socket server program s.c 1 Preprocessor Commands 10 /* ** server.c -- a stream socket server demo */ #include <stdio.h> #include <stdlib.h> #include <errno.h> #include <string.h> #include <sys/types.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/wait.h> Type definitions #define MYPORT 3490 /* the port users will be connecting to */ #define BACKLOG 10 /* how many pending connections queue will hold */ Main Function 20 30 40 50 60 70 80 main() { int sockfd, new_fd; /* listen on sock_fd, new connection on new_fd */ struct sockaddr_in my_addr; /* my address information */ struct sockaddr_in their_addr; /* connector's address information */ int sin_size; if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) { perror("socket"); exit(1); } my_addr.sin_family = AF_INET; /* host byte order */ my_addr.sin_port = htons(MYPORT); /* short, network byte order */ my_addr.sin_addr.s_addr = INADDR_ANY; /* automatically fill with my IP */ bzero(&(my_addr.sin_zero), 8); /* zero the rest of the struct */ if (bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr)) == -1) { perror("bind"); exit(1); } if (listen(sockfd, BACKLOG) ...read more.

Conclusion

Medium Synopsis : A telnet server is listening on the remote port Description : The remote host is running a telnet server. Using telnet is not recommended as logins, passwords and commands are transferred in clear text. An attacker may eavesdrop on a telnet session and obtain the credentials of other users. Solution : Disable this service and use SSH instead Risk factor : Medium / CVSS Base Score : 4 (AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C) Plugin output: Remote telnet banner: ****************************************************** * Asia World-EXPO PCWW INTERNET ROUTER * * Cisco 1841 serial:FHK09293046 * * CPE work order: LINE: VP843479 * ****************************************************** User Access Verification Username: telnet (23/tcp) Info A telnet server seems to be running on this port ssh (22/tcp) Info Remote SSH version : SSH-1.99-Cisco-1.25 general/tcp Info 203.86.133.1 resolves as ip1-133-1.asiaonline.net. telnet (23/tcp) Info The Telnet service is running. This service is dangerous in the sense that it is not ciphered - that is, everyone can sniff the data that passes between the telnet client and the telnet server. This includes logins and passwords. Solution: If you are running a Unix-type system, OpenSSH can be used instead of telnet. For Unix systems, you can comment out the 'telnet' line in /etc/inetd.conf. For Unix systems which use xinetd, you will need to modify the telnet services file in the /etc/xinetd.d folder. After making any changes to xinetd or inetd configuration files, you must restart the service in order for the changes to take affect. In addition, many different router and switch manufacturers support SSH as a telnet replacement. You should contact your vendor for a solution which uses an encrypted session. Risk factor : Low CVE : CVE-1999-0619 ssh (22/tcp) Info An ssh server is running on this port ntp (123/udp) Info A NTP (Network Time Protocol) server is listening on this port. Risk factor : Low http (80/tcp) Info A web server is running on this port general/udp Info For your information, here is the traceroute from 58.177.67.73 to 203.86.133.1 : 58.177.67.73 58.177.67.1 61.244.55.17 61.238.168.53 61.244.232.234 202.40.161.179 210.87.251.163 210.87.255.4 210.87.246.131 210.87.246.4 203.86.133. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    You can also control the financial system of third-party providers. The System calculates the gross and net pay, which comprises the individual payments and deductions that are calculated during a payroll period, and are received by an employee. These payments and deductions are included in the calculation of the remuneration using different wage types.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    * they can prevent processing for direct marketing purposes, so anyone can stop the arrival of personalised junk mail by writing to the data controller. * they are entitled to be informed of the logic used in automated decision making, e.g.

  1. System I designed in order to produce a promotion package for her newly formed ...

    � Word might be printing a draft of your text. On the Tools menu, click Options, and then click the Print tab. Clear the Draft output check box. � The font in your document might not be available on the printer you're using.

  2. Unit 10 Server-side scripting of web pages part 2

    * SATA Connectors o Used for most internal components such as SATA hard drives and SATA optical drives. * 4pin peripheral Molex Connectors o Molex connectors are used for fans, lights and various other internal components. * Floppy connectors o Used to connect floppy disk drives.

  1. Computer Architecture

    Until you get 4 full adder's each following on from the last carry out. The way a full adder works: The circuit adds two bits Input A and Input B, taking into account the previous carry in, to give the Sum, and the carry out.

  2. LAN &amp;amp; WAN Protocols

    Synchronous & Asynchronous is both supported by this standard. This standard and states the number of control circuits that can be or need to be used to connect the DCE & DTE terminal with one another. Data and control circuits which are signalled from a DTE connected to a DCE or vice versa will always flow and operate in one direction this is called half duplex.

  1. Free essay

    Setting up and E-Commerce Site

    Promoting the business is very important. Setting up the website is going to be costly and we need to have a vast array of things that needs to be done to it, these range from security packages, encryption, to the likes of search engine optimisation.

  2. supermarket database-computer coursework

    email is used, your customers can get the most update news of your product, at once the computer will remind you when your product is expired, so you can make preparations you can communicate the computer form one branch store to another.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work