• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36
  37. 37
    37
  38. 38
    38
  39. 39
    39
  40. 40
    40
  41. 41
    41
  42. 42
    42
  43. 43
    43
  44. 44
    44
  45. 45
    45
  46. 46
    46
  47. 47
    47
  48. 48
    48
  49. 49
    49
  50. 50
    50
  51. 51
    51
  52. 52
    52
  53. 53
    53
  54. 54
    54
  55. 55
    55
  56. 56
    56

Coursework 1 (c)Install Apache Web Server on Unix ................................................... p.17Setup Apache Web Server on Unix ................................................

Extracts from this document...

Introduction

CCM2092 Host Operating System and Network Engineering Degree Title: Bachelor of Science (Honours) Computer Networks Student Name: Samuel Kai-tong Cheung Student Number: 2436815 Lecture: Vendeo Leung Assessment: Coursework 1 Campus: Hong Kong SAR Table of content Coursework 1 (a) Lab Report of P2 ................................................................. p.2 Lab Report of P3 ................................................................. p.5 Coursework 1 (b) Network Security Tools ................................................................. p.10 Network Protocol Analyzer ......................................................... p.14 Coursework 1 (c) Install Apache Web Server on Unix ................................................... p.17 Setup Apache Web Server on Unix ................................................ p.19 Startup Apache Web Server ......................................................... p.20 Unix firewall ................................................................ p.21 Security model of Apache ......................................................... p.22 Reference ..................................................................... p.22 Coursework 1 (d) Introduction ................................................................. p.23 Review of TCP ................................................................. p.23 Weakness of Application Protocol .................................................. p.23 Weakness of Application Protocol Design ........................................... p.23 What is BEEP ................................................................. p.24 Characteristic of BEEP ................................................................. p.24 Benefit of BEEP ................................................................. p.24 Disadvantage of BEEP ................................................................. p.24 Application of BEEP ................................................................. p.25 Conclusion ................................................................. p.25 Reference ................................................................. p.25 Coursework 1 (a) Sockets and Pipes Lab Report of P2 This lab has 3 programs, i.e. p2.c, p2_1.c and pipe.c, where p2.c and p2_1.c is a demonstration of socket and pipe.c is demonstration of pipe. Here are the explanations of the programs Program p2.c It is a pipe program. 1 Preprocessor Commands #include <stdio.h> #include <stdlib.h> #include <unistd.h> /* for fork(),pipe()*/ Main Function 10 20 int main() { int orifice[2]; pipe(orifice); /*create a pipe for ipc*/ if (!fork()) { /*create a child*/ close(1); /*father close stdout*/ dup(orifice[1]); close(orifice[0]); execlp("ps", "ps", "-ef", NULL); /*exec cmd*/ } else { close(0); /*child close stdin dup(orifice[0]); close(orifice[1]); execlp("grep", "grep", "httpd", NULL); } } Function of the program The program will create a pipe and fork a child process, then use the child's output to the father's process input. Structure of the program 1. Firstly the program p2.c will create a pipe for interprocess communication; 2. Than it creates a child process; 3. ...read more.

Middle

The program will creates a TCP socket 2. The program will sets the machine address to be "127.0.0.1" and makes the destination port to TCP 6009 3. The program will calls the function 'req' 4. In the program function req, 4.1 The program statement "cnt = read(0, &buf, 1023);" read from the keyboard input into &buf. 4.2 The program statement "write(sockfd, &buf, cnt);" sends out a socket with content from &buf. The destination TCP port is set to 127.0.0.1 and port 6009. 4.3 The program statement "cnt = read(sockfd, &buf, 1024);" is to read a socket. The content is put to &buf. 4.4 The program statement "write(1, &buf, cnt);" is to write the content from &buf onto a screen. Result p3-3c: p3-3s: Conclusion This program allow to calculate the connection between client and server, the program allow show the time connection established on the client. Program s.c , c.c Here is program steaming socket server program s.c 1 Preprocessor Commands 10 /* ** server.c -- a stream socket server demo */ #include <stdio.h> #include <stdlib.h> #include <errno.h> #include <string.h> #include <sys/types.h> #include <netinet/in.h> #include <sys/socket.h> #include <sys/wait.h> Type definitions #define MYPORT 3490 /* the port users will be connecting to */ #define BACKLOG 10 /* how many pending connections queue will hold */ Main Function 20 30 40 50 60 70 80 main() { int sockfd, new_fd; /* listen on sock_fd, new connection on new_fd */ struct sockaddr_in my_addr; /* my address information */ struct sockaddr_in their_addr; /* connector's address information */ int sin_size; if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) { perror("socket"); exit(1); } my_addr.sin_family = AF_INET; /* host byte order */ my_addr.sin_port = htons(MYPORT); /* short, network byte order */ my_addr.sin_addr.s_addr = INADDR_ANY; /* automatically fill with my IP */ bzero(&(my_addr.sin_zero), 8); /* zero the rest of the struct */ if (bind(sockfd, (struct sockaddr *)&my_addr, sizeof(struct sockaddr)) == -1) { perror("bind"); exit(1); } if (listen(sockfd, BACKLOG) ...read more.

Conclusion

Medium Synopsis : A telnet server is listening on the remote port Description : The remote host is running a telnet server. Using telnet is not recommended as logins, passwords and commands are transferred in clear text. An attacker may eavesdrop on a telnet session and obtain the credentials of other users. Solution : Disable this service and use SSH instead Risk factor : Medium / CVSS Base Score : 4 (AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C) Plugin output: Remote telnet banner: ****************************************************** * Asia World-EXPO PCWW INTERNET ROUTER * * Cisco 1841 serial:FHK09293046 * * CPE work order: LINE: VP843479 * ****************************************************** User Access Verification Username: telnet (23/tcp) Info A telnet server seems to be running on this port ssh (22/tcp) Info Remote SSH version : SSH-1.99-Cisco-1.25 general/tcp Info 203.86.133.1 resolves as ip1-133-1.asiaonline.net. telnet (23/tcp) Info The Telnet service is running. This service is dangerous in the sense that it is not ciphered - that is, everyone can sniff the data that passes between the telnet client and the telnet server. This includes logins and passwords. Solution: If you are running a Unix-type system, OpenSSH can be used instead of telnet. For Unix systems, you can comment out the 'telnet' line in /etc/inetd.conf. For Unix systems which use xinetd, you will need to modify the telnet services file in the /etc/xinetd.d folder. After making any changes to xinetd or inetd configuration files, you must restart the service in order for the changes to take affect. In addition, many different router and switch manufacturers support SSH as a telnet replacement. You should contact your vendor for a solution which uses an encrypted session. Risk factor : Low CVE : CVE-1999-0619 ssh (22/tcp) Info An ssh server is running on this port ntp (123/udp) Info A NTP (Network Time Protocol) server is listening on this port. Risk factor : Low http (80/tcp) Info A web server is running on this port general/udp Info For your information, here is the traceroute from 58.177.67.73 to 203.86.133.1 : 58.177.67.73 58.177.67.1 61.244.55.17 61.238.168.53 61.244.232.234 202.40.161.179 210.87.251.163 210.87.255.4 210.87.246.131 210.87.246.4 203.86.133. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    However, since MSI has out sourced its net payroll processing to a third party called ADP. Hence only the gross payroll shall be run and an interface shall be provided to send data to ADP for net payroll processing and deduction of Taxes etc.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    obtaining a mortgage depending on a calculation involving salary, credit worthiness and other details. they have the right to ask the Commissioner to check whether certain processing of their data is being carried out unlawfully. 6/Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal

  1. Smart Card System

    There is no chance of a program corrupting memory through a dangling pointer. c) Multithreaded Java has built-in support for multi-tasking. A java program may create any number of threads, which appear to execute in parallel. d) Dynamic Java is designed to accommodate the fast-paced, modern worlds of software development

  2. System I designed in order to produce a promotion package for her newly formed ...

    Choices made during custom installation may require more or less hard-disk space.) * CD-ROM drive * VGA or higher-resolution monitor; Super VGA recommended * Microsoft Mouse, Microsoft Intellimouse, or compatible pointing device Additional items or services required to use certain features: - * 9600 baud modem; 14,400 or higher-baud modem

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    display the same applications with a User Interface that fits the characteristics of the device. There are three general layers to the WAP, including: the Application layer, Session Layer, and Transport layer. The Application layer includes the Wireless Application Environment (WAE)

  2. Unit 10 Server-side scripting of web pages part 2

    * SATA Connectors o Used for most internal components such as SATA hard drives and SATA optical drives. * 4pin peripheral Molex Connectors o Molex connectors are used for fans, lights and various other internal components. * Floppy connectors o Used to connect floppy disk drives.

  1. Computer Architecture

    into either of its two states and it will stay like that. An example of this could be: A simple light switch; turn it on, it stays on, turn it off, it stays off. Task 9 (D1) Create complex logic circuits made up of arrays of simple logic circuits.

  2. LAN &amp;amp; WAN Protocols

    It works at the physical layer. ADSL uses cooper telephone line rather than the old conventional voiceband modem. It is a full-duplex system. Broadband is an example ADSL transmission. It uses the frequencies which are not used by the voice telephone line. A micro filter allows for this to happen.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work