Page 184 - Computer_Science_F5
P. 184
Step 2: Enter a web address, such Application layer security
as www.necta.go.tz. This (a) Authentication: Ensures that users
sends an HTTP GET and devices are who they claim
request from your computer to be. Protocols like Kerberos Chapter Three: Advanced Computer Networks
to NECTA’s web server. and mechanisms like password
FOR ONLINE READING ONLY
Step 3: Observe the server’s verification are commonly used.
response. Note the content
that loads on the web (b) Encryption: Protects data by
page. Explain what you converting it into a secure format
see, focusing on how the that can only be read by authorised
server’s response appears parties. SSL/TLS (Secure Sockets
on your screen. Layer/Transport Layer Security)
Step 4: Understand that the web are widely used for securing web
page from NECTA’s communications.
server is rendered on your
computer through HTTP at (c) Data integrity: Ensures that the data
the application layer. sent is the same as the data received.
Step 5: Interact with the web page Techniques like checksums and hash
by clicking on any links, functions help verify data integrity.
filling forms, opening (d) Access control: Regulates who can
images, or accessing Form access what resources on a network.
VI results. Note how It involves permissions, user roles,
your interactions generate
additional HTTP requests. and policies that restrict access based
Step 6: Open embedded links, on predefined rules.
images, or videos that are
hosted on different servers. Application layer in different network
Observe how these requests models
are processed and the (a) OSI model: The application layer
content is displayed. is the seventh layer and interacts
Step 7: Close the browser to with the Presentation layer (Layer
terminate your session at 6) and the Session layer (Layer 5)
the application layer. to provide comprehensive end-user
services.
Deliverables:
Written Report that Summarize (b) TCP/IP model: The application layer
your observations and explain how is a broader layer that combines
the Application layer handles web the functions of the OSI model’s
browsing. Include descriptions of the Application, Presentation, and
server responses and the interaction Session layers, focusing on the
process, with relevant screenshots and protocols that applications use to
diagrams to illustrate your findings. communicate.
175
Student’s Book Form Five
Computer Science Form 5.indd 175 23/07/2024 12:33

