Page 184 - Computer_Science_F5
P. 184

Step 2:  Enter a  web address, such     Application layer security
                        as  www.necta.go.tz. This        (a) Authentication: Ensures that users
                        sends an HTTP GET                   and devices are who they claim
                        request from your computer          to be. Protocols like Kerberos         Chapter Three: Advanced Computer Networks
                        to NECTA’s web server.              and  mechanisms like password
          FOR ONLINE READING ONLY
               Step 3:  Observe     the    server’s         verification are commonly used.
                        response. Note the content
                        that loads on the web            (b) Encryption:  Protects  data  by
                        page. Explain  what you             converting it into a secure format
                        see, focusing on how the            that can only be read by authorised
                        server’s response appears           parties. SSL/TLS (Secure Sockets
                        on your screen.                     Layer/Transport Layer  Security)
               Step 4:  Understand that the web             are widely used for securing web
                        page     from     NECTA’s           communications.
                        server is rendered  on your
                        computer through HTTP at         (c) Data integrity: Ensures that the data
                        the application layer.              sent is the same as the data received.
               Step 5:  Interact with the web page          Techniques like checksums and hash
                        by clicking  on any links,          functions help verify data integrity.
                        filling   forms,   opening       (d) Access control: Regulates who can
                        images,  or accessing  Form         access what resources on a network.
                        VI results. Note how                It involves permissions, user roles,
                        your interactions  generate
                        additional HTTP requests.           and policies that restrict access based
               Step 6:  Open    embedded      links,        on predefined rules.
                        images, or videos that are
                        hosted on different servers.   Application layer in different network
                        Observe how these requests     models
                        are  processed  and  the         (a) OSI model: The application layer
                        content is displayed.               is the seventh layer and interacts
               Step 7:  Close  the  browser to              with the Presentation layer (Layer
                        terminate  your session at          6) and the Session layer (Layer 5)
                        the application layer.              to provide comprehensive end-user

                                                            services.
               Deliverables:
               Written  Report  that  Summarize          (b) TCP/IP model: The application layer
               your observations and explain how            is a broader layer that combines
               the  Application  layer  handles web         the functions of the OSI model’s
               browsing. Include descriptions of the        Application, Presentation, and
               server responses  and the interaction        Session layers, focusing on the
               process, with relevant screenshots and       protocols that applications use to
               diagrams to illustrate your findings.        communicate.


                                                    175
               Student’s Book  Form Five



     Computer Science Form 5.indd   175                                                     23/07/2024   12:33
   179   180   181   182   183   184   185   186   187   188   189