Page 186 - Computer_Science_F5
P. 186

Activity 3.10:                         Report  should include  analysis of
                                                         the  key  features,  advantages,  and
                Exploring the Application Layer          disadvantages of each protocol.           Chapter Three: Advanced Computer Networks

               Aim:                                      Document your findings in a portfolio.
          FOR ONLINE READING ONLY
               To understand  the  functions  and
               real-world applications  of common
               application layer protocols.                 Exercise 3.9

               Materials Required:                       1.  Use a network analysis tool such as
               Internet access; Computer or laptop;         Wireshark to capture traffic from a
               Text  editor  or  word processing            web browsing session or simulate
               software; or access to library resources     by using packet tracer. Identify and
               (optional)                                   describe the key components of an
                                                            HTTP request and response. How
               Instructions                                 do these components differ when
               Step 1: Research protocols                   browsing a secure HTTPS site?
               (a) Use reliable Internet sources or      2.  Use any network analyser (such as
                   library materials to research HTTP,      wireshark) to set up an FTP server
                   HTTPS, FTP, SMTP, and DNS.               and client on your local network

               (b) Take notes on each protocol’s            or simulate by using packet tracer.
                   primary function and typical use         Transfer a file using FTP and then
                   cases.                                   using SFTP. Compare the transfer

               Step 2: Analyse features                     process and the security measures
               (a) Look into the detailed features of       in place. What differences do you
                   each protocol.                           observe?
               (b) Compare the advantages and            3.  Configure  an  email  client  with
                   disadvantages of each.                   SMTP, IMAP, and POP3 settings
                                                            for a given email service. Send an
               Step 3: Explore applications                 email and verify its receipt using
               (a) Identify real-world applications that    IMAP and POP3. What are the
                   use these protocols.                     key differences in how emails are
               (b) Document how these applications          handled by IMAP versus POP3?
                   utilize  the  protocols  in  their    4.  How can you explore a Session
                   operations.
                                                            layer and Presentation layer using
               Deliverables:                                network simulation software ( such
               Written  Report summarizing  your            as GNS3 or Packet tracer). Explain
               research on each protocol, including         their role in OSI model, primary
               their primary functions and use cases.       functions and real world examples.


                                                    177
               Student’s Book  Form Five



     Computer Science Form 5.indd   177                                                     23/07/2024   12:33
   181   182   183   184   185   186   187   188   189   190   191