Page 186 - Computer_Science_F5
P. 186
Activity 3.10: Report should include analysis of
the key features, advantages, and
Exploring the Application Layer disadvantages of each protocol. Chapter Three: Advanced Computer Networks
Aim: Document your findings in a portfolio.
FOR ONLINE READING ONLY
To understand the functions and
real-world applications of common
application layer protocols. Exercise 3.9
Materials Required: 1. Use a network analysis tool such as
Internet access; Computer or laptop; Wireshark to capture traffic from a
Text editor or word processing web browsing session or simulate
software; or access to library resources by using packet tracer. Identify and
(optional) describe the key components of an
HTTP request and response. How
Instructions do these components differ when
Step 1: Research protocols browsing a secure HTTPS site?
(a) Use reliable Internet sources or 2. Use any network analyser (such as
library materials to research HTTP, wireshark) to set up an FTP server
HTTPS, FTP, SMTP, and DNS. and client on your local network
(b) Take notes on each protocol’s or simulate by using packet tracer.
primary function and typical use Transfer a file using FTP and then
cases. using SFTP. Compare the transfer
Step 2: Analyse features process and the security measures
(a) Look into the detailed features of in place. What differences do you
each protocol. observe?
(b) Compare the advantages and 3. Configure an email client with
disadvantages of each. SMTP, IMAP, and POP3 settings
for a given email service. Send an
Step 3: Explore applications email and verify its receipt using
(a) Identify real-world applications that IMAP and POP3. What are the
use these protocols. key differences in how emails are
(b) Document how these applications handled by IMAP versus POP3?
utilize the protocols in their 4. How can you explore a Session
operations.
layer and Presentation layer using
Deliverables: network simulation software ( such
Written Report summarizing your as GNS3 or Packet tracer). Explain
research on each protocol, including their role in OSI model, primary
their primary functions and use cases. functions and real world examples.
177
Student’s Book Form Five
Computer Science Form 5.indd 177 23/07/2024 12:33

