Information Technology - Tcp/http Bridge
Essay by biki90 • April 10, 2017 • Essay • 9,856 Words (40 Pages) • 1,196 Views
Project Title: TCP/HTTP Bridge
ITIS 3110 Lab Section 03
Team #!SheBang
Team # 2
2015-Dec-03
Team Name : #!Shebang
Project Title: TCP/HTTP BRIDGE
Team Members
Baral, Bikash
Bergeron, Carlton
Cooper, Miriam
Dabestani, Jordan
Marzouq, Murtadha
Mohamud, Guled*
Table of Contents
- Preface : . . . . . . . . . 3
- Overview . . . . . . . . . 3
- Table of Contents
- Requirements
- From ITIS 2110
- SMTP (Simple Mail Transport Protocol) . . . . . 5
- TCP/IP (Transmission Control Protocol) . . . . . 6
- From ITIS 3110
- NTP (Network Time Protocol) service . . . . . 7
- Scripts (using Bash, Powershell, Perl) . . . . . 8
- One New Element
- SQL server (Microsoft SQL Server 2008) . . . . . 11
- Security Implementation or feature
- TCP Bridge . . . . . . . . 13
- Deliverables
1. HTTP ( Hypertext Transfer Protocol ) . . . . . . 14
2. TCP ( Transmission Control Protocol ) . . . . . . 14
3. Five Web Services
- Get Time . . . . . . . 15
- Send Mail . . . . . . . 17
- Execute CMD . . . . . . . 18
- Check Credentials . . . . . . . 19
- Execute SQL . . . . . . . 20
C. Required Equipment for the project . . . . . . 21
- Raspberry PI to hold the TCP Bridge
- Windows Machine to hold the MSSQL (Microsoft SQL server 2008) database and Web Server
IV. Summary . . . . . . . . . . 21
V. Definitions . . . . . . . . . . 21
VI. Appendix . . . . . . . . . . 25
VII. References . . . . . . . . . . 29
VIII. Acknowledgement . . . . . . . . . 29
Preface:
Special thanks to Professor Tony Kombol whom has given his students an opportunity to learn some real life infrastructure systems problems by giving us hands-on experience in our lab. Things such as installing and configuring hardware and software to our Raspberry Pi, Debian, and CentOS have helped greatly. He supplied different scenarios such as when creating bash scripts (how to change the owner’s or group’s permissions, command line arguments, or expressions for validation), how to install NTP (to get real time) and system maintenance (network and system auditing to validate if the system is prone to malicious attacks). Our team took several pieces of what we have learned and tied them all together to accomplish our goal for our project. We also encountered challenges setting up different phases of our project, however, from the skills we have as a group, we were able to identify and analyze the best resolution. Each member of our team brought their own unique set of skills to our current project. Though we have decided to challenge ourselves for the task at hand, we are more than confident we are capable of obtaining the results we seek.
...
...