UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
M0937681
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 76 -81
www.iosrjournals.org
Activity level Implementation of Microsoft & Linux Client Access
on Heterogeneous Networks
A
Mir Sajjad Hussain Talpur, B Murtaza Hussain Shaikh, C Riaz Ali Buriro, D
Arif Hussain Soomro
A
Information Technology Centre, Sindh Agriculture University Tandojam (SAU), Tandojam – Pakistan
B
Member IEEE, Oslo, Norway
C
Department of Statistics, Sindh Agriculture University Tandojam (SAU), Tandojam – Pakistan
D
PAF Karachi Institute of Economics & Technology (KIET), Karachi – Pakistan
Abstract : This article will debates to create a Microsoft and Linux clients access secure environment on
heterogeneous networks. The class files are being constructed, where so ever they are necessitate waiving the
huge coding process. The exploit of heterogeneous network in various organizations is becoming more popular
in modern years. This inclination seems to be continued as long as the heterogeneous system meets diverse
needs of software developers. By utilizing new techniques and design of these composite systems are no longer
tricky compared to the past era`s of communication. A heterogeneous network is an environment where
Microsoft and Linux operation systems could work collaboratively and provide effective interactions of
computers, network links. This phenomenon is derived from heterogeneous arrangement of various operating
systems especially Microsoft Windows and Linux is used in different emerging technologies. Therefore, the
purpose of this article is to design and implement a Microsoft and Linux client’s access secure environment on
heterogeneous network and to show the possibility of an activity level environment.
Keywords:Interpretability, Multiplatform, Connectivity, Centralization, Perimeter, Environments,
Configuration.
I. OBJECTIVES
Heterogeneous involves workstation, server and application from any vendors, all-working in a single
unit & interacts between cross platform in the network. The network may also use different media and different
protocols like IPX, and TCP/IP over different network link. The ability to interoperate within heterogeneous
environments is becoming more important as large, complex system from different commercial sources like
Linux and Windows servers configured at one place such are often connect with each other by using different
services in the Ethernet network [1].
Figure 1. Operating Systems rapidly changing the Software business
Security would be major issue to make this multiplatform network succeed. We would implement, ISA
for make this network secure in the early days of networking. A network involves only one type of operating
system, so communication was not an issue. Ensuring the privacy and integrity of all multiplatform information
is vital with today’s for business [3]. As companies use the feasibility & cost effectiveness of Internet to extend
their network to branches offices telecommuters, customers they are deploying their network & which are
typically heterogeneous network [1]. As shown in fig1, the operating systems are rapidly changing the way we
do business. The main objective for this study is to;
a) Integrating of the information and Centralization of network support.
www.iosrjournals.org 76 | Page
2. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks
b) To reduce the deployment & increase control with centralized management & policy enforcement.
c) Lower total cost of ownership by using different operator system in infrastructure.
II. INDICATIONS OF MICROSOFT BASES NETWORK
2.1. SECURED FEATURES IN ISA SERVER
Microsoft internet security and acceleration server integrates firewall and cache features to secure a
network and improve its performance. ISA server routes responses between internet and client computers after
determining if the communication is authentic [2]. As a cache, ISA also stores frequently requested internet sites
so that the objects can be quickly accessed by clients, rather from the internet [2]. Vast numbers of corporate
networks are now connected to the internet and there is a great need of a powerful administer internet gateway
that provides secure connections [8]. Microsoft internet security and ISA server meets these demands by offering
a complete internet connectivity solution that contains both an enterprise firewall and a complete web cache
solution [5]. These services are complementary, we can use either or both of these functions when installing ISA
server secure network, allowing us to implement a business security policy by configuring a broad set of rules
that specify which sites, protocols, and content can be passed through the ISA server computer [14] ,[16] . As
revealed in fig 2, ISA server monitors requests between internet and internal clients, controlling who can get on
the corporate network.
Figure 2. ISA Server functioning [5]
2.2. INTERNET FIREWALL SECURITY ASPECT
In firewall capacity, ISA server allows us to prevent unauthorized internet user from accessing the local
network by examining all incoming data and blocking packets that do not meet a specified security criteria [4].
ISA server combines several security mechanisms to help enforcing security policies at all network layers, as
determined in fig 3. In its function as a cache server, Microsoft internet security and acceleration server improve
network performance by maintaining a cache of frequently request web objects [4], [7].
2.3. DEPLOYMENT SCENARIO AND CONSTRAINTS
Microsoft internet security and acceleration server can be deployed in varied network topologies. This
section describes some typically network configurations [8], [9]. When using Internet security and acceleration
server at the perimeter of our network in the web caching (i.e. sometimes referred to as forward caching) role
occasionally it is necessary to view, remove or validate specific web site URL content within the ISA 2011
cache [6].
Figure 3. Microsoft server frequency of cache objects
The ISA 2011 cache is a dedicated file (i.e. DirX.cdat by extension) that contains the content derived
from web servers. In this article we have tried to demonstrate how to configure and use a tool released by
www.iosrjournals.org 77 | Page
3. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks
Microsoft titled the cache directory tool to view the contents of the ISA2011 cache after visiting a specific
website.
Figure 4. Internal workstation clients route through ISA
Again, for this ISA2011 configuration the focus is on forward caching with ISA2011 at the gateway as
shown in fig 4. Indeed, it is possible to configure the cache in ISA2011 to a specific fixed size as determined in
the fig 5.
Figure 5. Internet access attempts and IP configuration
III. INDICATIONS OF LINUX BASES NETWORK
3.1. INDICATION OF FILE SERVER
A file server differs from a personal computer in that the server is dedicated to storing files in a
centralized location while permitting access to networked computers [10]. By having a file server, users can save
work and have access to files without having to carry around a disk. Access privileges can be restricted to guests
and registered users [9]. Meanwhile, a centralized location means once place to backup all files. The file servers
allow networked computers to share files at their discretion. On a personal file server, we can restrict access
privileges to guests and registered users. This is the most common type of server in small businesses. A file
server enables all files to be stored in a central location, which accommodates centralized backup strategies and
security implementation [11]. Linux works great as a network file server. Linux includes software called
“samba” that allows files on the server to be viewed and edited on any Windows or Macintosh computer [8].
3.2. BENEFITS OF NETWORK SERVER
Files on the network server are backed up on a regular basis. If we inadvertently deleted an important
file, it can be retrieved from the back up tape [4]. In addition, if we have a hard drive failure the files we saved on
the network server will not be affected [13]. Files can be shared with others. Several people may be working on a
document and storing the file in a shared directory allows each person to directly work on the document as
needed [14], [15].
IV. INDULGENT OF FTP SERVER
FTP servers are still the most common way to make directories of documents and software available to
the public over the internet [1]. File-sharing applications are excellent tool for sharing files over a private
network [13]. For organizations that need to share large numbers of files over public networks, however, FTP
server software provides more robust tools for sharing files and protecting our computer systems [15]. FTP
servers in Linux draw on FTP features that have resulted from years of testing and experience gained from other
UNIX versions of FTP [14].
www.iosrjournals.org 78 | Page
4. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks
a) FTP was originally used on multi-user systems, only limited parts of the file system in SENTOS and
RHEL are devoted to public FTP access. Those who access FTP from a public user account. From there,
anonymous user can access only files and directories below that point in the file system [12].
b) FTP relies on a login process that uses standard UNIX login names. Although strangers to the system
could log in using anonymous as a user name, users with their own accounts on the system could log in with
their own user names through FTP and most likely have access to a greater part of the file system [12].
4.1. SAMBA SECURE SERVER RETRIEVAL
Users want to integrate their Microsoft style desktop machines with their UNIX servers and others
want to replace protocols like NFS and Novell NCP, especially when used with desktop computers [16]. The
SMB server to provide access to LAN manager-style services to SMB clients [15]. FTP like SMB client so we
can access system resources from UNIX, NetWare and other operating systems [15]. A limited command line tool
that supports some of administrative functionality could also be used on samba and NT workstation [11].
4.2. IMPRESSION OF APACHE SERVER
Apache is powerful server implements the latest protocols and extensible with third-party modules. It
can be customized by writing, modules license of UNIX and several other operating systems [11]. Bugs reports
and patches implements many frequently requested features; including the database management for
unauthorized allow to us easily setup password-protect pages with enormous numbers of authorized users,
without bogging down the server [10]. Customize responses to errors and problems. Allows the setup files, or
even CGI scripts, which are returned by the server in response to errors and self stocks multiple directory index
[6]. Apache has no fixed limit on the numbers of aliases which may be declared in the configuration files. In
addition, a powerful rewriting engine can be used to solve most URL manipulation problems [2].
4.3. VIRTUAL HOSTING
Virtual hosting allows the server to distinguish between different IP addresses or names. Apache also
offer dynamically configurable mass-virtual hosting [16]. We could configure apache to generate logs. Apache
can send log files to a pipe, allowing for filtering, real-time splitting of multiple hosts into separate logs [15]. The
about apache explain how the apache project evolved from its beginnings as an outgrowth of the http project to
its current status as one of the fastest, most efficient and most functional web servers in existence [5], [12].
4.4. DHCP HOST CONFIGURATIONS
We are probably interested in automating as much of the routine maintenance as possible. As the
network grows this becomes particularly important [12], [16]. When a new computer is added to our network or
when a new employee joins an organization, we need to make configuration changes [1]. The IP has enabled
network functionality that could scarcely be imagined when IP was first developed. In order for our network
client and servers to take advantage of the numerous IP network services, software, and devices, each of our
clients’ needs an IP address. In most cases, it's because that LAN is connected to a server that is set up to do
DHCP [3]. Linux and Windows systems are set up by default to look for a DHCP server on all Ethernet cards. If
the ISP has configured a DHCP server, we can be on the internet faster than we can open Web browser. Setting
up a DHCP server enables us to centrally manage the addresses and other network information for client
computers on our private network [9]. With DHCP configured on our network, a client computer can simply
indicate that it wants to use DHCP and the DHCP server can provide its IP address, network mask, DNS server,
NetBIOS server, router and other information needed to get up and running on the network. With DHCP, we can
greatly simplify the initial network configuration that each client computer on our network needs to do [7].
Later, as a network evolves, we can easily update that information, having changes automatically picked up by
clients when they restart their network interfaces [7].
V. CONCLUSION
This paper describes the implementation of heterogeneous environment which was relying on
Microsoft and Linux clients’ access secure environment on heterogeneous network facilitates more security
features using effective network and its related emerging technologies. In heterogeneous environment we can
easily create the objects, and active server pages. They can be used everywhere; if the change is to be appearing
then change would be just made in the single file. This heterogeneous environment experiments are done
through the Microsoft and Linux environment was successfully implemented and show the possibility of an
activity level environment.
www.iosrjournals.org 79 | Page
5. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks
APPENDIX –A (PARAMETERS OF SAMBA SERVER)
[Global]
Workgroup = OPENNA
Server string = R&D of Open Network Architecture Samba Server
Encrypt passwords = True
Security = user
smb passwd file = /etc/smbpasswd
Log file = /var/log/samba/log.%m
Socket options = IPTOS_LOWDELAY TCP_NODELAY
Domain master = Yes
Local master = Yes
Preferred master = Yes
OS level = 65
DNS proxy = No
Name resolve order = lmhosts host bcast
Bind interfaces only = True
Interfaces = eth0 192.168.1.1
Hosts deny = ALL
Hosts allow = 192.168.1.4 127.0.0.1
Debug level = 1
Create mask = 0644
Directory mask = 0755
Level2 oplocks = True
Read raw = no
Write cache size = 262144
[Homes]
Comment = Home Directories
Browseable = no
Read only = no
Invalid users = root bin daemon nobody named sys tty disk mem kmem users
[tmp]
Comment = Temporary File Space
Path = /tmp
Read only = No
Valid users = admin
APPENDIX –B (PARAMETERS OF FTP SERVER)
1. The first step is to login as root in Linux server.
2. Next send this command: yum install tftp-server
3. Once the installation completes, send this command: nano /etc/xinetd.d/tftp
4. When you open this file it will look like this;
# default: off
# Description: The tftp server serves files using the trivial file transfer
# Protocol: The tftp protocol is often used to boot diskless
# Workstations, download configuration files to network-aware printers, and to start the installation process for some operating systems.
Service tftp {
Socket_type = dgram
Protocol = udp
Wait = yes
User = root
Server = /usr/sbin/in.tftpd
Server_args = -s /tftpboot
Disable = yes
Per_source = 11
Cps = 100 2
Flags = IPv4 }
5. Change disable = yes to disable = no to enable the tftp server
6. Note that your server is enabled; it’s time to start it. Use this command to start running the TFTP server: /sbin/service xinetd start
7. You will see: Starting xinetd: [OK]
8. Your TFTP server is up and running. You want to find out where is your TFTP root directory is located. Usually the path of the root
directory is at /tftpboot So type this command: ls /
9. You will see it in the root directory. Now we create a test file to make sure it works. So send this command: touch /tftpboot/test
10. Now that you created the file, you can connect to your FTFP server with this command:
tftp localhost
tftp> get test
tftp> quit
11. If you want to connect to your server remotely. Open a DOS console/terminal and enter this command: tftp 172.16.20.1 GET test
www.iosrjournals.org 80 | Page
6. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks
REFERENCES
[1] Mahbubul, Ramjee Prasad, and John R. Farserotu. "Quality of service among IP-based heterogeneous networks." Personal
Communications, IEEE 8.6 (2009): 18-24.Denmark.
[2] Hensgen, Debra A., et al. "An overview of MSHN: The management system for heterogeneous networks." Heterogeneous Computing
Workshop, 2000.(HCW'2K) Proceedings. Eighth. IEEE, 2008.
[3] Dutta, Ashutosh, et al. "Seamless proactive handover across heterogeneous access networks." Wireless Personal Communications 43.3
(2007): 837-855.
[4] O’Hanlon, T., (2011) "Quality Auditing for ISO 9001-2010: Making Compliance Value-Added". American Society for Quality.USA.
[5] Smith, John R., Rakesh Mohan, and Chung-Sheng Li. "Transcoding internet content for heterogeneous client devices." Circuits and
Systems, 2010. ISCAS, Proceedings of the 2010 IEEE International Symposium on. Vol. 3. IEEE, 2010.India.
[6] Fu, Cheng Peng, and Soung C. Liew. "TCP Veno: TCP enhancement for transmission over wireless access networks." Selected Areas
in Communications, IEEE Journal on 21.2 (2005): 216-228.
[7] Lim, Mario. "Integrating heterogeneous authentication and authorization mechanisms into an application access control system." U.S.
Patent No. 6,728,884. 27 Apr. 2006.
[8] Tian, Ye, Kai Xu, and Nirwan Ansari. "TCP in wireless environments: problems and solutions." Communications Magazine, IEEE
43.3 (2007): S27-S32.
[9] Akyildiz, Ian F., Xudong Wang, and Weilin Wang. "Wireless mesh networks: a survey." Computer networks 47.4 (2008): 445-487.
[10] C. Thompson, 25 Ideas for 2010: Digital Forgetting, Wired UK,November 2010.
[11] Cappiello, M., A. Floris, and L. Veltri. "Mobility amongst heterogeneous networks with AAA support." Communications, 2009. ICC
2009. IEEE International Conference on. Vol. 4. IEEE, 2009.
[12] Jonathan Grudin (2002) ”Why groupware applications fail: Problems in design and evaluation. Office: Technology and People”,
4(3):245-264, June 2002. France.
[13] Wayner, P., 2006, Free for All: How Linux and the Free Software Movement Undercut the High- Tech Titans (Harper Collins, New
York).USA
[14] Droms, Ralph E. "Access to heterogeneous directory services." INFOCOM'01. Annual Joint Conference of the IEEE Computer and
Communication Societies.'The Multiple Facets of Integration'. Proceedings., IEEE , 2001.
[15] Jack J. Dongarra, Rolf Hempel, Anthony J. G. Hey, and David W.Walker. "A Proposal for a User-Level, Message-Passing Interface in
a Distributed Memory Environment", Technical Report ORNL/TM,Ridge National Laboratory, 1999.USA.
[16] D. Cheriton, "The V Distributed System", Comm. ACM, Vol. 31, No. 3, pp. 314-333, March 2008.Newzealand.
www.iosrjournals.org 81 | Page