SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 76 -81
www.iosrjournals.org

Activity level Implementation of Microsoft & Linux Client Access
                   on Heterogeneous Networks
  A
      Mir Sajjad Hussain Talpur, B Murtaza Hussain Shaikh, C Riaz Ali Buriro, D
                              Arif Hussain Soomro
      A
          Information Technology Centre, Sindh Agriculture University Tandojam (SAU), Tandojam – Pakistan
                                             B
                                               Member IEEE, Oslo, Norway
            C
              Department of Statistics, Sindh Agriculture University Tandojam (SAU), Tandojam – Pakistan
                   D
                     PAF Karachi Institute of Economics & Technology (KIET), Karachi – Pakistan

 Abstract : This article will debates to create a Microsoft and Linux clients access secure environment on
heterogeneous networks. The class files are being constructed, where so ever they are necessitate waiving the
huge coding process. The exploit of heterogeneous network in various organizations is becoming more popular
in modern years. This inclination seems to be continued as long as the heterogeneous system meets diverse
needs of software developers. By utilizing new techniques and design of these composite systems are no longer
tricky compared to the past era`s of communication. A heterogeneous network is an environment where
Microsoft and Linux operation systems could work collaboratively and provide effective interactions of
computers, network links. This phenomenon is derived from heterogeneous arrangement of various operating
systems especially Microsoft Windows and Linux is used in different emerging technologies. Therefore, the
purpose of this article is to design and implement a Microsoft and Linux client’s access secure environment on
heterogeneous network and to show the possibility of an activity level environment.
 Keywords:Interpretability, Multiplatform, Connectivity, Centralization, Perimeter, Environments,
Configuration.

                                                 I.      OBJECTIVES
          Heterogeneous involves workstation, server and application from any vendors, all-working in a single
unit & interacts between cross platform in the network. The network may also use different media and different
protocols like IPX, and TCP/IP over different network link. The ability to interoperate within heterogeneous
environments is becoming more important as large, complex system from different commercial sources like
Linux and Windows servers configured at one place such are often connect with each other by using different
services in the Ethernet network [1].




                                   Figure 1. Operating Systems rapidly changing the Software business

          Security would be major issue to make this multiplatform network succeed. We would implement, ISA
for make this network secure in the early days of networking. A network involves only one type of operating
system, so communication was not an issue. Ensuring the privacy and integrity of all multiplatform information
is vital with today’s for business [3]. As companies use the feasibility & cost effectiveness of Internet to extend
their network to branches offices telecommuters, customers they are deploying their network & which are
typically heterogeneous network [1]. As shown in fig1, the operating systems are rapidly changing the way we
do business. The main objective for this study is to;
          a) Integrating of the information and Centralization of network support.

                                               www.iosrjournals.org                                      76 | Page
Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks

         b) To reduce the deployment & increase control with centralized management & policy enforcement.
         c) Lower total cost of ownership by using different operator system in infrastructure.

                        II.      INDICATIONS OF MICROSOFT BASES NETWORK
2.1. SECURED FEATURES IN ISA SERVER
          Microsoft internet security and acceleration server integrates firewall and cache features to secure a
network and improve its performance. ISA server routes responses between internet and client computers after
determining if the communication is authentic [2]. As a cache, ISA also stores frequently requested internet sites
so that the objects can be quickly accessed by clients, rather from the internet [2]. Vast numbers of corporate
networks are now connected to the internet and there is a great need of a powerful administer internet gateway
that provides secure connections [8]. Microsoft internet security and ISA server meets these demands by offering
a complete internet connectivity solution that contains both an enterprise firewall and a complete web cache
solution [5]. These services are complementary, we can use either or both of these functions when installing ISA
server secure network, allowing us to implement a business security policy by configuring a broad set of rules
that specify which sites, protocols, and content can be passed through the ISA server computer [14] ,[16] . As
revealed in fig 2, ISA server monitors requests between internet and internal clients, controlling who can get on
the corporate network.




                                          Figure 2. ISA Server functioning [5]

2.2. INTERNET FIREWALL SECURITY ASPECT
         In firewall capacity, ISA server allows us to prevent unauthorized internet user from accessing the local
network by examining all incoming data and blocking packets that do not meet a specified security criteria [4].
ISA server combines several security mechanisms to help enforcing security policies at all network layers, as
determined in fig 3. In its function as a cache server, Microsoft internet security and acceleration server improve
network performance by maintaining a cache of frequently request web objects [4], [7].

2.3. DEPLOYMENT SCENARIO AND CONSTRAINTS
           Microsoft internet security and acceleration server can be deployed in varied network topologies. This
section describes some typically network configurations [8], [9]. When using Internet security and acceleration
server at the perimeter of our network in the web caching (i.e. sometimes referred to as forward caching) role
occasionally it is necessary to view, remove or validate specific web site URL content within the ISA 2011
cache [6].




                                       Figure 3. Microsoft server frequency of cache objects

       The ISA 2011 cache is a dedicated file (i.e. DirX.cdat by extension) that contains the content derived
from web servers. In this article we have tried to demonstrate how to configure and use a tool released by

                                            www.iosrjournals.org                                         77 | Page
Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks

Microsoft titled the cache directory tool to view the contents of the ISA2011 cache after visiting a specific
website.




                                    Figure 4. Internal workstation clients route through ISA
           Again, for this ISA2011 configuration the focus is on forward caching with ISA2011 at the gateway as
shown in fig 4. Indeed, it is possible to configure the cache in ISA2011 to a specific fixed size as determined in
the fig 5.




                                          Figure 5. Internet access attempts and IP configuration

                             III.     INDICATIONS OF LINUX BASES NETWORK
3.1. INDICATION OF FILE SERVER
         A file server differs from a personal computer in that the server is dedicated to storing files in a
centralized location while permitting access to networked computers [10]. By having a file server, users can save
work and have access to files without having to carry around a disk. Access privileges can be restricted to guests
and registered users [9]. Meanwhile, a centralized location means once place to backup all files. The file servers
allow networked computers to share files at their discretion. On a personal file server, we can restrict access
privileges to guests and registered users. This is the most common type of server in small businesses. A file
server enables all files to be stored in a central location, which accommodates centralized backup strategies and
security implementation [11]. Linux works great as a network file server. Linux includes software called
“samba” that allows files on the server to be viewed and edited on any Windows or Macintosh computer [8].
3.2. BENEFITS OF NETWORK SERVER
           Files on the network server are backed up on a regular basis. If we inadvertently deleted an important
file, it can be retrieved from the back up tape [4]. In addition, if we have a hard drive failure the files we saved on
the network server will not be affected [13]. Files can be shared with others. Several people may be working on a
document and storing the file in a shared directory allows each person to directly work on the document as
needed [14], [15].

                                       IV.     INDULGENT OF FTP SERVER
        FTP servers are still the most common way to make directories of documents and software available to
the public over the internet [1]. File-sharing applications are excellent tool for sharing files over a private
network [13]. For organizations that need to share large numbers of files over public networks, however, FTP
server software provides more robust tools for sharing files and protecting our computer systems [15]. FTP
servers in Linux draw on FTP features that have resulted from years of testing and experience gained from other
UNIX versions of FTP [14].



                                                www.iosrjournals.org                                         78 | Page
Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks

    a) FTP was originally used on multi-user systems, only limited parts of the file system in SENTOS and
RHEL are devoted to public FTP access. Those who access FTP from a public user account. From there,
anonymous user can access only files and directories below that point in the file system [12].
     b) FTP relies on a login process that uses standard UNIX login names. Although strangers to the system
could log in using anonymous as a user name, users with their own accounts on the system could log in with
their own user names through FTP and most likely have access to a greater part of the file system [12].

4.1. SAMBA SECURE SERVER RETRIEVAL
         Users want to integrate their Microsoft style desktop machines with their UNIX servers and others
want to replace protocols like NFS and Novell NCP, especially when used with desktop computers [16]. The
SMB server to provide access to LAN manager-style services to SMB clients [15]. FTP like SMB client so we
can access system resources from UNIX, NetWare and other operating systems [15]. A limited command line tool
that supports some of administrative functionality could also be used on samba and NT workstation [11].

4.2. IMPRESSION OF APACHE SERVER
         Apache is powerful server implements the latest protocols and extensible with third-party modules. It
can be customized by writing, modules license of UNIX and several other operating systems [11]. Bugs reports
and patches implements many frequently requested features; including the database management for
unauthorized allow to us easily setup password-protect pages with enormous numbers of authorized users,
without bogging down the server [10]. Customize responses to errors and problems. Allows the setup files, or
even CGI scripts, which are returned by the server in response to errors and self stocks multiple directory index
[6]. Apache has no fixed limit on the numbers of aliases which may be declared in the configuration files. In
addition, a powerful rewriting engine can be used to solve most URL manipulation problems [2].

4.3. VIRTUAL HOSTING
          Virtual hosting allows the server to distinguish between different IP addresses or names. Apache also
offer dynamically configurable mass-virtual hosting [16]. We could configure apache to generate logs. Apache
can send log files to a pipe, allowing for filtering, real-time splitting of multiple hosts into separate logs [15]. The
about apache explain how the apache project evolved from its beginnings as an outgrowth of the http project to
its current status as one of the fastest, most efficient and most functional web servers in existence [5], [12].

4.4. DHCP HOST CONFIGURATIONS
          We are probably interested in automating as much of the routine maintenance as possible. As the
network grows this becomes particularly important [12], [16]. When a new computer is added to our network or
when a new employee joins an organization, we need to make configuration changes [1]. The IP has enabled
network functionality that could scarcely be imagined when IP was first developed. In order for our network
client and servers to take advantage of the numerous IP network services, software, and devices, each of our
clients’ needs an IP address. In most cases, it's because that LAN is connected to a server that is set up to do
DHCP [3]. Linux and Windows systems are set up by default to look for a DHCP server on all Ethernet cards. If
the ISP has configured a DHCP server, we can be on the internet faster than we can open Web browser. Setting
up a DHCP server enables us to centrally manage the addresses and other network information for client
computers on our private network [9]. With DHCP configured on our network, a client computer can simply
indicate that it wants to use DHCP and the DHCP server can provide its IP address, network mask, DNS server,
NetBIOS server, router and other information needed to get up and running on the network. With DHCP, we can
greatly simplify the initial network configuration that each client computer on our network needs to do [7].
Later, as a network evolves, we can easily update that information, having changes automatically picked up by
clients when they restart their network interfaces [7].

                                                V.    CONCLUSION
          This paper describes the implementation of heterogeneous environment which was relying on
Microsoft and Linux clients’ access secure environment on heterogeneous network facilitates more security
features using effective network and its related emerging technologies. In heterogeneous environment we can
easily create the objects, and active server pages. They can be used everywhere; if the change is to be appearing
then change would be just made in the single file. This heterogeneous environment experiments are done
through the Microsoft and Linux environment was successfully implemented and show the possibility of an
activity level environment.




                                              www.iosrjournals.org                                            79 | Page
Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks

APPENDIX –A (PARAMETERS OF SAMBA SERVER)
[Global]
Workgroup = OPENNA
Server string = R&D of Open Network Architecture Samba Server
Encrypt passwords = True
Security = user
smb passwd file = /etc/smbpasswd
Log file = /var/log/samba/log.%m
Socket options = IPTOS_LOWDELAY TCP_NODELAY
Domain master = Yes
Local master = Yes
Preferred master = Yes
OS level = 65
DNS proxy = No
Name resolve order = lmhosts host bcast
Bind interfaces only = True
Interfaces = eth0 192.168.1.1
Hosts deny = ALL
Hosts allow = 192.168.1.4 127.0.0.1
Debug level = 1
Create mask = 0644
Directory mask = 0755
Level2 oplocks = True
Read raw = no
Write cache size = 262144
[Homes]
Comment = Home Directories
Browseable = no
Read only = no
Invalid users = root bin daemon nobody named sys tty disk mem kmem users
[tmp]
Comment = Temporary File Space
Path = /tmp
Read only = No
Valid users = admin

APPENDIX –B (PARAMETERS OF FTP SERVER)
1. The first step is to login as root in Linux server.
2. Next send this command: yum install tftp-server
3. Once the installation completes, send this command: nano /etc/xinetd.d/tftp
4. When you open this file it will look like this;
# default: off
# Description: The tftp server serves files using the trivial file transfer
# Protocol: The tftp protocol is often used to boot diskless
# Workstations, download configuration files to network-aware printers, and to start the installation process for some operating systems.
Service tftp {
Socket_type = dgram
Protocol        = udp
Wait            = yes
User            = root
Server          = /usr/sbin/in.tftpd
Server_args = -s /tftpboot
Disable         = yes
Per_source = 11
Cps            = 100 2
Flags          = IPv4 }
5. Change disable = yes to disable = no to enable the tftp server
6. Note that your server is enabled; it’s time to start it. Use this command to start running the TFTP server: /sbin/service xinetd start
7. You will see: Starting xinetd: [OK]
8. Your TFTP server is up and running. You want to find out where is your TFTP root directory is located. Usually the path of the root
directory is at /tftpboot So type this command: ls /
9. You will see it in the root directory. Now we create a test file to make sure it works. So send this command: touch /tftpboot/test
10. Now that you created the file, you can connect to your FTFP server with this command:
tftp localhost
tftp> get test
tftp> quit
11. If you want to connect to your server remotely. Open a DOS console/terminal and enter this command: tftp 172.16.20.1 GET test




                                                       www.iosrjournals.org                                                        80 | Page
Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks

                                                            REFERENCES
[1]    Mahbubul, Ramjee Prasad, and John R. Farserotu. "Quality of service among IP-based heterogeneous networks." Personal
       Communications, IEEE 8.6 (2009): 18-24.Denmark.
[2]    Hensgen, Debra A., et al. "An overview of MSHN: The management system for heterogeneous networks." Heterogeneous Computing
       Workshop, 2000.(HCW'2K) Proceedings. Eighth. IEEE, 2008.
[3]    Dutta, Ashutosh, et al. "Seamless proactive handover across heterogeneous access networks." Wireless Personal Communications 43.3
       (2007): 837-855.
[4]    O’Hanlon, T., (2011) "Quality Auditing for ISO 9001-2010: Making Compliance Value-Added". American Society for Quality.USA.
[5]    Smith, John R., Rakesh Mohan, and Chung-Sheng Li. "Transcoding internet content for heterogeneous client devices." Circuits and
       Systems, 2010. ISCAS, Proceedings of the 2010 IEEE International Symposium on. Vol. 3. IEEE, 2010.India.
[6]    Fu, Cheng Peng, and Soung C. Liew. "TCP Veno: TCP enhancement for transmission over wireless access networks." Selected Areas
       in Communications, IEEE Journal on 21.2 (2005): 216-228.
[7]    Lim, Mario. "Integrating heterogeneous authentication and authorization mechanisms into an application access control system." U.S.
       Patent No. 6,728,884. 27 Apr. 2006.
[8]    Tian, Ye, Kai Xu, and Nirwan Ansari. "TCP in wireless environments: problems and solutions." Communications Magazine, IEEE
       43.3 (2007): S27-S32.
[9]    Akyildiz, Ian F., Xudong Wang, and Weilin Wang. "Wireless mesh networks: a survey." Computer networks 47.4 (2008): 445-487.
[10]   C. Thompson, 25 Ideas for 2010: Digital Forgetting, Wired UK,November 2010.
[11]   Cappiello, M., A. Floris, and L. Veltri. "Mobility amongst heterogeneous networks with AAA support." Communications, 2009. ICC
       2009. IEEE International Conference on. Vol. 4. IEEE, 2009.
[12]   Jonathan Grudin (2002) ”Why groupware applications fail: Problems in design and evaluation. Office: Technology and People”,
       4(3):245-264, June 2002. France.
[13]   Wayner, P., 2006, Free for All: How Linux and the Free Software Movement Undercut the High- Tech Titans (Harper Collins, New
       York).USA
[14]   Droms, Ralph E. "Access to heterogeneous directory services." INFOCOM'01. Annual Joint Conference of the IEEE Computer and
       Communication Societies.'The Multiple Facets of Integration'. Proceedings., IEEE , 2001.
[15]   Jack J. Dongarra, Rolf Hempel, Anthony J. G. Hey, and David W.Walker. "A Proposal for a User-Level, Message-Passing Interface in
       a Distributed Memory Environment", Technical Report ORNL/TM,Ridge National Laboratory, 1999.USA.
[16]   D. Cheriton, "The V Distributed System", Comm. ACM, Vol. 31, No. 3, pp. 314-333, March 2008.Newzealand.




                                                      www.iosrjournals.org                                                    81 | Page

More Related Content

What's hot

A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud IRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingIAEME Publication
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudIJMTST Journal
 

What's hot (19)

A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
paper
paperpaper
paper
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
50120140504005
5012014050400550120140504005
50120140504005
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Fog doc
Fog doc Fog doc
Fog doc
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Enforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computingEnforcing multi user access policies in cloud computing
Enforcing multi user access policies in cloud computing
 
Secure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on CloudSecure Auditing and Deduplicating Data on Cloud
Secure Auditing and Deduplicating Data on Cloud
 

Viewers also liked

iphone5 管理面での提案書
iphone5 管理面での提案書iphone5 管理面での提案書
iphone5 管理面での提案書keichi ide
 
EIDER Catalogo verano 2012
EIDER Catalogo verano 2012EIDER Catalogo verano 2012
EIDER Catalogo verano 2012rarbos
 
Meta programing ruby monday
Meta programing ruby mondayMeta programing ruby monday
Meta programing ruby mondayYuisho Takafuji
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
Linked In 101 12
Linked In 101 12Linked In 101 12
Linked In 101 12watersb
 
Village study
Village studyVillage study
Village studycerahj
 
Belgium's Social Media and Netlog
Belgium's Social Media and NetlogBelgium's Social Media and Netlog
Belgium's Social Media and NetlogKatherine Witsman
 
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...IOSR Journals
 
егэ виды грамматических ошибок
егэ виды грамматических ошибокегэ виды грамматических ошибок
егэ виды грамматических ошибокNatalya Dyrda
 
Almentariak hodei ehiztari
Almentariak hodei ehiztariAlmentariak hodei ehiztari
Almentariak hodei ehiztariAlmentariak
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionIOSR Journals
 
Sofitel Resort progress 14 11-2012
Sofitel Resort progress 14 11-2012Sofitel Resort progress 14 11-2012
Sofitel Resort progress 14 11-2012madasamyjayaraman
 

Viewers also liked (17)

iphone5 管理面での提案書
iphone5 管理面での提案書iphone5 管理面での提案書
iphone5 管理面での提案書
 
Jclic pre
Jclic preJclic pre
Jclic pre
 
Kvalifikatsii 1
Kvalifikatsii 1Kvalifikatsii 1
Kvalifikatsii 1
 
EIDER Catalogo verano 2012
EIDER Catalogo verano 2012EIDER Catalogo verano 2012
EIDER Catalogo verano 2012
 
Meta programing ruby monday
Meta programing ruby mondayMeta programing ruby monday
Meta programing ruby monday
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Hang the broom
Hang the broomHang the broom
Hang the broom
 
Linked In 101 12
Linked In 101 12Linked In 101 12
Linked In 101 12
 
Village study
Village studyVillage study
Village study
 
Belgium's Social Media and Netlog
Belgium's Social Media and NetlogBelgium's Social Media and Netlog
Belgium's Social Media and Netlog
 
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
Modeling Of Carbon Deposit From Methane Gas On Zeolite Y Catalyst Activity In...
 
егэ виды грамматических ошибок
егэ виды грамматических ошибокегэ виды грамматических ошибок
егэ виды грамматических ошибок
 
Almentariak hodei ehiztari
Almentariak hodei ehiztariAlmentariak hodei ehiztari
Almentariak hodei ehiztari
 
Manual maestro construcor
Manual maestro construcorManual maestro construcor
Manual maestro construcor
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 
Sofitel Resort progress 14 11-2012
Sofitel Resort progress 14 11-2012Sofitel Resort progress 14 11-2012
Sofitel Resort progress 14 11-2012
 
B0160709
B0160709B0160709
B0160709
 

Similar to M0937681

IRJET- Blockchain based Secure Data Storage
IRJET-  	  Blockchain based Secure Data StorageIRJET-  	  Blockchain based Secure Data Storage
IRJET- Blockchain based Secure Data StorageIRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...IOSR Journals
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET Journal
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0CK Toh
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
01 route routing services
01 route routing services01 route routing services
01 route routing servicesMarcus Reams
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1Andy Juan Sarango Veliz
 

Similar to M0937681 (20)

IRJET- Blockchain based Secure Data Storage
IRJET-  	  Blockchain based Secure Data StorageIRJET-  	  Blockchain based Secure Data Storage
IRJET- Blockchain based Secure Data Storage
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Aj04602248254
Aj04602248254Aj04602248254
Aj04602248254
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Cloud white paper v3.0
Cloud white paper v3.0Cloud white paper v3.0
Cloud white paper v3.0
 
Paper1
Paper1Paper1
Paper1
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01CCCNP ROUTE v6_ch01
CCCNP ROUTE v6_ch01
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
01 route routing services
01 route routing services01 route routing services
01 route routing services
 
CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1CCNP v6 Route: Implementing IP Routing Chapter1
CCNP v6 Route: Implementing IP Routing Chapter1
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...liera silvan
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Recently uploaded (20)

Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
EmpTech Lesson 18 - ICT Project for Website Traffic Statistics and Performanc...
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

M0937681

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 76 -81 www.iosrjournals.org Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks A Mir Sajjad Hussain Talpur, B Murtaza Hussain Shaikh, C Riaz Ali Buriro, D Arif Hussain Soomro A Information Technology Centre, Sindh Agriculture University Tandojam (SAU), Tandojam – Pakistan B Member IEEE, Oslo, Norway C Department of Statistics, Sindh Agriculture University Tandojam (SAU), Tandojam – Pakistan D PAF Karachi Institute of Economics & Technology (KIET), Karachi – Pakistan Abstract : This article will debates to create a Microsoft and Linux clients access secure environment on heterogeneous networks. The class files are being constructed, where so ever they are necessitate waiving the huge coding process. The exploit of heterogeneous network in various organizations is becoming more popular in modern years. This inclination seems to be continued as long as the heterogeneous system meets diverse needs of software developers. By utilizing new techniques and design of these composite systems are no longer tricky compared to the past era`s of communication. A heterogeneous network is an environment where Microsoft and Linux operation systems could work collaboratively and provide effective interactions of computers, network links. This phenomenon is derived from heterogeneous arrangement of various operating systems especially Microsoft Windows and Linux is used in different emerging technologies. Therefore, the purpose of this article is to design and implement a Microsoft and Linux client’s access secure environment on heterogeneous network and to show the possibility of an activity level environment. Keywords:Interpretability, Multiplatform, Connectivity, Centralization, Perimeter, Environments, Configuration. I. OBJECTIVES Heterogeneous involves workstation, server and application from any vendors, all-working in a single unit & interacts between cross platform in the network. The network may also use different media and different protocols like IPX, and TCP/IP over different network link. The ability to interoperate within heterogeneous environments is becoming more important as large, complex system from different commercial sources like Linux and Windows servers configured at one place such are often connect with each other by using different services in the Ethernet network [1]. Figure 1. Operating Systems rapidly changing the Software business Security would be major issue to make this multiplatform network succeed. We would implement, ISA for make this network secure in the early days of networking. A network involves only one type of operating system, so communication was not an issue. Ensuring the privacy and integrity of all multiplatform information is vital with today’s for business [3]. As companies use the feasibility & cost effectiveness of Internet to extend their network to branches offices telecommuters, customers they are deploying their network & which are typically heterogeneous network [1]. As shown in fig1, the operating systems are rapidly changing the way we do business. The main objective for this study is to; a) Integrating of the information and Centralization of network support. www.iosrjournals.org 76 | Page
  • 2. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks b) To reduce the deployment & increase control with centralized management & policy enforcement. c) Lower total cost of ownership by using different operator system in infrastructure. II. INDICATIONS OF MICROSOFT BASES NETWORK 2.1. SECURED FEATURES IN ISA SERVER Microsoft internet security and acceleration server integrates firewall and cache features to secure a network and improve its performance. ISA server routes responses between internet and client computers after determining if the communication is authentic [2]. As a cache, ISA also stores frequently requested internet sites so that the objects can be quickly accessed by clients, rather from the internet [2]. Vast numbers of corporate networks are now connected to the internet and there is a great need of a powerful administer internet gateway that provides secure connections [8]. Microsoft internet security and ISA server meets these demands by offering a complete internet connectivity solution that contains both an enterprise firewall and a complete web cache solution [5]. These services are complementary, we can use either or both of these functions when installing ISA server secure network, allowing us to implement a business security policy by configuring a broad set of rules that specify which sites, protocols, and content can be passed through the ISA server computer [14] ,[16] . As revealed in fig 2, ISA server monitors requests between internet and internal clients, controlling who can get on the corporate network. Figure 2. ISA Server functioning [5] 2.2. INTERNET FIREWALL SECURITY ASPECT In firewall capacity, ISA server allows us to prevent unauthorized internet user from accessing the local network by examining all incoming data and blocking packets that do not meet a specified security criteria [4]. ISA server combines several security mechanisms to help enforcing security policies at all network layers, as determined in fig 3. In its function as a cache server, Microsoft internet security and acceleration server improve network performance by maintaining a cache of frequently request web objects [4], [7]. 2.3. DEPLOYMENT SCENARIO AND CONSTRAINTS Microsoft internet security and acceleration server can be deployed in varied network topologies. This section describes some typically network configurations [8], [9]. When using Internet security and acceleration server at the perimeter of our network in the web caching (i.e. sometimes referred to as forward caching) role occasionally it is necessary to view, remove or validate specific web site URL content within the ISA 2011 cache [6]. Figure 3. Microsoft server frequency of cache objects The ISA 2011 cache is a dedicated file (i.e. DirX.cdat by extension) that contains the content derived from web servers. In this article we have tried to demonstrate how to configure and use a tool released by www.iosrjournals.org 77 | Page
  • 3. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks Microsoft titled the cache directory tool to view the contents of the ISA2011 cache after visiting a specific website. Figure 4. Internal workstation clients route through ISA Again, for this ISA2011 configuration the focus is on forward caching with ISA2011 at the gateway as shown in fig 4. Indeed, it is possible to configure the cache in ISA2011 to a specific fixed size as determined in the fig 5. Figure 5. Internet access attempts and IP configuration III. INDICATIONS OF LINUX BASES NETWORK 3.1. INDICATION OF FILE SERVER A file server differs from a personal computer in that the server is dedicated to storing files in a centralized location while permitting access to networked computers [10]. By having a file server, users can save work and have access to files without having to carry around a disk. Access privileges can be restricted to guests and registered users [9]. Meanwhile, a centralized location means once place to backup all files. The file servers allow networked computers to share files at their discretion. On a personal file server, we can restrict access privileges to guests and registered users. This is the most common type of server in small businesses. A file server enables all files to be stored in a central location, which accommodates centralized backup strategies and security implementation [11]. Linux works great as a network file server. Linux includes software called “samba” that allows files on the server to be viewed and edited on any Windows or Macintosh computer [8]. 3.2. BENEFITS OF NETWORK SERVER Files on the network server are backed up on a regular basis. If we inadvertently deleted an important file, it can be retrieved from the back up tape [4]. In addition, if we have a hard drive failure the files we saved on the network server will not be affected [13]. Files can be shared with others. Several people may be working on a document and storing the file in a shared directory allows each person to directly work on the document as needed [14], [15]. IV. INDULGENT OF FTP SERVER FTP servers are still the most common way to make directories of documents and software available to the public over the internet [1]. File-sharing applications are excellent tool for sharing files over a private network [13]. For organizations that need to share large numbers of files over public networks, however, FTP server software provides more robust tools for sharing files and protecting our computer systems [15]. FTP servers in Linux draw on FTP features that have resulted from years of testing and experience gained from other UNIX versions of FTP [14]. www.iosrjournals.org 78 | Page
  • 4. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks a) FTP was originally used on multi-user systems, only limited parts of the file system in SENTOS and RHEL are devoted to public FTP access. Those who access FTP from a public user account. From there, anonymous user can access only files and directories below that point in the file system [12]. b) FTP relies on a login process that uses standard UNIX login names. Although strangers to the system could log in using anonymous as a user name, users with their own accounts on the system could log in with their own user names through FTP and most likely have access to a greater part of the file system [12]. 4.1. SAMBA SECURE SERVER RETRIEVAL Users want to integrate their Microsoft style desktop machines with their UNIX servers and others want to replace protocols like NFS and Novell NCP, especially when used with desktop computers [16]. The SMB server to provide access to LAN manager-style services to SMB clients [15]. FTP like SMB client so we can access system resources from UNIX, NetWare and other operating systems [15]. A limited command line tool that supports some of administrative functionality could also be used on samba and NT workstation [11]. 4.2. IMPRESSION OF APACHE SERVER Apache is powerful server implements the latest protocols and extensible with third-party modules. It can be customized by writing, modules license of UNIX and several other operating systems [11]. Bugs reports and patches implements many frequently requested features; including the database management for unauthorized allow to us easily setup password-protect pages with enormous numbers of authorized users, without bogging down the server [10]. Customize responses to errors and problems. Allows the setup files, or even CGI scripts, which are returned by the server in response to errors and self stocks multiple directory index [6]. Apache has no fixed limit on the numbers of aliases which may be declared in the configuration files. In addition, a powerful rewriting engine can be used to solve most URL manipulation problems [2]. 4.3. VIRTUAL HOSTING Virtual hosting allows the server to distinguish between different IP addresses or names. Apache also offer dynamically configurable mass-virtual hosting [16]. We could configure apache to generate logs. Apache can send log files to a pipe, allowing for filtering, real-time splitting of multiple hosts into separate logs [15]. The about apache explain how the apache project evolved from its beginnings as an outgrowth of the http project to its current status as one of the fastest, most efficient and most functional web servers in existence [5], [12]. 4.4. DHCP HOST CONFIGURATIONS We are probably interested in automating as much of the routine maintenance as possible. As the network grows this becomes particularly important [12], [16]. When a new computer is added to our network or when a new employee joins an organization, we need to make configuration changes [1]. The IP has enabled network functionality that could scarcely be imagined when IP was first developed. In order for our network client and servers to take advantage of the numerous IP network services, software, and devices, each of our clients’ needs an IP address. In most cases, it's because that LAN is connected to a server that is set up to do DHCP [3]. Linux and Windows systems are set up by default to look for a DHCP server on all Ethernet cards. If the ISP has configured a DHCP server, we can be on the internet faster than we can open Web browser. Setting up a DHCP server enables us to centrally manage the addresses and other network information for client computers on our private network [9]. With DHCP configured on our network, a client computer can simply indicate that it wants to use DHCP and the DHCP server can provide its IP address, network mask, DNS server, NetBIOS server, router and other information needed to get up and running on the network. With DHCP, we can greatly simplify the initial network configuration that each client computer on our network needs to do [7]. Later, as a network evolves, we can easily update that information, having changes automatically picked up by clients when they restart their network interfaces [7]. V. CONCLUSION This paper describes the implementation of heterogeneous environment which was relying on Microsoft and Linux clients’ access secure environment on heterogeneous network facilitates more security features using effective network and its related emerging technologies. In heterogeneous environment we can easily create the objects, and active server pages. They can be used everywhere; if the change is to be appearing then change would be just made in the single file. This heterogeneous environment experiments are done through the Microsoft and Linux environment was successfully implemented and show the possibility of an activity level environment. www.iosrjournals.org 79 | Page
  • 5. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks APPENDIX –A (PARAMETERS OF SAMBA SERVER) [Global] Workgroup = OPENNA Server string = R&D of Open Network Architecture Samba Server Encrypt passwords = True Security = user smb passwd file = /etc/smbpasswd Log file = /var/log/samba/log.%m Socket options = IPTOS_LOWDELAY TCP_NODELAY Domain master = Yes Local master = Yes Preferred master = Yes OS level = 65 DNS proxy = No Name resolve order = lmhosts host bcast Bind interfaces only = True Interfaces = eth0 192.168.1.1 Hosts deny = ALL Hosts allow = 192.168.1.4 127.0.0.1 Debug level = 1 Create mask = 0644 Directory mask = 0755 Level2 oplocks = True Read raw = no Write cache size = 262144 [Homes] Comment = Home Directories Browseable = no Read only = no Invalid users = root bin daemon nobody named sys tty disk mem kmem users [tmp] Comment = Temporary File Space Path = /tmp Read only = No Valid users = admin APPENDIX –B (PARAMETERS OF FTP SERVER) 1. The first step is to login as root in Linux server. 2. Next send this command: yum install tftp-server 3. Once the installation completes, send this command: nano /etc/xinetd.d/tftp 4. When you open this file it will look like this; # default: off # Description: The tftp server serves files using the trivial file transfer # Protocol: The tftp protocol is often used to boot diskless # Workstations, download configuration files to network-aware printers, and to start the installation process for some operating systems. Service tftp { Socket_type = dgram Protocol = udp Wait = yes User = root Server = /usr/sbin/in.tftpd Server_args = -s /tftpboot Disable = yes Per_source = 11 Cps = 100 2 Flags = IPv4 } 5. Change disable = yes to disable = no to enable the tftp server 6. Note that your server is enabled; it’s time to start it. Use this command to start running the TFTP server: /sbin/service xinetd start 7. You will see: Starting xinetd: [OK] 8. Your TFTP server is up and running. You want to find out where is your TFTP root directory is located. Usually the path of the root directory is at /tftpboot So type this command: ls / 9. You will see it in the root directory. Now we create a test file to make sure it works. So send this command: touch /tftpboot/test 10. Now that you created the file, you can connect to your FTFP server with this command: tftp localhost tftp> get test tftp> quit 11. If you want to connect to your server remotely. Open a DOS console/terminal and enter this command: tftp 172.16.20.1 GET test www.iosrjournals.org 80 | Page
  • 6. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks REFERENCES [1] Mahbubul, Ramjee Prasad, and John R. Farserotu. "Quality of service among IP-based heterogeneous networks." Personal Communications, IEEE 8.6 (2009): 18-24.Denmark. [2] Hensgen, Debra A., et al. "An overview of MSHN: The management system for heterogeneous networks." Heterogeneous Computing Workshop, 2000.(HCW'2K) Proceedings. Eighth. IEEE, 2008. [3] Dutta, Ashutosh, et al. "Seamless proactive handover across heterogeneous access networks." Wireless Personal Communications 43.3 (2007): 837-855. [4] O’Hanlon, T., (2011) "Quality Auditing for ISO 9001-2010: Making Compliance Value-Added". American Society for Quality.USA. [5] Smith, John R., Rakesh Mohan, and Chung-Sheng Li. "Transcoding internet content for heterogeneous client devices." Circuits and Systems, 2010. ISCAS, Proceedings of the 2010 IEEE International Symposium on. Vol. 3. IEEE, 2010.India. [6] Fu, Cheng Peng, and Soung C. Liew. "TCP Veno: TCP enhancement for transmission over wireless access networks." Selected Areas in Communications, IEEE Journal on 21.2 (2005): 216-228. [7] Lim, Mario. "Integrating heterogeneous authentication and authorization mechanisms into an application access control system." U.S. Patent No. 6,728,884. 27 Apr. 2006. [8] Tian, Ye, Kai Xu, and Nirwan Ansari. "TCP in wireless environments: problems and solutions." Communications Magazine, IEEE 43.3 (2007): S27-S32. [9] Akyildiz, Ian F., Xudong Wang, and Weilin Wang. "Wireless mesh networks: a survey." Computer networks 47.4 (2008): 445-487. [10] C. Thompson, 25 Ideas for 2010: Digital Forgetting, Wired UK,November 2010. [11] Cappiello, M., A. Floris, and L. Veltri. "Mobility amongst heterogeneous networks with AAA support." Communications, 2009. ICC 2009. IEEE International Conference on. Vol. 4. IEEE, 2009. [12] Jonathan Grudin (2002) ”Why groupware applications fail: Problems in design and evaluation. Office: Technology and People”, 4(3):245-264, June 2002. France. [13] Wayner, P., 2006, Free for All: How Linux and the Free Software Movement Undercut the High- Tech Titans (Harper Collins, New York).USA [14] Droms, Ralph E. "Access to heterogeneous directory services." INFOCOM'01. Annual Joint Conference of the IEEE Computer and Communication Societies.'The Multiple Facets of Integration'. Proceedings., IEEE , 2001. [15] Jack J. Dongarra, Rolf Hempel, Anthony J. G. Hey, and David W.Walker. "A Proposal for a User-Level, Message-Passing Interface in a Distributed Memory Environment", Technical Report ORNL/TM,Ridge National Laboratory, 1999.USA. [16] D. Cheriton, "The V Distributed System", Comm. ACM, Vol. 31, No. 3, pp. 314-333, March 2008.Newzealand. www.iosrjournals.org 81 | Page