Open source technology


Published on

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Open source technology

  1. 1. By, Aparna Nirmal
  2. 2. Agenda <ul><li>Introduction to Open Source </li></ul><ul><li>History and Definition of Open Source </li></ul><ul><li>Important Open Source Project </li></ul><ul><li>Open Source Risks </li></ul><ul><li>Proxy Server </li></ul><ul><li>Squid Proxy Server </li></ul>
  3. 3. Introduction to Open Source <ul><li>It is an approach to the design, development, and distribution offering practical accessibility to a product's source (goods and knowledge) </li></ul><ul><li>It is basically software developed by uncoordinated but collaborating programmers, using freely distributed source code and the communications facilities of the Net. </li></ul><ul><li>It promises better quality, higher reliability, more flexibility and lower cost. </li></ul>
  4. 4. History of Open Source <ul><li>Free Software Movement </li></ul><ul><li>“ Free software ” invented by Richard Stallman ( “ free as in freedom ” ). </li></ul><ul><li>Goal to ensure user rights to use, modify and re-distribute code. </li></ul><ul><li>Free Software Foundation (the “ FSF ” ). </li></ul><ul><li>The General Public License (the “ GPL ” ). </li></ul><ul><li>“ Copyleft ” – uses copyright to ensure availability of code ,instead of protection of it as private property. </li></ul><ul><li>“ Reciprocity ” is key to copyleft. </li></ul>
  5. 5. Why Open Source? <ul><li>       Quality and Reliability </li></ul><ul><ul><li>       if the project is being actively developed by a community of developers, peer review will encourage quality </li></ul></ul><ul><ul><li>    66% of web server deployment today is Apache </li></ul></ul><ul><ul><li>       Google uses Linux </li></ul></ul><ul><li>        Security </li></ul><ul><ul><li>       Because the code is available for anyone to view, and because of the scrutiny of peer developers, security problems tend to be discovered quickly…and fixed quickly </li></ul></ul><ul><li>        Support </li></ul><ul><ul><li>       Many companies offer Open Source product support </li></ul></ul><ul><ul><li>       Forum, Mailing List, FAQ, online Documentation </li></ul></ul><ul><ul><li>       No such thing as stop support and force customers to upgrade as always happen in commercial products </li></ul></ul><ul><li>Cost Effectiveness </li></ul>
  6. 6. Open Source Definition <ul><li>1. Free Redistribution </li></ul><ul><li>2. Source Code Availability </li></ul><ul><li>3. Derived Works Permitted </li></ul><ul><li>4. Integrity of Author’s </li></ul><ul><li>Source Code </li></ul><ul><li>5. No Discrimination </li></ul><ul><li>Against Persons or </li></ul><ul><li>Groups </li></ul><ul><li>6. No Discrimination against </li></ul><ul><li>Fields of Endeavor </li></ul><ul><li>7. Same Distribution License </li></ul><ul><li>8. License not Specific to a </li></ul><ul><li>Product </li></ul><ul><li>9. License Must Not Restrict </li></ul><ul><li>Other Software </li></ul><ul><li>10. License Must be </li></ul><ul><li>Technology Neutral </li></ul>
  7. 7. Important Open Source Projects <ul><li>Linux . Built on top of Linus Torvalds’ kernel, Linux distributions typically include hundreds of other open-source packages. </li></ul><ul><li>Programmer’s Tools . The Free Software Foundation’s GNU project has created a high-quality set of programmer’s utilities, including the gcc C compiler, the g++ C++ compiler, the emacs editor, the gdb debugger. </li></ul><ul><li>Web Browser: Mozilla, one of the widely used Open Source browsers </li></ul>
  8. 8. OS Projects ….contd <ul><li>Scripting languages : Larry Wall’s Perl language is the undisputed king of the open-source programming languages </li></ul><ul><li>Apache : Apache by Rob McCool is one of the widely used Web Servers. Originally designed by NCSA </li></ul><ul><li>Samba: Samba allows UNIX and Linux systems to act as file and print servers on NT and Windows 95/98 networks </li></ul>
  9. 9. Open Source Risks <ul><li>       ‘ Infection’ of other code or programs with license requirements </li></ul><ul><ul><li>       What is a derivative work: dynamic vs. static code. </li></ul></ul><ul><li>        Security risks </li></ul><ul><ul><li>        No warranty or indemnity </li></ul></ul><ul><ul><li>       Code may contain restricted copyrighted materials. </li></ul></ul><ul><ul><li>       Processes may infringe patents. </li></ul></ul><ul><li>        No standard or easy source of help </li></ul><ul><li>Different licenses have different terms. </li></ul>
  10. 10. Complexity: Each Component has Owner & License
  11. 11. Mixed Code Risk
  12. 12. Open Source <ul><li>Open Source is NOT free. </li></ul><ul><li>Open Source is here to stay. </li></ul><ul><li>Stake is high and will get higher. </li></ul><ul><li>Will complement not replace </li></ul>
  13. 13. Proxy Server <ul><li>What is a proxy server? </li></ul><ul><ul><li>A proxy server is a server that services the requests of its clients by forwarding requests to other servers. </li></ul></ul><ul><ul><li>A proxy server, also known as a &quot;proxy&quot; or &quot;application level gateway&quot;, is a computer that acts as a gateway between a local network and a larger-scale network </li></ul></ul><ul><ul><li>Proxy servers provide increased performance and security </li></ul></ul><ul><ul><li>They monitor employees' use of outside resources </li></ul></ul>
  14. 14. Caching Proxy Server <ul><li>Proxies may also cache web pages </li></ul><ul><li>Each time an internal user requests a URL from outside, a temporary copy is stored locally. </li></ul><ul><li>The next time an internal user requests the same URL, the proxy can serve the local copy instead of retrieving the original across the network, improving performance. </li></ul>
  15. 15. Squid Caching Proxy Server <ul><li>Squid is an Open source high-performance Proxy caching server designed to run on Unix/Linux/Windows systems. </li></ul><ul><li>National Science Foundation funds squid project, Squid has its presence in numerous ISP's and corporate around the globe. </li></ul><ul><li>Squid can do much more than what most of the proxy servers around can do. </li></ul>
  16. 16. Configuring Squid Proxy <ul><li>There are three main ways that proxy caches can be configured on a network : </li></ul><ul><ul><li>Standard Proxy Cache </li></ul></ul><ul><ul><li>Transparent Cache </li></ul></ul><ul><ul><li>Reverse Proxy Cache </li></ul></ul>
  17. 17. Access Control Policies <ul><li>Using Squid server we can perform the following tasks </li></ul><ul><ul><li>Granting or Blocking access to sites </li></ul></ul><ul><ul><li>Classifying users in groups for customized internet access </li></ul></ul><ul><ul><ul><li>This helps ease user administration </li></ul></ul></ul><ul><ul><li>Monitor user logs to prevent security breaches </li></ul></ul><ul><li>This can be done by editing few parameters in the squid configuration file, such as: </li></ul><ul><ul><li>http_port </li></ul></ul><ul><ul><li>acl </li></ul></ul>
  18. 18. Are You Certified??? <ul><li>Networking and Administration: </li></ul><ul><ul><li>RHCE : Red Hat Certified Engineer </li></ul></ul><ul><ul><li>MCSE : Microsoft Certified System Engineer </li></ul></ul><ul><ul><li>CCNA : Cisco Certified Network Administrator </li></ul></ul><ul><ul><li>Solaris : Solaris Administrator </li></ul></ul><ul><li>Database: </li></ul><ul><ul><li>Oracle DBA </li></ul></ul><ul><ul><li>MySQL </li></ul></ul><ul><ul><li>SAP : BW, HR, FICO, MM, CRM </li></ul></ul>
  19. 19. Any Questions? <ul><li>Thank you </li></ul><ul><li>for being a wonderful audience </li></ul>