Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this


  1. 1. IOSR Journal of Computer Engineering (IOSR-JCE)e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 76 -81www.iosrjournals.orgActivity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks A Mir Sajjad Hussain Talpur, B Murtaza Hussain Shaikh, C Riaz Ali Buriro, D Arif Hussain Soomro A Information Technology Centre, Sindh Agriculture University Tandojam (SAU), Tandojam – Pakistan B Member IEEE, Oslo, Norway C Department of Statistics, Sindh Agriculture University Tandojam (SAU), Tandojam – Pakistan D PAF Karachi Institute of Economics & Technology (KIET), Karachi – Pakistan Abstract : This article will debates to create a Microsoft and Linux clients access secure environment onheterogeneous networks. The class files are being constructed, where so ever they are necessitate waiving thehuge coding process. The exploit of heterogeneous network in various organizations is becoming more popularin modern years. This inclination seems to be continued as long as the heterogeneous system meets diverseneeds of software developers. By utilizing new techniques and design of these composite systems are no longertricky compared to the past era`s of communication. A heterogeneous network is an environment whereMicrosoft and Linux operation systems could work collaboratively and provide effective interactions ofcomputers, network links. This phenomenon is derived from heterogeneous arrangement of various operatingsystems especially Microsoft Windows and Linux is used in different emerging technologies. Therefore, thepurpose of this article is to design and implement a Microsoft and Linux client’s access secure environment onheterogeneous network and to show the possibility of an activity level environment. Keywords:Interpretability, Multiplatform, Connectivity, Centralization, Perimeter, Environments,Configuration. I. OBJECTIVES Heterogeneous involves workstation, server and application from any vendors, all-working in a singleunit & interacts between cross platform in the network. The network may also use different media and differentprotocols like IPX, and TCP/IP over different network link. The ability to interoperate within heterogeneousenvironments is becoming more important as large, complex system from different commercial sources likeLinux and Windows servers configured at one place such are often connect with each other by using differentservices in the Ethernet network [1]. Figure 1. Operating Systems rapidly changing the Software business Security would be major issue to make this multiplatform network succeed. We would implement, ISAfor make this network secure in the early days of networking. A network involves only one type of operatingsystem, so communication was not an issue. Ensuring the privacy and integrity of all multiplatform informationis vital with today’s for business [3]. As companies use the feasibility & cost effectiveness of Internet to extendtheir network to branches offices telecommuters, customers they are deploying their network & which aretypically heterogeneous network [1]. As shown in fig1, the operating systems are rapidly changing the way wedo business. The main objective for this study is to; a) Integrating of the information and Centralization of network support. 76 | Page
  2. 2. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks b) To reduce the deployment & increase control with centralized management & policy enforcement. c) Lower total cost of ownership by using different operator system in infrastructure. II. INDICATIONS OF MICROSOFT BASES NETWORK2.1. SECURED FEATURES IN ISA SERVER Microsoft internet security and acceleration server integrates firewall and cache features to secure anetwork and improve its performance. ISA server routes responses between internet and client computers afterdetermining if the communication is authentic [2]. As a cache, ISA also stores frequently requested internet sitesso that the objects can be quickly accessed by clients, rather from the internet [2]. Vast numbers of corporatenetworks are now connected to the internet and there is a great need of a powerful administer internet gatewaythat provides secure connections [8]. Microsoft internet security and ISA server meets these demands by offeringa complete internet connectivity solution that contains both an enterprise firewall and a complete web cachesolution [5]. These services are complementary, we can use either or both of these functions when installing ISAserver secure network, allowing us to implement a business security policy by configuring a broad set of rulesthat specify which sites, protocols, and content can be passed through the ISA server computer [14] ,[16] . Asrevealed in fig 2, ISA server monitors requests between internet and internal clients, controlling who can get onthe corporate network. Figure 2. ISA Server functioning [5]2.2. INTERNET FIREWALL SECURITY ASPECT In firewall capacity, ISA server allows us to prevent unauthorized internet user from accessing the localnetwork by examining all incoming data and blocking packets that do not meet a specified security criteria [4].ISA server combines several security mechanisms to help enforcing security policies at all network layers, asdetermined in fig 3. In its function as a cache server, Microsoft internet security and acceleration server improvenetwork performance by maintaining a cache of frequently request web objects [4], [7].2.3. DEPLOYMENT SCENARIO AND CONSTRAINTS Microsoft internet security and acceleration server can be deployed in varied network topologies. Thissection describes some typically network configurations [8], [9]. When using Internet security and accelerationserver at the perimeter of our network in the web caching (i.e. sometimes referred to as forward caching) roleoccasionally it is necessary to view, remove or validate specific web site URL content within the ISA 2011cache [6]. Figure 3. Microsoft server frequency of cache objects The ISA 2011 cache is a dedicated file (i.e. DirX.cdat by extension) that contains the content derivedfrom web servers. In this article we have tried to demonstrate how to configure and use a tool released by 77 | Page
  3. 3. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous NetworksMicrosoft titled the cache directory tool to view the contents of the ISA2011 cache after visiting a specificwebsite. Figure 4. Internal workstation clients route through ISA Again, for this ISA2011 configuration the focus is on forward caching with ISA2011 at the gateway asshown in fig 4. Indeed, it is possible to configure the cache in ISA2011 to a specific fixed size as determined inthe fig 5. Figure 5. Internet access attempts and IP configuration III. INDICATIONS OF LINUX BASES NETWORK3.1. INDICATION OF FILE SERVER A file server differs from a personal computer in that the server is dedicated to storing files in acentralized location while permitting access to networked computers [10]. By having a file server, users can savework and have access to files without having to carry around a disk. Access privileges can be restricted to guestsand registered users [9]. Meanwhile, a centralized location means once place to backup all files. The file serversallow networked computers to share files at their discretion. On a personal file server, we can restrict accessprivileges to guests and registered users. This is the most common type of server in small businesses. A fileserver enables all files to be stored in a central location, which accommodates centralized backup strategies andsecurity implementation [11]. Linux works great as a network file server. Linux includes software called“samba” that allows files on the server to be viewed and edited on any Windows or Macintosh computer [8].3.2. BENEFITS OF NETWORK SERVER Files on the network server are backed up on a regular basis. If we inadvertently deleted an importantfile, it can be retrieved from the back up tape [4]. In addition, if we have a hard drive failure the files we saved onthe network server will not be affected [13]. Files can be shared with others. Several people may be working on adocument and storing the file in a shared directory allows each person to directly work on the document asneeded [14], [15]. IV. INDULGENT OF FTP SERVER FTP servers are still the most common way to make directories of documents and software available tothe public over the internet [1]. File-sharing applications are excellent tool for sharing files over a privatenetwork [13]. For organizations that need to share large numbers of files over public networks, however, FTPserver software provides more robust tools for sharing files and protecting our computer systems [15]. FTPservers in Linux draw on FTP features that have resulted from years of testing and experience gained from otherUNIX versions of FTP [14]. 78 | Page
  4. 4. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks a) FTP was originally used on multi-user systems, only limited parts of the file system in SENTOS andRHEL are devoted to public FTP access. Those who access FTP from a public user account. From there,anonymous user can access only files and directories below that point in the file system [12]. b) FTP relies on a login process that uses standard UNIX login names. Although strangers to the systemcould log in using anonymous as a user name, users with their own accounts on the system could log in withtheir own user names through FTP and most likely have access to a greater part of the file system [12].4.1. SAMBA SECURE SERVER RETRIEVAL Users want to integrate their Microsoft style desktop machines with their UNIX servers and otherswant to replace protocols like NFS and Novell NCP, especially when used with desktop computers [16]. TheSMB server to provide access to LAN manager-style services to SMB clients [15]. FTP like SMB client so wecan access system resources from UNIX, NetWare and other operating systems [15]. A limited command line toolthat supports some of administrative functionality could also be used on samba and NT workstation [11].4.2. IMPRESSION OF APACHE SERVER Apache is powerful server implements the latest protocols and extensible with third-party modules. Itcan be customized by writing, modules license of UNIX and several other operating systems [11]. Bugs reportsand patches implements many frequently requested features; including the database management forunauthorized allow to us easily setup password-protect pages with enormous numbers of authorized users,without bogging down the server [10]. Customize responses to errors and problems. Allows the setup files, oreven CGI scripts, which are returned by the server in response to errors and self stocks multiple directory index[6]. Apache has no fixed limit on the numbers of aliases which may be declared in the configuration files. Inaddition, a powerful rewriting engine can be used to solve most URL manipulation problems [2].4.3. VIRTUAL HOSTING Virtual hosting allows the server to distinguish between different IP addresses or names. Apache alsooffer dynamically configurable mass-virtual hosting [16]. We could configure apache to generate logs. Apachecan send log files to a pipe, allowing for filtering, real-time splitting of multiple hosts into separate logs [15]. Theabout apache explain how the apache project evolved from its beginnings as an outgrowth of the http project toits current status as one of the fastest, most efficient and most functional web servers in existence [5], [12].4.4. DHCP HOST CONFIGURATIONS We are probably interested in automating as much of the routine maintenance as possible. As thenetwork grows this becomes particularly important [12], [16]. When a new computer is added to our network orwhen a new employee joins an organization, we need to make configuration changes [1]. The IP has enablednetwork functionality that could scarcely be imagined when IP was first developed. In order for our networkclient and servers to take advantage of the numerous IP network services, software, and devices, each of ourclients’ needs an IP address. In most cases, its because that LAN is connected to a server that is set up to doDHCP [3]. Linux and Windows systems are set up by default to look for a DHCP server on all Ethernet cards. Ifthe ISP has configured a DHCP server, we can be on the internet faster than we can open Web browser. Settingup a DHCP server enables us to centrally manage the addresses and other network information for clientcomputers on our private network [9]. With DHCP configured on our network, a client computer can simplyindicate that it wants to use DHCP and the DHCP server can provide its IP address, network mask, DNS server,NetBIOS server, router and other information needed to get up and running on the network. With DHCP, we cangreatly simplify the initial network configuration that each client computer on our network needs to do [7].Later, as a network evolves, we can easily update that information, having changes automatically picked up byclients when they restart their network interfaces [7]. V. CONCLUSION This paper describes the implementation of heterogeneous environment which was relying onMicrosoft and Linux clients’ access secure environment on heterogeneous network facilitates more securityfeatures using effective network and its related emerging technologies. In heterogeneous environment we caneasily create the objects, and active server pages. They can be used everywhere; if the change is to be appearingthen change would be just made in the single file. This heterogeneous environment experiments are donethrough the Microsoft and Linux environment was successfully implemented and show the possibility of anactivity level environment. 79 | Page
  5. 5. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous NetworksAPPENDIX –A (PARAMETERS OF SAMBA SERVER)[Global]Workgroup = OPENNAServer string = R&D of Open Network Architecture Samba ServerEncrypt passwords = TrueSecurity = usersmb passwd file = /etc/smbpasswdLog file = /var/log/samba/log.%mSocket options = IPTOS_LOWDELAY TCP_NODELAYDomain master = YesLocal master = YesPreferred master = YesOS level = 65DNS proxy = NoName resolve order = lmhosts host bcastBind interfaces only = TrueInterfaces = eth0 deny = ALLHosts allow = level = 1Create mask = 0644Directory mask = 0755Level2 oplocks = TrueRead raw = noWrite cache size = 262144[Homes]Comment = Home DirectoriesBrowseable = noRead only = noInvalid users = root bin daemon nobody named sys tty disk mem kmem users[tmp]Comment = Temporary File SpacePath = /tmpRead only = NoValid users = adminAPPENDIX –B (PARAMETERS OF FTP SERVER)1. The first step is to login as root in Linux server.2. Next send this command: yum install tftp-server3. Once the installation completes, send this command: nano /etc/xinetd.d/tftp4. When you open this file it will look like this;# default: off# Description: The tftp server serves files using the trivial file transfer# Protocol: The tftp protocol is often used to boot diskless# Workstations, download configuration files to network-aware printers, and to start the installation process for some operating systems.Service tftp {Socket_type = dgramProtocol = udpWait = yesUser = rootServer = /usr/sbin/in.tftpdServer_args = -s /tftpbootDisable = yesPer_source = 11Cps = 100 2Flags = IPv4 }5. Change disable = yes to disable = no to enable the tftp server6. Note that your server is enabled; it’s time to start it. Use this command to start running the TFTP server: /sbin/service xinetd start7. You will see: Starting xinetd: [OK]8. Your TFTP server is up and running. You want to find out where is your TFTP root directory is located. Usually the path of the rootdirectory is at /tftpboot So type this command: ls /9. You will see it in the root directory. Now we create a test file to make sure it works. So send this command: touch /tftpboot/test10. Now that you created the file, you can connect to your FTFP server with this command:tftp localhosttftp> get testtftp> quit11. If you want to connect to your server remotely. Open a DOS console/terminal and enter this command: tftp GET test 80 | Page
  6. 6. Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks REFERENCES[1] Mahbubul, Ramjee Prasad, and John R. Farserotu. "Quality of service among IP-based heterogeneous networks." Personal Communications, IEEE 8.6 (2009): 18-24.Denmark.[2] Hensgen, Debra A., et al. "An overview of MSHN: The management system for heterogeneous networks." Heterogeneous Computing Workshop, 2000.(HCW2K) Proceedings. Eighth. IEEE, 2008.[3] Dutta, Ashutosh, et al. "Seamless proactive handover across heterogeneous access networks." Wireless Personal Communications 43.3 (2007): 837-855.[4] O’Hanlon, T., (2011) "Quality Auditing for ISO 9001-2010: Making Compliance Value-Added". American Society for Quality.USA.[5] Smith, John R., Rakesh Mohan, and Chung-Sheng Li. "Transcoding internet content for heterogeneous client devices." Circuits and Systems, 2010. ISCAS, Proceedings of the 2010 IEEE International Symposium on. Vol. 3. IEEE, 2010.India.[6] Fu, Cheng Peng, and Soung C. Liew. "TCP Veno: TCP enhancement for transmission over wireless access networks." Selected Areas in Communications, IEEE Journal on 21.2 (2005): 216-228.[7] Lim, Mario. "Integrating heterogeneous authentication and authorization mechanisms into an application access control system." U.S. Patent No. 6,728,884. 27 Apr. 2006.[8] Tian, Ye, Kai Xu, and Nirwan Ansari. "TCP in wireless environments: problems and solutions." Communications Magazine, IEEE 43.3 (2007): S27-S32.[9] Akyildiz, Ian F., Xudong Wang, and Weilin Wang. "Wireless mesh networks: a survey." Computer networks 47.4 (2008): 445-487.[10] C. Thompson, 25 Ideas for 2010: Digital Forgetting, Wired UK,November 2010.[11] Cappiello, M., A. Floris, and L. Veltri. "Mobility amongst heterogeneous networks with AAA support." Communications, 2009. ICC 2009. IEEE International Conference on. Vol. 4. IEEE, 2009.[12] Jonathan Grudin (2002) ”Why groupware applications fail: Problems in design and evaluation. Office: Technology and People”, 4(3):245-264, June 2002. France.[13] Wayner, P., 2006, Free for All: How Linux and the Free Software Movement Undercut the High- Tech Titans (Harper Collins, New York).USA[14] Droms, Ralph E. "Access to heterogeneous directory services." INFOCOM01. Annual Joint Conference of the IEEE Computer and Communication Societies.The Multiple Facets of Integration. Proceedings., IEEE , 2001.[15] Jack J. Dongarra, Rolf Hempel, Anthony J. G. Hey, and David W.Walker. "A Proposal for a User-Level, Message-Passing Interface in a Distributed Memory Environment", Technical Report ORNL/TM,Ridge National Laboratory, 1999.USA.[16] D. Cheriton, "The V Distributed System", Comm. ACM, Vol. 31, No. 3, pp. 314-333, March 2008.Newzealand. 81 | Page