0% found this document useful (0 votes)
51 views

Activity Level Implementation of Microsoft & Linux Client Access On Heterogeneous Networks

The document discusses implementing a secure environment for Microsoft and Linux clients to access a heterogeneous network. It describes setting up an ISA server with firewall and caching features to secure the Microsoft network. It indicates benefits of using a Linux file server and FTP server for file sharing and storage. The goal is to design and test a solution allowing both Microsoft and Linux clients to securely collaborate and share resources over the heterogeneous network.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Activity Level Implementation of Microsoft & Linux Client Access On Heterogeneous Networks

The document discusses implementing a secure environment for Microsoft and Linux clients to access a heterogeneous network. It describes setting up an ISA server with firewall and caching features to secure the Microsoft network. It indicates benefits of using a Linux file server and FTP server for file sharing and storage. The goal is to design and test a solution allowing both Microsoft and Linux clients to securely collaborate and share resources over the heterogeneous network.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 76 -81 www.iosrjournals.

org

Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks
A

Mir Sajjad Hussain Talpur, B Murtaza Hussain Shaikh, C Riaz Ali Buriro, D Arif Hussain Soomro
A

Information Technology Centre, Sindh Agriculture University Tandojam (SAU), Tandojam Pakistan B Member IEEE, Oslo, Norway C Department of Statistics, Sindh Agriculture University Tandojam (SAU), Tandojam Pakistan D PAF Karachi Institute of Economics & Technology (KIET), Karachi Pakistan

Abstract : This article will debates to create a Microsoft and Linux clients access secure environment on heterogeneous networks. The class files are being constructed, where so ever they are necessitate waiving the huge coding process. The exploit of heterogeneous network in various organizations is becoming more popular in modern years. This inclination seems to be continued as long as the heterogeneous system meets diverse needs of software developers. By utilizing new techniques and design of these composite systems are no longer tricky compared to the past era`s of communication. A heterogeneous network is an environment where Microsoft and Linux operation systems could work collaboratively and provide effective interactions of computers, network links. This phenomenon is derived from heterogeneous arrangement of various operating systems especially Microsoft Windows and Linux is used in different emerging technologies. Therefore, the purpose of this article is to design and implement a Microsoft and Linux clients access secu re environment on heterogeneous network and to show the possibility of an activity level environment. Keywords:Interpretability, Multiplatform, Connectivity, Centralization, Perimeter, Environments, Configuration. I. OBJECTIVES

Heterogeneous involves workstation, server and application from any vendors, all-working in a single unit & interacts between cross platform in the network. The network may also use different media and different protocols like IPX, and TCP/IP over different network link. The ability to interoperate within heterogeneous environments is becoming more important as large, complex system from different commercial sources like Linux and Windows servers configured at one place such are often connect with each other by using different services in the Ethernet network [1].

Figure 1. Operating Systems rapidly changing the Software business

Security would be major issue to make this multiplatform network succeed. We would implement, ISA for make this network secure in the early days of networking. A network involves only one type of operating system, so communication was not an issue. Ensuring the privacy and integrity of all multiplatform information is vital with todays for business [3]. As companies use the feasibility & cost effectiveness of Internet to extend their network to branches offices telecommuters, customers they are deploying their network & which are typically heterogeneous network [1]. As shown in fig1, the operating systems are rapidly changing the way we do business. The main objective for this study is to; a) Integrating of the information and Centralization of network support. www.iosrjournals.org 76 | Page

Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks
b) To reduce the deployment & increase control with centralized management & policy enforcement. c) Lower total cost of ownership by using different operator system in infrastructure.

II.

INDICATIONS OF MICROSOFT BASES NETWORK

2.1. SECURED FEATURES IN ISA SERVER Microsoft internet security and acceleration server integrates firewall and cache features to secure a network and improve its performance. ISA server routes responses between internet and client computers after determining if the communication is authentic [2]. As a cache, ISA also stores frequently requested internet sites so that the objects can be quickly accessed by clients, rather from the internet [2]. Vast numbers of corporate networks are now connected to the internet and there is a great need of a powerful administer internet gateway that provides secure connections [8]. Microsoft internet security and ISA server meets these demands by offering a complete internet connectivity solution that contains both an enterprise firewall and a complete web cache solution [5]. These services are complementary, we can use either or both of these functions when installing ISA server secure network, allowing us to implement a business security policy by configuring a broad set of rules that specify which sites, protocols, and content can be passed through the ISA server computer [14] ,[16] . As revealed in fig 2, ISA server monitors requests between internet and internal clients, controlling who can get on the corporate network.

Figure 2. ISA Server functioning [5]

2.2. INTERNET FIREWALL SECURITY ASPECT In firewall capacity, ISA server allows us to prevent unauthorized internet user from accessing the local network by examining all incoming data and blocking packets that do not meet a specified security criteria [4]. ISA server combines several security mechanisms to help enforcing security policies at all network layers, as determined in fig 3. In its function as a cache server, Microsoft internet security and acceleration server improve network performance by maintaining a cache of frequently request web objects [4], [7]. 2.3. DEPLOYMENT SCENARIO AND CONSTRAINTS Microsoft internet security and acceleration server can be deployed in varied network topologies. This section describes some typically network configurations [8], [9]. When using Internet security and acceleration server at the perimeter of our network in the web caching (i.e. sometimes referred to as forward caching) role occasionally it is necessary to view, remove or validate specific web site URL content within the ISA 2011 cache [6].

Figure 3. Microsoft server frequency of cache objects

The ISA 2011 cache is a dedicated file (i.e. DirX.cdat by extension) that contains the content derived from web servers. In this article we have tried to demonstrate how to configure and use a tool released by www.iosrjournals.org 77 | Page

Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks
Microsoft titled the cache directory tool to view the contents of the ISA2011 cache after visiting a specific website.

Figure 4. Internal workstation clients route through ISA

Again, for this ISA2011 configuration the focus is on forward caching with ISA2011 at the gateway as shown in fig 4. Indeed, it is possible to configure the cache in ISA2011 to a specific fixed size as determined in the fig 5.

Figure 5. Internet access attempts and IP configuration

III.

INDICATIONS OF LINUX BASES NETWORK

3.1. INDICATION OF FILE SERVER A file server differs from a personal computer in that the server is dedicated to storing files in a centralized location while permitting access to networked computers [10]. By having a file server, users can save work and have access to files without having to carry around a disk. Access privileges can be restricted to guests and registered users [9]. Meanwhile, a centralized location means once place to backup all files. The file servers allow networked computers to share files at their discretion. On a personal file server, we can restrict access privileges to guests and registered users. This is the most common type of server in small businesses. A file server enables all files to be stored in a central location, which accommodates centralized backup strategies and security implementation [11]. Linux works great as a network file server. Linux includes software called samba that allows files on the server to be viewed and edited on any Windows or Macintosh computer [8]. 3.2. BENEFITS OF NETWORK SERVER Files on the network server are backed up on a regular basis. If we inadvertently deleted an important file, it can be retrieved from the back up tape [4]. In addition, if we have a hard drive failure the files we saved on the network server will not be affected [13]. Files can be shared with others. Several people may be working on a document and storing the file in a shared directory allows each person to directly work on the document as needed [14], [15].

IV.

INDULGENT OF FTP SERVER

FTP servers are still the most common way to make directories of documents and software available to the public over the internet [1]. File-sharing applications are excellent tool for sharing files over a private network [13]. For organizations that need to share large numbers of files over public networks, however, FTP server software provides more robust tools for sharing files and protecting our computer systems [15]. FTP servers in Linux draw on FTP features that have resulted from years of testing and experience gained from other UNIX versions of FTP [14].

www.iosrjournals.org

78 | Page

Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks
a) FTP was originally used on multi-user systems, only limited parts of the file system in SENTOS and RHEL are devoted to public FTP access. Those who access FTP from a public user account. From there, anonymous user can access only files and directories below that point in the file system [12]. b) FTP relies on a login process that uses standard UNIX login names. Although strangers to the system could log in using anonymous as a user name, users with their own accounts on the system could log in with their own user names through FTP and most likely have access to a greater part of the file system [12]. 4.1. SAMBA SECURE SERVER RETRIEVAL Users want to integrate their Microsoft style desktop machines with their UNIX servers and others want to replace protocols like NFS and Novell NCP, especially when used with desktop computers [16]. The SMB server to provide access to LAN manager-style services to SMB clients [15]. FTP like SMB client so we can access system resources from UNIX, NetWare and other operating systems [15]. A limited command line tool that supports some of administrative functionality could also be used on samba and NT workstation [11]. 4.2. IMPRESSION OF APACHE SERVER Apache is powerful server implements the latest protocols and extensible with third-party modules. It can be customized by writing, modules license of UNIX and several other operating systems [11]. Bugs reports and patches implements many frequently requested features; including the database management for unauthorized allow to us easily setup password-protect pages with enormous numbers of authorized users, without bogging down the server [10]. Customize responses to errors and problems. Allows the setup files, or even CGI scripts, which are returned by the server in response to errors and self stocks multiple directory index [6]. Apache has no fixed limit on the numbers of aliases which may be declared in the configuration files. In addition, a powerful rewriting engine can be used to solve most URL manipulation problems [2]. 4.3. VIRTUAL HOSTING Virtual hosting allows the server to distinguish between different IP addresses or names. Apache also offer dynamically configurable mass-virtual hosting [16]. We could configure apache to generate logs. Apache can send log files to a pipe, allowing for filtering, real-time splitting of multiple hosts into separate logs [15]. The about apache explain how the apache project evolved from its beginnings as an outgrowth of the http project to its current status as one of the fastest, most efficient and most functional web servers in existence [5], [12]. 4.4. DHCP HOST CONFIGURATIONS We are probably interested in automating as much of the routine maintenance as possible. As the network grows this becomes particularly important [12], [16]. When a new computer is added to our network or when a new employee joins an organization, we need to make configuration changes [1]. The IP has enabled network functionality that could scarcely be imagined when IP was first developed. In order for our network client and servers to take advantage of the numerous IP network services, software, and devices, each of our clients needs an IP address. In most cases, it's because that LAN is connected to a server t hat is set up to do DHCP [3]. Linux and Windows systems are set up by default to look for a DHCP server on all Ethernet cards. If the ISP has configured a DHCP server, we can be on the internet faster than we can open Web browser. Setting up a DHCP server enables us to centrally manage the addresses and other network information for client computers on our private network [9]. With DHCP configured on our network, a client computer can simply indicate that it wants to use DHCP and the DHCP server can provide its IP address, network mask, DNS server, NetBIOS server, router and other information needed to get up and running on the network. With DHCP, we can greatly simplify the initial network configuration that each client computer on our network needs to do [7]. Later, as a network evolves, we can easily update that information, having changes automatically picked up by clients when they restart their network interfaces [7].

V.

CONCLUSION

This paper describes the implementation of heterogeneous environment which was relying on Microsoft and Linux clients access secure environment on heterogeneous network facilitates more security features using effective network and its related emerging technologies. In heterogeneous environment we can easily create the objects, and active server pages. They can be used everywhere; if the change is to be appearing then change would be just made in the single file. This heterogeneous environment experiments are done through the Microsoft and Linux environment was successfully implemented and show the possibility of an activity level environment.

www.iosrjournals.org

79 | Page

Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks APPENDIX A (PARAMETERS OF SAMBA SERVER)
[Global] Workgroup = OPENNA Server string = R&D of Open Network Architecture Samba Server Encrypt passwords = True Security = user smb passwd file = /etc/smbpasswd Log file = /var/log/samba/log.%m Socket options = IPTOS_LOWDELAY TCP_NODELAY Domain master = Yes Local master = Yes Preferred master = Yes OS level = 65 DNS proxy = No Name resolve order = lmhosts host bcast Bind interfaces only = True Interfaces = eth0 192.168.1.1 Hosts deny = ALL Hosts allow = 192.168.1.4 127.0.0.1 Debug level = 1 Create mask = 0644 Directory mask = 0755 Level2 oplocks = True Read raw = no Write cache size = 262144 [Homes] Comment = Home Directories Browseable = no Read only = no Invalid users = root bin daemon nobody named sys tty disk mem kmem users [tmp] Comment = Temporary File Space Path = /tmp Read only = No Valid users = admin

APPENDIX B (PARAMETERS OF FTP SERVER)


1. The first step is to login as root in Linux server. 2. Next send this command: yum install tftp-server 3. Once the installation completes, send this command: nano /etc/xinetd.d/tftp 4. When you open this file it will look like this; # default: off # Description: The tftp server serves files using the trivial file transfer # Protocol: The tftp protocol is often used to boot diskless # Workstations, download configuration files to network-aware printers, and to start the installation process for some operating systems. Service tftp { Socket_type = dgram Protocol = udp Wait = yes User = root Server = /usr/sbin/in.tftpd Server_args = -s /tftpboot Disable = yes Per_source = 11 Cps = 100 2 Flags = IPv4 } 5. Change disable = yes to disable = no to enable the tftp server 6. Note that your server is enabled; its time to start it. Use this command to start running the TFTP server: /sbin/service xinetd start 7. You will see: Starting xinetd: [OK] 8. Your TFTP server is up and running. You want to find out where is your TFTP root directory is located. Usually the path of the root directory is at /tftpboot So type this command: ls / 9. You will see it in the root directory. Now we create a test file to make sure it works. So send this command: touch /tftpboot/test 10. Now that you created the file, you can connect to your FTFP server with this command: tftp localhost tftp> get test tftp> quit 11. If you want to connect to your server remotely. Open a DOS console/terminal and enter this command: tftp 172.16.20.1 GET test

www.iosrjournals.org

80 | Page

Activity level Implementation of Microsoft & Linux Client Access on Heterogeneous Networks REFERENCES
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] Mahbubul, Ramjee Prasad, and John R. Farserotu. "Quality of service among IP-based heterogeneous networks." Personal Communications, IEEE 8.6 (2009): 18-24.Denmark. Hensgen, Debra A., et al. "An overview of MSHN: The management system for heterogeneous networks." Heterogeneous Computing Workshop, 2000.(HCW'2K) Proceedings. Eighth. IEEE, 2008. Dutta, Ashutosh, et al. "Seamless proactive handover across heterogeneous access networks." Wireless Personal Communications 43.3 (2007): 837-855. OHanlon, T., (2011) "Quality Auditing for ISO 9001 -2010: Making Compliance Value-Added". American Society for Quality.USA. Smith, John R., Rakesh Mohan, and Chung-Sheng Li. "Transcoding internet content for heterogeneous client devices." Circuits and Systems, 2010. ISCAS, Proceedings of the 2010 IEEE International Symposium on. Vol. 3. IEEE , 2010.India. Fu, Cheng Peng, and Soung C. Liew. "TCP Veno: TCP enhancement for transmission over wireless access networks." Selected Areas in Communications, IEEE Journal on 21.2 (2005): 216-228. Lim, Mario. "Integrating heterogeneous authentication and authorization mechanisms into an application access control system." U.S. Patent No. 6,728,884. 27 Apr. 2006. Tian, Ye, Kai Xu, and Nirwan Ansari. "TCP in wireless environments: problems and solutions." Communications Magazine, IEEE 43.3 (2007): S27-S32. Akyildiz, Ian F., Xudong Wang, and Weilin Wang. "Wireless mesh networks: a survey." Computer networks 47.4 (2008): 445-487. C. Thompson, 25 Ideas for 2010: Digital Forgetting, Wired UK,November 2010. Cappiello, M., A. Floris, and L. Veltri. "Mobility amongst heterogeneous networks with AAA support." Communications, 2009. ICC 2009. IEEE International Conference on. Vol. 4. IEEE, 2009. Jonathan Grudin (2002) Why groupware applications fail: Problems in design and evaluation. Office: Technology and People, 4(3):245-264, June 2002. France. Wayner, P., 2006, Free for All: How Linux and the Free Software Movement Undercut the High- Tech Titans (Harper Collins, New York).USA Droms, Ralph E. "Access to heterogeneous directory services." INFOCOM'01. Annual Joint Conference of the IEEE Computer and Communication Societies.'The Multiple Facets of Integration'. Proceedings., IEEE , 2001. Jack J. Dongarra, Rolf Hempel, Anthony J. G. Hey, and David W.Walker. "A Proposal for a User-Level, Message-Passing Interface in a Distributed Memory Environment", Technical Report ORNL/TM,Ridge National Laboratory, 1999.USA. D. Cheriton, "The V Distributed System", Comm. ACM, Vol. 31, No. 3, pp. 314-333, March 2008.Newzealand.

www.iosrjournals.org

81 | Page

You might also like