International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016

Size: px
Start display at page:

Download "International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016"

Transcription

1 International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016 Campus Area Network Automation Prof. Bhavana Khivsara 1, Monika S. Firodiya 2, Ankit C. Gandhi 3, Shital Wani 4, Ajinkya A. Bhavsar 5 1 Asst.Prof.at Department of Computer Engineering, S.N.J.B s KBJ COE, Chandwad, bhavana.khivsara@gmail.com 2 Department of Mechanical Engineering, S.N.J.B s KBJ COE, Chandwad, monikasfirodiya@gmail.com 3 Department of Mechanical Engineering, S.N.J.B s KBJ COE, Chandwad, ankitgandhi54@gmail.com 4 Department of Mechanical Engineering, S.N.J.B s KBJ COE, Chandwad, shitalwani95@gmail.com 5 Department of Mechanical Engineering, S.N.J.B s KBJ COE, Chandwad, aabhavsar14@gmail.com Abstract Now a day s Internet is widely used by mostly everyone as now it's a necessity of today's generation. As we know college campus, IT industries and many more companies needs the internet access. So the Campus Area Network (CAN) comes in a picture for making the benefitting use of network. Considering for the college purpose, it's divided to different Laboratories, HOD office, gymnasium, hostels, principal office etc. For security purposes every user is provided with a unique user-id and password for accessing the internet. New student can apply for used-id and password to the administrator. Administrator can create the report generation and also has the authority to create and delete the user-id and block the user-id. Also like students new joined staff can apply for the id and password and existing staff can use internet as by making use of their id. In proposed system we are going to make better use of college network for the students by making the befitting access of network like to stop use of illegal sites to the students, as if someone going to access an illegal sites then that particular student will get window message about don't access these sites if he continue ahead by ignoring the message his user-id will be blocked for 7days automatically, after 7days his user-id will be active. And also as per practical batch according to time table in-charge uploading schedule there is denial of use of network in practical lab. Keywords- Campus Area Network (CAN), SQUID Proxy Server, Access Log Files, Network Administrator. I. INTRODUCTION A campus area network is networking of multiple interconnected local networks (LAN) in a limit geographical area. The set of all communicating computers within a campus or university is said to be part of a Campus Area Network (CAN). A CAN is actually a group of connected LAN networks within spans across multiple places/apartments and is usually owned by a single administrative body. A campus network is far more than just a physical infrastructure and planning and creating a campus network really means developing a whole new information environment that will have an impact on almost everyone in campus. In building networks, campuses are engaged in a change process that is essential to their nature and existence. This product will give some advice to administrators and faculty about things to consider as they engage in planning, building, and managing campus networks in small college environments. a) Traditional CAN: Now each building in the campus would usually have at least one LAN, with each LAN having a multiple set of PC's coupled together by a L2 switch. A nerve network device in the form of a more powerful L2 switch interconnects the LANs of different buildings. For extraneous communication to the internet, the nerve L2 switch connects to a L3 Router (may called the external gateway). A small Corporate network is likely similar to a All rights Reserved

2 Need of Proxy server in CAN: Figure1. Traditional CAN [3] Colleges and many CAN use Proxy for the reasons like:- Security: -The System admin can control just exactly what flows through the proxy. Anonymity: - Web server only sees the IP address of the proxy. Control who you can visit: - I can tell the proxy not to serve you web server and you would get a message saying something like "site unavailable". Caching: - It will save bandwidth if I cache a web site, especially a static one as the proxy's web server will already have the page and will not have to retrieve it again. Malware: - It will intercept crap at the proxy, so you don't become a victim. Avoiding the "Great Firewall of China" Ok: - Colleges aren't going to do this but a proxy can be used to get around limits on what you can do on the Internet. Also, can be used quite effectively to circumvent most Internet laws being passed by Congress. Kitty porn for example. You go to a site that is porn free and get all the porn you need anonymously. I digress here. Load balancing. Avoidance of NAT: - Rather than using Network Address Translation the proxy keeps you on your private network. NAT can get messy on a large network. Figure2. CAN with proxy server [3] II. RELATED All rights Reserved 131

3 As proxy is very important device in college campus area network designing for automating, monitoring and generating the various types of reports. So in literature survey the main concentration is given on different types of proxies, there advantages and limitation. a) Firewall as a proxy server: A firewall is a security system that protects whole networks resources by filtering messages on the application layer. A proxy firewall also known by an application firewall or gateway firewall too. Just like a Proxy Server or Cache Server, a proxy firewall acts as a mediator between in-house clients and servers on the Internet. In addition to concluding which traffic is allowed and which is denied, a firewall uses state full observation technology and deep packet observation to calculate incoming traffic for signs of attack. Limitation: Not compatible with all network standards. A reduction of efficiency occurs as a result of additional handling needs required for software services. There is no such thing as a free of charge lunch. The configuration of proxy firewalls might be more difficult than other firewall systems. b) SOCKS proxy: A SOCKS server is a likely same as an old switch board. It simply cross wires your network connection through the system to outside connection. Most SOCKS server likely to work only with TCP type connections. And likely filtering firewalls socks server does not provide for user authentication. They can record the connected user s data. [5]. Limitation: Sock s Proxies itself does nothing make a shield to your data. It simply lets you proxy your connections through another alliance. Any Traffic going through the consumer and the SOCKS Proxies isn't secure. i.e. Less Secure c) Squid Analysis report generator: Squid is a high-enforcement proxy caching server for web clients, supporting FTP, gopher, and HTTP data objects. Unlike conventional caching software, Squid handles all requests in a single, non-blocking, I/O-driven process. There are two benefits to Squid Guard: it is fast and it is free. Squid Guard provide fine-grained controls such as redirecting to the URLs of your choice, filtering on URLs or domain names, blocking banners, advertisements (by redirecting to a small empty graphic file), defining access rules by time of day and date, defining access rules for users and IP address or IP ranges. SARG is an open source tool that allows you to analyze the squid log files and generates great reports in HTML format with information about users, IP addresses, top accessed sites, total bandwidth usage, lapse time, downloads, access denied websites, daily reports, weekly reports and monthly reports. The SARG is very convenient tool to view how much internet bandwidth is utilized by individual machines on the network and can watch on which websites the network's users are accessing [6]. PROPOSED SYSTEM In proposed system we are going to make better use of college network for the students by Making the benefitting access of network like to stop use of illegal sites to the students, as if Someone going to access an illegal sites then that particular student will get window message About don't access these sites if he continues ahead by ignoring the message his user-id will Be blocked for 7days automatically, after 7days his user-id will be active. And also as per Practical batch according to time table in-charge uploading schedule there is denial of use of Network in practical All rights Reserved 132

4 Figure3. SARG main window III. SYSTEM ARCHITECTURE Arrangement design of "CAN" grasps contradictory block which are shown in figure4. This System is Not only for Network Administrator, it is design for Student, Class Coordinator or Staff and Timetable In charge. Following are the task performs by Network Administrator, Student and Class Coordinator. Figure4. System Architecture 1) Network Administrator: Nowadays network administrator generates the username and password for the student manually. In this system we automatic generate the username and password. It also generates the student report. But this work is statically perform i.e. single the yesterday s report we understood in the report. But in our system we give the facility of dynamic report generation. 2) Student: Students apply for username and password to network administrator. System verifies the username and password and student login successfully. Then student can accessing internet and downloading the limited data. 3) Staff: New staff also applies for username and password to network administrator. After Login accessing internet and download data. Also check the Student's generated report. 4) Timetable In charge: It performs the work like upload the timetable, update the timetable and delete the timetable. 1) Report generation algorithm: IV. All rights Reserved 133

5 Bin-Search (list, low, high, key) { If (high<low) then Search key is not found; else { Mid = (low + high) /2; If (strcmp (list [mid], key)==0) Search key is found; else if (key<0) Low=mid+1; else High=mid-1; } } 2) Algorithm for modified approach (Bandwidth utilization): Two types of node are there such as Primary and supporting nodes. As name indicate what each will do. Primary are Main nodes and associate are used to holder overload. When a Primary Node is overloaded, it will search other Primary node (light weighted) inside a cluster if such node is found; overloaded primary node will maintain the Load balancing with available main node, if suitable primary node is not found. Algorithm: Ni= List of chief nodes SNj= List of supporting nodes PI= Priority index retained by supportive node Pk= List of processes in Process Queue i, j, k _N; j < i==n Natural Number Initially assuming each node is having some load, Some supporting nodes may have load Ni Load; SjLoad==load defines some process is there Procedure Main () { I. Suppose a nodent is heavily loaded with load Where 0 < t < i; Pk // Two situations are possible as in step II. II. If (Search-node) // Search-node will find out whether a light weighted main node is presented, if primary node is //available it will give index of available node. Available-Node // Overload is assigned to Available node given by Search-node () Load (Nt) =Load (Nt) // Minimum load contains the number of procedures as well as structure or configuration of node III. Return (index of available Supporting node) // index describes the property to recognize the node } Time complexity: This time complexity is for binary search algorithm. And this system is comes under 'P' problem. Best Case performance O(1). Worst Case performance O(log n). Average Case performance O(log All rights Reserved 134

6 Automated CAN benefits are as follows: Cost effective Shrink time ingestion Increase Network bandwidth User friendly Applications: Campus Industry Military base ACKNOWLEDGEMENT We would like to recognize to all the people who have been of the help and assisted me throughout my project work. First of all I would like to thank my respected guide Asst. Prof. B. A. Khivsara, Professor in Department of Computer Engineering for presenting me throughout types needed. The time-to-time guidance, encouragement, and valuable suggestions received from him are notable in my life. This work would not have been possible without the enthusiastic response, insight, and new ideas from her. I am also grateful to all the faculty members of SNJB's College of Engineering for their support. I would like to thank my lovely parents for time-to-time support and encouragement and valuable suggestions, and thank my friends for their valuable support and encouragement. The greeting would be unfinished without reference of the approval of the Massive, which helped me in keeping high moral during most tough period. CONCLUSION This system is based on automated College Campus Area Networking. Its main concern is to develop an automated campus area network which will help the network administrator to manage and maintain the network easily, efficiently and dynamically. This system allows users to access the internet according to the rules generated by the system. System will also manage the load balancing and bandwidth utilization dynamically. This system will also help the network administrator to generate user report according the requirement with the help of access log file generated by Squid proxy. REFERENCES [1] Delavaria, N., Phon-Amnuaisuka, S., & Reza Beikzadehb, M. (2008). Data mining application in higher learning institutions.informatics in Education, 7(1), 31. [2] J. Cole and H. Foster, Using Moodle: Teaching with the popular open source course management system. O Reilly Media, Inc., [3]m. durairaj et al, / (ijcsit) international journal of computer science and information technologies, vol. 5 (4), 2014, Educational data mining for prediction of student performance using clustering algorithms m. durairaj #1, c. vijitha [4] Machine Learning Group at the University of Waikato, Weka 3: Data Mining Software in Java, 2013, [5] Numenta, HTM cortical learning algorithms, Numenta, Tech. Rep., [6] Moodle Trust, Moodle official site, 2013, All rights Reserved 135

7

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016

International Journal of Modern Trends in Engineering and Research   e-issn No.: , Date: April, 2016 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Identification of WhatsApp Users Among Large Dataset Patil Bhagyashri 1,Nimje

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2004 Kerio Technologies. All Rights Reserved. Printing Date: April 25, 2004 This guide provides detailed description on configuration of the local network

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

International Journal of Modern Trends in Engineering and Research   e-issn No.: , Date: 2-4 July, 2015 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 Email Sending Using Non-GPRS Mobile Avinash Patil 1, Mayur Danej 2, Virali Patel

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2006 Kerio Technologies. All Rights Reserved. Printing Date: May 3, 2006 This guide provides detailed description on configuration of the local network

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Release Date: March 16, 2007 This guide provides detailed description on configuration of the local network which

More information

Minimum Security Standards for Networked Devices

Minimum Security Standards for Networked Devices University of California, Merced Minimum Security Standards for Networked Devices Responsible Official: Chief Information Officer Responsible Office: Information Technology Issuance Date: Effective Date:

More information

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE (4/20/07) WHO IS KERIO? Kerio Technologies provides Internet messaging and firewall software solutions for small to medium sized networks,

More information

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton Abstract The Office of Navel Research Network Team actively

More information

Foothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network

Foothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network Foothill-De Anza Community College District Wireless Networking Guidelines Problems Connecting to or Using the Wireless Network My login name and password are not working. HELP! There are different wireless

More information

Smeal College of Business - Central Firewall Rules and Policies

Smeal College of Business - Central Firewall Rules and Policies Smeal College of Business - Central Firewall Rules and Policies 1.0 Purpose The purpose of this policy is to outline the College s use and management of centralized firewall services. This policy will

More information

Software. Linux. Squid Windows

Software. Linux. Squid Windows Proxy Server Introduction A proxy server services client requests by forwarding : the requests to the destination server. The requests appear to come from the proxy server and not from the client. the

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

Using Rumpus On Private Networks

Using Rumpus On Private Networks Using Rumpus On Private Networks Contents How Port Forwarding Works 2 Configuring Your Router 3 Rumpus Setup 4 On Networks With A Dynamic IP Address 4 Testing And Troubleshooting Your Server 4 Maxum Development

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

A Review Approach for Big Data and Hadoop Technology

A Review Approach for Big Data and Hadoop Technology International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 2-4 July, 2015 A Review Approach for Big Data and Hadoop Technology Prof. Ghanshyam Dhomse

More information

Why Firewalls? Firewall Characteristics

Why Firewalls? Firewall Characteristics Why Firewalls? Firewalls are effective to: Protect local systems. Protect network-based security threats. Provide secured and controlled access to Internet. Provide restricted and controlled access from

More information

Chapter 5 System Implementation and Manual. Purpose of the system is to provide the students a simple and more efficient way to

Chapter 5 System Implementation and Manual. Purpose of the system is to provide the students a simple and more efficient way to Chapter 5 System Implementation and Manual 5.1 Introduction Purpose of the system is to provide the students a simple and more efficient way to submit forms, and observe and trace the progress of their

More information

More Interactive Service is Now Available

More Interactive Service is Now Available More Interactive Service is Now Available Are you a newcomer for the Colombia Aprende? Visit help center(http://colombiaaprende.edu.co/help), You can ask to the community and helpers how to find the content

More information

How to open ports in the DSL router firmware version 2.xx and above

How to open ports in the DSL router firmware version 2.xx and above How to open ports in the DSL router firmware version 2.xx and above This example shows how to open port 3389 (which is used by Remote Desktop service) in the DSL router running firmware version 2.xx or

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

Configuring Authentication Proxy

Configuring Authentication Proxy The Cisco IOS Firewall Authentication Proxy feature provides dynamic, per-user authentication and authorization, authenticating users against industry standard TACACS+ and RADIUS authentication protocols.

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC ii Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband ADSL Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

Tegrity Admin Information

Tegrity Admin Information October, 2010 Tegrity Admin Information 1. How to get your Tegrity admin credentials 2. Where to login 3. Required Configurations 4. Required Bandwidth and Storage 5. Get Support 6. Tegrity User Roles

More information

SpamCheetah manual. By implementing protection against botnets we can ignore mails originating from known Bogons and other sources of spam.

SpamCheetah manual. By implementing protection against botnets we can ignore mails originating from known Bogons and other sources of spam. SpamCheetah manual SpamCheetah is the spam control technique from Gayatri Hitech. SpamCheetah achieves spam control by way of employing an SMTP proxy which invokes various virus scanning, spam control

More information

DOWNLOAD PDF CISCO IRONPORT CONFIGURATION GUIDE

DOWNLOAD PDF CISCO IRONPORT CONFIGURATION GUIDE Chapter 1 : Cisco IronPort E-mail Security Appliance Best Practices : Part 3 - emtunc's Blog Cisco IronPort AsyncOS for Email Security Advanced Configuration Guide (PDF - 9 MB) Cisco IronPort AsyncOS for

More information

25 Best Practice Tips for architecting Amazon VPC

25 Best Practice Tips for architecting Amazon VPC 25 Best Practice Tips for architecting Amazon VPC 25 Best Practice Tips for architecting Amazon VPC Amazon VPC is one of the most important feature introduced by AWS. We have been using AWS from 2008 and

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Performance Evaluation of National Knowledge Network Connectivity

Performance Evaluation of National Knowledge Network Connectivity International Journal of Computer Applications (975 888) Performance Evaluation of National Knowledge Network Connectivity Vipin Saxena, PhD. Department of Computer Science B.B. Ambedkar University (A

More information

Computer Security and Privacy

Computer Security and Privacy CSE P 590 / CSE M 590 (Spring 2010) Computer Security and Privacy Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for

More information

Choosing The Best Firewall Gerhard Cronje April 10, 2001

Choosing The Best Firewall Gerhard Cronje April 10, 2001 Choosing The Best Firewall Gerhard Cronje April 10, 2001 1. Introduction Due to the phenomenal growth of the Internet in the last couple of year s companies find it hard to operate without a presence on

More information

Unlike Proxy Server 1.0, Proxy Server 2.0 includes packet filtering and many other features that we will be discussing.

Unlike Proxy Server 1.0, Proxy Server 2.0 includes packet filtering and many other features that we will be discussing. Understanding Microsoft Proxy Server 2.0 By NeonSurge Rhino9 Publications Preface- This documented was not made for people who have been working with Microsoft Proxy Server since its beta (catapult) days.

More information

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver LevelOne FBR-1416 1W, 4L 10/100 Mbps ADSL Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 FBR-1416 Features... 1 Package Contents... 3 Physical Details... 3 CHAPTER 2

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

Data Store and Multi-Keyword Search on Encrypted Cloud Data

Data Store and Multi-Keyword Search on Encrypted Cloud Data Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

AppSpider Enterprise. Getting Started Guide

AppSpider Enterprise. Getting Started Guide AppSpider Enterprise Getting Started Guide Contents Contents 2 About AppSpider Enterprise 4 Getting Started (System Administrator) 5 Login 5 Client 6 Add Client 7 Cloud Engines 8 Scanner Groups 8 Account

More information

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

It is requested that the Board approve the Northern Arizona University s Network Upgrade and Wireless Expansion Project.

It is requested that the Board approve the Northern Arizona University s Network Upgrade and Wireless Expansion Project. Page 1 of 7 EXECUTIVE SUMMARY ACTION ITEM: Network Upgrade and Wireless Expansion Project. ISSUE: Information Technology Services (ITS) proposes a campus-wide data network upgrade and the expansion of

More information

Qualtrics Training Guide for Baruch College. Table of Contents. Qualtrics Training Guide. I. Basic Overview

Qualtrics Training Guide for Baruch College. Table of Contents. Qualtrics Training Guide. I. Basic Overview Qualtrics Training Guide for Baruch College Qualtrics Training Guide Qualtrics is a web-based application for creating and administering online surveys and polls. The service is available to all Baruch

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

How to Activate Student Log in to the student Registration system (also known as My Community Education or Banner ).

How to Activate Student Log in to the student Registration system (also known as My Community Education or Banner ). How to Activate Student E-Mail 1. Log in to the student Registration system (also known as My Community Education or Banner ). 2. The new account notice shows at the top of the screen once signed in. Click

More information

Networks and the Internet

Networks and the Internet UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Networks and the Internet A network is a collection of computers and devices connected together, often

More information

Collegiate Link FAQ for Club and Student Organization Leaders

Collegiate Link FAQ for Club and Student Organization Leaders Collegiate Link FAQ for Club and Student Organization Leaders What is Collegiate Link? Collegiate Link (CL) is a database that chronicles student organization profiles, membership rosters, and events,

More information

WDD Fall 2016Group 4 Project Report

WDD Fall 2016Group 4 Project Report WDD 5633-2 Fall 2016Group 4 Project Report A Web Database Application on Loan Service System Devi Sai Geetha Alapati #7 Mohan Krishna Bhimanadam #24 Rohit Yadav Nethi #8 Bhavana Ganne #11 Prathyusha Mandala

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 642-541 Title : VPN and Security Cisco SAFE Implementation Exam (CSI) Vendors : Cisco

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

Multi-Homing Broadband Router. User Manual

Multi-Homing Broadband Router. User Manual Multi-Homing Broadband Router User Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel...

More information

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network 10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity

More information

An Overview of Mobile Security

An Overview of Mobile Security An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

CS Paul Krzyzanowski

CS Paul Krzyzanowski Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide

More information

Google Docs Tipsheet. ABEL Summer Institute 2009

Google Docs Tipsheet. ABEL Summer Institute 2009 Google Docs Tipsheet ABEL Summer Institute 2009 Contents Logging in to Google Apps for CollaborativeSchools.net for the First Time... 2 Text Documents Creating a New Text Document in Google Docs... 5 Uploading

More information

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12

Internet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12 Chapter12 Internet Platform Management The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it

More information

Android based Attendance Management System Offline and Online accessibility

Android based Attendance Management System Offline and Online accessibility IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 4, Ver. IV. (Jul.-Aug. 2017), PP 31-36 www.iosrjournals.org Android based Attendance Management System

More information

WHG711 V3.20. Secure WLAN Controller

WHG711 V3.20. Secure WLAN Controller WHG711 V3.20 Secure WLAN Controller Copyright Notice This document is protected by USA copyright laws and other laws and is the property of 4IPNET, INC. You may not copy, reproduce, distribute, publish,

More information

Application Firewalls

Application Firewalls Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed

More information

District 5910 Website Quick Start Manual Let s Roll Rotarians!

District 5910 Website Quick Start Manual Let s Roll Rotarians! District 5910 Website Quick Start Manual Let s Roll Rotarians! All Rotarians in District 5910 have access to the Members Section of the District Website THE BASICS After logging on to the system, members

More information

UIP1869V User Interface Guide

UIP1869V User Interface Guide UIP1869V User Interface Guide (Firmware version 0.1.8 and later) Table of Contents Opening the UIP1869V's Configuration Utility... 3 Connecting to Your Broadband Modem... 5 Setting up with DHCP... 5 Updating

More information

UKNova s Getting Connectable Guide

UKNova s Getting Connectable Guide UKNova s Getting Connectable Guide Version 1.2 2010/03/22 1. WHAT IS "BEING CONNECTABLE" AND WHY DO I NEED IT? Being connectable means being able to give back to others it is the fundamental principle

More information

Network Controller 3500 Quick Start Guide

Network Controller 3500 Quick Start Guide Network Controller 3500 Quick Start Guide Firmware Version 1.00.82 1. Configuring the Controller 1.1. Connect to the Controller: The default LAN IP Address of the Controller is: IP: 192.168.1.1 Set you

More information

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. Distributed Systems 1 06-06798 Distributed Systems Lecture 14: Security Distributed Systems 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Network Readiness Guide Technology Readiness for Personalized Learning and College and Career Standards

Network Readiness Guide Technology Readiness for Personalized Learning and College and Career Standards Network Readiness Guide Technology Readiness for Personalized Learning and College and Career Standards Is Your School Network Ready? Network readiness is an important factor in any new IT project at organizations

More information

Authenticating on a Ham Internet

Authenticating on a Ham Internet Authenticating on a Ham Internet The FCC regulations for amateur radio, part 97, rule that encryption cannot be used to obscure the meaning of communications. Many read the rules and assume that there

More information

GoToMyPC Corporate Product Guide

GoToMyPC Corporate Product Guide GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center

More information

Distributed Systems. Lecture 14: Security. 5 March,

Distributed Systems. Lecture 14: Security. 5 March, 06-06798 Distributed Systems Lecture 14: Security 5 March, 2002 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

AC : IDENTIFYING VULNERABLE SECURITY PRACTICES IN SMALL SCALE COMPUTER NETWORKS

AC : IDENTIFYING VULNERABLE SECURITY PRACTICES IN SMALL SCALE COMPUTER NETWORKS AC 2007-2057: IDENTIFYING VULNERABLE SECURITY PRACTICES IN SMALL SCALE COMPUTER NETWORKS Gary Steffen, Indiana University-Purdue University-Fort Wayne Iskandar Hack, Indiana University-Purdue University-Fort

More information

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends

More information

Lab 2: Creating Secure Architectures

Lab 2: Creating Secure Architectures Lab 2: Creating Secure Architectures A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For this you will

More information

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:

More information

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial

More information

Advanced Security and Forensic Computing

Advanced Security and Forensic Computing Advanced Security and Forensic Computing Unit 2: Network Security Elements Dr Dr Bill Buchanan, Reader, School of of Computing. >Unit 2: 2: Network Security Elements Advanced Security and Forensic Computing

More information

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 09 Now, we discuss about the insecurity of passwords.

More information

Android Based Digital Attendance Recording System

Android Based Digital Attendance Recording System Android Based Digital Attendance Recording System Satish H. Jadhav 1, Ashutosh B. Makone 2 1 Student of Dept. of Electronics & Telecommunication Egg/Marathwada Institute of Technology, Aurangabad, Maharashtra.

More information

Wireless a CPE User Manual

Wireless a CPE User Manual NOTICE Changes or modifications to the equipment, which are not approved by the party responsible for compliance, could affect the user's authority to operate the equipment. Company has an on-going policy

More information

Social Networking in Action

Social Networking in Action Social Networking In Action 1 Social Networking in Action I. Facebook Friends Friends are people on Facebook whom you know, which can run the range from your immediate family to that person from high school

More information

IT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS

IT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS Prjoect Overview IT INFRASTRUCTURE PROJECT PHASE II INSTRUCTIONS Phase II of the project will pick up where the IT Infrastructure Project Phase I left off. In this project, you will see how a network administrator

More information

bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies

bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies Contents Custom Access Policies and Access Rules... 4 Introduction... 4 Custom Access Polices vs. Access Rules... 4 When an Access

More information

The Activist Guide to Secure Communication on the Internet. Introduction

The Activist Guide to Secure Communication on the Internet. Introduction The Activist Guide to Secure Communication on the Internet Posted by: The Militant Posted on: September 3rd 2008 Updated on: September 8th 2008 Introduction 1 - Secure Internet Access 1.1 - Internet Cafes

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

If you re on campus and logged in to the university network, then you ll be automatically logged in to MyUCLan too when you open Internet Explorer.

If you re on campus and logged in to the university network, then you ll be automatically logged in to MyUCLan too when you open Internet Explorer. HOW TO USE MYUCLAN CONTENTS Login help... 1 I don t have a username and password... 2 I've forgotten/need to change my password... 2 I m getting an error message..... 2 My login problem isn't listed...

More information

Port Forwarding & Case Study

Port Forwarding & Case Study Introduction TalkTalk's responsibility lies with ensuring that this facility works on their routers, they cannot be held responsible for you devices that you are trying to forward to. This document not

More information

CyberP3i Course Module Series

CyberP3i Course Module Series CyberP3i Course Module Series Spring 2017 Designer: Dr. Lixin Wang, Associate Professor Firewall Configuration Firewall Configuration Learning Objectives 1. Be familiar with firewalls and types of firewalls

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information

A load balancing model based on Cloud partitioning

A load balancing model based on Cloud partitioning International Journal for Research in Engineering Application & Management (IJREAM) Special Issue ICRTET-2018 ISSN : 2454-9150 A load balancing model based on Cloud partitioning 1 R.R.Bhandari, 2 Reshma

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Azon Master Class. By Ryan Stevenson Guidebook #4 WordPress Installation & Setup

Azon Master Class. By Ryan Stevenson   Guidebook #4 WordPress Installation & Setup Azon Master Class By Ryan Stevenson https://ryanstevensonplugins.com/ Guidebook #4 WordPress Installation & Setup Table of Contents 1. Add Your Domain To Your Website Hosting Account 2. Domain Name Server

More information

Learning and Development. UWE Staff Profiles (USP) User Guide

Learning and Development. UWE Staff Profiles (USP) User Guide Learning and Development UWE Staff Profiles (USP) User Guide About this training manual This manual is yours to keep and is intended as a guide to be used during the training course and as a reference

More information

Who We Are.. ideras Features. Benefits

Who We Are.. ideras Features. Benefits :: Protecting your infrastructure :: Who We Are.. ideras Features Benefits Q&A Infosys Gateway Sdn Bhd. Incorporated in 2007 Bumiputra owned Company MSC Status Company Registered with Ministry of Finance

More information

A Quick Guide to Using Moodle version 2.6 Faculty Edition

A Quick Guide to Using Moodle version 2.6 Faculty Edition A Quick Guide to Using Moodle version 2.6 Faculty Edition Based on the Moodle participants handbook, edited and modified by Rev. Dr. Ellen Wondra and Gene Servillo. Refer all questions to: gservillo@bexleyseabury.edu

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Question 1 of 50. Traffic going to a public IP address is being translated by your Palo Alto Networks firewall to your

More information

Networks and the Internet

Networks and the Internet UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department 2018 v2.1 ed. Networks and the Internet A network is a collection of computers and devices connected together,

More information