Table of Contents INTRODUCTION...........................................................................................................................1 Concept of the Server Client and processes...................................................................................1 1.1 Client Server environment and its communication process..................................................1 1.2 Definition of Process ID (PID), Parent process ID (PPID) and Init......................................3 1.3 Comparing the operations of the parent and child Processes................................................3 Create a Client server Model in Lynax system................................................................................4 2.1 The Features of Linux Server configuration..........................................................................4 2.2 Evaluating the concept of UDP and TCP Systems................................................................6 2.3 Implementing the DNS server in Linux using UDP and TCP...............................................8 Secure Network for a corporate network.........................................................................................9 3.1 Evaluation of the Network Security Protocol........................................................................9 3.2 Critically analyse the purpose and Requirements of Network Security..............................10 3.3 Design of a Secured network...............................................................................................11 3.4 Configuring the Network security for a Secure network.....................................................11 CONCLUSION..............................................................................................................................12 REFERENCES..............................................................................................................................14
INTRODUCTION Computer network can be defined as the connection of one or more computer systems in order to share the data and information over the internet. Advanced computer network covers the set of advanced topics in computer networkssuch as which covers the internet, social media, cloud computing and various other high performance network centres.The study will be based on the advanced and modern concepts in networking technologies. It will also help in developing a clear understanding about the Client server relationship using various in a Lynax system which can be established via UDP, TCP and Application layer. In addition, this report will also helps in understanding features of the Lynax server configurations.ItwillalsoexploreabouttheUserdatagramProtocolwhichisusedin establishing Client server network architecture. It will also be able to develop the knowledge about the Network Security protocols. Moreover, It helps in determining the purpose and requirements of the secured network Concept of the Server Client and processes 1.1 Client Server environment and its communication process The Open System Interconnection Model (OSI model) helps in applying the concept which derives the telecommunication facilities.It basically provides a model that assists an application to communicate over the network. OSI model enables the data communication between any two networked systems. It is composed of seven different types of layer r elated functions (Besmer, 2018).In these each communication user or program is on a device in which each layer is served by the layer above it and followed by the layer below it.Client Server model allows the exchange of the data and information within the distributed environment so that it allows the access of the server via multiple clients. There are Seven Layers in OSI model which can be described below: Application Model This layer allows the intercommunication link between the user and server in the form of interface. Also this provides the various different kinds of services such as mail facility, data base management and accessibility of huge files to maintain the confidential data of the business etc. Presentation Model 1
It emphasis on syntax andsemantics that are used during the transmission of the data and information. It enables the translation, encryption, compression and encoding of the existing form of data into another form. Session Layer This layer allows in synchronization in order to keep the communication within 2 systems. This layer is used to establish a session between them(Colin, Nakechbandi and Mathieu, 2019). It includes services such as control Dialog box and Synchronisation. Transport Layer This layer helps in receiving the independent packets of data and this layer provides the services such as connection control, segmentation, flow control, etc. Network Layer This layer allows the logical addressing which helps in locating the data and information which has been sent via multiple packets. It translates logicaladdress into physical MAC addresses so that it allows the communication and interaction of multiple devices with each other. Data Link Layer It connects the Physical layer and makes it free from the errors via maskingmethods. This layer mainly includes the services such as framing, error, etc. Physical Layer It transmits the data into the binary format over transmissionchannel therefore this layer mainly deals with the characteristics between the device and the transmission media. It includes various services such as bits representation, line configuration, transmission mode, data rates etc. There is one more model that isTCP/IPwhich helps in establishing a client server model. It mainly consists of the four layers which are similar to the layers of the OSI model (DMello, Foo and Reid, 2018). However, it differs from various things such are described below: Internet protocol or Transmission control protocol is a client server model that is based on the availability of the services via server according to the requests of the client. Transmission control Protocol is a standard rule of IT whereas OSI is a conceptual protocol. TCP/IP consists of four layers which are common in OSI while the OSI is a seven layered Model. 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Transmission control protocol and Internet protocol generally follows vertical approach on the other hand, OSI follows horizontal approach. TCP/IP is a Tangible whereas OSI model is conceptual or intangible. TCP/IP generally follows TOP bottom approach and on the other hand, OSI follows Bottom up approach. 1.2 Definition of Process ID (PID), Parent process ID (PPID) and Init. It is normally defined as a Process identifier and it is basically a number which is normally used by the Kernals of most of the Operating systems such as UNIX, macOS and Microsoft Windows. It can be used to assign a unique ID to the process which is running into the system. In addition PPID is a unique processes ID, in which each process is allocated with one parent process ID(PPID) and this helps in determining the currently started process. Basically PPID is a PID of a process's parent. Sometimes, the processes go bad and users quit the program in order to find the other intentions of it(Hosen, 2018). However, the program continues to use the resources even after it is closed by the user. So such processes are called as Zombie process, in simple words it can be termed as the process which is currently processing but it is actually dead as its parent process does not exists in the system. Although, kill the parent process might kill other children of the same parent process. The process init is only the process that will always have the same PID weather it can be any system or it can be any session but the PID is still 1. 1.3 Comparing the operations of the parent and child Processes There are two ID numbers that are generally assigned to the UNIX process in order to identify each process within the system such process can be considered as PID and PPID.Pid is the small processes which Since LYNUX is a time shared Operating system, so the two processes can be concurrently executed. In these type of OS the first process, init is created by the Kernel at boot time and is never terminated until the system runs. Although, other parentless processes may be launched in order to perform different daemon tasks. In some situation, it can be obtained that some child processes are orphaned when its parent dies which can be further adopted by the Init pro cess for the short period of time.In contrast, the child process gener ally derived from the parent which can be invoked via Fork() function that is used to call the system. 3
Where as child process is created as it's parents processes copy which inherits most of its attributes. For Example, the PPID is the PID of the Processes parent. So here, if the process 1 with a PID of 208 starts a process named Process2, then the process2 will be given a unique PID that is 3250 and thus it will be given a unique PPID for that process 101. it can be termed as a parent child process. Create a Client server Model in Lynax system 2.1 The Features of Linux Server configuration LINUX can be considered the fastest operating system because it is the latest version of UNIX whichallows the free Operating system services to the user as it is open to all and freely provided. It design was based on the compatibility of the UNIX which provides quite similar functions like UNIX operating system. There are commonly three types of components included in the Linux Operating system such as Kernel, system Libraries and System Utilities. The Core features of this Operating system allows the effective communication between software and Hardware. Basic Features of the Linux server configuration are as follows: System Libraries Kernel Kernel Module 4
In addition, Linux is very fast speed to maintain the quality of services. It easier to perform different task in hardware system.(Chung and et.al., 2018). LINUX server is mainly proceeding with the configurations of the cloud servers in two data centres which allows the users to reach one another through Open Virtual Private Network tunnel that has been established. Portable Multi user Open source Hierarchical File system Multi Programming Shell Security 5 Illustration1: Configuration of LINAX
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2.2 Evaluating the concept of UDP and TCP Systems UDP is a type of alternative communication protocol that help to transmission of signals from one node to another (Teymourzadeh and et.al., 2018). It can be used transmission control protocol for creating the low latency in during the connection establishment connection between multiple applications by using internet services. TCP is one of the main protocol in the network that deals with the packets and enable the two different hosts to establish connection between them. In this way, it can exchange the information and data with specific stream. TCP Guarantees to deliver the data in the form packets will be delivered in the same. 6 Illustration2: Networking of LINAX
Figure1Data Transmission In TCP, it has performed the different operations to manage the communication or data transmission between sender and receiver. First of all, it has established the connection between client and server side (Rahman, 2018). TCP uses to control the messages and also manage the process of communication. It uses the same type of segment format in proper manner.A control flag is collecting in the form of set that applicable in the transmission control protocol as a header which indicated that each segment must be used for controlling the overall information. SYN: It indicates the segment that being used to initialise in the connection. Afterwards, it easily synchronises with the help of sequence number. 7
ACK:It indicated that the device is sending the data into the segment and conveying acknowledgement for message it has received. In UDP, it is based on the connectionless and unreliable transport protocol. It consists of two ports server during data transmissionto determine end points of client and server side. Server send a request to the client related the data transmission; afterwards they were sending the message of response to server side. In this way, it has created data transmission process between two hosts.During UDP connection,client has been fixed the unique source number according to the program and also started to create new connections. 2.3 Implementing the DNS server in Linux using UDP and TCP DNS Server is primarily uses the both type of protocols such as UDP and TCP. UDP useful for exchange the small information from one node to another with the help of TCP that must exchange the information large than 513 bytes (Khorram and Baykan, 2018). DNS is default uses the resolution services in Linux. However, when the internet was small and host name resolution by using the file name of host under Linux. DNS Implementation: Unix system is basically used the Berkeley internet name domain which are typically use as the non-active directory with the specific domain name solution. There are common steps to implement the DNS server in Linux operating system. First of all, it can be used the specific domain name like google.com into the browser by using the operating systems of client side. Client has needed to use the proper IP address where it helps to find the location of domain name on the world. The browser is sending the specific queries towards the Operating system. It is configured every OS to identify the queries of Domain name system server. It is generally used the network administrator to configure the DNS server. It is called as a resolving name server. Theserver wasnot aware about properplace ofdomain name but it does know about the root server where it is located. 8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
In Next level, Resolving Sever can be determined the place of the domain server which send the queries to domain name. Each domain has been authoritative the server name on internet. At last, Authoritative name server provide theInternet Protocol address of domain name. In this way, all data will send back to resolve server where it easily caching the data or queries. Then, application is sent to right location. Secure Network for a corporate network. 3.1 Evaluation of the Network Security Protocol It is a type of protocol that provide the services in the network to handle the security aspects. It also ensures privacy, security and integrity of informationduring the transmission over the internet connection. It defined the process to secure the information of network through illegal attempt to review the content of data (Hossain, 2018). It is designed to prevent the unauthorised users, devices, application that impact on the entire network system. It can be applied in virtually data type regardless of network. It is generallyimplemented encryption technique and process to protect the information. It is also used the decryption method by using encryption algorithm, withthe help of formulas and logical keys. This method is protecting the sensitive information because they can implement the encryption that convert into the specific coding. In this way, unauthorised access doesn’t 9
effect on the sensitive and important information. There are various types of popular network security protocol useful for maintain andcontrolling the data in proper manner. It involves Secure Socket Layer (SSL) and SFTP etc. Figure2Process of Security Protocol This diagram is representing the architecture of security protocol simulation and designing the ideas of process and method of protocol. It is applicable to perform different action such as process exchange, data field and use encryption algorithm etc. These are main functions to provide the authenticating and also controlling the port. The component is responsible for modeling the stimulated the security protocol. Sometimes, it has increased the complexity in security protocol so that it need to simplify the process of exchange in order to control the functionality through simulation tool. 3.2 Critically analyse the purpose and Requirements of Network Security The network has required the security which helps to protect against the attacker or hackers. Network security is mainly consisting of two different security aspects. Firstly, it is protecting and securing the data and information from the unauthorised access (Santos and Marcillo, 2018). Another one is system security; it has required to protect and secure our hardware system because hackers are directly attacked on the system and leaked all sensitive information. In network system, these are two different type of securities that needed to manage 10
and control the overall functionality of network system. Network security is concerned about the issues such as encryption, packet intrusion, routing tables and IP Packets etc. It can be used the TCP/IP protocol which are globally irrespective of the nature of organization. This protocol is susceptible to intercept in the entire network system. Networks are designed to share the data and information from one node to another. It is increased the system security and price of its management accordingly. It depends on the level of security that need to applicable in network system. 3.3 Design of a Secured network 3.4 Configuring the Network security for a Secure network. Network configuration is a process or method of setting an appropriate control the flow of information and also support the network communication in the business. There are multiple configurations or setup process occurs on the software, hardware and other components or devices. The network security configuration is customized the security setting in safe mode and declarative the configuration file to change application code. This type of setting can be configured for the specific domain and application (Khorram and Baykan, 2018). Add Network Security configuration file It is mainly uses the XML file where it easily specifies the setting of application. It may include the manifest of application at the point of file. Customised the trusted CAs 11
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
An application may need to customise the set of CS instead of platform default. There are some specific reasons: It is connecting to the host with the certificate authority so that CA is self-signed and issued the internally in the network system. By default, it secures the connection from all type of application and application must be pre-installed in the system. It is also trust the users those who are added. An application canbecustomizeditsownconnectionbyusingdomainconfigurationandbase configuration. Configure a custom CA It is connecting to the host which are basically used for the self-signed through SSL certificate. This certification is issued by the non-public CAs. in this way, it must build the trust. Limited the Set of trust on CAs (Certificate Authorities) An app does want to trust on CA by the system instead, it must be specifying and reducing the set of CA. It protects the application from other fraudulent certificates that issued by another CAs. Trust additional Certification authority An application may want to add some CAs which are not trusted by system. It doesn’t include the CA that does not meet the need and requirement. An app can specify the multiple source of certificate in the configuration. Debugging the configure of CAs When it occurs the debugging so that it connects with the HTTPS, it may want to connect with the local sever for development. It does not include the SSL certificate for the production of server. In order to support without any modification for application code. CONCLUSION As per discussion, it concluded thatComputer network is a type of connection between one or two hardware systems in order to transmit data from one place to other. It summarised that modern concept and advance technologies that applicable in the network system. It is developing the clear assumption to understand about the client server relation through Lynax system. It can 12
be used the TCP and UDP for the purpose of connection establishment. In above discussion, it is also identifying the features of Lynax server and its configuration. 13
REFERENCES Books and Journals Besmer,A.,2018.Alinuxinfrastructuretosupportmoderncomputingprogramsand curriculum.Journal of Computing Sciences in Colleges.34(2). pp.172-179. Chung,J.andet.al.,2018.Advancereservationaccesscontrolusingsoftware-defined networking and tokens.Future Generation Computer Systems.79.pp.225-234. Colin, J.Y., Nakechbandi, M. and Mathieu, H., 2019, June. Ideas on reference models, formal languages and communication design patterns in a physical internet. DMello, A., Foo, E. and Reid, J., 2018, November. Characterizing TCP/IP for High Frequency Communication Systems. In2018 Military Communications and Information Systems Conference (MilCIS)(pp. 1-7). IEEE. Hosen, M., 2018.Isp server configuration in linux(Doctoral dissertation, Daffodil International University). Hossain,M.,2018.ISPserverconfigurationinlinuxandmikrotikplatform(Doctoral dissertation, Daffodil International University). Huang, J. and Cai, L., 2018, April. Research on TCP/IP network communication based on Node. js. InAIP Conference Proceedings(Vol. 1955, No. 1, p. 040115). AIP Publishing. Khorram, T. and Baykan, N.A., 2018. Feature selection in network intrusion detection using metaheuristicalgorithms.InternationalJournalofAdvanceResearch,Ideasand Innovations in Technology.4(4). pp.704-710. Rahman,M.D.,2018.Linuxserverconfigurationandmikrotikadministration(Doctoral dissertation, Daffodil International University). Rajesh, M., 2018. A Review on Excellence Analysis of Relationship Spur Advance in Wireless Ad Hoc Networks.International Journal of Pure and Applied Mathematics.118(9). pp.407-412. Santos, M.G.M. and Marcillo, P.A.A., 2018. Security in the data link layer of the OSI model on LANswiredCisco.JournalofScienceandResearch:RevistaCienciae Investigación,3(CITT2017). pp.106-112. Teymourzadeh,R.andet.al.,2018.Designanadvancecomputer-aidedtoolforimage authentication and classification.arXiv preprint arXiv:1808.02085. 14
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Trabelsi, Z. and Barka, E., 2019, April. A Basic Course Model on Information Security for High SchoolITCurriculum.In2019IEEEGlobalEngineeringEducationConference (EDUCON)(pp. 63-70). IEEE. 15