17-05-2012, 05:37 PM
Configuration of DHCP and FTP in Linux
Project report.docx (Size: 1.07 MB / Downloads: 48)
INTRODUCTION
DHCP
In recent years with rapid development of wireless internets and mobile communication systems, the use of notebook computers, PDAs and portable systems is gradually increasing and has become popular. And most of the users may want to access the internet from anywhere in the world.
However, when these mobile hosts move from one network to another, users have to change system configuration, including host IP address, default gateway, and name servers. In order to support the automatic configuration changes on these hosts, several technologies such as dynamic host configuration mechanisms or mobility support in the IP layer have been developed. The DHCP can be used to automatically assign IP addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and default router, and to provide other configuration information such as the addresses for printer, time and news servers. The DHCP is an internet protocol that lets network administrators centrally manage and automate the assignment of IP addresses in an organization's network.
FTP
File Transfer Protocol (FTP) is one of the original core protocols of the Internet and was first documented in 1971. It was designed to provide the functionality to exchanges files over the Internet and is specified in RFC 959. It is still currently used for a number of purposes including running user-authenticated and anonymously authenticated FTP servers to download files and applications. For example, software vendors utilize it to provide updates or patches to clients. It is also used to transfer files between disparate systems; for example, many non-Unix systems also support FTP. One of the most common uses of FTP is by ISPs to provide customers with the ability to upload files to their Web sites. Unfortunately, FTP is also inherently insecure. The only security available to most FTP sessions is a username and password combination. By default, FTP transactions are unencrypted, and all traffic is sent in clear text across your network. One example is the transmission of usernames and passwords. This exposes users to a considerable level of risk that is difficult to mitigate with available tools.
Kernel
• The kernel sometimes referred to a s the heart of OS is the main component of most computer operating system, it is a bridge between applications and the actual data processing done at the hardware level.
• Services provided by the kernel
• Controls execution of processes
• Scheduling processes fairly for execution on the CPU.
• Allocating memory for an executing process.