Free Essay

Anonymous Users Srs

In:

Submitted By ashmitasharma
Words 1918
Pages 8
Software Requirements Specification

For

Anonymous User Communication For Privacy Protection in Wireless Metropolitan Mesh Networks

Prepared by

Under the Guidance of

Table of Contents

Revision History

1. Introduction

1.1 Purpose 1.2 Project Scope 1.3 References

2. Overall Description

2.1 Product Perspective 2.2 Product Features 2.3 User Classes and Characteristics 2.4 Operating Environment 2.5 Design and Implementation Constraints

3. System Features

3.1 System Feature 1 3.2 System Feature 2 (and so on)

4. External Interface Requirements

4.1 User Interfaces 4.2 Hardware Interfaces 4.3 Software Interfaces 4.4 Communications Interfaces

5. Other Nonfunctional Requirements

5.1 Performance Requirements 5.2 Safety Requirements 5.3 Security Requirements 5.4 Software Quality Attributes

6. Other Requirements

Appendix A: Glossary
Appendix B: Analysis Models

1. Introduction

1. Purpose

The project is to make available security and privacy protection to the user credentials in wireless mesh networks (WMN) using group signature and pair wise secrets terms. 2. Project Scope In wireless mesh network, there is no restriction for public to access the internet or mobile services. So that the large numbers of attacks are might be happened like eavesdrop, inject or impersonate in WMN.All these attacks are great threat to the user credential, because the adversaries’ once disclosed the user’s credential means devastating the user consequences. We proposed two scheme for protect the user’s privacy in wireless mesh networks. The first scheme is basic protocol suite and another one is an advanced protocol suite. In the first protocol is used the group signature technique and another one is used for pair wise secret concept. The basic protocol suite to request each network user register the TTP(Trusted third party) after subscribing to the network service assigned the group public key and unique group private key .Then TTP only identify the actual signer communication between the group. Once register user message are delivered under session key protection to the destination. But this technique unable to provide the enough privacy protection to the user’s credential. Because the user identity details are stored in mesh router, the mesh router is backbone of mesh wireless network. So that the details are observed by the adversary. So we proposed the second protocol. The advanced protocol suite is based on the pseudonym registration, after subscribing the pseudonym the user messages are delivering through onion-routing based on the router-router message delivery technique. So that the network adversary could not able to observe the user details. Because the pseudonym concept is against the mesh router. So we have to provide the enough protection for user privacy. 3. References

1. I. F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: A
Survey,” Comput. Netw. vol. 47, no. 4, pp. 445–487, Mar. 2005.

2. D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Proc.
Adv. Cryptology–CRYPTO, vol. 3152, Lecture Notes in Computer Science,
2004, pp. 41–55.

3. A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, “SDAR: A secure
Distributed anonymous routing protocol for wireless and mobile ad hoc
Networks,” in Proc. 29th Annu. IEEE Int. Conf. Local Comput. Netw.
Nov. 2004, pp. 618–624.

4. S. Capkun, J. Hubaux, and M. Jakobsson, “Secure and privacy preserving communication in hybrid ad hoc networks,” Swiss Fed. Inst. Technol.,-
DI-ICA, Lausanne, Switzerland, 2004.

5. D. Chaum and E. van Heyst, “Group signatures,” in Proc. Adv.
Cryptology—EUROCRYPT, vol. 547, LNCS, 1991, pp. 257–265.

2. Overall Description 1. Product Perspective

We proposed two scheme for protect the user’s privacy in wireless mesh networks. The first scheme is basic protocol suite and another one is an advanced protocol suite. In the first protocol is used the group signature technique and another one is used for pair wise secret concept. The basic protocol suite to request each network user register the TTP(Trusted third party) after subscribing to the network service assigned the group public key and unique group private key .Then TTP only identify the actual signer communication between the group. Once register user message are delivered under session key protection to the destination. But this technique unable to provide the enough privacy protection to the user’s credential. Because the user identity details are stored in mesh router, the mesh router is backbone of mesh wireless network. So that the details are observed by the adversary. The advanced protocol suite is based on the pseudonym registration, after subscribing the pseudonym the user messages are delivering through onion-routing based on the router-router message delivery technique. So that the network adversary could not able to observe the user details. Because the pseudonym concept is against the mesh router. So we have to provide the enough protection for user privacy.

2. Product Features In WMNs present a promising way to provide wireless connectivity everywhere, but only modest research efforts have been put into the privacy-protection problem. The main objective of their scheme is to provide anonymity and location privacy for mobile nodes in WMN.Temporary public key pairs are used by each mobile node to anonymously establish pair wise secrets with its neighbors. These pair wise secrets in turn are used to secure routes to the access point. Identifiers of mobile nodes have to be disclosed to access points so that some access points may be able to track a specific mobile user. An adversary is able to link messages by source and destination pseudonym, which keep unchanged within time slot. The attacker is assumed to have only partial knowledge but not global knowledge of the network. We proposed to “onion ring “is achieving the routing privacy in WMNs. This scheme uses “onion encryption “in a ring structure so that it’s impossible for an adversary, even global adversary, to distinguish the source node or the destination node. This scheme is able to identity the misbehaving nodes in order to evict.

In WMNs present a promising way to provide wireless connectivity everywhere, but only modest research efforts have been put into the privacy-protection problem. The main feature is in WMN is communication with one group to another group. The next feature is, if the user request to the web server and get the requested content.

3. User Classes and Characteristics
Ttpform- Node and Router register that information in TTP.

Data send – send information from source to destination via intermediate nodes and Router.

4. Operating Environment

2.4.1 Software Requirements:

▪ Windows Operating System 2000 and Above ▪ JDK 1.6 ▪ JavaFX 1.3 ▪ Tomcat 6.0

2. Hardware Requirements • Hard Disk: 10 GB and above • RAM: 512MB and above • Processor: Pentium III and above

1 Design and Implementation Constraints

3. Constraints in Analysis

• Constraints as Informal Text • Constraints as Operational Restrictions • Constraints Integrated in Existing Model Concepts • Constraints as a Separate Concept • Constraints Implied by the Model Structure

4. Constraints in Design

• Determination of the Involved Classes • Determination of the Involved Objects • Determination of the Involved Actions • Determination of the Require Clauses • Global actions and Constraint Realization

5. Constraints in Implementation

A hierarchical structuring of relations may result in more classes and a more complicated structure to implement. Therefore it is advisable to transform the hierarchical relation structure to a simpler structure such as a classical flat one. It is rather straightforward to transform the developed hierarchical model into a bipartite, flat model, consisting of classes on the one hand and flat relations on the other. Flat relations are preferred at the design level for reasons of simplicity and implementation ease. There is no identity or functionality associated with a flat relation. A flat relation corresponds with the relation concept of entity-relationship modeling and many object oriented methods.

System Features

We proposed to “onion ring “is achieving the routing privacy in WMNs. This scheme uses “onion encryption “in a ring structure so that it’s impossible for an adversary, even global adversary, to distinguish the source node or the destination node. In WMN , provide the feature like communication between the group and if the node request to the web services and the response from the web services.

3. External Interface Requirements

1. User Interfaces

1. All the contents in the project are implemented using Graphical User Interface (GUI) in Java through JavaFX concepts. 2. Every conceptual part of the projects is reflected using the JavaFX. 3. System gets the input and delivers through the GUI based.

Hardware Interfaces:

Ethernet

Ethernet on the AS/400 supports TCP/IP, Advanced Peer-to-Peer Networking (APPN) and advanced program-to-program communications (APPC).

ISDN

You can connect your AS/400 to an Integrated Services Digital Network (ISDN) for faster, more accurate data transmission. An ISDN is a public or private digital communications network that can support data, fax, image, and other services over the same physical interface. Also, you can use other protocols on ISDN, such as IDLC and X.25.

2. Software Interfaces

This software is interacted with the TCP/IP protocol, Socket and listening on unused ports. Server Socket and listening on unused ports and JDK 1.6

3. Communications Interfaces

1. TCP/IP protocol.

2. LAN settings.

5. Other Nonfunctional Requirements

5.1 Performance Requirements

The performance of the WMN process is, the data sent to the source mesh router, which’s the nearest mesh router to the source node. The messages sent along the route constructed from the source node to the source mesh router, which is protected with local session keys. Next, the source router finds out the correct destination router and routes the packet to the destination router. Every mesh router knows how to reach a specific node since each node has registered with the nearest mesh router. The destination mesh router dispatches the message to the destination node.

5.2 Safety Requirement

1. The software may be safety-critical. If so, there are issues associated with its integrity level
2. The software may not be safety-critical although it forms part of a safety-critical system. For example, software may simply log transactions.
3. If a system must be of a high integrity level and if the software is shown to be of that integrity level, then the hardware must be at least of the same integrity level.
4. There is little point in producing 'perfect' code in some language if hardware and system software (in widest sense) are not reliable.
5. If a computer system is to run software of a high integrity level then that system should not at the same time accommodate software of a lower integrity level.
6. Systems with different requirements for safety levels must be separated.
7. Otherwise, the highest level of integrity required must be applied to all systems in the same environment.

5.3 Security Requirements
Do not block the some available ports through the windows firewall.

4. Software Quality Attributes
Functionality: are the required functions available, including interoperability and security.

Reliability: maturity, fault tolerance and recoverability

Usability: how easy it is to understand, learn, and operate the software system

Efficiency: performance and resource behavior.

Maintainability: Maintaining the software.

Portability: can the software easily be transferred to another environment, including install ability

Appendix A: Glossary

IEEE - Institute of Electrical and Electronic Engineers.

LAN - Local Area Network.

TCP - Transmission Control Protocol.

Appendix B:

ACTIVITY DIAGRAM:

[pic]

SEQUENCE DIAGRAM:

[pic]

USECASE DIAGRAM:

[pic]

CLASS DIAGRAM:

[pic]

COLLABORATION DIAGRAM:

[pic]

DATA FLOW DIAGRAM

LEVEL – 1

[pic]

LEVEL – 2 [pic]

LEVEL- 3

[pic]

----------------------- TRUSTED THIRD PARTY

NODE

ROUTER

Sender

Data

Router

Receiver

Receiver

Sender

Data

Node

Router

Similar Documents

Free Essay

Business

...Wikipedia has the ability to create and edit articles very quickly, but that comes at a cost. Allowing any user to edit the content ultimately will produce false information. Wikipedia warns users that new articles may contain false data or a bias point of view from the start. However, as editors add to the articles, eventually it balances out to achieve a comprehensive coverage of the subject. An expert team led by nature investigated both Wikipedia and Britannica for accuracy. There were 42 entries tested on science-related subjects form each company. Once the information was reviewed Wikipedia had four major inaccuracies to Britannica’s three; Wikipedia only had 123 minor errors to Britannica’s 162 (Giles, 2005). Over time there have been some significant incidents related to the information provided by Wikipedia. One of the most popular incidents was a biography about John Seigenthaler Sr. An anonymous user posted a hoax article suggesting that John Seigenthaler had something to do with the assassination of President John F. Kennedy and Attorney General Robert F. Kennedy. This erroneous data went undetected for 132 days before someone brought it to John’s attention (Seigenthaler, 2005). Unfortunately, it took a while to realize this mistake, but it is a rare occasion that something like this happens. Because of the number of people visiting and editing the site there are constant changes made to hopefully keep the data factual (Wikipedia:About). Two professors at Lycoming...

Words: 562 - Pages: 3

Premium Essay

Analyze Riordan Manufacturing Hr System

...| | BSA375 Service Request SR-rm-004 Part 1 Analyze Riordan Manufacturing HR System Introduction Riordan Manufacturing is a global leader in plastics manufacturing market. The company has facilities in Albany, Georgia, Pontiac, Michigan, Hangzhou, China and San José, California. Riordan’s projected annual earnings are approximately $46 billion. The company began operations in 1992 with the company’s first functional Human Resources Information System. The current system is part of the financial systems package that tracks employee information. Recent analysis of the current HRIS has provided evidence indicating the system needs upgrading in order meet Riordan’s developing needs. To remain viable Riordan plans to update the current HRIS system with a more sophisticated HR system. The use of modern technology will be used to incorporate a variety of tools into a single integrated application. Plan The intent of this report will focus on Riordan’s current HRIS problems by developing a strategic plan for implementing a more advanced system. “The primary objective of the analysis phase is to understand and document the business needs and the processing requirements of the new system.” (Satzinger, J.W., Jackson, R.B., Burd, S.T., & Johnson, R., para. 26, 2004). Adjustments to Riordan’s HRIS will incorporate changes to the current financial...

Words: 871 - Pages: 4

Free Essay

Wikipidia Not a Source of Credible Information

...Is Wikipedia a credible source of information? From learning experience I was involved in a project where I had to research parent and subsidiary information for corporate entities and document my findings. After the research results were documented I had to create records for every subsidiary entity that rolled up to the ultimate parent company. A research list was provided for the research efforts and list noted was that the Wikipedia website was only to be utilized as a reference point as the data was not credible. Wikipedia was a source to obtain preliminary data and as a cross reference tool as some of the information was either contradictory or not available. Some of the required information required entity's complete name, headquarter address, corporate structure/shareholder information and subsidiaries. A good portion of the data was found through the Edgar website which is a site were "All companies, foreign and domestic, are required to file registration statements, periodic reports, and other forms electronically through EDGAR. Anyone can access and download this information for free. Here you'll find links to a complete list of filings available through EDGAR and instructions for searching the EDGAR database." http://www.sec.gov/edgar.shtml Another website referenced was the entity's website which mirrored the information found on the Edgar or any other regulatory website. Wikipedia was not included as a source in our documentation reports as it was only used as...

Words: 973 - Pages: 4

Free Essay

Report on Examination System

...A PROJECT REPORT ON Online Examination Submitted To UNIVERSITY OF PUNE In Partial Fulfillment of the Requirement Of MASTER OF COMPUTER APPLICATIONS (Semester – V) By Arvind Singh Niraj Shirke Kiran Shette Under The Guidance Of Prof. Rajesh Kanzade SINHGAD INSTITUTE OF BUSINESS ADMINISTRATION AND COMPUTER APPLICATION, LONAVALA- 410401 2009-2010 Sinhgad Technical Education Society’s SINHGAD INSTITUTE OF BUSINESS ADMINISTRATION & COMPUTER APPLICATION (SIBACA), Kusgaon (Bk.), Lonavala, Pune – 410 401 Certificate This is to certify that the mini project entitled ‘Online Examination’ being submitted by Mr. Arvind Singh (Roll. No. 58), Mr. Niraj Shirke (Roll. No. 57), Mr. Kiran Shette (Roll. No. 56) in partial fulfillment of the requirement for the award of degree of Master of Computer Applications of the University of Pune, is a record of bona fide work carried out by him under my supervision. Place : Lonavala Date : / /2008 Project Guide Project Coordinator Director Prof. Rajesh Kanzade Prof.Ashok Sabale Prof.Parag Kalkar Declaration We, the undersigned hereby declare that the Project report entitled Online Examination is designed, written and submitted by us in partial fulfillment of the requirement for the award of the degree of Master of Computer Applications is our original work. The empirical findings in this report are based on data collected by us through discussion with the project guide. We understand...

Words: 3570 - Pages: 15

Premium Essay

Bitcoin

... There are various problems associated with virtual currencies. Due to its similar nature to real currency, a lot of questions have risen regarding its acceptance among the people in the market, and the reliability factor. In the following paper, we have discussed the different types of virtual currencies based on their exchange factor. Bitcoins, a type 3 virtual currency is one of the most popular crypto currencies. We have discussed the characteristics and the process of transacting Bitcoins in detail, emphasizing on the pros and cons of its usage. We have also compared it with the ‘fiat’ money and mentioned its legal aspects. In the end we have mentioned a few areas for further research in relation to Bitcoins. TABLE OF CONTENTS: Sr no. | Content | Page no. | 1.2.3.4.5.6.7.8.9.10. 11. | IntroductionTypes of virtual currenciesIntroduction to BitcoinsTransaction Process for BitcoinsMethods for transacting BitcoinsStorage of BitcoinsNeed for legal statusCurrent scenarioConclusionAnnexureReferences | 456688910121415 | INTRODUCTION: The definition of money has constantly being reviewed over a period of time. Initially money was traded in the form of commodities for commodities by the name of barter system. However in the 18th...

Words: 4384 - Pages: 18

Premium Essay

Srs Template

...Index : Technical Specification Sections Finalised by SRS Commiittee for Restructured APDRP under 11th Plan Page-1 Section – G1 :: General Technical requirements Sl. No. Title Page No. / Section No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Introduction Intent of specification Scope of work Other Services and Items Specific Exclusions Utility’s Current IT Infrastructure Arrangement by the Contractor Software tools Warranty, operational guarantee and system reliability with ‘on-site’ support Annual Maintenance Contract Price Loading for Evaluation of Bids Payment terms Project synopsis Bid Schedule Basic reference drawings Spares Time schedule Implementation schedule Quality assurance plan Qualifying requirements 2 of G1 2 of G1 4 of G1 19 of G1 23 of G1 23of G1 23of G1 24 of G1 24 of G1 26 of G1 26 of G1 27 of G1 27 of G1 27 of G1 27 of G1 27 of G1 28 of G1 28 of G1 28 of G1 29 of G1 Page-2 Section – G2 :: Technical specification requirements for Application Packages Sl. No. Title Page No. / Section No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Part-A – Essentially Required by most Utilities for setting up an IT backbone for collection of baseline data, Energy Accounting / Auditing and establishment of Customer care centers Introduction System Functionality Module : Meter Data Acquisition Module : Energy Audit Module : New Connection Module : Disconnection & Dismantling Module : GIS based customer Indexing and asset mapping Module...

Words: 90558 - Pages: 363

Premium Essay

Failure of Rim

...Glass Door Comments BlackBerry Reviews Updated Dec 11, 2013 All Employees Current Employees Only 3.4 796 reviews 57% of employees recommend this company to a friend 796 Employee Reviews Bottom of Form Review Highlights Pros: * "Great environment combined with a perfect work-life balance" in 49 reviews * "Great work environment/culture which makes it a fun place to work" in 45 reviews * "Good benefits; Good company to work for till profits started to slide off" in 36 reviews * "Lots of great people at the company, learned a lot and inspired my career in technology" in 33 reviews * "Good pay, great management, I felt like the work I was doing was important for the company" in 30 reviews Cons: * "No work life balance, limited career advancement, lack of good benefits of tech companies" in 20 reviews * "Senior management (C-Level) does no communicate down to employees well" in 27 reviews * "Poor management decision making processes - not innovative" in 18 reviews * "Upper management doesn't listen to people lower down that actually know what they're talking about" in 15 reviews * "Many bad/useless middle management built up over the years but the layoff did some clean up" in 13 reviews Reviews Dec 8, 2013   “Loved the company and the people.” Software Development Manager (Former Employee) Rolling Meadows, IL I worked at BlackBerry full-time for more than 5 years Pros – BlackBerry was a great...

Words: 90794 - Pages: 364

Premium Essay

Healthy Body Wellness Center Office of Grants Giveaway Small Hospital Grants Tracking System

...HEALTHY BODY WELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY HEALTHY BODY WELLNESS CENTER OFFICE OF GRANTS GIVEAWAY SMALL HOSPITAL GRANTS TRACKING SYSTEM INITIAL RISK ASSESSMENT PREPARED BY: WE TEST EVERYTHING LLC Jerry L. Davis, CISSP, Sr. Analyst EXECUTIVE SUMMARY .......................................................................................................... 4 1. INTRODUCTION..................................................................................................................... 7 Background ............................................................................................................................................................... 7 Purpose .....................................................................................................................................................................7 Scope ........................................................................................................................................................................7 Report Organization..................................................................................................................................................8 2. RISK ASSESSMENT APPROACH ........................................................................................ 9 2.1 2.2 Step 1: Define System Boundary ....................................................................................................................9 Step 2: Gather Information...

Words: 10420 - Pages: 42

Premium Essay

Wgu Fyt2 Task3

...HEALTHY BODY WELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY HEALTHY BODY WELLNESS CENTER OFFICE OF GRANTS GIVEAWAY SMALL HOSPITAL GRANTS TRACKING SYSTEM INITIAL RISK ASSESSMENT PREPARED BY: WE TEST EVERYTHING LLC Jerry L. Davis, CISSP, Sr. Analyst EXECUTIVE SUMMARY .......................................................................................................... 4 1. INTRODUCTION..................................................................................................................... 7 Background ............................................................................................................................................................... 7 Purpose .....................................................................................................................................................................7 Scope ........................................................................................................................................................................7 Report Organization..................................................................................................................................................8 2. RISK ASSESSMENT APPROACH ........................................................................................ 9 2.1 Step 1: Define System Boundary ....................................................................................................................9 2.2 Step 2: Gather Information...

Words: 10420 - Pages: 42

Premium Essay

Healthy Body Wellness Center

...HEALTHY BODY WELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY HEALTHY BODY WELLNESS CENTER OFFICE OF GRANTS GIVEAWAY SMALL HOSPITAL GRANTS TRACKING SYSTEM INITIAL RISK ASSESSMENT PREPARED BY: WE TEST EVERYTHING LLC Jerry L. Davis, CISSP, Sr. Analyst EXECUTIVE SUMMARY .......................................................................................................... 4 1. INTRODUCTION..................................................................................................................... 7 Background ............................................................................................................................................................... 7 Purpose .....................................................................................................................................................................7 Scope ........................................................................................................................................................................7 Report Organization..................................................................................................................................................8 2. RISK ASSESSMENT APPROACH ........................................................................................ 9 2.1 Step 1: Define System Boundary ....................................................................................................................9 2.2 Step 2: Gather Information...

Words: 10420 - Pages: 42

Free Essay

Ssaassd

...A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, Sixth Edition Lab Manual Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Copyright © 2012 Mark G. Sobell All rights reserved...

Words: 38351 - Pages: 154

Premium Essay

Electronic Voting System

... Date Table of Contents Online E-Voting System Project Documentation 4 Abstract 6 1. Introduction 7 2. E-Voting System Related Literature 9 2.1. Public Key Cryptography 9 2.2. Homomorphic Encryption 10 2.3. Zero Knowledge Proofs 10 2.4. Threshold Cryptography 10 2.5. Cryptographic Voting Protocol 11 2.6. Issues in secure e-voting system 12 2.7. Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) 13 2.8. Chinese Remainder Theorem (CRT) 14 3. Online E-Voting System Project Description 17 3.1. Paillier Threshold Crytosystem Web Services Architecture and Design 17 4. Online E-Voting Prototype System 22 4.1. E-Voting System Overview 22 4.1.1 User Login 23 4.1.2. Election Set-Up 24 4.1.3. Creating Ballots 25 4.1.4. Vote Format 26 4.2. Voting 27 4.2.1. Creating the Vote 27 4.3. Tally the Vote 28 5. PTC Web Services Efficiency Improvement 29 5.1 Pre-Computation...

Words: 7163 - Pages: 29

Premium Essay

Hgjfghk

...________________________ Batch Date : ________________________ Windows Server 2008 - Network Administration INDEX Sr. No. 1 Topic Dynamic Host Configuration Protocol (DHCP) Lab – 1: Installing DHCP Service Lab – 2: Creating a Scope Lab – 3: Creating DHCP Reservations Lab – 4: DHCP Server Backup and Restore Page No. 5 6 12 20 22 2 Domain Naming System (DNS) Lab – 1: Installing DNS Service Lab – 2: Creating Standard Primary Forward Lookup Zones Lab – 3: Creating Standard Primary Reverse Lookup Zones Lab – 4: Creating Secondary Zone Lab – 5: Creating Stub Zone Lab – 6: Creating Active Directory Integrated Primary zone Lab – 7: Conditional Forwarders Lab – 8: Forwarders Lab – 9& 10: Root Hints and Cache Server 24 25 27 33 38 42 44 47 48 49 3 Internet Information Services (IIS)- Web Server Lab – 1: Installing Internet Information Service - Web Server Lab – 2: Creating a Website Lab – 3: Configuring Redirection of Websites Lab – 4: Creating Virtual Directory Lab – 5: Changing the Website IP address or Port no Lab – 6: Creating Self-Signed Certificate for HTTPS Website Lab – 7: Creating a HTTPS Web Site 50 51 54 62 64 67 68 71 4 Internet Information Services (IIS)- Ftp Server Lab – 1: Installing Internet Information Service - FTP Server Lab – 2: Creating Do not Isolate User FTP Site Lab – 3: Creating Isolate User FTP Site Lab – 4: Creating Isolate User using Active Directory FTP Site 84 85 86 90 96 2 Windows Server 2008 - Network Administration ...

Words: 12134 - Pages: 49

Free Essay

Salesforce Integration

...Integration Workbook Integration Workbook, Winter ’15 @salesforcedocs Last updated: November 7, 2014 © Copyright 2000–2014 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com, inc., as are other names and marks. Other marks appearing herein may be trademarks of their respective owners. CONTENTS Force.com Integration Workbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Tutorial #1: Create a New Heroku Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Step 1: Clone the GitHub Project Step 2: Create a Heroku Project Step 3: Test the Application . . . Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3 4 5 Tutorial #2: Connect the Warehouse App with an External Service . . . . . . . . . . . . . . . . 6 Step 1: Create an External ID Field on Invoice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Step 2: Create a Remote Site Record . . . . . . . . . . . . . . . . . . ....

Words: 6630 - Pages: 27

Free Essay

Foundations of F-Sharp

...The eXPeRT’s VOIce ® In .neT F# Robert Pickering Foreword by Don Syme Foundations of Foundations of F# Robert Pickering Foundations of F# Copyright © 2007 by Robert Pickering All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. ISBN-13: 978-1-59059-757-6 ISBN-10: 1-59059-757-5 Printed and bound in the United States of America 9 8 7 6 5 4 3 2 1 Trademarked names may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, we use the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Lead Editors: James Huddleston, Ewan Buckingham Technical Reviewer: Don Syme Editorial Board: Steve Anglin, Ewan Buckingham, Gary Cornell, Jason Gilmore, Jonathan Gennick, Jonathan Hassell, Chris Mills, Matthew Moodie, Jeffrey Pepper, Dominic Shakeshaft, Matt Wade Project Manager: Elizabeth Seymour Copy Edit Manager: Nicole Flores Copy Editor: Kim Wimpsett Assistant Production Director: Kari Brooks-Copony Production Editor: Laura Cheu Compositor: Lynn L’Heureux Proofreader: Elizabeth Berry Indexer: Broccoli Information Management Artist: April Milne Cover Designer: Kurt Krames Manufacturing Director: Tom Debolski Distributed...

Words: 52491 - Pages: 210