DHCP (Dynamic Host Control Configuration Protocol)
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a DHCP server to automatically assign an IP address to an individual computer’s TCP/IP stack software. DHCP assigns a number dynamically from a defined range of numbers configured for a given network. (more…)
What is a Virtual Private Server?
A Virtual Private Server (VPS) is an entire operating system that runs within another operating system. It will share system resources like the CPU and RAM with other users but the resources are allocated in such a way that you cannot tell that the system has anyone else on it, much like a dedicated server. So resources are usually setup in such a way that each hosting client is only allowed to use an allocated percent, meaning that resources assigned to you will always available to you. Each virtual server looks and acts like a dedicated server.
So for instance, there may be a server with 2GB RAM, 100GB of disk space and 2 x 2GHz processors with 10 VPSes on it. Each one is guaranteed to have access to 200MB RAM, a disk space limit of 10GB, and an effective CPU of 400Mhz.
There are a number of virtualization technologies, which make this all possible. There are commercial companies such as http://www.vmware.com VMWare, http://www.xensource.com/ XEN.
Like an emulator, VMware software provides a completely virtualized set of hardware to the guest operating system. VMware software virtualizes the hardware for a video adapter, a network adapter, and hard disk adapters. The host provides pass-through drivers for guest USB, serial, and parallel devices.
In essence, virtualization lets you transform hardware into software. Use software such as VMware ESX Server to transform or “virtualize” the hardware resources of an x86-based computer—including the CPU, RAM, hard disk and network controller—to create a fully functional virtual machine that can run its own operating system and applications just like a “real” computer.
Multiple virtual machines share hardware resources without interfering with each other so that you can safely run several operating systems and applications at the same time on a single computer.
IMPORTANCE OF OSI LAYERS IN NETWORKING
A network is an interconnection of 2 or more devices in order to communicate with each other.
OSI (Open Systems Interconnection)
-To divide complicated process of networking into different layers.
-To allow different vendors networks to interoperate.
-Developing protocols and devices for different layers.
-OSI reference model was introduced by international organization for standardization (ISO).
-It allows various types of network hardware and software to communicate. (more…)
ATTACKS USING IP SPOOFING
IP-spoofing is complex technical attack that is made up of several components. In actuality, IP-spoofing is not the attack, but a step in the attack. The attack is actually trust-relationship exploitation.
IP-spoofing consists of several steps. First, the target host is chosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target’s TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor.
How different will be the kind of future web hosting ? With day by day betterment in technological aspects ,one thing is sure the hardware aspects will be quiet sound that, the processing capability , RAM memory e.t.c may multiples of 10?s of Giga Bytes or more e.t.c
Will that means that there wont be any congestion problems , or problems like sever going down e.t.c, That future is not far away.sure… Intels Dual processing system can be considered as a small step towards this. Below are few other concepts towards this.