cnm june rohit 1

Upload: rohitparmar1

Post on 08-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 CNM JUNE ROHIT 1

    1/22

    INDEX

    Task1..

    a......2

    b ... 4

    TASK2. 5

    a..... 8

    b.....11

    TASK3.

    a..12

    b..13

    TASK4. 14

    References23

  • 8/7/2019 CNM JUNE ROHIT 1

    2/22

    Task -1

    Part A

    1. EWMA OF RTT OR ESTIMATED RTT

    Estimated RTT =

    (1-a)3*Sample RTT(4)+a*(1-a)2*Sample RTT(3)+a*(1-a)*Sample RTT(2)+a*Sample RTT(1)

    We can calculate Estimated RTT by using the above calculation Formula

    If = 0.1 in this problem

    We can derive exponentially weighted moving average (EWMA) of RTT

    For First 10 segments

    1) (0.9)9 x 127 + (0.1) x (0.9)) 8 x 134 + (0.1) x (0.9)) 7 x 121+ (0.1) x (0.9)) 6x 139+ (0.1) x (0.9)) 5 x 139+ (0.1) x (0.9)) 4 x 131 + (0.1) x (0.9)) 3 x 124 + (0.1) x

    (0.9)) 2x 122 + (0.1) x (0.9)) 1x 128

    + (0.1) x130

    For Second 10 segments:

    (0.9)9 x 139 + (0.1) x (0.9)) 8 x 134 + (0.1) x (0.9)) 7 x 123+ (0.1) x (0.9)) 6x 291+ (0.1) x (0.9)) 5 x 137+ (0.1) x (0.9)) 4 x 141 + (0.1) x (0.9)) 3 x 134 + (0.1) x

    (0.9)) 2x 126 + (0.1) x (0.9)) 1x 139

    + (0.1) 267

    0

    10

    20

    30

    40

    50

    60

    1st

    Qtr

    3rd

    seg

    5

    thSeg

    7th 9th

    1 st 10 seg

    2 nd 10 Seg

    Third 10 seg

    For Third 10 segments:

    (0.9)9 x 127 + (0.1) x (0.9)) 8 x 134 + (0.1) x (0.9)) 7 x 121+ (0.1) x (0.9)) 6x 139+ (0.1) x (0.9)) 5 x 139+ (0.1) x (0.9)) 4 x 131 + (0.1) x (0.9)) 3 x 124 + (0.1) x

    (0.9)) 2x 122 + (0.1) x (0.9)) 1x 128

    + (0.1) x130

    For reference, alpha = .1

    2. WHAT WILL BE THE VARIABILTY FOR RTT.

    Estimated RTT =54.96, Sample RTT =127

    Difference = Sample RTT Estimated RTT

    =>127-54.96

    => 54.96

    Deviation = Deviation + d (Difference - Deviation)), where d is a fraction between 0 and 1

    Jacobson/ Karels Algorithm

    If, Deviation = 5, d= 0.01

    5 + 0.01 ( 54.96 - 5))

  • 8/7/2019 CNM JUNE ROHIT 1

    3/22

    5.4996

    Deviation =5.4996

    0

    1

    2

    3

    4

    5

    6

    78

    1st

    Qtr

    1 st seg

    2 nd Seg

    3. Appropriate time out when transmitting to next TCP segment.

    Firstly, we need to evaluate Sample RTT for each segment and ACK pair

    Weighted average of RTT (EWMA) Estimated RTT = A*Estimated RTT + B*Sample RTT,

    where A+B = 1 (where A > 0.8, A 0.1 and B < 0.2)

    Set timeout interval based on Estimated RTT for acknowledgement pair.

    Estimated RTT =54.96

    Sample RTT =127

    Here EWMA = 0.85 * (54.96) + 0.2 x 127 where a= 0.8,b = 0.2EWMA = 46.71+ 25.4 = 72.11

    Time Out = 2 * Estimated RTT (Consider variance when setting timeout value)

    Timeout = 2 * 54.96 = 109.92

    Part B.

    Using assumption given in Table 1 determine the premature time out will occur with any

    segments.

    Some time it seems that round trip time is higher than expected during retransmission.But still the algorithm is used to keep track of this method in which round trip time never goesfaster. But if so new path delays become larger than the RTO and due to this all samples aremisplaced, corrupted or lost. Here every packet is transferred prior to acknowledgment sent.

    As timeout is probably could be due to congestion (dropped packet or long round trip),maintaining RTO is not good assumption RTO increased each time a segment is re-transmittedRTO = q*RTO (Exponential RTO Back off) Commonly q=2 Binary exponential back off Herepremature time out occur

    http://www.cse.iitb.ac.in/~cs348/ppts/ch3.pdf

    From the given RTT table it is noticed that, segment No. 17, segment No. 27 generatepremature time out. Back off for segment isRTO = q*RTO (Exponential RTO Back off)

    RTO =2 * 215 = 430

    http://www.cse.iitb.ac.in/~cs348/ppts/ch3.pdfhttp://www.cse.iitb.ac.in/~cs348/ppts/ch3.pdf
  • 8/7/2019 CNM JUNE ROHIT 1

    4/22

    Here q=2

    Task 2

    Part A

    Network Application

    Explanation of Operation of web cache.

    Purpose of caching includes RBNB technology as core building block.Application of RBNB technology. Peer-to-peer scalability, personal web hosting, streamingmedia are the examples of this technology, lets discuss briefly the Operations of webCacheing:

    Cache plays vital role in a critical browsing configuration. There is no need of cache when aproxy connects the browser on an intranet which links to a web server.

    The proxy transfers data packets through the firewall which otherwise segregate the intranetand internet.

    The content is re fetched and refreshed from the web server across the internet whenever theuser wishes to revisit a page, this can be elaborated by given Figure 1.

    Figure 1. Typical browsing configuration without the use of a cache.

    Different topologies are included for different type of browsing configuration.

    Firstly we take, a Web Cache which is used to supply previously accessed pages of browser;the browser connects to the cache as if it were the proxy, as shown in Figure 2. This strategydoes not require change to the software on behalf of a normal configuration, additionally it doesnot reflect to the proxy or web server is also considerable.

    When the Web Cache catches a request for a web page, which first checks its Data Turbine

    server for the stored content. As the page is found, it is returned to the browser. But if requestfails and the page is not found, the Web Cache supplies the request on to the web server via theproxy. After the page is successfully returned, the Web Cache keeps the track of all copies inthe Data Turbine and passes them to the browser. Finally, subordinate requests allocated forthat relative page are then managed locally.

  • 8/7/2019 CNM JUNE ROHIT 1

    5/22

    Figure 2. Typical browsing configuration with Web Cache.

    Other topologies are also possible. While a browser's cache can reduce network traffic, itcannot be shared among many users. However, The Web Cache can be operated as a sharedresource, as shown in Figure 3, In Which , users has quick access to pages previously accessedby other users. This shared resource can be hosted by an ISP, to reduce their needed bandwidthto the Internet and improve response times, or it can be hosted by a workgroup, to similarlyreduce the load on their connection to the ISP. This proves more advantageous than othertopologies.

    Figure -3. Use of a Web Cache as a shared resource.

    Thus, configuration is applied in a hierarchical pattern for Multiple Web Caches as with peer-to-peer connections, for scalability with local control.

    Detail explanation of An ISP performances. Individual user configures hosting many dialupconnections with a locally available Web Cache. The ISP hosting a Web Cache via centralnetwork link to the internet and passes through the each dialup link. Figure 4 shows themethodology, which minimizes congestion across each layer of the network to provide endusers extraordinary concert without the involvement of high-priced upgrades.

    Here, User's requests are tackled by their own local machine, then transferred to their dialuplocation on requirement, At last requests are passed to the central ISP, and only passed to theoriginal web server on the internet. But it has some limitations of doing so. First is no user atthe ISP could be requested on recent.

    Figure 4. Use of multiple Web Caches to improve an ISP's performance.

    Peer-to-peer connections are implemented at the Data Turbine level, but not yet implemented atthe Web Cache level.

    Upon start-up, Incoming requests are parsed. No cacheing process is performed when therequest is not related the protocol http and GET.

    This request is sent to the proxy server or proxy side, and the resultant output is passed turn

    round to the browser.

  • 8/7/2019 CNM JUNE ROHIT 1

    6/22

  • 8/7/2019 CNM JUNE ROHIT 1

    7/22

    As the media reached to the core cache can be streamed out by different way, which depend onthe user location. The core cache broadcast directly to the CDN user if the CDN user locatedin multicast edge network in that case the core cache broadcast the media to edge cache, whichplaced on CDN end user network. Moreover, client can easily receive the media via multi broadcast from the edge cache. (Z.M.Mao ,D.Johnson,2001)

    A famous industrial CDN that supplies the web content, media streaming and applicationdelivery is available from different technologies.Some issues are also associated with CDN infrastructure.

    These are the below difficulties which involved when deploying a large distributedinfrastructure for CDN.

    Global distributed network like an Internet CDN that is a complex, Implementation,operation and management of a costly and difficult.

    A huge CDN may have numerous servers, which are involved in operating the hundreds ofdissimilar networks in numerous countries worldwide.

    In general, the CDN service provider (a CDNSP) does not have physical support

    infrastructure such as networks. Here the CDN servers do not run, nor administrating thoseservers that are often managed all over the world.

    Even though, the cost of designing, installation, management and, operating a entire CDN

    is considerable, several network service providers wishes to provide content deliveryservices on time.

    Configuration and installation is not very efficient or cost effective.

    The caches periodically poll a configuration server to check for new configuration files.Since most of the caches share the same basic configuration with only a small delta that iscache-specific, this approach proved very effective in updating the configuration of thecomplete CDN infrastructure in a timely fashion.

    However, the use of multicast enabled our streaming CDN service to be highly network

    efficient and is therefore highly desirable.

    One of main goals for CDN when designing the service was to reduce human involvementduring normal operation of the system. That means deployment of fully automated redirectionsystem is associated with this goal. However, in this section we consider operational aspects ofthe system where human involvement cannot totally be eliminated.

    CDN is categorised two ways that is daily base operation.

    1) Pro-active management And Monitoring:

    This method includes monitoring all equipment via a network management equipment It alsogenerating alarms when certain problem occur on the CDN devices, and monitoring theredirection system for error conditions.

    2) Reactive management:

    Another method that Involves determining where the problem is when an end-user is unable toreceive a Web cast. These types of problems are somewhat unique in a streaming situationwhen an end-user selects a channel from the publishing platform and fails to receive the streamthe cause can be any of a number of reasons.

    CDN is probably become popular in certain cases when a desktop problem of miss configuredsoftware is experienced.

    The problem is related to networking which could either be local to the user's location orsomewhere else in the network. Such problem is result of redirection error. For exampleincorrect subnet information might have been entered into the configuration feeds resulting inusers being redirected incorrectly. (Jerry Cochran 2000)

    Problems can easily handled by CDN infrastructure.

  • 8/7/2019 CNM JUNE ROHIT 1

    8/22

    CDN briefly then, In particular the tool for end-users tells them what their IP address is andwhether the redirection system had any problems dealing with that address. The main task ofthis tool is streaming small chip from CDN infrastructure, which, if it fails, will point to somesort of a network or CDN problem, and, if successful, points to a probable multicast problem.

    Similarly, CDN is depending on the tool for the support personnel allows them to see wherethe redirection system will redirect based on the user's IP address.

    Additionally the tool they can also verify that all CDN equipment involved in this distributionis functioning correctly and that network connectivity exists between the CDN equipment andthe end-user.

    Operation of a CDN with web Cache

    The main key objective of CDN OR Proxy server is to get data near to users so as a result ofthis response time is reduced. These Both technologies display various advantages anddrawbacks.

    CDN

    One main strengths is serving of large numbers of request and the volume of the content

    So, on that base level strength serving enormous quantity of requests and different type ofvolumes. On other side, as per data information we can present main shortcoming is areplacement and different amount. But, replication should be static for a long amount of timeduration. So, all these leads to unutilized and un optimized storage amount usage.

    Proxy serversProxy servers get used to content caching depends on different access patterns. For this cachingreplacement algorithms are mainly used, which are really proved very efficient.But, proxy servers do not scale properly for serving for limited amount of information or userdata.

    In an effort to merge and if we can take all benefits of every ways of both accepting earlierrecent work analysis with a variety approaches that enable web caching in CDNs with proxy

    servers.

    More suitable performance of CDN is tested, evaluated with new caching concepts, finally itbecomes more evident. If we talk about networking location these are incorporating CDNcomponent for instance, clients traffic, and sufficient support for caching schemes deployment.

    But still it is reported that CDN deployment is tough in real networking era.

    Http and Ftp difference between both protocols

    Both protocols have its own characteristics. Both protocols are used for uploads anddownloads on the internet, for text and for binary, both over TCP/IP. But there are considerabledifferences in the details

    There is vast dissimilarity from connecting to a FTP server using a browser. Although, in caseof client will allow to connect and need to download variety files from a main a server.However, on other side, if you used to FTP client then download, upload different files, and

    also delete files etc. Apart from this, mostly HTTP is commonly used for a main websites. Forinstance, if you want to access any website then , you will get quickly HTTP connection.

    FTP and HTTP are distinguished by two ways.

  • 8/7/2019 CNM JUNE ROHIT 1

    9/22

    FTP is called as a two-way system, as per its name we can identify that File transfer protocolwhich indicates that a file transfers from one server to other servers. Apart from this, we canalso utilize for uploading a file from client to server.

    While HTTP, is only one-way: HTTP is responsible for movement of text, pictures and otherdata from the opposite serer to a user computer (server), and commonly web browser is used toview data. And an additional factor to be considered for FTP is files are transferredautomatically to a client computer and this similar process is done in reverse also.

    But, in HTTP this transfer are viewable. And this transfer becomes hidden if the browser isstopped but using the execution of commands user can move the content data to the computer'svirtual storage here it is memory.

    The second difference among these two systems is also point to discuss. FTP systems usuallyencode and also pass on their data in binary sets this process allow to transfer data with morespeed.

    On contrary, HTTP encodes the data in MIME format. Research report has determined that this

    format is huge with more complexity. Reason behind this is some further encoding is involved,during attachment of files to emails. Due to this the file size is more than the original size.

    Another thing can be done with the File Transfer Protocol is to modify a different mode of thefiles. Because in a business environment each and every situation need a different files to finishany task.

    For instance, if we make attention on any IT company for them any small web applicationwhich keep information your details for examples. Your name, e-mail address , age, address.So, all information covered by a server and keep all information. Main point to note that, if aany file is protected from a main server, then its not possible to do any modification inparticular file.

    Apart from this, File Transfer Protocol is mostly utilize for upload different files to web hosting

    server. And in a main sector webmaster are using all different procedure to put a website onlinefor all users or visitors.

    Task 3

    Difference between UDP and TCP

    The Transport layer provides end-to-end data transfer. Transmission is achieved by

    Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both are consideredas transmission providers in the Internet Protocol(IP) environment.

    IETF RFC793 defines the Transmission Control Protocol which support multiple tasksimultaneously. Although, some points are need to make attention that differentiate protocols.

    o TCP provides a consistent transmission of stream delivery and virtually build

    connection service to application through the use of sequenced acknowledgment witha retransmission of packets.

    TCP make use of packets known as segments, on other side UDP utilize packets known as

    datagram. Together TCP and UDP are bound within Internet layer datagram forcommunication to the next node.

    http://www.blurtit.com/q495443.htmlhttp://www.blurtit.com/q495443.htmlhttp://www.blurtit.com/q495443.html
  • 8/7/2019 CNM JUNE ROHIT 1

    10/22

    Main two different types of internet protocol(IP) are renowned in networking environment.

    Both are differentiate by their usages.

    TCP( Transmission Control Protocol) is a mainly connection oriented protocol inconnection mode or for any connection of server. Apart from this, a connection always inclient to server direction rather than other. And on that way data can be transfer throughthis connection.

    A link must be set up at the Transport layer of both structures before the application canpass on any data. So we can say it is connection oriented protocols.

    It is more reliable compared to UDP. It offers error checking and flow control across a

    implicit connection that it launches and at last terminates.

    TCP protocol is liable for the TCP link.

    During transmission process, the indexing with sequence and response of packets sent, andit is possible that recovery of packets may be unable to find in .Simply indicates thatcomplete veracity but, dont get soiled.

    It defines sequencing means in which order you have sent packet you will get in sameorder.

    UDP is considered as unreliable due to following reasons:

    Provides data transmission with less network traffic expenses than TCP. UDP is in usewhen the amount of data to be moved is little for example single packet transmission, orwhen it is difficult to establish efficient TCP connection or it is used when the applicationor upper layer protocols can supply the consistent delivery.

    On other Side TCP UDP does not checkerror or provide any flow control, this is missingto the application procedure. Still it can be used by set of rules that offers user friendlypacket communication for example NFS.

    If you are going to send a two messages out, then no need to make any priority for

    direction for message. It provides transmission without sequencing.

    UDP for Streaming Multimedia application is controversial

    There are some of cause behind occur this circumstances.

    It lacks main reason behind form of congestion control which creates many problem forconnection mode. Apart from this, congestion control is needed to check the network from

    inward bound a congested state where very diminutive significant productive work is done.In addition, we can get sky-scraping bit rate video there would be many packet overflow atrouters. And this situation possible only without prop of congestion control or with haveprevailing congestion control. Last but not least, lack of congestion control creates a problemfor UDP which can brings many issues for connection mode.

  • 8/7/2019 CNM JUNE ROHIT 1

    11/22

    Task 5

    Single Sign On technology

    Single Sign on technology (SSO)

    President and CEO of SSO vendor Passlogix Mark Boroditsky has said that though people hasno enough knowledge about SSO still it is going to be popular among them According to him,definition of Single sign-on is easy to understand and also easy to implement in short, youlogin with a only one password and you can obtain access of all your applications which arecomputer based.

    Single Sign On (SSO) technology is good concept that is the point of interest as per todaysscenario. For different website users require personal information to keep it confidential.Complexity increases with more such information to store. And as a result hard process forthem to load up all statistics for every new sites where they catalogue for . Some times it isadditional difficult to mange handle systems with multiple passwords and different authenticateprocedure. In Addition, during the selection of the passwords of corporate computers, usersmay adapt different techniques to select that are not difficult and effortless for users to keep in

    mind. In contrary, these techniques may result in some difficulties to guess the password forothers to guess. So, People also directed to put passwords places where they can easily findthem. Here is drawback of security leakage, because password may be too visible to others andsometimes also accessible. Because of this inconvenience of remembering passwords, Innetworking era some powerful technologies are discovered. And most of management team hasannounced that SSO System is very powerful and desirable tool for all kind of users. . In thissystem it permits you to sign in only one time to broadcast numerous sites

    Now time to discuss SSO and its technologies more briefly. As per name suggested, The SSOtechnology is dependant on a particular authorization, only single time login is require at onesite, through these user can also access other sites also. One important thing to be considered,the main task of an SSO system stores the entire collection of the user information utilizingsome flow of procedures or different types of software. Apart from this, every sites should be

    verified by other client using some type of software. In this type of system, not morefunctionality for user .just they need to login just one time to the initial site that automaticallypasses through all different sites. Subsequently to it he pass will be authorized using the datafrom the previous site. But in contrast, such system and such mechanism can generate majortroubles of security which includes the user authentication, data collection space securely, andthe misuse secure information by concern member sites. Now a days most companies haveaccepted SSO solution.The key factor is SSO technologies are deployed to many organizationsthat will offer ease and safety.

    At present, three different categories of SSO techniques are discovered for Usage.

    1) centralized

    2) Distributed data storage.

    3) Locally stored SSO

  • 8/7/2019 CNM JUNE ROHIT 1

    12/22

    Centralized: In the centralized data storage, as per name suggested the provider has to manageentire secret data and that information is collected on a server which is centralized. This ispositive factor of maintain data centrally the main reason behind this is, probably the user needto trust in only one provider. Its really advantageous.

    On Contrary, sometime the similar reason is a drawback, because this solitary supplier keepsthe track the entire Personal Information of users. In some cases the user is less trusted to thebehaviour by the provider.

    To illustrate such system Microsofts .NET Passport technology is good example.

    Distributed data storage: Distributed data storage is considered as decentralized data storage.

    In distributed SSO of data storage, just the requirement of data is to collect at that particular siteor other words, limited computer.. In addition it is not associated only with this issue.

    Some useful websites, in which every site simply collects user data that is must required

    information for the resources that site offers. Simply we can say the website of Weather.comwill store only the users few details like zip code and other information of Name and SSN willbe hide. The good factor of the method is that even if unauthorized people hack informationfacts through a database of Site. But, User doesnt obtain rights to whole access of the userspersonal Information.

    If we illustrate distributed SSO,

    Locally stores SSO is an example of a distribute SSO is a liberty Alliance.

    Apart from this, one more type of SSO is where the receptive information is stored in a localdatabase. In addition, a personal data source information it means that, name , credit cardnumber, address etc. can be laid up on the users computer. This database is mainly connectedwith a browser and every time a user begins a session of browser. He allows the database to

    work progress with website. And a user put an information which he wants put information anddata to discharge to each site. All data desires to be an encrypted so that hacker may not allowto hack a user information. Mainly locally stores SSO re Account Logon and e token.

    It is all key objectives for service source to employ SSO in their website as per themcontribution to customer information with rest of service source exclusive of losing customerfaith and assurance.

    .

    Microsofts .NET Passport

    .Net passport technology was developed by a gaint Microsoft in end of 20 th

    century. For implementation of this framework is a SSO technology. It thoroughly

    deployed by Microsoft Passport has central server that holds all information. As we can

    make focus on this figure.

  • 8/7/2019 CNM JUNE ROHIT 1

    13/22

    Here Customer merchant relationship through passport is elaborated in figure 3.

    As per figure, the user / customer provide all private data to passport and facilities it to organize

    the data. If user wants to get a product from internet or websites, shown in the figure, themerchant can receive a request from Passport. Thus user is not directly interacted withmerchant. Merchant has only access some part of the information, the merchant only receiveran information that is an unique to each user. So on that base level merchant can not losensitive user information. Thus such mechanism provides high range security to Users PII. Italso gets reference from the credit card company for payment delivery .All the business dealsare made in secret. Passport controls and logs all of the users transactions. This plan is verybeneficial as it does not allow to leak any of the user data.

    Drawbacks of SSO as it have some disadvantages; it is the similar as its most importantstrength of password management by centralized access.

    There is an excellent potentiality for the misuse or leakage of data. To set up its account some

    information like name and email address is required to provide.Additionally other sites that areconsidered as associate sites who may request extra information which will be stored as usersPassport side view or it may stored in database.

    The Passport profile can hold up to the all individual details .depends on using Passport mode itrequires the concern details.

    On the other hand, with Web single sign-on (WSSO), the purposes can be organization onmultiple computer networks but it has some limitations that applications must be only browserbased.

    The organization ESSO requires associating with widespread systems integration whichpermits Window based applications that can easily incorporate with older framework likeUNIX.

    One important thing to keep in mind, WSSO is organized up on interior networks at corporateoffices and government charity.

    Liberty Alliance

    The Liberty Alliance project is a project of no of organizations to create an openstandard like XML, SAML for federated network identity via open technical requirement andspecifications.

    Technically it is good example of Networking Identity. These concerns to anindividuals sensitive information which involves personal as well credit card files, and expensedetails.

    Moreover, The Liberty Alliance Project is considered as a just a bunch ofcharacteristics for SSO expertise to be applied on websites. Conceptually at some extend it issame as Net passport as mentioned above. However, Liberty is not liable provision of products

  • 8/7/2019 CNM JUNE ROHIT 1

    14/22

    or services to the public directly. Moreover, individual companies are grouped together thatprepares open technical specifications. Implementation of sites is exclusively liable for secureLiberty specifications. Because of its strategy of maintaining data more secure it is reported thatLiberty is not liable for several failures of information by a site which is used for thesespecification development.

    Liberty is an example of distributed concept, in which information is not stored on solitary unit.It consist of an structure which provides link networks connected to parties. Liberty provides aservice is known as permissions-based attribute sharing which is very important characteristicof Liberty. This is used to get enabled the organizations to deliver users with selection and rulefor the use and drip of their private and secret details.

    The main objective was to set up a universally established platform for organization ofuniqueness-based web services that may very with different industry principles.

    There are certain rules and recommends that the member companies have to follow to maintaindata secrecy. User must follow the certain rules and regulations about storage of data andprocedure for its usage. We have to keep track of these details. They should offer the usersselection about stored PII and users should be able to display their hold PII so they can createmodification to their PII.

    There are numerous roles and their respective responsibilities are associated with LibertyAlliance methodology.

    In which the vital role is played by Principal in type of consumer, the Service Provider in form

    Of website , the uniqueness provider and last attribute provider also included in list

    The key entity represents an recognition and it can be allowed by the individuality provider.From these it is possible to make decision for utility for usage of PII.

    The Service Provider is a one that gives services to the Principal.

    The figure below is an example of operation of user authentication between websites withliberty is enabled. It shows entire procedures by presenting airline.com website. Lets givefocus on figure we can notice when a client needs to check his Personal Information on site A,

    he initial fuel in to site. Here Airline.com is the service provider it is, the useris authenticatedafter connection with the Identity Provider. After this authentication, flight details can bemanages and also can be checked. These providers can keep the track of his flyers details andother personal information. If we illustrate this example in more details, if the user then decidesto deal with other sites like carhire.com, User need to visit that sites.

    If the client fix on to sign in to site B .as site B is also a Liberty-allowed site, it can develop thecontacts with Identity Provider to validate the user. They provide some extra facilities whichincludes, the user can log regardless of the type his username and password again.

    After one visit to previous websites here it is airline.com, the user had formerly needed to setall the details in at all previous sites in which permissions are also involved. So that userpermits this website to share only that information that is previously stored. At that time Site Bcan make communication with the features provider for request of the users allowable

    information.

    If we keep the track of keeping user centrally, Site A and Site B, both websites can connectwith each other .but both sites can not have rights to know personal information of users.

  • 8/7/2019 CNM JUNE ROHIT 1

    15/22

    Summarize above model of data sharing, these both sites have access to the crucial informationto give their services. This process of data sharing confirms that only necessary information isstored and afterward this information is used. Optimization is also achieved by this model forthis there is no need of all of the users information.

    eToken/AccountLogon

    Another considerable technologies for Local data storage are eToken and AccoutLogon.

    These both technologies that allow the user to collect private information locally. Means data isstored in local database. User can easily access such personal information from local database.

    Shortly if explain eToken Technology, then data is stored on external or separate storagedevice. using USB port the storage device is connected. The interesting feature of thistechnology is User need to just login one time into this software. Means on each visit they wantto log into eToken provides the facility to automatically log them in. Here User Computerbecomes data storage.

    Whereas AccountLogon is Software that keeps track of different personal informationincluding Users Password. This information is stored at different sites and automatically

    Login information is filled out when ever user visits the site. But in all these process user has tologin only once.

    These is main advantage of above SSO Technology is more security can be efiiceintlyachieved.

    Because the data is stored locally, so hackers can not reach all users information though theypass through the network.

    These technologies have also some drawbacks. Among all disadvantages the first disadvantageis user can not connect site privately. Even service providers can know some confidentialinformation like who is making production of the purchases. They also have details of privateuser information. Second disadvantage is the technology of remembering multiple passwordscan not give complete protection to secure information.

    Concluding above technologies we come to know that they have completed a significantdevelopment towards accomplish their goals.

  • 8/7/2019 CNM JUNE ROHIT 1

    16/22

    Additionally the Liberty Alliance and .NET Passport deployment have set up key achievement

    But still we can not consider them as complete security package. Means user has not fully faithfor security.

    Passport collects and hides the information on a central server and which is a too potentialthrough the overhead of security leaks are reduced. While Liberty Alliance plan collects the

    information in a scattered mode at the different individual member sites. But these individualsites have its own benefit that the can not store some additional data about the user and no needof the users confirmation.

    However, some factors that reduce its usage, both of these technologies are lacking inobservations of the data flow. However, the Liberty Alliance generates the tools of uniquehandles for each user, the sites can not manage as efficiently as they require through othermeans.

    Though these both methods enhance the web browsing capabilities with multiple functions,these all above limitations result in insecure data storage.

    The main advantages and disadvantages for deploying SSO technologies are very essential fornetwork manager.

    Advantages of Using SSO Solution and its Technologies.

    If any application that exchanges or it is involved any high authentic process

    Such applications have need of normally reliable identity providers or partners.

    The Identity Provider (IdP) authorizes the user. Idp considers your application as a serviceprovider but depends on the protocol this may varies. In absence of single sign-on, workershave to utilize multiple dissimilar passwords for every computer systems. Sometime this isreally difficult for large, complex and high ranging network.

    SSO is also research topic where Experts also point to regulatory stress and cost-managementconcerns for driving it.

    On the other hand, typical web based single sign-on uses rapidly growing, standards-basedsoftware technology. This technique is known as Web services it is used forcommunicatingbetween the applications running on various computer systems.

    Why WSSO is point of interest? The answer is WSSO is still quite well known for its internetusage. For example, during internet access it might assign a user to shift from one conversionsite of travel to othersites of reservations by few clicks or simple processing.

    High Security: How SSO Provide higher security to system? What is main objective behindthis design. For this virtually all SSO support additional network security techniques with highencryption levels. It also involves the use of a smart card, biometric and other methods forproviding strict identity, one live example - SchlumbergerInformation Systems (SIS) withprocessor sign-on systems that assemble SSO with smart cards which is used for their gas and

    oil companies.

    Although the foundation of SSO is simple to absorb that is the crucial technology proved hard.If we start there are different types of SSO. This form of SSO is recognized as enterprisesingle sign-on (ESSO), at this point a user can have rights of access of any system by using aunique password, on other side the applications are organized under a particular single projectnetwork.

    The Evolution of Identity and Access Management

    In wide range networking era evaluation of identity plays important role in access management.As per discussed above, SSO topology facilitate the users to log in only one time and then bewithout human intervention it is authenticated when they desire to get access of other

    resources. This technology is in light through the support of the number of methods.

    These methods are Kerberos, password management and password synchronisation.

  • 8/7/2019 CNM JUNE ROHIT 1

    17/22

    Lets calculate cost for development of SSO Solution.

    According to analysis of previous experience and recent research by Enterprise ManagementAssociates (EMA) it is noticed that the password management costs is need to considerable.This is $250 per year. So total average cost counted for computer user of an organization.

    Finally annual calculation is $2.5 million for the organisation of 10,000 employees.

    There are some methods are required for access management and Identity.

    1) Provisioning

    2) Federal Identity

    If we discuss the term ofProvisioning is technology that usually moves by way of single sign-on. Their processes are coordinated with SSO Solutions. Basically, provisioning is the processthat enterprise systems officer plays vital role for setting up users account thought the PCnetworks. Occasionally, this account includes all user information covering user name andpassword and access privileges to specific applications.

    Matthew Gardiner, the SSO Product manager at Computer Associates (CA), SSO prevents theuser from a individual user name and password for every individual application.

    But administrator organizes the access rights can remain in effect.

    Another term is Federated identity

    In which it is associated with single sign-on crosswise defined computer systems beingactivated by several endeavour. Applications are network based in federated identity systemswhere they do not require moving towards the other network.

    Federated identity brings the most organizations closer so they can contribute in terms oftrading relationship.

    In addition, Identity information is shared very confidentially if we compare with unified andcentralized model, like single sign-on by taking the partners authorization. This is expressedby the vice president Eric Norlina at federated identity specialist.

    Lets take a live and most familiar example of Federal Identity.

    An institute might have a professional website named employee benefits. This site hasvarious characteristics which includes some discount offers or some attractive profitableadvertises for bank. Due to these conditions, federated identity technology permits the user torich the details about any private link; however this data is successively on a workstation outer

    of the novel enterprise network.

    Despite of all above features, the important key factor of federal identity is Federal E-Authentication programme. That will truly turn round around federated identity concept.

    Some live examples of corporate wellknown companies like NetManage, a software companyis known for delivery the software for Web integration and enables such applications aregrouped to offer SSO through the both long-time requests.

    Some of applications if we support above live examples, AS/400 applications are beingincorporated. And they are used for hotel management.

    The key factor of SSO architecture is the combination among SSO and substantial accesscontrol applications. More over beneath this strategy and difference circumstances, finally,employees get the chance to get available all authoritative system applications. These

  • 8/7/2019 CNM JUNE ROHIT 1

    18/22

    advantages are not limited to computer system only but also it is responsible for typicalphysical workplaces and parking lots in which solitary mart card and password is utilized.

    Lastly if we summarize SSO, as per one recent customary, associations are starting to integrateESSO systems into WSSO including other processor systems that are merely web basedsystems.

    BusinessBenefits of SSO:

    There are also several business benefits of SSO.

    One considerable benefit from above discussion it is obvious that reducing multiple usernameand passwords.

    But risk and more analysis is also associated with specific benefits.

    Moreover, some supported technologies may become useful to examine whether SSO makessense.

    Reduction in Total Cost

    It is very important prospect in business. How SSO is cost effective is need to consider before

    choosing SSO Technologies.

    How much does it cost your company every time a password is reset?Depending on the organization and the relationship of the user to the password, administrationcosts range can be decided for every password resetting.

    Cost may be increase depends on high transaction values and also it relies on different levelusers.

    Potential Increase in Security

    If we think differently by considering the security aspects in middle, the implementation of asingle sign-on solution requires companys firewall. What more?

    As SSO is proved more beneficial for authentication, SSO solutions fundamentally ensure theguarantee about security of employees password. This can be achieved by including somefactors to authentication process. Afterward, users are authenticated to regular applications thatinclude web applications.

    In Addition, Potential Security is essential benefit in networking management era.

    If users need to guess one password, there is a greater chance that they will userstronger onesand a lesser chance of passwords being visible to third parties because of poor protection by theuser.

    It also supports for multiple authentication Methods

    But sometime it is less popular because sometimes they have little doubts to manage multifactor authentication solutions. Or it may be too difficult to incorporate into existing runningauthentication systems. So most companies reject such methods. But SSO solution can supportmultiple authentication methods that reduce the cost of implementation. All these methodsprovide strong authentication security.

    Integrating External and Internal users

    Web users on large web network require authentication login support for different populationsfor internal employees and outside users. Company manage two separate authenticationdatabases because two different group wise their security and policies are different. An

    appropriate SSO solution enables a company for integration and the management of above twousers under single system.

  • 8/7/2019 CNM JUNE ROHIT 1

    19/22

    SSO for FFIEC Compliance

    Lets take one live example, NetDeposit, a popular company involves in the business ofRevenue generation. That facilitates businesses to make more efficient for revenue collectionand also supervision with verified payment techniques and methods, and due to its positive andprofitable feature redirects the user to choose a Single Sign-on solution to ensure agreement

    with Federation Financial Institutions Examination Council (FFIEC) for risk lesseningguidelines.

    Finally TriCipers myOneLogin service becomes successful to provide strong Authenticationbetween client and customer for payment procedures.

    A most important provider of Internet identity services known as TriCipher myOneLogin. Thissecures the SSO service to maintain its movement towards the Google Apps Premier foremployees through other continents.

    If the applications for example, Salesforce, Google Apps, etcis Cloud base and Single Sign-Onis really helpful solution for such applications.

    To handle its every day business, single sign-on solution is not used just for the convenience,but also for the high security. Certain researchers and documentations do tremendous work.The job includes recent efficient usage of Single Sign-on in cloud based systems.

    In sum up, the huge benefit of controlling and management of users/employees access tobusiness applications with high range security.

    Risk Factors

    Some advantages are itself considerable risky.

    Above these Consolidations of passwords and logins also results in consolidating the points ofrisk which may result into potentially exposing your enterprise to threats and vulnerabilities.

    Now, we should also focus on outline the potential risks. It is necessary to know how it affectsso it may helpful to balance the business benefits against these risk factors.

    1) Single Point of Failure

    Because in single password scenario, single password is accessed by multiple systems there ismajor risk of password stolen. if it happens, the unplayable damage can be done with it will bemuch greater. Apart from this if we protect password from stolen, it is as risky to keep such

    track or storing passwords on a single server because the server may become single point ofattack for hackers. If the servers security is compromised, then the attacker get chance toaccess to all the systems the server protects.That turns into disastrous results and loss.

    2) Vendor Reliability

    Before purchasing an SSO solution, an organization should research the vendor with due care.They should check vendor responsibility with its population. At what extent they can maintainSecurity of customers privacy.Some questions to ask: Has the vendor had the solution reviewed by a third party audit? Howlong has the company been in business? How many customers does the vendor have? Will any

    customer act as a reference? Sometimes we have heard the top stories about hacking privatedata of customer. It is very crucial to know who is responsible for this. Are there any published

  • 8/7/2019 CNM JUNE ROHIT 1

    20/22

    attacks against the vendors solution and if so has the vendor addressed and corrected thevulnerabilities? These all questions should be satisfied with great faith. So it is considered highrisk to choose vendor.

    3) User and Administrator Training

    Fully qualified and trained Network administrator is required to handle SSO Technologies andsolutions. There are some training sessions are required including Safe Password. Its alsofact in Network management that every organisations planning shoild include SSO Plan SafePassword.Some lessons related to this topic must cover user training for selection of password that ismore difficult and encrypted formats.

    In Addition, Such training for consciousness about password privacy not to share with thirdparties. Training cost is also added to business investment.Apart from all this regular evaluation of employees and network administrative staff is alsotime consuming and sometime human error is responsible for privacy leakage.

    4) Cost to Implement / Complexity of the Environment

    For the moment, the associations or the organizations are also discover that managing thepassword issues are denoted very costly.

    Cost management and cost effectiveness also in complex environment is main objective formost of the organizations. Due to this reasons there are so many restrictions can be used .

    For such situations Single sign on is proved more beneficial than Creating SSO in any criticallandscape.

    Also, many companies that have attempted SSO in the past may have contribution of Kerberos/DCE based authentication.

    Lets take a live example,If your enterprise has already spent time and money in providing some SSO technology via

    DCE.Here calculated costs of replacing the existing infrastructure need to be considered. Because itsurpass to benefits. Companies that are using directories will probably benefit from the abilityto integrate directories, via LDAP into SSO.However, for long term goal and SSO Planning, Wireless authentication is needed to considervery useful.For Example,1. WLANs are becoming common, making authentication for wireless clients critical to SSOstrategies.2. The IEEE 802.1x authentication standard uses the Extensible Authentication Protocol(EAP) for wired and wireless networks and supports many authentication standards such asRADIUS and Kerberos.

    But, such complex architecture requires more security.More over this complex architecture requires level wise authentication. It may vary level tolevel, which is considered as multi factor and multi level authentication. With such highsecurity restriction is also increases. As a result of such situation simple passwordauthentication is less protected one.

  • 8/7/2019 CNM JUNE ROHIT 1

    21/22

    References

    File Format: PDF/Adobe Acrobat - Quick View

    Chapter3: TCP. Shivkumar Kalyanaraman: [email protected] ..... a) Memory

    becomes cheap (infinite memory). No buffer. Too late. All links 19.2 kb/s ...www.ecse.rpi.edu/Homepages/shivkuma/teaching/.../ccn2001-slides4-6pp.pdf

    by JE van der Merwe - Cited by 3- Related articles

    AT&T Labs - Research. Florham Park, NJ, USA. Abstract. Content distributionnetworks (CDNs)..... URL, HTTP URL that points to one ...www2.research.att.com/~kobus/docs/wcw2003.pdf

    rbnb.net/documentation/WebCache/webCache.html Cached

    A simulated model, in our case a Web cachingenabled CDN, ..... update. operation

    takes place when cache consistency is applied. ... In contrastto the lower levels, we

    are interested in the actual content type and special charac- ...www.springerlink.com/index/J0186353172540P8.pdf

    DETAILED DESCRIPTION OF PRESENTLY PREFERRED EXEMPLARY

    EMBODIMENTS ... 4 depicts the operation of a two-level content delivery network ina content .... For the sake of this particular explanation, assume that the client's requesthas ...www.faqs.org/patents/app/20090254661 - Cached -Similar

    This is a discussion on any major difference between FTP AND HTTP ? within the

    Networking forums, part of the category; both of them r used for file ...www.geekinterview.com Geeks Talk Networking - Cached -FTPThe keydefinition to remember is the term "protocol," which means a set of rules or ... The

    major difference between FTP and HTTP is that FTP is a two-way ...www.topbits.com/ftp.html - United States - Cached

    There are four major differences between UDP and TCP: .... layers above the transport

    layer layer 4 and those at the network layer layer 3. ...sawaal.ibibo.com/.../what-differences-between-tcp-udp-528850.html -Cachedwww.mielesecurity.com

    File Format: Microsoft Word - View as HTML

    Single Sign On (SSO) technology has been a very important topic in ....http://developer.novell.com/research/appnotes/2000/february/02/02.htm ...zoo.cs.yale.edu/.../Single_Sign_On_Technologies_as_Privacy_Enhancing_Technologies.doc -Similar

    Before the era of HIPAA and the Sarbanes-Oxley Act, many organizations turned a

    blind eye ... To begin with, there is more than one type ofSSO. In technology knownas ... but only when those applications are running on a single enterprise network. ...Popular Articles. New TSA unit focuses on suspicious behavior...govtsecurity.com Magazine Articles- Cached - Similar

    File Format: PDF/Adobe Acrobat

    On (SSO) technology to address the password explosion because ... SSO allows usersto log in once, using what appears to be a single method or credential to ...www.mielesecurity.com/Resources/Downloads/SSO%20WP.pdf -Similar

    The Myths & Realities of Domino 6 Password Management, PistolStar White

    Paper, July 2004.

    http://www.pistolstar.com/forms/responseforms/MRD_IP_LP.html

    http://www.google.co.in/url?q=http://docs.google.com/viewer%3Fa%3Dv%26q%3Dcache:61IFgpg10XsJ:www.ecse.rpi.edu/Homepages/shivkuma/teaching/fall2001/ccn2001-slides4-6pp.pdf%2BCHEAP%2B3%2BTCP%26hl%3Den%26gl%3Din%26pid%3Dbl%26srcid%3DADGEEShIIVDnaCD1zAs7nhMnHapB7BHKSOY-7RidMdCu01VymHCzgJbgeFVqqYHxdwJis9FLcNYcZxYR2ZahDhAWhFmM9wZXOWfTiuxzsn7Ni21JZ9Hfsy4OcJ-hF7e7g-68X2VAcrKf%26sig%3DAHIEtbSQUIPYpwylnnOcqj_Ch-oM1hoBqQ&ei=YenRS7nyOom-rAfJvaWGDg&sa=X&oi=gview&resnum=10&ct=other&ved=0CCoQxQEwCQ&usg=AFQjCNFcZavFggekSpPLg2Zul1PLQbT0wghttp://scholar.google.co.in/scholar?hl=en&lr=&cites=18061313034101367895&um=1&ie=UTF-8&ei=-HueS7LwMYu8rAeX3fyNBA&sa=X&oi=science_links&resnum=1&ct=sl-citedby&ved=0CAoQzgIwAAhttp://scholar.google.co.in/scholar?hl=en&lr=&cites=18061313034101367895&um=1&ie=UTF-8&ei=-HueS7LwMYu8rAeX3fyNBA&sa=X&oi=science_links&resnum=1&ct=sl-citedby&ved=0CAoQzgIwAAhttp://scholar.google.co.in/scholar?hl=en&lr=&q=related:V6S-9oKspvoJ:scholar.google.com/&um=1&ie=UTF-8&ei=-HueS7LwMYu8rAeX3fyNBA&sa=X&oi=science_links&resnum=1&ct=sl-related&ved=0CAsQzwIwAAhttp://webcache.googleusercontent.com/search?q=cache:lQThtFKhNPAJ:www.faqs.org/patents/app/20090254661+DETAILED+EXPLANATION+OF+CDN+OPERATION+%2B+NETWORKING&cd=2&hl=en&ct=clnk&gl=inhttp://www.google.co.in/search?hl=en&q=related:www.faqs.org/patents/app/20090254661+DETAILED+EXPLANATION+OF+CDN+OPERATION+%2B+NETWORKING&sa=X&ei=WGTDS7aoA8uvrAf2lInHCQ&ved=0CBEQHzABhttp://www.google.co.in/search?hl=en&q=related:www.faqs.org/patents/app/20090254661+DETAILED+EXPLANATION+OF+CDN+OPERATION+%2B+NETWORKING&sa=X&ei=WGTDS7aoA8uvrAf2lInHCQ&ved=0CBEQHzABhttp://www.google.co.in/url?q=http://www.geekinterview.com/talk/&ei=t7GjS5SgJ4XGrAe77OjlCA&sa=X&oi=breadcrumbs&resnum=5&ct=result&cd=1&ved=0CBIQ6QUoAA&usg=AFQjCNHIHBJCeZZZMpIKd84-1yZRNzIHOghttp://www.google.co.in/url?q=http://www.geekinterview.com/talk/&ei=t7GjS5SgJ4XGrAe77OjlCA&sa=X&oi=breadcrumbs&resnum=5&ct=result&cd=1&ved=0CBIQ6QUoAA&usg=AFQjCNHIHBJCeZZZMpIKd84-1yZRNzIHOghttp://www.google.co.in/url?q=http://www.geekinterview.com/talk/networking/&ei=t7GjS5SgJ4XGrAe77OjlCA&sa=X&oi=breadcrumbs&resnum=5&ct=result&cd=2&ved=0CBMQ6QUoAQ&usg=AFQjCNFqpYq4OOqP9DdfzhftDJcYsApFswhttp://74.125.153.132/search?q=cache:Q6EwpesHDHQJ:www.geekinterview.com/talk/8572-any-major-difference-between-ftp-http.html+key+differences+between+http+and+ftp&cd=5&hl=en&ct=clnk&gl=inhttp://www.topbits.com/ftp.htmlhttp://www.topbits.com/ftp.htmlhttp://74.125.153.132/search?q=cache:wZu7dRsPZmgJ:www.topbits.com/ftp.html+key+differences+between+http+and+ftp&cd=1&hl=en&ct=clnk&gl=inhttp://74.125.153.132/search?q=cache:4Qa3o7DaUfsJ:sawaal.ibibo.com/computers-and-technology/what-differences-between-tcp-udp-528850.html+Outline+the+principal+differences+between+the+UDP+and+TCP+transport+layer+network+services.&cd=6&hl=en&ct=clnk&gl=inhttp://74.125.153.132/search?q=cache:4Qa3o7DaUfsJ:sawaal.ibibo.com/computers-and-technology/what-differences-between-tcp-udp-528850.html+Outline+the+principal+differences+between+the+UDP+and+TCP+transport+layer+network+services.&cd=6&hl=en&ct=clnk&gl=inhttp://74.125.153.132/search?q=cache:HszCCnktI2YJ:zoo.cs.yale.edu/classes/cs457/2003/Single_Sign_On_Technologies_as_Privacy_Enhancing_Technologies.doc+research+the+subject+of+Single+Sign-On+(SSO)+technologies&cd=2&hl=en&ct=clnk&gl=inhttp://www.google.co.in/search?hl=en&lr=&q=related:zoo.cs.yale.edu/classes/cs457/2003/Single_Sign_On_Technologies_as_Privacy_Enhancing_Technologies.doc+research+the+subject+of+Single+Sign-On+(SSO)+technologies&sa=X&ei=p_qsS5TIOo3GrAf5-_mmAQ&ved=0CAwQHzABhttp://www.google.co.in/search?hl=en&lr=&q=related:zoo.cs.yale.edu/classes/cs457/2003/Single_Sign_On_Technologies_as_Privacy_Enhancing_Technologies.doc+research+the+subject+of+Single+Sign-On+(SSO)+technologies&sa=X&ei=p_qsS5TIOo3GrAf5-_mmAQ&ved=0CAwQHzABhttp://www.google.co.in/url?q=http://govtsecurity.com/mag/&ei=7G6_S_CHMMugkQWV4LTrBQ&sa=X&oi=breadcrumbs&resnum=8&ct=result&cd=1&ved=0CCcQ6QUoAA&usg=AFQjCNGJ6_dJm0j6unHa8nSucLgWxd3mywhttp://www.google.co.in/url?q=http://govtsecurity.com/mag/&ei=7G6_S_CHMMugkQWV4LTrBQ&sa=X&oi=breadcrumbs&resnum=8&ct=result&cd=1&ved=0CCcQ6QUoAA&usg=AFQjCNGJ6_dJm0j6unHa8nSucLgWxd3mywhttp://www.google.co.in/url?q=http://govtsecurity.com/mag/&ei=7G6_S_CHMMugkQWV4LTrBQ&sa=X&oi=breadcrumbs&resnum=8&ct=result&cd=1&ved=0CCcQ6QUoAA&usg=AFQjCNGJ6_dJm0j6unHa8nSucLgWxd3mywhttp://webcache.googleusercontent.com/search?q=cache:P7KDBtVRoOQJ:govtsecurity.com/mag/single_signon_multiple/+why+SSO+technologies+are+more+popular+in+networking+era&cd=8&hl=en&ct=clnk&gl=inhttp://www.google.co.in/search?hl=en&rlz=1G1GGLQ_ENIN259&q=related:govtsecurity.com/mag/single_signon_multiple/+why+SSO+technologies++are+more+popular+in+networking+era&sa=X&ei=7G6_S_CHMMugkQWV4LTrBQ&ved=0CCkQHzAHhttp://www.google.co.in/search?hl=en&lr=&q=related:www.mielesecurity.com/Resources/Downloads/SSO%2520WP.pdf+SSO%2520WP.pdf&sa=X&ei=8fWsS6HqOMu4rAf75PimAQ&ved=0CAcQHzAAhttp://www.google.co.in/search?hl=en&lr=&q=related:www.mielesecurity.com/Resources/Downloads/SSO%2520WP.pdf+SSO%2520WP.pdf&sa=X&ei=8fWsS6HqOMu4rAf75PimAQ&ved=0CAcQHzAAhttp://www.google.co.in/url?q=http://docs.google.com/viewer%3Fa%3Dv%26q%3Dcache:61IFgpg10XsJ:www.ecse.rpi.edu/Homepages/shivkuma/teaching/fall2001/ccn2001-slides4-6pp.pdf%2BCHEAP%2B3%2BTCP%26hl%3Den%26gl%3Din%26pid%3Dbl%26srcid%3DADGEEShIIVDnaCD1zAs7nhMnHapB7BHKSOY-7RidMdCu01VymHCzgJbgeFVqqYHxdwJis9FLcNYcZxYR2ZahDhAWhFmM9wZXOWfTiuxzsn7Ni21JZ9Hfsy4OcJ-hF7e7g-68X2VAcrKf%26sig%3DAHIEtbSQUIPYpwylnnOcqj_Ch-oM1hoBqQ&ei=YenRS7nyOom-rAfJvaWGDg&sa=X&oi=gview&resnum=10&ct=other&ved=0CCoQxQEwCQ&usg=AFQjCNFcZavFggekSpPLg2Zul1PLQbT0wghttp://scholar.google.co.in/scholar?hl=en&lr=&cites=18061313034101367895&um=1&ie=UTF-8&ei=-HueS7LwMYu8rAeX3fyNBA&sa=X&oi=science_links&resnum=1&ct=sl-citedby&ved=0CAoQzgIwAAhttp://scholar.google.co.in/scholar?hl=en&lr=&q=related:V6S-9oKspvoJ:scholar.google.com/&um=1&ie=UTF-8&ei=-HueS7LwMYu8rAeX3fyNBA&sa=X&oi=science_links&resnum=1&ct=sl-related&ved=0CAsQzwIwAAhttp://webcache.googleusercontent.com/search?q=cache:lQThtFKhNPAJ:www.faqs.org/patents/app/20090254661+DETAILED+EXPLANATION+OF+CDN+OPERATION+%2B+NETWORKING&cd=2&hl=en&ct=clnk&gl=inhttp://www.google.co.in/search?hl=en&q=related:www.faqs.org/patents/app/20090254661+DETAILED+EXPLANATION+OF+CDN+OPERATION+%2B+NETWORKING&sa=X&ei=WGTDS7aoA8uvrAf2lInHCQ&ved=0CBEQHzABhttp://www.google.co.in/url?q=http://www.geekinterview.com/talk/&ei=t7GjS5SgJ4XGrAe77OjlCA&sa=X&oi=breadcrumbs&resnum=5&ct=result&cd=1&ved=0CBIQ6QUoAA&usg=AFQjCNHIHBJCeZZZMpIKd84-1yZRNzIHOghttp://www.google.co.in/url?q=http://www.geekinterview.com/talk/networking/&ei=t7GjS5SgJ4XGrAe77OjlCA&sa=X&oi=breadcrumbs&resnum=5&ct=result&cd=2&ved=0CBMQ6QUoAQ&usg=AFQjCNFqpYq4OOqP9DdfzhftDJcYsApFswhttp://74.125.153.132/search?q=cache:Q6EwpesHDHQJ:www.geekinterview.com/talk/8572-any-major-difference-between-ftp-http.html+key+differences+between+http+and+ftp&cd=5&hl=en&ct=clnk&gl=inhttp://www.topbits.com/ftp.htmlhttp://74.125.153.132/search?q=cache:wZu7dRsPZmgJ:www.topbits.com/ftp.html+key+differences+between+http+and+ftp&cd=1&hl=en&ct=clnk&gl=inhttp://74.125.153.132/search?q=cache:4Qa3o7DaUfsJ:sawaal.ibibo.com/computers-and-technology/what-differences-between-tcp-udp-528850.html+Outline+the+principal+differences+between+the+UDP+and+TCP+transport+layer+network+services.&cd=6&hl=en&ct=clnk&gl=inhttp://74.125.153.132/search?q=cache:HszCCnktI2YJ:zoo.cs.yale.edu/classes/cs457/2003/Single_Sign_On_Technologies_as_Privacy_Enhancing_Technologies.doc+research+the+subject+of+Single+Sign-On+(SSO)+technologies&cd=2&hl=en&ct=clnk&gl=inhttp://www.google.co.in/search?hl=en&lr=&q=related:zoo.cs.yale.edu/classes/cs457/2003/Single_Sign_On_Technologies_as_Privacy_Enhancing_Technologies.doc+research+the+subject+of+Single+Sign-On+(SSO)+technologies&sa=X&ei=p_qsS5TIOo3GrAf5-_mmAQ&ved=0CAwQHzABhttp://www.google.co.in/url?q=http://govtsecurity.com/mag/&ei=7G6_S_CHMMugkQWV4LTrBQ&sa=X&oi=breadcrumbs&resnum=8&ct=result&cd=1&ved=0CCcQ6QUoAA&usg=AFQjCNGJ6_dJm0j6unHa8nSucLgWxd3mywhttp://webcache.googleusercontent.com/search?q=cache:P7KDBtVRoOQJ:govtsecurity.com/mag/single_signon_multiple/+why+SSO+technologies+are+more+popular+in+networking+era&cd=8&hl=en&ct=clnk&gl=inhttp://www.google.co.in/search?hl=en&rlz=1G1GGLQ_ENIN259&q=related:govtsecurity.com/mag/single_signon_multiple/+why+SSO+technologies++are+more+popular+in+networking+era&sa=X&ei=7G6_S_CHMMugkQWV4LTrBQ&ved=0CCkQHzAHhttp://www.google.co.in/search?hl=en&lr=&q=related:www.mielesecurity.com/Resources/Downloads/SSO%2520WP.pdf+SSO%2520WP.pdf&sa=X&ei=8fWsS6HqOMu4rAf75PimAQ&ved=0CAcQHzAA
  • 8/7/2019 CNM JUNE ROHIT 1

    22/22

    The Evolution of Password Authentication and Management: Simplifying It

    Without Having a Complicated Solution, PistolStar White Paper, January

    2005. http://www.pistolstar.com/forms/responseforms/EPAM_IP_LP.html

    The Role of Password Management in Achieving Compliance, PistolStar

    White Paper, May 2005.

    http://www.pistolstar.com/forms/responseforms/RPMC_IP_LP.html

    http://www.pistolstar.com/forms/responseforms/RPMC_IP_LP.htmlhttp://www.pistolstar.com/forms/responseforms/RPMC_IP_LP.html