• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT use in Government College, Lahore

Extracts from this document...

Introduction

NETWORKING Submitted By: Waseem Shaukat Kuram Zara Zaeem Ashraf M.Madni Submitted To: Sir. Waqas Ahmad To our parents, Who taught us how to navigate life's many roads. To Mr. Waqas Ahmad Mr. H.M Ishtiaq Rafique(Network Administrator) Mr. Muhammad Adnan (Assistant Network) GC University - An Overview After 144 Years of its wonderful history the Government College, Lahore was raised to the status of a University in 2002. It was renamed as GC University Lahore. The academic life here has been re-shaped in accordance with its new challenges and we hope to fulfill the expectations that go with a University. GCU is committed to act as promoter of quality education for all. This Institution is one of the oldest seats of learning in the Muslim world. As a seat of higher learning GC University blends grand old traditions and modern educational standards to meet the ideals set by person like philosopher Dr. Muhammad Iqbal and Noble Laureate Dr. Abdus Salam. It has redesigned the syllabi and courses to train the young minds for productive careers. The University offers B.A/B.Sc. (4-year Hon.), M.A, M.Sc. (in some selected disciplines), M.B.A., M.Phil, and PhD programmed in all major disciplines. ...read more.

Middle

So this server is used to handle the FTP account. The major objectives of FTP server are to promote sharing of files, encourage indirect or implicit use of remote computers, shield a user from variations in file storage systems among different hosts, transfer data reliably, and efficiently. FTP is a file transfer protocol for exchanging and manipulating files over a TCP computer network. An FTP client may connect to an FTP server to manipulate files on that server. The typical information needed to connect to an FTP site or using the FTP account is: The server address is the network address of the computer you wish to connect to. The username and password. These are the credentials you use to access the specific files on the computer you wish to connect. Web hosting server: For providing the free facility to their department to launch the host website at the university server the GC IT unit uses the Mac OS X Server for this purpose. But sometimes they will use the Linux OS or the Apache Web server management for this purpose. The scope of hosting services varies widely. The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) ...read more.

Conclusion

Some of the web server features they used are Authentication, optional authorization request of user name and password before allowing access to some or all kind of resources. Large file support to be able to serve files whose size is greater than 2 GB on 32 bit OS. Bandwidth throttling to limit the speed of responses in order to not saturate the network and to be able to serve more clients. Logging: usually web servers have also the capability of logging some detailed information, about client requests and server responses, to log files; this allows the webmaster to collect statistics by running log analyzers on these files. IAS server: GC IT unit use IAS server for the internet authentication service. . IAS is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server and proxy that enables centralized management of user authentication, authorization, and accounting. IAS can be used to authenticate users in databases. ISA server: In order to secure their networks from any harmful damage from hackers and crackers and also for own their system security they use the internet security accelerator server for this purpose. This provide the facility to the GC IT unit administrator to create policies for regulating usage based on user, group, application, destination, schedule, and content type criteria. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    There are too many input and output devices to be able to write notes on all of them. It is important to know about those devices stated in the syllabus and also a range of devices that will allow for sensible decisions about peripheral devices to be made for a given scenario in a question.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    Also, when I walked past the staff car park I noticed that all cars parked in there had the same badge in the windscreen, therefore it must be an access badge to park in the car park. Also, there is a kiosk with a barrier that is lowered whilst the

  1. Free essay

    Setting up and E-Commerce Site

    * Hooks up with the major on-line credit card providers easily - This is very important as the link with major credit cards will not limit the businesses potential custom. The majority of people buying online will be using a major credit card and this will make it easier for them to buy.

  2. Smart Card System

    The goals of protection are: * Prevent mischievous, intentional violation of an access restriction by a user. * Ensure that each program component active in a system uses system resources consistently with the stated policies for the uses of these resources.

  1. Unit 10 Server-side scripting of web pages part 2

    Heat Sink & Fan - A heat sink is specifically designed to reduce the temperature of an electronic device by releasing the heat into the surrounding air (case fans would then push out this hot air while pulling in cool air).

  2. File transfer protocols

    Set_Up(Songs_Table); Process_Votes(Songs_Table, Total_Votes); Menu(Songs_Table, Total_Votes); End. (* Songs *) When this module has been tested to our satisfaction, we can then move on and code the next module in turn i.e. Set_Up. Program Songs(Input, Output); Type Strings20 = Packed Array(1..20] of Char; String20 = Packed Array(1.

  1. CSA & Networking.

    In tom ,the memory locations are very few and in this number plate case is only 80.However in a new Intel Pentium computer the memory areas are huge and thus large amounts of data can be stored .The data is stored in blocks of data on the hard drive of

  2. Flexible Architectures in Communication Security Application

    Digital signatures authenticate the sender. Since only the person holding the private key knows its value, only that person can create a digital signature that others can decrypt with the public key. Figure 1. Public-Key and Secret-Key Ciphers. F(x) G(x) G(x) G(x) Public-Key Cipher Secret-Key Cipher plaintext ciphertext plaintext plaintext ciphertext plaintext public key private

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work