Automated Online Grading for Virtual Machine-based Systems Administration Courses
|
|
|
- Charleen Harris
- 10 years ago
- Views:
Transcription
1 Automated Online Grading for Virtual Machine-based Systems Administration Courses Lewis Baumstark Dept. of Computer Science University of West Georgia Carrollton, GA (678) [email protected] Edwin Rudolph Dept. of Computer Science University of West Georgia Carrollton, GA (678) [email protected] ABSTRACT We present a system for automatically and iteratively grading student work in a Systems Administration course. This system can grade and give feedback regarding live (running) virtual machines the students have configured. It is appropriate for both face-to-face and online course offerings. Categories and Subject Descriptors K.3.1 [Computers and Education]: Computer Uses in Education Computer-managed instruction, Distance learning. K.3.2 [Computers and Education]: Computer and Information Science Education Computer science education. General Terms Design, Human Factors Keywords Online Grading; Automated Grading; Virtual Machines; Systems Administration; Networking 1. INTRODUCTION The Department of Computer Science at the University of West Georgia offers two system and network administration courses, one each at the undergraduate and graduate level. Both are intended as a blend of theory (e.g., TCP/IP protocol stacks) with hands-on lab work (e.g., configuring DNS and DHCP servers). As others, e.g., [10][8][2] have done, we have transitioned from hardware-based labs full of racks of physical routers and servers to assignments that use virtual machines (VMs) running Linux. One benefit of this approach is our students are no longer required to be physically present in a laboratory to work on their network and server-configuration assignments; instead, they can work on them at home or wherever they have an available Internet connection. This approach presented logistical problems of its own, however, particularly with respect to grading. Most of our CS courses use the Moodle courseware, which allows assignment and project work to be uploaded for the instructor to grade later. While a Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SIGCSE 13, March 6 9, 2013, Denver, Colorado, USA. Copyright 2013 ACM /13/03...$ virtual machine is nothing more than a collection of files and could theoretically be uploaded, its size (typically in the 5-10 gigabyte range for each assignment) makes that impractical in terms of both network bandwidth and server disk storage. An alternate approach is to require students to demonstrate their work in-person, but this is time-consuming. (Further, our graduate systems administration course is now 100% on-line, making inperson demonstrations impossible.) We have even had students upload screen shot pictures of their configured systems. One offering of the graduate course was taught using VMware Server. This product allows multiple virtual machines to be stored and run from a single physical server. Each VMs desktop can be accessed remotely using a web-based tool. This arrangement facilitated grading: the instructor could simply log into a student s VM directly and evaluate the quality of their running system. Unfortunately, with eleven students there were serious performance issues (note the undergraduate version of the course usually has students, so VMware Server would be even less appropriate). For both the graduate and undergraduate courses we now use VMware Workstation, which allows students to run VMs on their own computers. With this in mind (students running VMs on their own computers), we desired a grading system with the following qualities: Is modular in that new assignments can be plugged-in to the system. Can evaluate running systems. For example, test whether a student s DNS server can, in fact, properly resolve host names. Is initiated by the student when the student is working on the assignment. Can be graded remotely (e.g., from the student s residence). This means the system must work from behind the typical residential NAT-based router as well as tunnel through our campus firewall. Is asynchronous. The instructor should not have to be on-line when the work is submitted. Should provide automatic feedback. The student should receive an immediate score along with some indication of what is incorrect. Allows for an iterative learning process. Similar to iterative design-implement-test software development cycles, we want these assignments to be completed incrementally, with students working on one part, testing it, and re-working until that part is completed. After completing a step, they can move on to next part of the assignment. 477
2 Secure. To avoid cheating, each student should be authenticated and the details of their grading sessions should only be visible to the student and the instructor. 2. Related Work As an alternative to live demonstrations, [10] suggest grading virtual machine assignments by having the students submit a CD- RW disk that has a file diff between the as-assigned VM state and its as-completed state. This means less data transfer than submitting an entire VM file for grading, but it does introduce the overhead in patching a test VM on the grader side, plus the turn-in logistics. It also requires all students start with the same VM for each assignment; our approach allows students who want to experiment with different Linux distributions to do so. There are several existing approaches for automated and semiautomated grading for programming projects. APOGEE [3] is targeted at web-design projects and uses a specially-designed web client to run testing scripts against student work. Infandango [5] and Web-CAT [1] are examples of systems that accept submitted program code, compile it, and compare the output against expected results. We were initially inspired by the judging systems such as those used in ACM student programming competitions. The PCSS3 [7] and PC 2 [9] systems use a submit/receive feedback/revise cycle similar to our system; both can be configured to automatically judge submissions. 3. ONLINE GRADING SYSTEM 3.1 System Use Cases There are three main interactions with the system: 1. Student solicits feedback: The student, having completed a part (or the entirety) of an assignment, submits the work to the autograder for review. The system returns a human-readable report with a current grade for the assignment and text giving feedback on correct/incorrect items. (Note that the grade is not recorded in the course grade book at this time.) This process takes approximately one minute. 2. Instructor records grades: After an assignment is due, the instructor sifts through the records of all grading attempts, by all students, for the assignment, recording each student s highest grade over all their attempts for the assignment. 3. Student-Instructor conference: If a student needs instructor help (via , instant messaging, face-toface, etc.) beyond the automated feedback for an assignment, the instructor can look at records of that student s previous attempts as a guide to the student s current issues with the assignment. (We have also used this information to aid other tasks such as debugging assignment scripts and network-connection issues.) 3.2 Running Example: DNS Server In the remainder of this paper we will use as an example an assignment where students configure the BIND domain name system (DNS) server. [6] The requirements are that they: Install the BIND package (along with some useful command-line tools). Make the DNS server authoritative for the assigned domain. Configure the DNS server to resolve host names in that domain. Configure the DNS server to forward lookups for hosts not in its own domain to another DNS server. Configure the VM s network settings so that it uses itself to resolve host names. The source code for this and other assignment scripts can be viewed at Shell Script Solution Our system is implemented as a set of Linux shell scripts, written in the bash [4] scripting language. The main script, grade.sh, operates as follows: a student (working on their own computer) contacts the grading server requesting it grade, in our example, the dnsserver assignment. The assignment is a separate bash shell script, which is transferred to the student s computer and executed locally. After execution of the assignment script, the results are both presented to the student and uploaded to the grading server where they are available for the instructor to view at her convenience. (The assignment script is also deleted from the student s computer once grading is complete.) We strove to make invocation of the grading script as simple as possible; for the example, a student would execute: bash grade.sh dnsserver i.e., just grade.sh followed by a parameter indicating the name of the assignment script. This arrangement provides us with modularity; all an instructor need do to create a new assignment is to write a separate, custom assignment script and save it on the server. There is no need to modify grade.sh. By executing a grading script directly on the student s VM, we are able to evaluate the entire state of the running system as a user of that system. Any program that can be run from the command line and whose output can be parsed can be used for evaluation. For example, in dnsserver, we want to find out if the student s DNS server has a name server (NS) record defined for their domain, so we execute the command: NS=$(dig ns sysadmin.cs3280 +short) This uses the dig command to query the DNS server for a name server that is authoritative for our sysadmin.cs3280 domain. If the command succeeds (Linux return status 0, available from special bash variable $?) we go on to use the value it stored in the $NS variable to perform host name resolutions using that server. If it does not succeed, the student receives an informational message describing the error. Note that there is only a small amount of network data transfer during the grading attempt: the student receives the script file (to date, the largest is 4 kilobytes) and sends back a log of the grading attempt (a few kilobytes or less, depending on the assignment). Compare this to a solution where a student would upload a 5 gigabyte VM file and then wait until an instructor can run and evaluate the system manually. 3.4 The Role of Secure Shell The grade.sh script creates a Secure Shell (ssh) tunnel between the student s PC and our grading server. This authenticates the student to the grading server. (Previously, in a one-time setup operation, the student has provided the server with a public key for authentication). It also sets up port-forwarding from the server back to the student s PC, which allows the server to transfer the assignment script (e.g., dnsserver) to the student s PC. This step may seem like overkill, but consider that, 478
3 Table 1. Results of Previous Course Offerings Assignment Description Average Grade Average Number of Attempts vminstall Get a virtual machine installed; also insures the student understands and can perform the auto-grading process static_ip Configure a static IP address, including DNS and gateway information, for a server machine dchp Configure a dynamic host configuration protocol (DHCP) server to dynamically assign IP addresses and other configuration information to a DHCP client. dnsserver Configure a domain name system (DNS) server to resolve IP addresses for a domain Configure an server message block (SMB) file server to share fileserver files across a network webserver Install and configure a webserver hosting static and dynamic content firewall Configure and write filtering rules for a firewall users-andgroups Create user accounts and privilege groups ldapserver nat mrtg typically, the system being graded is a virtual machine behind two layers of Network Address Translation (NAT): one provided by the VM software itself to define a virtual network on the host machine, the other a student s broadband router defining a private network (e.g., /24) behind the single non-private IP address given them by their Internet Service Provider (ISP). The port-forwarding hides this complexity from the grading server, which needs to treat the VM as an ssh server for purposes of running the assignment script. 3.5 Sample Results File In Figure 1 (on the last page due to its size), an anonymous student has initiated grading of dnsserver and received their results. The results are condensed for brevity and line numbers have been added. These results are copied to the grading server so the instructors can review them. Install and configure a lightweight directory access protocol (LDAP) server; populate with directory information. Configure a gateway to perform network address translation (NAT) between two private networks. Configure the MRTG software package, which uses the simple network messaging protocol (SNMP) to display system information as a web page. Unique students: 61 Total attempts: 2642 Number of course offerings: 4 (not all course offerings used every assignment.) Lines 00-01: For troubleshooting purposes, the IP address and the Ethernet adaptor in-use by the VM are reported. Lines 03-18: It is useful, again for debugging purposes, to include any relevant configuration files in the results. Shown are the contents of a BIND zone file, which contains host and name server records for a DNS zone. The instructor can review these files and advise a student on mistakes they have made. In this example, the student has erred in configuring the NS record for the domain Lines 20-21: These show successful completion of two parts of the assignment (installing the dnsutils and bind9 packages). Lines 22-46: These show errors on most of the remaining items of the assignment (setting up an authoritative name server and successfully resolving host names using proper A records). Note that the student is told what parts of the assignment that did not succeed. Line 47: Part of the assignment is to have the VM look to itself (instead of an external DNS server) to perform its own DNS lookups. The student has configured this part correctly. Line 48: The overall score for this attempt. 4. Iterative Completion of Assignments and Instructor Feedback Students are allowed to attempt these assignments as many times as they wish before the due date. On each attempt, the student sees their current score and results similar to those described in the previous section. Only the grade for the highest-scoring attempt is recorded. This gives students a feedback cycle for learning as they are not required to get it right the first time and can learn from their mistakes and correct them. As each set of results is copied to the instructor, the instructor can use them to guide students through the difficult parts. 479
4 Table 1 shows the various assignments made over the (to date) four course offerings where our online grading system has been used. The last column shows that students do make use of the iterative nature of the assignments, bringing them to grades that in most cases are in the A or B range (second-to-last column). 5. Summary and Future Work Our online grading system allows students in our systems administration courses to engage with hands-on assignments using virtual machines at home but with the benefit of immediate grading and feedback. Further, the nature of the assignments allows for iterative refinement of their assignments, providing feedback along the way. As this system is capable of remotely grading running virtual machines, it could be adapted to grade a range of student projects that require a system of running software components such as a web design project with a web server, database, and runtime platform such as Java or.net. In the future, there are several features we would like to add: Scripts to link final grades for an assignment to the student s grade book on Moodle Ability to run root-level (administrator) commands on the student s VM. Not having this ability limits some of the analysis we can perform. Perform analyses of Internet-based services as a remote client. In other words, we would not just run local commands on a student s machine, but have the ability to make TCP/IP connections to it (for example, acting as an external HTTP client to test a student s webserver configuration). 6. REFERENCES [1] Allowatt, A. and Edwards, S IDE Support for Testdriven Development and Automated Grading in Both Java and C++. Proceedings of the 2005 OOPSLA workshop on Eclipse technology (San Diego, CA. Oct. 2005). eclipse DOI= [2] Bullerw, Jr., W.I., Burd, S., and Seazzu, A.F Virtual Machines An Idea Whose Time Has Returned: Application to Network, Security, and Database Courses. Proceedings of the 37 th SIGCSE Technical Symposium on Computer Science Education (Houston, TX, USA. March 2006). SIGCSE DOI= [3] Fu, X., Peltsverger, B., Qian, K., Tao, L., and Liu, J APOGEE Automated Project Grading and Instant Feedback System for Web Based Computing. Proceedings of the 39 th SIGCSE Technical Symposium on Computer Science Education (Portland, OR, USA. March 2008). SIGCSE DOI= [4] GNU.org GNU bash Manual. Retrieved November 13, 2012 from [5] Hull, M., Powell, D., and Klein, E Infandango: Automated Grading for Student Programming. Proceedings of the 16 th Annual Conference on Innovation and Technology in Computer Science Education (Darmstadt, Germany. June 2011). ITiCSE DOI= [6] Internet Systems Consortium BIND 9 Administrator Reference Manual. Retreived November 13, 2012 from [7] Kăcer, M. and Mannová, B., PCSS3: Programming Contest Scoring System. Proceedings of Competitive Learning Institute Symposium (Banff, Alberta Canada. April 2008). [8] Laadan, O., Nieh, J., and Viennot, N Teaching Operating Systems Using Virtual Appliances and Distributed Version Control. Proceedings of the 41 st SIGCSE Technical Symposium on Computer Science Education (Milwaukee, WI, USA. March 2010). SIGCSE DOI= [9] PC 2 Project Programming Contest Control System. Retreived November 13, 2012 from [10] Volrath, A. and Jenkins, S Using Virtual Machines for Teaching System Administration. Journal of Computing Sciences in Colleges. 20, 2 (Dec. 2004),
5 00: You are using ethernet adapter eth0 01: Your IP address is : ================================================== 03:.db/.zone files 04: 05: $TTL 3D IN SOA ns.sysadmin.cs3280. admin.sysadmin.cs3280. ( 07: 08: : : : : : ); 14: sysadmin.cs3280. IN NS ns.sysadmin.cs : IN NS ns1.sysadmin.cs : 17: www IN A : ns1 IN A : ================================================== 20: dnsutils installed 21: bind9 installed 22: Found k.root-servers.net. 23: e.root-servers.net. 24: d.root-servers.net. 25: i.root-servers.net. 26: l.root-servers.net. 27: c.root-servers.net. 28: b.root-servers.net. 29: m.root-servers.net. 30: j.root-servers.net. 31: f.root-servers.net. 32: g.root-servers.net. 33: h.root-servers.net. 34: a.root-servers.net. (variable QUERYIP) via nameserver 35: Your VM is not authoritative for sysadmin.cs : Partial score: 50 37: Did not find 38: Partial score: 50 39: Did not find ftp.sysadmin.cs : Partial score: 50 41: Did not find pop3.sysadmin.cs : Partial score: 50 43: Did not find ns1.sysadmin.cs : Partial score: 50 45: Did not find smtp.sysadmin.cs : Partial score: 50 47: Your VM is set to use itself to resolve host names. 48: Final score: 65 Figure 1. Sample Grading Session Results 481
SI455 Advanced Computer Networking. Lab2: Adding DNS and Email Servers (v1.0) Due 6 Feb by start of class
SI455 Advanced Computer Networking Lab2: Adding DNS and Email Servers (v1.0) Due 6 Feb by start of class WHAT TO HAND IN: 1. Completed checklist from the last page of this document 2. 2-4 page write-up
DNS : Domain Name System
1/30 DNS : Domain Name System Surasak Sanguanpong [email protected] http://www...ac.th/~nguan Last updated: May 24, 1999 Outline 2/30 DNS basic name space name resolution process protocol configurations Why
Evaluation guide. Vyatta Quick Evaluation Guide
VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up
The role of JANET CSIRT
The role of JANET CSIRT Bradley Freeman JANET(UK) CSIRT Member UKNOF 15 21 st January 2010 [email protected] Copyright JNT Association 2009 1 What to expect Overview of how we detect and deal with
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
DNS Domain Name System
DNS Domain Name System Domain names and IP addresses People prefer to use easy-to-remember names instead of IP addresses Domain names are alphanumeric names for IP addresses e.g., neon.cs.virginia.edu,
K-Root Name Server Operations
K-Root Name Server Operations Andrei Robachevsky [email protected] 1 Outline Root Server System brief update Architecture Current locations Anycast deployment K.root-servers.net Server Major milestones Current
Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
IT- NETWORK SYSTEMS ADMINISTRATION TI - GESTION DE RÉSEAUX POST- SECONDARY NIVEAU POSTSECONDAIRE
CONTEST DESCRIPTION DESCRIPTION DE CONCOURS IT- NETWORK SYSTEMS ADMINISTRATION TI - GESTION DE RÉSEAUX POST- SECONDARY NIVEAU POSTSECONDAIRE 1. The Importance of Essential Skills for Careers in the Skilled
CS244A Review Session Routing and DNS
CS244A Review Session Routing and DNS January 18, 2008 Peter Pawlowski Slides derived from: Justin Pettit (2007) Matt Falkenhagen (2006) Yashar Ganjali (2005) Guido Appenzeller (2002) Announcements PA
SCOPE DOCUMENT. Trade Name IT- Network Systems Administration Post- Secondary DATE OF DISTRIBUTION VIA WEBSITE
SCOPE DOCUMENT Competition Year Competition location Trade Number Trade Name Level 2013 Vancouver, BC 39 IT- Network Systems Administration Post- Secondary 1. INTRODUCTION 1.1 Purpose of the Challenge
Appendix D: Configuring Firewalls and Network Address Translation
Appendix D: Configuring Firewalls and Network Address Translation The configuration information in this appendix will help the network administrator plan and configure the network architecture for Everserve.
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
Supporting Workflow in a Course Management System
Supporting Workflow in a Course Management System Chavdar Botev Hubert Chao Theodore Chao Raymond Doyle Sergey Grankin Jon Guarino Saikat Guha Pei-Chen Lee Dan Perry Christopher Re Ilya Rifkin Tingyan
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
DNS. DNS Fundamentals. Goals of this lab: Prerequisites: LXB, NET
DNS DNS Fundamentals Goals of this lab: Learn how the domain name system works Learn about tools to test and troubleshoot DNS Learn how to deploy a basic DNS service Prerequisites: LXB, NET REVISION: 2.0
DNS Resolving using nslookup
DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based
Solaris Networking Guide. Stewart Watkiss. Volume. New User To Technical Expert Solaris Bookshelf. This document is currently under construction
Volume 3 New User To Technical Expert Solaris Bookshelf Stewart Watkiss This document is currently under construction This version is to be considered a preview only Solaris Networking Guide Copyright
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
ISERink Installation Guide
ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to
Understand Troubleshooting Methodology
Understand Troubleshooting Methodology Lesson Overview In this lesson, you will learn about: Troubleshooting procedures Event Viewer Logging Resource Monitor Anticipatory Set If the workstation service
Case Study 2 SPR500 Fall 2009
Case Study 2 SPR500 Fall 2009 6 th November 2009 Due Date: 9 th December 2009 Securing Sotnec's web site using Linux Firewall technology Sotnec corporation, an Open Source Company, consists of a small
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network
Introduction p. xix Assessment Test p. xxxviii Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Components
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Configuring your network settings to use Google Public DNS
Configuring your network settings to use Google Public DNS When you use Google Public DNS, you are changing your DNS "switchboard" operator from your ISP to Google Public DNS. In most cases, the IP addresses
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
User Manual of the Pre-built Ubuntu 9 Virutal Machine
SEED Document 1 User Manual of the Pre-built Ubuntu 9 Virutal Machine Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation
DEERFIELD.COM. DNS2Go Update API. DNS2Go Update API
DEERFIELD.COM DNS2Go Update API DNS2Go Update API DEERFIELD.COM PRODUCT DOCUMENTATION DNS2Go Update API Deerfield.com 4241 Old U.S. 27 South Gaylord, MI 49686 Phone 989.732.8856 Email [email protected]
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
Course Descriptions. preparation.
Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating
How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D
Open Informatics a An Information Technology Company Visit us on the web at www.openinformatics.net Tutorial Author: Zlatan Klebic Send Feedback: [email protected] Configuring a Vyatta 4.0 release
Implementing a Microsoft Windows 2000 Network Infrastructure
Course Outline Implementing a Microsoft Windows 2000 Network Infrastructure Other Information MS2153 Days 5 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Implementing
VMware vcenter Support Assistant 5.1.1
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
Domain Name System. Overview. Domain Name System. Domain Name System
Overview Domain Name System We look first at how the Domain Name System (DNS) is implemented and the role it plays in the Internet We examine some potential DNS vulnerabilities and in particular we consider
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Configuring the BIND name server (named) Configuring the BIND resolver Constructing the name server database files
Configuring DNS BIND: UNIX Name Service Configuring the BIND name server (named) Configuring the BIND resolver Constructing the name server database files Zone: a collection of domain information contained
VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3
VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3 This document supports the version of each product listed and supports all subsequent
Remote DNS Cache Poisoning Attack Lab
SEED Labs Remote DNS Cache Poisoning Attack Lab 1 Remote DNS Cache Poisoning Attack Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following
The memoq server in a Corporate Network
The memoq server in a Corporate Network Version 3.5 LSP Guide memoq copyright 2004-2009 Kilgray Translation Technologies. All rights reserved. Contents The memoq server in a Corporate Network...1 Version
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
W H I T E P A P E R. Best Practices for Building Virtual Appliances
W H I T E P A P E R Best Practices for Building Virtual Appliances Table of Contents Objectives.................................................................................. 3 Design Principles...........................................................................
Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER
Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Introduction Many VMware customers have virtualized their ROBO (Remote Office Branch Office) offices in order to
Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)
Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS)
CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS) By Michael Olan, Richard Stockton College (last update: March 2012) Purpose At this point, all hosts should be communicating
Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG
Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments
The memoq server in a Corporate Network
The memoq server in a Corporate Network Version 3.5 LSP Guide memoq copyright 2004-2009 Kilgray Translation Technologies. All rights reserved. Contents 1 Overview...2 2 Possible Network Setups...3 3 IP
WatchGuard Training. Introduction to WatchGuard Dimension
WatchGuard Training Introduction to WatchGuard Dimension Introduction to WatchGuard Dimension What is WatchGuard Dimension? Deploy WatchGuard Dimension Configure WatchGuard Dimension Use WatchGuard Dimension
MCSE: server infrastructure Syllabus
MCSE: server infrastructure Syllabus General Information Description The Microsoft Certified Solutions Expert (MCSE): Server Infrastructure course trains you to acquire the skills needed to run a highly
MCSE. 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724
COURSE SYLLABUS MCSE Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-293) Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure
Building a Linux IPv6 DNS Server
Building a Linux IPv6 DS Server By David Gordon and Ibrahim Haddad Open Systems Lab Ericsson Research Corporate Unit This article presents a tutorial on building an IPv6 DS Linux server that provides IPv6
Cork Institute of Technology Master of Science in Computing in Education National Framework of Qualifications Level 9
Cork Institute of Technology Master of Science in Computing in Education National Framework of Qualifications Level 9 February 2005 System and Network Management (Time: 2 Hours) Answer any THREE questions
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days) Course 2277: Five days; Instructor-led Introduction This five-day, instructor-led
Scalable Secure Remote Access Solutions
Scalable Secure Remote Access Solutions Jason Dely, CISSP Principal Security Consultant [email protected] Scott Friberg Solutions Architect Cisco Systems, Inc. [email protected] Jeffrey A. Shearer,
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led Course Description Whether you are looking to learn new technology, gain Server 2008 certification, or simply improve your
Implementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
Chapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
Symphony Network Troubleshooting
Symphony Network Troubleshooting Step 1) Review the Networking 101 presentation on the CD included with the Symphony. A basic understanding of networks is essential to this procedure. Step 2) Identify
Using the AVR microcontroller based web server
1 of 7 http://tuxgraphics.org/electronics Using the AVR microcontroller based web server Abstract: There are two related articles which describe how to build the AVR web server discussed here: 1. 2. An
IT SYSTEMS ADMINISTRATOR PROGRAM
NH204-1011 Installing, Configuring & Administrating 136 Total Hours Windows Server 2012 COURSE TITLE: Installing, Configuring & Administrating Windows Server 2012 COURSE OVERVIEW: After completing this
Course Outline: Course 20410- Installing and Configuring Windows Server 2012
Course Outline: Course 20410- Installing and Configuring Windows Server 2012 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: The course is part one of a series
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
DNS: How it works. DNS: How it works (more or less ) DNS: How it Works. Technical Seminars Spring 2010 1. Paul Semple psemple@rm.
DNS: How it works Paul Semple [email protected] DNS: How it works (more or less ) Paul Semple [email protected] 1 Objectives What DNS is and why we need it DNS on Windows Server networks / Community Connect
Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC
XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC Prepared by: Peter Bats Commissioning Editor: Linda Belliveau Version: 5.0 Last Updated:
LAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
Installing, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam
1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution
Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution DG_ACC_062011.1 TABLE OF CONTENTS 1 Introduction... 3 2 Deployment Guide Overview... 3 3 Lab Setup Requirements... 3 4 Architecture
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Installing and Configuring Windows Server 2012
Course 20410 Installing and Configuring Windows Server 2012 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server 2012 Type: Course Delivery Method: Instructor-led
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
SolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
PFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3 Following are the Installation instructions of PFSense beginning at first Login to setup Load Balance and Fail over procedures for outbound Internet
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
