Configuring a Multi-Course Lab for System-Level Projects
|
|
|
- Jennifer Hart
- 10 years ago
- Views:
Transcription
1 Configuring a Multi-Course Lab for System-Level Projects Joel C Adams W David Laverell Department of Computer Science Calvin College Grand Rapids, MI {adams, lave}@calvinedu ABSTRACT Having students modify an actual operating system kernel or network protocol stack opens their eyes to what is going on beneath the hood of a computer However student modifications to a system may result in an unstable computer Because of this, giving students such experience has in the past required a lab and/or computers dedicated to the students in the system-level course, and computer science departments without such dedicated facilities have been unable to provide their students with system-level experience In this paper, we present two ways of giving students system-level experience in a nondedicated lab; one using commercial software (VMWare), and another using open-source freeware (User Mode Linux Kernel) Categories and Subject Descriptors K3 [Computers & Education]: Computer & Information Science Education Computer Science Education General Terms Management, Design, Reliability, Experimentation, Keywords Laboratories, Operating Systems, Networking, User Mode Linux Kernel, VMWare 1 INTRODUCTION Most laboratory and programming projects are intended to provide students with a concrete, hands-on experience to help them better understand abstract concept(s) In computer science courses where students are studying system-level concepts, it may be desirable to give students system-level experiences, such as requiring them to modify a real kernel in an Operating Systems course [8], the actual protocol-stack in a Computer Networking course [9], and so on Because students must have access to the system s source code, projects using a real kernel or stack are limited to laboratories that use an open-source system, such as Linux, FreeBSD, OpenBSD, etc Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee SIGCSE 05, February 23 27, 2005, St Louis, Missouri, USA Copyright 2005 ACM /05/0002$500 A student-modified system tends to be unstable until the student successfully completes their project Since it is inconsiderate to subject students from other courses to such instability, systemlevel projects have in the past required a dedicated computing laboratory, separate from other general-purpose laboratories [2][5] Because of this, computer science departments with a single laboratory have often used hardware emulators [3] that provide less authentic experiences Even at institutions with separate, dedicated laboratories for systems courses, the following issues must be addressed: 1 The instability of a student-modified system makes that system unusable by anyone else Two mechanisms for resolving this problem include: (i) assign each student their own machine and system to modify; or (ii) have multiple students share a specific machine, whose disk contains a separate, bootable partition for each student assigned to it Both of these solutions require a student to always use the same machine 2 If the number of students N exceeds the number of available machines M, then an instructor must allocate the M machines among the N students Common ways to resolve this issue include: (i) having multiple students use the same machine, or (ii) having students work in groups of size N/M (If N» M, then multiple groups may have to use the same machine) 3 If a laboratory configuration requires each student (or group) to use a specific machine for their project, then students (or groups) may have to contend with one another for that machine A common mechanism for resolving this problem is a reservation system, in which students (or groups) are required to sign up for a particular time-slot during which they will have sole access to their machine 4 If a laboratory configuration requires each student (or group) to use a specific machine for their project, then a student (or group) will be unable to work on their project while their machine is in use by another student (or group), even if other machines are open The only obvious means of resolving this problem is to not require each student (or group) to use a particular machine, but doing so creates a conflict with the solutions for issue 1 above In a nutshell, the problem is this: to limit the potential instability of student-modified systems (or the abuse of super-user privileges), students doing system-level projects have in the past been required to work on a particular machine However most departments have insufficient resources to provide each student with their own machine, making machine-sharing a necessity As a result, students lose flexibility as to when they may work This is especially inefficient if other machines are sitting idle
2 In this paper, we present a solution to all of these problems Our solution can be used in either a general-purpose lab or a dedicated lab, making it applicable at virtually any institution As such, it makes system-level projects possible at institutions where they were impractical in the past It also makes such projects easier to manage at other institutions 2 BACKGROUND The recent development of software like VMWare [10] creates new possibilities for resolving the four issues listed in Section 1 VMWare provides an x86-emulating virtual machine that allows a user to run another operating system on top of the machine s real operating system, as shown in Figure 1: Top level OS (Windows or Linux) VMWare (x86 virtual machine) Bottom level OS (Windows or Linux) Hardware (x86 actual machine) Figure 1 VMWare VMWare works by allowing a user to set up one or more virtual disks Each virtual disk can contain its own operating system, that may be the same as or different from the bottom level operating system To run VMWare, one simply specifies a virtual disk; the virtual machine then begins running and loads whatever operating system (or boot loader) it finds on that virtual disk If for some reason the top level system should lock up (eg, because of a student s modifications), the bottom level OS is safely isolated from the problem Recovery from a disaster as thus as simple as restarting VMWare the real bottom level OS need not be rebooted When it starts, VMWare loads the specified virtual disk into a RAM-disk which it treats as its boot disk When VMWare is shut down, if its RAM-disk has been modified, it asks the user if they want to (i) save the changes, (ii) discard the changes, or (iii) defer the decision Thanks to this mechanism, any changes one makes to the system remain local to the RAM-disk, until the user saves them to the virtual disk This allows a user to thoroughly test any modifications they ve made to their system before they actually alter their virtual disk In [7], Jason Nieh describes a dedicated operating systems laboratory in which each machine was equipped with VMWare ([6] describes a similar networking laboratory) While Nieh s laboratory resolved issues 1, 2, and 3, it failed to address issue 4; student-groups had to use particular machines, and if their machine was in use by another group, they were forced to wait even if other machines were vacant This paper describes our Systems Lab, a laboratory that also uses VMWare to resolve issue 1 However our laboratory uses an alternative approach to resolve issues 2 and 3, that also resolves issue 4 In addition, our approach does not require a dedicated laboratory; it can be used in either a dedicated- or a shared-lab environment 3 VMWARE + FAST ETHERNET + NFS To resolve issues 1-4, we designed a shared Systems Lab in which we could assign system-level projects in our Operating Systems and Computer Networking courses For lab machines, we purchased 25 off-lease 3-year-old PCs Each PC had a 450-MHz Pentium-II CPU, 128 MB RAM (which we upgraded to 256MB), a 9 GB hard disk, and a 10- Ethernet card For a network, we connected machines into workgroups of 3 via a 5-port 100 Mbps Ethernet switch, each of which was then connected to a central 24-port switch (for future expansion) By configuring a 25 th PC as both a firewall and an HTTP proxy server, and using it as the connection between our switch and our campus network, we were able to isolate our lab from the outside world, but still provide each PC with web-access Our Operating Systems and Computer Networking courses both meet during the same semester, and the enrollment in each is greater than the number of machines in our lab To deal with the resulting congestion, we felt it was imperative to resolve all four of the issues described in Section 1, so that each student or group could work at any open machine To resolve issue 1, we installed VMWare on each machine, and used it to run Linux on top of Linux, as shown in Figure 2: Student OS (Linux) VMWare (virtual machine) Real OS (Linux) Hardware (actual machine) Figure 2 Linux on top of Linux via VMWare For the top level OS, we prepared a 2 GB VMWare virtual disk containing a full Linux installation This virtual disk was saved in a public directory, with its permissions set to read-only To resolve issues 2, 3, and 4, we added a 26 th PC as a file server, plus a RAID array containing four 120GB disks Configured as a RAID-5 device, this array provides 360GB of usable disk space enough to give 180 students 2 GB of disk space each To provide students with home directories, we created a Linux /home partition on this RAID array, and created student home directories within /home Each lab PC was configured to mount /home via the Network File System (NFS) service, and student accounts were managed via the Network Information Service (NIS) from the file server The resulting configuration is shown in Figure 3, below With home directories in place, students were instructed to copy the read-only virtual disk from its public directory to their home directories, and were given the root password to the OS on the virtual disk (This password was different from that of the bottom level OS) Since every PC in the lab accessed their account information via NIS and mounted /home via NFS, students could now login to any PC in the lab, and then boot VMWare using their own virtual disk From any PC in the lab, they could modify their kernel, recompile its source code, save changes, and so on, without affecting anyone else s virtual disk or the bottom level OS
3 Campus Network Firewall and HTTP Proxy Server PC File (NFS) and NIS Server PC 24-port Ethernet switch 5-port switch 1 PC 1 PC 2 PC 3 RAID array (/home) 5-port switch 8 PC 22 PC 23 Figure 3 Systems Laboratory Configuration PC 24 It required some time and effort to get all of this working properly However, this approach has let us realize these benefits: 1 It resolves issue 1 by allowing students to work on systemlevel projects Students using the lab may be in the same or in different courses Different virtual disks can be created for different courses, as necessary or appropriate 2 It resolves issues 2, 3, and 4 in the same way as any other lab students may work at any open machine 3 It lets instructors assign group or individual projects as pedagogically appropriate, rather than as a work-around necessitated by limited computing resources 4 It lets students test the changes they make to their system before they save those changes to their virtual disks (or defer making the decision) 5 If students manage to irreparably mangle their virtual disks, it lets them easily start over by recopying the original read-only virtual disk from the public directory into their home directory 6 Aside from removing the student accounts, no special action is required to restage the machines, either at the end of the semester, or the next time the course is offered, saving time in the long run 7 Although we used this approach in a separate Systems Lab, there is nothing that prevents this approach from being used in a general-access lab This solution can thus be used at departments or institutions that have a single computing laboratory Because of these benefits, we believe the time spent to get this arrangement working was time well spent 4 OBSERVATIONS After having used the Systems Lab in our curriculum, we have the following observations: Students enjoyed being able to get down and dirty with the low-level system source code Many expressed amazement at the ugly spaghetti code (ie, extensive use of C s goto) they encountered in the Linux kernel Students appreciated VMWare s permitting them to test out their system modifications before committing them to their virtual disks Just two Operating Systems students (out of roughly 30) mangled their hard disks by neglecting to use this feature All these students had to do to was recopy the original read-only virtual disk from the public directory into their home directory, and they could work again Students rose to the challenge of doing system-level projects that no previous class had been assigned Having to wrestle through issues with which older students could not help created a certain esprit de corps in the course Our 100 Mbps (fast) Ethernet was fast enough to provide adequate performance VMWare could take a few seconds to start up, as it accessed a virtual disk across the network via NFS However once it was running, very little speed difference was discernable between it and the local machine If many students started VMWare simultaneously, our PC file server could bog down under the load of downloading so many virtual disks at the same time To remedy this, we have since replaced our PC file server with a dual 24GHz Xeon multiprocessor, which has solved the problem Compiling the 22 Linux kernel required about 10 minutes on our 450MHz Pentium-II CPUs This meant students could no longer use the compiler as a substitute for careful design, coding, and debugging, as some were in the habit of doing For most students, this was a new experience and a revelation It was also the biggest source of student complaints To compile the 24 kernel in a similar length of time, we have recently upgraded to 1GHz Pentium-IIIs Students from different system-level courses (Operating Systems vs Computer Networking) used the lab simultaneously without interfering with one another In the second semester, students in two different system-level courses (Computer Security vs Network Administration) used the lab without interfering with one another Though the Systems Lab is a dedicated lab, this approach could be used in any lab shared by multiple courses We are presently considering adding it to our general-access labs to provide greater flexibility in where students work 5 USE IN OTHER COURSES Our Operating Systems course used the Systems Lab for modified (updated) versions of some of the assignments found in [8] Other courses and activities using the lab include:
4 Computer Networking, which used the lab for exercises in TCP/IP socket programming, packet sniffing, protocol study, and so on This course met concurrently with our Operating Systems course during the fall semester Computer Security, which used the lab for exercises in password breaking, attack methodologies, intrusion detection, and so on VMWare also allows the creation of a virtual honeypot [1] a honeypot installed on a top level OS that completely hides the bottom level OS from an intruder, allowing the bottom level OS to surreptitiously monitor the intruder s behavior without being detected Network Administration, which used the lab for network administration exercises including configuration of network services, routers, firewalls; network analysis; and so on This course met concurrently with our Computer Security course during the spring semester Each course is an upper level elective in our curriculum 6 BUDGET Table 1 (below) presents the cost of building our lab: Table 1 Systems Lab Expenses Item Qty Unit Total Cost Cost 3-Year-Old Used PCs 26 $150 $3, MB Memory Upgrades 26 $25 $ 650 VMWare Licenses 25 $113 $2,825 VMWare Support 25 $24 $ port Fast Ethernet Switch 8 $40 $ port Fast Ethernet Switch 1 $800 $ 800 RAID Array (Promise RM8000) 1 $3415 $3,415 Total $12,510 Our original 3-year-old PCs were 450 MHz Pentium-IIs As mentioned above, we have since replaced them with (3-year-old) 1 GHz Pentium-III machines, at the cost shown in Table 1 We could have either purchased a smaller central switch (eg, 16- port), or purchased a larger central switch (eg, 32-port) and eliminated the eight 5-port switches We chose the configuration above for its flexibility and expandability Some of these prices have already decreased However these prices should provide an approximate cost for building a laboratory with capabilities similar to (or better than) ours In addition to the items in Table 1, we purchased additional networking hardware specifically for our Computer Networks, Computer Security, and Network Administration courses, including a hub and router for each work group, cable tray, patch cables, and so on Since these are not directly required to give system-level projects, we have omitted their cost here 7 USER MODE LINUX KERNEL At the risk of stating the obvious, VMWare is not inexpensive its licenses and support account for more than 27% of the expenses in Table 1, and push its total cost above $10,000 For many institutions, this extra expense may be prohibitive and prevent a budget officer from approving funds for a lab Thankfully, there is a freeware alternative to VMWare called User Mode Linux Kernel (UMLK) [4] UMLK allows a user to run a Linux kernel at the user level As such, it provides a way to give students a system-level programming experience, and since it is free, it can significantly reduce the cost of doing so (compared to VMWare) We hope to someday read a SIGCSE paper reporting on the use of UMLK in assigning system-level projects Where VMWare is an x86 hardware emulator (ie, a virtual machine) that boots from a virtual disk, UMLK is a kernel with its own file system that runs directly on top of another Linux kernel, as shown in Figure 4: process i Linux Hardware process k UMLK Linux kernel Figure 4 UMLK Structure Because of these differences, UMLK is not quite as flexible or full-featured as VMWare At present: UMLK runs only Linux on top of Linux neither the top nor the bottom level operating system can currently be any other OS This may limit its applicability at some institutions Where VMWare allows you to install any x86-based OS on your virtual disk, UMLK runs whatever Linux kernel is installed in its file system Different kernels can be run at different times in UMLK, but changing the kernel requires that the new kernel be (re)installed into the file system By contrast, switching kernels in VMWare is simply a matter of booting from a different virtual disk on which the new kernel has been installed one can easily revert to a previous kernel without having to reinstall it Where VMWare allows a user to test system modifications before committing them to their virtual disk, UMLK users must commit such modifications to their UMLK file system before testing One might argue that if students have never been spoiled by using VMWare, they will never know what they are missing However the absence of this mechanism significantly increases the cost of helping a student recover from a catastrophic mistake, since a new kernel must be reinstalled on their file system to recover from such an error UMLK thus provides a viable alternative approach for giving system-level projects in a (shared or dedicated) lab setting It may be attractive at institutions with existing laboratories running Linux, or who are willing to add a dual-boot option in a laboratory running Windows Compared to VMWare, it trades off some convenience and flexibility for expense
5 8 CONCLUSIONS The commercial product VMWare provides a robust, flexible, and convenient means of building an environment in which students can work on system-level projects By isolating the system the student is working on from the operating system running on the actual hardware, VMWare permits a student to safely modify their top level system, without danger of the bottom level system being compromised and rendered unstable VMWare also allows students to test changes they ve made to their systems before permanently committing those changes VMWare thus provides a convenient tool by which students can work on authentic systemlevel projects, either in a dedicated systems lab, or in a generalpurpose computer lab For institutions seeking a less expensive solution, the noncommercial product User Mode Linux Kernel provides a viable alternate means of providing students with an authentic systemlevel programming experience, though at the price of some features and flexibility available in VMWare For institutions where the general-purpose lab is already heavily utilized, we have demonstrated how to build a separate, dedicated Systems Lab for use in operating systems, networking, security, and other low level courses By having students access their VMWare virtual disks via NFS over a fast network from a centralized file server, a student can work on a system-level project from any open machine, and students in different low level courses can share the same laboratory with a minimal level of conflict We hope that our experience will provide a useful model for other institutions seeking to build their own facilities 9 REFERENCES [1] R Barnet, Monitoring VMWare Honeypots, potshtml [2] M Claypool, D Finkel, C Wills, An Open Source Laboratory for Operating Systems Projects, Proceedings of 6 th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), June 2001, pp [3] J Dickinson, Operating Systems Projects Built on a Simple Hardware Simulator, Proceedings of the 31 st SIGCSE Technical Symposium, March 2000, pp [4] J Dike, The User Mode Linux Kernel Home Page, [5] J Hill, C Carver, J Humphries, and U Pooch, Using an Isolated Network Laboratory to Teach Advanced Networks and Security, Proceedings of the 32 nd SIGCSE Technical Symposium, February 2001, pp [6] B Kneale, and I Box, A Virtual Learning Environment for Real-World Networking, Proceedings of the Informing Science + IT Education (InSITE) Conference, June 2003, pp [7] J Nieh and O Leonard, Examining VMWare, Dr Dobb s Journal, August 2000, pp [8] G Nutt, Kernel Projects for Linux, Addison Wesley, 2001 [9] B Richards, Teaching Network Protocols Through Debugging, Proceedings of the 31 st SIGCSE Technical Symposium, March 2000, pp [10] VMWare,
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
ClearOS Network, Gateway, Server Quick Start Guide
ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Proposal for Virtual Private Server Provisioning
Interpole Solutions 1050, Sadguru Darshan, New Prabhadevi Road, Mumbai - 400 025 Tel: 91-22-24364111, 24364112 Email : [email protected] Website: www.interpole.net Proposal for Virtual Private Server
LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011
LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall
Virtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
Using NetBooting on the Mac OS X Server for delivery of mass client deployment
23.07 Netbooting 6/2/07 1:30 PM Page 2 Using NetBooting on the Mac OS X Server for delivery of mass client deployment by Criss Myers Preface In this modern era of high technical and support costs, it is
Operating System Installation Guidelines
Operating System Installation Guidelines The following document guides you step-by-step through the process of installing the operating systems so they are properly configured for boot camp. The document
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Practical issues in DIY RAID Recovery
www.freeraidrecovery.com Practical issues in DIY RAID Recovery Based on years of technical support experience 2012 www.freeraidrecovery.com This guide is provided to supplement our ReclaiMe Free RAID Recovery
Terminal Services for InTouch 7.1/7.11. Terminal Services for InTouch 7.1/7.11 PRODUCT POSITION PRODUCT DATASHEET
Terminal Services for InTouch 7.1/7.11 PRODUCT POSITION Terminal Services for InTouch 7.1/7.11 PRODUCT DATASHEET Terminal Services for InTouch 7.1/7.11 provides manufacturing users with all the benefits
MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab
MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Keywords: Abstract: Virtual Labs, Networking Labs, open-source, web access, Xen, MLN. In this paper we describe a single-server-based
Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course
Designing and Implementing a Cyberwar Laboratory Exercise for a Computer Security Course Paul J. Wagner and Jason M. Wudi Department of Computer Science University of Wisconsin-Eau Claire Eau Claire, WI
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
ServerPronto Cloud User Guide
ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto
Using Virtual PC 7.0 for Mac with GalleryPro
Using Virtual PC 7.0 for Mac with GalleryPro Installing and Configuring What is Virtual PC for Mac? Virtual PC (VPC) is emulation software that simulates an actual (though virtual) Windows computer running
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
Check Point FireWall-1 HTTP Security Server performance tuning
PROFESSIONAL SECURITY SYSTEMS Check Point FireWall-1 HTTP Security Server performance tuning by Mariusz Stawowski CCSA/CCSE (4.1x, NG) Check Point FireWall-1 security system has been designed as a means
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab
MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Chen Avin, Michael Borokhovich, Arik Goldfeld Communication Systems Engineering Department, Ben-Gurion University of the Negev, Beer-Sheva,
How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free
Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.
Audit4 Installation Requirements
Audit4 version 8.1+ 2015 Copyright 2012 S4S Pty Ltd Audit4 Support Matrix 2015 The following table provides details on the operating system and database engine support for Audit4 as at March 2015. Operating
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.
OS Installation Guide Red Hat Linux 9.0
OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19
A Virtual Laboratory for IT Security Education
A Virtual Laboratory for IT Security Education Ji Hu, Dirk Cordel, Christoph Meinel FB IV Informatik Universitaet Trier D-54286 Trier, Germany {hu, cordel, meinel}@ti.uni-trier.de Abstract: Success of
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Before we can talk about virtualization security, we need to delineate the differences between the
1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via
Rebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
VMware vsphere 5 Quick Start Guide
VMware vsphere 5 Quick Start Guide This document is created to provide some basic information about VMware, and allow you, the customer, to determine when and how to engage us for support or other needs
Virtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
Distribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
CBE Architectural Overview and System Requirements
CBE Architectural Overview and System Requirements January 2015 ARCHITECTURAL OVERVIEW ARCHITECTURAL OVERVIEW EXAMPLE OF CBE SOFTWARE INSTALLATION The following diagram shows the users, programs in use
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
SYSTEM SETUP FOR SPE PLATFORMS
BEST PRACTICE SYSTEM SETUP FOR SPE PLATFORMS Product Snow License Manager Version 7.0 Content System requirements SQL Server configuration Maintenance Test environment Document date 2015-10-15 ABOUT THIS
Upgrade to Webtrends Analytics 8.7: Best Practices
Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
Tk20 Backup Procedure
Tk20 Backup Procedure 1 TK20 BACKUP PROCEDURE OVERVIEW 3 FEATURES AND ADVANTAGES: 3 TK20 BACKUP PROCEDURE 4 DAILY BACKUP CREATION 4 TRANSFER OF BACKUPS 5 AUDITING PROCESS 5 BACKUP REPOSITORY 5 WRITE TO
Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4
Mac OS X System Administration GUY HART-DAVIS Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Acknowledgments Introduction,
Web-Based Data Backup Solutions
"IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of
Software SIParator / Firewall
Orientation and Installation Guide for the Ingate SBC and E-SBC Software SIParator / Firewall for Virtual x86 Machines For the Ingate Software SIParators using software release 5.0.6 or later Revision
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
DESIGN OF A VIRTUAL COMPUTER LAB ENVIRONMENT FOR HANDS-ON INFORMATION SECURITY EXERCISES *
DESIGN OF A VIRTUAL COMPUTER LAB ENVIRONMENT FOR HANDS-ON INFORMATION SECURITY EXERCISES * Nathaniel Gephart, Benjamin A. Kuperman Computer Science Department Oberlin College Oberlin, OH 44074 440-775-8556
LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
Dual-boot Windows 10 alongside Windows 8
Most of the people are very much interested to install the newly launched Operating System Windows 10 on their devices. But, it is not recommended to directly use Windows 10 as the primary OS because it
TimeIPS Server. IPS256T Virtual Machine. Installation Guide
TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision
Best Practices for Optimizing Your Linux VPS and Cloud Server Infrastructure
Best Practices for Optimizing Your Linux VPS and Cloud Server Infrastructure Q1 2012 Maximizing Revenue per Server with Parallels Containers for Linux www.parallels.com Table of Contents Overview... 3
Adonis Technical Requirements
Information Sheet Adonis Technical Requirements CONTENTS Contents... 1 Adonis Project Implementation... 1 Host Installation / Onboard Installation Full replication (LARGER Vessels):... 1 Onboard installation
Imaging License Server User Guide
IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44
Ultra Thin Client TC-401 TC-402. Users s Guide
Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE
Table of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0
EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted
Zinstall HDD User Guide
Zinstall HDD User Guide Thank you for purchasing Zinstall. If you have any questions, issues or problems, please contact us: Toll-free phone: (877) 444-1588 International callers: +1-877-444-1588 Support
Timbuktu Pro for Windows, version 8
Timbuktu Pro for Windows, version 8 Release Notes, version 8.6.8 May 2010 This document contains important information about Timbuktu Pro for Windows, version 8. If you have additional questions, consult
Acronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
CSE 265: System and Network Administration. CSE 265: System and Network Administration
CSE 265: System and Network Administration MW 9:10-10:00am Packard 258 F 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Lab - Dual Boot - Vista & Windows XP
Lab - Dual Boot - Vista & Windows XP Brought to you by RMRoberts.com After completing this lab activity, you will be able to: Install and configure a dual boot Windows XP and Vista operating systems. Explain
by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran
The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst
Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud
StACC: St Andrews Cloud Computing Co laboratory A Performance Comparison of Clouds Amazon EC2 and Ubuntu Enterprise Cloud Jonathan S Ward StACC (pronounced like 'stack') is a research collaboration launched
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers
Using Red Hat Network Satellite Server to Manage Dell PowerEdge Servers Enterprise Product Group (EPG) Dell White Paper By Todd Muirhead and Peter Lillian July 2004 Contents Executive Summary... 3 Introduction...
Virtualization of Linux based computers: the Linux-VServer project
Virtualization of Linux based computers: the Linux-VServer project Benoît t des Ligneris, Ph. D. [email protected] Objectives: Objectives: 1) Present the available programs that can
CribMaster Database and Client Requirements
FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express SQL 2008 R2 Express Restrictions 1 CPU 1 GB Ram Use Limit 10 GB Database Size High Availability Options None (No Database Mirroring,
Microsoft Exchange Server 2003 Deployment Considerations
Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers
Novell Open Workgroup Suite
Novell Open Workgroup Suite Small Business Edition QUICK START GUIDE September 2007 v1.5 Page 1 Introduction This Quick Start explains how to install the Novell Open Workgroup Suite software on a server.
Expert Reference Series of White Papers. Visions of My Datacenter Virtualized
Expert Reference Series of White Papers Visions of My Datacenter Virtualized 1-800-COURSES www.globalknowledge.com Visions of My Datacenter Virtualized John A. Davis, VMware Certified Instructor (VCI),
VMware Data Recovery. Administrator's Guide EN-000193-00
Administrator's Guide EN-000193-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product
User Manual. Copyright Rogev LTD
User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's
CSE 265: System and Network Administration. CSE 265: System and Network Administration
CSE 265: System and Network Administration WF 9:10-10:00am Packard 258 M 9:10-11:00am Packard 112 http://www.cse.lehigh.edu/~brian/course/sysadmin/ Find syllabus, lecture notes, readings, etc. Instructor:
Best Practices for VMware ESX Server 2
Best Practices for VMware ESX Server 2 2 Summary VMware ESX Server can be deployed in many ways. In this document, we recommend specific deployment guidelines. Following these guidelines will maximize
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Bitten by The NAS Bug
Bitten by The NAS Bug A Step-By-Step Guide to Converting and Using an Old Computer as a Workgroup File S Using the NASLite Network Attached Storage S Operating System TABLE OF CONTENTS Introduction...
Course Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
...DYNAMiC INTERNET SOLUTiONS >> Reg.No. 1995/020215/23
GamCo Managed Dedicated Virtual Hosting Business growth in the number of users, application and data has left many organisations with sprawling servers, storage and supporting infrastructure crammed into
Table of Contents. Cisco Cisco VPN Client FAQ
Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known
Reborn Card NET. User s Manual
Reborn Card NET User s Manual Table of Contents Notice Before Installation:... 2 System Requirements... 3 1. First Installation... 4 2. Hardware Setup... 4 3. Express Installation... 6 4. How to setup
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science [email protected] 1 Reminders After
Cisco Prime Collaboration Deployment Troubleshooting
Cisco Prime Collaboration Deployment Troubleshooting Increase Disk Space for Migrations, page 1 General Troubleshooting Issues, page 2 Errors Seen in View Log, page 2 Lock Errors, page 6 NFS Datastores,
DPMS2 McAfee Endpoint Encryption New Installation
DPMS2 McAfee Endpoint Encryption New Installation Contents DPMS2 McAfee Endpoint Encryption New Installation... 1 1. Registering for the Application... 2 2. Downloading the Application... 6 3. Important
