AC : A VIRTUALIZED NETWORK TEACHING LABORATORY
|
|
|
- Tracey Lee
- 10 years ago
- Views:
Transcription
1 AC : A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso. Frederick Kautz, University of Texas, El Paso Frederick Kautz earned a B.S. in computer science at the University of Texas at El Paso. Bivas Das, University of Texas, El Paso Bivas Das is a M.S. candidate at the University of Texas at El Paso. Luc Longpre, University of Texas, El Paso Luc Longpre is an Associate Professor of computer science at the University of Texas at El Paso. American Society for Engineering Education, 2009 Page
2 A Virtualized Network Teaching Laboratory Abstract Since for most students, learning dramatically improves with hands-on experience, a good networking lab is an asset for teaching networks. However, building such a lab is usually a challenge. It requires costly equipment and flexible configurations that are often not compatible with the campus network. In this paper, we describe how we designed a network teaching lab based on virtual machines connected on a virtual network. An instructor can create a virtual network and make it available to students. Students can configure the network and run experiments as instructed. When the task is complete, the students can submit the result of their work. Traditional networking laboratories A good network teaching laboratory is essential to support student learning in a Networks course. A traditional networking lab, in addition to the computers, requires networking equipment such as routers, switches and appropriate connections. The equipment needs to be updated regularly for the students to be able to apply the skills they learn in the lab directly in the work force. Unfortunately, traditional networking labs are a fairly scarce resource. In addition to the cost of equipment and updates, it is a challenge to design the lab to allow flexible configurations. These network configurations are often not compatible with the campus network. Class assignments may be restricted to those that can be performed using the capabilities of the lab. For institutions with limited budgets, it may be impractical to purchase all the devices necessary for each student. Equipment that students have access to are often shared with other students. Usually, students are put into teams and the team must spend time allocated time slots when the lab is available. Once a team has worked in the lab, it may be time consuming and sometimes not obvious how to reset the lab to an appropriate configuration. This effectively restricts the kind of assignments given to the students. Approaches to use virtualization Although not specifically designed for a teaching lab, an approach to simplify the management of networks was proposed by Chandra, Zeldovich, Sapuntzakis and Lam. 1 They proposed the concept of a computational kiosk architecture, called The Collective. They utilize virtual machines as the execution environment for all user workstations (henceforth generically called computational kiosks or kiosks ). Under The Collective s model, user installations are dynamically transferred to kiosks upon user login. By exploiting the computational power and the generic VMWare machine s virtual architecture provided by each kiosk, users are provided high performance. User environments become seamlessly transportable among kiosks, and the kiosks themselves become virtually stateless, and thus quickly and inexpensively replaceable. The Page
3 virtual machines and their configurations are stored at a central repository. A computer can check for updates to the virtual machine regularly. This type of virtual machine is known as a LivePC. LivePCs can also be derivatives of other LivePCs. A system that has become inoperable can be reverted back to its original state easily. A more recent approach to implement a virtual network laboratory was proposed by Loddo and Saiu. 4 They designed Marionnet, a system of virtual machines that is easy to set up and maintain. Marionnet contains a GUI that is designed to allow students to make virtual connections between virtual machines. This shifts the challenge of network configuration into a tool for teaching. This provides a very clean way to create containers running Linux. Marionnet was designed using a modified User Mode Linux. 5 However, this also limits the operating system of the guest to Linux. For networking, User Mode Linux was modified to use VDE instead of the standard kernel API calls. VDE allows for very flexible virtual distributed Ethernet networks to be created on the fly. 2 Various simple networking devices were simulated such as hubs and switches. Virtual routers are virtual machines with Quagga running on them. A graphical tool was implemented to allow simple, yet flexible reconfiguration of the virtual network. The Reconfigurable Computer and Network Lab (ReCoN) In the design of our lab, we extended the concepts proposed by the two approaches described above. Students in networking labs are able to conduct experiments on multiple networked virtual machines running commodity operating systems such as Linux and Windows. In detail (see Figure 1), a set of virtual network buses are created. Each virtual network represents a physical network between two or more nodes. Virtual machines are connected to each bus creating a network layout to be experimented on by the student. This is equivalent to connecting hosts to a hub. The virtual machines are loaded with commodity operating systems such as Windows or Linux. A virtual machine connected to two or more virtual networks with an operating system capable of routing packets can be used as a router or switch on the network. Interesting network configurations can be created using these components as building blocks. Portable USB storage devices are becoming faster and holding larger quantities of data (for our prototype, we used an eight gigabyte Corsair Flash Voyager GT). Copy-on-write (COW) images provide a mechanism for efficiently storing file systems that are very similar (see Figure 2.) We instantiate multiple virtual machines using the same base image, with any changes to each virtual machine s file system being stored to a separate file. Copy-on-write semantics can be implemented either within the virtualization system or within the host operating system s filesystem. Our implementation utilizes virtual disk-image COW facilities provided by VMWare. With this, students are free to perform experiments using most computers that support booting from a USB flash drive. Our initial implementatino used Following Monica Lam s collective model, 1 the virtual machines and their configurations were stored at a central repository which was transferrred via HTTP.. 1 Page
4 Figure 1: Virtualizing a Network Lab Figure 2: Cow File as Deltas of a Base Image LivePCs can also be derivatives of other LivePCs. All all changes stored using COW images overlayed upon the base image. Furthemore, should a student makes an error that renders a virtualized system inoperable, the system can be reverted back to its original state easily. Since our virtual machines are running commodity operating systems, we are able to utilize software commonly available to those operating systems including DNS, firewalls, and other critical network services. Students are also able to utilize software used specifically for routing packets. For example, students can use the click modular router to easily create routers with advanced functionality including packet classification, queuing, and scheduling. 3 For our prototype, we used Linux for the host. VMWare Workstation was used to create the virtual machine images. VMWare Player was used by the students to execute and interact with the virtual machines. The virtualized systems are running Linux. Windows, BSD, and Solaris could easily fit in. Moka5 was used for packaging, transferring, and managing the Virtual Machines. Moka5 also provided a nice graphical interface to switch between running virtual machines. The entire system with virtual machines were stored on a bootable USB flash drive. The students checked out the flash drive and initialized them in class. Due to the current complexity of modifying Moka5 to support multiple host-only networks, and modifying the virtual machine s configuration file, the networking lab should be pre-designed by the instructor. Combining the LivePC and the Marionnet concepts allowed us to make a unified lab creation, deployment, and student submission model that would help facilitate teaching network classes. A Page
5 LiveLab consists of both a group of LivePCs and a network configuration describing how each of these systems are interconnected. This description file is stored on the server which contains the location of each LivePC to be used and what network it is to be configured to. To save space and download time, the same LivePC can be cloned multiple times. Any changes to each LivePC will be stored in a separate file using a COW that overlays the base file system. Our tool to create the lab configuration was inspired from Marionnet s network configuration tool, manipulating LivePCs instead of Virtual Machines. The tool is also able to publish the LiveLab. When students are working on the LiveLab, the changes to that particular LiveLab are stored in its own COW separate from other assignments that may use the same lab configuration. Students publish their own changes back to a central repository. Since each lab is kept separately, students can easily switch forward and back between each assignment. A syndication technique such as RSS or atom can be used to identify when new labs become available. The student s client should provide a mechanism to perform and submit multiple assignments using the same LiveLab or derivates of previous labs. Using a repository with access control lists (ACLs), the type of submission to the repository can be determined without modifying the LiveLab itself. Both students and instructor can post the lab to a central repository. The instructor s account allows a lab to be published to a class. Since our entire student lab configurations are stored within USB flash drives, once the assignment is complete, students hand the drives in along with appropriate instructions. Instructors grade the lab by booting each student s virtual networked environment and examining its configuration. This setup gives us a flexible laboratory that can be used to instruct students while minimizing cost and risks posed by these labs. Example of networking lab assignments The following is a set of labs that were built for our networking course. Since the LiveLab has not been implemented yet, we worked around this problem by populating a network of 5 systems with 2 networks. 1. This lab is an introduction to what a network is. It consists of connecting two virtual machines as seen in Figure 3. The student configures both computers so that they are capable of pinging each other. 2. Using the network built in lab 1, set up an http server and using a client to connect to it. If the networking lab includes a focus on programming network applications, this would be a good opportunity to write a very simple HTTP client. 3. The network in lab 1 is extended to include a second network and a third virtual machine that is part of both networks. See Figure 4. No routing is done between each network yet. Page
6 Figure 3: Two Node Lab Figure 4: Trivial Routing Lab 4. Static routing is added to the network built in lab 3. If node 2 is a linux system, iptables can be used. 5. Add one computer to each of the two networks. This is shown in Figure 5. Set up simple networking services such as DNS. Figure 5: 5 System, 2 Network, and Network Address Translation 6. Make a query from node 3 to node 1. Capture the packets at node 2 on the virtual network containing node 2 and 3. Manually parse the packets to determine the contents of the packets. See Figure 6. Figure 6: Example Packet Capture Location Page
7 For an advanced routing lab, students are able to implement routers using the click modular router. Using click, students are able to implement and test complex labs designed to teach them how routers work with a minimal amount of equipment and physical setup. Click itself can also be extended to include additional functionality such as routing protocols. A research lab with enough computers can be used as a virtual cluster to experiment with both new routing protocols and peer to peer systems. For example, a lab with 20 physical systems each running 5 virtual machines would contain 100 independent virtual network nodes. Further developments and directions We have ported our virtual machines environment from VMWare to qemu running upon Ubuntu. Each client and router are a virtual PC running an Ubuntu Server 8.10 Linux distribution with a kernel optimized for virtualization. Virtualization is provided by the qemu cpu emulator. More details and configuration instructions are posted at the web site Bibliography [1] R. Chandra, N. Zeldovich, C. Sapuntzakis, and M. Lam. The Collective: A Cache-Based System Management Architecture. In Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 05), [2] R. Davoli. VDE: Virtual distributed ethernet. Testbeds and Research Infrastructures for the Development of Networks and Communities, International Conference on, 0: , [3] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. Kaashoek. The click modular router. ACM Transactions on Computer Systems (TOCS), 18(3): , [4] J. Loddo and L. Saiu. Status report: Marionnet How to implement a virtual network laboratory in six months and be happy. In Proceedings of the ACM SIGPLAN Workshop on ML, pages ACM Press New York, NY, USA, [5] J. Loddo and L. Saiu. Marionnet: a virtual network laboratory and simulation tool. In SimulationWorks, Page
Virtualization For Network Testing & Staff Training
Virtualization For Network Testing & Staff Training Virtualization Technologies They are everywhere By abstracting functionality away from hardware we gain Improved capacity usage Lower power consumption
NETWORK EMULATION AND NETKIT
NETWORK EMULATION AND NETKIT Gestão e Segurança de Redes / Gestão de Redes e Serviços LERC / MEIC- T 2013/14 Artur M. Arsénio & Miguel P. Correia CLASS OBJECTIVES To understand what is meant by network
estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT
estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT Objectives To become familiar with wireless mesh networks and show set up a wireless mesh network test bed using the DD WRT firmware. We
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration
H0/H2/H4 -ECOM100 DHCP & HTML 6 H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML 6-2 H0/H2/H4 -ECOM100 DHCP DHCP Issues The H0/H2/H4--ECOM100 is configured at the factory
FROM A "WINDOWS" PERSPECTIVE
VIRTUAL NETWORKING WITH "Oracle VM VirtualBox" FROM A "WINDOWS" PERSPECTIVE Summary: "VMware Player" provides five virtual networking configurations for the virtual machines of a Windows host computer:
Knut Omang Ifi/Oracle 19 Oct, 2015
Software and hardware support for Network Virtualization Knut Omang Ifi/Oracle 19 Oct, 2015 Motivation Goal: Introduction to challenges in providing fast networking to virtual machines Prerequisites: What
Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM
Bern University of Applied Sciences Engineering and Information Technology Module I-7410 Advanced Linux FS-11 Part1: Virtualization with KVM By Franz Meyer Version 1.0 February 2011 Virtualization Architecture
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
Load Balancing ContentKeeper With RadWare
Load Balancing ContentKeeper With RadWare The RadWare Fireproof may be used with ContentKeeper to provide load balanced and redundant Internet content filtering for your network. The RadWare FireProof
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Migrating to ESXi: How To
ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,
VMware vsphere 5 Quick Start Guide
VMware vsphere 5 Quick Start Guide This document is created to provide some basic information about VMware, and allow you, the customer, to determine when and how to engage us for support or other needs
Automated Flashing and Testing for Continuous Integration
Automated Flashing and Testing for Continuous Integration Igor Stoppa Embedded Linux Conference North America 2015 1 Automated Flasher Tester AFT Tool for deploying and verifying a SW image on an appropriate
How To Pass The Information And Network Security Certificate
Information Technology Information and Network Security Certificate Program Information and Network Security Certificate Program The Information and Network Security Certificate Program helps industry
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
Lab assignment #1 Firewall operation and Access Control Lists
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab GSA: Carlos Caicedo Document version: 1.0 / 2008 I. Lab resources for this assignment Lab assignment #1 Firewall
DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS *
DESIGN OF NETWORK SECURITY PROJECTS USING HONEYPOTS * Karthik Sadasivam, Banuprasad Samudrala, T. Andrew Yang University of Houston Clear Lake 2700 Bay Area Blvd., Houston, TX 77058 (281) 283-3835, [email protected]
CS312 Solutions #6. March 13, 2015
CS312 Solutions #6 March 13, 2015 Solutions 1. (1pt) Define in detail what a load balancer is and what problem it s trying to solve. Give at least two examples of where using a load balancer might be useful,
Khóa học dành cho các kỹ sư hệ thống, quản trị hệ thống, kỹ sư vận hành cho các hệ thống ảo hóa ESXi, ESX và vcenter Server
1. Mục tiêu khóa học. Khóa học sẽ tập trung vào việc cài đặt, cấu hình và quản trị VMware vsphere 5.1. Khóa học xây dựng trên nền VMware ESXi 5.1 và VMware vcenter Server 5.1. 2. Đối tượng. Khóa học dành
A Comparison on Current Distributed File Systems for Beowulf Clusters
A Comparison on Current Distributed File Systems for Beowulf Clusters Rafael Bohrer Ávila 1 Philippe Olivier Alexandre Navaux 2 Yves Denneulin 3 Abstract This paper presents a comparison on current file
Basic Firewall Lab. Lab Objectives. Configuration
Basic Firewall Lab Firewalls are devices that filter traffic. Typically they are placed at boundaries between secure and less secure systems or networks. When traffic enters a firewall the firewall compares
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
CDH installation & Application Test Report
CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: [email protected]) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses.
Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses. Veeramani Shanmugam [email protected] Lenin Gopal [email protected] Zeya
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration
ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there
by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran
The Linux Router The performance of the Linux router makes it an attractive alternative when concerned with economizing. by Kaleem Anwar, Muhammad Amir, Ahmad Saeed and Muhammad Imran Routers are amongst
Wave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
Configuring Cisco Nexus 5000 Switches Course DCNX5K v2.1; 5 Days, Instructor-led
Configuring Cisco Nexus 5000 Switches Course DCNX5K v2.1; 5 Days, Instructor-led Course Description Configuring Cisco Nexus 5000 Switches (DCNX5K) v2.1 is a 5-day ILT training program that is designed
Open-Source Software Toolkit for Network Simulation and Modeling
Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] Abstract This paper summarizes
TimeIPS Server. IPS256T Virtual Machine. Installation Guide
TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision
Enabling Remote Access to Computer Networking Laboratories for Distance Education
Enabling Remote Access to Computer Networking Laboratories for Distance Education Carlos E. Caicedo Bastidas Syracuse University, [email protected] Abstract - Academic organizations that provide students
VMware vsphere: Install, Configure, Manage [V5.0]
VMware vsphere: Install, Configure, Manage [V5.0] Gain hands-on experience using VMware ESXi 5.0 and vcenter Server 5.0. In this hands-on, VMware -authorized course based on ESXi 5.0 and vcenter Server
Virtualization. Types of Interfaces
Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform diversity
Springpath Data Platform with Cisco UCS Servers
Springpath Data Platform with Cisco UCS Servers Reference Architecture March 2015 SPRINGPATH DATA PLATFORM WITH CISCO UCS SERVERS Reference Architecture 1.0 Introduction to Springpath Data Platform 1 2.0
Savvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
Configuring a Multi-Course Lab for System-Level Projects
Configuring a Multi-Course Lab for System-Level Projects Joel C Adams W David Laverell Department of Computer Science Calvin College Grand Rapids, MI 49546 1-616-526-8562 {adams, lave}@calvinedu ABSTRACT
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Using PCoIP Zero Clients with PCoIP Host Cards
Using PCoIP Zero Clients with PCoIP Host Cards T E C H N I C A L N O T E S Table of Contents Preface..................................................................... 3 Additional Support.........................................................
Setup Cisco Call Manager on VMware
created by: Rainer Bemsel Version 1.0 Dated: July/09/2011 The purpose of this document is to provide the necessary steps to setup a Cisco Call Manager to run on VMware. I ve been researching for a while
A COMPARISON BETWEEN "ORACLE VM VIRTUALBOX" AND "VMWARE PLAYER" FROM A "LINUX" PERSPECTIVE
A COMPARISON BETWEEN "ORACLE VM VIRTUALBOX" AND "VMWARE PLAYER" FROM A "LINUX" PERSPECTIVE SUMMARY: BASIC COMPARISON VIRTUAL HARD DRIVE ADAPTER DIFFERENCES VIRTUAL NETWORKING DIFFERENCES BASIC COMPARISON
Comtrend 1 Port Router Installation Guide CT-5072T
Comtrend 1 Port Router Installation Guide CT-5072T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide
WIRELESS TRAINING SOLUTIONS. by vlogic, Inc. L a b 0.3 Remote Access Labs
WIRELESS TRAINING SOLUTIONS by vlogic, Inc L a b 0.3 Remote Access Labs WIRELESS TRAINING SOLUTIONS Hands-on Workshop and Lab Guide Table of Contents Connecting to the Wireless Training Solutions Network
Intro to Virtualization
Cloud@Ceid Seminars Intro to Virtualization Christos Alexakos Computer Engineer, MSc, PhD C. Sysadmin at Pattern Recognition Lab 1 st Seminar 19/3/2014 Contents What is virtualization How it works Hypervisor
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Technical Brief Networking Division (ND) August 2013 Revision 1.0 LEGAL INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
UTILIZATION OF VIRTUAL MACHINES IN LABORATORY STANDS ON EXAMPLE OF SIP EXPRESS ROUTER APPLICATION
2007 Poznańskie Warsztaty Telekomunikacyjne Poznań 6-7 grudnia 2007 POZNAN POZNAN UNIVERSITY UNIVERSITYOF OF TECHNOLOGY ACADEMIC ACADEMIC JOURNALS JOURNALS No 54 Electrical Engineering 2007 Bartosz PAWŁOWICZ*
Cloud3DView: Gamifying Data Center Management
Cloud3DView: Gamifying Data Center Management Yonggang Wen Assistant Professor School of Computer Engineering Nanyang Technological University [email protected] November 26, 2013 School of Computer Engineering
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
VM-Series Firewall Deployment Tech Note PAN-OS 5.0
VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5
A Heterogeneous Internetworking Model with Enhanced Management and Security Functions
Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how
Implementation of College Network Scenario Module by Using CCNA
Implementation of College Network Scenario Module by Using CCNA Jitender Singh 1, Anshu Rani 2 1 Scholar, Computer Science & Engineering, RPSGOI Mohindergarh, India 2 Scholar, Computer Science & Engineering,
MIKROTIK NETWORK SIMULATOR
MIKROTIK NETWORK SIMULATOR PRESENTED BY ROFIQ FAUZI MUM Nov 2013 - Indonesia ABOUT ROFIQ FAUZI 2 Using MikroTik (v.2.97) since 2005, as Network Engineer at WISP. 2007, Network & Wireless Engineer at INDOSAT
Land Information New Zealand (LINZ) SALT Database. Migration from original hardware to virtualised hardware: Process Documentation
Land Information New Zealand (LINZ) SALT Database Migration from original hardware to virtualised hardware: Process Documentation Contents Migration from original hardware to virtualised hardware: Process
Beyond VDI: Why Thin-Client Computing and Virtual Desktop Infrastructures Aren t Cutting it
Beyond VDI: Why Thin-Client Computing and Virtual Desktop Infrastructures Aren t Cutting it Dr. Monica Lam Co-founder and Chief Scientist, MokaFive Inc. Professor of Computer Science, Stanford University
Debugging Network Communications. 1 Check the Network Cabling
Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps
CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
VIRTUAL NETWORKING WITH "VMware Player" Summary:
VIRTUAL NETWORKING WITH "VMware Player" Summary: "VMware Player" provides five virtual networking configurations for the virtual machines of a Windows or Linux host computer: 1. a "Shared Folders" gateway/router:
Virtualization and Other Tricks.
Virtualization and Other Tricks. Pavel Parízek, Tomáš Kalibera, Peter Libič DEPARTMENT OF DISTRIBUTED AND DEPENDABLE SYSTEMS http://d3s.mff.cuni.cz CHARLES UNIVERSITY PRAGUE Faculty of Mathematics and
Sun xvm VirtualBox Product Overview
Sun xvm VirtualBox Product Overview Orgad Kimchi ISV-E Engineering Sun Microsystems, Inc. 1 Agenda Background Product Overview Key Features 2 Background In January 2007, innotek went GNU public with the
Installing & Using KVM with Virtual Machine Manager COSC 495
Installing & Using KVM with Virtual Machine Manager COSC 495 1 Abstract:. There are many different hypervisors and virtualization software available for use. One commonly use hypervisor in the Linux system
Using NetBooting on the Mac OS X Server for delivery of mass client deployment
23.07 Netbooting 6/2/07 1:30 PM Page 2 Using NetBooting on the Mac OS X Server for delivery of mass client deployment by Criss Myers Preface In this modern era of high technical and support costs, it is
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the
RHCSA 7RHCE Red Haf Linux Certification Practice
RHCSA 7RHCE Red Haf Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) "IcGraw-Hill is an independent entity from Red Hat, Inc., and is not affiliated with Red Hat, Inc. in
Planning for Information Network
Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making
Approaches to the Design of Computer Networking Laboratories
Approaches to the Design of Computer Networking Laboratories Sam Disston Syracuse University School of Information Studies [email protected] Carlos E. Caicedo Assistant Professor Syracuse University School
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
LSKA 2010 Survey Report I Device Drivers & Cloud Computing
LSKA 2010 Survey Report I Device Drivers & Cloud Computing Yu Huang and Hao-Chung Yang {r98922015, r98944016}@csie.ntu.edu.tw Department of Computer Science and Information Engineering March 31, 2010 Abstract
VMware vsphere 5.0 Evaluation Guide
VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....
ISERink Installation Guide
ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to
Table of Contents. Server Virtualization Peer Review 01-03-2007 cameron 1-24-2007: modified, cameron
Table of Contents Objective...2 Definitions...2 Objective discussion...2 Comparison criteria...3 Criteria weights...4 Product scores...4 Criteria comparison discussion...5 References...7 Cost Estimate,
How To Install Linux Titan
Linux Titan Distribution Presented By: Adham Helal Amgad Madkour Ayman El Sayed Emad Zakaria What Is a Linux Distribution? What is a Linux Distribution? The distribution contains groups of packages and
VMware vsphere: Fast Track [V5.0]
VMware vsphere: Fast Track [V5.0] Experience the ultimate in vsphere 5 skills-building and VCP exam-preparation training. In this intensive, extended-hours course, you will focus on installing, configuring,
Network Virtualization
Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services
LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
Plug-and-play Virtual Appliance Clusters Running Hadoop. Dr. Renato Figueiredo ACIS Lab - University of Florida
Plug-and-play Virtual Appliance Clusters Running Hadoop Dr. Renato Figueiredo ACIS Lab - University of Florida Advanced Computing and Information Systems laboratory Introduction You have so far learned
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Towards a virtualized Internet for computer networking assignments
Towards a virtualized Internet for computer networking assignments Luis Bellido, David Fernández, Encama Pastor Abstract By combining virtualization technologies, virtual private network techniques and
Best Practices for VMware ESX Server 2
Best Practices for VMware ESX Server 2 2 Summary VMware ESX Server can be deployed in many ways. In this document, we recommend specific deployment guidelines. Following these guidelines will maximize
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3
Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)
Network Setup Guide 1 Glossary 1.1 Static IP Computers are communicated and recognized by their own unique IP addresses over the Internet. Static IP provided by your ISP (Internet Service Provider) means
Xperience of Programmable Network with OpenFlow
International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 2013 Xperience of Programmable Network with OpenFlow Hasnat Ahmed, Irshad, Muhammad Asif Razzaq, and Adeel Baig each one is
Acronis Backup & Recovery 10 Workstation. Installation Guide
Acronis Backup & Recovery 10 Workstation Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for Windows...
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller
OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash [email protected], [email protected],
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5
Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.
