Enabling Remote Access to Computer Networking Laboratories for Distance Education

Size: px
Start display at page:

Download "Enabling Remote Access to Computer Networking Laboratories for Distance Education"

Transcription

1 Enabling Remote Access to Computer Networking Laboratories for Distance Education Carlos E. Caicedo Bastidas Syracuse University, Abstract - Academic organizations that provide students with the facilities for experimenting and learning basic and advanced concepts in networking rely on computer networking laboratories. These facilities can be implemented in many ways with varying degrees of cost, management complexity and capabilities. The benefits of these facilities can be extended by enabling remote access to them for distance education purposes. Providing remote access capabilities to these facilities with the objective of offering the learning experience of a computer networking laboratory to distance education students of Information and Communication Technology (ICT) programs is a challenging task. This paper provides a description and a comparative analysis of the implementation of three different computer network laboratory setups for which remote access was enabled and discusses lessons learned and good practices for similar setups. Index Terms Distance education, experiment based learning, laboratory design, laboratory management. INTRODUCTION Computer networking laboratories are a key resource for academic organizations that seek to provide their students with facilities for learning basic and advanced concepts in networking [1, 2]. Providing remote access to a computer networking laboratory for the purpose of extending its educational value to distance education students is a challenging task. Three different laboratory setups are presented in this paper in order to evaluate the infrastructure, management and acceptance characteristics of different laboratory configurations enabled with remote access. These configurations were deployed as part of an initiative to extend laboratory-based activities to distance students enrolled in one of the computer networking courses of an ICT program - the Telecommunications and Network Management program - of Syracuse University (SU). This paper provides a comparison among the different setups that were deployed mentioning their advantages and disadvantages from a pedagogical, cost and management perspective. It also discusses the lessons learned and difficulties found in the deployment of the different network laboratory configurations We hope our methodology and experience in designing and improving the implementation of remotely accessible computer networking laboratory facilities can help other instructors and institutions in their own efforts to offer effective and manageable laboratory experiences to distance education students. COMPUTER NETWORK LABORATORY DESIGN Computer network laboratories can be implemented in many ways. They can rely on a simulation environment, or on virtualized or physical infrastructures [1, 6-11]. Simulationbased laboratories rely on software that simulates the behaviors of network elements. This approach is typically used when the experiments to be performed are too expensive or difficult to be undertaken with real equipment or when remote access to real physical devices is too costly or inconvenient. The size of the simulated network depends on the computational power and time allocated to its analysis. A problem with this type of design is that the results of the simulation are only as good as the code written into the software and therefore there is a risk of not getting realistic or accurate results from the simulations. Virtualized infrastructures make use of the instantiation of several virtual machine (VM) configurations inside each one of the (physical) server systems of a laboratory. Each of the VMs can be configured to act as a server, client or routing device within a network formed by grouping and interconnecting different VMs. The use of VMs also enables a laboratory administrator to easily restore the laboratory s configuration to a default state by reloading the necessary VMs when required [3]. Laboratories based on a physical infrastructure configuration primarily make use of real physical networking devices for the setup of experiments. The devices can be deployed in either a centralized or distributed topology [1]. These laboratories provide many advantages including access to real network interfaces and results and interactions that mimic those found in real world environments. However, laboratories following this approach are more expensive to implement and can become difficult to manage if not planned correctly. In general, laboratory based distance education is difficult to offer since the laboratory s devices must be made accessible to distance students in such a way that they are able to have a learning experience that is equal or very F3C-1

2 comparable to the one obtained by in-situ (campus-based) students. The satisfaction of this requirement relies on providing adequate remote access to the laboratory and on having a laboratory setup that offers enough connectivity and management flexibility to deliver similar learning experiences to distance and in-situ students. REMOTE ACCESS & LABORATORY CONFIGURATIONS In order to evaluate the benefits and drawbacks of different laboratory configurations for distance education, the following setups were deployed for and tested by distance education students of an intermediate level computer networking course taught by the author: i. Remote access to the devices of SU s networking laboratory facility. This facility previously used for campus-only computer networking courses was upgraded to support remote access and monitoring. ii. Remote access to a Cisco based NETLAB system. This system although well organized is vendor-specific and deploying non-cisco defined configurations proved challenging. iii. Software based simulation of computer networking devices through the use of Cisco s Packet Tracer software. The machines which had the software were accessed remotely by students. Each of these configurations is described in the following sub-sections. I. Remote access to a physical lab infrastructure When working with physical devices in a campus-based computer networking laboratory, students get to manipulate the connectivity between different network ports and the configuration of the various networking devices in the laboratory (routers and switches) via their management interfaces. In a remote access configuration, these same capabilities should be provided to students. Figure 1 illustrates the remote access setup employed at SU to give access to distance students to a physical lab infrastructure. Devices in the laboratory are grouped in department units and typically, a team of two students gets assigned a specific department. Each department consists of one router, a switch, a patch panel and two servers. The servers have enough capacity to host several virtual machines which can act as the nodes of a network. All ports of the devices in a department can be interconnected via a patch panel and all departments can be interconnected through additional patch panels set for that purpose. The current laboratory infrastructure has 14 departments in total providing remote access capabilities for several students at the same time. To provide flexible and remote access to the management interfaces of the laboratory s devices so that students can configure them from a command line level, we use a Serial Link Concentrator (SLC). The SLC is a commercial device that handles many serial interfaces to which all the RS-232 management ports of the network devices are connected. Through the SLC any device in the laboratory can be configured without having the student move extra cables and/or configuring a management connection to a device through other means (i.e. fixing a data port and allocating an IP address to it). To efficiently configure and manage the virtual machines (VMs) in each of the servers of a department, the servers have been pre-configured with a hypervisor (VMware ESX). Additionally, a VMware vsphere server allows centralized management and monitoring of all virtual machines deployed in the servers of the laboratory. FIGURE 1. REMOTE ACCESS TO A PHYSICAL LAB INFRASTRUCTURE F3C-2

3 Distance education students using the laboratory log into the VMware vsphere server which offers enough capabilities to the students to activate, shutdown or restart any VM or group of VMs depending on the requirements of a lab exercise. For ease of use and manageability most students after activating their VMs log into the SLC through a secure shell terminal session from a VM and manage their department s devices through that session. A current drawback of the setup is that the student s flexibility to enable connections across several device ports is limited. Laboratory assignments are scheduled to be completed during a two-week interval and the lab administrators have to pre-configure the correct sets of patch-panel connections in each department s patch panel so that distance education students can perform their lab assignments. Currently, students can only control connectivity on a port by enabling or disabling the selected port. Ongoing enhancements to the laboratory will increase the capabilities for remote inter-connection management across device ports reducing the burden on administrators. II. Remote access to a NETLAB infrastructure NETLAB is a line of products of NDG - Network Development Group for distance based or blended (distance and in-site) education on computer networking [4]. Depending on its configuration, a NETLAB system setup will contain several routers and switch devices along with servers to host virtual machines. The devices are grouped in equipment pods depending on the requirements of a particular lab exercise. Figure 2 shows the remotely accessible NETLAB system setup used in our lab. As a commercially developed product NETLAB offers the software and hardware interfaces to provide remote access to the equipment pods, schedule their use by students and manage/restore the configuration of devices. These capabilities reduce most of the management burden on laboratory administrators except for the tasks involved in setting up a pod configuration to match a specific assignment requirement. However, the integrated scheduling and remote access capabilities of the system make it a very attractive system to offer learning experiences on computer networking to distance education students. III. Remote access to a network simulation infrastructure Simulation based networking laboratories are a great option for institutions that have limited funds, and insufficient infrastructure to support physical hardware. Remote desktop access can be used to provide the students access to the computer systems in the laboratory facility that contain the simulation software [5, 6]. In our setup, we used Cisco s Packet Tracer application which can provide very realistic device emulation features although it is vendorcentric and has restrictions related to licensing and emulation of advanced device features. Figure 3 shows the configuration we used to enable remote access to a simulation-based network laboratory. A pool of servers was setup and managed via VMware vsphere so that when students logged in to the lab, they could create a windows XP virtual machine (VM) on any available server. The VM had the Packet Tracer software installed in it and students could make use of it via a remote desktop session. FIGURE 3. REMOTE ACCESS TO A NETWORK SIMULATION INFRASTRUCTURE FIGURE 2. REMOTE ACCESS TO A NETLAB INFRASTRUCTURE COMPARISON AND ANALYSIS OF CONFIGURATIONS Each of the networking lab configurations mentioned previously will be compared and analyzed based on the following criteria: infrastructure cost, flexibility, complexity, pedagogy, and student likeability. Infrastructure cost: From the three remote laboratory configurations studied, the one with the highest implementation cost was the laboratory supported on physical devices. Equipment, space and energy costs must F3C-3

4 be considered for this setup along with the costs of management, devices and software. Management costs are usually lower in the case of a NETLAB setup but the costs of the equipment rack and of the devices for each pod have to be considered. The simulation based setup has the lowest cost of all as long as the per-license cost of software is low. For all configurations the cost of the communication equipment and links to provide remote access is almost the same but due to the heavy reliance on remote desktop sessions for all configurations, the capacity of the links to the laboratory have to be dimensioned properly based on the number of students that will simultaneously access the laboratory. Students accessing the laboratory also incur a cost in the sense that they must have a capable computing system and a data connection that can adequately support the remote interactions with the laboratory (remote desktop sessions). In terms of data connection speed, students with data connections with speeds higher than 256 Kbps (downlink) reported good average response times. Flexibility: The degree of flexibility to configure experiments varies across the different setups tested. The physical lab infrastructure offers the highest degree of flexibility but it is limited by the number of devices available in the laboratory and management tools available to laboratory administrators for configuring experiments. The NETLAB setup is easier to manage but limits the configuration of experiments to those that closely follow pre-determined configurations. Although a more diverse set of experiments can be provided by lab administrators via the development of fully customized pods, their development proved to be complex but it could be improved with additional training on the product. For the case of simulation based environments, the range of laboratory experiments that can be setup is limited by the capabilities of the software and the computer system over which it executes. Complexity: The complexity to setup laboratory experiments for students in the physical lab infrastructure is higher than that required in the other setups. Most of the complexity is determined by the device and connection management capabilities of the laboratory. The NETLAB setup offers tools to easily configure experiments (under the flexibility restrictions mentioned previously). Configuring new experiments in the simulation based setup only required defining new elements for each experiment via a GUI. Pedagogy: Teaching activities for each lab setup should focus on the strengths offered by each configuration. Simulation-based environments are good for introducing students to new concepts and to analyze large network scenarios that would be cost-prohibitive to implement with real equipment in an academic institution. Physical and Netlab based laboratories provide a more realistic experience than simulation-based experiments and allow students to interact with the advanced features of network devices that are not available in simulation software. These laboratories also allow for the analysis of real traffic flows (packet captures) that provide students with detailed understanding of protocol behavior. The flexibility and complexity characteristics of each laboratory setup affect some of its pedagogical aspects and the way students interact with it. For example, if a student makes a mistake while performing a lab exercise in a physical lab setup, it can be difficult and time consuming for him/her to return a device to a previous or neutral state unless the student has taken precautions to do so. In contrast, simulation environments usually provide an easy to use interface to instantiate a new device quickly without waiting for it to reboot or stabilize. Netlab devices can be restarted just like in a physical lab setup but the system keeps track of the history of commands issued by a student which makes it easy for him/her to determine when and how a mistake was made and/or discuss his procedures with an instructor who can then provide more accurate feedback. Likeability by students: A total of 22 distance education students made use of the three laboratory configurations described previously during the Fall 2010 semester of an intermediate level computer networking and telecommunications course. Students of the course had the typical computer networking knowledge of a senior undergraduate or graduate student in ICT fields, such as CS, IS, Telecom and EE. The feedback from students provided guidelines for improving the remote access capabilities of SU s networking laboratory facility as well as a sense of the likes and dislikes of students regarding remote hands-on work with networking devices and software. From a survey answered by 16 of the students of the course the preferred remote laboratory setup was the one based on simulation software (7 students - 44% of respondents), followed by the NETLAB based setup (5 students - 31% of respondents). Third place was for the setup providing remote access to a physical lab infrastructure (3 students - 19% of respondents). One student expressed no preference for any of the setups. The students preference for the simulation based setup was influenced by the fact that with this setup they had less difficulties in completing laboratory assignments. Time restrictions for the assignments were not as severe as in the other setups since scheduling the use of equipment was not required in this configuration. The low likeability for the physical laboratory setup was determined by the perceived higher complexity of the lab exercises assigned to be performed and the intermittent configuration management problems that affected the execution of some of the experiments by the students. However, the experiences with remote access to devices in a physical lab and to a NETLAB setup were appreciated by at least 50% of the students to be more realistic and engaging. The students likeability scores are the opposite of what the author/instructor would have preferred. However, they seem to indicate that a strategy where introductory F3C-4

5 TABLE 1. COMPARISON OF DIFFERENT LABORATORY SETUPS laboratory assignments are performed with simulation software and more advanced assignments are performed with remote access to setups that make use of real equipment, might provide the best combination of learning experiences for students. Future work will validate this hypothesis. A summary of the comparison results for the different laboratory setups is presented in Table 1. additional time on assignments, adding to the frustration. Additionally, laboratory support staff must know about the experiments being conducted remotely which, depending on the staff available either limits the number of experiments that can be adequately supported in the lab (from a human resource perspective) or imposes additional costs on its operation due to the extra staff required to operate it. A remotely accessible laboratory makes learning interactions easier on students who cannot install software in their computer environments due to security policies in their place of work or limitations on their own computing devices. Redundancy on the data connections that provide remote access to the laboratory and on the connections that provide accessibility to its management or configuration platform should be in place in order to handle failures on the primary connections to these systems. The most important advantage to using laboratories based on physical infrastructure is that they provide a learning experience that is more realistic to the environment students will be working on when they leave school. However, it is the task of the instructor to design laboratory assignments that will promote critical thinking and stimulate problem solving skills instead of using a fully guided step-by-step approach which deviates from reality. ACKNOWLEDGMENTS LESSONS LEARNED AND CONCLUSIONS Providing remote access to a computer networking laboratory infrastructure extends the learning experiences of the laboratory to distance students. This capability allows an institution to deliver instruction and knowledge on important technologies to distance students. However, the implementation of a computer networking laboratory for distance education requires determining the balance between academic objectives, budget and maintenance constraints that best satisfies an institution. The following paragraphs describe a set of lessons learned and conclusions derived from the implementation of the laboratory setups described in this paper and the interactions that distance students had with them. Distance learning students are typically persons seeking to improve their educational background and maybe holding a job and family responsibilities. The times at which these students decide to engage on academic assignments are usually taken from their traditional free time at work or home or even their sleep/rest hours. Thus, students access a remote laboratory at very unusual times during the day and expect to find 24/7 support from laboratory staff. If the organization in charge of the laboratory has not planned for that level of support, students will get frustrated and/or spend The author would like to thank the Deans of the School of Information Studies at Syracuse University for the approval of the internal development grant for the Networking Lab Virtualization Project from which the results of this work were derived. Additional thanks to the staff of the SU s ITELL lab and professor Bahram Attaie for their help and support in the configuration of the different laboratory setups. REFERENCES [1] Caicedo, C. E. and Cerroni, W., "Design of a Computer Networking Laboratory for Efficient Manageability and Effective Teaching," in ASEE/IEEE Frontiers in Education Conference San Antonio, TX, [2] Comer, D. E., Hands-on Networking with Internet Technologies, 2nd edition, Prentice Hall, [3] Gerdes, J. and Tilley, S. "A conceptual overview of the virtual networking laboratory," in 8th ACM SIGITE conference on Information technology education, 2007, pp [4] Network Development Group, NETLAB Product Line, [5] Sicker, D. C., et al. "Assessing the Effectiveness of Remote Networking Laboratories." In ASEE/IEEE Frontiers in Education Conference, Indianapois, IN, F3C-5

6 [6] Disston, S. and Caicedo, C. Approaches to the Design of Computer Networking Laboratories, ITERA 2010 conference, Nashville, TN, 2010 [7] S. Abbott-McCune, A. J. Newtson, J. Girard, and B. S. Goda, "Developing a reconfigurable network lab," in 9th ACM SIGITE conference on Information technology education, 2008, pp [8] E. Freudenthal, "A Virtualized Network Teaching Laboratory." Proc. ASEE (American Society for Engineering Education) Annual Conference and Exposition, June [9] A. Gaspar, S. Langevin, and W. D. Armitage, "Virtualization Technologies in the Undergraduate IT Curriculum", IT PROFESSIONAL, vol. 9, p. 10, [10] E. A. Lawson and W. Stackpole, "Does a virtual networking laboratory result in similar student achievement and satisfaction?," in 7th conference on Information technology education: ACM, [11] Melkonyan, Arsen and David Akopian: C.L. Philip Chen. "Work in Progress- Real- Time Remote Internet-Based Communication Laboratory." In ASEE/IEEE Frontiers in Education Conference. San Antonio, TX AUTHOR INFORMATION Carlos E. Caicedo Bastidas, Assistant Professor & Director of the Center for Convergence and Emerging Network Technologies (CCENT), School of Information Studies, Syracuse University, ccaicedo@syr.edu. F3C-6

Approaches to the Design of Computer Networking Laboratories

Approaches to the Design of Computer Networking Laboratories Approaches to the Design of Computer Networking Laboratories Sam Disston Syracuse University School of Information Studies ssdissto@syr.edu Carlos E. Caicedo Assistant Professor Syracuse University School

More information

Design of a Computer Networking Laboratory for Efficient Manageability and Effective Teaching

Design of a Computer Networking Laboratory for Efficient Manageability and Effective Teaching Design of a Computer Networking Laboratory for Efficient Manageability and Effective Teaching Carlos E. Caicedo, Walter Cerroni ccaicedo@sis.pitt.edu, walter.cerroni@unibo.it Abstract - Computer networking

More information

(Discovery 2) Credit value: 10 Guided learning hours: 80. Aim and purpose. Unit introduction. Learning outcomes

(Discovery 2) Credit value: 10 Guided learning hours: 80. Aim and purpose. Unit introduction. Learning outcomes Unit 102: CCNA Working at a Smallto-Medium Business or ISP (Discovery 2) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose D/601/6820 BTEC in IT This unit prepares students

More information

Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses.

Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses. Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses. Veeramani Shanmugam s.veeramani@curtin.edu.my Lenin Gopal lenin@curtin.edu.my Zeya

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

Lab assignment #1 Firewall operation and Access Control Lists

Lab assignment #1 Firewall operation and Access Control Lists University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab GSA: Carlos Caicedo Document version: 1.0 / 2008 I. Lab resources for this assignment Lab assignment #1 Firewall

More information

Remote PC Guide for Standalone PC Implementation

Remote PC Guide for Standalone PC Implementation Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.

More information

Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server

Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the

More information

Open-Source Software Toolkit for Network Simulation and Modeling

Open-Source Software Toolkit for Network Simulation and Modeling Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu Abstract This paper summarizes

More information

Supporting Computer Networks (Discovery 4)

Supporting Computer Networks (Discovery 4) Unit 104: CCNA Designing and Supporting Computer Networks (Discovery 4) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose L/601/6909 BTEC in IT This course introduces students

More information

IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII

IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII Internet Protocol (IP) Interface Product Options Cat # 1810815 IP Interface Only Cat # 1810870: Interface and DB9/RJ45 Adapter (9015028)

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

POD INSTALLATION AND CONFIGURATION GUIDE. EMC CIS Series 1

POD INSTALLATION AND CONFIGURATION GUIDE. EMC CIS Series 1 POD INSTALLATION AND CONFIGURATION GUIDE EMC CIS Series 1 Document Version: 2015-01-26 Installation of EMC CIS Series 1 virtual pods as described this guide, requires that your NETLAB+ system is equipped

More information

How to Configure an Initial Installation of the VMware ESXi Hypervisor

How to Configure an Initial Installation of the VMware ESXi Hypervisor How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide

More information

ISERink Overview. Version 1.1. February 1, 2015

ISERink Overview. Version 1.1. February 1, 2015 ISERink Overview Version 1.1 February 1, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to undertake

More information

Issues in Information Systems Volume 16, Issue I, pp. 219-225, 2015

Issues in Information Systems Volume 16, Issue I, pp. 219-225, 2015 MOVING TOWARD A SERVER-BASED VIRTUAL MACHINE HOSTING ENVIRONMENT IN SUPPORT OF UNIVERSITY INFORMATION TECHNOLOGY PROGRAMMING COURSES George Stefanek, PhD, Purdue University North Central, stefanek@pnc.edu

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network CMPE 150 Fall 2005 Introduction Today you are going to be thrown into using Cisco s Internetwork Operating System (IOS) to configure

More information

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1)

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources

More information

CCNA Networking for Home and Small Business (Discovery 1)

CCNA Networking for Home and Small Business (Discovery 1) Unit 101: CCNA Networking for Home and Small Business (Discovery 1) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose M/601/6840 BTEC in IT This unit teaches students the

More information

Networking (Exploration 1)

Networking (Exploration 1) Unit 105: CCNA Fundamentals of Networking (Exploration 1) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose A/601/7537 BTEC in IT This unit introduces the architecture,

More information

Towards a virtualized Internet for computer networking assignments

Towards a virtualized Internet for computer networking assignments Towards a virtualized Internet for computer networking assignments Luis Bellido, David Fernández, Encama Pastor Abstract By combining virtualization technologies, virtual private network techniques and

More information

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Aerohive Networks Inc. Free Bonjour Gateway FAQ Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?

More information

AC 2012-4887: WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY

AC 2012-4887: WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY AC 2012-4887: WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY Mr. John M. Jones, East Carolina University John Jones is currently

More information

ICT Infrastructure & Network Management

ICT Infrastructure & Network Management Context ICT Infrastructure & Network Management Postgraduate Degree Programme Hogeschool-Universiteit Brussel 2014-2015 The HUB University College offers a wide range of postgraduate and other courses

More information

ESUMS HIGH SCHOOL. Computer Network & Engineering (CNE) 2014-2015 Syllabus

ESUMS HIGH SCHOOL. Computer Network & Engineering (CNE) 2014-2015 Syllabus ESUMS HIGH SCHOOL Computer Network & Engineering (CNE) 2014-2015 Syllabus Teacher: Dr. Didacus Oparaocha Room: 333 Email: Didy.Oparaocha@new-haven.k12.ct.us Meeting Hours: 2A/3A Course Description: Computer

More information

CCNA LAN Switching and Wireless (Exploration 3)

CCNA LAN Switching and Wireless (Exploration 3) Unit 107: CCNA LAN Switching and Wireless (Exploration 3) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose K/601/7453 BTEC in IT This unit focuses on a comprehensive,

More information

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router 1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains

More information

VMsources Group Inc. www.vmsources.com 1-866-644-7764

VMsources Group Inc. www.vmsources.com 1-866-644-7764 VMware Horizon View 6 Virtual Desktop Deployment COURSE DESCRIPTION Our VMware View class offers participants the most extensive training available in the Installation, Configuration and Management of

More information

ClearPass Policy Manager 6.3

ClearPass Policy Manager 6.3 ClearPass Policy Manager 6.3 Tech Note: Installing or Upgrading on a Virtual Machine This document describes the procedures for installing and upgrading ClearPass Policy Manager 6.3 on a Virtual Machine.

More information

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««; Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization

More information

Technology Fee Proposal

Technology Fee Proposal Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

POD INSTALLATION AND CONFIGURATION GUIDE. Python Security

POD INSTALLATION AND CONFIGURATION GUIDE. Python Security POD INSTALLATION AND CONFIGURATION GUIDE Python Security Document Version: 2015-09-29 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License. Development was funded by

More information

Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER

Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Introduction Many VMware customers have virtualized their ROBO (Remote Office Branch Office) offices in order to

More information

Outgoing VDI Gateways:

Outgoing VDI Gateways: ` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents

More information

Issues in Information Systems

Issues in Information Systems USING VMWARE VCENTER TO TEACH SYSTEM ADMINISTRATION IN A LAB Bryan Marshall, Georgia College, bryan.marshall@gcsu.edu Peter Cardon, University of Southern California, petercardon@gmail.com Craig Callender,

More information

APPLICATION FOR BOARD APPROVAL. Of Locally Developed Course. Cisco CCNA Certification 11/12

APPLICATION FOR BOARD APPROVAL. Of Locally Developed Course. Cisco CCNA Certification 11/12 APPLICATION FOR BOARD APPROVAL Of Locally Developed Course Cisco CCNA Certification 11/12 John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed Cisco CCNA Certification 11/12 PREAMBLE: The

More information

CCNA DATA CENTER BOOT CAMP: DCICN + DCICT

CCNA DATA CENTER BOOT CAMP: DCICN + DCICT CCNA DATA CENTER BOOT CAMP: DCICN + DCICT COURSE OVERVIEW: In this accelerated course you will be introduced to the three primary technologies that are used in the Cisco data center. You will become familiar

More information

Ann Beheler Karl Dietrich Ernie Friend Eliazar Martinez Bill Saichek

Ann Beheler Karl Dietrich Ernie Friend Eliazar Martinez Bill Saichek Introductions Ann Beheler, Convergence Technology Center (CTC), Frisco, TX Karl Dietrich, Lansing Community College, Lansing, MI Ernie Friend, Florida State College, Jacksonville, FL Eliazar Martinez,

More information

vsphere Upgrade vsphere 6.0 EN-001721-03

vsphere Upgrade vsphere 6.0 EN-001721-03 vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Configuring iscsi Multipath

Configuring iscsi Multipath CHAPTER 13 Revised: April 27, 2011, OL-20458-01 This chapter describes how to configure iscsi multipath for multiple routes between a server and its storage devices. This chapter includes the following

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME Scenario With the scheduled release of Packet Tracer v5.3 in the near future, this case study is designed to provide you with an insight into

More information

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

Advanced VMware Training

Advanced VMware Training Goals: Demonstrate VMware Fault Tolerance in action Demonstrate Host Profile Usage How to quickly deploy and configure several vsphere servers Discuss Storage vmotion use cases Demonstrate vcenter Server

More information

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1

More information

Configuring Static and Dynamic NAT Simultaneously

Configuring Static and Dynamic NAT Simultaneously Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some

More information

Lab 5.2.5 Configure IOS Firewall IDS

Lab 5.2.5 Configure IOS Firewall IDS Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform

More information

http://computernetworkingnotes.com/ccna-study-guide/cisco-ios-naming-convention-explainedwith-examples.html

http://computernetworkingnotes.com/ccna-study-guide/cisco-ios-naming-convention-explainedwith-examples.html IOS is the most critical part of any cisco device. We should always keep a backup copy of IOS to deal with any unwanted situation. In this article I will explain the backup and restore process of IOS in

More information

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Course Description Understanding Cisco Cloud Fundamentals (CLDFND) v1.0 is a five-day instructor-led training course that is designed

More information

Implementing and Managing Windows Server 2008 Hyper-V

Implementing and Managing Windows Server 2008 Hyper-V Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:

More information

ISERink Installation Guide

ISERink Installation Guide ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to

More information

Altor Virtual Network Security Analyzer v1.0 Installation Guide

Altor Virtual Network Security Analyzer v1.0 Installation Guide Altor Virtual Network Security Analyzer v1.0 Installation Guide The Altor Virtual Network Security Analyzer (VNSA) application is deployed as Virtual Appliance running on VMware ESX servers. A single Altor

More information

Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment.

Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment. Provost s Learning Innovations Grant for Faculty Special Request for Proposal Course Development 2009-2010 Project Title: Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment.

More information

VMware Data Recovery. Administrator's Guide EN-000193-00

VMware Data Recovery. Administrator's Guide EN-000193-00 Administrator's Guide EN-000193-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product

More information

F5 BIG-IP V9 Local Traffic Management EE0-511. Demo Version. ITCertKeys.com

F5 BIG-IP V9 Local Traffic Management EE0-511. Demo Version. ITCertKeys.com F5 BIG-IP V9 Local Traffic Management EE0-511 Demo Version Question 1. Which three methods can be used for initial access to a BIG-IP system? (Choose three.) A. Serial console access B. SHH access to the

More information

William Saichek Professor, Computer Science & Information Systems Orange Coast College

William Saichek Professor, Computer Science & Information Systems Orange Coast College William Saichek Professor, Computer Science & Information Systems Orange Coast College What is Cloud Computing What is Cloud Computing The Internet is NOT the cloud Virtualization is NOT the cloud Storage

More information

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments

More information

VoIP Conformance Labs

VoIP Conformance Labs VoIP acceptance, VoIP connectivity, VoIP conformance, VoIP Approval, SIP acceptance, SIP connectivity, SIP conformance, SIP Approval, IMS acceptance, IMS connectivity, IMS conformance, IMS Approval, VoIP

More information

WIDE AREA NETWORKS: A COMPARISON OF DIFFERENT APPROACHES FOR HANDS-ON LABS

WIDE AREA NETWORKS: A COMPARISON OF DIFFERENT APPROACHES FOR HANDS-ON LABS WIDE AREA NETWORKS: A COMPARISON OF DIFFERENT APPROACHES FOR HANDS-ON LABS Dr. Rami Khasawneh, Chair, Department of Information Technology Management, Lewis University, khasawra@lewisu.edu Dr. Rad Alrifai,

More information

Lab 2 - Basic Router Configuration

Lab 2 - Basic Router Configuration CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how

More information

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain

More information

Saving Time & Money Across The Organization With Network Management Simulation

Saving Time & Money Across The Organization With Network Management Simulation Saving Time & Money Across The Organization With Network Management Simulation May, 2011 Copyright 2011 SimpleSoft, Inc. All Rights Reserved Introduction Network management vendors are in business to help

More information

Ease Server Support With Pre-Configured Virtualization Systems

Ease Server Support With Pre-Configured Virtualization Systems Ease Server Support With Pre-Configured Virtualization Systems Manufacturers and industrial production companies are increasingly challenged with supporting the complex server environments that host their

More information

EMC Integrated Infrastructure for VMware

EMC Integrated Infrastructure for VMware EMC Integrated Infrastructure for VMware Enabled by EMC Celerra NS-120 Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000

More information

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS

AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering

More information

Overview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6

Overview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6 July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making

More information

Building a Penetration Testing Virtual Computer Laboratory

Building a Penetration Testing Virtual Computer Laboratory Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network

More information

DCICT: Introducing Cisco Data Center Technologies

DCICT: Introducing Cisco Data Center Technologies DCICT: Introducing Cisco Data Center Technologies Description DCICN and DCICT will introduce the students to the Cisco technologies that are deployed in the Data Center: unified computing, unified fabric,

More information

Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

CCNA Discovery: Designing and Supporting Computer Networks

CCNA Discovery: Designing and Supporting Computer Networks CCNA Discovery: Designing and Supporting Computer Networks Overview of Case Studies Karen Alderson kalderso@cisco.com 1 CCNA Discovery Course Sequence CCNA Discovery Networking for Home and Small Businesses

More information

Course Outline. Core Solutions of Microsoft Lync Server 2013 Course 20336B: 5 days Instructor Led. About this Course.

Course Outline. Core Solutions of Microsoft Lync Server 2013 Course 20336B: 5 days Instructor Led. About this Course. Core Solutions of Microsoft Lync Server 2013 Course 20336B: 5 days Instructor Led About this Course This instructor-led course teaches IT professionals how to plan, design, deploy, configure, and administer

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

Migrating to ESXi: How To

Migrating to ESXi: How To ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,

More information

Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**

Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track** Course: Duration: Price: $ 4,295.00 Learning Credits: 43 Certification: Implementing and Troubleshooting the Cisco Cloud Infrastructure Implementing and Troubleshooting the Cisco Cloud Infrastructure**Part

More information

VMware vsphere 5.0 Evaluation Guide

VMware vsphere 5.0 Evaluation Guide VMware vsphere 5.0 Evaluation Guide Advanced Networking Features TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage....

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

NEC SigmaSystemCenter 3.0 highlights

NEC SigmaSystemCenter 3.0 highlights NEC SigmaSystemCenter 3.0 highlights NEC Corporation 2nd IT Software Division IT Network Global Solutions Division Sept. 2011 NEC SigmaSystemCenter 3.0 highlights Cloud Management Multitenancy Resource

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c

More information

Capstone Project Putting It All Together

Capstone Project Putting It All Together Capstone Project Putting It All Together Objectives Understand the steps involved in planning and implementing a technical solution for a small business. Gather relevant information to help devise a technical

More information

vsphere Upgrade Update 1 ESXi 6.0 vcenter Server 6.0 EN-001804-02

vsphere Upgrade Update 1 ESXi 6.0 vcenter Server 6.0 EN-001804-02 Update 1 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Remote PC Guide for VMware Implementation Using ESXi versions 4.01 and 4.1 U2 with vcenter

Remote PC Guide for VMware Implementation Using ESXi versions 4.01 and 4.1 U2 with vcenter Remote PC Guide for VMware Implementation Using ESXi versions 4.01 and 4.1 U2 with vcenter Document Version: 2012-06-29 This guide is a primer for adding remotely accessible PC or servers into your NETLAB+

More information

AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY

AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.

More information

VMware vrealize Operations for Horizon Administration

VMware vrealize Operations for Horizon Administration VMware vrealize Operations for Horizon Administration vrealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

VIRTUAL DESKTOP INFRASTRUCTURE TECHNOLOGY BASED STUDY & RESEARCH

VIRTUAL DESKTOP INFRASTRUCTURE TECHNOLOGY BASED STUDY & RESEARCH International Journal of Education and Research Vol. 1 No. 4 April 2013 VIRTUAL DESKTOP INFRASTRUCTURE TECHNOLOGY BASED STUDY & RESEARCH Regina Miseviciene (Corresponding author) Associate Professor, Department

More information

VM-Series Firewall Deployment Tech Note PAN-OS 5.0

VM-Series Firewall Deployment Tech Note PAN-OS 5.0 VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5

More information

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of

More information

SonicWALL SRA Virtual Appliance Getting Started Guide

SonicWALL SRA Virtual Appliance Getting Started Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started

More information

Solution for private cloud computing

Solution for private cloud computing The CC1 system Solution for private cloud computing 1 Outline What is CC1? Features Technical details System requirements and installation How to get it? 2 What is CC1? The CC1 system is a complete solution

More information

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1) Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management

More information

Direct Attached Storage

Direct Attached Storage , page 1 Fibre Channel Switching Mode, page 1 Configuring Fibre Channel Switching Mode, page 2 Creating a Storage VSAN, page 3 Creating a VSAN for Fibre Channel Zoning, page 4 Configuring a Fibre Channel

More information

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide

More information