Enabling Remote Access to Computer Networking Laboratories for Distance Education
|
|
- Kristopher Sharp
- 8 years ago
- Views:
Transcription
1 Enabling Remote Access to Computer Networking Laboratories for Distance Education Carlos E. Caicedo Bastidas Syracuse University, Abstract - Academic organizations that provide students with the facilities for experimenting and learning basic and advanced concepts in networking rely on computer networking laboratories. These facilities can be implemented in many ways with varying degrees of cost, management complexity and capabilities. The benefits of these facilities can be extended by enabling remote access to them for distance education purposes. Providing remote access capabilities to these facilities with the objective of offering the learning experience of a computer networking laboratory to distance education students of Information and Communication Technology (ICT) programs is a challenging task. This paper provides a description and a comparative analysis of the implementation of three different computer network laboratory setups for which remote access was enabled and discusses lessons learned and good practices for similar setups. Index Terms Distance education, experiment based learning, laboratory design, laboratory management. INTRODUCTION Computer networking laboratories are a key resource for academic organizations that seek to provide their students with facilities for learning basic and advanced concepts in networking [1, 2]. Providing remote access to a computer networking laboratory for the purpose of extending its educational value to distance education students is a challenging task. Three different laboratory setups are presented in this paper in order to evaluate the infrastructure, management and acceptance characteristics of different laboratory configurations enabled with remote access. These configurations were deployed as part of an initiative to extend laboratory-based activities to distance students enrolled in one of the computer networking courses of an ICT program - the Telecommunications and Network Management program - of Syracuse University (SU). This paper provides a comparison among the different setups that were deployed mentioning their advantages and disadvantages from a pedagogical, cost and management perspective. It also discusses the lessons learned and difficulties found in the deployment of the different network laboratory configurations We hope our methodology and experience in designing and improving the implementation of remotely accessible computer networking laboratory facilities can help other instructors and institutions in their own efforts to offer effective and manageable laboratory experiences to distance education students. COMPUTER NETWORK LABORATORY DESIGN Computer network laboratories can be implemented in many ways. They can rely on a simulation environment, or on virtualized or physical infrastructures [1, 6-11]. Simulationbased laboratories rely on software that simulates the behaviors of network elements. This approach is typically used when the experiments to be performed are too expensive or difficult to be undertaken with real equipment or when remote access to real physical devices is too costly or inconvenient. The size of the simulated network depends on the computational power and time allocated to its analysis. A problem with this type of design is that the results of the simulation are only as good as the code written into the software and therefore there is a risk of not getting realistic or accurate results from the simulations. Virtualized infrastructures make use of the instantiation of several virtual machine (VM) configurations inside each one of the (physical) server systems of a laboratory. Each of the VMs can be configured to act as a server, client or routing device within a network formed by grouping and interconnecting different VMs. The use of VMs also enables a laboratory administrator to easily restore the laboratory s configuration to a default state by reloading the necessary VMs when required [3]. Laboratories based on a physical infrastructure configuration primarily make use of real physical networking devices for the setup of experiments. The devices can be deployed in either a centralized or distributed topology [1]. These laboratories provide many advantages including access to real network interfaces and results and interactions that mimic those found in real world environments. However, laboratories following this approach are more expensive to implement and can become difficult to manage if not planned correctly. In general, laboratory based distance education is difficult to offer since the laboratory s devices must be made accessible to distance students in such a way that they are able to have a learning experience that is equal or very F3C-1
2 comparable to the one obtained by in-situ (campus-based) students. The satisfaction of this requirement relies on providing adequate remote access to the laboratory and on having a laboratory setup that offers enough connectivity and management flexibility to deliver similar learning experiences to distance and in-situ students. REMOTE ACCESS & LABORATORY CONFIGURATIONS In order to evaluate the benefits and drawbacks of different laboratory configurations for distance education, the following setups were deployed for and tested by distance education students of an intermediate level computer networking course taught by the author: i. Remote access to the devices of SU s networking laboratory facility. This facility previously used for campus-only computer networking courses was upgraded to support remote access and monitoring. ii. Remote access to a Cisco based NETLAB system. This system although well organized is vendor-specific and deploying non-cisco defined configurations proved challenging. iii. Software based simulation of computer networking devices through the use of Cisco s Packet Tracer software. The machines which had the software were accessed remotely by students. Each of these configurations is described in the following sub-sections. I. Remote access to a physical lab infrastructure When working with physical devices in a campus-based computer networking laboratory, students get to manipulate the connectivity between different network ports and the configuration of the various networking devices in the laboratory (routers and switches) via their management interfaces. In a remote access configuration, these same capabilities should be provided to students. Figure 1 illustrates the remote access setup employed at SU to give access to distance students to a physical lab infrastructure. Devices in the laboratory are grouped in department units and typically, a team of two students gets assigned a specific department. Each department consists of one router, a switch, a patch panel and two servers. The servers have enough capacity to host several virtual machines which can act as the nodes of a network. All ports of the devices in a department can be interconnected via a patch panel and all departments can be interconnected through additional patch panels set for that purpose. The current laboratory infrastructure has 14 departments in total providing remote access capabilities for several students at the same time. To provide flexible and remote access to the management interfaces of the laboratory s devices so that students can configure them from a command line level, we use a Serial Link Concentrator (SLC). The SLC is a commercial device that handles many serial interfaces to which all the RS-232 management ports of the network devices are connected. Through the SLC any device in the laboratory can be configured without having the student move extra cables and/or configuring a management connection to a device through other means (i.e. fixing a data port and allocating an IP address to it). To efficiently configure and manage the virtual machines (VMs) in each of the servers of a department, the servers have been pre-configured with a hypervisor (VMware ESX). Additionally, a VMware vsphere server allows centralized management and monitoring of all virtual machines deployed in the servers of the laboratory. FIGURE 1. REMOTE ACCESS TO A PHYSICAL LAB INFRASTRUCTURE F3C-2
3 Distance education students using the laboratory log into the VMware vsphere server which offers enough capabilities to the students to activate, shutdown or restart any VM or group of VMs depending on the requirements of a lab exercise. For ease of use and manageability most students after activating their VMs log into the SLC through a secure shell terminal session from a VM and manage their department s devices through that session. A current drawback of the setup is that the student s flexibility to enable connections across several device ports is limited. Laboratory assignments are scheduled to be completed during a two-week interval and the lab administrators have to pre-configure the correct sets of patch-panel connections in each department s patch panel so that distance education students can perform their lab assignments. Currently, students can only control connectivity on a port by enabling or disabling the selected port. Ongoing enhancements to the laboratory will increase the capabilities for remote inter-connection management across device ports reducing the burden on administrators. II. Remote access to a NETLAB infrastructure NETLAB is a line of products of NDG - Network Development Group for distance based or blended (distance and in-site) education on computer networking [4]. Depending on its configuration, a NETLAB system setup will contain several routers and switch devices along with servers to host virtual machines. The devices are grouped in equipment pods depending on the requirements of a particular lab exercise. Figure 2 shows the remotely accessible NETLAB system setup used in our lab. As a commercially developed product NETLAB offers the software and hardware interfaces to provide remote access to the equipment pods, schedule their use by students and manage/restore the configuration of devices. These capabilities reduce most of the management burden on laboratory administrators except for the tasks involved in setting up a pod configuration to match a specific assignment requirement. However, the integrated scheduling and remote access capabilities of the system make it a very attractive system to offer learning experiences on computer networking to distance education students. III. Remote access to a network simulation infrastructure Simulation based networking laboratories are a great option for institutions that have limited funds, and insufficient infrastructure to support physical hardware. Remote desktop access can be used to provide the students access to the computer systems in the laboratory facility that contain the simulation software [5, 6]. In our setup, we used Cisco s Packet Tracer application which can provide very realistic device emulation features although it is vendorcentric and has restrictions related to licensing and emulation of advanced device features. Figure 3 shows the configuration we used to enable remote access to a simulation-based network laboratory. A pool of servers was setup and managed via VMware vsphere so that when students logged in to the lab, they could create a windows XP virtual machine (VM) on any available server. The VM had the Packet Tracer software installed in it and students could make use of it via a remote desktop session. FIGURE 3. REMOTE ACCESS TO A NETWORK SIMULATION INFRASTRUCTURE FIGURE 2. REMOTE ACCESS TO A NETLAB INFRASTRUCTURE COMPARISON AND ANALYSIS OF CONFIGURATIONS Each of the networking lab configurations mentioned previously will be compared and analyzed based on the following criteria: infrastructure cost, flexibility, complexity, pedagogy, and student likeability. Infrastructure cost: From the three remote laboratory configurations studied, the one with the highest implementation cost was the laboratory supported on physical devices. Equipment, space and energy costs must F3C-3
4 be considered for this setup along with the costs of management, devices and software. Management costs are usually lower in the case of a NETLAB setup but the costs of the equipment rack and of the devices for each pod have to be considered. The simulation based setup has the lowest cost of all as long as the per-license cost of software is low. For all configurations the cost of the communication equipment and links to provide remote access is almost the same but due to the heavy reliance on remote desktop sessions for all configurations, the capacity of the links to the laboratory have to be dimensioned properly based on the number of students that will simultaneously access the laboratory. Students accessing the laboratory also incur a cost in the sense that they must have a capable computing system and a data connection that can adequately support the remote interactions with the laboratory (remote desktop sessions). In terms of data connection speed, students with data connections with speeds higher than 256 Kbps (downlink) reported good average response times. Flexibility: The degree of flexibility to configure experiments varies across the different setups tested. The physical lab infrastructure offers the highest degree of flexibility but it is limited by the number of devices available in the laboratory and management tools available to laboratory administrators for configuring experiments. The NETLAB setup is easier to manage but limits the configuration of experiments to those that closely follow pre-determined configurations. Although a more diverse set of experiments can be provided by lab administrators via the development of fully customized pods, their development proved to be complex but it could be improved with additional training on the product. For the case of simulation based environments, the range of laboratory experiments that can be setup is limited by the capabilities of the software and the computer system over which it executes. Complexity: The complexity to setup laboratory experiments for students in the physical lab infrastructure is higher than that required in the other setups. Most of the complexity is determined by the device and connection management capabilities of the laboratory. The NETLAB setup offers tools to easily configure experiments (under the flexibility restrictions mentioned previously). Configuring new experiments in the simulation based setup only required defining new elements for each experiment via a GUI. Pedagogy: Teaching activities for each lab setup should focus on the strengths offered by each configuration. Simulation-based environments are good for introducing students to new concepts and to analyze large network scenarios that would be cost-prohibitive to implement with real equipment in an academic institution. Physical and Netlab based laboratories provide a more realistic experience than simulation-based experiments and allow students to interact with the advanced features of network devices that are not available in simulation software. These laboratories also allow for the analysis of real traffic flows (packet captures) that provide students with detailed understanding of protocol behavior. The flexibility and complexity characteristics of each laboratory setup affect some of its pedagogical aspects and the way students interact with it. For example, if a student makes a mistake while performing a lab exercise in a physical lab setup, it can be difficult and time consuming for him/her to return a device to a previous or neutral state unless the student has taken precautions to do so. In contrast, simulation environments usually provide an easy to use interface to instantiate a new device quickly without waiting for it to reboot or stabilize. Netlab devices can be restarted just like in a physical lab setup but the system keeps track of the history of commands issued by a student which makes it easy for him/her to determine when and how a mistake was made and/or discuss his procedures with an instructor who can then provide more accurate feedback. Likeability by students: A total of 22 distance education students made use of the three laboratory configurations described previously during the Fall 2010 semester of an intermediate level computer networking and telecommunications course. Students of the course had the typical computer networking knowledge of a senior undergraduate or graduate student in ICT fields, such as CS, IS, Telecom and EE. The feedback from students provided guidelines for improving the remote access capabilities of SU s networking laboratory facility as well as a sense of the likes and dislikes of students regarding remote hands-on work with networking devices and software. From a survey answered by 16 of the students of the course the preferred remote laboratory setup was the one based on simulation software (7 students - 44% of respondents), followed by the NETLAB based setup (5 students - 31% of respondents). Third place was for the setup providing remote access to a physical lab infrastructure (3 students - 19% of respondents). One student expressed no preference for any of the setups. The students preference for the simulation based setup was influenced by the fact that with this setup they had less difficulties in completing laboratory assignments. Time restrictions for the assignments were not as severe as in the other setups since scheduling the use of equipment was not required in this configuration. The low likeability for the physical laboratory setup was determined by the perceived higher complexity of the lab exercises assigned to be performed and the intermittent configuration management problems that affected the execution of some of the experiments by the students. However, the experiences with remote access to devices in a physical lab and to a NETLAB setup were appreciated by at least 50% of the students to be more realistic and engaging. The students likeability scores are the opposite of what the author/instructor would have preferred. However, they seem to indicate that a strategy where introductory F3C-4
5 TABLE 1. COMPARISON OF DIFFERENT LABORATORY SETUPS laboratory assignments are performed with simulation software and more advanced assignments are performed with remote access to setups that make use of real equipment, might provide the best combination of learning experiences for students. Future work will validate this hypothesis. A summary of the comparison results for the different laboratory setups is presented in Table 1. additional time on assignments, adding to the frustration. Additionally, laboratory support staff must know about the experiments being conducted remotely which, depending on the staff available either limits the number of experiments that can be adequately supported in the lab (from a human resource perspective) or imposes additional costs on its operation due to the extra staff required to operate it. A remotely accessible laboratory makes learning interactions easier on students who cannot install software in their computer environments due to security policies in their place of work or limitations on their own computing devices. Redundancy on the data connections that provide remote access to the laboratory and on the connections that provide accessibility to its management or configuration platform should be in place in order to handle failures on the primary connections to these systems. The most important advantage to using laboratories based on physical infrastructure is that they provide a learning experience that is more realistic to the environment students will be working on when they leave school. However, it is the task of the instructor to design laboratory assignments that will promote critical thinking and stimulate problem solving skills instead of using a fully guided step-by-step approach which deviates from reality. ACKNOWLEDGMENTS LESSONS LEARNED AND CONCLUSIONS Providing remote access to a computer networking laboratory infrastructure extends the learning experiences of the laboratory to distance students. This capability allows an institution to deliver instruction and knowledge on important technologies to distance students. However, the implementation of a computer networking laboratory for distance education requires determining the balance between academic objectives, budget and maintenance constraints that best satisfies an institution. The following paragraphs describe a set of lessons learned and conclusions derived from the implementation of the laboratory setups described in this paper and the interactions that distance students had with them. Distance learning students are typically persons seeking to improve their educational background and maybe holding a job and family responsibilities. The times at which these students decide to engage on academic assignments are usually taken from their traditional free time at work or home or even their sleep/rest hours. Thus, students access a remote laboratory at very unusual times during the day and expect to find 24/7 support from laboratory staff. If the organization in charge of the laboratory has not planned for that level of support, students will get frustrated and/or spend The author would like to thank the Deans of the School of Information Studies at Syracuse University for the approval of the internal development grant for the Networking Lab Virtualization Project from which the results of this work were derived. Additional thanks to the staff of the SU s ITELL lab and professor Bahram Attaie for their help and support in the configuration of the different laboratory setups. REFERENCES [1] Caicedo, C. E. and Cerroni, W., "Design of a Computer Networking Laboratory for Efficient Manageability and Effective Teaching," in ASEE/IEEE Frontiers in Education Conference San Antonio, TX, [2] Comer, D. E., Hands-on Networking with Internet Technologies, 2nd edition, Prentice Hall, [3] Gerdes, J. and Tilley, S. "A conceptual overview of the virtual networking laboratory," in 8th ACM SIGITE conference on Information technology education, 2007, pp [4] Network Development Group, NETLAB Product Line, [5] Sicker, D. C., et al. "Assessing the Effectiveness of Remote Networking Laboratories." In ASEE/IEEE Frontiers in Education Conference, Indianapois, IN, F3C-5
6 [6] Disston, S. and Caicedo, C. Approaches to the Design of Computer Networking Laboratories, ITERA 2010 conference, Nashville, TN, 2010 [7] S. Abbott-McCune, A. J. Newtson, J. Girard, and B. S. Goda, "Developing a reconfigurable network lab," in 9th ACM SIGITE conference on Information technology education, 2008, pp [8] E. Freudenthal, "A Virtualized Network Teaching Laboratory." Proc. ASEE (American Society for Engineering Education) Annual Conference and Exposition, June [9] A. Gaspar, S. Langevin, and W. D. Armitage, "Virtualization Technologies in the Undergraduate IT Curriculum", IT PROFESSIONAL, vol. 9, p. 10, [10] E. A. Lawson and W. Stackpole, "Does a virtual networking laboratory result in similar student achievement and satisfaction?," in 7th conference on Information technology education: ACM, [11] Melkonyan, Arsen and David Akopian: C.L. Philip Chen. "Work in Progress- Real- Time Remote Internet-Based Communication Laboratory." In ASEE/IEEE Frontiers in Education Conference. San Antonio, TX AUTHOR INFORMATION Carlos E. Caicedo Bastidas, Assistant Professor & Director of the Center for Convergence and Emerging Network Technologies (CCENT), School of Information Studies, Syracuse University, ccaicedo@syr.edu. F3C-6
Approaches to the Design of Computer Networking Laboratories
Approaches to the Design of Computer Networking Laboratories Sam Disston Syracuse University School of Information Studies ssdissto@syr.edu Carlos E. Caicedo Assistant Professor Syracuse University School
More informationDesign of a Computer Networking Laboratory for Efficient Manageability and Effective Teaching
Design of a Computer Networking Laboratory for Efficient Manageability and Effective Teaching Carlos E. Caicedo, Walter Cerroni ccaicedo@sis.pitt.edu, walter.cerroni@unibo.it Abstract - Computer networking
More information(Discovery 2) Credit value: 10 Guided learning hours: 80. Aim and purpose. Unit introduction. Learning outcomes
Unit 102: CCNA Working at a Smallto-Medium Business or ISP (Discovery 2) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose D/601/6820 BTEC in IT This unit prepares students
More informationEnhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses.
Enhance student s learning with an aid of simulation software to understand Computer Networking Undergraduate courses. Veeramani Shanmugam s.veeramani@curtin.edu.my Lenin Gopal lenin@curtin.edu.my Zeya
More informationRemote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
More informationLab assignment #1 Firewall operation and Access Control Lists
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab GSA: Carlos Caicedo Document version: 1.0 / 2008 I. Lab resources for this assignment Lab assignment #1 Firewall
More informationRemote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
More informationLab 8.5.3 Configuring the PIX Firewall as a DHCP Server
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the
More informationOpen-Source Software Toolkit for Network Simulation and Modeling
Open-Source Software Toolkit for Network Simulation and Modeling Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 Chengcheng.li@uc.edu Abstract This paper summarizes
More informationSupporting Computer Networks (Discovery 4)
Unit 104: CCNA Designing and Supporting Computer Networks (Discovery 4) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose L/601/6909 BTEC in IT This course introduces students
More informationIP Interface for the Somfy Digital Network (SDN) & RS485 URTSII
IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII Internet Protocol (IP) Interface Product Options Cat # 1810815 IP Interface Only Cat # 1810870: Interface and DB9/RJ45 Adapter (9015028)
More informationLab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
More informationPOD INSTALLATION AND CONFIGURATION GUIDE. EMC CIS Series 1
POD INSTALLATION AND CONFIGURATION GUIDE EMC CIS Series 1 Document Version: 2015-01-26 Installation of EMC CIS Series 1 virtual pods as described this guide, requires that your NETLAB+ system is equipped
More informationHow to Configure an Initial Installation of the VMware ESXi Hypervisor
How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide
More informationISERink Overview. Version 1.1. February 1, 2015
ISERink Overview Version 1.1 February 1, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to undertake
More informationIssues in Information Systems Volume 16, Issue I, pp. 219-225, 2015
MOVING TOWARD A SERVER-BASED VIRTUAL MACHINE HOSTING ENVIRONMENT IN SUPPORT OF UNIVERSITY INFORMATION TECHNOLOGY PROGRAMMING COURSES George Stefanek, PhD, Purdue University North Central, stefanek@pnc.edu
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationLab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network
Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network CMPE 150 Fall 2005 Introduction Today you are going to be thrown into using Cisco s Internetwork Operating System (IOS) to configure
More informationLab assignment #2 IPSec and VPN Tunnels (Document version 1.1)
University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources
More informationCCNA Networking for Home and Small Business (Discovery 1)
Unit 101: CCNA Networking for Home and Small Business (Discovery 1) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose M/601/6840 BTEC in IT This unit teaches students the
More informationNetworking (Exploration 1)
Unit 105: CCNA Fundamentals of Networking (Exploration 1) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose A/601/7537 BTEC in IT This unit introduces the architecture,
More informationTowards a virtualized Internet for computer networking assignments
Towards a virtualized Internet for computer networking assignments Luis Bellido, David Fernández, Encama Pastor Abstract By combining virtualization technologies, virtual private network techniques and
More informationAerohive Networks Inc. Free Bonjour Gateway FAQ
Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?
More informationAC 2012-4887: WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY
AC 2012-4887: WORK-IN-PROGRESS: CREATING AN INTRUSION DE- TECTION EXPERIMENTAL ENVIRONMENT USING CLOUD-BASED VIR- TUALIZATION TECHNOLOGY Mr. John M. Jones, East Carolina University John Jones is currently
More informationICT Infrastructure & Network Management
Context ICT Infrastructure & Network Management Postgraduate Degree Programme Hogeschool-Universiteit Brussel 2014-2015 The HUB University College offers a wide range of postgraduate and other courses
More informationESUMS HIGH SCHOOL. Computer Network & Engineering (CNE) 2014-2015 Syllabus
ESUMS HIGH SCHOOL Computer Network & Engineering (CNE) 2014-2015 Syllabus Teacher: Dr. Didacus Oparaocha Room: 333 Email: Didy.Oparaocha@new-haven.k12.ct.us Meeting Hours: 2A/3A Course Description: Computer
More informationCCNA LAN Switching and Wireless (Exploration 3)
Unit 107: CCNA LAN Switching and Wireless (Exploration 3) Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 80 Aim and purpose K/601/7453 BTEC in IT This unit focuses on a comprehensive,
More information1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
More informationVMsources Group Inc. www.vmsources.com 1-866-644-7764
VMware Horizon View 6 Virtual Desktop Deployment COURSE DESCRIPTION Our VMware View class offers participants the most extensive training available in the Installation, Configuration and Management of
More informationClearPass Policy Manager 6.3
ClearPass Policy Manager 6.3 Tech Note: Installing or Upgrading on a Virtual Machine This document describes the procedures for installing and upgrading ClearPass Policy Manager 6.3 on a Virtual Machine.
More informationSecurity. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;
Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization
More informationTechnology Fee Proposal
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationPOD INSTALLATION AND CONFIGURATION GUIDE. Python Security
POD INSTALLATION AND CONFIGURATION GUIDE Python Security Document Version: 2015-09-29 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License. Development was funded by
More informationPerformance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER
Performance of VMware vcenter (VC) Operations in a ROBO Environment TECHNICAL WHITE PAPER Introduction Many VMware customers have virtualized their ROBO (Remote Office Branch Office) offices in order to
More informationOutgoing VDI Gateways:
` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents
More informationIssues in Information Systems
USING VMWARE VCENTER TO TEACH SYSTEM ADMINISTRATION IN A LAB Bryan Marshall, Georgia College, bryan.marshall@gcsu.edu Peter Cardon, University of Southern California, petercardon@gmail.com Craig Callender,
More informationAPPLICATION FOR BOARD APPROVAL. Of Locally Developed Course. Cisco CCNA Certification 11/12
APPLICATION FOR BOARD APPROVAL Of Locally Developed Course Cisco CCNA Certification 11/12 John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed Cisco CCNA Certification 11/12 PREAMBLE: The
More informationCCNA DATA CENTER BOOT CAMP: DCICN + DCICT
CCNA DATA CENTER BOOT CAMP: DCICN + DCICT COURSE OVERVIEW: In this accelerated course you will be introduced to the three primary technologies that are used in the Cisco data center. You will become familiar
More informationAnn Beheler Karl Dietrich Ernie Friend Eliazar Martinez Bill Saichek
Introductions Ann Beheler, Convergence Technology Center (CTC), Frisco, TX Karl Dietrich, Lansing Community College, Lansing, MI Ernie Friend, Florida State College, Jacksonville, FL Eliazar Martinez,
More informationvsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationConfiguring iscsi Multipath
CHAPTER 13 Revised: April 27, 2011, OL-20458-01 This chapter describes how to configure iscsi multipath for multiple routes between a server and its storage devices. This chapter includes the following
More informationLab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
More informationSession Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario
Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME Scenario With the scheduled release of Packet Tracer v5.3 in the near future, this case study is designed to provide you with an insight into
More informationISOM3380 Advanced Network Management. Spring 2014 15. Course Description
ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop
More informationCisco Active Network Abstraction Gateway High Availability Solution
. Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and
More informationAdvanced VMware Training
Goals: Demonstrate VMware Fault Tolerance in action Demonstrate Host Profile Usage How to quickly deploy and configure several vsphere servers Discuss Storage vmotion use cases Demonstrate vcenter Server
More informationPT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
More informationConfiguring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
More informationLab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
More informationhttp://computernetworkingnotes.com/ccna-study-guide/cisco-ios-naming-convention-explainedwith-examples.html
IOS is the most critical part of any cisco device. We should always keep a backup copy of IOS to deal with any unwanted situation. In this article I will explain the backup and restore process of IOS in
More informationUnderstanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led
Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Course Description Understanding Cisco Cloud Fundamentals (CLDFND) v1.0 is a five-day instructor-led training course that is designed
More informationImplementing and Managing Windows Server 2008 Hyper-V
Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:
More informationISERink Installation Guide
ISERink Installation Guide Version 1.1 January 27, 2015 First developed to support cyber defense competitions (CDCs), ISERink is a virtual laboratory environment that allows students an opportunity to
More informationAltor Virtual Network Security Analyzer v1.0 Installation Guide
Altor Virtual Network Security Analyzer v1.0 Installation Guide The Altor Virtual Network Security Analyzer (VNSA) application is deployed as Virtual Appliance running on VMware ESX servers. A single Altor
More informationIncluding Real Networking Hardware in the Modeling and Simulation (M&S) Environment.
Provost s Learning Innovations Grant for Faculty Special Request for Proposal Course Development 2009-2010 Project Title: Including Real Networking Hardware in the Modeling and Simulation (M&S) Environment.
More informationVMware Data Recovery. Administrator's Guide EN-000193-00
Administrator's Guide EN-000193-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product
More informationF5 BIG-IP V9 Local Traffic Management EE0-511. Demo Version. ITCertKeys.com
F5 BIG-IP V9 Local Traffic Management EE0-511 Demo Version Question 1. Which three methods can be used for initial access to a BIG-IP system? (Choose three.) A. Serial console access B. SHH access to the
More informationWilliam Saichek Professor, Computer Science & Information Systems Orange Coast College
William Saichek Professor, Computer Science & Information Systems Orange Coast College What is Cloud Computing What is Cloud Computing The Internet is NOT the cloud Virtualization is NOT the cloud Storage
More informationNetworking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG
Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments
More informationVoIP Conformance Labs
VoIP acceptance, VoIP connectivity, VoIP conformance, VoIP Approval, SIP acceptance, SIP connectivity, SIP conformance, SIP Approval, IMS acceptance, IMS connectivity, IMS conformance, IMS Approval, VoIP
More informationWIDE AREA NETWORKS: A COMPARISON OF DIFFERENT APPROACHES FOR HANDS-ON LABS
WIDE AREA NETWORKS: A COMPARISON OF DIFFERENT APPROACHES FOR HANDS-ON LABS Dr. Rami Khasawneh, Chair, Department of Information Technology Management, Lewis University, khasawra@lewisu.edu Dr. Rad Alrifai,
More informationLab 2 - Basic Router Configuration
CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how
More informationM.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
More informationSaving Time & Money Across The Organization With Network Management Simulation
Saving Time & Money Across The Organization With Network Management Simulation May, 2011 Copyright 2011 SimpleSoft, Inc. All Rights Reserved Introduction Network management vendors are in business to help
More informationEase Server Support With Pre-Configured Virtualization Systems
Ease Server Support With Pre-Configured Virtualization Systems Manufacturers and industrial production companies are increasingly challenged with supporting the complex server environments that host their
More informationEMC Integrated Infrastructure for VMware
EMC Integrated Infrastructure for VMware Enabled by EMC Celerra NS-120 Reference Architecture EMC Global Solutions Centers EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000
More informationAC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS
AC 2009-192: A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS Kati Wilson, Texas A&M University Kati is a student in the Electronics Engineering
More informationOverview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6
July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...
More informationPlanning for Information Network
Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making
More informationBuilding a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
More informationDCICT: Introducing Cisco Data Center Technologies
DCICT: Introducing Cisco Data Center Technologies Description DCICN and DCICT will introduce the students to the Cisco technologies that are deployed in the Data Center: unified computing, unified fabric,
More informationLab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team
More informationHoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
More informationCCNA Discovery: Designing and Supporting Computer Networks
CCNA Discovery: Designing and Supporting Computer Networks Overview of Case Studies Karen Alderson kalderso@cisco.com 1 CCNA Discovery Course Sequence CCNA Discovery Networking for Home and Small Businesses
More informationCourse Outline. Core Solutions of Microsoft Lync Server 2013 Course 20336B: 5 days Instructor Led. About this Course.
Core Solutions of Microsoft Lync Server 2013 Course 20336B: 5 days Instructor Led About this Course This instructor-led course teaches IT professionals how to plan, design, deploy, configure, and administer
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
More informationMigrating to ESXi: How To
ILTA Webinar Session Migrating to ESXi: How To Strategies, Procedures & Precautions Server Operations and Security Technology Speaker: Christopher Janoch December 29, 2010 Migrating to ESXi: How To Strategies,
More informationImplementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**
Course: Duration: Price: $ 4,295.00 Learning Credits: 43 Certification: Implementing and Troubleshooting the Cisco Cloud Infrastructure Implementing and Troubleshooting the Cisco Cloud Infrastructure**Part
More informationVMware vsphere 5.0 Evaluation Guide
VMware vsphere 5.0 Evaluation Guide Advanced Networking Features TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage....
More informationACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
More informationNEC SigmaSystemCenter 3.0 highlights
NEC SigmaSystemCenter 3.0 highlights NEC Corporation 2nd IT Software Division IT Network Global Solutions Division Sept. 2011 NEC SigmaSystemCenter 3.0 highlights Cloud Management Multitenancy Resource
More informationCisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c
More informationCapstone Project Putting It All Together
Capstone Project Putting It All Together Objectives Understand the steps involved in planning and implementing a technical solution for a small business. Gather relevant information to help devise a technical
More informationvsphere Upgrade Update 1 ESXi 6.0 vcenter Server 6.0 EN-001804-02
Update 1 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
More informationRemote PC Guide for VMware Implementation Using ESXi versions 4.01 and 4.1 U2 with vcenter
Remote PC Guide for VMware Implementation Using ESXi versions 4.01 and 4.1 U2 with vcenter Document Version: 2012-06-29 This guide is a primer for adding remotely accessible PC or servers into your NETLAB+
More informationAC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.
More informationVMware vrealize Operations for Horizon Administration
VMware vrealize Operations for Horizon Administration vrealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationOutline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization
Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationVIRTUAL DESKTOP INFRASTRUCTURE TECHNOLOGY BASED STUDY & RESEARCH
International Journal of Education and Research Vol. 1 No. 4 April 2013 VIRTUAL DESKTOP INFRASTRUCTURE TECHNOLOGY BASED STUDY & RESEARCH Regina Miseviciene (Corresponding author) Associate Professor, Department
More informationVM-Series Firewall Deployment Tech Note PAN-OS 5.0
VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5
More informationLab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
More informationSonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
More informationSolution for private cloud computing
The CC1 system Solution for private cloud computing 1 Outline What is CC1? Features Technical details System requirements and installation How to get it? 2 What is CC1? The CC1 system is a complete solution
More informationConfiguring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)
Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management
More informationDirect Attached Storage
, page 1 Fibre Channel Switching Mode, page 1 Configuring Fibre Channel Switching Mode, page 2 Creating a Storage VSAN, page 3 Creating a VSAN for Fibre Channel Zoning, page 4 Configuring a Fibre Channel
More informationApache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
More information