Low Level Architecture

Slides:



Advertisements
Similar presentations
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Advertisements

DESIGN AND IMPLEMENTATION OF SOFTWARE COMPONENTS FOR A REMOTE LABORATORY J. Fernandez, J. Crespo, R. Barber, J. Carretero University Carlos III of Madrid.
A LabVIEW-based soundcard interface for e-laboratory Ţepelea Laviniu 1, Gavriluţ Ioan 1, Neamţu Ovidiu 1, Gergely Eugen 1, Gacsádi Alexandru 1 1 University.
TAG Cloud® 1 TAG-Org The vision of Dr. Talal Abu-Ghazaleh, the Chairman of TAGORG, was to establish, run and maintain the first Arab Comprehensive.
A SOLUTION: 2X REMOTE APPLICATION SERVER. 2X REMOTE APPLICATION SERVER.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
Wireless Network Security Virtual Laboratory Anthony LoBono, Mike Steffen, and Shishir Gupta Advisor: Doug Jacobson Client: George Amariucai.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
1 MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Avin Chen Borokhovich Michael Goldfeld Arik.
Comprehensive IT Consulting Services an innovative approach to business.
Wireless Network Security Virtual Lab Team sdDec11-10 Shishir Gupta, Anthony Lobono, Mike Steffen Client Dr. George Amariucai Advisor Dr. Doug Jacobson.
IT Tech Recording and Virtual Machines Doug Waterman.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Introduction to VMware Virtualization
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
Computing on the Cloud Jason Detchevery March 4 th 2009.
Case Study 2 – TeraBit Inc. DMico Johnson Hans Schmidt.
Planning and Designing Server Virtualisation.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Middleware at HVA Assignment 4.5 Brian Samson & Peter Troon.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Virtual Infrastructure By: Andy Chau Farzana Mohsini Anya Mojiri Virginia Nguyen Bobby Phimmasane.
Communications & Networks National 4 & 5 Computing Science.
Summary We had used and the need to learn and implement using the software of Microsoft Visual Studio 2008 into our system upgrade. The report documents.
Virtual Desktop Infrastructure
Wireless Network Security Virtual Lab Team sdDec11-10 Shishir Gupta, Anthony Lobono, Mike Steffen Client Dr. George Amariucai Advisor Dr. Doug Jacobson.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
Assignment # 3 Networking Components By: Jeff Long.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Introduction to Networks BTEC Nat Bus - Principles of Networking 1.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
The Docker Container Approach to Build Scalable and Performance Testing Environment Pankaj Rodge, VMware.
Unit 3 Virtualization.
VMware ESX and ESXi Module 3.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Chapter 6: Securing the Cloud
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Virtual Network Computing
3.2 Virtualisation.
3.2 Virtualisation.
Java Embedded Network Intrusion Security
Chapter 16 Designing Distributed and Internet Systems
NTC 324Competitive Success/tutorialrank.com
NTC 324 RANK Lessons in Excellence-- ntc324rank.com.
NTC 324 Education for Service-- tutorialrank.com.
NTC 324 Teaching Effectively-- snaptutorial.com
NTC 324 RANK Education for Service-- ntc324rank.com.
Dr. John P. Abraham Professor, Computer Engineering UTPA
Towards OPEN SUNY: A Novel On-line Learning Approach for Electrical and Computer Engineering and Engineering Technology Students By Dr. Mohammed Abdallah.
Towards OPEN SUNY: A Novel On-line Learning Approach for Electrical and Computer Engineering and Engineering Technology Students By Dr. Mohammed Abdallah.
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Delivering Distance Learning Experiments in Local Area Networking
Virtual Private Networks
CS 160 Introduction to Computer Science
An Embedded Systems Course and Course
Resources and Schedule
Cloud Computing LegalRun Solutions Why It’s Right for You!
Client/Server and Peer to Peer
 Is a machine that is able to take information (input), do some work on (process), and to make new information (output) COMPUTER.
The Virtual Cell Project
Presentation transcript:

Low Level Architecture Introduction Introduction Introduction Design Design Problem: Iowa State University’s Computer Engineering 537: Wireless Network Security class does not have a laboratory environment in which students, both distance education and local, can safely conduct experiments. Solution: Create an environment which is accessible from anywhere in the world using real wireless hardware and a virtual machine server, and provide the software tools necessary for conducting experiments on wireless security protocols. The purpose of this project is to provide the students enrolled in Computer Engineering 537: Wireless Network Security with a laboratory for carrying out experiments on different wireless protocols that is accessible from anywhere in the world. The purpose of this project is to provide the students enrolled in Computer Engineering 537: Wireless Network Security with a laboratory for carrying out experiments on different wireless protocols that is accessible from anywhere in the world. The wireless security lab environment was designed to be used from anywhere in the world with an internet connection. The environment consists of physical wireless hardware, and one physical server. The server runs VMware's ESXi hypervisor to allow for the use of virtual machines. Each student will be assigned two virtual machines. One for generating legitimate network traffic, and one for experimenting with wireless security. Each user will also be able to select what wireless hardware he or she would like to used from a list of available hardware. Requirements Low Level Architecture Non-Functional User-friendly Real –world simulation Adequate bandwidth Comprehensive documentation Highly extensible [to support different wireless technology] Functional Remote access over the internet Support for up to four concurrent users Hardware control for the user Non-interference between users High Level Architecture Summary We are confident that the choices we have made in the design of this system are the best choices in terms of functionality per dollar. Every decision was made with the idea of creating the most versatile lab environment within a reasonable budget. Using open source software allows us flexibility in choosing an operating system and costs us nothing. Opting for a virtual environment allows for greater system uptime along with keeping overall hardware costs down. Members : Anthony Lobono Mike Steffen Shishir Gupta Client: George Amariucai Advisor: Doug Jacobson