IRLP Remote Node Control

Slides:



Advertisements
Similar presentations
HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
Advertisements

Data Communications and Networking (Third Edition)
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
MOBILITY SUPPORT IN IPv6
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Client Server Model The client machine (or the client process) makes the request for some resource or service, and the server machine (the server process)
IP Routing: an Introduction. Quiz
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
Section 461.  ARP  Ghostbusters  Grew up in Lexington, KY  Enjoy stargazing, cycling, and mushroom hunting  Met Mario once (long time ago)
How to connect your laptop to the classroom wireless AP.
4: Addressing Working At A Small-to-Medium Business or ISP.
Internet-Connected Amateur Radio Systems APRS, D-Star, Echolink, IRLP.
Assignment 3 A Client/Server Application: Chatroom.
Mail Services.
Amateur Radio meets Voice over the Internet Protocol
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
CGI Security COEN 351. CGI Security Security holes are exploited by user input. We need to check user input against Buffer overflows etc. that cause a.
Outline Overview Video Format Conversion Connection with An authentication Streaming media Transferring media.
Vassil Roussev 2 A socket is the basic remote communication abstraction provided by the OS to processes. controlled by operating system.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
Account Forwarding ICS100 David Pai Spring 2007.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Socket Programming.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Networking Components Assignment 3 Corbin Watkins.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
SURVEY VIEWER Note: SURVEY VIEWER functions are now available from the Remote Viewing that is built into HYPACK SURVEY. SURVEY VIEWER still works, but.
A Local Area Network Chat Client ITTC LAN CHAT John Vincent Cecogo Jerikho Daguno Ardee Santos Elaine Mendoza Anjomar Pat Del Mindo Philip John Sales Philip.
1 Example security systems n Kerberos n Secure shell.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
What does LinkConnect do?
Introduction to Network Hardware
The Distributed Application Debugger (DAD)
NAT (Network Address Translation)
Configuring ALSMS Remote Navigation
IP for Mobile hosts.
z/Ware 2.0 Technical Overview
EA C451 Vishal Gupta.
Chapter 6 Delivery & Forwarding of IP Packets
Routing and Switching Essentials v6.0
Mobility And IP Addressing
Introducing To Networking
Client Client 4) Hello , please give me the website
Naming A name in a distributed system is a string of bits or characters used to refer to an entity. To resolve name a naming system is needed.
How Data Flows through the Internet
CS222 Web Programming Course Outline
What is Bash Shell Scripting?
Application layer Lecture 7.
By - Ricardo Sanchez, Ken Wolters and William Hibbard
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast
A Distributed DoS in Action
Setting Up Firewall using Netfilter and Iptables
TCP/IP Networking An Example
Software Engineering for Internet Applications
TA: Donghyun (David) Kim
AbbottLink™ - IP Address Overview
Chapter 11: Network Address Translation for IPv4
Executing Host Commands
Virtual Private Network
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

IRLP Remote Node Control 2007 VoIP Conference Las Vegas, NV Jim – K6JWN / Bill – W6CBS

What will be covered here… What is it? What makes up RNC?? lcSrv Security lcClient lcHandOff custom_decode entries How it all works together Follow along.. Demo (If possible) Future Plans

What is it? Set of scripts (client and server) that allow a node to be controlled from a mobile user entering DTMF on their local repeater (as long as there is an IRLP node attached and is running the client on their side) For Example, a mobile user in San Francisco can control a node/repeater set 100 miles away through the internet. I can control a repeater in Hawaii from the comfort of my chair! Commands are sent over the internet to the remote node Remote node processes DTMF locally (using decode) or generates the DTMF (dtmfdial) Uses are endless, you can use it to control remote bases, remote IRLP nodes, remote repeater controllers, etc.

What makes up RNC?? RNC uses a set of perl scripts, a few client side scripts and a single server side script. lcSrv lcClient lcHandOff custom_decode entries

lcSrv Server side listener, accepts connections on TCP port 7070, runs under repeater user Requires a new port forward entry for those nodes behind a router OPEN TO THE PUBLIC!! Processes incoming commands and then takes care of executing the decode or dtmfdial command.

lcSrv Security lcSrv listens on a public TCP port for connections, (7070) Runs under user repeater Once a connection is established, the process does 3 things Checks the remote IP address against the host file to see if it’s an IRLP IP. If it’s not matched, the connection is immediately closed If the IP is matched, it then looks up the IP to get the stnxxxx id The stnxxx id is verified against an authorizedNodes file to make sure it’s able to send commands, if the node isn’t found, the connection is immediately closed

lcSrv Security (con’t) Once we have the connection and all the checks are passed, we then do some processing on the command to make sure it’s valid (and prevents the program from allowing anything to be run on your node – root hacks, shell access, etc) The command is checked to make sure there are valid DTMF characters, 0-9, A-D, S (*) and P (#). If illegal characters are found, the connection is closed.

lcClient Runs on the client node, takes user DTMF and passes it along for processing. Maintains a list of prefix->IRLP matches Ex: Prefix 123 maps to stn3598 Any commands that start with 123 will be directed to stn3598 for processing (123S73 would tell node 3598 to disconnect) Commands are sent directly to the remote nodes. You can assign repeater prefixes to allow this package to send commands to remote repeaters.

lcHandOff Takes input from the user entered DTMF and then sends it to lcClient in a multiple argument command. Ex: User enters 123S73 lcHandOff sends 123S 73 to lcClient lcClient matches 123S to node 3598 and sends decode 73 towards that node. We’ll go over that a bit more in the example.

custom_decode entries Here is a quick example on how to set up your custom_decode for RNC. 123P*) # Regenerate DTMF via Node 3598 ${CUSTOM}/lcHandOff $1 exit 1 ;; 123S*) # Send IRLP Decode via Node 3598 Create other entries for nodes you want to capture.

custom_decode entries Bovine Network uses: IDS<cmd> – Always used for IRLP node decoding IDP<cmd> – Always used for repeater controlling – the repeater’s prefix is appended when the command it sent out ID0<cmd> – Always used for DTMF regeneration (for attached Echolink Nodes, or anything attached that can be controlled without a prefix)

How it all works together Mobile user keys up to their node and enters 123*73 on the repeater attached to node 1234 The command 123S73 is sent off to lcHandOff lcHandOff takes 123S73 and sends it to lcClient as 123S 73 lcClient looks up 123S using its built in prefix to node map lcClient find that 123S matches node 3598 lcClient then sends decode 73 to the lcSrv process running on Node 3598 Node 3598 looks up the IP address and sees that it’s coming from node 1234 Node 3598 disconnects from whatever its connected to.

How it all works together (con’t) Mobile user keys up to their node and enters 123PABC on the repeater attached to node 1234 The command 123PABC is sent off to lcHandOff lcHandOff takes 123PABC and sends it to lcClient as 123P ABC lcClient looks up 123P using its built in prefix to node map lcClient find that 123P matches node 3598 and the repeater attached to node 3598 has a preaccess of 456 lcClient then sends dtmfdial 456PABC to the lcSrv process running on Node 3598 Node 3598 looks up the IP address and sees that it’s coming from node 1234 Node 3598 then uses dtmfdial to send 456PABC to the repeater attached and the controller sends the temperature.

Demonstration

Future Plans The function of lcHandoff will be integrated into lcClient Command string sent to lcSrv will be limited to prevent the ability to send buffer overruns (another security feature) Whatever Bill needs to help him support the network and allow him to maintain things from the comfort of his home.