University of Michigan Residence Halls Networking In-Room Student Registration System

Slides:



Advertisements
Similar presentations
Implementing Inter-VLAN Routing
Advertisements

1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
CCNPv5 Minimizing Service Loss and Data Theft in a Campus Network 1 Minimizing Service Loss and Data Theft in a Switched BCMSN Module 8 – Sec 2.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Wireless and Switch Security NETS David Mitchell.
System and Network Security Practices COEN 351 E-Commerce Security.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
AutoMAC: A Tool for Automating Network Moves, Adds, and Changes Christopher J. Tengi Princeton University.
Subnetting.
DOMAIN NAMING SYSTEM (AN OVERVIEW) By -DEEPAK. Topics --DNS What is DNS? Purpose of DNS DNS configuration files.
Course 6425A Module 2: Configuring Domain Name Service for Active Directory® Domain Services Presentation: 50 minutes Lab: 45 minutes This module helps.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Network Registration and User Tracking An Open Source Approach Mark Berman Ashley Frost Williams College.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
1 Chapter Overview Understanding Windows Name Resolution Using WINS.
APACHE SERVER By Innovationframes.com »
Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
Name Resolution Domain Name System.
Network Layer – Subnetting and Control Protocols Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
Call Manager Basic Configuration Wael K. Valencia Community College.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Pc Naming Configuration 1.WEB REGISTER 2.FIXNAME 3.MCAFEE AGENT SETUP ITC Training: Session 2.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Exploring How IP Address Protocols Work INTRO v2.0—4-1.
DNS (Domain Name System) Protocol On the Internet, the DNS associates various sorts of information with domain names. A domain name is a meaningful and.
Hands-On Microsoft Windows Server 2008
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
70-411: Administering Windows Server 2012
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
University of Montana - Missoula Adam Ormesher & Chase Maier.
Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Module 4: Fundamentals of Communication Technologies.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Chapter 17 Windows Internet Name Service WINS. WINS A NetBios name server that resolves NetBIOS name to IP addresses Is much like DNS, with clients registering.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Resnet Enhancements and Directions Part 1, Bruce Campbell, Information Systems and Technology.
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
SERVER I SLIDE: 5. Objectie 4.2 The DHCP IP address assignment process.
Module 2: Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
Prepared By: Dr. Mohamed Abdeldayem Reference: Chapter 24 Wade Edwards, CCNP Complete Study Guide, Experiment 12 Configuring PPP on a serial link.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
FS/ILG House Managers IAP 2005 Oliver Thomas Information Services & Technology IAP 2005 Oliver Thomas Information Services & Technology.
Allocating IP Addressing by Using Dynamic Host Configuration Protocol.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
1 Example security systems n Kerberos n Secure shell.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
Pass4itsure Cisco Dumps
File System Implementation
Chapter 6 – Routing.
CAPWAP BOF IETF-57, Vienna Inderpreet Singh
BOOTP and DHCP Objectives
Virtual LANs.
Welcome To : Group 1 VC Presentation
Database Driven Websites
DHCP, DNS, Client Connection, Assignment 1 1.3
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
AbbottLink™ - IP Address Overview
Presentation transcript:

University of Michigan Residence Halls Networking In-Room Student Registration System

Overview 3-tier system (Web/CGI, Oracle Daemon, Java Client) DHCP-based Automated - users provide minimal data Secure - interface-to-daemon communications are encrypted

Communications Campus routers configured to forward DHCP requests to single server DHCP server issues 10.x.x.x addresses, based on network of request origin User connects to internal SSL-protected web page CGI obtains uniqname, MAC, network origin and sends information (protected by Kerberos) to the Oracle daemon

Communications (cont) Oracle daemon matches uniqname to prestuffed student housing data Database maintains linkage between user/location data and MAC/IP address Cron job reads Oracle information and generates a new DHCP configuration file ISC DHCPD server restarted every five min

Registration Diagram

Diagram Guide 1.Client requests IP from DHCP server; server responds with a 10.x.x.x address 2.Client contacts internal, SSL-protected webpage; CGI uses kerberos to authenticate and verify the username and password 3.The CGI sends uniqname, IP address, and OS to the SQL daemon; Sqld does an ARP lookup on the router to determine the MAC address Sqld queries the Group Server to determine if user is allowed to access this specific network Sqld attempts to associate username with prestuffed user location data; if this is not successful, it attempts to fill this data by doing and LDAP query to X If the registration is successful, a new entry is added to the DHCP configuration file, and the client machine is assigned a real, routed IP address which replaces the unrouted 10.x.x.x address. The Java client is an administration tool that allows network administrators to use a GUI to configure and partitions subnets, and to make modifications to student data and IP assignments.

Deployment Results

Drawbacks Users can bypass DHCP and assign themselves a static IP DHCP server must be restarted for updates to take place Users must go to a specific URL to complete the registration Users can not have network access on another network without administrative intervention

Advantages Efficient use of IP space Students are not required to know the MAC address of their NIC Contact/location info is gathered from reliable source rather than having students or consultants enter the data Requires very little administration time beyond initial configuration of networks

Future Directions Improved access control through use of V-LAN configurable switches More feedback and options in the CGI, allowing users to submit changes to their registration Continued development of the java administration tool Modularization of code Allow machines to “roam” on allowed networks