04/07/06 DePaul University - Teaching and Technology Conference Remote Networking Labs for Hands-on Exercises James Yu, Ph.D. Scholl of CTI DePaul University.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Prepared By Naieem Khan & Ummiya Rahman Presentation On.
Southampton Open Wireless Network The Topology Talk.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
SIS - Security Lab Introductory Session University of Pittsburgh 2006.
Chapter 9: Troubleshooting and Repairing Networking.
Upgrading Remote Access to the Analog Model Power System Amrit Dahal Ryan Litzko Client: Dr. Brian Johnson, ECE Dept. ECE 544: Control Systems and Critical.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
COEN 252: Computer Forensics Router Investigation.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Advanced Networking for DVRs
Workshop 1: Introduction to TCP/IP
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Unleashing Mobile Broadband WiPipe Central MANAGED SERVICES Secure, Manage, & Maintain the Edge of the 3G/4G Network.
9/8/2015 CSC426 1 Network Research at CDM James Yu, Ph.D. Associate Professor School of Computing
1 Creating a Virtual Laboratory to Teach Information Assurance Courses Online Dr. Wayne Summers & Dr. Bhagyavati Columbus State University Columbus, Georgia.
COMP 6005 An Introduction To Computing Session Two: Computer Software Systems Software.
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
Week 1 – Seneca Networking Environment. Agenda Overview of Seneca Server names How to access servers Terminal Emulation (Putty) Browser – IE, Netscape,
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
1 Linux Basics for Networking. 2 Module - Linux Basics for Networking ♦ Overview This module focuses on the basics of networking using Redhat Enterprise.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Confidential Configuring Attendant Console.
Project Presentation Supervisor:Prof Dr Zubair Ahmad Khan Group : Inaamul-Haq-Mansoor (Leader) (S454845) Nadeem (S454843) Kamran Khaliq (S455118) Ghulam.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Module 9 Authenticating and Authorizing Users. Module Overview Authenticating Connections to SQL Server Authorizing Logins to Access Databases Authorization.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
NuolSec VIspace Vientiane, Laos.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Jonathan Loving Fermi Lab Computing Division
1 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Amsterdam, DEC 4, 2006 Jörg Keller FernUniversität in Hagen,
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
NetTech Solutions Common Connectivity Problems Lesson Eight.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
SIS - Security Lab Introductory Session University of Pittsburgh 2008.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
24 Feb 2009ITCN 1 Introduction to Computer Networking M Clements.
Price range varies from $17.99 to $34.99 or more. Device 1 Device 2 Network Connection.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Queensland University of Technology Nagios – an Open Source monitoring solution and it’s deployment at QUT.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Unleashing Mobile Broadband WiPipe Central MANAGED SERVICES Secure, Manage, & Maintain the Edge of the 3G/4G Network.
The Challenges of Teaching an Interdisciplinary IA Course Rose Shumba Indiana University of Pennsylvania EPASEC 2006.
07/28/2016 EEE'16 1 Supporting Hands-on Networking Lab Exercises for On-Line Students James T. Yu, Ph.D. DePaul University
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
CSCE 548 Student Presentation By Manasa Suthram
Centralized Management for Barracuda Networks products
Instructor Materials Chapter 9: Testing and Troubleshooting
Introduction to Networking
Unit 27: Network Operating Systems
Network Research at CTI
Network Research at CTI
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
– Chapter 3 – Device Security (B)
Lock and Key by Linda Wier 2/23/2019.
Online Learning.
RAC Networking Lab.
Presentation transcript:

04/07/06 DePaul University - Teaching and Technology Conference Remote Networking Labs for Hands-on Exercises James Yu, Ph.D. Scholl of CTI DePaul University

04/07/06 DePaul University - Teaching and Technology Conference General Problem Description Limited resources (network labs) that need to be available to the students from any place (via the public Internet) at any time (24×7) Limited resources (network labs) that need to be available to the students from any place (via the public Internet) at any time (24×7) The resource cannot be shared. Only one student can use one resource (network device) at a time while many students may try to access the resource (especially right before the assignment due time) at the same time. The resource cannot be shared. Only one student can use one resource (network device) at a time while many students may try to access the resource (especially right before the assignment due time) at the same time.

04/07/06 DePaul University - Teaching and Technology Conference Needs and Challenges Hands-on networking exercises are important for students learning. The lab practice confirms their understanding of the theories. Hands-on networking exercises are important for students learning. The lab practice confirms their understanding of the theories. The school needs a networking environment that is available to the students 24×7, but it is impossible to staff lab assistants for it. The school needs a networking environment that is available to the students 24×7, but it is impossible to staff lab assistants for it. The school has a growing number of distance learning students who cannot be physically at the loop campus, but they also need hands-on experience. The school has a growing number of distance learning students who cannot be physically at the loop campus, but they also need hands-on experience. Any time, any place, and always available. Any time, any place, and always available.

04/07/06 DePaul University - Teaching and Technology Conference Solution: Remote Access Terminal Server Internet Router Environment Private, Secure Lab LAN Switch Environment Windows Environment Linux Environment Linux Gateway

04/07/06 DePaul University - Teaching and Technology Conference Example 1: Router Configuration Linux-15 Terminal Server Internet SW03 (1900)SW01 SW02 Router1:2006Router2:2007 Router3:2008 e0/0 e0/1 E0/1 Linux-05 (Gateway)

04/07/06 DePaul University - Teaching and Technology Conference Example 2: Switch Configuration SW SW Linux-14 Linux-05 blocked Objective: Comparison of STP and RSTP configuration and performance. Lab Gateway

04/07/06 DePaul University - Teaching and Technology Conference Example 3: Firewall Configuration Linux-05Linux-06 Linux-15 SW03 SW01 Router & Firewall Windows Web Server Emulate Internet environment SW02 Lab Access Gateway

04/07/06 DePaul University - Teaching and Technology Conference New Challenges Network device configuration can be performed by only one student at a time. Network device configuration can be performed by only one student at a time. Some classes are large, up to 60 students. Some classes are large, up to 60 students. If two students are configuring the same network device at the same time, they will interfere with each other. If two students are configuring the same network device at the same time, they will interfere with each other. There are cases students need shut down a connection to emulate a fail-over scenario. There are cases students need shut down a connection to emulate a fail-over scenario. We need a sign-up procedure that would restrict only one access to each lab session at a time. We need a sign-up procedure that would restrict only one access to each lab session at a time. Real-time lab log is required to monitor all student activities. Real-time lab log is required to monitor all student activities.

04/07/06 DePaul University - Teaching and Technology Conference Lab Scheduling Tool Linux Gateway 1.The Linux gateway also maintains a lab scheduling tool. 2.Each student must reserve a lab session before accessing the lab. 3.Students can reserve and release a lab session from via a friendly web interface. 4.Only authenticated students can reserve a lab session and release his/her own session. 5.The tool allows only a fixed number of lab session for each student. So, a student cannot block too many sessions. 6.

04/07/06 DePaul University - Teaching and Technology Conference On-line Access Control and Lab Log Linux Gateway 1.The lab access is controlled by the Linux gateway. 2.Each student login access is logged on the Linux gateway. 3.Network device access (switch, router, firewall, etc.) is controlled by the modified telnet command which checks student ID before granting device access permission 4.Each telnet session is logged for monitoring purpose.

04/07/06 DePaul University - Teaching and Technology Conference Remote Labs – Current Status TDC363 – Introduction to Local Area Networks TDC363 – Introduction to Local Area Networks TDC365 – Network Interconnction Technologies TDC365 – Network Interconnction Technologies TDC511 – Telecommunications Practicum TDC511 – Telecommunications Practicum TDC564 – Local Area Networks TDC564 – Local Area Networks TDC566 – Broadband Access Technologies TDC566 – Broadband Access Technologies

04/07/06 DePaul University - Teaching and Technology Conference Acknowledgements CTI Networking Labs Support: CTI Networking Labs Support: Dr. Greg Brewster Dr. Greg Brewster Dr. Chonghua Zhang Dr. Chonghua Zhang Yongning Tang Yongning Tang Chibiao Liu Chibiao Liu Quality for Instruction Council (QIC) Grant Quality for Instruction Council (QIC) Grant