Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: 223994 www.n4c.eu What TCD and.

Slides:



Advertisements
Similar presentations
Internet Applications INTERNET APPLICATIONS. Internet Applications Domain Name Service Proxy Service Mail Service Web Service.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Module 5: Configuring Access for Remote Clients and Networks.
Firewalls and Intrusion Detection Systems
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
B.Sc. Multimedia ComputingMedia Technologies Database Technologies.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 2: Application layer  2.1 Web, HTTP and HTML (We will continue…)  2.2 FTP  2.3 SMTP 9/22/2009 Lecture 7, MAT 279, Fall
Remote Access SSL VPN Stewart Duncan Technical Manager.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Setting up Your New Mail Domain in MS Outlook and Outlook Express By CS Ling (Global Visibility Solution)
 Distributed Software Chapter 18 - Distributed Software1.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
IT:Network:Applications Fall  Running one “machine” inside another “machine”  OS in Virtual machines sees ◦ CPU(s) ◦ Memory ◦ Disk ◦ USB ◦ etc.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Chapter 7: Using Windows Servers to Share Information.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
IS 247 Introduction to Web Application Development Tim Wu.
About Dynamic Sites (Front End / Back End Implementations) by Janssen & Associates Affordable Website Solutions for Individuals and Small Businesses.
DTN Disconnectathon July 29, 30 and Stockholm / North America Will Ivancic
Chapter 6: Packet Filtering
Chapter 13 – Network Security
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Drupal Jumpstart Information Systems 337 Prof. Harry Plantinga.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
PostalOne! / FAST Data Exchange - Vision 02/15/05.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Proxy Server PROXY SERVER. What is a Web Proxy? Proxy Server A proxy is a host which relays web access requests from clients Used when clients do not.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Chapter 3: Services of Network Operating Systems Maysoon AlDuwais.
APTLD Meeting APNIC’s Experience with IPv6 24 February 2009, Manila Arth Paulite – APNIC.
ICN and DTN NetInf over BP using BPQ Elwyn Davies Folly Consulting Ltd/Trinity College Dublin or
TCP/IP (Transmission Control Protocol / Internet Protocol)
Technical Kick off meeting Grosuplje September Integration Preparation António Cunha – Pedro Nunes Institute Networking.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
Client – Server Architecture A Basic Introduction 1.
BPQ – IETF-81 Bundle Protocol Query Extension Block draft-farrell-dtnrg-bpq-00 Stephen Farrell Aidan Lynch
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Adding and Modifying Accounts in Microsoft ® Outlook Express ™, and modifying connection settings in Microsoft ® Internet Explorer ™.
XXIII HTASC Meeting – CERN March 2003 LIP and the Traveling Physicist Jorge Gomes LIP - Computer Centre.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
SCS Infrastructure Upcoming Changes Topics Why we’re doing this Why we’re doing this Existing architecture Existing architecture Sendmail.
Chapter 7: Using Windows Servers
Application layer tcp/ip
INTERCEPTION APPLICATION
WSU Linux Users Group By Haven Hash
TYPES OF SERVER. TYPES OF SERVER What is a server.
Internet Applications
How to Add Your Gmail Account to Outlook 2013 Using IMAP settings? | Call
Topic 5: Communication and the Internet
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Chapter 27: System Security
INTERNET APPLICATIONS
Presentation transcript:

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: What TCD and Intel did Summer 2009 IETF-76 DTNRG Kerry Hartnett (Intel) Eoin Meehan (TCD) Stephen Farrell (TCD) Alex McMahon (TCD) Darragh O’Keeffe(TCD)

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: DTN design DTN2 Static routing setup – Route from Router -> Mule -> Relay > GW > Basil (TCD) Setup multiple routes from all routers to all mules and all gateways and also to Nomadic mail for roaming mail test.

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: DTN design Village Router 1 “Bob” Village Router 2 “Alice” TCD Data Mule LTU Data Mule 1 LTU Data Mule 2 TCD Internet Relay Internet TCD Basil VPN Tunnel Internet SSH Tunnel Folly Rosebud Internet Web Queries LTU Internet Gateway Folly n810s

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: Saltoluokta – Location of Router WEB and Mule transporter Mule 901 Atom eeePC Gateway DTN Relay In Ritsem

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: Applications WEB Application to take either public or Private web Requests e.g. – WEB front end, MySQL DB, Cookie tracking for security – Middleware – Wget to level 1 on web site and TarBall results back to router and unzip into directory structure via the mule.

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: Applications – provided by mail servers hosted on the router – IMAP Server – Dovecot - User account IDs “fixed” eg user001, user002, etc – SMTP Server – Postfix – Outgoing mail Internal routing rule sends to “dtndrop” service, a script which invokes dtnsend 1 per bundle Tracks bundle ID and requests ack from the DTN – Incoming mail Village Router and Basil both “village.n4c.eu” Timed process to sync imap mail stores via tarballs over DTN

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: Timeline 27 th Jul – Shipping to Lulea took 7 days. 2 nd Aug - Travel to Lulea to setup and test 7 th Aug – Drive to Ritsem, testing – Setup hiker user s and made some WEB requests 9 th - Helicopter to Saltoluokta, setup again 11 th Completed 2 full return rotations 12 th Hikers arrive in Saltoluokta and check and WEB requests 13 th Packup and move to Staloluokta, setup system and users pickup more mail. 15 th Home!

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: Results We were able to send and receive mail We were able to send WEB requests and receive back level 1 pages without pictures. Portable Solar stand worked very well, box was water proof and robust, small solar panels good. – Solar charging worked as expected Routing worked, remote access to Mule when in Ritsem from TCD

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement: Findings Working on extracting data from logs to show volume and delays – We have a bunch of changes to do to the apps and a few for DTN2 Note: still some oddities I don't understand – Clock issues, log-extraction issues – Work ongoing to validate this stuff – Caveat lector!

Networking for Communications Challenged Communities: Architecture, Test Beds and Innovative Alliances Grant Agreement:

Plans Write it up properly somewhere Summer 2010 test – Aiming for 3 months – 5 village routers – 6 mules (helicopters) – 2 gateways – Improved apps – Some management