The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Ljubomir Ivaniš CPU d.o.o.
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
DESIGN AND IMPLEMENTATION OF SOFTWARE COMPONENTS FOR A REMOTE LABORATORY J. Fernandez, J. Crespo, R. Barber, J. Carretero University Carlos III of Madrid.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Deliver your Technology-Based Labs with VMware Lab Manager 5/6/2010 Michael Fudge.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Introducing VMware vSphere 5.0
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
VMware vCenter Server Module 4.
Cloud computing Tahani aljehani.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
1 MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Avin Chen Borokhovich Michael Goldfeld Arik.
SUNY IT Master's Project Using Open Source Virtualization Technology In Computer Education By: Ronny L. Bull Advised By: Geethapriya Thamilarasu, Ph.D.
Additional SugarCRM details for complete, functional, and portable deployment.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Data Center Network Redesign using SDN
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Intranet, Extranet, Firewall. Intranet and Extranet.

An Introduction to IBM Systems Director
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
V IRTUALIZATION Sayed Ahmed B.Sc. Engineering in Computer Science & Engineering M.Sc. In Computer Science.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Politecnico di Torino Dipartimento di Automatica ed Informatica TORSEC Group Performance of Xen’s Secured Virtual Networks Emanuele Cesena Paolo Carlo.
INTRODUCTION TO VIRTUALIZATION KRISTEN WILLIAMS MOSES IKE.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Advanced Topics StratusLab Tutorial (Orsay, France) 28 November 2012.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Sumit Kumar Archana Kumar Group # 4 CSE 591 : Virtualization and Cloud Computing3/3/2011.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
Microsoft Azure Active Directory. AD Microsoft Azure Active Directory.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
R. Krempaska, October, 2013 Wir schaffen Wissen – heute für morgen Controls Security at PSI Current Status R. Krempaska, A. Bertrand, C. Higgs, R. Kapeller,
2: Operating Systems Networking for Home & Small Business.
Group # 14 Dhairya Gala Priyank Shah. Introduction to Grid Appliance The Grid appliance is a plug-and-play virtual machine appliance intended for Grid.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Networking Week #10 OBJECTIVES Chapter #6 Questions Review Chapter #8.
Top 5 Open Source Firewall Software for Linux User
StratusLab Tutorial (Bordeaux, France)
Lab 1 introduction, debrief
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
Acutelearn Azure Administration Training in Hyderabad Classroom Training Instructor led trainings at Acutelearn premises Corporate Training Custom tailored.
Cloud Computing ISY143.
An introduction to the Linux environment v
AbbottLink™ - IP Address Overview
Cloud Computing: Concepts
Presentation transcript:

The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department of Information Technology

Introduction Thanks to Internet technologies, it is now possible to offer courses (and laboratories) on the web that satisfy all functionalities of conventional courses. Providing hands-on experience by using computer and making exercises on network configurations and security-related issues are essential for Information Technologies education.

The Goal Fully Open Source Virtual Laboratory Remote Access Integration with “CdL online” platform of University of Milan

System Description The system is composed by: e-Learning platform, that allows the access to courses contents, to the Virtual Lab and the interactions with tutors and teachers; Virtual Laboratory, that implements an informatics laboratory which provides students with a real working environment; it consists of a VMs pool, a virtualization server and a firewall; student web browser, that allows to connect and interact with the platform and runs an applet to connect to the assigned VM.

Virtual Lab Framework The system framework of Virtual Lab can be examined focusing on three aspects:  Hardware  Virtualization software  Virtual Machines

Hardware Two different real machines: 1. Virtual Lab Server with Spacious storage Big RAM memory 2. Firewall Preserve virtual server performance Increment system security Isolate virtual machines from external environment

The Virtualization Software: Xen Created by University of Cambridge Its paravirtualized virtual machine monitor ( hypervisor ) permits to achieve performance close to native hardware.

Virtual Machines Virtual Machine is an isolated duplicate of a real machine VM works in a sealed environment VMs are based on Gentoo Linux distribution

Network Configuration Students of the same academic year share the same subnet Static IP ( x) is assigned to each VM VMs share a common gateway

Firewall Configuration Protect the server from external attacks Isolate VMs from the external net  A VM can communicate with any VM on any port  Only ssh connections with the external net are permitted Connections from student computer are forwarded to the relative VM  Each student is associated to a specific server port

System Architecture

Platform connection (1) VMs on demand  VM activation: based on student ID Open a ssh session  Start a ssh client applet (MindTerm) Stop VMs when students close ssh session

Platform connection (2)

Future Works Enhancement in VMs management  Nightly back-up of students home directory  Scripts for software updates and new packages installation New and more complex network topologies  Each student will own a private subnet (e.g. three VMs that act as client computer, web server, and firewall)

Thank You!