DETER Testbed Breakout Final Summary of Priorities Feb 1, 2006.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Virtual Disk based Centralized Management for Enterprise Networks
TIED: A Cluster of One TIED: Trial Integration Environment DETER built on.
ITCR Success through Innovation iTCR Success through Innovation CiTRs DECADE Strategy ä DECADE vision integrated electronic customer access.
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Description Competency standards Duration Learning Learning methods Show visual Learning Managemen System on Moodle Offline Show visual Learning Managemen.
Setting Up a Peer-to-Peer Network For Each PC –Install the Client for Microsoft Networks –This supports peer-peer networking Implement Sharing –In the.
Linux on commodity network H/W Josh Parsons LUGOD talk August 15 th 2005.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
The Challenges of Repeatable Experiment Archiving – Lessons from DETER Stephen Schwab SPARTA, Inc. d.b.a. Cobham Analytic Solutions May 25, 2010.
Trusted Disk Loading in the Emulab Network Testbed Cody Cutler, Mike Hibler, Eric Eide, Rob Ricci 1.
Business Circle Module Implementation/Testing Charles Brexel.
1 Emulab Security. 2 Current Security Model Threat model: No malicious authenticated users, Bad Guys are all “outside” –Protect against accidents on the.
Network Rspecs in PlanetLab and VINI Andy Bavier PL Developer's Meeting May 13-14, 2008.
Implementation Considerations for FAST Search For SharePoint (FS4SP) Presenter : Shyam Narayan MOSSIG – February 2011 Meeting b:
IBM Security Network Protection (XGS)
Emulab Federation Preliminary Design Robert Ricci with Jay Lepreau, Leigh Stoller, Mike Hibler University of Utah USC/ISI Federation Workshop December.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Security Guide for Interconnecting Information Technology Systems
Laptop Survival and Management Help Desk Services Pat Valiquette Mark Miller Campus tools – Fall 2006.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Mobile One-Time Password. Page 2 About Changingtec -Member of group -Focus on IT security software CompanyChanging Information Technology Inc Set upApril.
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
Internal components, Backing Storage, Operating Systems Software
systemhound © Raxco Software Belgium systemhound PC inventory software.
Redes Inalámbricas Máster Ingeniería de Computadores 2008/2009 Tema 7.- CASTADIVA PROJECT Performance Evaluation of a MANET architecture.
Current Network Schema Router Internet Switch PC.
Implementation - Deployment Methods of deployment –User PC –Network shared (workstation install) –Terminal server –Web Deployment (ActiveX) (Note: this.
PCI Compliance Technical Overview. RM PCI Calendar Dec 2005: Began PCI 15.1 development Feb 2006: Initial PCI Audit Sept 2006: Official 15.1 PCI Release.
1 Supporting the development of distributed systems CS606, Xiaoyan Hong University of Alabama.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Paul Scherrer Institut 5232 Villigen PSI HEPIX_AMST / / BJ95 PAUL SCHERRER INSTITUT THE PAUL SCHERRER INSTITUTE Swiss Light Source (SLS) Particle accelerator.
NESDIS/ORA March 2004 IT Security Incident Recovery Plan and Status April 12, 2004 Joe Brust, ORA Technical Support Team Lead.
TRC Mini-Grant 2002 Dell PowerEdge 2500 Server. Project Goals Provide CS students with exposure to Linux (Unix) computing environment in CS courses Provide.
Navigating SQL Server Lesson 3. Skills Matrix Graphical User Interface (GUI) Management Tools SQL Server Management Studio SQL Server Configuration Manager.
PC Maintenance & Networking Material Developed Under DST – NIMAT Project (TEDP) By VidyaDeep Foundation, Satara.
DETER Testbed Status Kevin Lahey (ISI) Anthony D. Joseph (UCB) January 31, 2006.
ABone Architecture and Operation ABCd — ABone Control Daemon Server for remote EE management On-demand EE initiation and termination Automatic EE restart.
Adding Websites to the Internet Explorer trusted sites list in order to log-on to Cozzini websites without any security problems.
1 J. Keller, R. Naues: A Collaborative Virtual Computer Security Lab Amsterdam,Dec 4, 2006 Amsterdam, DEC 4, 2006 Jörg Keller FernUniversität in Hagen,
A Hardware Based Cluster Control and Management System Ralf Panse Kirchhoff Institute of Physics.
Operating Systems Concepts 1/e Ruth Watson Chapter 8 Chapter 8 Network Administrator Ruth Watson.
Server Administration. [vpo_server_admin] 2 Server Administration Section Overview Controlling Management Server processes Controlling Managed Node processes.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
Access Network Devices Remotely— Even if the Network is Down— with Out-of-Band Management.
INFSO-RI ETICS Local Setup Experiences A Case Study for Installation at Customers Location 4th. All Hands MeetingUwe Müller-Wilm VEGA Bologna, Nov.
Who’s On My WiFi Mohan Kumar Puttasiddaiah. Who’s On My WiFi Shows Piggy backer on home or business network. Scans the entire network for every 5 to 10.
Tbare How to Link Another User’s PC to the TBare Inventory Server TBare Training IT - Have a Client on Another PC Link Back to the TBare Inventory Server.
1 Emulab's Current Support For IXPs: An example of support for non-PCs.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
CWIC Development Team Yuanzheng Shao Lingjun Kang Archie Warnock
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Introduction to Barracuda IM Firewall
Anti Virus System i-Specific Anti-Virus Product
Using the jFed tool to experiment from zero to hero
Phare EIONET Centralised Training Session
Methods to overcome corporate firewall restrictions
KARDEX Drive
DETER Testbed Breakout
IBM BPM online Training in Bangalore
ANTHILLPRO online Training at GoLogica
Tips to pass your Check Point CCSA exam Pass your exam successfully html.
TRUST:Team for Research in Ubiquitous Secure Technologies
Interoperability of Digital Repositories
Simplified Development Toolkit
Network monitoring tool.
IP-Spoofing and Source Routing Connections
财务管理案例教学法 研究及示例 ——王遐昌 2006/11/10.
System requirements. Installation. Licensing.
Presentation transcript:

DETER Testbed Breakout Final Summary of Priorities Feb 1, 2006

Priority Group 1 ● Security: – Add GUI for disk wiping support – Leak testing – Full Emulab firewall and e-in-e installation – USB logging disk – Get IDP box working ● Performance: – Explore other physical network topology

Priority Group 2 – Create wiki for user contributions – Create wiki for bug reports, etc. – Incorporate Emulab support for SSH2 – Improve UCB-ISI VPN performance – Incorporate Emulab validation sw,add leak testing – Redo e-in-e implementation – Implement local TFTP/BOOTP server support ● New HW: – New PC nodes – IBM BladeCenter – Routers as first-class objects

Priority Group 3 ● Security – Secure serial line – BIOS – Virus scanning on Boss & Users ● Other – Complete the tools repository – Incorporate Emulab history tools – Create scripts for DB mirroring and reconciliation – Better integration of EMIST tools – Tool for easy migration from other Emulab installs – Implement elab federation using elab-in-elab