LAWN Ron Rusnak The University of Chicago Networking Services and Information Technologies.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Encrypting Wireless Data with VPN Techniques
Barracuda Link Balancer Link Reliability and Bandwidth Optimization.
Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
CN Objectives of the course To build and maintain a UNIX-based Network Systems & Servers Install Linux, fine tune the system, enable required server,
Enterprise Architecture in Action Bill Branson Director, Information Technology Architecture Frank Russell Company.
OpenFlow : Enabling Innovation in Campus Networks SIGCOMM 2008 Nick McKeown, Tom Anderson, et el. Stanford University California, USA Presented.
© 2011 Georgia Institute of Technology OpenFlow/SDN at Georgia Tech Russ Clark in collaboration with Ron Hutchins, Nick Feamster, and Matt Sanders July.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
CS 284a, 7 October 97Copyright (c) , John Thornley1 CS 284a Lecture Tuesday, 7 October 1997.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
Thin Client vs. Desktop Advantages and Disadvantages of Operating System Environments.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
SERVER INTEGRATION. OVERVIEW In our project we are integrating Widows server to facilitate interaction between diverse operating systems and applications.
Client/Server Architectures
The PC Evolution  Began in the late 1970’s with the development of 4 bit and 8 bit microprocessors  Market penetration started with the MAC and IBM PC.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
F5’s BIG-IP Blade Controller - The Essential Software for Blade Server Systems May 2002 John Bigelow Vice President & General Manager, Software Business.
Chapter review Chapter 5 test.
Introduction To Computer System
9/17/20151 IPv6 Challenge or The Challenge of IPv6 Internet 2 IPv6 Working Group Dale Finkelson Michael Lambert.
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
TCP/IP Protocols Dr. Sharon Hall Perkins Applications World Wide Web(HTTP) Presented by.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Class 2 Agenda Networking Basics Networking Basics Nestle Case Nestle Case Text Chapter Review Text Chapter Review.
P.1 LOC Web Strategy  The Library has approved a web strategy that focuses effort on the Library’s three core areas: Legislative Information, National.
Mr. Thilak de Silva. BSc. Eng., MSc, CEng, FIE(SL), FIET(UK), CITP(UK), MBCS(UK), MIEEE (USA) M.Sc. in IT - Year 1 Semester II
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
SBox is a Unique Package that maximize the interaction between instructors and students in easy reliable,efficient way. Sbox is Devided into 4 main parts.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Chapter 7 Backbone Network. Announcements and Outline Announcements Outline Backbone Network Components  Switches, Routers, Gateways Backbone Network.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Mark Shtern.  Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from.
Back in THE EYEOS PROJECT CREATING OUR PRIVATE CLOUD.
LO1 Know types of Network Systems and Protocols. Application Layer Protocols.
Panther Media for Large Scale Development Network Architecture.
WLAN In Disaster and Emergency Response (WIDER) MidTerm Presentation.
TOPIC 7.0 LINUX SERVICES AND CONFIGURATION. ROOT USER Root user is called “super user” because it has power far beyond those of mortal user. As root,
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
Chapter 1: Introduction to Linux. 2 Introduction Computer Components: –Hardware –Software Types of hardware and software Important components of an OS.
Research Computing at the SSCC. What We Do Provide computing support of Social Science researchers. Focus on statistical computing.
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
ISP-in-a-box A portable ISP solution Team19 Iplu Saha Mohammad Saqibuddin Nguyen Manh Ha Tanawat Tatiyavoranat.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Printing (Net-Print) Joanne Button August 23rd 2016.
Integration of and Third-Generation Wireless Data Networks
Web Portal Project.
technical-service/ technical-service/
Welcome To : Group 1 VC Presentation
How to fix yahoo mail pop sending and receiving issues?
Implement Inter-VLAN Routing
Concept of VLAN (Virtual LAN) and Benefits
Virtual Server For ZyXEL ADSL Wireless Router
Implement Inter-VLAN Routing
Virtual LAN VLAN Trunking Protocol and Inter-VLAN Routing
Networks and the Internet
Implement Inter-VLAN Routing
Implement Inter-VLAN Routing
Presentation transcript:

LAWN Ron Rusnak The University of Chicago Networking Services and Information Technologies

LAWN Local Area Wireless/Walkup Network Architecture Local Area Wireless/Walkup Network Architecture –Georgia Tech –John Douglas & Team Implementation = MOWER Implementation = MOWER –Mobile Object/Wireless Enabled Router The University of Chicago Networking Services and Information Technologies

MOWER Authenticated Router Authenticated Router –Linux 2.4 Kernel w/IPTables Services on router Services on router –DHCP –Firewall (Authenticated Router) –Cache DNS –Web Server –Access Control The University of Chicago Networking Services and Information Technologies

MOWER UofC mods UofC mods –Ported to Solaris 5.8 –Access Control = IPF –Ph/LDAP Authentication –Temporary ID capability –Use DHCP messages for pruning The University of Chicago Networking Services and Information Technologies

LAWN Advantages Advantages –Moderate Implementation Effort –Users can authenticate with browser –Ability to customize authentication method –Cheap Access Points can be used Disadvantages Disadvantages –Doesn’t scale well –Needs large VLANS or lots of MOWERs. –Limited Throughput The University of Chicago Networking Services and Information Technologies