Wireless Network Security Virtual Lab Team sdDec11-10 Shishir Gupta, Anthony Lobono, Mike Steffen Client Dr. George Amariucai Advisor Dr. Doug Jacobson.

Slides:



Advertisements
Similar presentations
FederalAppliance.com Self-Service Pricing. Full-Service VAR. Server / Storage Consolidation Plan using VMWare and EqualLogic Virtual Machines Virtual Network.
Advertisements

Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Skyward Disaster Recovery Options
 Wireless Security Lab ◦ Attacker and Defender Nodes ◦ Send wireless signals from Defender node to server ◦ Website to control VMware ESXi server  OpenBTS.
Windows Deployment Services WDS for Large Scale Enterprises and Small IT Shops Presented By: Ryan Drown Systems Administrator for Krannert.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Introduction to XTMv WatchGuard Training.
Web-based Control Interface For a model train control system By: Kevin Sendra.
VMweb Team Members: Matthew Fusaro, Brendan Heckman, Ryan Mcgivern.
Creating Clusters in a Virtual Environment Purpose: To create a development environment with limited hardware resources that allows the testing of parallel.
Introducing VMware vSphere 5.0
Private Cloud or Dedicated Hosts Mason Mabardy & Matt Maples.
Wireless Network Security Virtual Laboratory Anthony LoBono, Mike Steffen, and Shishir Gupta Advisor: Doug Jacobson Client: George Amariucai.
Virtual Machine Management
Paper on Best implemented scientific concept for E-Governance Virtual Machine By Nitin V. Choudhari, DIO,NIC,Akola By Nitin V. Choudhari, DIO,NIC,Akola.
SUNY IT Master's Project Using Open Source Virtualization Technology In Computer Education By: Ronny L. Bull Advised By: Geethapriya Thamilarasu, Ph.D.
Presented by : Ran Koretzki. Basic Introduction What are VM’s ? What is migration ? What is Live migration ?
Wireless Network Security Virtual Lab Team sdDec11-10 Shishir Gupta, Anthony Lobono, Mike Steffen Client Dr. George Amariucai Advisor Dr. Doug Jacobson.
System Center 2012 Setup The components of system center App Controller Data Protection Manager Operations Manager Orchestrator Service.
Access Control Module 8. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A vSphere Environment Introduction to VMware.
Cyberaide Virtual Appliance: On-demand Deploying Middleware for Cyberinfrastructure Tobias Kurze, Lizhe Wang, Gregor von Laszewski, Jie Tao, Marcel Kunze,
Yury Kissin Infrastructure Consultant Storage improvements Dynamic Memory Hyper-V Replica VM Mobility New and Improved Networking Capabilities.
Virtual Desktops and Flex CSU-Pueblo Joseph Campbell.
© 2011 VMware Inc. All rights reserved Course Introduction Module 1.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 7 2/23/2015.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
VIRTUALIZATION ACTUALIZATION Balacom Services Daniel R. Bennett, Kyle Campbell, Jimmy Schmalzl Virtual Server Farm.
Introduction to VMware Virtualization
Windows Enterprise Admin Course Section Introduction Chris Redford
UI and Data Entry UI and Data Entry Front-End Business Logic Mid-Tier Data Store Back-End.
Computing on the Cloud Jason Detchevery March 4 th 2009.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
IST & VMware ESX: What we did | The Sky’s the Limit Agenda IST Setup o POD design o Usage o Scalability & Capital Cost o Reliability VM as a Service.
608D CloudStack 3.0 Omer Palo Readiness Specialist, WW Tech Support Readiness May 8, 2012.
Virtual Machines Web Sites and ApplicationsDatabases Service Bus.
COMS E Cloud Computing and Data Center Networking Sambit Sahu
Eucalyptus 3 (&3.1). Eucalyptus 3 Product Overview – Govind Rangasamy.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 MSE Virtual Appliance Presenter Name: Patrick Nicholson.
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
© 2010 VMware Inc. All rights reserved vSphere 4.1: Install, Configure, Manage.
NUOL Internet Application Services Midterm presentation 22 nd March, 2004.
LegendCorp What is System Center Virtual Machine Manager (SCVMM)? SCVMM at a glance Features and Benefits Components / Topology /
VApp Product Support Engineering Rev E VMware Confidential.
VMware vSphere Configuration and Management v6
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
NTU Cloud 2010/05/30. System Diagram Architecture Gluster File System – Provide a distributed shared file system for migration NFS – A Prototype Image.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
1 Sean Aluoto Anthony Keeley Eric Werner. 2 Project Plan Overview Project Lifecycle model Time line Deliverables Organization plan Risk management Design.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 OS Management with TPM for OS Deployment.
vSphere 6 Foundations Exam Training
VIRTUAL MACHINE – VMWARE. VIRTUAL MACHINE (VM) What is a VM? – A virtual machine (VM) is a software implementation of a computing environment in which.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 Virtualization.
UFIT Infrastructure Self-Service. Service Offerings And Changes Virtual Machine Hosting Self service portal Virtual Machine Backups Virtual Machine Snapshots.
Network customization
Creating Clusters in a Virtual Environment
Introduction to VMware Virtualization
Virtualization Review and Discussion
Tivoli Storage Manager Product Family
Building a Virtual Infrastructure
Usage of Openstack Cloud Computing Architecture in COE Seowon Jung Systems Administrator, COE
Cyber Security of SCADA Systems
Conditions leading to the rise of virtual machines
Dev Test on Windows Azure Solution in a Box
Low Level Architecture
Virtualization Charles Warren.
* Introduction to Cloud computing * Introduction to OpenStack * OpenStack Design & Architecture * Demonstration of OpenStack Cloud.
Virtualization Charles Warren.
Creating your own Virtual Machines
Operating System Basics
Presentation transcript:

Wireless Network Security Virtual Lab Team sdDec11-10 Shishir Gupta, Anthony Lobono, Mike Steffen Client Dr. George Amariucai Advisor Dr. Doug Jacobson Dept. of Electrical & Computer Engineering Iowa State University

CONCEPT SKETCH

SYSTEM DESIGN (BLOCK DIAGRAM)

Implementation (Done)  Beta servers set up and operational –WSECLAB-ADMIN: Hosts primary VMs, UI, control scripts –WSECLAB-TEST: Hosts secondary VMs, USRP equipment  User interface development in progress –Web server user auth completed –Documentation wiki set up  Backend scripting operational on alpha dev server –Machine clone and boot –Device allocation  GNU Radio setup + USRP Testing

 Finish and deploy master image files  Finish and deploy backend scripts  Integrate script operations with web interface  USRP + GNU Radio Integration [If final hardware available from NI]  Documentation Implementation (Left)

Testing Testing Done Proof of concept VMware ESXi VM system requirements Testing Left Administration scripts Web portal Network configuration Resource allocation

Pending Issues Hardware Concerns  Future change in hardware  Compatibility with hypervisor  USRP Equipment Implementation Concerns  Scalability

Project Assessment  Primary features for the project WILL be complete!  Optional features may remain incomplete depending on hardware availability.

QUESTIONS