CSD 2006 / TEAM 12 Final presentation 29 th May 2006.

Slides:



Advertisements
Similar presentations
XProtect® Web Client 1 Product presentation.
Advertisements

BY MAULIK PATEL CED, GPERI Computing Architecture.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
CSD-Team 13 Oasis v.2. Introduction Oasis v.1 ISPs share access network Security Choice for end-users Compatible with legacy systems Problems with the.
Cacti Workshop Tony Roman Agenda What is Cacti? The Origins of Cacti Large Installation Considerations Automation The Current.
8.
The Internet & The New IT Infrastructure Chapter 9.
How’s My Network (HMN)? A Java approach to Home Network Measurement Alan Ritacco, Craig Wills, and Mark Claypool Computer Science Department Worcester.
Local Area Networks Outline –Basic Components of a LAN –Network Architectures –Topologies and LAN Technologies –Selecting a LAN –Improving LAN Performance.
Team: Maya Zalcberg Diana Attar Levona Hershtik Academic advisor: Prof. Ehud Gudes ADD Presentation.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Transport Layer Flow. Socket Connections UDP Segment Structure.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
E-Commerce The technical side. LAMP Linux Linux Apache Apache MySQL MySQL PHP PHP All Open Source and free packages. Can be installed and run on most.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
SNMP Configuration Manager Elad Dolev Sagi Rodin Supervisor – Zeev Schneider Project Manager – Ilana David Technion Institute of Technology, Haifa.
Quick Tour of the Web Technologies: The BIG picture LECTURE A bird’s eye view of the different web technologies that we shall explore and study.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
The PHP Story. PHP Story PHP is a programming language. Incorporate(join) sophisticated business logic. Widely used general purpose scripting language.
2N® Access Commander Product presentation.
Systems Design. Systems Design Skills People skill (25%) - Listening, understanding others, understanding between two lines, conflict resolution, handling.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
Intranet and internet based software components. 2 Overview  What are intranet and internet based map applications?  System Requirements  Architecture.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
Data Center Infrastructure
OASIS V2+ Next Generation Open Access Server CSD 2006 / Team 12.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
Network Administration. What is a Systems Administrator?  Person responsible for:  Setting up servers  Configuring the environment for web and other.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
#SEU12 Madison Miner Software Engineer EDA, Inc..
X-Road – Estonian Interoperability Platform
MySQL and PHP Internet and WWW. Computer Basics A Single Computer.
NuolSec VIspace Vientiane, Laos.
Introduction to network management. INTRODUCTION ● Course Overview ● Course Objectives.
A ISP free video conferencing application for mobile devices using wireless and VoIP Technology.
1 Multimedia Services Service provider Service client Service registry Publish Find/discovery Bind Multimedia Services Framework and architecture.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Syllabus Management System. The Problem There is need for a management system for syllabi that: Provides a simple and effective user interface Allows.
Ames Community Schools (ACS) has been concerned with the performance of their students’ problem solving abilities on a nationally standardized exam. While.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
WLAN In Disaster and Emergency Response (WIDER) MidTerm Presentation.
Shell Interface Shell Interface Functions Data. Graphical Interface Graphical Interface Command-line Interface Command-line Interface Experiments Private.
Alex Leifheit NETWORKS. NETWORK A number of interconnected computers, machines, or operations. Key Components Network components, Network Architecture,
A^4 Mesh Project 16. February 2011, Lyon
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
Web Services Using Visual.NET By Kevin Tse. Agenda What are Web Services and Why are they Useful ? SOAP vs CORBA Goals of the Web Service Project Proposed.
Building Corporate Data Networks – A Case Study
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Our Client Dr. Mawjood Institute of Indigenous Medicine University Of Colombo.
Modul ke: Fakultas Program Studi Teknologi Pusat Data 13 FASILKOM Teknik Informatika Infrastruktur Pusat Data.
LO2 Understand the key components used in networking.
Client Server Model. Server Applications (Software) Management and maintenance of Data including Management and maintenance of Data including User login.
U-PROX SMART HANDLE Fully incorporated Wireless Handle and Furniture Locking Set.
Web Programming Language
Consulting Services JobScheduler Architecture Decision Template
Project Target Develop a Web Based Management software suit that will enable users to control Hardware using standard HTTP & Java Applet compatible web.
Outline Introduction Standards Project General Idea
Configuration for Network Security
Welcome To : Group 1 VC Presentation
CS222 Web Programming Course Outline
PREPARED BY: RIDDHI PATEL (09CE085)
Presentation transcript:

CSD 2006 / TEAM 12 Final presentation 29 th May 2006

Video

Agenda OASIS2 world OASIS2 benefits OASIS2 big picture Architecture Monitoring subsystem Future work Questions & Answers

OASIS2 WORLD Backbone Operator servers End users Internet Service provider

OASIS2 benefits Supports wired and wireless connections High security New technology supports Scalability Mobility Supports Linux, Mac OS, Windows Freedom of ISP selection Free and Open source software (GPL)

Architecture - subsystems Monitoring Authentication Management Event

Monitoring subsystem User Interface SNMP poller XMLRPC RRDtoolAuthentication & Policy

Monitoring user interface ISPs and network operator staff Written in PHP Connecting via HTTPS XMLRPC as interpreter

Monitoring subsystem User Interface SNMP poller XMLRPC RRDtoolAuthentication & Policy

Authentication Purpose: authenticate users´ login requests. Program continuously in listening state. A process is tied to every request; reused a number of times. Connection to database – able to read table with username/passwords in order to authenticate users. Only component allowed to access that table.

Authentication Mechanism Authentication(request) Authentication(challenge) Authentication (success) Authentication(response) ClientServer

Policy The policy is related to the authentication. Authentication leads to privileges(sharing resources). Policy mandates authorization. Responsible for controlling clients´ access to resources according to their privileges. Like in our monitoring system the ISP’s have access to less information than the Network operator.

Monitoring subsystem User Interface SNMP poller XMLRPC RRDtoolAuthentication & Policy

RRDtool Main purpose Saving network status information SNMP poller

librrdNG investigated original RRDtool what would we need? compatible scalable speed librrdNG – the Next Generation RRDtool

Compatible, Scalable and Speed RRDtool is limited to 256 open RRDbs librrdNG can have 2^31 RRDbs open speedup on read/write with %

Monitoring subsystem User Interface SNMP poller XMLRPC RRDtoolAuthentication & Policy

SNMP poller – Why? Need a protocol to get information from the network devices. Simple Network Management Protocol (SNMP) is almost a standard Monitoring system Switches, routers, APs… SNMP

SNMP poller SNMP poller “interviews” the network elements, asking for the needed data sequentially. SNMP pollerSwitch Query 1 Data 1 Data 2 Query 2

SNMP poller: Synchronous mode Gather all the information from one switch to start “interviewing” the second one SNMP poller Switch 1Switch 2

SNMP poller: Asynchronous mode “Interview” all the elements at the same time SNMP pollerSwitch 1 Switch 2

Future work Project is available as master theses Good Programming Skills in C++ Networking Knowledge PHP and MySQL

Thank you for your listening! Questions? Web Site: Presentation available at: team12/deliverables/final_presentation.ppt