Site Report HEPiX/HEPNT 17 April 2002 Catania Paul Kuipers.

Slides:



Advertisements
Similar presentations
HEPIX May 2004 Edinburgh Linux/Unix highlights.
Advertisements

Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
LAL Site Report Michel Jouvin LAL / IN2P3
What to expect.  Linux  Windows Server (2008 or 2012)
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
Web Server Administration
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Networks 1 CS502 Spring 2006 Network Input & Output CS-502 Operating Systems Spring 2006.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Update and Discussions on Technology Initiatives TSAG Meeting 4/11/02.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Virtual Company Group 8 Presentation Date: June /04/2017
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
14th April 1999Hepix Oxford Particle Physics Site Report Pete Gronbech Systems Manager.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
COMP 6005 An Introduction To Computing Session Two: Computer Software Systems Software.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
Network Services Networking for Home & Small Business.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
TCP/IP fundamentals Unit objectives Discuss the evolution of TCP/IP Discuss TCP/IP fundamentals.
Paul Scherrer Institut 5232 Villigen PSI HEPIX_AMST / / BJ95 PAUL SCHERRER INSTITUT THE PAUL SCHERRER INSTITUTE Swiss Light Source (SLS) Particle accelerator.
The Internet Just the Facts. Protocols TCP/IP are the TRANSPORT protocols of the Internet Services use TCP/IP to connect to other computers on Internet.
HEPiX/HEPNT TRIUMF,Vancouver 1 October 18, 2003 NIKHEF Site Report Paul Kuipers
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
1 Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example.
SLAC Site Report Chuck Boeheim Assistant Director, SLAC Computing Services.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Manchester HEP Desktop/ Laptop 30 Desktop running RH Laptop Windows XP & RH OS X Home server AFS using openafs 3 DB servers Kerberos 4 we will move.
OS Exam – Domain 4 Networks Fall, Domain 4 Sections 4.1 – Identify the networking capabilities of Windows. Given configuration parameters, configure.
Jefferson Lab Site Report Sandy Philpott Thomas Jefferson National Accelerator Facility Newport News, Virginia USA
P. Kuipers Nikhef Amsterdam Computer- Technology Nikhef Site Report Paul Kuipers
Data Communications and Networks
Linux Networking #1 Dr. Michael L. Collard 1.
Network Programming All networked computers have an IP Address – Unique – In the form of xxx.xxx.xxx.xxx ( ) – 32 bits = ~4 billion possibilities.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
1CEA – DAPNIA - Saclay05/19/2003 CEA Saclay site report Amsterdam.
HEP Computing Status Sheffield University Matt Robinson Paul Hodgson Andrew Beresford.
Gareth Smith RAL PPD RAL PPD Site Report. Gareth Smith RAL PPD RAL Particle Physics Department Overview About 90 staff (plus ~25 visitors) Desktops mainly.
© 2005,2006 NeoAccel Inc. Partners Presentation Authentication & Access Control.
P. Kuipers Nikhef Amsterdam Computer- Technology Nikhef Site Report Paul Kuipers
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 1 Essential TCP/IP Network Protocols and.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Carnegie Mellon Computing Services 2/15/2001 v1.2DRAFT1 Systems Development Joseph Jackson Walter Wong.
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
JLAB Password Security Ian Bird Jefferson Lab HEPiX-SLAC 6 Oct 1999.
HEPiXBNL, Brookhaven18 October 2004 NIKHEF Site Report Paul Kuipers
Server Administration, Server Management and Networking Alokes Chattopadhyay.
Getting Connected to NGS while on the Road…
Web Server Administration
IMAP - Mailbox Access Note – OS & Outlook (2007/2010) should be fully patched with latest service pack and patches.
Network Wiring and Reference
UK GridPP Tier-1/A Centre at CLRC
How data travels through a network The Internet
Data Networking Fundamentals
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 9 Windows on the Internet
Chapter 4 Core TCP/IP Protocols
Introduction to TCP/IP
Topic 5: Communication and the Internet
Getting Connected to NGS while on the Road…
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

Site Report HEPiX/HEPNT 17 April 2002 Catania Paul Kuipers

HEPiX/HEPNT Catania217 April 2002 OS Linux RedHat++(140) Linux SuSE=(10) Solaris=(20) HP-(5)end IRIX--(1) Windows NT-(120) Windows (40) Windows 9x-(30)

HEPiX/HEPNT Catania317 April 2002 Mail Sendmail mail delivery /usr/spool/mail -> ~/mbox Secure POP, IMAP Certificate CNAME (eg imap.nikhef.nl) SMTP off-site –Configuration SSL Authentication –Port forwarding Virus scanning

HEPiX/HEPNT Catania417 April 2002 AFS cern.ch Demand for worldwide storage Pilot /afs/nikhef.nl –Selected users (± 20) –6 months 2 machines –Dual P4 1 GHz –1 GB Memory –120 GB Disk –RedHat 7.2 / OpenAFS

HEPiX/HEPNT Catania517 April 2002 Wireless 3 Access Point –Antenna MAC address checked Radius Encrypting

HEPiX/HEPNT Catania617 April 2002 Security Ports closed (but …) –Established Connections only –ssh, smtp, pop, imap, http, … –GRID ftp –Port <1024 Telnet –Outside –Solaris

HEPiX/HEPNT Catania717 April 2002 Security (2) POP, IMAP ssh v1 – v2

HEPiX/HEPNT Catania817 April 2002 EU datagrid WP6 –EU review Storage element Compute element User interface Networking monitor

HEPiX/HEPNT Catania917 April 2002 Networking (1) Datagrid / Datatag –BigIron Gb/s NIKHEF 2 Gb/s Chicago (Lambda) 1 Gb/s IPv6 Farms

HEPiX/HEPNT Catania1017 April 2002 Networking (2) –Modified TCP/IP Stack (SURFnet / Chicago) React on packet-loss/congestion Maximum 1 Gb/s / 622 Mb/s / 566 Mb/s on 1 GB/s link (UDP) 550 / Mb/s on 1 GB/s link (TCP)

HEPiX/HEPNT Catania1117 April 2002 Networking (3) IPv6 –Separate 1 GB/s Connection –DNS –Farms IP

HEPiX/HEPNT Catania1217 April 2002 Windows McAfee -> Norton Anti-Virus –Centralized Server –Centralized Control Update Expert (Evaluating, or SMS?) Windows 2000 Profiles –TEMP/TMP Variables –Netscape 6 –Recent folder

HEPiX/HEPNT Catania1317 April 2002 Future Plans Windows 2000 Server Windows XP Desktops /data Server Elonex ( x TB)