Abdullah Alshalan Garrett Drown Group #4 CSE591 - Virtualization and Cloud Computing.

Slides:



Advertisements
Similar presentations
Topology The physical topology of a network refers to the configuration of cables, computers and other peripherals. The main types of network topologies.
Advertisements

Key Word Challenge This is when a computer uses services provided by another organisation’s computer systems. A computer hardware system which acts as.
Network+ Guide to Networks, Fourth Edition
Garrett Drown Tianyi Xing Group #4 CSE548 – Advanced Computer Network Security.
CSE 548 Advanced Computer Network Security Long Qiu Xinyi Dong DOSGI APPLICATION PLATFORM FOR MOBICLOUD.
DOSGi Application Platform for MobiCloud Long Qiu Xinyi Dong.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
OPERATING SYSTEMS AND SYSTEMS SOFTWARE. SYSTEMS SOFTWARE Systems software consists of the programs that control the operations of the computer and its.
Remote Access Mark Nicolay Computing & Communications.
Smart Mail lets you send and receive s from your mobile phone in a quick and easy way using your favorite mail account.
Untangle and OpenVPN. ‏ What is OpenVPN? Allows secure remote connection Based on SSL Uses UDP 1194 Supports – Site to Site (hardware to hardware) – Site.
Identity Management and DNS Services Tianyi XING.
Identity Management and DNS Services Tianyi XING.
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Sumit Kumar Archana Kumar Group # 4 CSE 591 : Virtualization and Cloud Computing.
Android in the Cloud Chromebooks, BYOD and Wearables Joel Isaacson Copyright 2014 Joel Isaacson
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
COMP 6005 An Introduction To Computing Session Two: Computer Software Systems Software.
The Basics  Operating systems (OS) can help computer users do many things, like managing and manipulating files and folders.  Operating systems also.
Introduction to VMware Virtualization
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Software 1. Software is divided into parts System software Operating system Utility software Application software 2.
UNIT - 1Topic - 2 C OMPUTING E NVIRONMENTS. What is Computing Environment? Computing Environment explains how a collection of computers will process and.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
CSE 548 Advanced Computer Network Security Document Search in MobiCloud using Hadoop Framework Sayan Cole Jaya Chakladar Group No: 1.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
The Role of the Operating System
How computer’s are linked together.
Introduction to network management. INTRODUCTION ● Course Overview ● Course Objectives.
1 Chapter 7 Operating System & Utility Programs.  consists of the programs that control or maintain the operations of the computer and its devices. It.
Sumit Kumar Archana Kumar Group # 4 CSE 591 : Virtualization and Cloud Computing3/3/2011.
Chapter 8 Configuring and Managing Shared Folder Security.
Introducing Software Computer Concepts Unit A. Introducing Software What is an Operating System? OS is the master controller for all the activities that.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
Garrett Drown Tianyi Xing Group #4 CSE548 – Advanced Computer Network Security.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
IPSec VPN on a Android Phone Group 1 Avinash Bhashyam Axel Christiansen.
CLOUD COMPUTING. What is cloud computing ??? What is cloud computing ??? Cloud computing is a general term for anything that involves delivering hosted.
Credit:  An operating system is the program that is loaded into the computer  coordinates all the activities among.
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
Windows Azure poDRw_Xi3Aw.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
LO2 Understand the key components used in networking.
Name: Teacher: Class: Year 10 Computing Networks.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
ANDROID AS A SERVER PLATFORM ON CLOUD COMPUTING SONA COLLEGE OF TECHNOLOGY SUBMITTED BY: NAGADEVI PRIYA.G DIVYA PURNIMA.S.S
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Version of document: 1.01 Software Version CBox: v3.7.1 Hardware Version CBox: C5 Remote Access Configuration Service Operator Language: English.
1.4 wired and wireless networks lesson 1
Chapter 7. Identifying Assets and Activities to Be Protected
Introduction to VMware Virtualization
Virtual Private Network
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
3.2 Virtualisation.
How to Fix Android File Transfer Not Working on Mac?
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Network Types & Speed Learning Objectives:
09/12/2018 Virtual Networks.
Networking and Security
Revision PowerPoint By Nicole Davidson.
Done by:Thikra abdullah
Tech Terms PLTW Vocabulary Set #6.
Presentation transcript:

Abdullah Alshalan Garrett Drown Group #4 CSE591 - Virtualization and Cloud Computing

TunnelDroid Internet

Tasks:  Set up Android phone with TunnelDroid  Set up OpenVPN client on the Android phone.  Install and configure OpenVPN server for access to the cloud  Debug connectivity between Android phone and OpenVPN in the cloud

Tasks (distribution among team members):  Set up Android phone with TunnelDroid (GUI for the client)  Abdullah, 50%  Garrett, 50%  Set up OpenVPN client on the Android phone.  Abdullah, 50%  Garrett, 50%  Install and configure OpenVPN server for access to the cloud  Abdullah, 50%  Garrett, 50%  Debug connectivity between Android phone and OpenVPN in the cloud  Abdullah, 50%  Garrett, 50%

Software & Hardware Used:

Secure Tunnel Internet Network Topology & Requirements

Roadmap of project:  By midterm:  Have TunnelDroid and OpenVPN client successfully installed and running on Android phone.  Research programming on the Android OS.  Research installation of these products on the Android phone.  Successfully install the software.  Have OpenVPN server set up in the cloud.  Gain access to the cloud and have our own server set up there.  Research installation process of installing the OpenVPN server.  Install and configure OpenVPN on the server for use with the Android phone.  By final:  Use the Android phone and be able to connect via VPN to the cloud using TunnelDroid and OpenVPN software.  Research, troubleshoot, and debug.

 Novel Aspects of this Project  The ability to use your Android device in the cloud.  The ability to easily share (very large) files between users.  Large computational tasks can be carried out on the cloud (rather than mobile device).  The ability to backup/restore files from and images of mobile devices.  Risks and Challenges  “Bricking” the mobile device while attempting to install/configure new software on it.  Working with technology, operating systems, and environments with which we are not very familiar.  Potential Applications and Benefits  Can be used on any Android powered mobile device.  Provides more power and accessibility to/for users by way of the cloud.