This HTML5 document contains 42 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n17http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F62156489%3A43110%2F13%3A00201082%21RIV14-MSM-43110___/
n19http://localhost/temp/predkladatel/
n8http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n15http://linked.opendata.cz/resource/domain/vavai/subjekt/
n14http://linked.opendata.cz/ontology/domain/vavai/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n4http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n11http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n10http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n16http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n13http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n18http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n6http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F62156489%3A43110%2F13%3A00201082%21RIV14-MSM-43110___
rdf:type
n14:Vysledek skos:Concept
dcterms:description
Computer network used for laboratory training and for different types of network and security experiments represents a special environment where hazardous activities take place, which may not affect any production system or network. It is common that students need to have administrator privileges in this case which makes the overall security and maintenance of such a network a difficult task. We present our solution which has proved its usability for more than three years. First of all, four user requirements on the laboratory network are defined (access to educational network devices, to laboratory services, to the Internet, and administrator privileges of the end hosts), and four essential security rules are stipulated (enforceable end host security, controlled network access, level of network access according to the user privilege level, and rules for hazardous experiments), which protect the rest of the laboratory infrastructure as well as the outer university network and the Internet. The main part of the paper is dedicated to a design and implementation of these usability and security rules. We present a physical diagram of a typical laboratory network based on multiple circuits connecting end hosts to different networks, and a layout of rack devices. In the second part of the paper, the latest innovation of our network is presented that covers a transition to the system virtualization at the end host devices - inspiration came from a similar solution deployed at the Department of Telecommunications at Brno University of Technology. This improvement enables a greater flexibility in the end hosts maintenance and a simultaneous network access to the educational devices as well as to the Internet. In the end, a vision of a system of virtual machines preparation and automated deployment tailored for our needs is briefly outlined. Computer network used for laboratory training and for different types of network and security experiments represents a special environment where hazardous activities take place, which may not affect any production system or network. It is common that students need to have administrator privileges in this case which makes the overall security and maintenance of such a network a difficult task. We present our solution which has proved its usability for more than three years. First of all, four user requirements on the laboratory network are defined (access to educational network devices, to laboratory services, to the Internet, and administrator privileges of the end hosts), and four essential security rules are stipulated (enforceable end host security, controlled network access, level of network access according to the user privilege level, and rules for hazardous experiments), which protect the rest of the laboratory infrastructure as well as the outer university network and the Internet. The main part of the paper is dedicated to a design and implementation of these usability and security rules. We present a physical diagram of a typical laboratory network based on multiple circuits connecting end hosts to different networks, and a layout of rack devices. In the second part of the paper, the latest innovation of our network is presented that covers a transition to the system virtualization at the end host devices - inspiration came from a similar solution deployed at the Department of Telecommunications at Brno University of Technology. This improvement enables a greater flexibility in the end hosts maintenance and a simultaneous network access to the educational devices as well as to the Internet. In the end, a vision of a system of virtual machines preparation and automated deployment tailored for our needs is briefly outlined.
dcterms:title
Design, implementation and security of a typical educational laboratory computer network Design, implementation and security of a typical educational laboratory computer network
skos:prefLabel
Design, implementation and security of a typical educational laboratory computer network Design, implementation and security of a typical educational laboratory computer network
skos:notation
RIV/62156489:43110/13:00201082!RIV14-MSM-43110___
n14:predkladatel
n15:orjk%3A43110
n3:aktivita
n13:S
n3:aktivity
S
n3:cisloPeriodika
4
n3:dodaniDat
n6:2014
n3:domaciTvurceVysledku
n8:5330289 n8:7195796
n3:druhVysledku
n12:J
n3:duvernostUdaju
n10:S
n3:entitaPredkladatele
n17:predkladatel
n3:idSjednocenehoVysledku
68579
n3:idVysledku
RIV/62156489:43110/13:00201082
n3:jazykVysledku
n16:eng
n3:klicovaSlova
operating system virtualization; computer networks; education; laboratory network; network security
n3:klicoveSlovo
n11:computer%20networks n11:operating%20system%20virtualization n11:education n11:laboratory%20network n11:network%20security
n3:kodStatuVydavatele
CZ - Česká republika
n3:kontrolniKodProRIV
[CC1E9D481DEC]
n3:nazevZdroje
Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis
n3:obor
n18:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
2
n3:rokUplatneniVysledku
n6:2013
n3:svazekPeriodika
61
n3:tvurceVysledku
Pokorný, Martin Zach, Petr
s:issn
1211-8516
s:numberOfPages
11
n4:doi
10.11118/actaun201361041077
n19:organizacniJednotka
43110