Proposed Workshop Agenda

Dates: September 13-17, 2010 (Monday-Friday)
NSRC Instructor Team

  • Sebastian Buettrich, NSRC
  • Kevin G. Chege, Kenya Education Network (KENET)
  • José Domínguez, University of Oregon, Network & Telecom Services
  • Steven G. Huter, NSRC
  • Dale Smith, University of Oregon, Network & Telecom Services

Time Schedule

Schedule
Session I 0830-1030
Break 1030-1100
Session II 1100-1300
Lunch 1300-1400
Session III 1400-1600
Break 1600-1630
Session IV 1630-1800

Monday

0830-0900: Welcome

  • TBD

Campus Network Design Best Practices

0930-1030: What problems are we trying to solve? Download Powerpoint Download PDF

  • Network design goals
  • Reliability
  • Resiliency
  • Manageability
  • Scalability
  • Layering

Research and Education Networks

  • Why an REN
  • Models of RENs
  • Implications for Ghana

IP addressing and NAT

  • How to plan IP address management from the beginning to accommodate growth
  • How to segment different areas of the LAN with IP subnets
  • Network addressing strategies
  • NAT or not
  • Need to be able to aggregate

1030-1100: Coffee/Tea Break

1100-1300: Hierarchical design building blocks Download Powerpoint Download pdf

  • Build star networks
  • Separate core and edge functions
  • Route in core and switch at the edge
  • Develop and use standard building blocks
  • Have a strategy that allows incremental growth

1300-1400: Lunch

1400-1600: Physical Cabling Infrastructure Download Powerpoint Download pdf Download cabling specifications (ms word) (pdf)

  • Cable types
  • Copper cabling systems
  • Fiber Optic Systems

1630-1800: A look at Selected Ghana Campus Networks

  • Emmanuel Togo, University of Ghana-Legon
  • Hubert Asior, University of Winneba
  • Abraham Brew-Sam, Kwame Nkrumah University of Science & Technology

Tuesday

Network Monitoring and Management

0830-0915 Brief Linux Intro Download Slides ppt

  • What is Linux/Unix OS and where did it come from?
  • Types of Linux/Unix, whats the difference?
  • Why Ubuntu?
  • Some must know tips on Ubuntu
    • The shell
    • Directory tree / /etc /home /var
    • Basic commands: cd cp mv
    • Transfering files - scp from instructor's pc (apt config file for cache)
    • Root, sudo and unpriviledged user
    • Installing software - vim

0915-1000 Network Monitoring and Management Overview

  • The Big Picture - What is NMM and why do it?
  • How to do it - The Tools and how to select them
  • Tools: open source vs proprietary
    • Open source and Windows
    • Can I survive with the free version?

1000-1030 Network Definitions and Metrics

  • Common measurements: bps, pps, rtt, jitter, etc.
  • Channel capacity and utilization
  • 95th percentile
  • Packet loss

1030-1100: Tea Break

1100-1130 iPerf

  • The client and the server
  • iPerf Lab - Local throughput analysis with IPERF

1130-1215 SNMP Intro

  • SNMP concepts
  • Which SNMP version?
  • SNMP read only and the community name
  • Getting SNMP going on Cisco/HP
  • SNMP config in Linux
  • SNMPWalk on a device

1215-1300 Some Firewall Notes

  • Intro to Firewalling
  • Firewall Types
  • ACLs
  • Ping and Firewalls
    • Why not to block it
    • Ways to prevent large ping

1300-1400: Lunch

1400-1520 The Big 3 Cacti, Nagios and Smokeping Download Labs Word Doc

  • Intro to the Tools and what they measure
    • Cacti - Bandwidth
    • Nagios - Availability
    • Smokeping - Latency
  • Install PHP, Apache and MySQL (LAMP) and Cacti
  • Cacti:
    • Summary installation howto
    • The Web interface
    • Adding devices to be graphed

1520-1600 Nagios

  • Install Nagios and Nconf

  • Nagios and Nconf
    • Summary installation howto
    • Understanding how Nagios works - the config files
    • NConf web interface for Nagios
    • Adding devices to be graphed with NConf

1600-1630: Tea Break

1630-1700 Smokeping

  • Installing Smokeping
    • Summary installation howto
  • The Web interface and graphs

1700-1800 LABS

  • Smokeping Nagios and Cacti Lab - analyzing collected data
  • Interpreting the graphs correctly- Your graph vs your ISP's graph
  • Summary on the tools
  • Big tools to know: NFSen, mtr, munin, SpeedTestMini?

Wednesday

0900-1300: In-Building Network DesignDownload Powerpoint Download PDF

Best practices in Campus Network Design

  • Switch versus Hub versus Router
  • Switching Architectures (star topologies - aggregation switch serves edge switch)
  • Virtual LANs (VLANs)
    • Increases complexity
    • Not necessarily a security mechanism. Don't confuse VLANs with host or data base security
    • Don't build VLAN spaghetti
    • Examples of where we recommend VLANs
    • Technology and practical hints
      • Tagging and untagged
      • Trunking
        • Q in Q

1030-1100: Coffee/Tea Break

1100- 1300 Best Practices continued

  • Spanning Tree Protocol (STP)
    • 802.d
    • 802.1w
    • 802.1s
  • Selecting appropriate switches
    • class="lroman"> Must be managed
    • SNMP, SSH, access control techniques
  • Fault Tolerance
    • Port bundling
    • Spanning tree (using loops to your advantage)
  • Network Management
  • Switching and security considerations
    • Rogue DHCP server prevention
      • How does it work
      • Uplink/downlink configuration
    • Dynamic ARP inspection
    • 802.1x/network access control

1300-1400: Lunch

1400-1600: Afternoon LabDownload Powerpoint Download PDF

  • 4-6 groups with 5 or 6 switches per group
  • Build layer 2 network consisting of aggregation switch and edge switches
  • Configure spanning tree across fabric
    • What kind of spanning tree to configure?
    • How to make different types inter-operate

1600-1630: Coffee/Tea Break

1630-1800: Afternoon Lab continued

  • Configure Rogue DHCP prevention
  • Add 2nd aggregation switch to provide redundancy
    • Why did that happen?
  • Growing your network
    • Use aggregation
    • If you can't...
  • VLANs
    • Introducing and distributing VLANs

Thursday

0830-1030

Designing scalable wireless networks in the campus LAN Download PDF(436.0 KB)

Introduction to Wireless

  • Standards: ISM bands, WiFi and related standards
  • Basic WiFi Modes
  • Topologies in wireless networking

Download PDF(4.4 MB)

1030-1100: Tea Break

1100-1300

Integration with a Campus LAN Download PDF(436.0 KB)

  • Network IP design
    • "Same rules as for general network, only applied even more rigid: separate core / edge, subnetting, structure, ...
  • Network separation via Frequency & Polarization planning
  • Maximum sizes of wireless cells / network segments
  • Bridged networks vs. routed networks
    • DHCP, NAT, subnetting
  • Examples for best practices

1300-1400: Lunch

1400-1600

Brief intro to Linux commands (if needed)

LAB: Hands on: Wireless Lab I Download PDF(1.0 MB)

The five villages / departments:

  1. Connect the Villages to central AP (core)
  2. Build hotspots (distribution/access)
  3. Introduce Mesh to the network
  • Basic AP configuration
  • Firmware Flashing
  • Advanced configuration
  • Building simple point to point and hotspots in the Lab

1600-1630: Tea Break

1630-1800

LAB: Hands on: Wireless Lab II

  • Lab I continued, and maybe ...
  • optional topics

1930-????

More hands on for those who like to :)

We are offering additonal practical exercises on all wireless topics

Friday

Note: We will have to find out when we need to stop as some instructors need to catch evening flights from Accra. Wireless labs may continue to evening though

0830-1030

Wireless Roaming in the Campus Network Download PDF(129.7 KB)

  • Roaming: Definition and Challenges
  • Broadcast Domains
  • Solutions
    • WDS - not a solution
    • A simple effective approach: Implementation on Layer 2/3
      • MAC-IP via ARP
    • Implementation via managed thin APs
    • Enterprise grade roaming solutions

Authentication in the Campus Wireless System: Captive Portals Download PDF(213.4 KB)

  • Authentication approaches
    • PKI based
    • Internet Cafe / Voucher approach
    • Captive Portals
  • Principles of Captive Portals
  • Examples of captive portals
    • Free: Coova, WifiDog, Nocat (deprecated), Chillispot (deprecated)
    • Commercial: Aruba, Cisco, Aptilo
    • Home grown
  • Coova in detail

  • Integration with back end user stores - very briefly
    • Radius
    • LDAP, Active Directory, Kerberos
    • homegrown databases
  • Stand alone authentication on portal
  • Captive portals beyond technology: Communication
    • AUP
    • Communication
    • Social engineering

1030-1100: Tea Break

1100-1300

Security in the Campus Wireless System Download PDF(1.8 MB)

  • Introduction to wireless security
    • Definition & Challenges
    • Essential tools
      • kismet
      • netstumbler a. o.
      • wireshark
      • etherape
      • nmap
      • aircrack
      • tool collections: backtrack
  • Wireless 'Security' Measures & Circumvention
    • Remarks on our understanding of "security"
    • Encryption: WEP, WPA / cracking
    • MAC based ACL / spoofing
    • IP based / spoofing
    • Cookies / ...
    • Obscurity / ...
    • User store integrated, captive
    • End-to-end approaches: ssh, VLAN, tunneling, data encryption / -

Wireless troubleshooting Download PDF(77.1 KB)

Link Budgets Download PDF(189.9 KB)

Summary: (Some) Essentials of Wireless Networking Download PDF(670.9 KB)

1300-1400: Lunch

1400-1600

LAB: Hands on: Wireless Lab III Download PDF(1.0 MB)

  • RadioMobile
  • Captive Portal - Coova Demo
  • Security tools

1600-1630: Tea Break

1630-1800

LAB: Hands on: Wireless Lab IV

  • Security tools
  • Captive portals continued
  • IPv6 Wireless

Last modified 8 years ago Last modified on Jul 9, 2011, 2:31:20 PM

Attachments (29)