SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



          Routing and security for remote labs for teaching and research
                                 (SRS-E-LABO)
                                                      Alassane Diop
                              Research Associate, Center for Research LICEF, TELUQ / UQAM,
                                                  Montréal, Québec, Canada


Abstract:
In this paper, routing services and security are software components that can be integrated in an e-laboratory or remote
laboratory as well as in mobile laboratories. We will show how to implement services to manage the routing and security using
virtual routers. The virtual routers that we propose allow designers to online laboratories to adapt or supplement their learning
environments or dedicated platforms using their services to route and secure access to physical devices and the information
passed to the various network nodes to remote laboratories. The concept to be presented, based on WCF (Windows
Communication Foundation), provides centralized network management at a single location while the remote labs are based on
networks and distributed systems.

Keywords: Remote labs, online laboratory, computer network, WAP, virtual router, security, e-laboratory, e-learning, WCF

1. Objectives and routing services security
This article aims to contribute to the development of service concepts, routing and security using software components that can
be integrated with laboratory environments online. These software components are presented in the form of services to manage
1) addressing the various nodes of connections, 2) the table router to forward packets from networks or sub networks connected
directly or indirectly to the primary node, 3) transmission security with an encryption of information, 4) public and private keys
for data privacy; 5) mobile devices and applications WAP (Wireless Application Protocol) and service use in web applications
by exploiting the available services. Routing services and security for remote labs for teaching and research online (SRS) are
reliable and secure transactional solutions that integrate across platforms and interoperate with existing infrastructure. The SRS
will be based on the WCF architecture (Windows Communication Foundation) which is compatible with all other existing
architectures because "The message parameters are defined by documents in XSD (XML Schema Definition), which allows any
system comprising XML (eXtended Markup Language) to manage documents. The message contract defines specific message
parts using SOAP (Simple Object Access Protocol), and allows finer control of them, when interoperability demands such
precision. "[1]. Figure 1 illustrates the main layers of the WCF architecture used to implement the various services of SRS.
Service contracts illustrated in Figure 1 have spoken publicly in WSDL (Web Services Description Language) [2], a format that
describes network services in terms of operating parameters on messages SOAP (Simple Object Access Protocol). This allows
designers to use that information to public contracts to build service oriented applications that ensures interoperability. T o
transfer information on intranets and the Internet, the services use protocols such as HyperText Transfer Protocol (HTTP) and
Transmission Control Protocol (TCP). Other types of transport mechanisms can be added via extension points of WCF
integrated.




                                                Figure 1. WCF Architecture [1]

Issn 2250-3005(online)                                 September| 2012                                      Page 1577
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



 2. Communication services routing and security
The SRS can be used either ad hoc or infrastructure. Figures 1 and 2 show the two modes of communications services, routing
and security levels and applications to an established e-collaboration environment consisting of a platform for distance learning
(online platform), a site laboratory Remote (e-laboratory) and another site that hosts communication tools useful for
synchronous and asynchronous learning or collaborative research (Collab).
Ad hoc mode as the name suggests allows each item that uses routing services (SRS) to host and use its own services directly.
These can be shared or restricted in Intranet. The communication mechanism is very simple. To deploy routing services must
sequentially, initially, install a server that hosts all SRS available, then set the access "users", controls and security; mount the
virtual router using local services or remote, and finally implement the global environment which exploits a remote laboratory
using deletion of SRS. Information can be exchanged between sites represented by rectangles in Figure 2. Note that the
communication is bidirectional.




                             Figure 2. Communication services routing and security in ad hoc mode
The infrastructure mode shown in Figure 3 allows a centralized interconnection of SRS on a single server hosting services. This
communication mode is easier to maintain when updating the system. The SRS is divided for the various sites where the
possibility of overloading likely. In this case a policy of performance management and bandwidth can be introduced to give
priority levels to the sites. The communication mechanism is more complex to manage, compared to ad hoc mode, but the steps
to establish communication and use the services remain the same. Information can be exchanged between sites represented by
rectangles in Figure 3. To do everything passes through the central node of the SRS.




                          Figure 3. Communication Services Routing and Security Infrastructure mode
It is possible to combine the two basic modes for a mixed mode as shown in Figure 4.



Issn 2250-3005(online)                                  September| 2012                                       Page 1578
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5




                            Figure 4. Communication Services Routing and Security in Mixed Mode
3. Description of services routing and security
Five management points will be treated as mentioned in Section I of this paper.

3.1. Address management of the various nodes of connections
These are services for managing the global addressing of nodes sites. As input parameters, we have the IP address of the
equipment and the subnet mask that hosts SRS, the type of communication (Local, Remote, Internet-Remote Intranet VPN:
Virtual Private Network, etc. ...) as well as the connection mode (ad-hoc, Infrastructure, Mixed). As output parameters, we have
the IP address, physical address (MAC) and indicator connection (Connected or not connected). The information will be stored
in a database for tracking, transactions and security. These services allow us to have as well an overview of the system based on
information collected at nodes or sites. It is even possible to make the overall network diagram that uses SRS.

3.2. Management table router to forward packets from networks or sub networks connected directly or indirectly to node
These are services that manage the routing tables stored in a database routing. Virtual routes are defined to facilitate transport
and routing information. As input parameters, we have the source address of the original node and the address (es) recipient (s)
of the end node or end nodes. As output parameters, we have the packet flow of information from the nodes and the safety
information required. It is also possible to use the broadcast address (broadcast) to transmit information at different nodes of the
global network.

3.3. Security management system with a transmission of information encryption
These are services that manage the security of transmissions using an encryption system. All information transmitted from node
to node will be protected by an encryption algorithm using the management services described public and private keys to the
next depending on whether the information coming from the central server or a node of the central system. These services also
use the information generated by the management services of the routing table. So we need the source address, destination
addresses and information or applications that must pass at the nodes of the central system. Output, we have information
packets encrypted and then decrypted at that node by a service recipient decryption of packets.

3.4. Management of public and private keys
These are services that manage the public and private keys. All nodes are equipped with SRS security certificate checked and
authorized by a certificate authority or free. Services in place to manage effectively the keys generated by these authorities.
These certificates require a subscription to these certification authorities such as, for example, Entrust and VeriSign.
It is also possible, before moving to production, use some utilities to generate public and private keys as part of testing
applications.

3.5. Management of mobile devices and applications and WAP services use in web applications by exploiting the available services
These services allow you to manage the connections between the central node and mobile devices. Routing services support
mobile devices such as PDAs and cellular phones with WAP technology. The example of using WAP technology for online
training will be used to validate the service [3]. Mobile applications can also use the services of routing and security.




Issn 2250-3005(online)                                  September| 2012                                       Page 1579
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5



4. WSDL Structure of services routing and security
The structure of the various services put in place meets the international standard WSDL documents namely:
The WSDL document will be divided into two groups of sections. The top group consists of abstract definitions, while the
bottom group contains concrete descriptions. The abstract sections define SOAP messages (Simple Object Access Protocol)
completely independently of the platform and language.
The definition of a set of services that can be implemented by different web sites or applications. Each WSDL document can
have sections illustrated in the following diagram:




                                         Figure 5. Structure of WSDL documents [1]

5. Results and conclusion
In this part of the article, the connection service owned management services addressing is presented. Figures 6 and 7 show the
tests with the “svcutil.exe” tool from visual studio. This tool allows you to quickly test the functionality of the services
developed.




                                          Figure 6. Testing Service SRSCONNECT




                                      Figure 7. Representation of results in XML format


Issn 2250-3005(online)                               September| 2012                                      Page 1580
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5


The service takes as input SRSCONNECT four parameters (information on the source node, the mode and type of
communication) and establishes a connection between two nodes (virtual router). If the connection is established, the service
outputs the logical and physical addresses of the remote site as well as the true indicator (connected) or false (not connected).
Figures 8 and 9 show an example of using the SRS services in C # and Visual Basic. Figure 6 shows how to add references of
routing services, while Figure 9 shows a web browser, the service description and a sample source code to call the SRS.




                                   Figure 8. Reference Service SRSCONNECT on visual studio




                            Figure 9. Example of C # and Visual Basic provided by the online service
To test this service, the first thing to do is create a client and write the code to call the service. To do this, one possibility is to
use the “svcutil.exe” tool from the command line using the following syntax:
        svcutil.exe http://localhost:8731/Design_Time_Addresses/Laboratoire.Routage.Service/Routeur/?wsdl

This will create a configuration file and a code file containing the class of customer. Adding the two files to a client application
and the generated client class to call up the service SRSCONNECT. The following table shows two examples, the first source
code written in C # and Visual Basic in the second
                                C#                                                               Visual Basic
class Test                                                           Class Test
{                                                                       Shared Sub Main()
   static void Main() {                                                    Dim client As RouteurClient = New RouteurClient()
      RouteurClient client = new RouteurClient();                    'Use the variable "client" to call operations on the service.
      //Use the variable "client" to call operations on the service.       Client.srsconnect(ipsource, marqueSource, Type,
     Client.srsconnect(ipsource, marqueSource, Type,                                          Mode, IpDestination);
                        Mode, IpDestination);                         ' Always close the client.
      //Always close the client.                                           client.Close()
      client.Close(); }                                                 End Sub
}                                                                    End Class
                                  Table 1. Sample code to use the services of the routing software


Issn 2250-3005(online)                                   September| 2012                                         Page 1581
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5


Routing services and security contribute to online laboratories in the field of networks and security. With its various services in
place, you can easily create an online laboratory that learners can use to do practical work and experimental without the need
for physical facilities or to go to physical laboratories [4] [5]. This option allows to extend the use of laboratories using a
platform accessible from a web browser or mobile device.

References
[1] Microsoft documentation, Architecture windows communication foundation, http://msdn.microsoft.com/fr-
    ca/library/ms733128.aspx, site consultée en Septembre 2012
[2] Microsoft documentation, Description du langage WSDL (Web Services Description Language),
    http://msdn.microsoft.com/fr-fr/library/bb469924.aspx, site consultée en Septembre 2012
[3] Diop Alassane, Distributed environment of learning suitable for telephony and mobile computing; International Journal of
    Theoretical and Applied Information Technology (JATIT); E- ISSN 1817-3195 / ISSN 1992-8645; pp 057 – 064, Vol
    39. No. 1 – Mai 2012.
[4] Diop Alassane, Livre, Laboratoires à distance de télématique et réseaux, Analyse, conception et étude de cas pratiques
    pour l'enseignement en ligne. Edition : Éditions universitaires européennes; 2012; 144 pages; ISBN: 978-3-8417-8997-6;
    Parution: Février 2012.
[5] Diop Alassane, Architecture of a virtual and remote laboratory; International Journal of Reviews in Computing (IJRIC);
    ISSN : 2076-3328 | E-ISSN : 2076-3336; pp 017 – 021, Vol 10 – Juillet 2012.




Issn 2250-3005(online)                                 September| 2012                                       Page 1582

Weitere ähnliche Inhalte

Was ist angesagt?

Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
 
Unit I networks
Unit I networksUnit I networks
Unit I networksaguskok33
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudAugusto Ciuffoletti
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer networkProf Ansari
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Pokala Sai
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service CompositionIJERD Editor
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 

Was ist angesagt? (20)

Ijariie1170
Ijariie1170Ijariie1170
Ijariie1170
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Unit I networks
Unit I networksUnit I networks
Unit I networks
 
Network Monitoring in the age of the Cloud
Network Monitoring in the age of the CloudNetwork Monitoring in the age of the Cloud
Network Monitoring in the age of the Cloud
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
TTEthernet article
TTEthernet articleTTEthernet article
TTEthernet article
 
basics of computer network
basics of computer networkbasics of computer network
basics of computer network
 
Learn basics of ip addressing
Learn basics of  ip addressingLearn basics of  ip addressing
Learn basics of ip addressing
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications Internet of things protocols for resource constrained applications
Internet of things protocols for resource constrained applications
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
 
Md ux mza5mtg=14
Md ux mza5mtg=14Md ux mza5mtg=14
Md ux mza5mtg=14
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
 
Active Network Service Composition
Active Network Service CompositionActive Network Service Composition
Active Network Service Composition
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
OSI Model
OSI ModelOSI Model
OSI Model
 

Andere mochten auch

Acquisition of Practical Competences through a MOOC
Acquisition of Practical Competences through a MOOCAcquisition of Practical Competences through a MOOC
Acquisition of Practical Competences through a MOOCManuel Castro
 
Remote robotic laboratory as nexus between students and real engineering
Remote robotic laboratory as nexus between students and real engineeringRemote robotic laboratory as nexus between students and real engineering
Remote robotic laboratory as nexus between students and real engineeringGerman Carro Fernandez
 
TAEE 2011- State-of-the-Art Remote Laboratories for Industrial Electronics Ap...
TAEE 2011- State-of-the-Art Remote Laboratories for Industrial Electronics Ap...TAEE 2011- State-of-the-Art Remote Laboratories for Industrial Electronics Ap...
TAEE 2011- State-of-the-Art Remote Laboratories for Industrial Electronics Ap...Mohamed Tawfik
 
Integration of an e-learning Platform and a Remote Laboratory for the Experim...
Integration of an e-learning Platform and a Remote Laboratory for the Experim...Integration of an e-learning Platform and a Remote Laboratory for the Experim...
Integration of an e-learning Platform and a Remote Laboratory for the Experim...Federico Lerro
 
REV 2013 - Grid Remote Laboratory Management System: Sahara Reaches Europe
REV 2013 - Grid Remote Laboratory Management System: Sahara Reaches EuropeREV 2013 - Grid Remote Laboratory Management System: Sahara Reaches Europe
REV 2013 - Grid Remote Laboratory Management System: Sahara Reaches EuropeMohamed Tawfik
 
Pr global pharmaceuticals market
Pr global pharmaceuticals marketPr global pharmaceuticals market
Pr global pharmaceuticals marketIMARC Group
 
UNED MURE Project Amman
UNED MURE Project AmmanUNED MURE Project Amman
UNED MURE Project AmmanMohamed Tawfik
 
Tally.net and remote capabilities
Tally.net and remote capabilitiesTally.net and remote capabilities
Tally.net and remote capabilitiesAccounts Arabia
 
Cardivascular bioimplant market analysis publisher
Cardivascular bioimplant market analysis publisherCardivascular bioimplant market analysis publisher
Cardivascular bioimplant market analysis publisherRenub Research
 
Implementing ibm tivoli remote control in small to midsized enviroments redp3663
Implementing ibm tivoli remote control in small to midsized enviroments redp3663Implementing ibm tivoli remote control in small to midsized enviroments redp3663
Implementing ibm tivoli remote control in small to midsized enviroments redp3663Banking at Ho Chi Minh city
 
GOLC 2012 - On Standardizing the Management of LabVIEW-based Remote Laborator...
GOLC 2012 - On Standardizing the Management of LabVIEW-based Remote Laborator...GOLC 2012 - On Standardizing the Management of LabVIEW-based Remote Laborator...
GOLC 2012 - On Standardizing the Management of LabVIEW-based Remote Laborator...Mohamed Tawfik
 
Asignment library
Asignment libraryAsignment library
Asignment libraryhafe2
 
Learning Management Systems by Mohamed Amin Embi
Learning Management Systems by Mohamed Amin EmbiLearning Management Systems by Mohamed Amin Embi
Learning Management Systems by Mohamed Amin EmbiMohamed Amin Embi
 

Andere mochten auch (13)

Acquisition of Practical Competences through a MOOC
Acquisition of Practical Competences through a MOOCAcquisition of Practical Competences through a MOOC
Acquisition of Practical Competences through a MOOC
 
Remote robotic laboratory as nexus between students and real engineering
Remote robotic laboratory as nexus between students and real engineeringRemote robotic laboratory as nexus between students and real engineering
Remote robotic laboratory as nexus between students and real engineering
 
TAEE 2011- State-of-the-Art Remote Laboratories for Industrial Electronics Ap...
TAEE 2011- State-of-the-Art Remote Laboratories for Industrial Electronics Ap...TAEE 2011- State-of-the-Art Remote Laboratories for Industrial Electronics Ap...
TAEE 2011- State-of-the-Art Remote Laboratories for Industrial Electronics Ap...
 
Integration of an e-learning Platform and a Remote Laboratory for the Experim...
Integration of an e-learning Platform and a Remote Laboratory for the Experim...Integration of an e-learning Platform and a Remote Laboratory for the Experim...
Integration of an e-learning Platform and a Remote Laboratory for the Experim...
 
REV 2013 - Grid Remote Laboratory Management System: Sahara Reaches Europe
REV 2013 - Grid Remote Laboratory Management System: Sahara Reaches EuropeREV 2013 - Grid Remote Laboratory Management System: Sahara Reaches Europe
REV 2013 - Grid Remote Laboratory Management System: Sahara Reaches Europe
 
Pr global pharmaceuticals market
Pr global pharmaceuticals marketPr global pharmaceuticals market
Pr global pharmaceuticals market
 
UNED MURE Project Amman
UNED MURE Project AmmanUNED MURE Project Amman
UNED MURE Project Amman
 
Tally.net and remote capabilities
Tally.net and remote capabilitiesTally.net and remote capabilities
Tally.net and remote capabilities
 
Cardivascular bioimplant market analysis publisher
Cardivascular bioimplant market analysis publisherCardivascular bioimplant market analysis publisher
Cardivascular bioimplant market analysis publisher
 
Implementing ibm tivoli remote control in small to midsized enviroments redp3663
Implementing ibm tivoli remote control in small to midsized enviroments redp3663Implementing ibm tivoli remote control in small to midsized enviroments redp3663
Implementing ibm tivoli remote control in small to midsized enviroments redp3663
 
GOLC 2012 - On Standardizing the Management of LabVIEW-based Remote Laborator...
GOLC 2012 - On Standardizing the Management of LabVIEW-based Remote Laborator...GOLC 2012 - On Standardizing the Management of LabVIEW-based Remote Laborator...
GOLC 2012 - On Standardizing the Management of LabVIEW-based Remote Laborator...
 
Asignment library
Asignment libraryAsignment library
Asignment library
 
Learning Management Systems by Mohamed Amin Embi
Learning Management Systems by Mohamed Amin EmbiLearning Management Systems by Mohamed Amin Embi
Learning Management Systems by Mohamed Amin Embi
 

Ähnlich wie IJCER (www.ijceronline.com) International Journal of computational Engineering research

A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...IRJET Journal
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksIRJET Journal
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET Journal
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
 
Nt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis EssayNt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis EssayAntoinette Williams
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...DMV SAI
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 

Ähnlich wie IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)

A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Security of software defined networks: evolution and challenges
Security of software defined networks: evolution and challengesSecurity of software defined networks: evolution and challenges
Security of software defined networks: evolution and challenges
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
Nt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis EssayNt1310 Unit 3 Data Analysis Essay
Nt1310 Unit 3 Data Analysis Essay
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 

IJCER (www.ijceronline.com) International Journal of computational Engineering research

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Routing and security for remote labs for teaching and research (SRS-E-LABO) Alassane Diop Research Associate, Center for Research LICEF, TELUQ / UQAM, Montréal, Québec, Canada Abstract: In this paper, routing services and security are software components that can be integrated in an e-laboratory or remote laboratory as well as in mobile laboratories. We will show how to implement services to manage the routing and security using virtual routers. The virtual routers that we propose allow designers to online laboratories to adapt or supplement their learning environments or dedicated platforms using their services to route and secure access to physical devices and the information passed to the various network nodes to remote laboratories. The concept to be presented, based on WCF (Windows Communication Foundation), provides centralized network management at a single location while the remote labs are based on networks and distributed systems. Keywords: Remote labs, online laboratory, computer network, WAP, virtual router, security, e-laboratory, e-learning, WCF 1. Objectives and routing services security This article aims to contribute to the development of service concepts, routing and security using software components that can be integrated with laboratory environments online. These software components are presented in the form of services to manage 1) addressing the various nodes of connections, 2) the table router to forward packets from networks or sub networks connected directly or indirectly to the primary node, 3) transmission security with an encryption of information, 4) public and private keys for data privacy; 5) mobile devices and applications WAP (Wireless Application Protocol) and service use in web applications by exploiting the available services. Routing services and security for remote labs for teaching and research online (SRS) are reliable and secure transactional solutions that integrate across platforms and interoperate with existing infrastructure. The SRS will be based on the WCF architecture (Windows Communication Foundation) which is compatible with all other existing architectures because "The message parameters are defined by documents in XSD (XML Schema Definition), which allows any system comprising XML (eXtended Markup Language) to manage documents. The message contract defines specific message parts using SOAP (Simple Object Access Protocol), and allows finer control of them, when interoperability demands such precision. "[1]. Figure 1 illustrates the main layers of the WCF architecture used to implement the various services of SRS. Service contracts illustrated in Figure 1 have spoken publicly in WSDL (Web Services Description Language) [2], a format that describes network services in terms of operating parameters on messages SOAP (Simple Object Access Protocol). This allows designers to use that information to public contracts to build service oriented applications that ensures interoperability. T o transfer information on intranets and the Internet, the services use protocols such as HyperText Transfer Protocol (HTTP) and Transmission Control Protocol (TCP). Other types of transport mechanisms can be added via extension points of WCF integrated. Figure 1. WCF Architecture [1] Issn 2250-3005(online) September| 2012 Page 1577
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 2. Communication services routing and security The SRS can be used either ad hoc or infrastructure. Figures 1 and 2 show the two modes of communications services, routing and security levels and applications to an established e-collaboration environment consisting of a platform for distance learning (online platform), a site laboratory Remote (e-laboratory) and another site that hosts communication tools useful for synchronous and asynchronous learning or collaborative research (Collab). Ad hoc mode as the name suggests allows each item that uses routing services (SRS) to host and use its own services directly. These can be shared or restricted in Intranet. The communication mechanism is very simple. To deploy routing services must sequentially, initially, install a server that hosts all SRS available, then set the access "users", controls and security; mount the virtual router using local services or remote, and finally implement the global environment which exploits a remote laboratory using deletion of SRS. Information can be exchanged between sites represented by rectangles in Figure 2. Note that the communication is bidirectional. Figure 2. Communication services routing and security in ad hoc mode The infrastructure mode shown in Figure 3 allows a centralized interconnection of SRS on a single server hosting services. This communication mode is easier to maintain when updating the system. The SRS is divided for the various sites where the possibility of overloading likely. In this case a policy of performance management and bandwidth can be introduced to give priority levels to the sites. The communication mechanism is more complex to manage, compared to ad hoc mode, but the steps to establish communication and use the services remain the same. Information can be exchanged between sites represented by rectangles in Figure 3. To do everything passes through the central node of the SRS. Figure 3. Communication Services Routing and Security Infrastructure mode It is possible to combine the two basic modes for a mixed mode as shown in Figure 4. Issn 2250-3005(online) September| 2012 Page 1578
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Figure 4. Communication Services Routing and Security in Mixed Mode 3. Description of services routing and security Five management points will be treated as mentioned in Section I of this paper. 3.1. Address management of the various nodes of connections These are services for managing the global addressing of nodes sites. As input parameters, we have the IP address of the equipment and the subnet mask that hosts SRS, the type of communication (Local, Remote, Internet-Remote Intranet VPN: Virtual Private Network, etc. ...) as well as the connection mode (ad-hoc, Infrastructure, Mixed). As output parameters, we have the IP address, physical address (MAC) and indicator connection (Connected or not connected). The information will be stored in a database for tracking, transactions and security. These services allow us to have as well an overview of the system based on information collected at nodes or sites. It is even possible to make the overall network diagram that uses SRS. 3.2. Management table router to forward packets from networks or sub networks connected directly or indirectly to node These are services that manage the routing tables stored in a database routing. Virtual routes are defined to facilitate transport and routing information. As input parameters, we have the source address of the original node and the address (es) recipient (s) of the end node or end nodes. As output parameters, we have the packet flow of information from the nodes and the safety information required. It is also possible to use the broadcast address (broadcast) to transmit information at different nodes of the global network. 3.3. Security management system with a transmission of information encryption These are services that manage the security of transmissions using an encryption system. All information transmitted from node to node will be protected by an encryption algorithm using the management services described public and private keys to the next depending on whether the information coming from the central server or a node of the central system. These services also use the information generated by the management services of the routing table. So we need the source address, destination addresses and information or applications that must pass at the nodes of the central system. Output, we have information packets encrypted and then decrypted at that node by a service recipient decryption of packets. 3.4. Management of public and private keys These are services that manage the public and private keys. All nodes are equipped with SRS security certificate checked and authorized by a certificate authority or free. Services in place to manage effectively the keys generated by these authorities. These certificates require a subscription to these certification authorities such as, for example, Entrust and VeriSign. It is also possible, before moving to production, use some utilities to generate public and private keys as part of testing applications. 3.5. Management of mobile devices and applications and WAP services use in web applications by exploiting the available services These services allow you to manage the connections between the central node and mobile devices. Routing services support mobile devices such as PDAs and cellular phones with WAP technology. The example of using WAP technology for online training will be used to validate the service [3]. Mobile applications can also use the services of routing and security. Issn 2250-3005(online) September| 2012 Page 1579
  • 4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 4. WSDL Structure of services routing and security The structure of the various services put in place meets the international standard WSDL documents namely: The WSDL document will be divided into two groups of sections. The top group consists of abstract definitions, while the bottom group contains concrete descriptions. The abstract sections define SOAP messages (Simple Object Access Protocol) completely independently of the platform and language. The definition of a set of services that can be implemented by different web sites or applications. Each WSDL document can have sections illustrated in the following diagram: Figure 5. Structure of WSDL documents [1] 5. Results and conclusion In this part of the article, the connection service owned management services addressing is presented. Figures 6 and 7 show the tests with the “svcutil.exe” tool from visual studio. This tool allows you to quickly test the functionality of the services developed. Figure 6. Testing Service SRSCONNECT Figure 7. Representation of results in XML format Issn 2250-3005(online) September| 2012 Page 1580
  • 5. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 The service takes as input SRSCONNECT four parameters (information on the source node, the mode and type of communication) and establishes a connection between two nodes (virtual router). If the connection is established, the service outputs the logical and physical addresses of the remote site as well as the true indicator (connected) or false (not connected). Figures 8 and 9 show an example of using the SRS services in C # and Visual Basic. Figure 6 shows how to add references of routing services, while Figure 9 shows a web browser, the service description and a sample source code to call the SRS. Figure 8. Reference Service SRSCONNECT on visual studio Figure 9. Example of C # and Visual Basic provided by the online service To test this service, the first thing to do is create a client and write the code to call the service. To do this, one possibility is to use the “svcutil.exe” tool from the command line using the following syntax: svcutil.exe http://localhost:8731/Design_Time_Addresses/Laboratoire.Routage.Service/Routeur/?wsdl This will create a configuration file and a code file containing the class of customer. Adding the two files to a client application and the generated client class to call up the service SRSCONNECT. The following table shows two examples, the first source code written in C # and Visual Basic in the second C# Visual Basic class Test Class Test { Shared Sub Main() static void Main() { Dim client As RouteurClient = New RouteurClient() RouteurClient client = new RouteurClient(); 'Use the variable "client" to call operations on the service. //Use the variable "client" to call operations on the service. Client.srsconnect(ipsource, marqueSource, Type, Client.srsconnect(ipsource, marqueSource, Type, Mode, IpDestination); Mode, IpDestination); ' Always close the client. //Always close the client. client.Close() client.Close(); } End Sub } End Class Table 1. Sample code to use the services of the routing software Issn 2250-3005(online) September| 2012 Page 1581
  • 6. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Routing services and security contribute to online laboratories in the field of networks and security. With its various services in place, you can easily create an online laboratory that learners can use to do practical work and experimental without the need for physical facilities or to go to physical laboratories [4] [5]. This option allows to extend the use of laboratories using a platform accessible from a web browser or mobile device. References [1] Microsoft documentation, Architecture windows communication foundation, http://msdn.microsoft.com/fr- ca/library/ms733128.aspx, site consultée en Septembre 2012 [2] Microsoft documentation, Description du langage WSDL (Web Services Description Language), http://msdn.microsoft.com/fr-fr/library/bb469924.aspx, site consultée en Septembre 2012 [3] Diop Alassane, Distributed environment of learning suitable for telephony and mobile computing; International Journal of Theoretical and Applied Information Technology (JATIT); E- ISSN 1817-3195 / ISSN 1992-8645; pp 057 – 064, Vol 39. No. 1 – Mai 2012. [4] Diop Alassane, Livre, Laboratoires à distance de télématique et réseaux, Analyse, conception et étude de cas pratiques pour l'enseignement en ligne. Edition : Éditions universitaires européennes; 2012; 144 pages; ISBN: 978-3-8417-8997-6; Parution: Février 2012. [5] Diop Alassane, Architecture of a virtual and remote laboratory; International Journal of Reviews in Computing (IJRIC); ISSN : 2076-3328 | E-ISSN : 2076-3336; pp 017 – 021, Vol 10 – Juillet 2012. Issn 2250-3005(online) September| 2012 Page 1582