Use of Virtualization Technology for Linux Firewall Implementation in Teaching Computer Network

  • Authors

    • Yuri Ariyanto
    • Budi Harijanto
    • Yan Watequlis S.
    • Awan Setiawan
    • Erfan Rohadi
    2018-12-01
    https://doi.org/10.14419/ijet.v7i4.44.26998
  • Virtualization Technology, Netkit, Linux, Firewall, Design Network
  • Abstract

    This paper describes the use of virtualization technology in the linux network teaching process in linux firewall implementation. The problem that is often faced by teacher and student is the limitation of computer devices in implementing network topology design. The use of virtualization technology can be used as a device to create a virtual network laboratory, which is an implementation of real laboratories and network simulation software that is useful to explain the concept of computer network management. With this in mind, it can provide an overview of project characteristics, especially the implementation of linux networks in the area of virtualization technology. Linux network virtualization implementation to help the teaching process used netkit. Netkit can be used as a linux network simulation, where each virtual machine host has a linux operating system, and can implement a computer network based on the design of a real network topology. The method used to implement the Linux firewall by creating a virtual laboratory, where virtual laboratories are built based on the real network topology design. Testing is done on a virtual laboratory by implementing a network topology design and running based on a test scenario.

     


  • References

    1. [1] Ariyanto, Yuri. Watequlis S., Yan, Harijanto, Budi. Performance Analysis of Network Emulator Based On The Use Of Resources In Virtual Laboratory. Conference Eecsi 2017 - Yogyakarta, Indonesia, 19-21 September 2017. Publisher: IEEE Doi:10.1109/Eecsi.2017.8239075.

      [2] Paulo H. M. Gurgela*, Luiz H. C. Brancob, Ellen F. Barbosaa,Kalinka R. L. J. C. Brancoa. Development of a practical computer network course through Netkit virtualization tool. 2013 International Conference on Computational Science. Procedia Computer Science 18 ( 2013 ) 2583 – 2586. Publisher : Available online at www.sciencedirect.com.

      [3] Samuel T. King, George W. Dunlap, Peter M. Chen, Operating System Support for Virtual Machines, Proceedings of the 2003 USENIX Technical Conference, pp 71-84, June 9–14, San Antonio, TX, USA, 2003.

      [4] University of Roma Tre Computer Networks Research Group. Netkit. http://www.netkit.org accessed on 2 April 2018.

      [5] Fermin Galan, David Fernandez, Javier Ruiz, Omar Walid, and Tomas de Miguel. Use of Virtualization Tools in Computer Network Laboratories. In Proc. 5th International Conference on Information Technology Based Higher Education and Training (ITHET 2004), pages 209-214, Jun 2004.

      [6] Maurizio Pizzonia, Massimo Rimondini. Easy Emulation of Complex Networks on Inexpensive Hardware. Proc. 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM 2008), Innsbruck, Mar 2008.

      [7] Massimo Rimondini. Emulation of Computer Networks with Netkit. Technical Report RT-DIA-113-2007, Roma Tre University, Jan 2007.

      [8] Hung Nguyen, Matthew Roughan, Simon Knight, Nick Falkner, Olaf Maennel, Randy Bush. How to Build Complex, Large-Scale Emulated Networks. Proc. 6th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM 2010), Berlin, May 2010.

      [9] Gregor N. Purdy. Linux Iptables Pocket Refences. O’Reilly. www.oreilly.com. 2004.

      [10] [10] Qing-Xiu Wu. The Research and Application of Firewall based on Netfilter. 2012 International Conference on Solid State Devices and Materials Science. Procedia Computer Science 18 ( 2013 ) 2583 – 2586. Publisher : Available online at www.sciencedirect.com.

      [11] Larry Peterson, Bruce Davie. Computer networks - A systems approach, 3rd Edition.Morgan Kauffman, 2004.

  • Downloads

  • How to Cite

    Ariyanto, Y., Harijanto, B., Watequlis S., Y., Setiawan, A., & Rohadi, E. (2018). Use of Virtualization Technology for Linux Firewall Implementation in Teaching Computer Network. International Journal of Engineering & Technology, 7(4.44), 237-241. https://doi.org/10.14419/ijet.v7i4.44.26998

    Received date: 2019-02-02

    Accepted date: 2019-02-02

    Published date: 2018-12-01