Use of Virtualization Technology for Linux Firewall Implementation in Teaching Computer Network
Keywords:Virtualization Technology, Netkit, Linux, Firewall, Design Network
This paper describes the use of virtualization technology in the linux network teaching process in linux firewall implementation. The problem that is often faced by teacher and student is the limitation of computer devices in implementing network topology design. The use of virtualization technology can be used as a device to create a virtual network laboratory, which is an implementation of real laboratories and network simulation software that is useful to explain the concept of computer network management. With this in mind, it can provide an overview of project characteristics, especially the implementation of linux networks in the area of virtualization technology. Linux network virtualization implementation to help the teaching process used netkit. Netkit can be used as a linux network simulation, where each virtual machine host has a linux operating system, and can implement a computer network based on the design of a real network topology. The method used to implement the Linux firewall by creating a virtual laboratory, where virtual laboratories are built based on the real network topology design. Testing is done on a virtual laboratory by implementing a network topology design and running based on a test scenario.
 Ariyanto, Yuri. Watequlis S., Yan, Harijanto, Budi. Performance Analysis of Network Emulator Based On The Use Of Resources In Virtual Laboratory. Conference Eecsi 2017 - Yogyakarta, Indonesia, 19-21 September 2017. Publisher: IEEE Doi:10.1109/Eecsi.2017.8239075.
 Paulo H. M. Gurgela*, Luiz H. C. Brancob, Ellen F. Barbosaa,Kalinka R. L. J. C. Brancoa. Development of a practical computer network course through Netkit virtualization tool. 2013 International Conference on Computational Science. Procedia Computer Science 18 ( 2013 ) 2583 â€“ 2586. Publisher : Available online at www.sciencedirect.com.
 Samuel T. King, George W. Dunlap, Peter M. Chen, Operating System Support for Virtual Machines, Proceedings of the 2003 USENIX Technical Conference, pp 71-84, June 9â€“14, San Antonio, TX, USA, 2003.
 University of Roma Tre Computer Networks Research Group. Netkit. http://www.netkit.org accessed on 2 April 2018.
 Fermin Galan, David Fernandez, Javier Ruiz, Omar Walid, and Tomas de Miguel. Use of Virtualization Tools in Computer Network Laboratories. In Proc. 5th International Conference on Information Technology Based Higher Education and Training (ITHET 2004), pages 209-214, Jun 2004.
 Maurizio Pizzonia, Massimo Rimondini. Easy Emulation of Complex Networks on Inexpensive Hardware. Proc. 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM 2008), Innsbruck, Mar 2008.
 Massimo Rimondini. Emulation of Computer Networks with Netkit. Technical Report RT-DIA-113-2007, Roma Tre University, Jan 2007.
 Hung Nguyen, Matthew Roughan, Simon Knight, Nick Falkner, Olaf Maennel, Randy Bush. How to Build Complex, Large-Scale Emulated Networks. Proc. 6th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM 2010), Berlin, May 2010.
 Gregor N. Purdy. Linux Iptables Pocket Refences. Oâ€™Reilly. www.oreilly.com. 2004.
  Qing-Xiu Wu. The Research and Application of Firewall based on Netfilter. 2012 International Conference on Solid State Devices and Materials Science. Procedia Computer Science 18 ( 2013 ) 2583 â€“ 2586. Publisher : Available online at www.sciencedirect.com.
 Larry Peterson, Bruce Davie. Computer networks - A systems approach, 3rd Edition.Morgan Kauffman, 2004.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).