As part of a broader organisational restructure, data networking research at Swinburne University of Technology has moved from the Centre for Advanced Internet Architecture (CAIA) to the Internet For Things (I4T) Research Lab.

Although CAIA no longer exists, this website reflects CAIA's activities and outputs between March 2002 and February 2017, and is being maintained as a service to the broader data networking research community.

Remote unix Learning Environment (RULE)


Uses for RULE

  1. Teaching basic introduction to Unix classes, basic commands, shell scripts and configuration of basic system components.
    1. Major shells such as tcsh, sh, bash and zsh work within a jailed environment
    2. Scripting languages such as PERL, Python and PHP work well in a jail
  2. Teaching basic networking services such as HTTP, FTP and DNS.
    1. Apache (the most popular web server in the world, with nearly 70% of the market according to www.netcraft.com) was designed to run under Unix and works well in a jail either on its own or with additional modules to support popular Web optimized scripting languages such as PHP
    2. BIND is one of the most popular name servers in the world, this is also a native Unix application that runs well in a jailed environment
    3. Teaching basic Unix programming and/or scripting
  3. As each jailed host contains a minimal FreeBSD install, standard open source development tools such as GCC and Make are included
  4. Students can familiarize themselves with Unix programming without the limitations of having standard user logins on a shared machine, in particular this allows servers to bind to standard ports and as each jail has its own IP address, servers can be easily identified by the IP address on which they are running, rather than having to assign unique non-standard ports for each student, all running on the same IP address.
  5. Network simulation - Students can use `virtual networks' of jailed hosts to perform a wide range of networking exercises and experiments without the cost of physical machines, cables and switches
  6. Secure Virtual Hosting (usually HTTP) - A jailed environment offers more flexibility than the conventional chroot method of limiting damage from intruders. As each jail has it's own IP address, it can be configured in much the same way as a dedicated machine, but without the cost dedicated hardware
  7. Providing limited access to services on a multi-user machine - As jails effectively break a single machine up into a number of sub-machines, restricting access to services becomes much simpler as rules can be set on a per `machine' basis


Using and Maintaining RULE

Feature Summary

 

Last Updated: Monday 5-Jun-2006 18:34:33 AEST | Maintained by: Jason But (jbut@swin.edu.au) | Authorised by: Grenville Armitage ( garmitage@swin.edu.au)