================
# NS FILE for 3 nodes connected via a switch
# Generated by NetlabClient set ns [new Simulator] source tb_compat.tcl
# Nodes set kalinode [$ns node] tb-set-node-os $kalinode KALI1 set ubuntunode [$ns node] tb-set-node-os $ubuntunode Ubuntu1004-64-STD set winxpnode [$ns node] tb-set-node-os $winxpnode WINXP-UPDATE
# Lans set lan0 [$ns make-lan "$kalinode $ubuntunode $winxpnode"
100000.0kb 0.0ms]
$ns rtproto Static
$ns run
# NetlabClient generated file ends here.
# Finished at: 9/1/13 1:37 PM
================
Create experiment – I’ll assume it’s named mytest
SWAP experiment in. The three machines will be called winxpnode.mytest.ecen5013f13.isi.deterlab.net kalinode.mytest.ecen5013f13.isi.deterlab.net ubuntunode.mytest.ecen5013f13.isi.deterlab.net
To SSH into any machines, first ssh into users.isi.deterlab.net, then ssh into a given machine.
I’ll assume you have putty. Create a new connection to users.isi.deterlab.net
And set up tunneling (click on ssh, and tunnel on left). type in 12345 as the source port and winxpnode.mytest.ecen5013f13:3389 as the destination (note: isi.deterlab.net automatically gets added, and 3389 is the port for RDP). Then click Add.
Once that’s up, you can run “Remote Desktop Connection” (if you’re using windows 7, if you start typing that in the start->”search program” box, it’ll show up).
To get your windows password, in the deterlab website, click on MyDeterlab, then click on the Profile tab, then click on Edit profile (on the left in options box)
You’ll see your windows password toward the bottom. Don’t modify it, just use it.
VNC to kalinode ssh users.isi.deterlab.net ssh kalinode.mytest.ecen5013f13
Start the vnc server prompt> sudo -H vncserver -geometry 1200x900
(type in password as requested – this is for someone to connect to the VNC server running)
You’ll see a message like:
New 'X' desktop is kalinode.mytest.ecen5013f13.isi.deterlab.net:1
Creating default startup script /root/.vnc/xstartup
Starting applications specified in /root/.vnc/xstartup
Log file is /root/.vnc/kalinode.mytest.ecen5013f13.isi.deterlab.net:1.log
To get port number: sudo cat /root/.vnc/kalinode.erica3.ecen5013f13.isi.deterlab.net:1.log
(shows port is 5901)
I used the Java TightVNC viewer http://tightvnc.com/download.php
(adjust for your settings)
Remote host = kalinode.mytest.ECEN5013F13.isi.deterlab.net
Port = 5901
Use SSH tunneling ssh server users.isi.deterlab.net