Devices Monitoring Tool with Intelligent Software Agents

Size: px
Start display at page:

Download "Devices Monitoring Tool with Intelligent Software Agents"

Transcription

1 Devices Monitoring Tool with Intelligent Software Agents Calebe de Paula Bianchini Eduardo Santana de Almeida Antonio Francisco do Prado Abstract The increasing decentralization of computational resources and the need of distributed and heterogeneous systems management are motivating the researches to construct tools that assist the network managers, in great part of their tasks through automatic monitoring devices. Pervasive computing worries about controlling the distributed devices on the computing network, including the Internet. On the other hand, the Software Engineering tries to improve the quality of process and products of software, with the reduction of efforts and costs of its development. Among the techniques to achieve these goals, stand out the ones that use software agents. The tasks signalized by events and repetitive from the different application domains are assigned to the software agents. Combining the ideas of pervasive computing and software agents, this article presents a tool for monitoring devices. It was developed based on components and uses intelligent software agents as the main mechanism to achieve the monitoring. 1. Introduction The evolution and expansion of computer networks opened up way for new applications development in this computing area, provoking a great need of improvements in the network management, to facilitate and speed up of its managers tasks. To assure these new demands, it is necessary to improve the service quality, mostly the ones related to network management. Several research fields are being developed involving network management, mainly using the SNMP (Simple Network Management Protocol)[1] management protocol. This protocol appeared in the decade of 80 with the purpose of standardizing the network and equipment management. In 1989, the SNMP was adopted as being the network management pattern based in TCP/IP[2]. That standardization interconnected environments of several manufactures and equipments. SNMP is a set of patterns for network management, that includes the protocol and the specification of a tree whose leaf node contain monitored objects of each device. The growth of Internet was motivated by the development of Web applications, accessed by devices with different software platforms. The appearance of the wireless network, also allowed the access of the Internet through mobile equipments, as digital cellular phones, PDA's, and pagers, among others. This new resource extended more the Internet boundaries, and it allowed a larger distribution of Web applications. The mobile communication protocol WAP (Wireless Application Protocol)[3] is a pattern defined by the consortium of four companies: Nokia, Ericcson, Motorola and Unwired Planet. The objective of this consortium is the convergence of the Internet with the cellular telephony, supplying specifications for the development of applications that operate on wireless. This pattern specifies a framework for applications and protocols of a network with mobile devices. Using the resources of a browser in the network, these devices, such as switches, palmtops, PDAs, cellular, and computers, they can be configured and monitored remotely[4,5]. Another technique used to speed up the network management tasks is the software agents[6]. Software agent is a computational system that inhabits some environment, which can be physical world, an user through a graphical interface, a collection of other agents, the Internet or everything together, acting in an autonomous way to reach objectives and to accomplish tasks for which it was designed[7,8]. Some researches done in this area use neural nets[9], diffuse logic[10], or simply filters[11] as agent s intelligence. Another way to define its behavior is through clauses of a logic language, like Prolog. For example, there is a language, called KB, constructed by Lumina Corporate Solutions[12]. This language incorporates the Object- Oriented[13,14] and the Logic[15,16] paradigm principles, supporting the use of software agents, which can communicate with real world objects. It supports the Object- Oriented programming, expressed in clauses in the knowledge base. Its fundamental operation is based on terms unification, and two terms are unify if there is a variable substitution that turn them the same.

2 Thus, after studies on software agents and on distributed application domain, was decided to construct a tool to assist in the network management, with distributed devices, through automatic monitoring using intelligent software agents. This article is divided as follow: section 2 presents the monitoring tool; section 3 presents a case study using the tool, and finally, section 4 presents the conclusions about this research. 2. Devices Monitoring Tool using Pervasive Computing and Software Agents The Devices Monitoring Tool, called MoDPAI, supports the specification described by the SNMP protocol. It is in a machine, and monitors distributed devices remotely in a network to, collect its information This information are analyzed by the software agents, programmed in a knowledge base, to manage the monitored devices. According to the intelligence degree, previously defined, through clauses written in the KB language[12], the agents make decision that change the devices configuration. Optionally, the network administrator can interact directly with the tool, through its interface and menus, participating in the monitoring. Figure 1 shows a typical network architecture, monitored by the MoDPAI tool. It is in a computer and offers resources to the monitoring, including the collection and information analysis, and the decision-making for network management. Each computer has a native software for its communication with the tool, through the SNMP protocol. The tool supports adding devices, the software agent s configuration, and other monitoring operational requirements. Besides the direct interaction, through a graphical interface (GUI), a digital cellular phone can be used via WAP interaction (WUI). Figure 1. Network monitoring architecture by MoDPAI tool The MoDPAI tool interacts with the Web server to receive the requisitions via WAP and send the answers via cellular phone. The database stores information about the monitored devices, and is consulted during the monitoring. Another resource is the knowledge base where the agents, that assist the network devices monitoring, are programmed. To reduce complexity, facilitate the maintenance, and increase reuse, it was used the Component-Based Development (CBD) approach in the construction of the tool. Reused software components are self-contained workmanships, clearly identified, which describe or accomplish a specific task and have clear interfaces in accordance with a given software architecture model, appropriate documentation, and a defined reused degree. Thus, MoDPAI was designed with UML (Unified Modeling Language)[14] techniques, following the Catalysis method[17] of Component-Based Development (CBD). A part of the tool was implemented in Java and the other part in the logic language KB, which supports the software agent s construction. In the first phase of Catalysis, Problem Domain, the tool s main requirements, in the network management applications domain, were identified. This step has counted with backgrounds of professional that accomplish network management tasks, and with observation techniques, meetings, and the available documentation about network management problems and the adopted solutions. In the system design, were identified two main actors whose interactions with the tool are important: the Administrator and the MonitoredDevice. The Administrator actor interacts with the tool to add devices, establish the devices that will be monitored, create software agents, define its intelligence in the knowledge base, receive messages about device problems, request reports containing devices and monitoring information, change the devices configuration, establish its control conditions, administrate the management and other operational activities of the tool. The MonitoredDevice actor interacts with the tool to establish its access type, authenticate the access requisitions, receive new configurations, report its current configuration and other activities related to its monitoring. After defining the actors, it is created the use cases, used to obtain the tool s required behaviors and establish its context and architecture. Besides the use cases, that obtain the objects behavior, other models, like the Sequence Diagram, which details each normal or alternative course of the tool use cases, were specified in this problem domain level. In the second phase of Catalysis, Components Specification, the MoDPAI tool components[13,14,17] were specified, based on the problem domain modeling. For example, the Device component, which supports the adding of monitored devices, depends on the Agent and Mib components. The Agent component[6] defines the intelligent software agent s behavior that assists the monitoring. An agent's behavior is defined through clauses in the knowledge base. The agents are able to analyze the devices configuration, defined in a Mib, and make decisions of

3 devices management, during the monitoring. The Mib component describes the devices configuration. To describe a device, the Mib component uses a language which grammar is based on the Asn1[18] pattern. It was developed an analyzer to this grammar, which verifies the devices description syntax and uses the semantic actions to generate its configuration in the database. In the third and last phase of Catalysis, Components Inner Project, it was elaborated the component inner project, based on the components specification. The Inner Project is obtained by refining the classes of the components specified in the previous step, considering the implementation constraints and the non-functional requirements. New classes and interfaces were added to take care of the component implementation aspects, considering the hardware and software platform defined for its execution. Finishing all the components, we have a first prototype of the tool, which allowed testing and validating the proposed ideas. their configuration defined by the Mib. 3. Case Study Different case studies were developed to validate the MoDPAI tool, which combines the use of pervasive computing and software agents in the distributed devices monitoring. Among the accomplished case studies, stands out the network monitoring of the UFSCar, called CDNet, composed by 1 Gateway (FreeBSD), 1 Web Server (SunOS), 1 Server (SunOS), 1 Domain Server (Windows NT Server), and 6 workstations (Windows NT Workstation). A sequence of steps that help in the use of the network devices monitoring tool, is presented Add devices Figure 2 shows the MoDPAI tool main interface. This interface is used so that the administrator can direct access the operations of adding devices and network management. Initially, the monitored devices are added, through the Device menu. The devices are identified preferentially by their IP (Internet Protocol) addresses. In the case of CDNet, we have a Gateway with IP , Web Server with IP , Server with IP , Domain Server with IP , and the workstations with IPs from to In Figure 2 we can see the CDNet added devices distribution. Figure 2 shows the screens for add devices, where it is possible to inform its IP number, socket ports[2] for communication, services type, and its Mib, and, for this last one, there are some previously defined, listed in the Mib Type combo-box, with edition possibility, through the New Mib and Edit Mib buttons. Once added the devices, we can start the first monitoring step, in which the tool collects devices information, based on Figure 2. Tool s main screen and Add device screen 3.2. Analyze data After collecting the devices information, the Administrator analyzes them to define the software agent s behavior that will be used in the monitoring. In this case, the tcpconntable table, a tcp node branch, was analyzed by the Administrator through the interface offered by the tool, allowing reducing the active connections amount in the device. This analysis, accomplished based on the collected information, in a certain period of time, is used to distinguish the software agents behavior that will act in the monitoring. In this case, the administrator analyzed: - The number of TCP and UDP packages received and sent from the intranet by the gateway, making possible a second route of data transmission through a new interface, when this number is overloading the first data transmission route; - The amount of established Web connections, relating its time and verifying the period of larger number of connections to characterize it as critical period; - The smallest and larger period among two connections, considering if the service, considered critical, did not fail; - The memory resources and the domain server disk, verifying if the latter did not stop working; and - The beginning and end of use of each station, verifying

4 the volume of information exchanged by the network and the memory and disk resources available. This analysis allows the network administrator to program the agents to help in the devices monitoring, as it proceeds Specify Software Agents After analyzing the data, we can specify the software agents, with their behavior defined through facts and rules in the knowledge base. To program the behavior, it is used the KB language[12]. Figure 3 shows the screens for a software agent specification. The KB language code is verified and, in case it is syntactically correct, it is stored in the knowledge base. transmitted are created dynamically, keeping the knowledge base updated. With the aid of rules, the traffic data are analyzed, consulting the facts already stored (2), and verifying if it is necessary to enable a new route, according to the maximum limit of packages (3) stipulated for the first route. Besides, it is possible to foresee the period of larger use of the network, advancing the action of enabling that new route, as well as the decreasing period of use of the network, allowing turning off that second route (4). For the decisions that interfere in the route, a message is generated and sent for an address and a cellular number (5), as defined at the left of Figure 3. Figure 4 shows the messages sent by the agent, after the analyzing the data, notifying the Administrator about the beginning and end of the operation of the new data transmission route. The interaction with the tool can also be done through a cellular phone, or from another mobile equipment, WAP-compatible. Through the cellular phone, it is possible to have access to most of the defined functionalities in the graphic interface of the tool, with the advantage of remote interaction with the devices, at any moment Figure 4. Notification message sent by the agent 4. Conclusion Figure 3. Screen to define the agent and its behavior Each agent interacts with only a device, identifying and correcting the problem analyzed in the previous step, acting according to the rules defined in the knowledge base. According to the making decision, the agent can send a message to the Administrator, relating this decision. At the right side of Figure 3 we have part of the KB code that defines the agent behavior, responsible for analyzing the number of packages that traffic through the gateway, enabling a new route (1), in case it is necessary. In this code, facts that indicate the period and amount of packages This work presented a device monitoring tool using pervasive computing and intelligent software agents. The Administrator, responsible for monitoring, can interact directly with the tool, or indirectly via WAP, through a digital cellular phone, or another mobile equipment. Although we have already known about the use of a cellular integrated with the Internet, this system differs mainly for its own characteristics of use of current resources of software engineering, computer network and artificial intelligence in the monitoring tasks of different devices distributed in a local network, or on the Internet. The tool stands out for being multi-platform and integrating Intelligent Software Agents techniques to accomplish tasks, assigned by the administrator, relieving him from the constant interaction, giving larger flexibility

5 for the monitoring. Other contributions come from the integration of the logical and object-oriented paradigms, using software components. Through this integration, it is possible to use fundamental characteristics of each paradigm for the intelligent software agent s construction. The Intelligent Software Agent implementation facilitates its use in other several areas, besides the network devices monitoring. Among these areas, stand out the one of information search in the Internet, e-commerce, and other areas where the object orientation and the artificial intelligence has been used with success. 5. References [1] Stallings, Willian. SNMP, SNMPv2, SNMPv3, and RMON 1 and ed. Addison-Wesley, p. [2] Tanenbaum, A. S. Computer Networks. 3 ed. Prentice Hall, p. [3] WAP Forum Specifications. WAP Forum. URL: Accessed on 01/26/2001. [4] Barillaud, F.; Deri, L.; Feridun, M. Network management using internet technologies. Fifth IFIP/IEEE International Symposium on Integrated Network Management, San Diego, CA, USA, p.61-70, [5] Maston, M. C. Using the world wide web and java for network service management. Fifth IFIP/IEEE International Symposium on Integrated Network Management, San Diego, CA, USA, p.71-84, [6] Bianchini, C.P., Sobral, D.S., Prado, A.F. A Distributed Software Agents Platform Framework. 1 st. International Software Engineering for Large-Scale Multi-Agent Systems SELMAS. Proceeding of 23 rd. International Conference of Software Engineering. Orlando, Florida USA. May [7] Maes, P. Artificial life meets entertainment: lifelike autonomous agents. Communications of the ACM, v. 38, n. 11, p , [8] Franklin, S., Graesser, A. Is it an agent or just a program?: a taxonomy for automonous agents, In: International Workshop On Agent Throries, Architecture And Languages, 3, [7] Nascimento, A.; Franklin, M.; Oliveira, M. Desenvolvendo agentes inteligentes para a gerência pró-ativa de redes ATM. XVII Simpósio Brasileiro de Redes de Computadores, Salvador, BA, Brasil, p , [8] Carvalho, E.; Belchior, A. D.; Souza, J. N. Gerenciamento próativo distribuído baseado em lógica difusa. XVII Simpósio Brasileiro de Redes de Computadores, Salvador, BA, Brasil, p , [9] Schulze, B.; Madeira, E. R. M., Ropelatto, P. MomentA: Gerenciamento de serviços usando agentes móveis em ambiente CORBA. XVII Simpósio Brasileiro de Redes de Computadores, Salvador, BA, Brasil, p , [12] Lumina Corporate Solution, Clipping Lumina URL: Accessed on 01/26/2001. [13] Furlan, J. D. Modelagem de Objetos através da UML. 1. ed. Makron Books, p. [14] Booch, G., Rumbaugh, J., Jacobson, I. UML, guia do usuário. 1. ed. Editora Campus, p. [15] Clocksin, W.F.; Mellish, C.S. Programming in prolog. 2. ed. Springer-Verlag, p. [16] Sterling, L., Shapiro, E. The Art of Prolog. 2. ed. The MIT Press, p. [17] D Souza, W. Objects, Components and Framework with UML The Catalysis Approach. Addison Wesley, [18] Dubuisson, O. ASN.1 Communication between heterogeneous systems. 1. ed. Morgan Kaufman Publ Inc, p.

Management Information Base for Power Control in Computer Networks

Management Information Base for Power Control in Computer Networks Management Information Base for Power Control in Computer Networks Roger Al Alam Krolow André Peres Ingrid Jansch Pôrto {roger, peres, ingrid}@inf.ufrgs.br Federal University of Rio Grande do Sul Programa

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Network Management: Theory and Practice

Network Management: Theory and Practice Network Management: Theory and Practice Fátima de Lima Procópio Duarte E-mail: fatima@pbh.gov.br Enterprise: Prodabel Phone:00-55-31-277-8356 Address:Av.Carlos Luz, 1275 Caiçara B.H. M.G. CEP 31230-000

More information

MANAGING NETWORK COMPONENTS USING SNMP

MANAGING NETWORK COMPONENTS USING SNMP MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:

More information

A SYSTEMATIC APPROACH FOR COMPONENT-BASED SOFTWARE DEVELOPMENT

A SYSTEMATIC APPROACH FOR COMPONENT-BASED SOFTWARE DEVELOPMENT A SYSTEMATIC APPROACH FOR COMPONENT-BASED SOFTWARE DEVELOPMENT Cléver Ricardo Guareis de Farias, Marten van Sinderen and Luís Ferreira Pires Centre for Telematics and Information Technology (CTIT) PO Box

More information

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006 Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which

More information

Design of Hospital EMR Management System

Design of Hospital EMR Management System International Journal of u-and e-service, Science and Technology, pp.341-348 http://dx.doi.org/10.14257/ijunnesst.2014.7.5.30 Design of Hospital EMR Management System Hongfeng He and Yixin Yan * Harbin

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

SNMP, CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach

SNMP, CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach , CMIP based Distributed Heterogeneous Network Management using WBEM Gateway Enabled Integration Approach Manvi Mishra Dept. of Information Technology, SRMSCET Bareilly (U.P.), India S.S. Bedi Dept of

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK. Installation Guide Introduction... 3 1. Booting from the CD... 4 2. Choose the server type to install... 5 3. Disk formatting and installation... 6 4. Confirmation of disk formatting... 7 5. Program installation...

More information

Presented by Aurang Zeb 14CS-03. Network Management System

Presented by Aurang Zeb 14CS-03. Network Management System Presented by Aurang Zeb 14CS-03 Network Management System INTRODUCTION o We can define network management as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements.

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340 XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture

More information

Heterogeneous Tools for Heterogeneous Network Management with WBEM

Heterogeneous Tools for Heterogeneous Network Management with WBEM Heterogeneous Tools for Heterogeneous Network Management with WBEM Kenneth Carey & Fergus O Reilly Adaptive Wireless Systems Group Department of Electronic Engineering Cork Institute of Technology, Cork,

More information

A Design and Implementation of Network Traffic Monitoring System for PC-room Management

A Design and Implementation of Network Traffic Monitoring System for PC-room Management A Design and Implementation of Network Traffic Monitoring System for PC-room Management Yonghak Ahn, Oksam Chae Dept. of Computer Engineering, Kyunghee University, Sochen-ri, Giheung-eup, Yongin-si, Gyeonggi-do

More information

Standardizing Information and Communication Systems

Standardizing Information and Communication Systems ECMA Technical Report TR/77 December 1999 Standardizing Information and Communication Systems Telephony System with Integrated Internet Access - Overview Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

A Multi-paradigm Approach for Mobile Agents Development

A Multi-paradigm Approach for Mobile Agents Development A Multi-paradigm Approach for Mobile Agents Development Edgardo A. Belloni 1 Abstract Mobile agent systems have received important attention in the last years as a new programming paradigm for widely distributed

More information

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents

More information

R07. IV B.Tech. II Semester Regular Examinations, April, 2011. NETWORK MANAGEMENT SYSTEMS (Information Technology)

R07. IV B.Tech. II Semester Regular Examinations, April, 2011. NETWORK MANAGEMENT SYSTEMS (Information Technology) Set No. 1 1. a) Discus about network management goals and functions in detail. b) Explain in detail about current status and future of network management. 2. a) Explain the SNMP network management architecture.

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required

More information

Implementing Network Monitoring Tools

Implementing Network Monitoring Tools Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

of moving the data to the location of the management application code, as in clientserver

of moving the data to the location of the management application code, as in clientserver Unifying WBEM and Mobile Agents Approaches for Systems Management Marco Antonio C. Simões 1,2, André Luis de M. Santos 1 1 Centro de Informática Universidade Federal de Pernambuco P.O. Box 7851, ZIP: 50732-970

More information

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto lft@inescporto.pt Luís Teixeira INESC Porto, Universidade Católica Portuguesa lmt@inescporto.pt Luís Corte-Real

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons: Unit 6 Router Management Overview Description With today s networks growing exponentially, management is a key to quality of network performance. People depend on their networks and performance issues

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

Object-Oriented Systems Analysis and Design

Object-Oriented Systems Analysis and Design Object-Oriented Systems Analysis and Design Noushin Ashrafi Professor of Information System University of Massachusetts-Boston Hessam Ashrafi Software Architect Pearson Education International CONTENTS

More information

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions

The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an

More information

DC70 NETWORK MANAGEMENT JUN 2015

DC70 NETWORK MANAGEMENT JUN 2015 Q.2 a. Most of the popular host operating systems come with the TCP/IP Suite and are amenable to SNMP management. The current networks management systems, however, suffer from several limitations. Describe

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents

Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)

More information

Chapter 18. Network Management Basics

Chapter 18. Network Management Basics Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Information Technology Security Guideline. Network Security Zoning

Information Technology Security Guideline. Network Security Zoning Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Apache Web Server Execution Tracing Using Third Eye

Apache Web Server Execution Tracing Using Third Eye Apache Web Server Execution Tracing Using Third Eye Raimondas Lencevicius Alexander Ran Rahav Yairi Nokia Research Center, 5 Wayside Road, Burlington, MA 01803, USA Raimondas.Lencevicius@nokia.com Alexander.Ran@nokia.com

More information

A network monitoring tool for student training

A network monitoring tool for student training A network monitoring tool for student training Miguel A. Mateo Pla, M.P. Malumbres Departamento de Informática de Sistemas y Computadores (DISCA) Facultad de Informática (FI) Universidad Politécnica de

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

Distributed Network Management Using SNMP, Java, WWW and CORBA

Distributed Network Management Using SNMP, Java, WWW and CORBA Distributed Network Management Using SNMP, Java, WWW and CORBA André Marcheto Augusto Hack Augusto Pacheco Augusto Verzbickas ADMINISTRATION AND MANAGEMENT OF COMPUTER NETWORKS - INE5619 Federal University

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

SEGRE: An Expert System for Pro-active Computer Network Management

SEGRE: An Expert System for Pro-active Computer Network Management SEGRE: An Expert System for Pro-active Computer Network Management Cecília A. Castro Cesar cecilia@comp.ita.cta.br Celso de Renna e Souza celsoren@comp.ita.cta.br Instituto Tecnológico da Aeronáutica -

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Simple Network Management Protocol

Simple Network Management Protocol CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

SystemWatch SM. Remote Network Monitoring

SystemWatch SM. Remote Network Monitoring SystemWatch SM Remote Network Monitoring SystemWatch Network Monitoring Service: Real World Experience Sony s SystemWatch network monitoring service uses device and networking monitoring software in conjunction

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.

More information

A process-driven methodological approach for the design of telecommunications management systems

A process-driven methodological approach for the design of telecommunications management systems A process-driven methodological approach for the design of telecommunications management systems Thierry FRAIZE, Julio VILLENA, Jean-Daniel GUEDJ TELECOM ARGENTINA Av Dorrego 2520 (1425) Buenos Aires Argentina

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Designing Real-Time and Embedded Systems with the COMET/UML method

Designing Real-Time and Embedded Systems with the COMET/UML method By Hassan Gomaa, Department of Information and Software Engineering, George Mason University. Designing Real-Time and Embedded Systems with the COMET/UML method Most object-oriented analysis and design

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr.

INFORMATION SCIENCE. INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. INFSCI 0015 DATA STRUCTURES AND PROGRAMMING TECHNIQUES 3 cr. INFORMATION SCIENCE INFSCI 0010 INTRODUCTION TO INFORMATION SCIENCE 3 cr. Introduction to the concepts, principles, and skills of information science for students with no programming experience. Topics

More information

Generating Aspect Code from UML Models

Generating Aspect Code from UML Models Generating Aspect Code from UML Models Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany Iris.Groher@fh-hagenberg.at Stefan Schulze Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich,

More information

CGI-based applications for distributed embedded systems for monitoring temperature and humidity

CGI-based applications for distributed embedded systems for monitoring temperature and humidity CGI-based applications for distributed embedded systems for monitoring temperature and humidity Grisha Spasov, Nikolay Kakanakov Abstract: The paper discusses the using of Common Gateway Interface in developing

More information

Simple Network Management Protocol

Simple Network Management Protocol A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org

More information

An Introduction to UC-Monitor

An Introduction to UC-Monitor An Introduction to UC- UC----, based upon the Internet application services, is a new generation of large-scale Distributive real time monitor system, as well as a server administration system which has

More information

Network Management (NETW-1001)

Network Management (NETW-1001) Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016 TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB Remote Management

More information

INFORMATION TECHNOLOGY PROGRAM

INFORMATION TECHNOLOGY PROGRAM INFORMATION TECHNOLOGY PROGRAM The School of Information Technology offers a two-year bachelor degree program in Information Technology for students having acquired an advanced vocational certificate.

More information

I219 Software Design Methodology

I219 Software Design Methodology I219 Software Design Methodology JAIST Master s Program Fall 2014 Nguyen Van Vu nvu@fit.hcmus.edu.vn Topics Course Introduction Objectives and Scope Evaluation Policies Content and Schedule Basic Concepts

More information

SNMP -overview. Based on: W.Stallings Data and Computer Communications

SNMP -overview. Based on: W.Stallings Data and Computer Communications SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use

More information

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14 Page 1 of 14 ! " #!"#$ % &&' Page 2 of 14 1 INTRODUCTION One of the highly desirable features of the GlobeSurfer III device is the ability to network together Printers and External Hard Disk drives (aka

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC. VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

WhatsUp Event Alarm v10.x Listener Console User Guide

WhatsUp Event Alarm v10.x Listener Console User Guide WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

www.dumpspdf.com 70-647 Get Success in Passing Your

www.dumpspdf.com 70-647 Get Success in Passing Your www.dumpspdf.com 70-647 Get Success in Passing Your Certification at first attempt! Vendor: Microsoft Exam Code: 70-647 Exam Name: Windows Server 2008,Enterprise Administrator Version: Demo www.dumpspdf.com

More information

Configuring a SIP Trunk between Avaya Aura Session Manager Release 6.1 and Avaya Communication Server 1000E Release 7.5 Issue 1.0

Configuring a SIP Trunk between Avaya Aura Session Manager Release 6.1 and Avaya Communication Server 1000E Release 7.5 Issue 1.0 Avaya Solution Interoperability Test Lab Configuring a SIP Trunk between Avaya Aura Session Manager Release 6.1 and Avaya Communication Server 1000E Release 7.5 Issue 1.0 Abstract These Application Notes

More information

Design and Implementation of Client Server Network Management System for Ethernet LAN

Design and Implementation of Client Server Network Management System for Ethernet LAN Design and Implementation of Client Server Network Management System for Ethernet LAN Ms. MAY PAING PAING ZAW and Ms. SU MYAT MARLAR SOE Abstract Network Management Systems have played a great important

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Campus VPN. Version 1.0 September 22, 2008

Campus VPN. Version 1.0 September 22, 2008 Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full

More information

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)

More information

Using the NetVanta 7100 Series

Using the NetVanta 7100 Series MENU OK CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU MENU OK CANCEL CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU OK CANCEL CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU OK CANCEL CANCEL 1 2 3 4 5 6 7 8 9 * 0 # MENU OK CANCEL 1 2

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Managing a Fibre Channel Storage Area Network

Managing a Fibre Channel Storage Area Network Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical

More information

Basic Internet programming Formalities. Hands-on tools for internet programming

Basic Internet programming Formalities. Hands-on tools for internet programming Welcome Basic Internet programming Formalities Hands-on tools for internet programming DD1335 (gruint10) Serafim Dahl serafim@nada.kth.se DD1335 (Lecture 1) Basic Internet Programming Spring 2010 1 / 23

More information

Innovative Wireless Networks. The Company s NGM-4G offering is comprised of three hardware platforms and a collection of software elements.

Innovative Wireless Networks. The Company s NGM-4G offering is comprised of three hardware platforms and a collection of software elements. NeuroMesh Broadband Gateway Node (BGN) Next Generation Mobile 4G Wireless Broadband Networks NGM 4G Architecture Wireless Switching and Gateway Systems intuitive4g networks Innovative Wireless Networks

More information

System i and System p. Customer service, support, and troubleshooting

System i and System p. Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information