Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines

Size: px
Start display at page:

Download "Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines"

Transcription

1 Parallel Processing over Mobile Ad Hoc Networks of Handheld Machines Michael J Jipping Department of Computer Science Hope College Holland, MI jipping@cs.hope.edu Gary Lewandowski Department of Mathematics and Computer Science Xavier University Cincinnati, OH lewandow@cerebro.cs.xu.edu ABSTRACT In this paper, we describe the formatting guidelines for ACM SIG Proceedings. 1. INTRODUCTION Research in parallel processing and distributed computing views CPU cycles as something that can be shared, organized and contributed to a grander whole. This grander whole becomes one large machine, whose CPU cycles are shared in a protocol over a network that ties them together. While this work has often focused on static machines organized in a fixed arrangement, more opportunities are available if we can expand this work to engage mobile ad hoc networks (MANets) of computers of all sizes and capabilities. CPU cycles are available on platforms from pagers and cell phones to work stations and servers. By combining the concept of MANets with the idea of distributed executable objects, we have developed a parallel computing platform that is tolerant and effectively implements a parallel processing model. This paper documents our work that adapts a parallel computing model to operate in a diverse CPU environment held together by a mobile ad hoc network. The model tolerates machines of different configurations and capabilities that are dynamically entering and leaving the network. The next section describes background work and our motivation, and the following section describes what we believe are the requirements of a MANet that supports parallel processing. We follow this by a close look at HAND, our network model. We then describe our model of parallel computing on this network. Our conclusion points out where our work is headed. 2. BACKGROUND AND MOTIVATION As a way to enhance system performance, parallel and distributed computing models have been proposed and implemented for a long time. Early work in parallel and distributed systems focused on specialized equipment in contained environments. Goodyear s Massively Parallel Processor [1] is good examples of this early type of work MPI [5] and PVM [3] are all examples of systems that use existing networks of computers to assemble a virtual parallel processor. To truly utilize modern computing platforms, the model of parallel computing must embrace the mobility and dynamic nature of current technology. Projects like Distributed Net [4] take advantage of idle cycles in a dynamic way, but do not allow communication between processing nodes. Handheld computers provide an opportunity to extend the parallel computing model to MANets. The network tying these machines together is more likely to be a mobile ad hoc network, connecting a particular node to a network for a relatively short amount of time with bursty data rates geared toward updating information between a client and a server. Work on dynamic software models like Jini [6] has paved the way into mobile parallel computing environments. Jini is a Java-based model of computing that addresses the nature of service offerings in a dynamic environment. The motivation for our research in this area comes from using a Jini approach to sharing CPU cycles across a dynamic ad hoc network of handheld machines. We extend the Jini model by streamlining the network infrastructure to embrace a server-free and completely dynamic environment and enhancing it to facilitate easy sharing of CPU resources across a network of Jini-based devices. This work thus focuses on a networking infrastructure that enables server-free resource sharing based on the Jini approach and on a parallel computation model that takes advantage of this infrastructure. 3. CHARACTERISTICS Our MANet supporting parallel and distributed applications is called a Handheld Area Network Domain, or HAND. HAND networks, like MANets, make very few assumptions about the type of computer on the network or about how long that computer will stay connected to other nodes. HAND networks are open to many different computing architectures and models. For example, workstations, handheld machines, cell phones, and pagers may all be on the same HAND network. In particular, no assumptions should be made about when a HAND network node enters a network or about how long a HAND network node remains usable on a network. This means

2 that the network implementation needs to be passive and open regarding access to information about network nodes. No assumption about a parallel processing server is possible. Assigning server duties to a specific network node, given that we cannot assume that any node will remain on the network for long, is not feasible. No assumptions should be made about languages used or programming models imposed. This implies that a HAND network must be based on protocol standards that can be easily implemented, rather than APIs in a particular language. No assumptions should be made about the underlying network transport layers. While we will implement a HAND network using available networks, the specifications need to be given assuming an underlying transport, but not specifying one. The requirements of a HAND network imply some network characteristics. An implementation should provide a server-less environment. In that server-less network, information about nodes and the resources or services they offer must be kept local to each node. Because nodes flow in and out of the network, information about network nodes and their service offerings needs to flow as well, on a demand-driven basis. Access to information should be easy, since the information itself will change as rapidly as the network changes. 4. A HAND Model Overview The HAND model provides for a server-free implementation of parallel processing over a MANet, allowing for multiple platform implementation. It takes a layered approach to implementing services across a MANet. Figure 1 shows the big picture, depicting the layers in the HAND model. At the top is the application layer is the layer implementing a specific application that requires parallel resources. This application assumes the MANet exists, and uses the capabilities of the HAND network via a specified interface. The dispatch layer is next and receives calls for services from the application layer and dispatches tasks over the HAND network to service those requests. These service requests could be specific requests that take advantage of the parallel nature of the MANet or could be simple operating system service requests implemented by dispatching across a MANet. The infrastructure layer lies underneath the dispatch layer and comprises the MANet in 3 layers. The communication layer is at the bottom and is the assumed transport layer that supports the infrastructure of a MANet. Here, we focus on the infrastructure layer. The goals of this layer reflect the desired characteristics of a MANet for parallel processing. (1) Implement partitioning and dispatching using Jini semantics. We use the ideas of service advertisement by server implementations and service request by clients as the model for the implementation of parallel service across a HAND. (2) Implement a lightweight protocol that allows for efficient implementation of a HAND. As no assumptions can be made about the underlying communications layer, the protocol that implements this layer must be as lightweight as possible. (3) Implement simple protocols. We cannot assume large memories or fast CPUs in network nodes, and therefore, we must keep protocols and the corresponding implementations minimal. (4) Minimize the size of the kernel implementation. Again, we cannot assume large memories or fast CPUs. Therefore, we must keep the kernel that runs nodes as small as possible. 4.1 Protocol Layers The HAND model draws on the Freenet [3] model and views the infrastructure layer in protocol sublayers. Figure 1 shows the sublayers involved in the infrastructure model. The messaging layer comprises message passing capability. At this level, applications can pass messages to each other and to the server. Messages are guaranteed to either arrive or to give notice to the calling routine that they have not arrived. The network layer is the layer where the network is constructed. This layer collects information on the nodes in the network, and collects data on distance of nodes, latency of message travel, speed of CPU, and type of processing that a node can do. It interfaces with the messaging layer and presents that layer with a picture of the network. The administration layer is the "switchboard" of the infrastructure. It receives and dispatches notification of node entry and exit, and coordinates the leasing of services to and from nodes. 4.2 Network Details We view a HAND network as a set of loosely coupled nodes. Each node has only partial information about the rest of the network, and can gain more information if necessary. The set of nodes is organized as a set of neighbors. Each node has a neighbor set and communicates with the network through this neighbor set. The number of neighbors is configured by each node, but each node must have at least two. Each neighbor of a node has its own neighbor set, which includes the node in question as well as others. The resulting network is a connected network of nodes that only directly know their neighborhood but can access the entire network Information About a Network A HAND network is passive about discovering network information. Nodes do not actively collect information, rather they pick up information as other operations take place. As part of a successful message sent from node FOO to node BAR, for instance, both nodes would record that the other exists. There is one exception to this rule. The information each node keeps on its neighbors has a time-to-live (TTL) parameter. This parameter is used as a measure of maximum length of time a node goes without hearing from its neighbors. When the amount of time given by the TTL parameter for a neighbor has elapsed, a node will ping that neighbor and reset that neighbor's counter. This counter is automatically reset whenever data from the neighbor is received. Figure 1. The HAND Network Structure

3 4.2.2 Network Joining and Leaving A node enters a HAND network by broadcasting its entry and looking for neighbors. In a HAND network, there will always be nodes that can accept neighbors and the response to an entry broadcast is a set of messages from nodes willing to take on neighbors. From this set, the entering node chooses one, accepting that neighbor and rejecting others. In certain cases, a timeout can serve as a decline of a neighbor invitation. Nodes exit a HAND network in two ways. The first is a clean exit in which a message is sent to a node's neighborhood indicating an intention of leaving the network. The message causes the exiting node's neighbors to reconfigure and establish new neighbors. The second method of leaving a network is through noncommunication. Timeout errors are taken very seriously in a HAND network and signify many things. In the context of neighborhood participation, a timeout is a signal of intent to leave a network. Upon the discovery of a timeout, one further query is sent, and a second timeout implies intention to leave the network. Network reconfiguration is an important issue in HAND networks. The design of the network is meant to allow reconfiguration quickly and easily, with little penalty and easy reentrance for node that have exited or have been cut off from the network by exiting nodes. Reconfiguration must occur when a neighbor has exited for any reason and is broken into two cases: (1) the exiting neighbor has no other neighbors, or (2) the exiting neighbor has other neighborhood connections. Reconfiguration could occur in different ways, depending on how much information each node has on other nodes. As the amount of information maintained in this model is designed to be minimal, we have chosen to allow reconfiguration to occur in the same way as entering a network for the first time. See the next section for further discussion of network information and its implications for network design Administration and Maintenance There are several administrative and maintenance tasks that nodes must be responsible for when they are part of a HAND network. Identification queries can take several forms: (1) one emulates a "ping" (simply an "are you there" query), (2) one emulates an ARP (a "who are you" query), and (3) one allows the trace of a route from peer to peer in the network. These are required because of the shifting nature of HAND network neighborhoods. Some administration methods implement Jini behavior. These methods allow (1) the registration of service implementation, and (2) the request from a client for a service. Nodes can issues requests to be temporarily removed from dispatch but not from a network neighborhood. This type of "opting out" relays information to neighbors about upper layer dispatch operations while maintaining lower level network connections. A rejoin protocol signals when the node is ready to be placed back on the dispatch list. When a node realizes its neighbor is gone, this information is broadcast over the network. Since nodes build their internal network information incrementally, this broadcast helps to prune dead nodes and to eliminate unnecessary communication. 5. USING A HAND NETWORK FOR PARALLEL PROCESSING Parallel processing on a HAND network is a natural application of the service distribution built into the network. As in the Jini model, service providers announce their service and service users request a service. Rather than using a central Jini server however, the network uses the Freenet data caching model. Service registries are cached around the network at the discretion of the nodes receiving the announcement. Service requests are then handled in a manner similar to a Freenet document request: a node may have a match for the service or may pass the request on to a neighbor; nodes who have cached a matching registry can pass the request directly on to a node capable of providing the service. Unlike Freenet, however, the match is not a string match, but rather involves ensuring attributes of the request match attributes of the service registry. 5.1 Service Registries and Requests: HAND Network Agents HAND network agents are the application-level interface to the node of a HAND network. Agents are used either to distribute a resource, or to gather them and use them for some application. If, as a part of the application, code needs to be sent to another HAND network node for execution, that code is placed into a HAND network applet. The applets can define particular computations and/or message handlers. Agents advertise services using service registry objects. The registry contains a primary search string to help categorize the service and enhance network routing of requests to a possible match. It also holds a list of class names, attributes and a unique service id. Agents gather services using service request objects. The request includes a primary search string, a list of attributes the service should have, and a list of attributes the service should not have. An agent providing a service registers the service with the network and then waits for requests. When a service request arrives, the agent checks for a match with the service it provides. If a match occurs, the agent sends an offer of service to the requesting node and spawns a listener to handle further communications. Conversely, an agent requesting a service builds a service request object and sends it to the agent providing the service over the HAND network. When it receives a response, the service requester spawns a listener to deal with further communications between the nodes. Depending on the service received, communication may involve sending code or data between the two nodes. 5.2 A Parallel Computation Example There are three parts to a parallel computation: the agent that serves the CPU resource, the applet that describes the computation on the remote CPUs, and the agent that gathers the CPUs and organizes them into a computation unit. Each agent for a HAND network node providing its CPU as a resource sets up a registry and registers it with the network. The agent then listens for responses, and upon receiving a request for the CPU, spawns a thread to handle communications, and sends the requester a response that includes a communication handle to use for future messages to this agent. As the following code

4 shows, distributing the CPU resource is simple because all other operations are generically handled by the HandNetAgent The agent for the node requesting CPU resources first builds the request, then sends it to the HAND network. As the requesting agent receives responses, it adds listeners to communicate with the acquired CPUs. Upon receiving a resource, the agent can communicate with it: in this example a RUN_APPLET message is sent instructing the nodes to run MaxApplet. The listeners handle all further communication dealing with sending class bytes to the remote CPUs and requests for the code are generated automatically through an overloaded class loader. After ordering the applet to start, the agent sends data and waits for responses. The responses are in a APPLET_RESULT message which is handled by an overloaded message handler for the agent. As results are received the global max is computed. The full code for this agent follows. The last piece of the example is a HandNetApplet for computing the maximum. It is loaded by each CPU node when they receive the RUN_APPLET message. Applets include three key functions. The first is a message handler which enables the design of application- specific messages (the receipt of the data values in this case). The second applet function calculates the maximum. The third applet function is the run() function, called when the applet starts. In this example, it waits for data, calculates the max, and sends the result back to the main node of the computation. The example above is a master-slave computation typical of distributed computing applications. It is also possible to allow the gathered CPU resources to communicate with each other. The modifications to the example code above are relatively simple. The MaxAgent sends an array of communication handles (node identifiers) to each of the CPUs. The CPUs find their neighbors by moving to the left and right in this array from the index at which their handle is located. The MaxAgent waits for only one response which is the final result. After receiving the array of communication handles and the data, the applet code implements a typical tree computation. At stage i, each node sends its maximum result to the node indexed by (nodeindex - nodeindex % (2*i)). Thus, in the first stage, oddindexed CPUs send their maximum result to the even-indexed below it. The second stage sends to the CPU at twice this distance, and so on. When only one CPU remains, its result is sent to the MaxAgent. 5.3 Fault Tolerance Issues At the application level our model makes little obvious effort to handle computational difficulties related to nodes leaving the network. The network infrastructure automatically handles reconfiguring the network as necessary so the main disruption to computation is the disappearance of a computing node. We address this issue via the service model and the use of message timeouts. The service model we use allows application writers flexibility in addressing node reliability particular to a specific network. The inclusion of attributes in service registries and requests allows nodes to lease resources for a range of time. While not a guarantee of reliability, it does allow the service to speculate on itsreliability. Application writers may choose to break their tasks up into smaller pieces and issue requests for leases at each stage. (Easy re-leasing of a service is not yet included in our model but conceivably could be added to speed up these requests.) When a node disappears, the timeout from messages sent to it is propagated up to the agents sending messages. This allows a variety of options for the application writer ranging from a restart of the entire computation to a request for further resources to a redistribution of tasks. 6. CONCLUSION This paper describes work in progress on a model for constructing a network infrastructure of handheld machines that tolerates the dynamic nature of a mobile ad hoc network and provides the foundation for applications to take advantage of this type of computing network. We have described the requirements and constraints of a HAND network and have described an implementation model for the infrastructure to support such a network. We have discussed the ways we will use this model for parallel processing. There are several open questions concerning the HAND networks. One area of further study involves the network performance and the overhead of maintaining the network. In particular we need to determine if the protocol we have designed is lightweight enough to leave resources available for sharing on the handheld machines. Another area for further study involves the design, analysis and implementation of parallel algorithms on these machines. Given a HAND network, we are interested in finding a granularity of data and task length to use the network optimally. 7. REFERENCES [1] Batcher, K. Design of a Massively Parallel Processor. IEEE Transactions on Computers, Vol. 29, No. 8, September, 1980, pp [2] Clarke, I., Sandberg, O.,Wiley,B., and HongT.W., Freenet: A Distributed Anonymous Information Storage and Retrieval System in Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, ed. by H. Federrath. Springer: New York (2001). [3] Geist, G.A. and Sunderam, V.S. The PVM System: Supercomputing Level Concurrent Computations on a Heterogeneous Network of Workstations, Sixth Distributed Memory Computing Conference Proceedings, April 1991, pp [4] Hayes, B., Computing Science Collective Wisdom, American Scientist, March-April [5] Snir, M, Otto, S. Huss-Lederman, S. Walker, D. Dongarra, J. MPI: The Complete Reference, MIT Press, [6] Sun Microsystems, Jini[tm] Technology Architecture Overview, available online at

5

A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment

A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment Panagiotis D. Michailidis and Konstantinos G. Margaritis Parallel and Distributed

More information

LOAD BALANCING FOR MULTIPLE PARALLEL JOBS

LOAD BALANCING FOR MULTIPLE PARALLEL JOBS European Congress on Computational Methods in Applied Sciences and Engineering ECCOMAS 2000 Barcelona, 11-14 September 2000 ECCOMAS LOAD BALANCING FOR MULTIPLE PARALLEL JOBS A. Ecer, Y. P. Chien, H.U Akay

More information

Multilevel Load Balancing in NUMA Computers

Multilevel Load Balancing in NUMA Computers FACULDADE DE INFORMÁTICA PUCRS - Brazil http://www.pucrs.br/inf/pos/ Multilevel Load Balancing in NUMA Computers M. Corrêa, R. Chanin, A. Sales, R. Scheer, A. Zorzo Technical Report Series Number 049 July,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].

More information

Exploiting peer group concept for adaptive and highly available services

Exploiting peer group concept for adaptive and highly available services Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear Research (CERN) Switzerland Fahd Ali Zahid, Mohammad Moazam Fraz Foundation University,

More information

Principles and characteristics of distributed systems and environments

Principles and characteristics of distributed systems and environments Principles and characteristics of distributed systems and environments Definition of a distributed system Distributed system is a collection of independent computers that appears to its users as a single

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Lightweight Service-Based Software Architecture

Lightweight Service-Based Software Architecture Lightweight Service-Based Software Architecture Mikko Polojärvi and Jukka Riekki Intelligent Systems Group and Infotech Oulu University of Oulu, Oulu, Finland {mikko.polojarvi,jukka.riekki}@ee.oulu.fi

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

Token-ring local area network management

Token-ring local area network management Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

How To Understand The Concept Of A Distributed System

How To Understand The Concept Of A Distributed System Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz ens@ia.pw.edu.pl, akozakie@ia.pw.edu.pl Institute of Control and Computation Engineering Warsaw University of

More information

A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING

A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING Peer Hasselmeyer Information technology Transfer Office, Darmstadt University of Technology Wilhelminenstr. 7, 64283 Darmstadt, Germany E-mail: peer@ito.tu-darmstadt.de

More information

A Comparative Study on Vega-HTTP & Popular Open-source Web-servers

A Comparative Study on Vega-HTTP & Popular Open-source Web-servers A Comparative Study on Vega-HTTP & Popular Open-source Web-servers Happiest People. Happiest Customers Contents Abstract... 3 Introduction... 3 Performance Comparison... 4 Architecture... 5 Diagram...

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

SwanLink: Mobile P2P Environment for Graphical Content Management System

SwanLink: Mobile P2P Environment for Graphical Content Management System SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes

More information

A Dynamic, Runtime-Extensible, Client-Managed Service Framework

A Dynamic, Runtime-Extensible, Client-Managed Service Framework A Dynamic, Runtime-Extensible, Client-Managed Service Framework D. Parry G. Wells, P. Clayton Computer Science Department Rhodes University Grahamstown, 6140 Email: dom@rucus.ru.ac.za Tel: (046) 603 8640

More information

CS550. Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun

CS550. Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun CS550 Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun Email: sun@iit.edu, Phone: (312) 567-5260 Office hours: 2:10pm-3:10pm Tuesday, 3:30pm-4:30pm Thursday at SB229C,

More information

SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0

SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0 SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0 Document Scope This document describes the DHCP enhancements in SonicOS Enhanced 4.0, including DHCP server options and DHCP server persistence.

More information

Understanding Neo4j Scalability

Understanding Neo4j Scalability Understanding Neo4j Scalability David Montag January 2013 Understanding Neo4j Scalability Scalability means different things to different people. Common traits associated include: 1. Redundancy in the

More information

The Microsoft Windows Hypervisor High Level Architecture

The Microsoft Windows Hypervisor High Level Architecture The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its

More information

Overlapping Data Transfer With Application Execution on Clusters

Overlapping Data Transfer With Application Execution on Clusters Overlapping Data Transfer With Application Execution on Clusters Karen L. Reid and Michael Stumm reid@cs.toronto.edu stumm@eecg.toronto.edu Department of Computer Science Department of Electrical and Computer

More information

A Comparison of Distributed Systems: ChorusOS and Amoeba

A Comparison of Distributed Systems: ChorusOS and Amoeba A Comparison of Distributed Systems: ChorusOS and Amoeba Angelo Bertolli Prepared for MSIT 610 on October 27, 2004 University of Maryland University College Adelphi, Maryland United States of America Abstract.

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization.

technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization. technical brief in HP Overview HP is a Web-based software application designed to install, configure, manage and troubleshoot network-connected devices. It includes a Web service, which allows multiple

More information

Chapter 3 Operating-System Structures

Chapter 3 Operating-System Structures Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual

More information

Software Life-Cycle Management

Software Life-Cycle Management Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema

More information

Distributed Data Stores

Distributed Data Stores Distributed Data Stores 1 Distributed Persistent State MapReduce addresses distributed processing of aggregation-based queries Persistent state across a large number of machines? Distributed DBMS High

More information

Integrating PVaniM into WAMM for Monitoring Meta-Applications

Integrating PVaniM into WAMM for Monitoring Meta-Applications Integrating PVaniM into WAMM for Monitoring Meta-Applications R. Baraglia, M. Cosso, D. Laforenza, M. Nicosia CNUCE - Institute of the Italian National Research Council Via S. Maria, 36 - I56100 Pisa (Italy)

More information

EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications

EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani

More information

OpenMosix Presented by Dr. Moshe Bar and MAASK [01]

OpenMosix Presented by Dr. Moshe Bar and MAASK [01] OpenMosix Presented by Dr. Moshe Bar and MAASK [01] openmosix is a kernel extension for single-system image clustering. openmosix [24] is a tool for a Unix-like kernel, such as Linux, consisting of adaptive

More information

MOSIX: High performance Linux farm

MOSIX: High performance Linux farm MOSIX: High performance Linux farm Paolo Mastroserio [mastroserio@na.infn.it] Francesco Maria Taurino [taurino@na.infn.it] Gennaro Tortone [tortone@na.infn.it] Napoli Index overview on Linux farm farm

More information

Operating Systems for Parallel Processing Assistent Lecturer Alecu Felician Economic Informatics Department Academy of Economic Studies Bucharest

Operating Systems for Parallel Processing Assistent Lecturer Alecu Felician Economic Informatics Department Academy of Economic Studies Bucharest Operating Systems for Parallel Processing Assistent Lecturer Alecu Felician Economic Informatics Department Academy of Economic Studies Bucharest 1. Introduction Few years ago, parallel computers could

More information

A very short history of networking

A very short history of networking A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the

More information

Operating System Multilevel Load Balancing

Operating System Multilevel Load Balancing Operating System Multilevel Load Balancing M. Corrêa, A. Zorzo Faculty of Informatics - PUCRS Porto Alegre, Brazil {mcorrea, zorzo}@inf.pucrs.br R. Scheer HP Brazil R&D Porto Alegre, Brazil roque.scheer@hp.com

More information

Resource Allocation Schemes for Gang Scheduling

Resource Allocation Schemes for Gang Scheduling Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

S y s t e m A r c h i t e c t u r e

S y s t e m A r c h i t e c t u r e S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual

More information

q for Gods Whitepaper Series (Edition 7) Common Design Principles for kdb+ Gateways

q for Gods Whitepaper Series (Edition 7) Common Design Principles for kdb+ Gateways Series (Edition 7) Common Design Principles for kdb+ Gateways May 2013 Author: Michael McClintock joined First Derivatives in 2009 and has worked as a consultant on a range of kdb+ applications for hedge

More information

Load balancing using Remote Method Invocation (JAVA RMI)

Load balancing using Remote Method Invocation (JAVA RMI) Load balancing using Remote Method Invocation (JAVA RMI) Ms. N. D. Rahatgaonkar 1, Prof. Mr. P. A. Tijare 2 1 Department of Computer Science & Engg and Information Technology Sipna s College of Engg &

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

Distributed Systems LEEC (2005/06 2º Sem.)

Distributed Systems LEEC (2005/06 2º Sem.) Distributed Systems LEEC (2005/06 2º Sem.) Introduction João Paulo Carvalho Universidade Técnica de Lisboa / Instituto Superior Técnico Outline Definition of a Distributed System Goals Connecting Users

More information

A Review of Customized Dynamic Load Balancing for a Network of Workstations

A Review of Customized Dynamic Load Balancing for a Network of Workstations A Review of Customized Dynamic Load Balancing for a Network of Workstations Taken from work done by: Mohammed Javeed Zaki, Wei Li, Srinivasan Parthasarathy Computer Science Department, University of Rochester

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

Cassandra A Decentralized, Structured Storage System

Cassandra A Decentralized, Structured Storage System Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922

More information

Cray: Enabling Real-Time Discovery in Big Data

Cray: Enabling Real-Time Discovery in Big Data Cray: Enabling Real-Time Discovery in Big Data Discovery is the process of gaining valuable insights into the world around us by recognizing previously unknown relationships between occurrences, objects

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

Rodrigo Fernandes de Mello, Evgueni Dodonov, José Augusto Andrade Filho

Rodrigo Fernandes de Mello, Evgueni Dodonov, José Augusto Andrade Filho Middleware for High Performance Computing Rodrigo Fernandes de Mello, Evgueni Dodonov, José Augusto Andrade Filho University of São Paulo São Carlos, Brazil {mello, eugeni, augustoa}@icmc.usp.br Outline

More information

Design Patterns of Scalable Cluster System Software

Design Patterns of Scalable Cluster System Software Design Patterns of Scalable Cluster System Software Bibo Tu 1,2, Ming Zou 1,2, Jianfeng Zhan 1, Lei Wang 1 and Jianping Fan 1 1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing

More information

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets!! Large data collections appear in many scientific domains like climate studies.!! Users and

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

CHAPTER 3 LOAD BALANCING MECHANISM USING MOBILE AGENTS

CHAPTER 3 LOAD BALANCING MECHANISM USING MOBILE AGENTS 48 CHAPTER 3 LOAD BALANCING MECHANISM USING MOBILE AGENTS 3.1 INTRODUCTION Load balancing is a mechanism used to assign the load effectively among the servers in a distributed environment. These computers

More information

Parallel Ray Tracing using MPI: A Dynamic Load-balancing Approach

Parallel Ray Tracing using MPI: A Dynamic Load-balancing Approach Parallel Ray Tracing using MPI: A Dynamic Load-balancing Approach S. M. Ashraful Kadir 1 and Tazrian Khan 2 1 Scientific Computing, Royal Institute of Technology (KTH), Stockholm, Sweden smakadir@csc.kth.se,

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

Abstract. 1. Introduction

Abstract. 1. Introduction A REVIEW-LOAD BALANCING OF WEB SERVER SYSTEM USING SERVICE QUEUE LENGTH Brajendra Kumar, M.Tech (Scholor) LNCT,Bhopal 1; Dr. Vineet Richhariya, HOD(CSE)LNCT Bhopal 2 Abstract In this paper, we describe

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

Distributed Dynamic Load Balancing for Iterative-Stencil Applications Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,

More information

KVM & Memory Management Updates

KVM & Memory Management Updates KVM & Memory Management Updates KVM Forum 2012 Rik van Riel Red Hat, Inc. KVM & Memory Management Updates EPT Accessed & Dirty Bits 1GB hugepages Balloon vs. Transparent Huge Pages Automatic NUMA Placement

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Web Caching With Dynamic Content Abstract When caching is a good idea

Web Caching With Dynamic Content Abstract When caching is a good idea Web Caching With Dynamic Content (only first 5 pages included for abstract submission) George Copeland - copeland@austin.ibm.com - (512) 838-0267 Matt McClain - mmcclain@austin.ibm.com - (512) 838-3675

More information

How To Balance In Cloud Computing

How To Balance In Cloud Computing A Review on Load Balancing Algorithms in Cloud Hareesh M J Dept. of CSE, RSET, Kochi hareeshmjoseph@ gmail.com John P Martin Dept. of CSE, RSET, Kochi johnpm12@gmail.com Yedhu Sastri Dept. of IT, RSET,

More information

Distributed Systems. Examples. Advantages and disadvantages. CIS 505: Software Systems. Introduction to Distributed Systems

Distributed Systems. Examples. Advantages and disadvantages. CIS 505: Software Systems. Introduction to Distributed Systems CIS 505: Software Systems Introduction to Distributed Systems Insup Lee Department of Computer and Information Science University of Pennsylvania Distributed Systems Why distributed systems? o availability

More information

Distributed systems. Distributed Systems Architectures

Distributed systems. Distributed Systems Architectures Distributed systems Distributed Systems Architectures Virtually all large computer-based systems are now distributed systems. Information processing is distributed over several computers rather than confined

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

Multilevel Communication Aware Approach for Load Balancing

Multilevel Communication Aware Approach for Load Balancing Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1

More information

SyAM Software Management Utilities. Creating Templates

SyAM Software Management Utilities. Creating Templates SyAM Software Management Utilities Creating Templates Step 1: Setting Up Folder Paths The Management Utilities utilize a server share to perform centralized network deployment of applications and patches.

More information

Unit 3 - Advanced Internet Architectures

Unit 3 - Advanced Internet Architectures Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma

More information

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com Abstract Time Warner Cable is the second largest Cable TV operator in North America

More information

A SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS

A SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS Mihai Horia Zaharia, Florin Leon, Dan Galea (3) A Simulator for Load Balancing Analysis in Distributed Systems in A. Valachi, D. Galea, A. M. Florea, M. Craus (eds.) - Tehnologii informationale, Editura

More information

Benchmarking Hadoop & HBase on Violin

Benchmarking Hadoop & HBase on Violin Technical White Paper Report Technical Report Benchmarking Hadoop & HBase on Violin Harnessing Big Data Analytics at the Speed of Memory Version 1.0 Abstract The purpose of benchmarking is to show advantages

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

Resource Utilization of Middleware Components in Embedded Systems

Resource Utilization of Middleware Components in Embedded Systems Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system

More information

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters COSC 6374 Parallel I/O (I) I/O basics Fall 2012 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network card 1 Network card

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

Simplest Scalable Architecture

Simplest Scalable Architecture Simplest Scalable Architecture NOW Network Of Workstations Many types of Clusters (form HP s Dr. Bruce J. Walker) High Performance Clusters Beowulf; 1000 nodes; parallel programs; MPI Load-leveling Clusters

More information

AS/400e. TCP/IP routing and workload balancing

AS/400e. TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000. All rights reserved. US Government Users Restricted

More information

Distributed Systems. Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets

Distributed Systems. Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets I. Introduction II. Fundamental Concepts of Architecture models; network architectures: OSI, Internet and LANs; interprocess communication III. Time and Global States Clocks and concepts of time; Event

More information

Preserving Message Integrity in Dynamic Process Migration

Preserving Message Integrity in Dynamic Process Migration Preserving Message Integrity in Dynamic Process Migration E. Heymann, F. Tinetti, E. Luque Universidad Autónoma de Barcelona Departamento de Informática 8193 - Bellaterra, Barcelona, Spain e-mail: e.heymann@cc.uab.es

More information

Interoperability of Peer-To-Peer File Sharing Protocols

Interoperability of Peer-To-Peer File Sharing Protocols Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and

More information

Operating Systems 4 th Class

Operating Systems 4 th Class Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science

More information

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Efficient Parallel Processing on Public Cloud Servers using Load Balancing Manjunath K. C. M.Tech IV Sem, Department of CSE, SEA College of Engineering

More information

OpenFlow Based Load Balancing

OpenFlow Based Load Balancing OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple

More information

Windows8 Internals, Sixth Edition, Part 1

Windows8 Internals, Sixth Edition, Part 1 Microsoft Windows8 Internals, Sixth Edition, Part 1 Mark Russinovich David A. Solomon Alex lonescu Windows Internals, Sixth Edition, Part i Introduction xvii Chapter 1 Concepts and Tools 1 Windows Operating

More information

Session Service Architecture

Session Service Architecture Session Service Architecture Open Web Single Sign-On Version 1.0 Please send comments to: opensso@sun.com Author Alan Chu (alan.chu@sun.com) Session Service Architecture, Version 1.0 This document is subject

More information

Capacity Planning Process Estimating the load Initial configuration

Capacity Planning Process Estimating the load Initial configuration Capacity Planning Any data warehouse solution will grow over time, sometimes quite dramatically. It is essential that the components of the solution (hardware, software, and database) are capable of supporting

More information

Architecting for the cloud designing for scalability in cloud-based applications

Architecting for the cloud designing for scalability in cloud-based applications An AppDynamics Business White Paper Architecting for the cloud designing for scalability in cloud-based applications The biggest difference between cloud-based applications and the applications running

More information

Building an Inexpensive Parallel Computer

Building an Inexpensive Parallel Computer Res. Lett. Inf. Math. Sci., (2000) 1, 113-118 Available online at http://www.massey.ac.nz/~wwiims/rlims/ Building an Inexpensive Parallel Computer Lutz Grosz and Andre Barczak I.I.M.S., Massey University

More information

Cloud Storage Solution for WSN Based on Internet Innovation Union

Cloud Storage Solution for WSN Based on Internet Innovation Union Cloud Storage Solution for WSN Based on Internet Innovation Union Tongrang Fan 1, Xuan Zhang 1, Feng Gao 1 1 School of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang,

More information