A Review on the Communication Mechanism of Mobile Agent

Size: px
Start display at page:

Download "A Review on the Communication Mechanism of Mobile Agent"

Transcription

1 International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 01 5 A Review on the Communication Mechanism of Mobile Agent Arif Hidayat Abstract Mobile agent technology is becoming more popular and has been implemented in many areas. Several researches have been conducted to address its challenges, while one of the most important is agent communication. This paper will reobserve the problem of mobile agent communication. It explains the background concept of mobile agent communication as well. Subsequently, various current agent communication mechanisms are discussed. It finally summarizes how these mechanisms answer the challenges found in mobile agent communication including their advantages and disadvantages. Index Term Mobile agent, agent communication, Message Efficiently Forwarding Scheme, Distributed Sendbox Scheme, Virtual Agent-Based Communication. I. INTRODUCTION Mobile agent can be seen as a program code which is able to migrate from a host to another host within a distributed environment and access the local resources in which it resides. While Remote Procedure Call (RPC) needs an uninterrupted communication link between hosts to access remote resources, the unique mobile characteristic of a mobile software agent takes out this requirement and therefore preserves the connection channel as well as its bandwidth [1]. Typically, the deployment of mobile agent technology involves several agents collaborating to achieve a final objective. Each agent is assigned in a particular task, of which is a breakdown of the whole operation [2]. In order to perform its task, a mobile agent often needs to collaborate with its partner agent. This collaboration requires the agents to logically meet in order to passes or exchanges the information. Because of the nature of mobile agent which travels across the hosts, the communication between agents becomes a complicated issue. A reliable communication is, therefore, essential to guarantee that the agents will not face a problem during their coordination. To realize this purpose, the communication mechanism should fulfil the needs of location-transparency and reliability [3]. This paper will present several current mechanisms for agent communication and discuss their Arif Hidayat is with the University of Brawijaya, Indonesia, Jl. Veteran Malang 65145; arifhidayat@ ub.ac.id advantages and disadvantages. However, it focuses solely on the mechanism of how an agent could deliver a message to the targeted agent. It will not cover the semantic side of agent communication such as the language used by the agent to communicate between each other and so on. II. PROBLEM DEFINITION In mobile agent system, several agent communication problems arise due to its characteristic of mobility, however this paper will only discuss two of them. The first one is how to locate an agent, to which another agent needs to communicate. While an agent is continuously moving between hosts within a network, it is quite difficult to know where it resides at a specified moment. This condition leads to the need to map the location of all agents affiliate in a certain group of agent system. Allowing each agent to be able to send messages to other agents with unknown location indicates a communication mechanism to be location transparent [4]. The next issue is regarding with the delivery of the message itself. Being aware of the targeted agent does not guarantee that an agent will be able to deliver the message to its targeted partner. One reason is because the target agent may have migrated to another host before receive the sent message [5]. This situation is likely happen to a highly mobile agent. Therefore a reliable communication mechanism should be able to make sure that a message is delivered to its targeted recipient. Almost all mobile agent toolkits introduce the communication handling inside their system. This paper will only consider the most current agent communication mechanisms and discuss how they tackle afore-mentioned problems. III. BACKGROUND A. Mobile Agent Mobile agents are defined as software objects equipped with a certain level of intelligence and autonomy which can migrate from one host to another host within a distributed network to complete a particular task given by its owner [6]. Contrasting with the previous remote communication method such as Remote Procedure Call (RPC), which applies conventional Client/Server model and requires continuous

2 International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 01 6 connection between hosts, mobile agent technology is typically designed to bypass the communication link and utilize the local resources directly from the host where the resources are located [5]. For its capability, mobile agent is considered as a new potential paradigm to fulfil the need of effective and scalable answer for the problems in the area of distributed computing. Being able to move between nodes is a special characteristic of mobile agent which makes it as a favourable solution to address the problems in distributed environment. Firstly, by being mobile, an agent can access remote resources without requiring constant connection with the host, therefore saves network bandwidth and reduces the latency. Moreover, it will be able to deal with the physical problems possibly happen to the host during the execution, such as connection fault or power failure. In addition, while conventional remote access communication obligates the hosts to be always synchronous, the mobile agent implementation allows the communication between hosts to be performed asynchronously[7] Several issues must be considered in designing a mobile agent system. They are including mobility control, naming of the agents and hosts, security of the host and the agent itself, applicability within heterogeneous environment, authentication and so on. However, this paper only concerns to agent communication in the mobile agent system. B. Agent Communication In order to perform a given task effectively, a mobile agent should interacts and cooperates with others. Agents, therefore need to be able to communicate between themselves. It has been realized that communication between mobile agents is not as simple as the common communication method in a computer network. The problem is how to deliver a message to a migrating-recipient with unknown location. Several researches have been done to solve this problem. Mole system [8] introduces the session-oriented communication. In this system, a session must be established by agents want to communicate among themselves. Agents are equipped with badges, by which they can identify each other and therefore are able to set up a session. However, using an assumption that agents will not migrate during a session makes this system can not deal with a highly mobile agent. It can not offer a reliable communication as well, since agents are allowed to terminate the session anytime. Moreover, this system does not put location-transparency forward. Communication mechanism presented in Epidaure [9] uses a special communication agent to be the message dispatcher. Each message containing the address of the targeted agent and should be sent to the dispatcher, which will then deliver it to the recipient. This system suffers from the high network load if there are a lot of agents which frequently move, because the system will need to frequently update the location of all agents. Message Delivery Protocol (MDP) [6] offers a mechanism to track the location of an agent accurately. It maintains all agents addresses in a tree-like hierarchy structure. Agents are categorized into groups, each of which will be put in a domain. Each domain has a gateway and the top of all domain gateways is the root. Each server within a domain updates the address of an agent when it migrates to another domain. This procedure is logically simple, however building the hierarchical tree is a complicated task, especially in a very large distributed network such as internet. Furthermore it can not address the situation when a message is continuously chasing a highly mobile agent. There are numerous other systems have been introduced, not to mention several toolkits that cover basic mechanism for handling mobile agent communication such as Telescript, Aglets, Concordia, Voyager and so on. Regarding with these two problems of mobile agent communication, [10] has mentioned the techniques used to address the problem of either location tracking or message delivery. To deal with location tracking, each proposed system may use one of the following techniques: --Broadcast/Multicast scheme (BM), on which a sender agent broadcasts a request of recipient s location or the message itself to all hosts in the system. --Hierarchical Scheme (HS), which uses a hierarchy to store the location of all agents. Each agent has a path of its location from the root to the leaf, which is a group domain in which it resides. --Central Server Scheme (CS) utilizes a dedicated server to maintain the location path of a mobile agent. --Forwarding Pointer Scheme (FP), on which the migration path of a mobile agent is maintained by a forwarding pointer indicating its next host so that the message can reach it through the path. In order to ensure that a message is delivered to its recipient, each system may use one of these techniques: --Ostrich, on which a message is discarded when the host does not know the recipient s location. --Avoidance which applies a synchronous method, on which a mobile agent is not allowed to migrate until it receives the acknowledgments for all messages. --Detection which requires the system to be able to identify any failure of message delivery and performing an action to handle it accordingly. IV. SOLUTION APPROACH This paper will discuss three different mechanisms used in mobile agent communication, they are Message Efficiently Forwarding Scheme (MEFS), Distributed Sandbox Scheme, and Virtual Agent. These mechanisms are considered as the most recent techniques in mobile agent communication. In the discussion, this paper covers how each mechanism deals with the problems of mobile agent communication. It explores the

3 International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 01 7 operational work of each method. It will explain the advantages of each mechanism as well as its disadvantages. A. Message Efficiently Forwarding Scheme (MEFS) Jingyang et.al [10] have proposed a reliable mobile agent communication mechanism which referred as MEFS. This mechanism combines two techniques, Central Server and Forwarding Pointer Schemes, to solve the problem of location tracking as well as two other techniques, Avoidance and Detection, for delivering the message. The author illustrates the standpoint of MEFS and compares it with other systems based on the technique implemented in Figure 1. MEFS offers location-transparency to tackle the problem of Fig. 1. The position of MEFS in two dimension design space of agent communication protocol [10] location tracking. In this system, each host has the information about agents created on it and agents residing on it at present. This information is kept to be always updated by forcing a migrating agent to unregister it self and put a forwarding pointer in the current host, informing the destination to its initial host, as well as register it self in the new host. Maintaining this procedure makes each agent can be easily tracked within a network. When sender and recipient agents reside in the same host, the message will be directly delivered. Otherwise, a query asking the recipient s location will be sent by a dedicated module in the host called communicator to the recipient s home host. This home host informs the current or the destination host of its agent, so that the message will be delivered successfully. Each mobile agent always put a forwarding indicator before its migrate from a host, therefore, the communicator frequently finds the recipient s location without necessarily request it from the recipient s home host. MEFS introduces Chasing Message Register, Over-speed Agent Blocking and Regular Synchronization to particularly resolve the problem of message chasing. A message chasing happens when a message is forwarded more than a certain number of times (Co). When it happens, then the message will be stored in recipient s home host. Over-speed Agent Blocking method forces an agent to synchronize itself with its home host whenever its migration velocity is over a certain specified level (Vo). It then waits for chasing messages for an amount of time (Ts), so that it can receive them. This mechanism guarantees that each message will be received by its recipient. It completely solves the problem of location tracking and message delivery as well. However, forcing the agent to perform a regular synchronization with its home host will limit the mobility of the agent itself. The communication overhead caused by the synchronization must be considered as well, especially in an environment with a high number of agents. Moreover, it is quite difficult to configure the suitable level of Co, Vo and Ts, at which the system can optimize the trade off between reliable delivery, limitation of agent mobility, time for forwarding the message and communication overhead caused by synchronization process. B. Distributed Sendbox Scheme Leu, et.al [11] have proposed a two-modes mobile agent communication mechanism termed as distributed sandbox scheme. It manages the message delivery in the mobile agent based on the standard of Session Initiation Protocol (SIP). To deal with location-tracking, this scheme deploys a centralized server dedicated to maintain the path of all agents within a mobile agent system. To be able to migrate, each agent should register its destination host and un-register its current host to the server, so that its location can be updated. Inside the server, each agent is identified by its SIP-standard identity, formatted as agent_id<agent_id@hostname>. This mechanism introduces real time tracking as well as unreal time one. While real time tracking requires the agent to register itself to the server each time it migrates, unreal time tracking allows the agent to perform a single registration for several migration. The latter mode is beneficial for agents with high mobility, because it will not slow up their movement like its real time counterpart does. In this scheme, each agent s state is defined as either active, waiting or moving. When an agent (S) resides in a host (PS) wants to communicate with another agent, it must send a request about recipient (R) agent s location to the home server (H), which will then check the recipient s location and state. If the recipient s state is active in its host (PR), then the server asks it to turn into waiting state and replies the sender s request with the recipient s location. Both agents are now synchronized and the communication between them can be performed. This practice is called as direct mode. When the recipient s state is moving, the scheme deploys another approach called forward mode. In this mode, the sender does not directly send the message (MSR) to the migrating recipient, instead, it sends the message to the sendbox of the host on which it resides. The home server, accordingly, creates an entry (ESR) in its table containing the information about the host saving the message and the recipient s identity. When the recipient finishes its migration and registers itself from its new host (PR ), the server asks it to move to the waiting state. It then notifies the hosts that save

4 International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 01 8 Direct Mode Forward Mode Fig. 2. The operation of direct mode and forward mode [11] messages destined to this recipient to retrieve and forward them. These two modes of message delivery are depicted in Figure 2. The implementation of this scheme eliminates communication failure and message chasing. It also gives an advantage on the low network load, since each agent does not necessarily carrying un-sent messages while it is migrating. Based on the experiments, it is known that the more frequent the recipient move, the more frequent the forward mode utilized in the system. More over, it is confirmed that the number of sent messages does not affect the utilization of either direct or forward mode. The distributed sandbox scheme offers a reliable communication mechanism, however this scheme is vulnerable to communication failure for two reasons. First, there is a significant reliance of the system to the server. When there is a problem on the server because of security attack or physical damage, then the whole system will be down. Therefore a welldesigned recovery mechanism is important to be implemented. The next issue is regarding with the waiting time for an agent to receive a message. The scheme does not define the time limit for an agent to stay in waiting state in order to receive messages. When the sender agent, or sender host in forward mode, faces a problem while sending a message, then the recipient has to wait for an uncertain time. It makes the agent unable to perform any operation before the message arrives. C. Virtual Agent-Based Communication Mechanism Zhao et.al [12] have proposed a virtual agent-based mechanism for mobile agent communication. It introduces the use of virtual agent to provide a reliable message transmission. In addition, instead of deploying a server, this mechanism uses multicast to track the location of each agent within the multi agent system. Each host in the system keeps the information about all agents in three tables. The HOME_T table consists of five columns: Local_ID for the name of each agent created in this host, Addr for its address, State for its status, either static or migrating, Onway_Count for total on the way messages destined to it and VA for the presence of its virtual agent.the next is AddrLocal_T which records the agent migrating to this host, and the last is AddrRemote_T that keep the information of other agent located in other host. Each agent is identified by P_ID:L_ID, of which P_ID is the host where it resides and L_ID is a logical name given by the owner. Once it is created in home host, it should be multicasted to other hosts in order to inform this agent s presence. However, when it migrates, it registers its location only to its new host as well as its home host without necessarily multicasts other hosts. In this scheme, when the message s sender (A1) and recipient (A2) reside in the same host, then the message can be directly delivered using the information in the AddrLocal_T table. In the other situation, when both of them reside in their original hosts (HI, H2), the information in AddrRemote_T table will be useful to make the message deliverable to its recipient. The only condition in which a virtual agent needs to be created is when the recipient is migrating, identified by its migrating state in HOME_T table, to another host (H3) except the sender s host. In this case, the home host of the recipient will create a virtual agent which is a replicate of the recipient. This virtual agent receives and holds the message. When the original migrating agent arrives in new host and registers itself in both new and home hosts, then the virtual agent knows its location from Home_T table and delivers the message accordingly. This virtual agent can not migrate to other host. It can be destroyed by its host to save the host s resources. This communication mechanism provides locationtransparency. It also saves network bandwidth when it is implemented in a small mobile agent system, since the migrating agent only needs to register itself to its new and home hosts, which then store all information using three tables. However, there is no definition on what situation a virtual agent should be destroyed and when it should be kept alive. Keeping a non-operating virtual agent to stay alive will waste the host resources. Moreover, this mechanism is not efficient to be used in a large network with a lot of agents migrating frequently. One reason is because there will be high communication overhead caused by agents and their virtual counterparts to update their location and send messages. Based on the discussion, these three mechanisms provide location-transparency as well as reliable message delivery. However, each mechanism has its own primacy in a certain situation. While MEFS completely answers the problem of message chasing, Distributed Sendbox scheme is more

5 International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 01 9 Mechanism T ABLE I SUMMARY OF REVIEWED MOBILE AGENT COMMUNICATION MECHANISM MEFS Distributed Sendbox Virtual Agent-based Location transparency X X X Reliable Delivery X X X Message Chasing Solved Solved Reliance on Server X Hosts Resources Used Low Low High beneficial in term of saving bandwidth whereas Virtual Agentbased mechanism presents the best performance in small network with small number of mobile agents. The comparison over these mechanisms is summarized in Table I. V. CONCLUSION Mobile agent technology has been implemented in many areas of business and industry. This paper reviews the problem of mobile agent communication and discusses several approaches to address it. While there are number of methods have been proposed in mobile agent communication, three most current mechanisms with different approaches are discussed in this chapter. These mechanisms offer locationtransparency as well as reliable message delivery in mobile agent system. The selection of mechanism should be carried out based on the characteristics of the network, the performance of the mechanism on tackling the challenges as well as the problem may arise during the implementation. Several factors to be considered are network size, number of agents and their level of mobility, the use of hosts resources, message chasing, communication overhead and vulnerability to the failure. [8] Baumann J, Hohl F, Radouniklis N, Rothermel K, Straβer M. Communication concepts for mobile agent systems. Mobile Agents 1997: [9] Desbiens J, Lavoie M, Renaud F. Communication and tracking infrastructure of a mobile agent system. System Sciences, 1998, Proceedings of the Thirty-First Hawaii International Conference on; 1998; p vol.7. [10] Zhou J, Ja Z, Chen D. Designing reliable communication protocols for mobile agents. Distributed Computing Systems Workshops, 2003 Proceedings 23rd International Conference on; 2003; p [11] Fang-Yie L, Hsiao-Hong T, Wen-Kui C. Distributed sendbox scheme for mobile agent communication. Mobile Business, 2005 ICMB 2005 International Conference on; 2005; p [12] Jianmin Z, Xinzhong Z, Huiying X, Xinpeng Z. A New Communication Mechanism Based on Virtual Agent for Mobile Agent. Computer Supported Cooperative Work in Design, 2006 CSCWD '06 10th International Conference on; 2006; p Arif Hidayat, received the bachelor degree in agroindustrial technology from Brawijaya University, Malang, Indonesia, in 2004 and MAIT degree in applied information technology from Monash University, Australia in His current research interests include networking, decision support system and information system REFERENCES [1] Dalmeijer M, Hammer DK, Aerts ATM. Mobile software agents. Computers in Industry. 2000;41(3): [2] Pietro Picco G. Mobile agents: an introduction. Microprocessors and Microsystems. 2001;25(2): [3] Jiannong C, Liang Z, Jin Y, Das SK. A reliable mobile agent communication protocol. Distributed Computing Systems, 2004 Proceedings 24th International Conference on; 2004; p [4] Jiannong C, Xinyu F, Jian L, Das SK. Mailbox-based scheme for mobile agent communications. Computer. 2002;35(9): [5] Murphy AL, Picco GP. Reliable communication for highly mobile agents. Agent Systems and Applications, 1999 and Third International Symposium on Mobile Agents Proceedings First International Symposium on; 1999; p [6] Lazar S, Weerakoon I, Sidhu D. A scalable location tracking and message delivery scheme for mobile agents. Enabling Technologies: Infrastructure for Collaborative Enterprises, 1998 (WET ICE '98) Proceedings, Seventh IEEE International Workshops on; 1998; p [7] Tripathi A, Ahmed T, Pathak S, Carney M, Dokas P. Paradigms for mobile agent based active monitoring of network systems. Network Operations and Management Symposium, 2002 NOMS IEEE/IFIP; 2002; p

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

A Satellite Network Management Architecture based on Mobile Agents and SNMP

A Satellite Network Management Architecture based on Mobile Agents and SNMP 2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

An Overview of CORBA-Based Load Balancing

An Overview of CORBA-Based Load Balancing An Overview of CORBA-Based Load Balancing Jian Shu, Linlan Liu, Shaowen Song, Member, IEEE Department of Computer Science Nanchang Institute of Aero-Technology,Nanchang, Jiangxi, P.R.China 330034 dylan_cn@yahoo.com

More information

A Peer-to-peer Extension of Network-Enabled Server Systems

A Peer-to-peer Extension of Network-Enabled Server Systems A Peer-to-peer Extension of Network-Enabled Server Systems Eddy Caron 1, Frédéric Desprez 1, Cédric Tedeschi 1 Franck Petit 2 1 - GRAAL Project / LIP laboratory 2 - LaRIA laboratory E-Science 2005 - December

More information

On Ubiquitous Network Security and Anomaly Detection *

On Ubiquitous Network Security and Anomaly Detection * On Ubiquitous Network Security and Anomaly Detection * Colin Van Dyke Çetin K. Koç Electrical & Computer Engineering Oregon State University {vandyke,koc}@ece.orst.edu Abstract As networking trends move

More information

A Study of Application Recovery in Mobile Environment Using Log Management Scheme

A Study of Application Recovery in Mobile Environment Using Log Management Scheme A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, ashokannadurai@gmail.com, hariever4it@gmail.com,thangavelc@gmail.com, Bit Campus,

More information

What communication protocols are used to discover Tesira servers on a network?

What communication protocols are used to discover Tesira servers on a network? Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

How To Manage A Virtualization Server

How To Manage A Virtualization Server Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires

More information

Central vs. Distributed Systems

Central vs. Distributed Systems By Donald W. Larson dwlarson@mac.com http://www.timeoutofmind.com Systems architecture is the framework in which individual systems are fitted together to create a larger system. The resulting architecture

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

Service Provisioning and Management in Virtual Private Active Networks

Service Provisioning and Management in Virtual Private Active Networks Service Provisioning and Management in Virtual Private Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP) 13083-970, Campinas-SP, Brazil

More information

Simple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1)

Simple Solution for a Location Service. Naming vs. Locating Entities. Forwarding Pointers (2) Forwarding Pointers (1) Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address

More information

LDAP Authentication Configuration Appendix

LDAP Authentication Configuration Appendix 1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing

Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Adeel Anwar Abbasi*, Tahir Mehmood** {*Department of Computer Sciences, Shaheed Zulfiqar Ali Bhutto Institute of Science and

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

Best Practices for Designing a Secure Active Directory: Multi-Org Exchange Edition. written by Dmitry Sotnikov, Aelita Software.

Best Practices for Designing a Secure Active Directory: Multi-Org Exchange Edition. written by Dmitry Sotnikov, Aelita Software. Best Practices for Designing a Secure Active Directory: Multi-Org Exchange Edition written by Dmitry Sotnikov, Aelita Software White Paper Abstract This paper discusses how to select the optimal design

More information

An Advanced Commercial Contact Center Based on Cloud Computing

An Advanced Commercial Contact Center Based on Cloud Computing An Advanced Commercial Contact Center Based on Cloud Computing Li Pengyu, Chen Xin, Zhang Guoping, Zhang Boju, and Huang Daochao Abstract With the rapid development of cloud computing and information technology,

More information

White paper. Reliable and Scalable TETRA networks

White paper. Reliable and Scalable TETRA networks Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Implementing LTE International Data Roaming

Implementing LTE International Data Roaming Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

TD 271 Rev.1 (PLEN/15)

TD 271 Rev.1 (PLEN/15) INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:

More information

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets!! Large data collections appear in many scientific domains like climate studies.!! Users and

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

Naming vs. Locating Entities

Naming vs. Locating Entities Naming vs. Locating Entities Till now: resources with fixed locations (hierarchical, caching,...) Problem: some entity may change its location frequently Simple solution: record aliases for the new address

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

Event-based middleware services

Event-based middleware services 3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events

More information

Dr Markus Hagenbuchner markus@uow.edu.au CSCI319. Distributed Systems

Dr Markus Hagenbuchner markus@uow.edu.au CSCI319. Distributed Systems Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

A Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems

A Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems A Study on the Application of Existing Load Balancing Algorithms for Large, Dynamic, Heterogeneous Distributed Systems RUPAM MUKHOPADHYAY, DIBYAJYOTI GHOSH AND NANDINI MUKHERJEE Department of Computer

More information

Secure Networking Using Mobile IP

Secure Networking Using Mobile IP Secure Networking Using Mobile IP Alexandros Karakos and Konstantinos Siozios Democritus University of Thrace eepartment of Electrical and Computer Engineering GR-671 00 Xanthi, GREECE Abstract. The increasing

More information

Preserving Message Integrity in Dynamic Process Migration

Preserving Message Integrity in Dynamic Process Migration Preserving Message Integrity in Dynamic Process Migration E. Heymann, F. Tinetti, E. Luque Universidad Autónoma de Barcelona Departamento de Informática 8193 - Bellaterra, Barcelona, Spain e-mail: e.heymann@cc.uab.es

More information

A Lightweight Secure SIP Model for End-to-End Communication

A Lightweight Secure SIP Model for End-to-End Communication A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

EECS 489 Winter 2010 Midterm Exam

EECS 489 Winter 2010 Midterm Exam EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

Tunnel Broker System Using IPv4 Anycast

Tunnel Broker System Using IPv4 Anycast Tunnel Broker System Using IPv4 Anycast Xin Liu Department of Electronic Engineering Tsinghua Univ. lx@ns.6test.edu.cn Xing Li Department of Electronic Engineering Tsinghua Univ. xing@cernet.edu.cn ABSTRACT

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

A Scalable Multi-Server Cluster VoIP System

A Scalable Multi-Server Cluster VoIP System A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu mcliang@nuk.edu.tw {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi 431920472@student.ksa.edu.sa Soha S. Zaghloul smekki@ksu.edu.sa Faculty of Computer and Information

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

UserLock advanced documentation

UserLock advanced documentation UserLock advanced documentation 1. Agent deployment with msi package or with the UserLock deployment module The UserLock deployment module doesn t deploy the msi package. It just transfers the agent file

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

A Novel Service Mobility Architecture for SIP Environments

A Novel Service Mobility Architecture for SIP Environments Journal of omputer Science 3 (8): 666-672, 27 ISSN 1549-3636 27 Science Publications A Novel Service Mobility Architecture for SIP Environments Thierno Bah, Samuel Pierre, Roch Glitho epartment of omputer

More information

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,

More information

chapater 7 : Distributed Database Management Systems

chapater 7 : Distributed Database Management Systems chapater 7 : Distributed Database Management Systems Distributed Database Management System When an organization is geographically dispersed, it may choose to store its databases on a central database

More information

Load Balancing in Fault Tolerant Video Server

Load Balancing in Fault Tolerant Video Server Load Balancing in Fault Tolerant Video Server # D. N. Sujatha*, Girish K*, Rashmi B*, Venugopal K. R*, L. M. Patnaik** *Department of Computer Science and Engineering University Visvesvaraya College of

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

SwanLink: Mobile P2P Environment for Graphical Content Management System

SwanLink: Mobile P2P Environment for Graphical Content Management System SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes

More information

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007 Data Management in an International Data Grid Project Timur Chabuk 04/09/2007 Intro LHC opened in 2005 several Petabytes of data per year data created at CERN distributed to Regional Centers all over the

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

LIVE VIDEO STREAMING USING ANDROID

LIVE VIDEO STREAMING USING ANDROID LIVE VIDEO STREAMING USING ANDROID Dharini Chhajed 1, Shivani Rajput 2 and Sneha Kumari 3 1,2,3 Department of Electronics Engineering, Padmashree Dr. D. Y. Patil Institute of Engineering and Technology,

More information

It is the thinnest layer in the OSI model. At the time the model was formulated, it was not clear that a session layer was needed.

It is the thinnest layer in the OSI model. At the time the model was formulated, it was not clear that a session layer was needed. Session Layer The session layer resides above the transport layer, and provides value added services to the underlying transport layer services. The session layer (along with the presentation layer) add

More information

Storage Virtualization: Towards an Efficient and Scalable Framework

Storage Virtualization: Towards an Efficient and Scalable Framework Storage Virtualization: Towards an Efficient and Scalable Framework Bilal Y. Siddiqui School of Engineering and Computing Sciences Texas A&M University-Corpus Christi Corpus Christi, TX 78412, USA Ahmed

More information

COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters

COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly

More information

Teldat Router. DNS Client

Teldat Router. DNS Client Teldat Router DNS Client Doc. DM723-I Rev. 10.00 March, 2003 INDEX Chapter 1 Domain Name System...1 1. Introduction...2 2. Resolution of domains...3 2.1. Domain names resolver functionality...4 2.2. Functionality

More information

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

CS555: Distributed Systems [Fall 2015] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2015] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Daisy chain MapReduce jobs? Multiple

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

JSLEE and SIP-Servlets Interoperability with Mobicents Communication Platform

JSLEE and SIP-Servlets Interoperability with Mobicents Communication Platform JSLEE and SIP-Servlets Interoperability with Mobicents Communication Platform Jean Deruelle Jboss R&D, a division of Red Hat jderuell@redhat.com Abstract JSLEE is a more complex specification than SIP

More information

A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System

A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System A Reputation Replica Propagation Strategy for Mobile Users in Mobile Distributed Database System Sashi Tarun Assistant Professor, Arni School of Computer Science and Application ARNI University, Kathgarh,

More information

Software Defined Networking and OpenFlow: a Concise Review

Software Defined Networking and OpenFlow: a Concise Review Software Defined Networking and OpenFlow: a Concise Review Stefano Forti stefano.forti92@gmail.com MSc in Computer Science and Networking Scuola Superiore Sant'Anna - University of Pisa 1. Introduction

More information

How To Balance A Web Server With Remaining Capacity

How To Balance A Web Server With Remaining Capacity Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer

More information

How to Setup SQL Server Replication

How to Setup SQL Server Replication Introduction This document describes a scenario how to setup the Transactional SQL Server Replication. Before we proceed for Replication setup you can read brief note about Understanding of Replication

More information

A platform independent approach for Mobile Agents to monitor Network Vulnerabilities

A platform independent approach for Mobile Agents to monitor Network Vulnerabilities A platform independent approach for Mobile Agents to monitor Network Vulnerabilities GHULAM ALI MALLAH, DR. ZUBAIR A. SHAIKH National University of Computer & Emerging Sciences Shah Latif Town, National

More information

Distributed Systems LEEC (2005/06 2º Sem.)

Distributed Systems LEEC (2005/06 2º Sem.) Distributed Systems LEEC (2005/06 2º Sem.) Introduction João Paulo Carvalho Universidade Técnica de Lisboa / Instituto Superior Técnico Outline Definition of a Distributed System Goals Connecting Users

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Load Balancing in Distributed Data Base and Distributed Computing System

Load Balancing in Distributed Data Base and Distributed Computing System Load Balancing in Distributed Data Base and Distributed Computing System Lovely Arya Research Scholar Dravidian University KUPPAM, ANDHRA PRADESH Abstract With a distributed system, data can be located

More information

The Role of Computers in Synchronous Collaborative Design

The Role of Computers in Synchronous Collaborative Design The Role of Computers in Synchronous Collaborative Design Wassim M. Jabi, The University of Michigan Theodore W. Hall, Chinese University of Hong Kong Abstract In this paper we discuss the role of computers

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

Designing a Cloud Storage System

Designing a Cloud Storage System Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes

More information

Configuring Security for SMTP Traffic

Configuring Security for SMTP Traffic 4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic

More information

Mobile Agent System for Web Services Integration in Pervasive Networks

Mobile Agent System for Web Services Integration in Pervasive Networks Mobile Agent System for Web Services Integration in Pervasive Networks Fuyuki Ishikawa 1, Nobukazu Yoshioka 2, Yasuyuki Tahara 2, Shinichi Honiden 2,1 1 Graduate School of Information Science and Technology

More information

(debajit@seas.upenn.edu) (khadera@seas.upenn.edu) (ayesham2@seas.upenn.edu) April 19, 2007

(debajit@seas.upenn.edu) (khadera@seas.upenn.edu) (ayesham2@seas.upenn.edu) April 19, 2007 MMS MAIL SYSTEM CIS 505 PROJECT, SPRING 2007 Debajit Adhikary Khader Naziruddin Ayesha Muntimadugu (debajit@seas.upenn.edu) (khadera@seas.upenn.edu) (ayesham2@seas.upenn.edu) April 19, 2007 1 Design MMS

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Overview of Luna High Availability and Load Balancing

Overview of Luna High Availability and Load Balancing SafeNet HSM TECHNICAL NOTE Overview of Luna High Availability and Load Balancing Contents Introduction... 2 Overview... 2 High Availability... 3 Load Balancing... 4 Failover... 5 Recovery... 5 Standby

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].

More information

Resource Allocation Schemes for Gang Scheduling

Resource Allocation Schemes for Gang Scheduling Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Mobile Software Agents: an Overview

Mobile Software Agents: an Overview Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information