Size: px
Start display at page:

Download ""

Transcription

1 MobileCodeParadigmsandTechnologies: CarloGhezziandGiovanniVigna ACaseStudy Dip.ElettronicaeInformazione,PolitecnicodiMilano P.zaL.DaVinci23,20100Milano,Italy Abstract.TheopportunitiesoeredbytheInternetareencouraging [ghezzi researchaimedatthecreationofacomputationalinfrastructurethat exploitsthewidespreadcommunicationinfrastructure.themobilecomputationparadigmisaproposaltobuildacomputationalinfrastructure dynamicityandexibility.despitethepromisingrststeps,thereisstill thatgoesbeyondthewell-knownclient-serverparadigmandincreases confusionontheroleofparadigmsandtechnologyinthedevelopment onapplicationsbasedonthemobilecomputationparadigm.wepresent acasestudyinwhichwedevelopseveralversionsofanapplicationusingdierentparadigmsanddierenttechnologiesinordertoshowwhen 1Introduction theseconceptscomeintoplayandwhicharetheirrelationships. Keywords:mobilecode,designparadigms,casestudy largerbandwidthbymeansofnewnetworktechnologiesandprotocols,thecomputationalinfrastructureisstillratherprimitiveandonlyrecentlyhasbecome thefocusofsystematicresearchactivities.bycomputationalinfrastructurewe network-centricapplicationsandthedesignparadigmsaccordingtowhichsuch meanboththetechnologiesavailabletoimplementandsupportexecutionof applicationscanbestructured.althoughapplicationdevelopmentsareliterally andevolvingtechnologies,andverylittleisknownregardingdesignparadigms, besidestheconventionalclient-servermodel. explodingontheinternet,suchapplicationsaremostlydevelopedusingunstable TheInternethasnowbecomethelargestdistributedsystemeverbuilt.While thedeployedcommunicationinfrastructureisevolvingatafastpaceproviding ofdesignparadigms.infact,inordertollthisgap,theconceptofmobile work,thecomputationalinfrastructureiscomposedofa(possiblyworld-wide) researchisneededbothatthelevelofenablingtechnologiesandatthelevel computationshasbecomethefocusofmuchrecentresearch[1].inthisframe- Toconsolidatetheexplosionofnetwork-centricapplications,webelievethat distributedenvironmentwithseveralcomputationalenvironments(ces)that supportthecomputationsofexecutingunits(eus).sucheusmaychangetheir computationalenvironmentandeventhecodetheyexecutedynamically.several

2 paradigm(shortly,mobilecodeapplicationsormcas)lacksamethodological technologies,liketelescript[16],messengers[15],andjava[10]havebeenproposed.still,thedevelopmentofapplicationsbasedonthemobilecomputation background. foranyspecicapplication.thesoftwarearchitecturedesignedaccordingto usingthetechnology(languagesandtheirsupporttools)thatbesttthechosen theselecteddesignparadigmshouldthenbemappedontoanimplementation withmethodsthatallowthemtoselectthemostappropriatedesignparadigm Weenvisionanidealizedprocessbywhichsoftwaredesignersareequipped paradigm. identifythespecicissuesthatcharacterizemobilecodeapplicationsatallstages isoftenblurredandnotwellunderstood.thefocusofourworkisexactly oftheirdevelopmentprocess.inparticular,inthispaperweaddresstheissue onunderstandingtheconceptualfoundationsofmobilecomputations,tryingto Unfortunately,thedistinctionbetweenparadigms[4]andtechnologies[5] thataresuitableforseveralkindsofmobilecodeapplicationsandwediscuss ofdesignparadigmsandtechnologies.weidentifyarepertoireofparadigms theirrelationshipswithtechnologies.wewillshowhowthedierentparadigms aresult,onemightdevelopguidelinesthathelptochoosethemostappropriate canbeimplementedusingdierenttechnologies.wewillalsoshowthatcertain paradigmsaresupportedmoreeasilyandecientlybycertaintechnologies.as directionoftheabovementionedidealizedprocess. technologiesforeachparadigm.thismaybeviewedasaninitialstepinthe andimplementationissues.thecasestudyisthesearchofinformationinadistributeddatabase.insection3weidentifyaninitialrepertoireofdierentdesign paradigmsformobileapplications.basedonsuchparadigms,section4presents Thepaperisorganizedasfollows.InSection2weintroduceacasestudy thatwillbeusedthroughoutthepapertodiscussbothpossibledesignparadigms entimplementationsofourapplication.insection9wediscussimplementation classesoftechnologies,whileinsections6,7,8,weshortlypresentthedier- issues.section10drawssomeconclusionsandillustratesfuturework. dierentdesignalternativesforourcasestudy.insection5wepresentsome 2ACaseStudy asearchengine.dbmssaredistributedoverasetofcomputationalenvironments.theyareidentiedbyalocation,i.e.,thecomputationalenvironment theyarerunningon,andasymbolicnamethatuniquelyidentiesaparticular DBMSinthecorrespondingCE.EachDBMSmanagesasingletablecomposed oftwoelds:keywordanddata.thekeywordisanidentierofanentity.the dataeldmayeitherbesomekindofinformationrelatedtotheentitydenoted bythekeywordortheidentierofanotherdatabasethatmaycontainadditional cationiscomposedofseveraldatabasemanagementsystems(dbmss)andof Ourstudyapplicationisadistributedinformationretrievalsystem.Theappli- informationaboutthecorrespondingkeyword.

3 associatedwithaparticularkeyword,givenaninitialsetofdmbss.ifduring thequeryoftheseinitialdbmsssomereferencestootherdbmssarefound, thesearchenginecontinuesthesearchonthosedbmss. TheSearchEngine'staskistogatherthelargestamountofinformation 3MobileCodeParadigms totakeintoaccounttheseconceptsatthedesignlevel.weidentiedthree mainparadigmsformobilecomputations:remoteevaluation(rev),codeon fromthepointofviewofbothcodeandlocationandthereforeitisnecessary ThedesignofMCAsisachallengingtask.Suchapplicationsarehighlydynamic Demand(COD),andMobileAgent(MA)[4].Althoughwedon'tclaimthat suchparadigmscoverallpossibledesignstructuringstylesfornetwork-centric applications,theycanbeviewedasthemosttypicalrepresentatives. thatexecutesthecodeandholdsthestateofthecomputation,aredistributed puts/outputsofthecomputation,andtheprocessor,i.e.,theabstractmachine theseparadigmsdierinhowtheknow-howoftheapplication,i.e.,thecode thatisnecessarytoaccomplishthecomputation,theresources,i.e.,thein- GiventwointeractingcomponentsAandBofadistributedarchitecture, betweenthecomponents.inordertoletthiscomputationtotakeplace,allthe tothecapabilitiesdescribedabove.thetablealsoliststheclient-server(cs) paradigm.althoughconceptuallycscannotbeviewedasaparadigmformobilecomputations(nomobilitytakesplace),weincludeditbecauseitisahighly usedparadigmonnetwork-centricapplications. interestedinitseects.table1showshowtheparadigmsbehavewithrespect WeassumeAtobetheentitythatcausestheinteractionandtheonethatis threecapabilitiesabovehavetobepresentatonelocationatthesametime. client-server Paradigm Aside { know-how Bside evaluationknow-howresources demand*resources codeon remote mobile agentknow-how processorknow-how processor* Table1.Mobilecodeparadigms.Thistableshowsthelocationofthecapabilitiesjustbeforetheinteractiontakesplace.Thestar(*)indicateswherethe processorresources* capabilitiesmeet,i.e.,wherecomputationassociatedwiththeinteractiontakes

4 services.thecodethatimplementssuchservicesisownedbytheservercomponent,thus,wesaythattheserverholdstheknow-how.itistheserveritself intable1)isinterestedinaccessingsomeentitymanagedbytheserver,and thatexecutestheservice,thusithastheprocessorcapability.theclient(a IntheCSparadigm,aservercomponent(BinTable1)exportsasetof thereforeitistheserverthathastheresources. power(theprocessor)anditsresources,butdoesnotprovideany\specic" bybinitslocation. service.itisathatsendstheservicecode(theknow-how)thatwillbeexecuted IntheREVparadigm,theexecutorcomponent(B)oersitscomputational A,thecomputationiscarriedoutonA'slocation,thus,Aholdstheprocessor holdstheresources. ItisBthatprovidesthecode(i.e.,theknow-how).Oncethecodeisreceivedby capability.thecomputationinvolvesonlylocallesandlocaldevices;thus,a IntheCODparadigm,componentAinitiallyisunabletoexecuteitstask. theresourcesinvolvedreside. computationassociatedwiththeinteractiontakesplaceonb'slocationwhere IntheMAparadigm,Ahastheknow-howandprocessorcapabilities.The 4DesigninganApplication Usually,anapplication(orpartsthereof)maybedesignedfollowingdierent paradigms.inourcasestudy,wehavedesignedourapplicationusingthewellknownclient-serverparadigmandtwomobilecodeparadigms,namely,remote 4.1Client-ServerDesign AccordingtotheCSparadigm,DBMSsplaytheroleofserverswhiletheSearch Engineisasinglecomponentthatactsasaclient.EachDBMSoersaquery operationthat,givenaparticularkeywordandanindexn,returnstheinformationcontainedinthenthtuplecontainingthespeciedkeywordoranerror ifsuchtupledoesnotexist.thesearchenginequeriesthedbmsscontained initsinitialsetandthenupdatessuchsetwithpossiblenewdatabaseswhose EvaluationandMobileAgent. 4.2RemoteEvaluationDesign arenomoreunquerieddbmss. identiershavebeenfoundbypreviousqueries.thisprocessgoesonuntilthere querytheirlocaldbmssusingthesameprimitivesthatdbmssexportinthe AccordingtotheREVparadigm,theSearchEnginecomponentsendsacode evaluatedontheremotelocationswheredbmssarelocated,i.e.,newcomponentsarecreatedtoexecutethecodeonthedestinationsites.suchcomponents fragmenttothelocationofeachdbmssithastoquery.suchfragmentsare CScase.Whenaremotecomponentterminatesitstask,itsendsbacktothe

5 SearchEnginetheresultsofqueries.Iftheresultscontainsomereferencesto otherdbmssnewrevinteractionswiththeselocationsarestarted. FollowingtheMAparadigm,theSearchEngineismodeledasaseriesofcom- 4.3MobileAgentDesign issenttothelocationofeachdbmsofthegivendbmssset.eachcomponent hasaninitiallyempty\to-be-visited"listcontainingthedbmssthathavetobe mationaboutthegivenkeyword.initially,asinthecaseofrev,acomponent ponentsthatroamthroughthelocationsofthedbmssinordertocollectinfor- searchedandanempty\visited"listcontainingthedbmssthathavealready eachvisitingcomponentupdateswiththelistofitsvisiteddbmss. visited"list.there,itperformsthefollowingactions: beenvisited.oneachlocationthathostsadbmsthereisa\history"listthat 2.itupdatesthelocal\history"withits\visited"list; 1.itchecksthelocal\history"andprunesits\to-be-visited"listaccordingly; AcomponentAmigratestothelocationoftherstDBMSinits\to-be- 3.itchecksifanothercomponentBispresentlysearchingthelocalDBMS.If (a)aprovidesbwithitsown\visited"list,sothatbcanupdateits\tobe-visited"listaccordingly; itisso,ainteractswithbfollowingthesesteps: 4.ifits\to-be-visited"listdoesnotcontainthecurrentDBMSanymore,A (b)abalancesits\to-be-visited"listwiththeb'sone; (c)aremovesthecurrentdbmsfromits\to-be-visited"list; 7.migratestothelocationoftherstDBMSofthe\to-be-visited"listifany; 5.iftheliststillcontainsthecurrentDBMS,itsearchestheDBMS,possibly 6.addsthevisitedDBMStothelocal\history"; skipstostep7; otherwiseitgoesbacktothestartinglocationandreportsitsresults. enrichingits\to-be-visited"list; 5ImplementationTechnologies HavingdesignedaMCAaccordingtosomeparadigm,onehastochooseatechnologytoimplementit.Givenaparticularparadigm,whichtechnologyshould beused? Message-basedThesetechnologiesenablethecommunicationbetweenremote WeaklymobileThesetechnologiesprovidemechanismsthatenableanEUto Weidentifythreeclassesoftechnologies[7]: sendcodetobeexecutedinaremotecetogetherwithsomeinitialization EUsintheformofmessageexchange.AtypicalexampleisRPC[2]. dataortobinddynamicallycodedownloadedfromaremoteeu.examples ofsuchtechnologiesarethershfacilityinunix,languageslikem0[14]and Obliq[3],orsystemslikeTACOMA[9]andMole[13].

6 StronglymobileThesetechnologiesenableEUstomovewiththeircodeand typesoftechnologies.wechosetcl-dp[12],obliq[3],andagenttcl[8]. Weimplementedthedierentarchitecturesofourapplicationusingdierent executionstatetoadierentce.anexampleisrepresentedbythetelescript Tcl-DPisanextensionoftheTcllanguage[11]fordistributedprogramming. technology. Tcl-DPprovidessupportforTCP/IPandRPCprogramming.Itisamessagebasedtechnology. supportsremotemethodinvocationandremoteevaluationofcode.thereforeit isbothamessage-basedandaweaklymobiletechnology. AnexecutingTclscriptcanmovefromonehosttoanotherwithasinglejump Obliqisanuntyped,object-based,lexicallyscoped,interpretedlanguage.It instruction.ajumpfreezestheprogramexecutioncontextandtransmitsitto adierenthostwhichresumesthescriptexecutionfromtheinstructionthat followsthejump.thereforeagenttclcanbeviewedasastronglymobile AgentTclprovidesaTclinterpreterextendedwithsupportforEUmigration. technology. designsbasedonthecs,rev,andmaparadigmscanbeimplementedusing Tcl-DP,Obliq,andAgentTcl. Sections6through8provideaninformalandsuccinctdescriptionofhowthe Inthisversionoftheapplication,weusedTcl-DPtoimplementtheCSarchitecture.TheDBMScomponentisimplementedasaprocessrunningaTcl-DP 6.1Message-basedTechnology interpreteractingasanrpcserverthatexportsasinglequeryservicewith thecharacteristicsdescribedinsection2.thesearchenginecomponentis implementedasanotherprocessrunningatcl-dpinterpreterthatactsasan RPCclient.TheclientqueriestheserverusingRPCprimitives.TheCEsare 6.2WeaklyMobileTechnology representedbyunixhosts. 6ImplementingtheClient-ServerArchitecture tousethemechanismsforremoteevaluationofcodeoeredbythelanguage, tecture.evenifobliqenablestheremoteinvocationofmethods,wedecided WeusedtheObliqlanguagetoimplementthisversionoftheapplicationarchiuationofcodesupportstheCSparadigm.Wehaveimplementedlocationsas sinceourgoalherewastoevaluatehowatechnologybasedontheremoteeval- Obliqinterpretersthatexportengines(i.e.,executionservices),andDBMSsas objectsthatenclosethedatabasedataandprovideaquerymethod.thesearch interpretersinordertoevaluatesegmentsofcoderemotely.atrun-timethe SearchEnginechoosesaDBMSandsendsapieceofcodecontainingasingle Engineisathreadinaninterpreterthatusestheenginesexportedbyother

7 querymethodinvocationtotheremoteengineoftheinterpretercontainingthe 6.3StronglyMobileTechnology createdthreadandthentheresultsaredeliveredback. DBMS.Thesingleinvocationisperformedintheremoteinterpreterbyanewly WeusedAgentTcltoimplementtheClient-Serverarchitecture.Inthissetting thedbmssarestationaryagentsthatacceptqueriesfromagentslocatedonthe samesite(representedbyaunixhostextendedwiththeagenttclrun-time toitsstartingsite. support).thesearchengineisamovingagentthat,inordertoqueryadbms, 7ImplementingtheRemoteEvaluationArchitecture jumpstothecorrespondingsite,performsasinglequery,andthenjumpsback WeusedtheTcl-DPlanguagetoimplementtheREVarchitecture.Inthis 7.1Message-BasedTechnology case,theremotesiteisextendedwithaprocessrunningthetcl-dpinterpreter thatperformsasetofqueries,itsendstotheremoteexecutoraservicerequest thatactsasacodeexecutor.itisanrpcserverthatexportstheservice containingthequeryscript.inturn,theexecutorinterpretsthescriptthat localprocesses.whenthesearchenginewantstoevaluateremotelythecode DPinterpretersthatexportthequeryserviceasintheCScase,butonlyto execute.suchservicetakesasaparameteratcl-dpscript.dbmssaretclqueriesthedbmsandthenreturnstheresultsback. WeusedObliqtoimplementtheREVarchitecture.Inthisimplementation,the SearchEnginethreadrequeststheexecutionofthequerycodetotheremote 7.2WeaklyMobileTechnology thecode.thenewlycreatedthreadperformsalltheneededqueriestothelocal enginecorrespondingtoaparticulardbms.anewthreadiscreatedtoexecute DBMS,which,asinthecaseofCS,isanobjectownedbytheremoteinterpreter. 7.3StronglyMobileTechnology Then,theresultsaredeliveredbacktothesourcesite. WeusedAgentTcltoimplementtheREVarchitecture.Inthisimplementation \squad"ofagentsissenttothesitesofthedbmsswhoseidentiershavebeen totheoriginalsitewiththeresults.suchresultsareanalyzedandthenanew foundduringtheexecutionofpreviousqueryprocess. intheinitialset,performthesetofqueryonthelocaldbmss,andthenreturn thesearchenginecreatesasetofagentsthatjumptothesitesofeachdbms

8 WeusedTcl-DPtoimplementtheMAarchitecture.Inthiscase,theDBMSs 8.1Message-BasedTechnology 8ImplementingtheMobileAgentArchitecture computation)intoamessageandthensendthemessagetoanexecutorthat \visited"listsandthevaluesofsomestatevariablesthatkeeptraceoftheir arerpcserversthatacceptqueriesfromlocalprocesseswhilesearchengine unpacksthemessageandcreatesanewcomponent.thenewcomponentuses mobilecomponentspacktheircodeandstate(i.e.,their\to-be-visited"and mobilecomponentsaretcl-dpscripts.inordertomovefromsitetosite,such theinformationstoredinthestatepartofthemessageinordertorestoreits executionow.afterdispatchingthemessagetotheremoteexecutor,thesender terminates. migratefromoneinterpretertoanother,whenasearchenginecomponentmust WeusedObliqtoimplementtheMAarchitecture.SinceObliqthreadscannot migratetoanotherinterpreteritcreatesacopyofitselfontheremotesiteand 8.2WeaklyMobileTechnology thenterminates.inordertokeeptrackoftheexecution,anobjectisusedto maintainthestateofthecomponent.aftereach\jump",thenewlycreated threadmustcreatealocalcopyoftheobjectrepresentingthestateandperform someoperationsbasedonitscontentsinordertore-establishthestateofthe computation. 8.3StronglyMobileTechnology WeusedAgentTcltoimplementtheMAarchitecture.TheSearchEngineis composedofasetofagents.atstartup,suchagentsmigratetothelocationsof i.e.,theyquerythelocaldbmsand,ifreferencestootherdbmssarefound, theymigratetosuchlocations,untiltheir\to-be-visited"listbecomesempty. thegivensetofdbmss.there,theyperformthestepsdescribedinsection4.3, Eventually,theyjumpbacktotheirstartingsiteandreporttheirndings. 9Discussion Thecasestudydescribedintheprevioussectionsshowsthatparadigmsandtechnologiesarenotcompletelyorthogonal.Inprinciple,itispossibletoimplement applicationsdevelopedwithanyparadigmbyusinganykindoftechnology,given thatsuchtechnologiesallowforthecommunicationbetweeneus.however,we havefoundthatsometechnologiesaremoresuitabletoimplementapplications inecient,counter-intuitiveuseoftheexistingones. opertoprogram,attheapplicationlevel,somemobilitymechanismsorforcean designedusingparticularparadigms.unsuitabletechnologiesforcethedevel-

9 mentingarchitecturesbasedonthecsparadigm.iftheyareusedtoimplement REV-basedarchitectures,theyforcetheimplementortouse(unnaturally)code asdataandtoprogramtheevaluationofsuchcodeexplicitly.evenworse,if message-basedtechnologiesareusedtoimplementma-basedarchitectures,the AsshowninTable2,message-basedtechnologiesarewellsuitedforimple- programmerhasalsotocodestatemanagement,i.e.,auxiliaryvariablesmustbe usedtokeepthestateofthecomputationandunnaturalcodestructuresmust arenaturallyorientedtowardstheimplementationofmcasdesignedaccording beusedtorestorethestateofacomponentaftermigratingtoadierentsite. chitecturessincetheyforcetheremoteexecutionofsegmentsofcodecomposed totherevparadigm.thesetechnologiesareinecienttoimplementcsar- ofasingleinstruction.thereforeaneweuiscreatedinordertoexecutethis Weaklymobiletechnologiesthatallowtoexecutesegmentsofcoderemotely packing/unpackingofthevariablesrepresentingthestateandtherestoringof themaparadigm,theprogrammerhastomanage,attheprogramlevel,the \degenerate"code.onthecontrary,inordertoimplementmcasbasedon theeuexecutionow. whiletheyarenotsuitedforimplementingapplicationsbasedonthecsand REVparadigms.Intheformercase,theprogrammerhasto\overcode"anagent inordertohaveitmovedtotheserversite,executeasingleoperationandjump backwiththeresults.suchimplementationscouldberatherinecientsince StronglymobiletechnologiesareorientedtowardsMA-basedapplications thewholeeustateistransmittedbackandforthacrossthenetwork.inthe lattercase,inadditiontothecodetobeexecutedremotely,theimplementor hastoaddthemigrationprocedures.furthermore,thestateoftheeuistobe transmittedoverthenetwork. plementaparticulararchitecture.intherstcaseresourcesarewasted,resulting andpoliciesthatthetechnologydoesnotprovide. inineciency.inthesecondcasetheprogrammerhastocodeallmechanisms Summingup,technologiesmayrevealtobetoopowerfulortoolimitedtoim- andtechnologiesthatconstitutethecomputationalinfrastructureofthisnew Theever-increasinggrowthofMCAshasstimulatedresearchonmethodologies 10Conclusions classofapplications.severaltechnologies,withdierentcharacteristicshave beenproposed.yet,aclearmethodologicalframeworkisstillmissing;many andtechnologies conceptsarenotclearlydenedandthereisoftenconfusionaboutparadigms tectureofanapplicationcanbedesignedintermsofinteractingcomponents. distributedapplications. Technologiesprovidemechanismsthatcanbeusedtoimplementnetwork-centric Mobilecodeparadigmsarethestylesaccordingtowhichthesoftwarearchi- thedevelopmenttheseconceptscomeinplayandwhicharetherelationships Wehavedevelopedacasestudyinordertounderstandinwhichphaseof

10 Technologies Message-based CS Paradigms Weaklymobile Codeisasingle Wellsuited PrograminterpretationProgramstaterestoring Codeasdata Wellsuited REV Codeandstateasdata Stateasdata MA StronglymobileCodeisasingle Createsunnecessary executionunits instruction ManagemigrationProgramstaterestoring Createsunnecessary Movestateback executionunits instruction Movestateback andforth Wellsuited Table2.Relationshipsamongparadigmsandtechnologies. andforth betweenparadigmsandtechnologies. applicationsdesignedusingaparticularparadigmandwhicharethediculties ortheinecienciesthatstemoutfromtheusetheinappropriatetechnology. Wehaveidentiedwhichclassoftechnologiesarewellsuitedtoimplement couldconsiderthestudyofareal-lifemobilecodeapplication.inaddition,more technologiesandparadigmsmightbeconsidered,otherthanthosediscussedhere. Atpresent,weareextendingourworkbydevelopingacasestudythatincludes thecodparadigm,whichwasnotcoveredhere,andusesothertechnologieslike Ourcasestudyisa\toy"applicationoflimitedcomplexity.Futurework JavaandTACOMA. implementation.asanexample,testinganddebuggingphasesarestronglyin- thantestingof\traditional"applicationssincethecongurationofcomponents andthebindingamongcomponentsandcodeisdynamic.inaddition,debugging uencedbytheintroductionofmobility.testingofmcasismuchmoredicult Wedidnotcoverphasesofthedevelopmentprocessotherthandesignand codethatisexecutedremotelyisachallengingtask.furtherworkisneededto fullyunderstandtheeectofthenewcomputationalinfrastructureprovidedby thenetworkontheentirelifecycleofmcas. Apreliminarytreatmentoftheissuesdiscussedinthispapercanbefoundin[6]. Acknowledgments WewishtothankTullioDoveraandRobertoNespoliforimplementingmostof bilecodelanguagesandparadigmswascarriedoutwithg.cugola,a.carzaniga, theexperimentsillustratedhere.thepreviousworkaboutclassicationofmo- G.P.Picco,andA.Fuggetta.

11 References 1.J.Baumann,C.Tschudin,andJ.Vitek,editors.Proceedingsofthe2ndECOOP 2.A.D.BirrellandB.J.Nelson.Implementingremoteprocedurecalls.Technical 3.L.Cardelli.Obliq:Alanguagewithdistributedscope.Technicalreport,Digital ReportCSL-83-7,XEROX,October1983. EquipmentCorporation,SystemsResearchCenter,May1995. WorkshoponMobileObjects("AgentsontheMove"), A.Carzaniga,G.P.Picco,andG.Vigna.DesigningDistributedApplicationsusing 5.G.Cugola,C.Ghezzi,G.P.Picco,andG.Vigna.AnalyzingMobileCodeLanguages.InSpecialIssueonMobileObjectSystems,LNCS.Springer-Verlag,1997. SoftwareEngineering,May1997. MobileCodeParadigms.InProceedingsofthe1997InternationalConferenceon 6.T.DoveraandR.Nespoli.Paradigmietecnologieperlosviluppodiapplicazioni 7.C.Ghezzi,G.Cugola,G.P.Picco,andG.Vigna.ACharacterizationofMobilityandStateDistributioninMobileCodeLanguages.InProceedingsofthe2nd basatesucodicemobile.master'sthesis,politecnicodimilano,1996. Toappear. 8.R.S.Gray.AgentTcl:ATransportableAgentSystem.InProceedingsofthe 9.D.Johansen,R.vanRenesse,andF.B.Schneider.AnIntroductiontothe CIKM'95WorkshoponIntelligentInformationAgents,1995. ECOOPWorkshoponMobileObjectSystems,July SunMicrosystems.TheJavaLanguage:AWhitePaper.Technicalreport,Sun sityoftromsandcornelluniversity",june1995. TACOMADistributedSystem-Version1.0.TechnicalReport95-23,"Univer- 13.M.Straer,J.Baumann,andF.Hohl.MOLE:AJavaBasedMobileAgentSystem. 12.B.SmithandL.Rowe.Tcl-DP.Documentation, J.K.Ousterhout.TclandtheTkToolkit.Addison-Wesley,1994. Microsystems, C.F.Tschudin.AnIntroductiontotheM0MessengerLanguage.Universityof 15.ChristianF.Tschudin.OO-AgentsandMessengers.InECOOP'95Workshopon Geneva,Switzerland,1994. InProceedingsofthe2ndECOOPWorkshoponMobileObjects("Agentsonthe Move"), JamesE.White.TelescriptTechnology:TheFoundationfortheElectronicMarketplace.Technicalreport,GeneralMagic,Inc.,1994.WhitePaper. ObjectsandAgents,August1995.

Mobile Code for Distributed Applications/Systems

Mobile Code for Distributed Applications/Systems Mobile Code for Distributed Applications/Systems Koo Lee Chun School of Computing University Utara Malaysia, Kedah, Malaysia leechunkoo@yahoo.com Abstract Traditional technologies exhibited many limitation

More information

M.A. in Communication Studies

M.A. in Communication Studies 1 M.A. in Communication Studies Communication Studies Courses CM 7390 Seminar in Professional Development 3 CM 8300 Foundations in Communication Studies 3 CM 9300 Foundations in Communication Theory 3

More information

How to Setup and Use Web Employee Time Entry

How to Setup and Use Web Employee Time Entry How to Setup and Use Web Employee Time Entry Web Employee time entry works in conjunction with Remote Payroll. For information on using Remote Payroll, see Knowledgebase article K47183455. When a payroll

More information

ATC Case Study. Air Traffic Control Case Study. ATC Requirements. SE380-F'02-Lecture 17 11/4/2002. 2002 by Eric A. Durant, Ph.D. 1.

ATC Case Study. Air Traffic Control Case Study. ATC Requirements. SE380-F'02-Lecture 17 11/4/2002. 2002 by Eric A. Durant, Ph.D. 1. ATC Case Study History Advanced Automation System (AAS) Initial Sector Suite System (ISSS) Display System Replacement (DSR) Requirements and qualities Architectural approach Components Redundancy Assessment

More information

Ourmainaiminthispaperistovisuallyunderstandthespatialrelationshipsbetween

Ourmainaiminthispaperistovisuallyunderstandthespatialrelationshipsbetween ClassVisualizationofHigh-DimensionalDatawith InderjitS.Dhillon,DharmendraS.Modha,andW.ScottSpangler Emailforcorrespondence:dmodha@almaden.ibm.com 65HarryRoad,SanJose,CA9512-699 IBMAlmadenResearchCenter

More information

FUTURE MAN investing Company Date: 06-11-15

FUTURE MAN investing Company Date: 06-11-15 EUR/USD 240M (Swing Trade Set-up) EURUSD Daily (8) : Bullish 240M (8) : Bearish Short : Stad aside Long : Stand aside EUR/USD 60M (Short Term Set-up) EURUSD Daily (8) : Bull Rev 60M (8) : Bearish Short

More information

Lytec 2014 Hardware and Software Requirements. Lytec Single-User Hardware and Software Requirements

Lytec 2014 Hardware and Software Requirements. Lytec Single-User Hardware and Software Requirements Workstation Hardware - Required This chapter identifies the hardware and software requirements for this release. Lytec Single-User Hardware and Software Requirements Hardware Minimum Required Intel Pentium

More information

VII. Database System Architecture

VII. Database System Architecture VII. Database System Lecture Topics Monolithic systems Client/Server systems Parallel database servers Multidatabase systems CS338 1 Monolithic System DBMS File System Each component presents a well-defined

More information

Java Smart Cards as a Platform for Electronic Commerce

Java Smart Cards as a Platform for Electronic Commerce Java Smart Cards as a Platform for Electronic Commerce 1 Java Smart Cards as a Platform for Electronic Commerce Joachim Posegga Deutsche Telekom AG Technologiezentrum IT Sicherheit/FE34a D-64276 Darmstadt

More information

CS550. Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun

CS550. Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun CS550 Distributed Operating Systems (Advanced Operating Systems) Instructor: Xian-He Sun Email: sun@iit.edu, Phone: (312) 567-5260 Office hours: 2:10pm-3:10pm Tuesday, 3:30pm-4:30pm Thursday at SB229C,

More information

Invocación remota (based on M. L. Liu Distributed Computing -- Concepts and Application http://www.csc.calpoly.edu/~mliu/book/index.

Invocación remota (based on M. L. Liu Distributed Computing -- Concepts and Application http://www.csc.calpoly.edu/~mliu/book/index. Departament d Arquitectura de Computadors Invocación remota (based on M. L. Liu Distributed Computing -- Concepts and Application http://www.csc.calpoly.edu/~mliu/book/index.html) Local Objects vs. Distributed

More information

Web Services. Copyright 2011 Srdjan Komazec

Web Services. Copyright 2011 Srdjan Komazec Web Services Middleware Copyright 2011 Srdjan Komazec 1 Where are we? # Title 1 Distributed Information Systems 2 Middleware 3 Web Technologies 4 Web Services 5 Basic Web Service Technologies 6 Web 2.0

More information

Designing Distributed pplications with Mobile Code Paradigms ntonio Carzaniga Politecnico di Milano Piazza Leonardo da Vinci, 32 20133 Milano, Italy +39-2-2399-3638 carzaniga@elet.polimi.it Gian Pietro

More information

Let us help get you there.

Let us help get you there. IT solutions Let us help get you there. EMR integration cost-effective and timely The time for action is now. Whether the concept of an EMR is new to you, or whether you re an early adopter of such technology,

More information

Department of Computer Science and Engineering

Department of Computer Science and Engineering Mississippi State University 1 Department of Computer Science and Engineering Department Head: Professor Donna Reese Office: 300 Butler Hall The Department of Computer Science and Engineering is dedicated

More information

AMD-8151 HyperTransport AGP3.0 Graphics Tunnel Revision Guide

AMD-8151 HyperTransport AGP3.0 Graphics Tunnel Revision Guide AMD-8151 HyperTransport AGP3.0 Graphics Tunnel Revision Guide Publication # 25912 Revision: 3.06 Issue Date: March 2006 2003 2006 Advanced Micro Devices, Inc. All rights reserved. The contents of this

More information

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT Page 1 of 5 A. Advanced Mathematics for CS A1. Line and surface integrals 2 2 A2. Scalar and vector potentials 2 2 A3. Orthogonal curvilinear coordinates 2 2 A4. Partial differential equations 2 2 4 A5.

More information

How To Set Up Ops Cser.Com (Pros) For A Pc Or Mac) With A Microsoft Powerbook (Proos) (Prosecco) (Powerbook) (Pros) And Powerbook.Com/

How To Set Up Ops Cser.Com (Pros) For A Pc Or Mac) With A Microsoft Powerbook (Proos) (Prosecco) (Powerbook) (Pros) And Powerbook.Com/ PROS CS (Client-Server) Installation and Basic-configuration Guide Contents PROS CS (Client-Server)... 1 Installation and Basic-configuration Guide... 1 1. Overview... 2 2. Intro... 3 3. UPGRADING from

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002

Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002 Page 1 of 9 Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2002/07/17/tomcluster.html See this if you're having trouble printing code examples Clustering

More information

Mobile Software Agents: an Overview

Mobile Software Agents: an Overview Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile

More information

Figure 1. Global Storage Fabric - National Diagram

Figure 1. Global Storage Fabric - National Diagram 2 Figure 1. Global Storage Fabric - National Diagram 3 Figure 2. Latency and IOPS Speedup with CPU Offload 4 Figure 3. Enabling Global Storage Fabric with Fabric Extension 5 Contacts For additional information

More information

Evaluation of Constrained Mobility for Programmability in Network Management

Evaluation of Constrained Mobility for Programmability in Network Management Evaluation of Constrained Mobility for Programmability in Network Management C. Bohoris, A. Liotta, G. Pavlou Center for Communication Systems Research School of Electronic Engineering and Information

More information

Moving Network Management from OnSite to SaaS. Key Challenges and How NMSaaS Helps Solve Them

Moving Network Management from OnSite to SaaS. Key Challenges and How NMSaaS Helps Solve Them Moving Network Management from OnSite to SaaS Key Challenges and How NMSaaS Helps Solve Them Executive Summary In areas such as sales force automation and customer relationship management, cloud-based

More information

Priority Zoom v17: Hardware and Supporting Systems

Priority Zoom v17: Hardware and Supporting Systems Introduction Priority Zoom v17: Hardware and Supporting Systems In order to prevent misunderstandings regarding areas of responsibility for the maintenance of hardware, operating systems and particularly

More information

Chapter 11 Distributed File Systems. Distributed File Systems

Chapter 11 Distributed File Systems. Distributed File Systems Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file

More information

Software Agent Constrained Mobility for Network Performance Monitoring

Software Agent Constrained Mobility for Network Performance Monitoring Software Agent Constrained Mobility for Network Performance Monitoring C. Bohoris, A. Liotta, G. Pavlou Center for Communication Systems Research School of Electronic Engineering and Information Technology

More information

What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.

What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator. What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. It is also a consolidator and integrator.

More information

SYSTEM OF MONITORING AND CONTROL FOR THE AUTOMATION OF INDUSTRIAL WASH MACHINES

SYSTEM OF MONITORING AND CONTROL FOR THE AUTOMATION OF INDUSTRIAL WASH MACHINES SYSTEM OF MONITORING AND CONTROL FOR THE AUTOMATION OF INDUSTRIAL WASH MACHINES Catalin BUJDEI Liviu PERNIU Ion TRUICAN Mihai CARAMAN Automatics Department, Transilvania University of Brasov, M.Viteazu

More information

Client-Server Applications

Client-Server Applications Client-Server Applications Prof. Sanjeev Setia Distributed Software Systems CS 707 Distributed Software Systems 1 Client Server Systems Distributed Software Systems 2 1 Client/Server Application Distributed

More information

Depth and Excluded Courses

Depth and Excluded Courses Depth and Excluded Courses Depth Courses for Communication, Control, and Signal Processing EECE 5576 Wireless Communication Systems 4 SH EECE 5580 Classical Control Systems 4 SH EECE 5610 Digital Control

More information

Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing

Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Adeel Anwar Abbasi*, Tahir Mehmood** {*Department of Computer Sciences, Shaheed Zulfiqar Ali Bhutto Institute of Science and

More information

I/A Series Information Suite AIM*Track Batch and Lot Tracking Software

I/A Series Information Suite AIM*Track Batch and Lot Tracking Software I/A Series Information Suite AIM*Track Batch and Lot Tracking Software PSS 21S-6C7 B3 AIM*Track provides a full batch monitoring and analysis capability including the ability to define batch processes,

More information

MLM1000 Multi-Layer Monitoring Software 061-4281-00

MLM1000 Multi-Layer Monitoring Software 061-4281-00 MLM1000 Multi-Layer Monitoring Software 061-4281-00 Test Equipment Depot - 800.517.8431-99 Washington Street Melrose, MA 02176 - FAX 781.665.0780 - TestEquipmentDepot.com Read This First contains release

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

Isaac Bansah Information Technology Department, Methodist University College, Accra, Ghana

Isaac Bansah Information Technology Department, Methodist University College, Accra, Ghana Exploiting the Usage of Mobile Agents as a Network Performance Monitoring Tool for Network Fault Management an Alternative to Other Traditional Approaches Isaac Bansah Information Technology Department,

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

Reflections about Mobile Agents and Software Engineering

Reflections about Mobile Agents and Software Engineering Reflections about Mobile gents and Software Engineering Gian Pietro Picco Dipartimento di Elettronica e Informazione Politecnico, Italy picco@elet.polimi.it http://www.elet.polimi.it/~picco Motivation

More information

PRODUCTIVITY ESTIMATION OF UNIX OPERATING SYSTEM

PRODUCTIVITY ESTIMATION OF UNIX OPERATING SYSTEM Computer Modelling & New Technologies, 2002, Volume 6, No.1, 62-68 Transport and Telecommunication Institute, Lomonosov Str.1, Riga, LV-1019, Latvia STATISTICS AND RELIABILITY PRODUCTIVITY ESTIMATION OF

More information

Application-layer protocols

Application-layer protocols Application layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS Application-layer

More information

RUNNING TRACKER ON A TERMINAL SERVER

RUNNING TRACKER ON A TERMINAL SERVER RUNNING TRACKER ON A TERMINAL SERVER RUNNING TRACKER ON A TERMINAL SERVER Tracker can be run on a Windows 2003 Terminal Server, provided the Windows Terminal Server is properly configured. Depending on

More information

PROGRAMMES OFFERED BY DEPARTMENT OF COMPUTER SCIENCE SYSTEMS (Note: This document is for polytechnic students admitted in AY2004-5)

PROGRAMMES OFFERED BY DEPARTMENT OF COMPUTER SCIENCE SYSTEMS (Note: This document is for polytechnic students admitted in AY2004-5) SCHOOL OF COMPUTING PROGRAMMES OFFERED BY DEPARTMENT OF COMPUTER SCIENCE SYSTEMS (Note: This document is for polytechnic students admitted in AY2004-5) Bachelor of Computing in Communications and Media

More information

E-Business Technologies

E-Business Technologies E-Business Technologies Craig Van Slyke and France Bélanger John Wiley & Sons, Inc. Slides by Fred Niederman 7-1 Client/Server Technologies for E-Business Chapter 7 7-2 Key Ideas E-commerce applications

More information

Degrees Major in Computer Science Minor in Computer Science Major in Software Engineering

Degrees Major in Computer Science Minor in Computer Science Major in Software Engineering LT400, Independent Study: Directed reading registering. (U)(1). LT401, Independent Study: Directed reading registering. (U)(2). LT402, Independent Study: Directed reading registering. (U)(3). LT499, Honors

More information

Open Source: What Is It Worth? Thoughts from an Open Source Risk Management Software Provider

Open Source: What Is It Worth? Thoughts from an Open Source Risk Management Software Provider Open Source: What Is It Worth? Thoughts from an Open Source Risk Management Software Provider CAS Spring Meeting, 18 May 2011, Palm Beach FL Markus Stricker, Managing Director Intuitive Collaboration AG,

More information

How To Secure Cloud Computing

How To Secure Cloud Computing Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,

More information

A Flexible Cluster Infrastructure for Systems Research and Software Development

A Flexible Cluster Infrastructure for Systems Research and Software Development Award Number: CNS-551555 Title: CRI: Acquisition of an InfiniBand Cluster with SMP Nodes Institution: Florida State University PIs: Xin Yuan, Robert van Engelen, Kartik Gopalan A Flexible Cluster Infrastructure

More information

COMPONENTS in a database environment

COMPONENTS in a database environment COMPONENTS in a database environment DATA data is integrated and shared by many users. a database is a representation of a collection of related data. underlying principles: hierarchical, network, relational

More information

Chapter 11. User Datagram Protocol (UDP)

Chapter 11. User Datagram Protocol (UDP) Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,

More information

The TCP/IP Reference Model

The TCP/IP Reference Model The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was

More information

6. POSTGRADUATE DIPLOMA IN COMPUTER SCIENCE (GDCS) (APPROVED JUNE 2005)

6. POSTGRADUATE DIPLOMA IN COMPUTER SCIENCE (GDCS) (APPROVED JUNE 2005) MCS 7215 Data Encryption MCS 7216 Computer Vision and Image Processing MCS 7218 Theoretical MCS 7200 Data Communications Networks MCS 7201 Software Engineering MCS 720 Database MCS 720 Legal and Ethical

More information

Resource-Efficiency Testing. Introduction to Resource Efficiency Testing

Resource-Efficiency Testing. Introduction to Resource Efficiency Testing Introduction to Resource Efficiency Testing Contents Introduction Metrics Acquisition - Windows Performance Monitor OPC Server test plan model OPC Client test plan model Network Failure Simulation Batch

More information

Technical papers Thin client networking

Technical papers Thin client networking Technical papers Thin client networking This document has been archived Thin client networking Contents What is a thin client network? How does a thin client network work? Where are thin client networks

More information

Operating Systems Principles

Operating Systems Principles bicfm page i Operating Systems Principles Lubomir F. Bic University of California, Irvine Alan C. Shaw University of Washington, Seattle PEARSON EDUCATION INC. Upper Saddle River, New Jersey 07458 bicfm

More information

2Proofbymathematicalinductionplaysacrucialroleinthevericationofprogramtrans-

2Proofbymathematicalinductionplaysacrucialroleinthevericationofprogramtrans- SubmissiontoJ.FunctionalProgrammingSpecialIssueonTheoremProving&FunctionalProgramming AutomaticVericationofFunctionswith DepartmentofComputing&ElectricalEngineering, AccumulatingParameters UniversityofEdinburgh,80SouthBridge,

More information

An Introduction to Mercurial Version Control Software

An Introduction to Mercurial Version Control Software An Introduction to Mercurial Version Control Software CS595, IIT [Doc Updated by H. Zhang] Oct, 2010 Satish Balay balay@mcs.anl.gov Outline Why use version control? Simple example of revisioning Mercurial

More information

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users

More information

Cloud Computing Security Issues and Access Control Solutions

Cloud Computing Security Issues and Access Control Solutions 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Cloud Computing Security Issues and Access Control Solutions Young-Gi Min 1), Hyo-Jin Shin 2), Young-Hwan Bang 3) Abstract Cloud computing

More information

A PLM Certificate Program Update: Teaching PLM Online Using VMs in the Cloud

A PLM Certificate Program Update: Teaching PLM Online Using VMs in the Cloud A PLM Certificate Program Update: Teaching PLM Online Using VMs in the Cloud A. B. Mueller Department of Computer Graphics Technology Purdue University Abstract Purdue University Department of Computer

More information

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,

More information

IBM: Using Queue Replication

IBM: Using Queue Replication coursemonster.com/uk IBM: Using Queue Replication View training dates» Overview Gain knowledge on InfoSphere Replication Server and how it is used to perform both queue-based homogeneous data replication

More information

Latency Considerations for 10GBase-T PHYs

Latency Considerations for 10GBase-T PHYs Latency Considerations for PHYs Shimon Muller Sun Microsystems, Inc. March 16, 2004 Orlando, FL Outline Introduction Issues and non-issues PHY Latency in The Big Picture Observations Summary and Recommendations

More information

Tutorial on Client-Server Architecture

Tutorial on Client-Server Architecture Tutorial on Client-Server Architecture SEEM3430 Information Systems Analysis and Design Pengfei Liu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong March

More information

Fall 2014 to Summer 2016 Course Rotation Computer Information Systems Fall 2014 Courses Format

Fall 2014 to Summer 2016 Course Rotation Computer Information Systems Fall 2014 Courses Format Fall 2014 to Summer 2016 Course Rotation Computer Information Systems Fall 2014 Courses Online CS154 Technology: Database CS180 Structure & Logic CS220 Survey of Programming Languages CS242 Database Theory

More information

How To Protect With Hidden Capabilities In A Protected System (Permanent Powerpoint)

How To Protect With Hidden Capabilities In A Protected System (Permanent Powerpoint) Hidden Software Capabilities D. Hagimont, J. Mossière. X. Rousset de Pina, F. Saunier Laboratoire IMAG-LSR, 2 av. de Vignate, 38610 Gières - France Internet: Daniel.Hagimont@imag.fr Abstract: Software

More information

Virtual machine interface. Operating system. Physical machine interface

Virtual machine interface. Operating system. Physical machine interface Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that

More information

FileNet Integrated Document Management Technical Bulletin

FileNet Integrated Document Management Technical Bulletin FileNet Integrated Document Management Technical Bulletin Version 4.0.3 Release May 2011 1 Contents Introduction... 3 Contact customer support... 3 Feedback... 3 Microsoft Windows Terminal Services...

More information

Product Standard General Interworking: Internet Server

Product Standard General Interworking: Internet Server General Interworking: Internet Server The Open Group Copyright August 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,

More information

CS 2001 Department Computing Resources

CS 2001 Department Computing Resources CS 2001 Department Computing Resources Wencan Luo Borrowed from Marian K. Iskander http://people.cs.pitt.edu/~tech/news/faqs.html Agenda Computing resources in the department OpenAFS How to: Get AFS tokens

More information

Priority Pro v17: Hardware and Supporting Systems

Priority Pro v17: Hardware and Supporting Systems Introduction Priority Pro v17: Hardware and Supporting Systems The following provides minimal system configuration requirements for Priority with respect to three types of installations: On-premise Priority

More information

The Impact of Cloud Computing to Data Network Cabling White Paper

The Impact of Cloud Computing to Data Network Cabling White Paper Into the Clouds A Look into What Cloud Computing is and How it May Affect Data Network Cabling White Paper June 2010 Contents BACKGROUND 3 IMPACT ON IT 4 SCALABILITY/FLEXIBILITY/ADAPTABILITY/AGILITY -

More information

FLYPORT Wi-Fi 802.11G

FLYPORT Wi-Fi 802.11G FLYPORT Wi-Fi 802.11G System on module 802.11g WIFI - Infrastructure mode - softap mode - Ad hoc mode Microchip PIC 24F 16 bit processor Microchip MRF24WG0MA/MB - Native WiFi 802.11g transceiver - PCB

More information

Cloud Computing. Theory and Practice. Dan C. Marinescu. Morgan Kaufmann is an imprint of Elsevier HEIDELBERG LONDON AMSTERDAM BOSTON

Cloud Computing. Theory and Practice. Dan C. Marinescu. Morgan Kaufmann is an imprint of Elsevier HEIDELBERG LONDON AMSTERDAM BOSTON Cloud Computing Theory and Practice Dan C. Marinescu AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO M< Morgan Kaufmann is an imprint of Elsevier

More information

Chapter 9 Understanding Complex Networks

Chapter 9 Understanding Complex Networks Chapter 9 Understanding Complex Networks Objectives Explain how to implement a multivendor network environment Discuss the differences between centralized and client/server computing Define the client/server

More information

Inmagic Content Server Standard and Enterprise Configurations Technical Guidelines

Inmagic Content Server Standard and Enterprise Configurations Technical Guidelines Inmagic Content Server v1.3 Technical Guidelines 6/2005 Page 1 of 15 Inmagic Content Server Standard and Enterprise Configurations Technical Guidelines Last Updated: June, 2005 Inmagic, Inc. All rights

More information

An Efficient Data Correctness Approach over Cloud Architectures

An Efficient Data Correctness Approach over Cloud Architectures International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 12 (October 2013), PP. 33-37 An Efficient Data Correctness Approach over

More information

ClockWork Enterprise 5

ClockWork Enterprise 5 ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork

More information

ITA Mail Archive Setup Guide

ITA Mail Archive Setup Guide This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than

More information

HP Prior Software Version Support HP Mature Software Product Support

HP Prior Software Version Support HP Mature Software Product Support HP Prior Software Version Support HP Mature Software Product Support HP Technology Services - Contractual Services Technical data HP Prior Software Version Support and HP Mature Software Product Support

More information

HP recommended configuration for Microsoft Exchange Server 2010: ProLiant DL370 G6 supporting 1000-2GB mailboxes

HP recommended configuration for Microsoft Exchange Server 2010: ProLiant DL370 G6 supporting 1000-2GB mailboxes HP recommended configuration for Microsoft Exchange Server 2010: ProLiant DL370 G6 supporting 1000-2GB mailboxes Table of contents Executive summary... 2 Introduction... 3 Tiered solution matrix... 3 Recommended

More information

14-Dec-15. Number Amount Number Amount Number Amount Number Amount Number Amount

14-Dec-15. Number Amount Number Amount Number Amount Number Amount Number Amount 14-Dec-15 and Number of Qualifying Children, 2013 Returns with no Returns with one Returns with two Returns with three or Size of AGI qualifying children qualifying child qualifying children more qualifying

More information

Portfolio of Products. Integrated Engineering Environment. Overview

Portfolio of Products. Integrated Engineering Environment. Overview Portfolio of Products Integrated Engineering Environment Overview Automation Studio is an all-in-one easy-to-use software that provides an open, productive and flexible engineering environment for the

More information

Course Syllabus: RIA Programming for Magic xpa 2.x Developers

Course Syllabus: RIA Programming for Magic xpa 2.x Developers Course Syllabus: RIA Programming for Magic xpa 2.x Developers TABLE OF CONTENTS: 1. Course Objectives and Goals... 1 2. General Course Details... 2 3. Lesson Outline... 2 4. Technical Material... 3 5.

More information

opensuse.org Build Service

opensuse.org Build Service opensuse.org Build Service Maintain one source for all Linux platforms Putting cross development support into OBS Martin Mohring 5e Datasoft GmbH martin.mohring@opensuse.org How to join such a FOSS project

More information

Socket Programming in the Data Communications Laboratory

Socket Programming in the Data Communications Laboratory Socket Programming in the Data Communications Laboratory William E. Toll Assoc. Prof. Computing and System Sciences Taylor University Upland, IN 46989 btoll@css.tayloru.edu ABSTRACT Although many data

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to):

There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to): Remote Connection Protocols There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to): - telnet (typically to connect to a machine

More information

How To Write A Windows Operating System (Windows) (For Linux) (Windows 2) (Programming) (Operating System) (Permanent) (Powerbook) (Unix) (Amd64) (Win2) (X

How To Write A Windows Operating System (Windows) (For Linux) (Windows 2) (Programming) (Operating System) (Permanent) (Powerbook) (Unix) (Amd64) (Win2) (X (Advanced Topics in) Operating Systems Winter Term 2009 / 2010 Jun.-Prof. Dr.-Ing. André Brinkmann brinkman@upb.de Universität Paderborn PC 1 Overview Overview of chapter 3: Case Studies 3.1 Windows Architecture.....3

More information

CCS COTTON CLASSIFYING SYSTEM

CCS COTTON CLASSIFYING SYSTEM CCS COTTON CLASSIFYING SYSTEM COTTON TESTING In production of spun yarns an effective quality control of fibres, slivers, rovings, and yarns serves to secure material properties as well as optimal spinning

More information

An overview of Drupal infrastructure and plans for future growth. prepared by Kieran Lal and Gerhard Killesreiter for the Drupal Association

An overview of Drupal infrastructure and plans for future growth. prepared by Kieran Lal and Gerhard Killesreiter for the Drupal Association An overview of Drupal infrastructure and plans for future growth prepared by Kieran Lal and Gerhard Killesreiter for the Drupal Association Drupal.org Old Infrastructure Problems: Web servers not efficiently

More information

Structuring Product-lines: A Layered Architectural Style

Structuring Product-lines: A Layered Architectural Style Structuring Product-lines: A Layered Architectural Style Tommi Myllymäki, Kai Koskimies, and Tommi Mikkonen Institute of Software Systems, Tampere University of Technology Box 553, FIN-33101 Tampere, Finland

More information

My home. Mobile phone application. Instructions for use and installation. For DELTA DORE GSM transmitters and transmitter control units.

My home. Mobile phone application. Instructions for use and installation. For DELTA DORE GSM transmitters and transmitter control units. My home Mobile phone application For DELTA DORE GSM transmitters and transmitter control units Instructions for use and installation My home Alarm Heating Bedroom Dining room Kitchen Garage Absence Messages

More information

Course Syllabus: RIA Programming for unipaas V1.x Developers

Course Syllabus: RIA Programming for unipaas V1.x Developers TABLE OF CONTENTS: Course Syllabus: RIA Programming for unipaas V1.x Developers Course Objectives and Goals Course Objectives and Goals... 1 General Course Details... 1 Lesson Outline... 2 Technical Material...

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

Document Management & Electronic Filing

Document Management & Electronic Filing Document Management & Electronic Filing Are you wasting money? Losing things? People taking files and NEVER returning them? Purchasing myriads of beige filing cabinets, every one of which arrives in a

More information

A Review on the Communication Mechanism of Mobile Agent

A Review on the Communication Mechanism of Mobile Agent International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 01 5 A Review on the Communication Mechanism of Mobile Agent Arif Hidayat Abstract Mobile agent technology

More information

Data Management/Visualization on the Grid at PPPL. Scott A. Klasky Stephane Ethier Ravi Samtaney

Data Management/Visualization on the Grid at PPPL. Scott A. Klasky Stephane Ethier Ravi Samtaney Data Management/Visualization on the Grid at PPPL Scott A. Klasky Stephane Ethier Ravi Samtaney The Problem Simulations at NERSC generate GB s TB s of data. The transfer time for practical visualization

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers

More information

How To Make A Distributed System Transparent

How To Make A Distributed System Transparent Operating Systems Interface between the hardware and the rest: editors, compilers, database systems, application programs, your programs, etc. Allows portability, enables easier programming, The manager

More information

Computer Science and Software Engineering

Computer Science and Software Engineering LT360, Topics in Latin: In-depth study of works not covered in earlier courses. This course is repeatable for credit. Prerequisites: LT203 and LT204, placement into the 300 level, or permission of instructor.

More information