RELIABILITY OF DATA TRANSFER AND HANDLING IN RAILWAY TELEMONITORING SYSTEMS

Size: px
Start display at page:

Download "RELIABILITY OF DATA TRANSFER AND HANDLING IN RAILWAY TELEMONITORING SYSTEMS"

Transcription

1 RELIABILITY OF DATA TRANSFER AND HANDLING IN RAILWAY TELEMONITORING SYSTEMS Tamás Bécsi, Szilárd Aradi Budapest University of Technology and Economics, Department of Control and Transport Automation Address: Bertalan 2., Budapest, Hungary, H-1111 Phone: (+36-1) , Fax: (+36-1) , {becsi.tamas, Abstract: The paper describes the structure of a telemonitoring system for fleet management. The system is based on a locomotive on-board computer with built-in GPS Module. The on-board computer measures the operation characteristics, the geographical position of the locomotive and logs the activity of the engine-driver. The collected data is sent to a central database server via GSM network. In the paper, after a short review of the schematic structure, the bottlenecks and threats of such a system are outlined with special regard to software reliability aspects, such as reliability models, complexity aspects and software testing through a real-world application of the Hungarian State Railways. Finally the advantages of the system and further development possibilities are summarized. Keywords: telemonitoring, communication safety, software reliability 1. INTRODUCTION Thanks to the rapid development of microelectronics and mobile telecommunications by the end of the 90's a wider range of fleet diagnostics and satellite tracking became possible. These innovations gave a technological background of the creation of fleet management systems. Economical demand for fleet management systems strengthened as an effect of the increased competitive situation in passenger and freight transport especially in road traffic. Spread in on-line fleet management systems was greatly aided by the constant decrease of communication charges and the increase of speed in data transmission. For all these reasons, in the recent years online fleet management systems of transportation spread rapidly. The usage of these systems gives a lot of advantages, which creates the reason of its existence in railway operations. Its advantages are the followings: - a greater safety in delivery, - aiding dynamic freight arrangement, - constant tracking of the mechanical condition of the vehicles, - easier documentation, - aiding efficiency wages, - developing safety of traffic, - developing safety of freight, - increased environmental protection. In the paper, after a short review of the schematic structure, the bottlenecks and threats of such a system are outlined with special regard to software reliability aspects, such as reliability models, complexity aspects and software testing through a real-world application of the Hungarian State Railways. 2. SOFTWARE RELIABILITY Software reliability is an important attribute of software quality, together with functionality, usability, performance, serviceability, capability, installability, maintainability and documentation. Software reliability is hard to achieve, because the complexity of software tends to be high. While any system with a high degree of complexity, including software, will be hard to reach a certain level of reliability, system developers tend to push complexity into the software layer, with the rapid growth of system size and ease of doing so by upgrading the software. While the complexity of software is inversely related to software reliability, it is directly related to other important factors in software quality, especially functionality, capability,

2 etc. Emphasizing these features will tend to add more complexity to software Definition According to ANSI, Software Reliability is defined as: the probability of failure-free software operation for a specified period of time in a specified environment (ANSI/IEEE, 1991). Although Software Reliability is defined as a probabilistic function, and comes with the notion of time, we must note that, differently from traditional Hardware Reliability, Software Reliability is not a direct function of time. Electronic and mechanical parts may become "old" and wear out with time and usage, but software will not rust or wear-out during its life cycle. Software will not change over time unless intentionally changed or upgraded Software failure mechanisms Software failures may be due to errors, ambiguities, oversights or misinterpretation of the specification that the software is supposed to satisfy, carelessness or incompetence in writing code, inadequate testing, incorrect or unexpected usage of the software or other unforeseen problems. While it is tempting to draw an analogy between Software Reliability and Hardware Reliability, software and hardware have basic differences that make them different in failure mechanisms. Hardware faults are mostly physical faults, while software faults are design faults, which are harder to visualize, classify, detect, and correct. Design faults are closely related to fuzzy human factors and the design process, which we don't have a solid understanding. In hardware, design faults may also exist, but physical faults usually dominate. In software, we can hardly find a strict corresponding counterpart for "manufacturing" as hardware manufacturing process, if the simple action of uploading software modules into place does not count. Therefore, the quality of software will not change once it is uploaded into the storage and start running. Trying to achieve higher reliability by simply duplicating the same software modules will not work, because design faults can not be masked off by voting. (Pan, 1999) 2.3. The bathtub curve Over time, hardware exhibits the failure characteristics shown in Figure 1, known as the bathtub curve. Periods are the burn-in phase, the useful life phase and the end-of-life phase. Fig. 1. Bathtub curve for hardware reliability Software reliability, however, does not show the same characteristics similar as hardware. A possible curve is shown in Figure 2 if we projected software reliability on the same axes (Pan, 1999). There are two major differences between hardware and software curves. One difference is that in the last phase, software does not have an increasing failure rate as hardware does. In this phase, software is approaching obsolescence; there is no motivation for any upgrades or changes to the software. Therefore, the failure rate will not change. The second difference is that in the useful-life phase, software will experience a drastic increase in failure rate each time an upgrade is made. The failure rate levels off gradually, partly because of the defects found and fixed after the upgrades. Fig. 2. Revised bathtub curve for software reliability The upgrades in Figure 3 imply feature upgrades, not upgrades for reliability. For feature upgrades, the complexity of software is likely to be increased, since the functionality of software is enhanced. Even bug fixes may be a reason for

3 more software failures, if the bug fix induces other defects into software. For reliability upgrades, it is possible to incur a drop in software failure rate, if the goal of the upgrade is enhancing software reliability, such as a redesign or reimplementation of some modules using better engineering approaches, such as clean-room method Software Reliability Models A proliferation of software reliability models have emerged as people try to understand the characteristics of how and why software fails, and try to quantify software reliability. Over 200 models have been developed since the early 1970s, but how to quantify software reliability still remains largely unsolved. As many models as there are and many more emerging, none of the models can capture a satisfying amount of the complexity of software; constraints and assumptions have to be made for the quantifying process. Therefore, there is no single model that can be used in all situations. No model is complete or even representative. One model may work well for a set of certain software, but may be completely off track for other kinds of problems. Most software models contain the following parts: assumptions, factors, and a mathematical function that relates the reliability with the factors. The mathematical function is usually higher order exponential or logarithmic. Software modeling techniques can be divided into two subcategories: prediction modeling and estimation modeling. Both kinds of modeling techniques are based on observing and accumulating failure data and analyzing with statistical inference. The major differences of the two models are shown in Table 1. ISSUES PREDICTION MODELS ESTIMATION MODELS Data reference Use historical data Uses data from the current software development effort When used in development cycle Usually made prior to development phases; can be used as early as concept phase Time frame Predict reliability at some future time Usually made later in life cycle (after some data have been collected); not typically used in concept or development phases Estimate reliability at either present or some future time Table 1. Difference between software reliability prediction models and software reliability estimation models Representative prediction models include Musa's Execution Time Model, Putnam's Model etc. Using prediction models, software reliability can be predicted early in the development phase and enhancements can be initiated to improve the reliability (Lyu, 1996). Representative estimation models include exponential distribution models, Weibull distribution model, Thompson and Chelson's model, etc. Exponential models and Weibull distribution model are usually named as classical fault count/fault rate estimation models, while Thompson and Chelson's model belong to Bayesian fault rate estimation models. The field has matured to the point that software models can be applied in practical situations and give meaningful results and, second, that there is no one model that is best in all situations. Because of the complexity of software, any model has to have extra assumptions. Only limited factors can be put into consideration. Most software reliability models ignore the software development process and focus on the results, the observed faults and/or failures. By doing so, complexity is reduced and abstraction is achieved, however, the models tend to specialize to be applied to only a portion of the situations and a certain class of the problems Software Reliability Metrics Measurement is commonplace in other engineering field, but not in software engineering. Though frustrating, the quest of quantifying software reliability has never ceased. Measuring software reliability remains a difficult problem because we don't have a good understanding of the nature of software.

4 Software size is thought to be reflective of complexity, development effort and reliability. Lines Of Code (LOC), or LOC in thousands (KLOC), is an intuitive initial approach to measuring software size. But there is not a standard way of counting. Typically, source code is used and comments and other non-executable statements are not counted. This method can not faithfully compare software not written in the same language. The advent of new technologies of code reuses and code generation technique also cast doubt on this simple method. Function point metric is a method of measuring the functionality of a proposed software development based upon a count of inputs, outputs, master files, inquires, and interfaces. The method can be used to estimate the size of a software system as soon as these functions can be identified. It is a measure of the functional complexity of the program. It measures the functionality delivered to the user and is independent of the programming language. It is used primarily for business systems; it is not proven in scientific or real-time applications (Pan, 1999). Complexity is directly related to software reliability, so representing complexity is important. Complexity-oriented metrics is a method of determining the complexity of a program s control structure, by simplifying the code into a graphical representation. Representative metric is Cyclomatic Complexity (VanDoren, 2000). The Cyclomatic Complexity of a software module is calculated from a connected graph of the module (that shows the topology of control flow within the program): Cyclomatic complexity: CC = E - N + p (1) where E = the number of edges of the graph N = the number of nodes of the graph p = the number of connected components Studies show a correlation between a program's Cyclomatic Complexity and its error frequency (Table 2). A low cyclomatic complexity contributes to a program's understandability and indicates it is amenable to modification at lower risk than a more complex program. A module's Cyclomatic Complexity is also a strong indicator of its testability. Test coverage metrics are a way of estimating fault and reliability by performing tests on software products, based on the assumption that software reliability is a function of the portion of software that has been successfully verified or tested. Cyclomatic Risk Evaluation Complexity 1-10 Low risk Moderate risk High risk >50 Very high risk, unstable program Table 2. Cyclomatic Complexity 2.6. Reliability testing Software reliability refers to the probability of failure-free operation of a system. It is related to many aspects of software, including the testing process. Directly estimating software reliability by quantifying its related factors can be difficult. Testing is an effective sampling method to measure software reliability. Guided by the operational profile, software testing (usually black-box testing) can be used to obtain failure data, and an estimation model can be further used to analyze the data to estimate the present reliability and predict future reliability. Therefore, based on the estimation, the developers can decide whether to release the software, and the users can decide whether to adopt and use the software. Risk of using software can also be assessed based on reliability information. The primary goal of testing should be to measure the dependability of tested software. There is agreement on the intuitive meaning of dependable software: it does not fail in unexpected or catastrophic ways. Robustness testing and stress testing are variances of reliability testing based on this simple criterion. The robustness of a software component is the degree to which it can function correctly in the presence of exceptional inputs or stressful environmental conditions. Robustness testing differs with correctness testing in the sense that the functional correctness of the software is not of concern. It only watches for robustness problems such as machine crashes, process hangs or abnormal termination. The assumption is relatively simple; therefore robustness testing can be made more portable and scalable than correctness testing (Pan, 1999). Stress testing, or load testing, is often used to test the whole system rather than the software alone. In such tests the software or system are

5 exercised with or beyond the specified limits. Typical stress includes resource exhaustion, bursts of activities, and sustained high loads. 3. SYSTEM STRUCTURE General construction of online fleet management systems are demonstrated on Figure 3. The three main features are: - on-board computer, - central server, - user computers. The on-board units (OBU) on the locomotive measure the operational parameters of the locomotive (state of the switches, energy consumption, motor parameters, etc.), and its position (aided by GPS based location), and they store the data given by the engine-driver (the name of the actual activity, etc.). These parameters are sent to a central server at the actualization of previously defined events (alarm-signal, sudden decrease in fuel level, etc.) and in previously defined periods of time. On-board computers communicate with the central server through GSM network. The incoming data are evaluated and stored in a database. If necessary the central server can send an alarm to a given address or even a mobile phone. In this structure communication from the server towards the locomotive is plausible as well. Aided by this the incoming data packages can be confirmed, a written message can be sent to the engine-driver and the parameters of the board unit can be set. Fig. 3. System structure Locomotives are detectable and observable almost constantly (online) and the operating parameters (running performance of vehicles, energy consumption, activities and work time of drivers, delivery performance) can be followed by a later evaluation of data stored in the centre (offline). 4. DATA TRANSFER The communication system can be build up by OSI model (ISO/IEC , 1994) as shown on Table 3. The connection point between the OBU-s and the server is the session layer (TCP socket). The first step is the determination of the session layer's protocol. There are a few key features that set TCP apart from User Datagram Protocol: - Ordered data transfer, - Retransmission of lost packets, - Discarding duplicate packets, - Error-free data transfer, - Congestion/Flow control. In the data block of TCP packet a record structure was built up, which contains the data of the locomotive and the train. For the declaration of the structure and data types a standard XML schema (XML Schema, 2004) was created.

6 OSI model Used protocol or Implementation in Implementation in service OBU central server Physical layer GSM, 100BASE-TX Network card Data link layer GPRS, Ethernet GSM modem Network card Network layer Internet Protocol (IP) Operation system Transport layer Transmission Control TCP server class Protocol (TCP) TCP stack in GSM (Server software) Session layer TCP socket modem Client thread (Server software) Presentation layer Client and SQL Data exchange with Microcontrollers thread (Server XML software software) Application layer SQL server SQL server (Oracle) Table 3. Architecture of communication system 5. BOTTLENECKS AND THREATS Such a system has to be available 24/7, since the processing of the acquired data of the OBU-s must be real-time for online organization, or delivery plan change purposes. Data accessibility comes from the availability of all system parts: - OBU availability: (electric power supply, reliability, accessibility) - Network availability (GSM network, gateways and firewalls) - Communication Server (accessibility, reliability) - Database accessibility The networking of the investigated system of the Hungarian State Railways uses the public GSM network using GPRS transfer, which is not a safety-critical application, and does not yet has 100% coverage for the whole railway system. The forthcoming installation of the GSM-R system should handle multiply availability and reliability aspects of the system. An easy way to ensure higher database accessibility is the partitioning of the database for a transaction database part for communication tasks, and a storage part for performance-critical queries. Another necessary part of the data storage is the duplication of both parts of the system, beyond the fact that this is the simplest solving for redundancy; the duplication ensures the possibility of database application maintenance and upgrading without the loss of service. Therefore the narrowest point for the path of the data flow (excluding the problems of the public GSM network) is the communication server itself. Its reliability and robustness is one of the key points for building a well-working telemonitoring system. 6. RELATED WORK Considering the above mentioned viewpoints a server application was developed, which has the following main tasks: - receiving data from the locomotives, - piggybacking to the locomotives, - identification of engine-drivers, - inserting data to the SQL database, - sending alert, if necessary, - setting the parameters of OBU-s, - remote diagnostic handling - software update. The server is listening on a specified TCP port, and waiting for the clients. The application works with more simultaneous threads, because it needs to serve parallel a huge number of clients, and it has got several parallel jobs. The main thread is the ServerThread is listening continuously on the TCP port. If an incoming connection occurs, the ServerThread creates a ClientThread, which takes over the handling of the connection. The ClientThread is the most complex part of the software. It has to deal with the following tasks: - data receiving - data checks (syntactic, semantic, checksum) - data conversion and passing to the SQLThread - piggybacking to the clients

7 - identification of the drivers - sending the parameters of the OBU The SQLThread is waiting for the data from the ClientThreads. The tasks of the SQLThread are keeping the database connection, inserting the data into a table, and querying the engine-driver's ID and the OBU's parameters. In software engineering, reducing complexity through reducing software intelligence often generates reduced capabilities, or increased performance needs. On the other hand, partitioning software tasks is an obvious solution. These conditions indicated that this highly critical application needs adequate sub-processes, and a fast, yet reliable process-control. For this task, the most important part of the software (Client- Thread) received a simple, so thus error-proof state machine for flow-control. The state machine approach resulted in some beneficial results. - The number of code branches and loops has decreased. - Code reading and understanding became easier. - Code and functional expansion became independent to other software parts. - Still software integration level remained high. During the development phase of such application it is important to identify the potential coding risks. For this task a software verification tool is necessary, the development of the recent application was aided by Codehealer a highly efficient, powerful source code analysis and verification tool. The use of such application enables the early recognition of unused or unreachable code, identifiers hiding others, uninitialized or unreferenced identifiers, dangerous type casting, undefined or unused function values, which all hold the potential coding errors so thus application errors. The use of the software verification tool is also helps the computation of software reliability metrics, according to its results and aid of development, the server module dealing with the clients has the Cyclomatic Complexity of 5, meaning the module has acceptably low risk For testing an OBU simulator was developed. This tool can simulate a large number of OBU-s automatically. Functional test, load test, performance test, and stress test were performed during development. The results shows, that the software is robust with low resource demand. The long-lasting reliability testing is in progress. 7. SUMMARY The paper described the brief schematic structure of a railway centric telemonitoring system, evaluated its bottlenecks and threats. Through a real-world application of the Hungarian State Railways, the reliability of such a system is outlined with special regard to Cyclomatic Complexity, which is a highly important metric for under-development software systems because of its high impact on the possibility of failures indicated by software upgrades. The testing of the present system proved that it can be built to be a robust and reliable application, but since high safety integrity level can not be reached using public GSM network. REFERENCES Pan, J. (1999). Software Reliability b Dependable Embedded Systems, Spring 1999 VanDoren, E. (2000). Cyclomatic Complexity. matic_body.html Pan, J. (1999). Software Testing b Dependable Embedded Systems, Spring 1999 R. Lyu, M. (1996) Handbook of Software Reliability Engineering. McGraw-Hill publishing, 1995, ISBN Scientific Association for Infocommunications: Telecommunication Networks and Informatics Services, On-line book, Dicső K., Marcsinák L.: Today and future of onboard systems; Hungarian Rail Technology Journal 2006/3. pp Szemkeő M:. Purposes, application areas, services and installation phases of GSM-R system; Hungarian Rail Technology Journal 2005/1. pp Aradi Sz.: Telemonitoring System with Locomotive On-Board Computer; Hungarian Rail Technology Journal 2007/1. pp ANSI/IEEE, "Standard Glossary of Software Engineering Terminology", STD , ANSI/IEEE, 1991 ISO/IEC , Information Technology Open Systems Interconnection Basic Reference Model: The Basic Model, 1994 XML Schema,

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

Maintain Fleet Management Solutions Using Wide Area Wireless Technology Maintain Fleet Management Solutions Using Wide Area Wireless Technology Andreas Kohn Sierra Wireless, Inc. August, 2010 1 Introduction Wireless technology can provide a competitive advantage in today s

More information

HMS Industrial Networks. Putting industrial applications on the cloud

HMS Industrial Networks. Putting industrial applications on the cloud HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,

More information

HMS Industrial Networks

HMS Industrial Networks HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245

More information

Introduction to Network Management

Introduction to Network Management Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

GIS/GPS/GPRS and Web based Framework for Fleet Tracking

GIS/GPS/GPRS and Web based Framework for Fleet Tracking GIS/GPS/GPRS and Web based Framework for Fleet Tracking Michael Medagama 1, Dilusha Gamage 1, Lanka Wijesinghe 1, Nadeeka Leelaratna 1, Indika Karunaratne 2 and Dileeka Dias 3 1 Dialog-University of Moratuwa

More information

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW I/A Series SOFTWARE Product Specifications Logo I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 The I/A Series Intelligent SCADA Platform takes the traditional SCADA Master Station to a new

More information

THE ALTERATION OF THE HUNGARIAN TOLL PAYMENT SYSTEM IN 2013, ACTIVITY SUPPORT WITH THE APPLICATION OF A FLEET MANAGEMENT SYSTEM

THE ALTERATION OF THE HUNGARIAN TOLL PAYMENT SYSTEM IN 2013, ACTIVITY SUPPORT WITH THE APPLICATION OF A FLEET MANAGEMENT SYSTEM Advanced Logistic Systems, Vol. 7, No. 1 (2013), pp. 111 116. THE ALTERATION OF THE HUNGARIAN TOLL PAYMENT SYSTEM IN 2013, ACTIVITY SUPPORT WITH THE APPLICATION OF A FLEET MANAGEMENT SYSTEM KATALIN ZAKAR

More information

Advanced TTCN-3 Test Suite validation with Titan

Advanced TTCN-3 Test Suite validation with Titan Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 2. pp. 273 281 doi: 10.14794/ICAI.9.2014.2.273 Advanced TTCN-3 Test Suite validation

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

Ultimate Server Client Software

Ultimate Server Client Software Ultimate Server Client Software GPRS NET Data Logger Ul mate Server is dedicatedly developed for high volume data applica on. 1. Receive data from Data Loggers in UDP or TCP via GPRS, Ethernet and SMS

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

QRadar Security Intelligence Platform Appliances

QRadar Security Intelligence Platform Appliances DATASHEET Total Security Intelligence An IBM Company QRadar Security Intelligence Platform Appliances QRadar Security Intelligence Platform appliances combine typically disparate network and security management

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Market Growth and New Regulations Demand Network Modernization

Market Growth and New Regulations Demand Network Modernization CASE ESB NETWORKS: POLE TOP COMMUNICATION INCREASES EFFICIENCY IN IRELAND Viola s solution for remotely operating pole-top reclosers and switches increases reliability, cuts operating costs and helps to

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications

Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits

More information

Integration of PTC and Ride Quality Data. Presented by: Wabtec Railway Electronics, I-ETMS PTC Supplier. and

Integration of PTC and Ride Quality Data. Presented by: Wabtec Railway Electronics, I-ETMS PTC Supplier. and Integration of PTC and Ride Quality Data Presented by: Wabtec Railway Electronics, I-ETMS PTC Supplier and dfuzion, Inc., rmetrix Ride Performance Assessment System Supplier The FRA mandate to implement

More information

Hardware & Software Solutions

Hardware & Software Solutions Hardware & Software Solutions Introduction About Proemion - Overview Capabilities - Customers 1986 RM Michaelides 2002 Proemion 2007 Production plant Introduction About RM Overview Capabilities Customers

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

SolarWinds Technical Reference

SolarWinds Technical Reference SolarWinds Technical Reference Understanding Orion Advanced Alerts Orion Alerting... 1 Orion Advanced Alerts... 2 The Alert Process... 2 Alert Status and Action Delays... 3 Alert Creation, Storage and

More information

Long Term Research Agenda

Long Term Research Agenda Long Term Research Agenda Abstract This report is part of the CIRENE project that aims the definition future work including FP7 project proposal, research topics for MSc and PhD students, and the possibilities

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

NTT DATA Big Data Reference Architecture Ver. 1.0

NTT DATA Big Data Reference Architecture Ver. 1.0 NTT DATA Big Data Reference Architecture Ver. 1.0 Big Data Reference Architecture is a joint work of NTT DATA and EVERIS SPAIN, S.L.U. Table of Contents Chap.1 Advance of Big Data Utilization... 2 Chap.2

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Application of Vehicle-to-Infrastructure Networks in Vehicle Control and Monitoring Systems

Application of Vehicle-to-Infrastructure Networks in Vehicle Control and Monitoring Systems Application of Vehicle-to-Infrastructure Networks in Vehicle Control and Monitoring Systems Thesis by: Szilárd Aradi Budapest University of Technology and Economics Faculty of Transportation Engineering

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005 Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and

More information

PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design

PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions Slide 1 Outline Principles for performance oriented design Performance testing Performance tuning General

More information

Performance Management for Next- Generation Networks

Performance Management for Next- Generation Networks Performance Management for Next- Generation Networks Definition Performance management for next-generation networks consists of two components. The first is a set of functions that evaluates and reports

More information

CDMA-based network video surveillance System Solutions

CDMA-based network video surveillance System Solutions 1 Contact:Peter Zhang Email: sales10@caimore.com CDMA-based network video surveillance System Solutions Introduction In recent years, mobile communication, video surveillance for its intuitive, easy to

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

modeling Network Traffic

modeling Network Traffic Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Monitoring system for OpenPBS environment

Monitoring system for OpenPBS environment Monitoring system for OpenPBS environment V.Kolosov, E.Lublev, S.Makarychev ITEP, Moscow OpenPBS batch system is widely used in HEP community. Standard tools from OpenPBS package allow to check the current

More information

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited (Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device

More information

CARRIOTS TECHNICAL PRESENTATION

CARRIOTS TECHNICAL PRESENTATION CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO alvaro.everlet@carriots.com @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM

More information

AutoLog ControlMan. Remote Monitoring & Controlling Service

AutoLog ControlMan. Remote Monitoring & Controlling Service AutoLog 1 AutoLog ControlMan Remote Monitoring & Controlling Service Web browser based HMI / SCADA interface Server is hosted by Internet server hosting company Control units communicate wirelessly via

More information

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research

More information

White paper. Reliable and Scalable TETRA networks

White paper. Reliable and Scalable TETRA networks Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA

More information

Huawei One Net Campus Network Solution

Huawei One Net Campus Network Solution Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,

More information

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

Efficient remote access to machines and plants with SIMATIC

Efficient remote access to machines and plants with SIMATIC Efficient remote access to machines and plants with SIMATIC Telecontrol and teleservice solutions modular, flexible and secure SIMATIC NET siemens.com/industrial-remote-access Industrial remote access

More information

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems

Overcoming IP Address Issues with GPRS Remote Monitoring and Alarm Systems Overcoming IP Address Issues with Remote Monitoring and Alarm Systems Released on April 14, 2009 Stanley Liu, Product Manager stanley.liu@moxa.com is a communication technology that allows data acquisition

More information

Skynax. Mobility Management System. System Manual

Skynax. Mobility Management System. System Manual Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of

More information

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A. 21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale

More information

Module 10. Coding and Testing. Version 2 CSE IIT, Kharagpur

Module 10. Coding and Testing. Version 2 CSE IIT, Kharagpur Module 10 Coding and Testing Lesson 26 Debugging, Integration and System Testing Specific Instructional Objectives At the end of this lesson the student would be able to: Explain why debugging is needed.

More information

Trains crossing at Toronto s Old Mill Station 2009 TTC. Train Control

Trains crossing at Toronto s Old Mill Station 2009 TTC. Train Control Trains crossing at Toronto s Old Mill Station 2009 TTC 76 An Advance Communication Based System for Toronto Resignaling for Higher Performance The Yonge-University-Spadina Line (YUS) in Toronto had been

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

TRILL Large Layer 2 Network Solution

TRILL Large Layer 2 Network Solution TRILL Large Layer 2 Network Solution Contents 1 Network Architecture Requirements of Data Centers in the Cloud Computing Era... 3 2 TRILL Characteristics... 5 3 Huawei TRILL-based Large Layer 2 Network

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.

GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. Introduction: The Proposed design is cost-effective, reliable and has the function of accurate tracking. When large object or vehicles were spread out

More information

Transformation of honeypot raw data into structured data

Transformation of honeypot raw data into structured data Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research

More information

APPROACHES TO SOFTWARE TESTING PROGRAM VERIFICATION AND VALIDATION

APPROACHES TO SOFTWARE TESTING PROGRAM VERIFICATION AND VALIDATION 1 APPROACHES TO SOFTWARE TESTING PROGRAM VERIFICATION AND VALIDATION Validation: Are we building the right product? Does program meet expectations of user? Verification: Are we building the product right?

More information

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: victorkleo@live.com ABSTRACT Internet security

More information

QUALITYMATE FOR LOAD TESTING

QUALITYMATE FOR LOAD TESTING QUALITYMATE FOR LOAD TESTING QualityMate suite of tools enables organizations to industrialize the software development process providing support for different process activities like Requirements Management,

More information

High Level Design Distributed Network Traffic Controller

High Level Design Distributed Network Traffic Controller High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction

More information

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK International Journal of Computer Application and Engineering Technology Volume 1-Issue1, January 2012.pp.1-7 www.ijcaet.net DEVELOPMENT OF VIBRATION REMOTE MONITORING SYSTEM BASED ON WIRELESS SENSOR NETWORK

More information

Traffic Monitoring in a Switched Environment

Traffic Monitoring in a Switched Environment Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Characterizing Performance of Enterprise Pipeline SCADA Systems

Characterizing Performance of Enterprise Pipeline SCADA Systems Characterizing Performance of Enterprise Pipeline SCADA Systems By Kevin Mackie, Schneider Electric August 2014, Vol. 241, No. 8 A SCADA control center. There is a trend in Enterprise SCADA toward larger

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

Smart wayside management software

Smart wayside management software Smart wayside management software FleetWise is innovative wayside data management software specifically designed to help transit authorities achieve superior fleet performance by collecting, distributing

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Proactive Performance Management for Enterprise Databases

Proactive Performance Management for Enterprise Databases Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive

More information

Basic Unix/Linux 1. Software Testing Interview Prep

Basic Unix/Linux 1. Software Testing Interview Prep Basic Unix/Linux 1 Programming Fundamentals and Concepts 2 1. What is the difference between web application and client server application? Client server application is designed typically to work in a

More information

Defining Quality Workbook. <Program/Project/Work Name> Quality Definition

Defining Quality Workbook. <Program/Project/Work Name> Quality Definition Defining Quality Workbook Quality Definition Introduction: Defining Quality When starting on a piece of work it is important to understand what you are working towards. Much

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

March 2008 Grant Halverson CEO, GFG Group. Regional Processing Models

March 2008 Grant Halverson CEO, GFG Group. Regional Processing Models March 2008 Grant Halverson CEO, GFG Group Regional Processing Models The search for successful regional and global IT processing models has been a major focus of the last fifteen years across banks, insurance

More information

Rotorcraft Health Management System (RHMS)

Rotorcraft Health Management System (RHMS) AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center

More information

ASTERIX Format Analysis and Monitoring Tool

ASTERIX Format Analysis and Monitoring Tool ASTERIX Format Analysis and Monitoring Tool Reference: SUR/STFRDE/APAT-SRS Status: Released Edition: 1.0 Date: 27 August 1998 Authors: Bruno Lambin, Tarkan Sevim Table of Contents 1. Introduction 1.1.

More information

Vehicle Tracking System for Security and Analyzing Transportation Vehicle Information

Vehicle Tracking System for Security and Analyzing Transportation Vehicle Information 1 Vehicle Tracking System for Security and Analyzing Transportation Vehicle Information A Complete Documentation on Vehicle Tracking System Prepared By:- Udham Singh Kumar Anubhav Rashid Chaudhary 2 Table

More information

CS 91: Cloud Systems & Datacenter Networks Networks Background

CS 91: Cloud Systems & Datacenter Networks Networks Background CS 91: Cloud Systems & Datacenter Networks Networks Background Walrus / Bucket Agenda Overview of tradibonal network topologies IntroducBon to soeware- defined networks Layering and terminology Topology

More information

Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

High Availability Essentials

High Availability Essentials High Availability Essentials Introduction Ascent Capture s High Availability Support feature consists of a number of independent components that, when deployed in a highly available computer system, result

More information

Contents. Load balancing and high availability

Contents. Load balancing and high availability White Paper Load Balancing in GateDefender Performa The information contained in this document represents the current view of Panda Software International, S.L on the issues discussed herein as of the

More information

integrated lights-out in the ProLiant BL p-class system

integrated lights-out in the ProLiant BL p-class system hp industry standard servers august 2002 integrated lights-out in the ProLiant BL p-class system technology brief table of contents executive summary 2 introduction 2 management processor architectures

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

Comprehensive IP Traffic Monitoring with FTAS System

Comprehensive IP Traffic Monitoring with FTAS System Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar kosnar@cesnet.cz CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Software Testing Interview Questions

Software Testing Interview Questions Software Testing Interview Questions 1. What s the Software Testing? A set of activities conducted with the intent of finding errors in software. 2.What is Acceptance Testing? Testing conducted to enable

More information

Identifying Data Integrity in the Cloud Storage

Identifying Data Integrity in the Cloud Storage www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and

More information

Tracking and Tracing application

Tracking and Tracing application Tracking and Tracing application Harras Network CVBA, Antwerpen, Belgium Light bridge Kft, Budapest Hungary (for Hungary) Koen Vangrinsven, Managing Director Gergely Zayzon, Lead Programmer, system administrator.

More information

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information