Service-Oriented File Sharing

Size: px
Start display at page:

Download "Service-Oriented File Sharing"

Transcription

1 Service-Oriented File Sharing Michael Sobolewski, Sekhar Soorianarayanan, Ravi-Kiran Malladi-Venkata SORCER Laboratory, Texas Tech University, USA Abstract The major objective of the Service Oriented Computing Environment (SORCER) [1] is to form dynamic federations of network services that provide engineering data, applications and tools on a grid [23-28]. To meet the requirements of these service providers in terms of data sharing and managing in the form of data files, the FileStore Service (FSS) was developed as a core service in SORCER. The value of FileStore service is enhanced when both web based user agents and service providers can readily share the content in a seamless fashion. This framework fits the SORCER philosophy of grid interactive service-oriented programming [2], where users create distributed programs using exclusively interactive user agents. The Document Manager user agent is a web-based GUI, which allows authorized users to securely access the FileStore service in the same way as users use their local file system. This paper is structured as follows: first, a brief overview of SORCER is given and then, FSS is described. Next, we discuss how data is passed across multiple services and how providers dealing with parts of data can filter out information from large files using the filter framework. We also discuss how these files are used by different services and managed by web based user agents. Finally we discuss an actual use case of this service in the FIPER project [1] for B2B Fuel Nozzle and Combustor service between GE Global Research Center and Parker Hannifin and also some proposed extensions to the existing system. Key Words Distributed file systems, service-oriented computing, grid computing, concurrent engineering, Jini network technolgy 1. Introduction GE has teamed with Engineous Software, BF Goodrich, Parker Hannifin, Ohio Aerospace Institute, Ohio University, and Stanford University in a four-year effort to develop the Federated Intelligent Product Environment (FIPER) [1-7] under the sponsorship of the National Institute for Standards and Technology (NIST). FIPER strives to drastically reduce design cycle time, and timeto-market by intelligently automating elements of the design process in a linked, associative environment, thereby providing true concurrency between design and manufacturing. This will enable distributed design of robust and optimized products within an advanced, integrated web-based environment. Service-Oriented Computing Environment (SORCER) is built on the success story of FIPER as a next generation grid computing system. SORCER applies object-oriented techniques directly to the network. Its software architecture houses a pool of peer objects called service providers. Since service providers serve each other as well user agents in a uniform way, this type of computing is called service-to-service (S2S) computing where all providers are service peers. The SORCER architecture is simultaneously web-centric, service-centric and networkcentric. The web-centricity enables transparent web-based access to the globally distributed data and the pool of services. The individual services can act within this framework, both in the role of providing services (provider mode) and requesting services (requestor mode). When requesting aggregated services, the SORCER middleware also brokers the requests, delegating them to the appropriate registered component s services. In this paper, we discuss Service-Oriented File Sharing, a novel approach to share data across multiple providers and to manage and access these data using SORCER middleware services. The web based user agent adds to the idea of interactive programming, where the user through web interfaces can manage data files and folders. The same data can be accessed and updated by different service providers and authorized users can monitor data processing activities executed by the service providers involved. Like any other services in the environment, the FileStore Service (FSS) is also a peer which implements a common top-level interface called Servicer. FSS supports filtering out information from remote files, thus reducing the amount of data transfers between providers. The rest of the paper is structured as follows: Section 2 describes the main components of the SORCER middleware and their interfaces, Section 3 describes a web based user agent and the architecture of the Document Manager that is utilized by FSS, Section 4 discusses the FileStore Service and the Filter Service. In section 5 we discuss a use case scenario of B2B Fuel Nozzle and Combustor design between GE GRC and

2 Parker-Hannifin where services collaborate across firewalls using this framework. In section 6, we discuss some extensions on how this framework can be used for 2. Service Oriented Computing Environment 2.1 Context Model A SORCER context model [5] is the basic element of SORCER data structures and is based on the percept calculus knowledge representation scheme [30]. It forms the essential structure of the data being processed. A context model in the SORCER system is represented as a tree-like structure of context nodes. A data node is where the actual data resides. The context denotes an application domain namespace, and a context model is its context with data nodes as leaf nodes appended to its context paths. A context path is a name for a data in its leaf node. The leaf node might contain any object and in particular an object that represents a file, for example a URL. A special container object called ServiceNode acts as a wrapper that holds a reference to a remote document object. 2.2 Services In SORCER any service is identified by the interface it implements. All services implement the common interface called Servicer, other than service specific interfaces. Hence all providers are peers, which can communicate with one another via the Servicer interface. A service provider takes a context as argument of service request and selects data nodes on which it has to provide service. Then, the provider returns an output context that contains the result of provided service. The data, which a provider generates, can be in the form of a file, which is stored in a remote location. An object called DocumentDescriptor represents the remote references to files in the FileStore. These DocumentDescriptors reside inside ServiceNodes in the context, which acts as a linkage for the remote document references. Any provider or user agent can remotely access these documents programmatically or through GUI in a seamless way using FSS. Certain parts of the document can be filtered out with the help of Filter associated with its ServiceNode. 2.3 Interactive Service Oriented Programming Conventional programs are still based on writing hundreds of lines of codes. In SORCER, once providers are deployed, jobs (service-oriented programs) can be built using interactive tools. Thus we can create programs in which each task is like a line of code, which is actually a distributed activity in the network. The web based user agent for service-oriented file sharing is another SORCER tool, which allows the user to view and maintain files and folders in an interactive way in remote locations. Thus, integrating the two tools adds a new dimension to the philosophy of interactive service-oriented programming. collaboration among multiple replicated file store services in a P2P environment. Now, users can upload files and attach the files to a particular ServiceNode in the context and let any provider execute the task. The provider can now programmatically access the shared data in these files and can choose to update that information using FSS. 3. Document Manager Generic Application (GApp) Document Manager (DM) is an enterprise wide Document Management system that allows managing all types of documents across distributed enterprise. The initial GApp toolkit was developed at GE Global Research Center and multiple web-based applications have been developed for multiple GE business components. DM allows finding the shared information effectively, enabling better collaboration, and reducing duplication of effort. To manage the life cycle, DM manages multiple versions of all kinds of documents from authoring through review, approval, notification, distribution and archiving. DM uses Access Control List (ACL), Access Class and Export Control schemes for finer grade security control of all documents. For secure transfer of files, SSL can also be enabled for the file upload/download. Every user logged into the DM system is treated as a principal and certain default permissions apply to the user based on the user s role in the system. These permissions are controlled by rule-based access control properties, which can be changed dynamically in the system. Over the default permissions of the user in the system, more access can be granted or denied using ACLs. An ACL can be attached to any object (folder or document) in the system and accordingly the ACL object guards the object in the system. The DM client and server are presented in more details in the following sections. 3.1 DM User Agent The web based DM user agent is a zero installation client, and it aids the end users for interactive document management. End users can access DM through a web applet-based user interface, which allows restricted users to securely use the FileStore service in the same way as a user uses his local file system. The Document Manager is built over the GApp framework and all GUI componets are built using Model- View-Controller (MVC) paradigm [29]. Hence the view of the system can be customized with the shared model, which is the synonym for shared data. Fig. 1 captures the DM user agent. In Fig. 2 the UML class diagram of the client GUI is presented. All the business logic, on the client as well as the server side, is implemented using the command design pattern [19].

3 College of Engineering, and Dean of the Graduate School. at Texas Tech University. 3.2 Server Side Server maintains its own pool of database connections and resources. Its worker thread is spawned for each client interaction. The workers are pooled for efficiency. Also the connection objects are pooled and are used by the ProtocolStatement in each command. The commands encapsulate the business logic for specific functionality. The command factory for a command request returns right commands to be executed (see Fig 3). The application server s ACL manager (AsAclManager) maintains the access control for the objects. Access control can be decided based on an ACL for individual objects or policy based access control, which is more scalable (see Fig. 4). FSS exposes the GApp DM as a service in the network, providing framework for uploading, downloading, filtering etc. Figure 1. The DM web-based user agent. Figure 3. Server-side command dispatching. Figure 2. The GApp MVC Paradigm and client command dispatching The web agent allows for multiple users to create a folder hierarchy with ability to lock/unlock, freeze/unfreeze, update and move any folder. Based on these operations, the meta-information associated with any documents is changed. It also adds additional security features like marking any folder as export controlled, providing access class and providing access control list. The same security features are available to the documents inside a folder. Documents can be created under any folder just as a user creates in his local file system. These documents are version controlled and each document can have multiple versions associated with it. Every document is associated with a current version. Users can associate any version of the document to the current version. DM has been used to mange all documents by the search committees at Computer Department Department, search for Dean of Figure 4. The GApp Command execution framework. 4. FileStore Service The FileStore service is like any other service in the SORCER environment. FileStore services can be replicated in SORCER to form true peers that can join the community dynamically. With such a framework in place,

4 now the whole network looks like a heterogeneous shared file-system. Files may be located in multiple locations but may be logically grouped together under the same name space, which forms a kind of virtual folder. 4.1 Design A DocumentDescriptor concept is similar to a file descriptor, but in our case contains attributes of a document. The DocumentDescriptor object encapsulates an input and an output stream objects that should be bound to remote input and output streaming servers spawned by FSS for each request of file upload or download respectively. FSS is designed as a Jini [10-14] service and implements RemoteFileStore interface described as follows: } catch (Exception e) { e.printstacktrace (); public interface RemoteFileStore { } DocumentDescriptor getinputdescriptor (Documentdescriptor); } DocumentDescriptor getoutputdescriptor (Documentdescriptor); In order to upload a document, the user agent sets information in a DocumentDescriptor like the folder name, name of document etc. Once the handle to the document is prepared and returned (see Fig. 5 and 6), to upload the file the user agent does the following: documentdescriptor = remotefileserver.getinputdescriptor(documentdescriptor); try { ((OutputStreamProxy) documentdescriptor.out).upload (clientfile) } catch (Exception e) { e.printstacktrace(); } By calling getinputdescriptor on the FSS, the FSS service returns the updated document descriptor and starts the RemoteOutputStreamServer (see Fig. 5 and 6). The RemoteOutputStreamServer is embedded inside the OutputStreamProxy, which is embedded inside the DocumentDescriptor and passed back to the client. Now the client can call upload via the OutputStreamProxy, which is embedded inside the DocumentDescriptor. Similarly for downloading a document, the user agent does the following. documentdescriptor= remotefileserver.getinputdescriptor(documentdescriptor); try { ((InputStreamAdapter)documentDescriptor.in).download (outputfile); The above code snippets explain how the documents can be programmatically uploaded or downloaded via the FSS Service. FSS is built on the top of the GApp Document Manager. This DM layer manages all the metainformation and security aspects of the documents. The architecture of this layer is briefly described in Section Filter Service Figure 7. Service context data filtering. Figure 5. The FSS streaming class diagram. Figure 6. The FSS Document Descriptor. Along with a DocumentDescriptor, the ServiceNode may conain an additional object called a Filter. Filters are used to filter out some specific information referenced by a ServiceNode object. The information can be from the database, document etc. Each ServiceNode can have own Filter. The UML diagram of the design for context data filtering is illustrated in Fig. 7. For documents, FileFilters have been developed. Each FileFilters contains a FilterReaderWriter to handle remote reading and writing of data in files via the FSS Service. FSS also provides additional service called a FilterService. This service helps in remote setting and getting specific data as described altogether by a DocumentDescriptor and a Filter. Thus, the client can selectively read and write to files in remote locations. Collaborative users can also use this technique for real time editing of files.

5 6. B2B Scenario with File Store No mechanism for guarding the files based on access control list specified by users at both ends. In this section we discuss the use case scenario of B2B Fuel Nozzle and Combustor design across enterprise GE GRC (NY) and Parker Hannifin (OH). We later discuss how the File Store service helps resolve many of the issues of sharing data across different business organizations guarded by firewalls. In the interactive design of combustor, one of the important aspects of the analysis is a fuel nozzle validation when the combustor geometry has been updated. Parker-Hannifin specializes in nozzle design and validation services and the GE GRC combustor service requires these services to be accessed for complete validation of the updated combustor geometry. The layout of the solution for this B2B interaction is shown in Fig. 8. File Store service helps in resolving the issues mentioned above. Clients at both ends can now upload their files via the File Store Service located in their own respective Virtual Organization. Services in both ends can access data stored on the other side via Document Descriptors communicating with the FileStore Service sitting in the other end. Not only the FileStore can be used to share information across services; they can also be used for smart filtering of data using the Filter Service provided by all FileStore Services. Thus we can avoid transfer of large chunks of data across firewalls. The ASACLManager, (see Fig. 4) takes care of guarding individual business objects (including documents), based on the Access Control rules set by the user or individual services, whoever is responsible for creating the document. All validation of requests is done by FSS based on credentials passed from the other end on whose behalf the current service is being executed. 7. Collaboration with Document Manager Consider a global manufacturing company, where engineers from several countries are at work on a new product. In each country, there could be multiple local organizations each independent of each other. To improve the flow of information among these widely distributed team members, it is very important to have a decentralized document management system with replicas of the documents and meta-information in various locations and these documents must be accessible by the client without having any information about the location and other details of the document. Also, it must be noted that the clients must also be able to share documents for large-scale collaboration inside the VO [27]. Figure 8. GE/Parker B2B conceptual architecture. The GRC Perimeter Network or GRC DMZ consists of the standard GRC HTTP proxy server, screening security router(s) and the FIPER sfiper-crd.crd.ge.com DMZ host used as a SSL FIPER Extraportal (FIPER application proxy server). Currently the FIPER DMZ host allows incoming connections from selected Parker hosts and only outgoing connection to fiperdev.crd.ge.com. Thus services can communicate with each other with the help of Extraportals in both ends. Though services can communicate with each other, the following things were missing for this B2B interaction. No data management between the two services at both ends. Security is at compromise if there is no validation on the access of data by specified users from the other side. Keeping in mind the above mentioned requirement, we propose a scalable distributed version of the FileStore Service. In this scheme, any peer can share files in the network. All meta-information about the documents which a peer decides to share, are maintained by a special set of peers called FileStore Peers (FSP). These set of peers form a virtual group called FileStore peer group (FSPG). A FSPG is responsible to store the metainformation of any document published by a client. For data replication of the meta-information and scaling this framework to large number of peers inside a VO, any peer can join and leave a FSPG. Other than managing metainformation, a FSPG actively collaborates for the dynamic discovery of location of any document represented by a DocumentDescriptor and initiate the binding between the requestor who s requesting for the file and the provider who provides the file. Typical sharing and downloading of files inside a VO, in such a framework is shown in Figure 9.

6 7 5 Virtual group of FSP Figure 9. File Store peers 1 2 Provider Peers FileStore Peers 1) FS Peer joins the FS Peer Group 2) For sharing file, Provider peers (includes FS Peer) can store file and request FS Peer to store Meta information. 3) Request for a file based on DocumentDescriptor 4) Peers resolves the location of the requested file 5) Binding initiated 6) Reference of the location peer returned 7) File downloaded via stream For collaboration among multiple VO s we face altogether a different set of challenges. One of the major issues is the presence of firewall. We need to create the same virtual group of FSP s which would be able to effectively discover location of files across firewalls and NAT thus building a lager virtual group of FSP. Also the framework should support binding between two peers for download or upload of files across VO s. The solution to the above problem lies in the effective use of Firewall/NAT friendly protocols like HTTP or HTTPS for searching and downloading document across VO s. Thus every VO will contain a special peer called the Router FSP. These set of router peers collaborate among each other the same way as the FSP s collaborate inside a subnet for storing and searching of different documents. The only difference is that the router peers use http protocol to bridge the VO s. Once the location of any document being searched is resolved between the requestor and provider, the document descriptor is returned to the requestor. This document descriptor contains the input stream proxy, which uses http protocol to download files from clients across VO. The different components in the proposed framework are described in figure 10. The solution to the problem that peers inside firewall can communicate to clients outside, but not vice versa, lies in our choice of technology described next. Provider Peers FileStore Peers Router Peers Virtual FS Peer Group 2 1, 5 Figure 10. File Store peers across VO 3 Subnet Request for a file based on DocumentDescriptor 2,3. FS Peers resolves the location of the requested file 4. Binding initiated 5. Reference of the location peer returned 6. File Downloaded via stream Our choice of technology for managing the peers inside the VO is Jini [11-19] as it is more object oriented, and service based than other P2P solutions. FSP joining the FSPG can easily be discovered by other FSP s inside the VO and they can actively collaborate among each other. But for the collaboration of peers across firewalls, we use JXTA technology [22, 23, and 29]. Using this technology, router peers joining the VO can discover among themselves using the Peer Discovery Protocol defined by JXTA. Once these peers discover themselves, they can actively collaborate among themselves by passing messages across each other. JXTA aids in peer communication from both inside to outside and outside to inside of firewalls by the following trick. A peer inside a firewall uses a router peer either located outside the firewall or visible outside the firewall to traverse the firewall. Peers attempting to contact a peer behind a firewall connect to the router peer, and the peer behind the firewall periodically connects to a router peer. When the internal peer connects to the router, any incoming messages get pushed down to the peer in the HTTP response. Also JXTA uses pipes which abstract the transport layer for end to end communication between different peers in the network. Hence we can make use of this abstraction to aid the communication via the output stream proxy of the document descriptor for download and upload of files across peers in different networks. Conclusions The presented zero configuration to file sharing is a novel service-oriented approach to share data among different file service peers. The introduction of Document Descriptors and Filters aids in maintaining remote references to files distributed across multiple FSS in the network. Thus FSS can be used across heterogeneous file systems located across different virtual organizations. The DM user agent fits the SORCER philosophy of grid interactive service-oriented programming and helps the user in interactive service oriented programming. The access control mechanisms in FSS helps clients to define fine grain permissions for any objects in the system. An experimental version of presented approach was successfully deployed at GE Aircraft Engines and Parker Hannifin. The further extensions of the presented approach, including collaboration of replicated FSS, by integrating JXTA and JINI technology and providing new caching mechanisms for faster access of files and data mining based on meta-information are being investigated in the SORCER Laboratory, Texas Tech University [10]. References [1] Sobolewski,. Federated P2P Services in CE Environments, Advances in Concurrent Engineering, A.A. Balkema Publishers, 2002, ISBN , pp , keynote paper (2002).

7 [2] Grid Interactive Service Oriented Programming, Michael Sobolewski, Texas Tech University, Raymond Kolonay, Air Force Research Laboratory, WPAFB, SORCER Technical Report, [3] Michael Lapinski and Michael Sobolewski, Managing Notifications in a Federated S2S Environment, International Journal of Concurrent Engineering: Research & Applications, December, [4] Sobolewski, FIPER: The Federated S2S Environment, JavaOne, Sun s 2002 Worldwide Java Developer Conference, San Francisco (2002), [5] ( sions/display-2420.en.jsp) [6] Zhao, Shuo, and Michael Sobolewski, 2001, Context Model Sharing in the FIPER Environment, Proc. of the 8th Int. Conference on Concurrent Engineering: Research and Applications, Anaheim, CA. [7] Michael Lapinski, and Michael Sobolewski, August 2001, Notification Manager in the FIPER Environment, Proc. of the 8th Int. Conference on Concurrent Engineering: Research and Applications, Anaheim, CA. [8] Peter J. Röhl, Raymond M. Kolonay, Rohinton K. Irani, Michael Sobolewski, Kevin Kao, A Federated Intelligent Product Environment, AIAA , 8th AIAA/USAF/NASA/ISSMO Symposium on Multidisciplinary Analysis and Optimization, Long Beach, CA, September 6-8, [9] Texas Tech University TechGrid Web site, [10] SORCER Web site, [11] Jini.org Web site, [12] Jini Architecture Specification. [online] 2000 [cited 2002 March 22]. Available at URL: [13] Edwards, W.K. (2000). Core Jini, 2nd ed., Prentice Hall, ISBN: [14] Oaks, S. & Wong, H. (2000). Jini in a Nutshell, O Reilly, ISBN: [15] Newmarch, J., A Programmers Guide to Jini Technology, Apress, Berkeley, California, ISBN: , [16] Freeman, E., Hopfer, S., & Arnold, K.(1999), JavaSpaces Principles, Patterns, and Practice, Addison-Wesley, ISBN: [17] Halter Steven L., JavaSpaces Example-by- Example, Prentice Hall; ISBN: [18] Davis Project. [19] Rio Web site, [20] Grand, M. (1999). Patterns in Java, Volume 1, Wiley, ISBN: [21] IBM Autonomic Computing Web site, [22] Sing Li, JXTA Peer-toPeer Computing with Java, Wrox Press Ltd., ISBN , [23] D. Brookshier, D, Govoni, N. Krishnan, JXTA: Java P2P Programming, SAMS, ISBN , [24] The Globus Project Web site, [25] The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. I. Foster, C. Kesselman, J. Nick, S. Tuecke, Open Grid Service Infrastructure WG, Global Grid Forum, June 22, (extended version of Grid Services for Distributed System Integration). [26] Grid Service Specification. S. Tuecke, K. Czajkowski, I. Foster, J. Frey, S. Graham, C. Kesselman; Open Grid Service Infrastructure WG, Global Grid Forum, Draft 2, 7/17/2002. [27] Grid Services for Distributed System Integration. I. Foster, C. Kesselman, J. Nick, S. Tuecke. Computer, 35(6), [28] The Anatomy of the Grid: Enabling Scalable Virtual Organizations. I. Foster, C. Kesselman, S. Tuecke. International J. Supercomputer Applications, 15(3), Defines Grid computing and the associated research field, proposes a Grid architecture, and discusses the [29] JXTA website [30] Sobolewski, M., Knowledge-Based System Integration in a Concurrent Engineering Environment. J. Komorowski and Z.W. Ras (Eds.) Methodologies for Intelligent Systems, Lecture Notes in AI, No 689, Berlin: Springer-Verlag, pp , 1993.

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

2. Create (if required) 3. Register. 4.Get policy files for policy enforced by the container or middleware eg: Gridmap file

2. Create (if required) 3. Register. 4.Get policy files for policy enforced by the container or middleware eg: Gridmap file Policy Management for OGSA Applications as Grid Services (Work in Progress) Lavanya Ramakrishnan MCNC-RDI Research and Development Institute 3021 Cornwallis Road, P.O. Box 13910, Research Triangle Park,

More information

Web Service Based Data Management for Grid Applications

Web Service Based Data Management for Grid Applications Web Service Based Data Management for Grid Applications T. Boehm Zuse-Institute Berlin (ZIB), Berlin, Germany Abstract Web Services play an important role in providing an interface between end user applications

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

THE CCLRC DATA PORTAL

THE CCLRC DATA PORTAL THE CCLRC DATA PORTAL Glen Drinkwater, Shoaib Sufi CCLRC Daresbury Laboratory, Daresbury, Warrington, Cheshire, WA4 4AD, UK. E-mail: g.j.drinkwater@dl.ac.uk, s.a.sufi@dl.ac.uk Abstract: The project aims

More information

Resource Management on Computational Grids

Resource Management on Computational Grids Univeristà Ca Foscari, Venezia http://www.dsi.unive.it Resource Management on Computational Grids Paolo Palmerini Dottorato di ricerca di Informatica (anno I, ciclo II) email: palmeri@dsi.unive.it 1/29

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Deploying F5 to Replace Microsoft TMG or ISA Server

Deploying F5 to Replace Microsoft TMG or ISA Server Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security

More information

e-gateway SOLUTION OVERVIEW Financials HCM ERP e-gateway Web Applications Mobile Devices SharePoint Portal

e-gateway SOLUTION OVERVIEW Financials HCM ERP e-gateway Web Applications Mobile Devices SharePoint Portal e-gateway SOLUTION OVERVIEW In an effort to manage mission critical information better, perform their daily tasks more efficiently, share information to key stakeholders more effectively, and ensure that

More information

Writing Grid Service Using GT3 Core. Dec, 2003. Abstract

Writing Grid Service Using GT3 Core. Dec, 2003. Abstract Writing Grid Service Using GT3 Core Dec, 2003 Long Wang wangling@mail.utexas.edu Department of Electrical & Computer Engineering The University of Texas at Austin James C. Browne browne@cs.utexas.edu Department

More information

A SERVICE-ORIENTED APPROACH FOR PERVASIVE LEARNING GRID

A SERVICE-ORIENTED APPROACH FOR PERVASIVE LEARNING GRID A SERVICE-ORIENTED APPROACH FOR PERVASIVE LEARNING GRID Ching-Jung Liao and Fang-Chuan Ou Yang Department of Management Information Systems Chung Yuan Christian University 22, Pu-Jen, Pu-Chung Li, Chung-Li,

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Classic Grid Architecture

Classic Grid Architecture Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Grid Technology and Information Management for Command and Control

Grid Technology and Information Management for Command and Control Grid Technology and Information Management for Command and Control Dr. Scott E. Spetka Dr. George O. Ramseyer* Dr. Richard W. Linderman* ITT Industries Advanced Engineering and Sciences SUNY Institute

More information

Exertion Oriented Programming

Exertion Oriented Programming Exertion Oriented Programming Michael Sobolewski Computer Science, Texas Tech University SORCER Research Group, http://sorcer.cs.ttu.edu sobol@cs.ttu.edu Abstract. Six generations of RPC systems can be

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications

GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications Yan Huang Department of Computer Science Cardiff University PO Box 916 Cardiff CF24 3XF United Kingdom Yan.Huang@cs.cardiff.ac.uk

More information

Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure

Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure Xweb: A Framework for Application Network Deployment in a Programmable Internet Service Infrastructure O. Ardaiz, F. Freitag, L. Navarro Computer Architecture Department, Polytechnic University of Catalonia,

More information

Abstract. 1. Introduction. Ohio State University Columbus, OH 43210 {langella,oster,hastings,kurc,saltz}@bmi.osu.edu

Abstract. 1. Introduction. Ohio State University Columbus, OH 43210 {langella,oster,hastings,kurc,saltz}@bmi.osu.edu Dorian: Grid Service Infrastructure for Identity Management and Federation Stephen Langella 1, Scott Oster 1, Shannon Hastings 1, Frank Siebenlist 2, Tahsin Kurc 1, Joel Saltz 1 1 Department of Biomedical

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

MapCenter: An Open Grid Status Visualization Tool

MapCenter: An Open Grid Status Visualization Tool MapCenter: An Open Grid Status Visualization Tool Franck Bonnassieux Robert Harakaly Pascale Primet UREC CNRS UREC CNRS RESO INRIA ENS Lyon, France ENS Lyon, France ENS Lyon, France franck.bonnassieux@ens-lyon.fr

More information

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf

More information

10 Proxy Pattern [Gamma et al]

10 Proxy Pattern [Gamma et al] 10 Pattern [Gamma et al] pattern is used in scenarios when it is required to use avoid heavy-weight objects. So lightweight objects that are actually replica of the original objects exposing the same interface

More information

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto (franziskus.ekadiyanto@stud.uni-due.de) CONTENTS Why P2P? The P2P Overlay

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

The Accounting Information Sharing Model for ShanghaiGrid 1

The Accounting Information Sharing Model for ShanghaiGrid 1 The Accounting Information Sharing Model for ShanghaiGrid 1 Jiadi Yu, Minglu Li, Ying Li, Feng Hong Department of Computer Science and Engineering,Shanghai Jiao Tong University, Shanghai 200030, P.R.China

More information

Exploiting peer group concept for adaptive and highly available services

Exploiting peer group concept for adaptive and highly available services Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear Research (CERN) Switzerland Fahd Ali Zahid, Mohammad Moazam Fraz Foundation University,

More information

Distributed Systems and Recent Innovations: Challenges and Benefits

Distributed Systems and Recent Innovations: Challenges and Benefits Distributed Systems and Recent Innovations: Challenges and Benefits 1. Introduction Krishna Nadiminti, Marcos Dias de Assunção, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department

More information

Feature and Technical

Feature and Technical BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 5

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 5 Course Page - Page 1 of 5 WebSphere Application Server 7.0 Administration on Windows BSP-1700 Length: 5 days Price: $ 2,895.00 Course Description This course teaches the basics of the administration and

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency Deployment Guide Document Version 1.2 What s inside: 2 Configuration example 5 Configuring the BIG-IP LTM using the Lync 2010 iapp 6 Configuring the BIG-IP GTM 11 Creating a Distributed Application for

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

www.mvatcybernet.com PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008

www.mvatcybernet.com PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008 PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008 With Forefront Threat Management Gateway 2010 now discontinued, we sought a suitable reverse proxy solution that works with Lync

More information

Multi-Agent Support for Internet-Scale Grid Management

Multi-Agent Support for Internet-Scale Grid Management Multi-Agent Support for Internet-Scale Grid Management B.J. Overeinder, N.J.E. Wijngaards, M. van Steen, and F.M.T. Brazier Department of Computer Science, Faculty of Sciences, Vrije Universiteit Amsterdam,

More information

DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing

DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7 No. 7, September-October 2008 Applications At Your Service Mahesh H. Dodani, IBM,

More information

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets!! Large data collections appear in many scientific domains like climate studies.!! Users and

More information

Web Service Robust GridFTP

Web Service Robust GridFTP Web Service Robust GridFTP Sang Lim, Geoffrey Fox, Shrideep Pallickara and Marlon Pierce Community Grid Labs, Indiana University 501 N. Morton St. Suite 224 Bloomington, IN 47404 {sblim, gcf, spallick,

More information

Deploying QoS sensitive services in OSGi enabled home networks based on UPnP

Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Deploying QoS sensitive services in OSGi enabled home networks based on UPnP Nico Goeminne, Kristof Cauwel, Filip De Turck, Bart Dhoedt Ghent University - IBBT - IMEC Department of Information Technology

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

PROGRESS Portal Access Whitepaper

PROGRESS Portal Access Whitepaper PROGRESS Portal Access Whitepaper Maciej Bogdanski, Michał Kosiedowski, Cezary Mazurek, Marzena Rabiega, Malgorzata Wolniewicz Poznan Supercomputing and Networking Center April 15, 2004 1 Introduction

More information

New resource provision paradigms for Grid Infrastructures: Virtualization and Cloud

New resource provision paradigms for Grid Infrastructures: Virtualization and Cloud CISCO NerdLunch Series November 7, 2008 San Jose, CA New resource provision paradigms for Grid Infrastructures: Virtualization and Cloud Ruben Santiago Montero Distributed Systems Architecture Research

More information

Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1

Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1 Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008

DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008 DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008 Table of Contents Table of Contents Deploying F5 with Microsoft Windows Server 2008 Prerequisites and configuration notes...1-1 Deploying

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

4-3 Grid Communication Library Allowing for Dynamic Firewall Control

4-3 Grid Communication Library Allowing for Dynamic Firewall Control 4-3 Grid Communication Library Allowing for Dynamic Firewall Control HASEGAWA Ichiro, BABA Ken-ichi, and SHIMOJO Shinji Current Grid technologies tend not to consider firewall system properly, and as a

More information

Automatic Configuration and Service Discovery for Networked Smart Devices

Automatic Configuration and Service Discovery for Networked Smart Devices Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253

More information

Cybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG: Network Access Policy Tool (NetAPT)

Cybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG: Network Access Policy Tool (NetAPT) Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 William H. Sanders University of Illinois TCIPG: Network Access Policy Tool (NetAPT) (Joint work with David Nicol,

More information

Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002

Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002 Page 1 of 9 Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2002/07/17/tomcluster.html See this if you're having trouble printing code examples Clustering

More information

Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services

Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Interacting the Edutella/JXTA Peer-to-Peer Network with Web Services Changtao Qu Learning Lab Lower Saxony University of Hannover Expo Plaza 1, D-30539, Hannover, Germany qu @learninglab.de Wolfgang Nejdl

More information

Oracle WebLogic Server 11g: Administration Essentials

Oracle WebLogic Server 11g: Administration Essentials Oracle University Contact Us: 1.800.529.0165 Oracle WebLogic Server 11g: Administration Essentials Duration: 5 Days What you will learn This Oracle WebLogic Server 11g: Administration Essentials training

More information

FioranoMQ 9. High Availability Guide

FioranoMQ 9. High Availability Guide FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential

More information

A Case Based Tool for Monitoring of Web Services Behaviors

A Case Based Tool for Monitoring of Web Services Behaviors COPYRIGHT 2010 JCIT, ISSN 2078-5828 (PRINT), ISSN 2218-5224 (ONLINE), VOLUME 01, ISSUE 01, MANUSCRIPT CODE: 100714 A Case Based Tool for Monitoring of Web Services Behaviors Sazedul Alam Abstract Monitoring

More information

A Tool for Evaluation and Optimization of Web Application Performance

A Tool for Evaluation and Optimization of Web Application Performance A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 cernyto3@fel.cvut.cz Michael J. Donahoo 2 jeff_donahoo@baylor.edu Abstract: One of the main goals of web application

More information

Research on the Model of Enterprise Application Integration with Web Services

Research on the Model of Enterprise Application Integration with Web Services Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

A Service-Oriented Approach for the Pervasive Learning Grid

A Service-Oriented Approach for the Pervasive Learning Grid JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 959-971 (2005) A Service-Oriented Approach for the Pervasive Learning Grid CHING-JUNG LIAO, FANG-CHUAN OU YANG * AND KEVIN CHIHCHENG HSU * Department

More information

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper

More information

Grid Data Integration based on Schema-mapping

Grid Data Integration based on Schema-mapping Grid Data Integration based on Schema-mapping Carmela Comito and Domenico Talia DEIS, University of Calabria, Via P. Bucci 41 c, 87036 Rende, Italy {ccomito, talia}@deis.unical.it http://www.deis.unical.it/

More information

SCC717 Recent Developments in Information Technology

SCC717 Recent Developments in Information Technology SCC717 Recent Developments in Information Technology Lecturer: Wanlei ZHOU, Ph.D., DSc., Professor, Acting Head School of Information Technology Deakin University, Melbourne Campus Office: T205.2, Ext.

More information

10972B: Administering the Web Server (IIS) Role of Windows Server

10972B: Administering the Web Server (IIS) Role of Windows Server 10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway 2 Microsoft s Forefront Threat Management Gateway (TMG) is a network security and protection solution for enterprise

More information

Using the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources

Using the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources Using the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources Asif Saleem Marko Krznarić Jeremy Cohen Steven Newhouse John Darlington London e-science Centre,

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course

More information

STRATEGIES ON SOFTWARE INTEGRATION

STRATEGIES ON SOFTWARE INTEGRATION STRATEGIES ON SOFTWARE INTEGRATION Cornelia Paulina Botezatu and George Căruţaşu Faculty of Computer Science for Business Management Romanian-American University, Bucharest, Romania ABSTRACT The strategy

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

How To Create A C++ Web Service

How To Create A C++ Web Service A Guide to Creating C++ Web Services WHITE PAPER Abstract This whitepaper provides an introduction to creating C++ Web services and focuses on:» Challenges involved in integrating C++ applications with

More information

Deployment Guide Microsoft IIS 7.0

Deployment Guide Microsoft IIS 7.0 Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...

More information

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

Grid Services Extend Web Services

Grid Services Extend Web Services 1 Background Grid Services Extend Web Services Andrew Grimshaw Avaki Corporation Burlington, MA and The University of Virginia Charlottesville, VA Steven Tuecke Globus Project Mathematics and Computer

More information

Exploring ADSS Server Signing Services

Exploring ADSS Server Signing Services ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)

More information

Integration of Mobile Agents and Web Services

Integration of Mobile Agents and Web Services Integration of Mobile Agents and Web Services Jan Peters Fraunhofer Institut für Graphische Datenverarbeitung Fraunhoferstraße 5, 64283 Darmstadt, Germany jan.peters@igd.fraunhofer.de Abstract. The web

More information

A Framework for End-to-End Proactive Network Management

A Framework for End-to-End Proactive Network Management A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu

More information

Virtual Credit Card Processing System

Virtual Credit Card Processing System The ITB Journal Volume 3 Issue 2 Article 2 2002 Virtual Credit Card Processing System Geraldine Gray Karen Church Tony Ayres Follow this and additional works at: http://arrow.dit.ie/itbj Part of the E-Commerce

More information

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,

More information

Hitachi Data Migrator to Cloud Best Practices Guide

Hitachi Data Migrator to Cloud Best Practices Guide Hitachi Data Migrator to Cloud Best Practices Guide Global Solution Services Engineering April 2015 MK-92HNAS045-02 Notices and Disclaimer Copyright 2015 Corporation. All rights reserved. The performance

More information

RS MDM. Integration Guide. Riversand

RS MDM. Integration Guide. Riversand RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.

More information

PIE. Internal Structure

PIE. Internal Structure PIE Internal Structure PIE Composition PIE (Processware Integration Environment) is a set of programs for integration of heterogeneous applications. The final set depends on the purposes of a solution

More information

The Service Availability Forum Specification for High Availability Middleware

The Service Availability Forum Specification for High Availability Middleware The Availability Forum Specification for High Availability Middleware Timo Jokiaho, Fred Herrmann, Dave Penkler, Manfred Reitenspiess, Louise Moser Availability Forum Timo.Jokiaho@nokia.com, Frederic.Herrmann@sun.com,

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Chapter -5 SCALABILITY AND AVAILABILITY

Chapter -5 SCALABILITY AND AVAILABILITY Chapter -5 SCALABILITY AND AVAILABILITY 78 CHAPTER 5 Chapter - 5. Scalability and Availability S.No. Name of the Sub-Title Page No. 5.1 The importance of Scalability and Availability 79 5.2. Design Patterns

More information

ANALYSIS OF GRID COMPUTING AS IT APPLIES TO HIGH VOLUME DOCUMENT PROCESSING AND OCR

ANALYSIS OF GRID COMPUTING AS IT APPLIES TO HIGH VOLUME DOCUMENT PROCESSING AND OCR ANALYSIS OF GRID COMPUTING AS IT APPLIES TO HIGH VOLUME DOCUMENT PROCESSING AND OCR By: Dmitri Ilkaev, Stephen Pearson Abstract: In this paper we analyze the concept of grid programming as it applies to

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

Alfresco Enterprise on AWS: Reference Architecture

Alfresco Enterprise on AWS: Reference Architecture Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)

More information

Distributed Objects and Components

Distributed Objects and Components Distributed Objects and Components Introduction This essay will identify the differences between objects and components and what it means for a component to be distributed. It will also examine the Java

More information

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007 Data Management in an International Data Grid Project Timur Chabuk 04/09/2007 Intro LHC opened in 2005 several Petabytes of data per year data created at CERN distributed to Regional Centers all over the

More information

An objective comparison test of workload management systems

An objective comparison test of workload management systems An objective comparison test of workload management systems Igor Sfiligoi 1 and Burt Holzman 1 1 Fermi National Accelerator Laboratory, Batavia, IL 60510, USA E-mail: sfiligoi@fnal.gov Abstract. The Grid

More information

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340 XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture

More information