14 March 2001 Mickey M. Shroff Object Oriented Protocol Product ion, Sem inar Presentation. Layers, Filters and Pipes / / Mickey M.
|
|
- Philip Riley
- 7 years ago
- Views:
Transcription
1 Layers, Pipes and Filters 14 March 2001 Mickey M. Shroff Object Oriented Protocol Product ion, Sem inar Presentation 1
2 Overview to Presentation What Kind of Patterns Layers, Pipes and Filters Are? The Layers Pattern The Pipes and Filters Pattern 2
3 W hat Kind of Patterns Layers, Pipes and Filters Are? Ball of Mud = problems + requirements + aspects... But we have not formed any organized structure, yet (workable slices) 3
4 W hat Kind of Patterns Layers, Pipes and Filters Are? Layers, pipes and filters are patterns to solve the problem of finding an organized structure 4
5 W hat Kind of Patterns Layers, Pipes and Filters Are? Layers, pipes and filters solve architectural problems Design patterns Idioms 5
6 The Layers Pattern Consept The Layer architectural pattern helps to structure applications that can be decom posed into groups of subtasks in which each group of subtasks is at a particular level of abstraction. [ POSA1] 6
7 The Layers Pattern ( Context ) A large system that requires decom posit ion System s division to groups has to be det erm ined. Result(division to groups) 7
8 The Layers Pattern ( Problem ) Forces When working in a team the work has to be divided in clear boundaries. Exchangeabilit y Com ponents can be changed to other ones without affecting the rest of the system. Any changes m ade to a com ponents functionality m ust not ripple other com ponents = > standard interfaces. 8
9 The Layers Pattern ( Forces continued) I f a com ponents becom es too com plex they can be fragm ented to subcom ponents. Highly related responsibilities/ tasks should be grouped t oget her. Com ponent boundaries m ay be broken if perform ance is im portant and the cost of crossing m any boundaries is high. 9
10 The Layers Pattern ( Solution ) Component 1 Component 2 Component 3 Layer n Layer n-1 Layer n-2 Layered system Different levels of abstraction Component 4 10
11 The Layers Pattern ( Structure ) Layer n Layer n-1 Layer n-1 provides services to the layer n. Layer n-1 uses the services of layer. n-2. Layer n-2 11
12 The Layers Pattern ( I m plem entation ) Define the abstraction criterion for grouping tasks into layers Determ ine the num ber of abstraction levels Nam e the layers and assign tasks to each of them Specify t he services 12
13 The Layers Pattern ( I m plem entation continued...) Refine t he layering iteration Specify an interface for each layer St ruct ure individual layers Specify the com m unication between adj acent layers Design an error-handling strategy 13
14 Benefits of Layers Pattern Reuse of layers Black- box reuse ( best choise) Support for st andardizat ion Not vendor dependent Dependencies are kept local changes to one layer does not ripple the whole system Exchangeabilit y layers can be changed (TCP < -> UDP) 14
15 Liabilities( draw backs) of Layers Pattern Lower efficiency / Unnecessary work checksum s error m essages How m any layers the application should have? OSI protocol stack 15
16 The Layers Pattern ( Exam ples) Web applicat ions View layer, business logic, dat abase Operation system s Protocol stacks TCP/ I P, OSI -m odel
17 The Layers Pattern Variants Relaxed Layered Syst em Services are not restricted to adjacent layers Layering Through inherit ance upper layers inherit s from lower layers 17
18 Pipes and Filters Pattern Consept The Pipes and Filters architectural pattern provides a structure for system s that process a stream of data. Each processing step is encapsulated in a filter com ponent. Data is passed through pipes between adj ancent filters. Recom bining filters allows you to build fam ilies of related system s. [ POSA1] 18
19 Pipes and Filters Pattern ( Context) Processing data stream s input Data processing output 19
20 Pipes and Filters Pattern ( Problem ) Data stream s can be processed in several step, each dependent from the previous but not from the other steps. Forces Processing st eps can be recom bined by the program m er by the user... 20
21 Pipes and Filters Pattern ( forces continued... ) Processing st eps can be added by the program m er by the user... Processing steps should be reusable in different cont ext s Sam e kind of input data can stream from various sources. The output data can be forwarded to different devices (disk, term inal...) 21
22 Pipes and Filters Pattern ( forces continued... ) Parallel processing of data stream s 22
23 Pipes and Filters Pattern ( Solution) Division to several sequential processing steps The outputs of one step are the inputs to others... 23
24 Pipes and Filters Pattern ( Structure ) Count L= L1*2 Then L Data is pushed or pulled (active or passive) Filter Pipe Count L = L1*2 After applying Pipes and Filters Count L +6
25 Pipes and Filters Pattern ( Structure ) Filt er gets input data stream processes the data outputs the processed data Pipe transfers data stream s buffers data stream s synchronizes data stream s 25
26 Pipes and Filters Pattern ( Structure ) Data Source Supplies data stream s to the first pipe. Data Sink Results of pipeline processing is gone here (the end of the last pipe) 26
27 Pipes and Filters Pattern ( I m plem entation ) Divide the system s task into sequence of processing st ages Define the data form at to be passed along each pipe Decide how to im plem ent each pipe connection Design and im plem ent the filters Design t he error handling set up t he processing pipeline 27
28 Benefits of Pipes and Filters Pattern Flexibilit y Reuse Prot ot yping Efficiency 28
29 Liabilities of Pipes and Filters Pattern State inform ation state inform ation between filters reduces the flexibility of the pattern Error handling 29
30 Pipes and Filters Pattern ( Exam ples) Unix -operator and > -operator 30
31 Pipes and Filters Pattern ( Variants) Tee and join pipeline system s m ultiple inputs and/ or outputs 31
32 This document was created with Win2PDF available at The unregistered version of Win2PDF is for evaluation or non-commercial use only.
Patterns in Software Engineering
Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 7 GoV Patterns Architectural Part 1 1 GoV Patterns for Software Architecture According to Buschmann et al.: A pattern for software architecture
More informationGuide to Intel Rapid Storage
Guide to Intel Rapid Storage Overview I ntel Rapid Storage Technology provides new levels of protection, perform ance, and expandability for desktop and m obile platform s. Whether using one or m ultiple
More informationArchitectural Patterns: From Mud to Structure
DCC / ICEx / UFMG Architectural Patterns: From Mud to Structure Eduardo Figueiredo http://www.dcc.ufmg.br/~figueiredo From Mud to Structure Layered Architecture It helps to structure applications that
More informationProject Plan. 1.0 Introduction. 2.0 Roles and Responsibilities. 3.0 Project Development Model
Project Plan 1.0 Introduction This docum ent seeks to outline the planning, resources, scheduling and approach that will be used throughout the development of the VisiNet project. 2.0 Roles and Responsibilities
More informationINTRODUCTION TO SOA GATEWAYS: BEST PRACTICES, BENEFITS & REQUIREMENTS
INTRODUCTION TO SOA GATEWAYS: BEST PRACTICES, BENEFITS & REQUIREMENTS Learn best practices and common deployment scenarios of SOA Gateways and why they are an essential component of a secure, robust and
More informationTEXAS BOARD OF NURSING 3.4.1.a. EDUCATION GUIDELINE Approval Process for a New Dean/Director/Coordinator, or New Interim Dean/Director/Coordinator
TEXAS BOARD OF NURSING 3.4.1.a. EDUCATION GUIDELINE Approval Process for a New Dean/Director/Coordinator, or New Interim Dean/Director/Coordinator Revised: 01/02/2013 Rule 214.6 sets forth the requirements
More informationLaw, Ka Yee (2009) CRM adoption and its impact on organisational performance. PhD thesis, University of Nottingham.
Law, Ka Yee (2009) CRM adoption and its impact on organisational performance. PhD thesis, University of Nottingham. Access from the University of Nottingham repository: http://eprints.nottingham.ac.uk/10787/6/5-chapter_1.pdf
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationSoftware Life-Cycle Management
Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema
More informationSim Now : Fast Platform Sim ulation Purely I n Software
Sim Now : Fast Platform Sim ulation Purely I n Software Robert Bedichek I ntroduction Sim ulators com e in m any flavors. Som e sim ulators are m icro - architectural sim ulators, and som e are instruction-
More informationTHE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI
More informationThe personal records database:
The personal records database: for the authorities and for you The Municipal Personal Records Database 2 The personal records database: for the authorities and for you The Municipal Personal Records Database
More informationH CU H am burg -Studienbew erbung- AdH O CH N agelsw eg 39 20097 H am burg G erm any O nly for non EU foreigners w ithout a G erm an university entrance qualification [Eingangsstem p el] Application Form
More information2 Web 2. 0 Technology
make dynamic client side ef fects, to server side script [ 10] technologies such as Java Servlet, ASP, PH P, t o Flash and XML ( Ext ensible M arkup Language) [ 11]. T he classic Web application model
More informationPattern. seconda parte. Types of patterns. ...other good guidance... some GRASP. design patterns (software design) Types of software patterns
rel. 1.7 Università di Padova Facoltà di Scienze MM.FF.NN Informatica - anno 2008-09 Corso di Ingegneria del Software Pattern seconda parte Renato Conte - Pattern II- 1/48 - Types of software patterns
More informationArchitectural Patterns. Layers: Pattern. Architectural Pattern Examples. Layer 3. Component 3.1. Layer 2. Component 2.1 Component 2.2.
Architectural Patterns Architectural Patterns Dr. James A. Bednar jbednar@inf.ed.ac.uk http://homepages.inf.ed.ac.uk/jbednar Dr. David Robertson dr@inf.ed.ac.uk http://www.inf.ed.ac.uk/ssp/members/dave.htm
More informationLinux Kernel Architecture
Linux Kernel Architecture Amir Hossein Payberah payberah@yahoo.com Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationNetwork Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
More informationThe EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
More informationNew Media. Challenges and Opportunities for a Public Service Broadcaster. Juha Vesaoja YLE 4.10.2005
New Media Challenges and Opportunities for a Public Service Broadcaster 4.1.25 Juha Vesaoja YLE Agenda YLE in Short YLE Service Portfolio (Digital television) Change of paradigm for broadcasters New m
More informationNetwork Models OSI vs. TCP/IP
Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both
More informationEMBEZZLEMENT IN A PROFESSIONAL PRACTICE
WOODY & ASSOCIATES, CPA s, PLLC GENERAL BUSINESS SERVICES 3205 NW 63 Street Oklahoma City, OK 73116 (405)840-8000 (866)840-1751 toll free (405)840-1756 fax www.woodycpas.com rd EMBEZZLEMENT IN A PROFESSIONAL
More informationi-pro M anagem ent Software ASC970 system Explanation of new functions for Ver. 8.0
i-pro M anagem ent Software ASC970 system Explanation of new functions for Ver. 8.0 Security System s B usiness D ivision Panasonic System N etw orks Co., Ltd. 2 ASE901 function (Option software for ASM
More informationScrum According to Rational Unified Process
P02 Scrum According to Rational Unified Process Christina Skaskiw Consultant, REAL Solutions christina.skaskiw@realsolutionsuk.com Why Consider Scrum? Phenom enal product ivit y User sat isfact ion Success
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationLiability Insurance for Public Agencies
Liability Insurance for Public Agencies C harles J. V an A rsdel President of the Insurance Institute of Indiana, Inc. Indianapolis, Indiana IN T R O D U C T IO N In this paper I will show w hat has brought
More informationChapter 13 BUILDING INFORMATION SYSTEMS. How does building new systems produce organizational change?
MANAGING THE DIGITAL FIRM, 12 TH EDITION Learning Objectives Chapter 13 BUILDING INFORMATION SYSTEMS VIDEO CASES Case 1: IBM: Business Process Management in a Service Oriented Architecture and Managing
More informationCRI TI QUE OF THE CONTEMPORARY LI TERATURE I N THE SCI ENTI FI C STUDY OF RELI GI ON By Ana Maria Rizzuto, M.D.
CRI TI QUE OF THE CONTEMPORARY LI TERATURE I N THE SCI ENTI FI C STUDY OF RELI GI ON By Ana Maria Rizzuto, M.D. Presented at the Annual Meeting of the Society for the Scientific Study of Religion The occasion
More informationSoftware Engineering
Software Engineering Lecture 06: Design an Overview Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 35 The Design Phase Programming in
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationProduct Line Development - Seite 8/42 Strategy
Controlling Software Product Line Evolution An infrastructure on top of configuration management Michalis Anastasopoulos michalis.anastasopoulos@iese.fraunhofer.de Outline Foundations Problem Statement
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationModule 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
More informationMy Progress My Certificates (9) Search!
My Account (Logout) My Groups Find Courses Store COURSES MANAGE PUBLISH Search! My Progress My Certificates (9) My Tests Help My Account Yann GEFFROTIN Log Out Subjects Forum Contact Media Your TFS turns
More information7 A MANAGEMENT MODEL STUDY
7.1 Aim s and Objectives of the Management Model Study Positive Solutions is part of the consultant team and is w orking on the governance and m anagem ent model to ensure appropriate operating arrangements
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationMaureen A. Madden RN MSN PCCNP FCCM Pediatric Critical Care Nurse Practitioner Bristol- Myers Squibb Children s s Hospital Assistant Professor of
Maureen A. Madden RN MSN PCCNP FCCM Pediatric Critical Care Nurse Practitioner Bristol- Myers Squibb Children s s Hospital Assistant Professor of Pediatrics UMDNJ- Robert Wood Johnson Medical School New
More informationNCLEX-PN Pass Rate. 2009 Initial 100% 8/8
PROPOSED CHANGE OF PROGRAM APPROVAL STATUS BASED ON THE 2009 NCLEX-PN EXAM INATION PASS RATE AND REPORT OF SURVEY VISIT CAREER POINT COLLEGE IN SAN ANTONIO, TEXAS VOCATIONAL NURSING EDUCATIONAL PROGRAM
More informationDisable SSL for Digipass Plug- I n for I AS access to Active Directory. Creation date: 26/ 06/ 2006 Last Review: 26/ 06/ 06 Revision num ber: 1
Disable SSL for Digipass Plug- I n for I AS access to Active Directory Creation date: 26/ 06/ 2006 Last Review: 26/ 06/ 06 Revision num ber: 1 Docum ent type: How To Security status: EXTERNAL Sum m ary
More informationOSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture
OSI Model 7 6 5 4 3 2 1 Application Presentation Session Transport Network Data Link Physical Protocols Define a set of rules for communication. Specify the meaning and format of messages Define exchange
More informationIntroduction to Embedded Systems. Software Update Problem
Introduction to Embedded Systems CS/ECE 6780/5780 Al Davis logistics minor Today s topics: more software development issues 1 CS 5780 Software Update Problem Lab machines work let us know if they don t
More informationAdvanced Analysis and Design
Advanced Analysis and Design Architectural Styles Professor David S. Rosenblum Department of Computer Science http://www.cs.ucl.ac.uk/staff/d.rosenblum/ Architectural Styles A set of design rules that
More informationNetwork File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr
Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationIBM Solution Design Method
Solution Design Method IBM Solution Design Method Introduction IBM Solution Design Method Introduction: o Objectives o Introduction o Unified Method Architecture 2 Goals and Objectives Goals: Disciplined
More informationMember Profile. Deposit Insurance Agency (Russia)
SHARING DEPOSIT INSURANCE EXPERTISE WITH THE WORLD Member Profile Deposit Insurance Agency (Russia) The deposit insurance system of the Russian Federation was established on 27 Decem ber 2003, based on
More informationOverview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationJava Security Concepts Within I nsecure Networks
Diplom a Thesis Java Security Concepts Within I nsecure Networks I n the case of the SASI I project Author: Jürgen Leitner Markt 328 3184 Türnitz Examiner: Prof. Mag. Otto Reichel Period: September 2001
More informationLimi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming
Socket Programming Limi Kalita M.Tech Student, Department of Computer Science and Engineering, Assam Down Town University, Guwahati, India. Abstract: The aim of the paper is to introduce sockets, its deployment
More informationNetwork Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
More informationAccess Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
More informationOverview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationI f you have any feedback please forward any com m ents to: investigative.interviewing.unit@police.govt.nz. Page 1 of 61
I nvestigative interview ing w itness guide Acknow ledgem ent Much of this docum ent is based on m aterials from National Policing I m provem ent Agency (NPI A) in the United Kingdom. The I nvestigative
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
More informationProposal to Establish A New Nursing Education Program South University in Austin, Texas Baccalaureate Degree Nursing Education Program
Proposal to Establish A New Nursing Education Program South University in Austin, Texas Baccalaureate Degree Nursing Education Program Agenda Item: 3.2.6.c. Prepared by: J. Hooper Board m eeting: July
More informationProtocol Architecture
Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between
More informationExokernel : An Operating System Architecture for Application-Level Resource Management. Joong Won Roh
Exokernel : An Operating System Architecture for Application-Level Resource Management Joong Won Roh Goal of Exokernel The goal of an exokernel is to give efficient control of resources to untrusted applications
More informationNumber of First Time Candidates (Passed/Total) 2011 83.08% 54/65 Full with W arning January 2012. 2010 78.95% 75/95 Conditional April 2011
Agenda Item: 3.2.8.b. Prepared by: J. Hooper Board Meeting: April 2013 Consideration for Change in Approval Status from Full with Warning to Full Valley Grande Institute in Weslaco, Texas Vocational Nursing
More informationThe TCP/IP Reference Model
The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was
More informationThe OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
More informationDelivering on-time and onbudgeterp
Delivering on-time and onbudgeterp Implem entations Presented by: JenniferMcNeill,President CedarEnterprise Solutions 200,279 Midpark Way SE Calgary,Alberta,C anada T2X 1M 2 Ph:403 256 8877 Fax:403 256
More informationIn: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal
Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto lft@inescporto.pt Luís Teixeira INESC Porto, Universidade Católica Portuguesa lmt@inescporto.pt Luís Corte-Real
More informationJADAVPUR UNIVERSITY KOLKATA 700032
JADAVPUR UNIVERSITY KOLKATA 700032 INFORM ATION BROCHURE FOR POST-GRADUATE PROGRAMMES UNDER FACULTY COUNCIL OF ENGINEERING & TECHNOLOGY FOR THE SESSION 2015-16 INSTRUCTIONS FOR FILLING-UP THE APPLICATION
More information19 A pril2011 European Com m ission Consultation on Collective Redress A venue de Bourget 1-3 B-1140 Brussels (Evere) Belgium EC-collective-redress@ ec.europa.eu Consultation Paper on Collective Red ress:tow
More informationLayers. Example. Application. Presentation. Session. Transport. Network. Data Link. Physical. Provides miscellaneous protocols for common activities
31 Layers The Layers architectural pattern helps to structure applications that can be decomposed into groups of subtasks in which each group of subtasks is at a particular level of abstraction. Example
More informationGlobal Market Trends. Ram Mynampati Satyam Computer Services
Global Market Trends Ram Mynampati Satyam Computer Services Macro Trends Shaping Our Business Landscape Declining dom inance of W est as econom ic power Growth beyond BRIC em erging Asia, LATAM, NEW Africa
More informationOPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS
OSI OPEN SYSTEMS OSI - Open Systems Interconnection INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS Peter R. Egli INDIGOO.COM 1/8 Contents 1. Layering model 2. The 7 layers
More informationHexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture
White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web
More informationChapter 10 Case Study 1: LINUX
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 10 Case Study 1: LINUX History of UNIX and Linux UNICS PDP-11 UNIX Portable UNIX Berkeley UNIX Standard UNIX MINIX Linux UNIX/Linux Goals
More informationSOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
More informationInternational Journal of Advancements in Research & Technology, Volume 3, Issue 2, February-2014 10 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 2, February-2014 10 A Discussion on Testing Hadoop Applications Sevuga Perumal Chidambaram ABSTRACT The purpose of analysing
More informationReport of Follow-Up Survey Visit Wayland Baptist University in San Antonio, Texas Baccalaureate Degree Nursing Education Program
Agenda Item: 3.2.14. Prepared by: J. Hooper; S. Emerson Board Meeting: April 2013 Report of Follow-Up Survey Visit Wayland Baptist University in San Antonio, Texas Baccalaureate Degree Nursing Education
More informationArchitecture Design & Sequence Diagram. Week 7
Architecture Design & Sequence Diagram Week 7 Announcement Reminder Midterm I: 1:00 1:50 pm Wednesday 23 rd March Ch. 1, 2, 3 and 26.5 Hour 1, 6, 7 and 19 (pp.331 335) Multiple choice Agenda (Lecture)
More informationLecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage
Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More informationStream Processing on GPUs Using Distributed Multimedia Middleware
Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research
More informationInformation Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340
XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture
More informationRUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch
RUP Design RUP Artifacts and Deliverables RUP Purpose of Analysis & Design To transform the requirements into a design of the system to-be. To evolve a robust architecture for the system. To adapt the
More informationHigh-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
More informationComponent-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3
Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3 1 Mälardalen University, Västerås, Sweden, ivica.crnkovic@mdh.se 2 ABB Corporate Research,
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationThe Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys
More information2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More informationLayered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
More informationChapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
More informationArchitectural patterns
Open Learning Universiteit Unit 3 Learning Unit 3 Architectural patterns Contents Introduction............................................... 35 3.1 Patterns..............................................
More informationAdding Indirection Enhances Functionality
Adding Indirection Enhances Functionality The Story Of A Proxy Mark Riddoch & Massimiliano Pinto Introductions Mark Riddoch Staff Engineer, VMware Formally Chief Architect, MariaDB Corporation Massimiliano
More informationSoftware Defined Active Queue Management
Software Defined Active Queue Management Future Networks 2014 Sebastian Meier sebastian.meier@ikr.uni-stuttgart.de 2014-09-26 Universität Stuttgart Institute of Communication Networks and Computer Engineering
More informationStrategies. Addressing and Routing
Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationChapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
More informationEncrypting Informix Connections with SSL Prot ocol. Yunming Wang IBM
Encrypting Informix Connections with SSL Prot ocol Yunming Wang IBM 1 Agenda Introduction to SSL and IBM GSKit Configuring Informix Server for SSL Configuring HA Cluster connections for SSL Configuring
More informationAbstractions from Multimedia Hardware. Libraries. Abstraction Levels
Abstractions from Multimedia Hardware Chapter 2: Basics Chapter 3: Multimedia Systems Communication Aspects and Services Chapter 4: Multimedia Systems Storage Aspects Chapter 5: Multimedia Usage and Applications
More informationImproving your Data Warehouse s IQ
Improving your Data Warehouse s IQ Derek Strauss Gavroshe USA, Inc. Outline Data quality for second generation data warehouses DQ tool functionality categories and the data quality process Data model types
More informationThe OSI & Internet layering models
CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end
More informationHandy. A Parallel File System with High Availability & Dynamic Scalability. Bin Cheng Advisor: Dr. Hai Jin Ke Shi Cluster & Grid Computing Lab of HUST
Handy A Parallel File System with High Availability & Dynamic Scalability Bin Cheng Advisor: Dr. Hai Jin Ke Shi Cluster & Grid Computing Lab of HUST Outline Cluster and Grid Computing Lab 2 Background
More informationScalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
More information