14 March 2001 Mickey M. Shroff Object Oriented Protocol Product ion, Sem inar Presentation. Layers, Filters and Pipes / / Mickey M.

Size: px
Start display at page:

Download "14 March 2001 Mickey M. Shroff Object Oriented Protocol Product ion, Sem inar Presentation. Layers, Filters and Pipes / / Mickey M."

Transcription

1 Layers, Pipes and Filters 14 March 2001 Mickey M. Shroff Object Oriented Protocol Product ion, Sem inar Presentation 1

2 Overview to Presentation What Kind of Patterns Layers, Pipes and Filters Are? The Layers Pattern The Pipes and Filters Pattern 2

3 W hat Kind of Patterns Layers, Pipes and Filters Are? Ball of Mud = problems + requirements + aspects... But we have not formed any organized structure, yet (workable slices) 3

4 W hat Kind of Patterns Layers, Pipes and Filters Are? Layers, pipes and filters are patterns to solve the problem of finding an organized structure 4

5 W hat Kind of Patterns Layers, Pipes and Filters Are? Layers, pipes and filters solve architectural problems Design patterns Idioms 5

6 The Layers Pattern Consept The Layer architectural pattern helps to structure applications that can be decom posed into groups of subtasks in which each group of subtasks is at a particular level of abstraction. [ POSA1] 6

7 The Layers Pattern ( Context ) A large system that requires decom posit ion System s division to groups has to be det erm ined. Result(division to groups) 7

8 The Layers Pattern ( Problem ) Forces When working in a team the work has to be divided in clear boundaries. Exchangeabilit y Com ponents can be changed to other ones without affecting the rest of the system. Any changes m ade to a com ponents functionality m ust not ripple other com ponents = > standard interfaces. 8

9 The Layers Pattern ( Forces continued) I f a com ponents becom es too com plex they can be fragm ented to subcom ponents. Highly related responsibilities/ tasks should be grouped t oget her. Com ponent boundaries m ay be broken if perform ance is im portant and the cost of crossing m any boundaries is high. 9

10 The Layers Pattern ( Solution ) Component 1 Component 2 Component 3 Layer n Layer n-1 Layer n-2 Layered system Different levels of abstraction Component 4 10

11 The Layers Pattern ( Structure ) Layer n Layer n-1 Layer n-1 provides services to the layer n. Layer n-1 uses the services of layer. n-2. Layer n-2 11

12 The Layers Pattern ( I m plem entation ) Define the abstraction criterion for grouping tasks into layers Determ ine the num ber of abstraction levels Nam e the layers and assign tasks to each of them Specify t he services 12

13 The Layers Pattern ( I m plem entation continued...) Refine t he layering iteration Specify an interface for each layer St ruct ure individual layers Specify the com m unication between adj acent layers Design an error-handling strategy 13

14 Benefits of Layers Pattern Reuse of layers Black- box reuse ( best choise) Support for st andardizat ion Not vendor dependent Dependencies are kept local changes to one layer does not ripple the whole system Exchangeabilit y layers can be changed (TCP < -> UDP) 14

15 Liabilities( draw backs) of Layers Pattern Lower efficiency / Unnecessary work checksum s error m essages How m any layers the application should have? OSI protocol stack 15

16 The Layers Pattern ( Exam ples) Web applicat ions View layer, business logic, dat abase Operation system s Protocol stacks TCP/ I P, OSI -m odel

17 The Layers Pattern Variants Relaxed Layered Syst em Services are not restricted to adjacent layers Layering Through inherit ance upper layers inherit s from lower layers 17

18 Pipes and Filters Pattern Consept The Pipes and Filters architectural pattern provides a structure for system s that process a stream of data. Each processing step is encapsulated in a filter com ponent. Data is passed through pipes between adj ancent filters. Recom bining filters allows you to build fam ilies of related system s. [ POSA1] 18

19 Pipes and Filters Pattern ( Context) Processing data stream s input Data processing output 19

20 Pipes and Filters Pattern ( Problem ) Data stream s can be processed in several step, each dependent from the previous but not from the other steps. Forces Processing st eps can be recom bined by the program m er by the user... 20

21 Pipes and Filters Pattern ( forces continued... ) Processing st eps can be added by the program m er by the user... Processing steps should be reusable in different cont ext s Sam e kind of input data can stream from various sources. The output data can be forwarded to different devices (disk, term inal...) 21

22 Pipes and Filters Pattern ( forces continued... ) Parallel processing of data stream s 22

23 Pipes and Filters Pattern ( Solution) Division to several sequential processing steps The outputs of one step are the inputs to others... 23

24 Pipes and Filters Pattern ( Structure ) Count L= L1*2 Then L Data is pushed or pulled (active or passive) Filter Pipe Count L = L1*2 After applying Pipes and Filters Count L +6

25 Pipes and Filters Pattern ( Structure ) Filt er gets input data stream processes the data outputs the processed data Pipe transfers data stream s buffers data stream s synchronizes data stream s 25

26 Pipes and Filters Pattern ( Structure ) Data Source Supplies data stream s to the first pipe. Data Sink Results of pipeline processing is gone here (the end of the last pipe) 26

27 Pipes and Filters Pattern ( I m plem entation ) Divide the system s task into sequence of processing st ages Define the data form at to be passed along each pipe Decide how to im plem ent each pipe connection Design and im plem ent the filters Design t he error handling set up t he processing pipeline 27

28 Benefits of Pipes and Filters Pattern Flexibilit y Reuse Prot ot yping Efficiency 28

29 Liabilities of Pipes and Filters Pattern State inform ation state inform ation between filters reduces the flexibility of the pattern Error handling 29

30 Pipes and Filters Pattern ( Exam ples) Unix -operator and > -operator 30

31 Pipes and Filters Pattern ( Variants) Tee and join pipeline system s m ultiple inputs and/ or outputs 31

32 This document was created with Win2PDF available at The unregistered version of Win2PDF is for evaluation or non-commercial use only.

Patterns in Software Engineering

Patterns in Software Engineering Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 7 GoV Patterns Architectural Part 1 1 GoV Patterns for Software Architecture According to Buschmann et al.: A pattern for software architecture

More information

Guide to Intel Rapid Storage

Guide to Intel Rapid Storage Guide to Intel Rapid Storage Overview I ntel Rapid Storage Technology provides new levels of protection, perform ance, and expandability for desktop and m obile platform s. Whether using one or m ultiple

More information

Architectural Patterns: From Mud to Structure

Architectural Patterns: From Mud to Structure DCC / ICEx / UFMG Architectural Patterns: From Mud to Structure Eduardo Figueiredo http://www.dcc.ufmg.br/~figueiredo From Mud to Structure Layered Architecture It helps to structure applications that

More information

Project Plan. 1.0 Introduction. 2.0 Roles and Responsibilities. 3.0 Project Development Model

Project Plan. 1.0 Introduction. 2.0 Roles and Responsibilities. 3.0 Project Development Model Project Plan 1.0 Introduction This docum ent seeks to outline the planning, resources, scheduling and approach that will be used throughout the development of the VisiNet project. 2.0 Roles and Responsibilities

More information

INTRODUCTION TO SOA GATEWAYS: BEST PRACTICES, BENEFITS & REQUIREMENTS

INTRODUCTION TO SOA GATEWAYS: BEST PRACTICES, BENEFITS & REQUIREMENTS INTRODUCTION TO SOA GATEWAYS: BEST PRACTICES, BENEFITS & REQUIREMENTS Learn best practices and common deployment scenarios of SOA Gateways and why they are an essential component of a secure, robust and

More information

TEXAS BOARD OF NURSING 3.4.1.a. EDUCATION GUIDELINE Approval Process for a New Dean/Director/Coordinator, or New Interim Dean/Director/Coordinator

TEXAS BOARD OF NURSING 3.4.1.a. EDUCATION GUIDELINE Approval Process for a New Dean/Director/Coordinator, or New Interim Dean/Director/Coordinator TEXAS BOARD OF NURSING 3.4.1.a. EDUCATION GUIDELINE Approval Process for a New Dean/Director/Coordinator, or New Interim Dean/Director/Coordinator Revised: 01/02/2013 Rule 214.6 sets forth the requirements

More information

Law, Ka Yee (2009) CRM adoption and its impact on organisational performance. PhD thesis, University of Nottingham.

Law, Ka Yee (2009) CRM adoption and its impact on organisational performance. PhD thesis, University of Nottingham. Law, Ka Yee (2009) CRM adoption and its impact on organisational performance. PhD thesis, University of Nottingham. Access from the University of Nottingham repository: http://eprints.nottingham.ac.uk/10787/6/5-chapter_1.pdf

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Software Life-Cycle Management

Software Life-Cycle Management Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema

More information

Sim Now : Fast Platform Sim ulation Purely I n Software

Sim Now : Fast Platform Sim ulation Purely I n Software Sim Now : Fast Platform Sim ulation Purely I n Software Robert Bedichek I ntroduction Sim ulators com e in m any flavors. Som e sim ulators are m icro - architectural sim ulators, and som e are instruction-

More information

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI

More information

The personal records database:

The personal records database: The personal records database: for the authorities and for you The Municipal Personal Records Database 2 The personal records database: for the authorities and for you The Municipal Personal Records Database

More information

H CU H am burg -Studienbew erbung- AdH O CH N agelsw eg 39 20097 H am burg G erm any O nly for non EU foreigners w ithout a G erm an university entrance qualification [Eingangsstem p el] Application Form

More information

2 Web 2. 0 Technology

2 Web 2. 0 Technology make dynamic client side ef fects, to server side script [ 10] technologies such as Java Servlet, ASP, PH P, t o Flash and XML ( Ext ensible M arkup Language) [ 11]. T he classic Web application model

More information

Pattern. seconda parte. Types of patterns. ...other good guidance... some GRASP. design patterns (software design) Types of software patterns

Pattern. seconda parte. Types of patterns. ...other good guidance... some GRASP. design patterns (software design) Types of software patterns rel. 1.7 Università di Padova Facoltà di Scienze MM.FF.NN Informatica - anno 2008-09 Corso di Ingegneria del Software Pattern seconda parte Renato Conte - Pattern II- 1/48 - Types of software patterns

More information

Architectural Patterns. Layers: Pattern. Architectural Pattern Examples. Layer 3. Component 3.1. Layer 2. Component 2.1 Component 2.2.

Architectural Patterns. Layers: Pattern. Architectural Pattern Examples. Layer 3. Component 3.1. Layer 2. Component 2.1 Component 2.2. Architectural Patterns Architectural Patterns Dr. James A. Bednar jbednar@inf.ed.ac.uk http://homepages.inf.ed.ac.uk/jbednar Dr. David Robertson dr@inf.ed.ac.uk http://www.inf.ed.ac.uk/ssp/members/dave.htm

More information

Linux Kernel Architecture

Linux Kernel Architecture Linux Kernel Architecture Amir Hossein Payberah payberah@yahoo.com Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Network Programming TDC 561

Network Programming TDC 561 Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

New Media. Challenges and Opportunities for a Public Service Broadcaster. Juha Vesaoja YLE 4.10.2005

New Media. Challenges and Opportunities for a Public Service Broadcaster. Juha Vesaoja YLE 4.10.2005 New Media Challenges and Opportunities for a Public Service Broadcaster 4.1.25 Juha Vesaoja YLE Agenda YLE in Short YLE Service Portfolio (Digital television) Change of paradigm for broadcasters New m

More information

Network Models OSI vs. TCP/IP

Network Models OSI vs. TCP/IP Network Models OSI vs. TCP/IP Network Models Using a formal model allows us to deal with various aspects of Networks abstractly. We will look at two popular models OSI reference model TCP/IP model Both

More information

EMBEZZLEMENT IN A PROFESSIONAL PRACTICE

EMBEZZLEMENT IN A PROFESSIONAL PRACTICE WOODY & ASSOCIATES, CPA s, PLLC GENERAL BUSINESS SERVICES 3205 NW 63 Street Oklahoma City, OK 73116 (405)840-8000 (866)840-1751 toll free (405)840-1756 fax www.woodycpas.com rd EMBEZZLEMENT IN A PROFESSIONAL

More information

i-pro M anagem ent Software ASC970 system Explanation of new functions for Ver. 8.0

i-pro M anagem ent Software ASC970 system Explanation of new functions for Ver. 8.0 i-pro M anagem ent Software ASC970 system Explanation of new functions for Ver. 8.0 Security System s B usiness D ivision Panasonic System N etw orks Co., Ltd. 2 ASE901 function (Option software for ASM

More information

Scrum According to Rational Unified Process

Scrum According to Rational Unified Process P02 Scrum According to Rational Unified Process Christina Skaskiw Consultant, REAL Solutions christina.skaskiw@realsolutionsuk.com Why Consider Scrum? Phenom enal product ivit y User sat isfact ion Success

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Liability Insurance for Public Agencies

Liability Insurance for Public Agencies Liability Insurance for Public Agencies C harles J. V an A rsdel President of the Insurance Institute of Indiana, Inc. Indianapolis, Indiana IN T R O D U C T IO N In this paper I will show w hat has brought

More information

Chapter 13 BUILDING INFORMATION SYSTEMS. How does building new systems produce organizational change?

Chapter 13 BUILDING INFORMATION SYSTEMS. How does building new systems produce organizational change? MANAGING THE DIGITAL FIRM, 12 TH EDITION Learning Objectives Chapter 13 BUILDING INFORMATION SYSTEMS VIDEO CASES Case 1: IBM: Business Process Management in a Service Oriented Architecture and Managing

More information

CRI TI QUE OF THE CONTEMPORARY LI TERATURE I N THE SCI ENTI FI C STUDY OF RELI GI ON By Ana Maria Rizzuto, M.D.

CRI TI QUE OF THE CONTEMPORARY LI TERATURE I N THE SCI ENTI FI C STUDY OF RELI GI ON By Ana Maria Rizzuto, M.D. CRI TI QUE OF THE CONTEMPORARY LI TERATURE I N THE SCI ENTI FI C STUDY OF RELI GI ON By Ana Maria Rizzuto, M.D. Presented at the Annual Meeting of the Society for the Scientific Study of Religion The occasion

More information

Software Engineering

Software Engineering Software Engineering Lecture 06: Design an Overview Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 35 The Design Phase Programming in

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

Product Line Development - Seite 8/42 Strategy

Product Line Development - Seite 8/42 Strategy Controlling Software Product Line Evolution An infrastructure on top of configuration management Michalis Anastasopoulos michalis.anastasopoulos@iese.fraunhofer.de Outline Foundations Problem Statement

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1. Introduction. Version 2 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

More information

My Progress My Certificates (9) Search!

My Progress My Certificates (9) Search! My Account (Logout) My Groups Find Courses Store COURSES MANAGE PUBLISH Search! My Progress My Certificates (9) My Tests Help My Account Yann GEFFROTIN Log Out Subjects Forum Contact Media Your TFS turns

More information

7 A MANAGEMENT MODEL STUDY

7 A MANAGEMENT MODEL STUDY 7.1 Aim s and Objectives of the Management Model Study Positive Solutions is part of the consultant team and is w orking on the governance and m anagem ent model to ensure appropriate operating arrangements

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Maureen A. Madden RN MSN PCCNP FCCM Pediatric Critical Care Nurse Practitioner Bristol- Myers Squibb Children s s Hospital Assistant Professor of

Maureen A. Madden RN MSN PCCNP FCCM Pediatric Critical Care Nurse Practitioner Bristol- Myers Squibb Children s s Hospital Assistant Professor of Maureen A. Madden RN MSN PCCNP FCCM Pediatric Critical Care Nurse Practitioner Bristol- Myers Squibb Children s s Hospital Assistant Professor of Pediatrics UMDNJ- Robert Wood Johnson Medical School New

More information

NCLEX-PN Pass Rate. 2009 Initial 100% 8/8

NCLEX-PN Pass Rate. 2009 Initial 100% 8/8 PROPOSED CHANGE OF PROGRAM APPROVAL STATUS BASED ON THE 2009 NCLEX-PN EXAM INATION PASS RATE AND REPORT OF SURVEY VISIT CAREER POINT COLLEGE IN SAN ANTONIO, TEXAS VOCATIONAL NURSING EDUCATIONAL PROGRAM

More information

Disable SSL for Digipass Plug- I n for I AS access to Active Directory. Creation date: 26/ 06/ 2006 Last Review: 26/ 06/ 06 Revision num ber: 1

Disable SSL for Digipass Plug- I n for I AS access to Active Directory. Creation date: 26/ 06/ 2006 Last Review: 26/ 06/ 06 Revision num ber: 1 Disable SSL for Digipass Plug- I n for I AS access to Active Directory Creation date: 26/ 06/ 2006 Last Review: 26/ 06/ 06 Revision num ber: 1 Docum ent type: How To Security status: EXTERNAL Sum m ary

More information

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture

OSI Model. Application Presentation Session Transport Network Data Link Physical. EE156 Computer Network Architecture OSI Model 7 6 5 4 3 2 1 Application Presentation Session Transport Network Data Link Physical Protocols Define a set of rules for communication. Specify the meaning and format of messages Define exchange

More information

Introduction to Embedded Systems. Software Update Problem

Introduction to Embedded Systems. Software Update Problem Introduction to Embedded Systems CS/ECE 6780/5780 Al Davis logistics minor Today s topics: more software development issues 1 CS 5780 Software Update Problem Lab machines work let us know if they don t

More information

Advanced Analysis and Design

Advanced Analysis and Design Advanced Analysis and Design Architectural Styles Professor David S. Rosenblum Department of Computer Science http://www.cs.ucl.ac.uk/staff/d.rosenblum/ Architectural Styles A set of design rules that

More information

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

IBM Solution Design Method

IBM Solution Design Method Solution Design Method IBM Solution Design Method Introduction IBM Solution Design Method Introduction: o Objectives o Introduction o Unified Method Architecture 2 Goals and Objectives Goals: Disciplined

More information

Member Profile. Deposit Insurance Agency (Russia)

Member Profile. Deposit Insurance Agency (Russia) SHARING DEPOSIT INSURANCE EXPERTISE WITH THE WORLD Member Profile Deposit Insurance Agency (Russia) The deposit insurance system of the Russian Federation was established on 27 Decem ber 2003, based on

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Java Security Concepts Within I nsecure Networks

Java Security Concepts Within I nsecure Networks Diplom a Thesis Java Security Concepts Within I nsecure Networks I n the case of the SASI I project Author: Jürgen Leitner Markt 328 3184 Türnitz Examiner: Prof. Mag. Otto Reichel Period: September 2001

More information

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming

Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming Socket Programming Limi Kalita M.Tech Student, Department of Computer Science and Engineering, Assam Down Town University, Guwahati, India. Abstract: The aim of the paper is to introduce sockets, its deployment

More information

Network Intrusion Detection Systems. Beyond packet filtering

Network Intrusion Detection Systems. Beyond packet filtering Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic

More information

Access Control: Firewalls (1)

Access Control: Firewalls (1) Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

I f you have any feedback please forward any com m ents to: investigative.interviewing.unit@police.govt.nz. Page 1 of 61

I f you have any feedback please forward any com m ents to: investigative.interviewing.unit@police.govt.nz. Page 1 of 61 I nvestigative interview ing w itness guide Acknow ledgem ent Much of this docum ent is based on m aterials from National Policing I m provem ent Agency (NPI A) in the United Kingdom. The I nvestigative

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe

More information

Proposal to Establish A New Nursing Education Program South University in Austin, Texas Baccalaureate Degree Nursing Education Program

Proposal to Establish A New Nursing Education Program South University in Austin, Texas Baccalaureate Degree Nursing Education Program Proposal to Establish A New Nursing Education Program South University in Austin, Texas Baccalaureate Degree Nursing Education Program Agenda Item: 3.2.6.c. Prepared by: J. Hooper Board m eeting: July

More information

Protocol Architecture

Protocol Architecture Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between

More information

Exokernel : An Operating System Architecture for Application-Level Resource Management. Joong Won Roh

Exokernel : An Operating System Architecture for Application-Level Resource Management. Joong Won Roh Exokernel : An Operating System Architecture for Application-Level Resource Management Joong Won Roh Goal of Exokernel The goal of an exokernel is to give efficient control of resources to untrusted applications

More information

Number of First Time Candidates (Passed/Total) 2011 83.08% 54/65 Full with W arning January 2012. 2010 78.95% 75/95 Conditional April 2011

Number of First Time Candidates (Passed/Total) 2011 83.08% 54/65 Full with W arning January 2012. 2010 78.95% 75/95 Conditional April 2011 Agenda Item: 3.2.8.b. Prepared by: J. Hooper Board Meeting: April 2013 Consideration for Change in Approval Status from Full with Warning to Full Valley Grande Institute in Weslaco, Texas Vocational Nursing

More information

The TCP/IP Reference Model

The TCP/IP Reference Model The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

Delivering on-time and onbudgeterp

Delivering on-time and onbudgeterp Delivering on-time and onbudgeterp Implem entations Presented by: JenniferMcNeill,President CedarEnterprise Solutions 200,279 Midpark Way SE Calgary,Alberta,C anada T2X 1M 2 Ph:403 256 8877 Fax:403 256

More information

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto lft@inescporto.pt Luís Teixeira INESC Porto, Universidade Católica Portuguesa lmt@inescporto.pt Luís Corte-Real

More information

JADAVPUR UNIVERSITY KOLKATA 700032

JADAVPUR UNIVERSITY KOLKATA 700032 JADAVPUR UNIVERSITY KOLKATA 700032 INFORM ATION BROCHURE FOR POST-GRADUATE PROGRAMMES UNDER FACULTY COUNCIL OF ENGINEERING & TECHNOLOGY FOR THE SESSION 2015-16 INSTRUCTIONS FOR FILLING-UP THE APPLICATION

More information

19 A pril2011 European Com m ission Consultation on Collective Redress A venue de Bourget 1-3 B-1140 Brussels (Evere) Belgium EC-collective-redress@ ec.europa.eu Consultation Paper on Collective Red ress:tow

More information

Layers. Example. Application. Presentation. Session. Transport. Network. Data Link. Physical. Provides miscellaneous protocols for common activities

Layers. Example. Application. Presentation. Session. Transport. Network. Data Link. Physical. Provides miscellaneous protocols for common activities 31 Layers The Layers architectural pattern helps to structure applications that can be decomposed into groups of subtasks in which each group of subtasks is at a particular level of abstraction. Example

More information

Global Market Trends. Ram Mynampati Satyam Computer Services

Global Market Trends. Ram Mynampati Satyam Computer Services Global Market Trends Ram Mynampati Satyam Computer Services Macro Trends Shaping Our Business Landscape Declining dom inance of W est as econom ic power Growth beyond BRIC em erging Asia, LATAM, NEW Africa

More information

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS OSI OPEN SYSTEMS OSI - Open Systems Interconnection INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS Peter R. Egli INDIGOO.COM 1/8 Contents 1. Layering model 2. The 7 layers

More information

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web

More information

Chapter 10 Case Study 1: LINUX

Chapter 10 Case Study 1: LINUX MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 10 Case Study 1: LINUX History of UNIX and Linux UNICS PDP-11 UNIX Portable UNIX Berkeley UNIX Standard UNIX MINIX Linux UNIX/Linux Goals

More information

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 2, February-2014 10 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 2, February-2014 10 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 2, February-2014 10 A Discussion on Testing Hadoop Applications Sevuga Perumal Chidambaram ABSTRACT The purpose of analysing

More information

Report of Follow-Up Survey Visit Wayland Baptist University in San Antonio, Texas Baccalaureate Degree Nursing Education Program

Report of Follow-Up Survey Visit Wayland Baptist University in San Antonio, Texas Baccalaureate Degree Nursing Education Program Agenda Item: 3.2.14. Prepared by: J. Hooper; S. Emerson Board Meeting: April 2013 Report of Follow-Up Survey Visit Wayland Baptist University in San Antonio, Texas Baccalaureate Degree Nursing Education

More information

Architecture Design & Sequence Diagram. Week 7

Architecture Design & Sequence Diagram. Week 7 Architecture Design & Sequence Diagram Week 7 Announcement Reminder Midterm I: 1:00 1:50 pm Wednesday 23 rd March Ch. 1, 2, 3 and 26.5 Hour 1, 6, 7 and 19 (pp.331 335) Multiple choice Agenda (Lecture)

More information

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Stream Processing on GPUs Using Distributed Multimedia Middleware

Stream Processing on GPUs Using Distributed Multimedia Middleware Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research

More information

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340

Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340 XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture

More information

RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch

RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch RUP Design RUP Artifacts and Deliverables RUP Purpose of Analysis & Design To transform the requirements into a design of the system to-be. To evolve a robust architecture for the system. To adapt the

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3

Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3 Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3 1 Mälardalen University, Västerås, Sweden, ivica.crnkovic@mdh.se 2 ABB Corporate Research,

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

The Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys

More information

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce 2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Layered Architectures and Applications

Layered Architectures and Applications 1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and

More information

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci. Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

More information

Architectural patterns

Architectural patterns Open Learning Universiteit Unit 3 Learning Unit 3 Architectural patterns Contents Introduction............................................... 35 3.1 Patterns..............................................

More information

Adding Indirection Enhances Functionality

Adding Indirection Enhances Functionality Adding Indirection Enhances Functionality The Story Of A Proxy Mark Riddoch & Massimiliano Pinto Introductions Mark Riddoch Staff Engineer, VMware Formally Chief Architect, MariaDB Corporation Massimiliano

More information

Software Defined Active Queue Management

Software Defined Active Queue Management Software Defined Active Queue Management Future Networks 2014 Sebastian Meier sebastian.meier@ikr.uni-stuttgart.de 2014-09-26 Universität Stuttgart Institute of Communication Networks and Computer Engineering

More information

Strategies. Addressing and Routing

Strategies. Addressing and Routing Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Chapter 11 I/O Management and Disk Scheduling

Chapter 11 I/O Management and Disk Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization

More information

Encrypting Informix Connections with SSL Prot ocol. Yunming Wang IBM

Encrypting Informix Connections with SSL Prot ocol. Yunming Wang IBM Encrypting Informix Connections with SSL Prot ocol Yunming Wang IBM 1 Agenda Introduction to SSL and IBM GSKit Configuring Informix Server for SSL Configuring HA Cluster connections for SSL Configuring

More information

Abstractions from Multimedia Hardware. Libraries. Abstraction Levels

Abstractions from Multimedia Hardware. Libraries. Abstraction Levels Abstractions from Multimedia Hardware Chapter 2: Basics Chapter 3: Multimedia Systems Communication Aspects and Services Chapter 4: Multimedia Systems Storage Aspects Chapter 5: Multimedia Usage and Applications

More information

Improving your Data Warehouse s IQ

Improving your Data Warehouse s IQ Improving your Data Warehouse s IQ Derek Strauss Gavroshe USA, Inc. Outline Data quality for second generation data warehouses DQ tool functionality categories and the data quality process Data model types

More information

The OSI & Internet layering models

The OSI & Internet layering models CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end

More information

Handy. A Parallel File System with High Availability & Dynamic Scalability. Bin Cheng Advisor: Dr. Hai Jin Ke Shi Cluster & Grid Computing Lab of HUST

Handy. A Parallel File System with High Availability & Dynamic Scalability. Bin Cheng Advisor: Dr. Hai Jin Ke Shi Cluster & Grid Computing Lab of HUST Handy A Parallel File System with High Availability & Dynamic Scalability Bin Cheng Advisor: Dr. Hai Jin Ke Shi Cluster & Grid Computing Lab of HUST Outline Cluster and Grid Computing Lab 2 Background

More information

Scalable Extraction, Aggregation, and Response to Network Intelligence

Scalable Extraction, Aggregation, and Response to Network Intelligence Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues

More information