Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman

Size: px
Start display at page:

Download "Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman"

Transcription

1 Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman Cornell University {krzys

2 Agenda

3 Agenda 1. A new, versacle storage abstraccon: Checkpointed Channel (CC) 2. A new web applicacon architecture: A web of (hyperlinked) CCs

4 IntroducCon

5 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

6 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

7 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

8 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

9 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

10 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

11 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

12 Storing Content in the Cloud update relayed through the server content server in a data center client server interaccons

13 Storing Content in the Cloud edge cloud content server in a data center explicit request, e.g. HTTP GET

14 hrp://liveobjects.cs.cornell.edu

15 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica

16 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica

17 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica

18 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica

19 Storing Content at the Edge edge content replica updated server in a data center peer to peer interaccons content replica content replica

20 Storing Content at the Edge edge content replica updated server in a data center mulccast peer to peer interaccons content replica content replica

21 Storing Content at the Edge edge content replica updated server in a data center updated content replica updated content replica

22 Storing Content at the Edge edge content replica server in a data center replicated state machine content replica content replica

23 Storing Content at the Edge edge content replica server in a data center manage membership content replica content replica

24 Storing Content at the Edge edge server in a data center control data

25 Storing Content at the Edge edge server in a data center control data

26 Cloud vs. Edge? edge cloud content server in a data center edge content replica server in a data center clientserver interaccons content replica peer to peer interaccons content replica

27 Cloud vs. Edge? edge server in a data center

28 Cloud vs. Edge? edge server in a data center

29 Cloud vs. Edge? edge server in a data center

30 Cloud vs. Edge? edge server in a data center no replicas lev

31 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

32 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

33 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

34 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

35 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

36 Cloud vs. Edge? Server capacity: SecondLife: ~40 clients/server Second Life and the New Genera2on of Virtual Worlds. S. Kumar et al IEEE Computer, 41(9):46 53

37 Cloud vs. Edge? Server capacity: SecondLife: ~40 clients/server virtual island

38 Cloud Edge? persistence and scalability edge cloud content server in a data center clientserver interaccons edge + content replica content replica peer to peer interaccons server in a data center content replica

39 cloud Extending Cloud to the Edge edge server

40 cloud Extending Cloud to the Edge edge server

41 Extending Cloud to the Edge cloud content server peer to peer interaccons client server interaccons content

42 Extending Cloud to the Edge cloud content distributed protocol (client server, peer to peer, etc.) server peer to peer interaccons client server interaccons content

43 cloud Extending Cloud to the Edge edge server

44 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

45 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

46 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

47 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

48 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

49 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

50 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

51 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

52 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

53 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

54 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

55 hrp://liveobjects.cs.cornell.edu

56 Checkpointed Channels (CC)

57 Architecture

58 Architecture

59 Architecture

60 Architecture

61 Architecture

62 Architecture network messages

63 content physically resides outside the channel but it could also be cached in it the edge may cut through the channel

64 content physically resides outside the channel but it could also be cached in it the edge may cut through the channel

65 content physically resides outside the channel but it could also be cached in it the edge may cut through the channel

66 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

67 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

68 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

69 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

70 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

71 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

72 Dynamics (local) Checkpointed CommunicaCon Channel (CC) inical checkpoint C U U U U

73 Dynamics (local) Checkpointed CommunicaCon Channel (CC) inical checkpoint mulcple updates C U U U U

74 Dynamics (local) Checkpointed CommunicaCon Channel (CC) inical checkpoint mulcple updates C U U U U

75 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

76 Dynamics (local) Checkpointed CommunicaCon Channel (CC) U updates U U

77 Dynamics (local) Checkpointed CommunicaCon Channel (CC) U updates U U

78 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

79 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

80 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

81 Dynamics (local) Checkpointed CommunicaCon Channel (CC) request checkpoint R

82 Dynamics (local) Checkpointed CommunicaCon Channel (CC) request checkpoint R

83 Dynamics (local) Checkpointed CommunicaCon Channel (CC) checkpoint C

84 Dynamics (local) Checkpointed CommunicaCon Channel (CC) checkpoint C

85 Dynamics (global) Checkpointed Channel (CC)

86 Dynamics (global) connect Checkpointed Channel (CC)

87 Dynamics (global) connect Checkpointed Channel (CC) inicalize

88 Dynamics (global) connect inicalize need checkpoint

89 Dynamics (global) R inicalize need checkpoint

90 Dynamics (global) need checkpoint request checkpoint

91 Dynamics (global) R request checkpoint

92 Dynamics (global) inicalize request checkpoint need checkpoint R

93 Dynamics (global) need checkpoint request checkpoint provide checkpoint

94 Dynamics (global) request checkpoint checkpoint provide checkpoint C

95 Dynamics (global) checkpoint provide checkpoint C

96 Dynamics (global) transfer checkpoint C

97 Dynamics (global) transfer checkpoint C

98 Dynamics (global) checkpoint C transfer checkpoint

99 Dynamics (global) deliver checkpoint checkpoint C

100 Dynamics (global) deliver checkpoint checkpoint C

101 consume checkpoint Dynamics (global) deliver checkpoint C

102 Dynamics (global) consume checkpoint wants to update C

103 consume checkpoint Dynamics (global) update wants to update C U

104 Dynamics (global) update wants to update request update U

105 Dynamics (global) update request update U

106 Dynamics (global) propagate update U

107 Dynamics (global) propagate update U

108 Dynamics (global) update U propagate update U U U

109 Dynamics (global) update deliver update U U U U

110 Dynamics (global) deliver update U U U U

111 Dynamics (global) deliver update U U U U

112 Dynamics (global) consume update U U U U

113 SemanCcs U C C' + = earlier checkpoint or state incremental update new checkpoint or state

114 SemanCcs U C C' + = earlier checkpoint or state incremental update new checkpoint or state

115 SemanCcs U C C' + = earlier checkpoint or state incremental update new checkpoint or state

116 SemanCcs checkpoint mulcple updates C k U 1 U 2 U n

117 SemanCcs C k U 1 U 2 U n

118 SemanCcs C k U 1 U 2 U n C = C + k+1 k U 1

119 SemanCcs C k U 1 U 2 U n C k+1 C = C + k+2 k+1 U 2

120 SemanCcs C k U 1 U 2 U n C k+1 C k+2 C k+n C k+n 1 + Un

121 SemanCcs C k U 1 U 2 U n C k+1 C k+2 C k+n

122 SemanCcs C k U 1 U 2 U n C k+1 C k+2 C k+n

123 SemanCcs U 2 U 3 C 4 U 5 C C 6 1

124 SemanCcs U 2 U 3 C 4 U 5 C C 6 1 C 2 C 3 C 5

125 SemanCcs U 2 U 3 C 4 U 5 C C 6 1 C 2 C 3 C 5

126 SemanCcs U 2 U 3 C 4 U 5 C C 6 1 C 2 C 3 C 5

127 SemanCcs C 1 C n C 2 C 3 master sequence

128 SemanCcs C 1 C 2 C 3 C n master sequence C 1 U 1 U 2 U n 1 submired updates

129 SemanCcs C 1 C 2 C 3 C n master sequence every applicacon observes a subset of the master sequence C 1 C 5 C 8 C 9 C 15

130 SemanCcs C 1 C 2 C 3 C n master sequence every applicacon observes a subset of the master sequence C 1 C 5 C 8 C 9 C 15 and nobody lags behind

131 Types Checkpointed CommunicaCon Channel (CC) can be classified based on: the type of checkpoints, the type of updates, (and many other factors we won t dicuss)

132 Types Checkpointed CommunicaCon Channel (CC) can be classified based on: the type of checkpoints, the type of updates, (and many other factors we won t dicuss)

133 Types XML documents standardized edits on XML documents C U XML Channel (XC)

134 Types XML documents standardized edits on XML documents C U XML Channel (XC)

135 Types XML documents standardized edits on XML documents C U XML Channel (XC)

136 Types XML documents standardized edits on XML documents C U XML Channel (XC)

137 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>

138 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>

139 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>

140 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>

141 hrp://liveobjects.cs.cornell.edu

142 Live Distributed Objects (LO)

143 Ordinary Web ApplicaCons display UI components

144 Ordinary Web ApplicaCons display UI components

145 Ordinary Web ApplicaCons display UI components

146 Ordinary Web ApplicaCons display UI components

147 Ordinary Web ApplicaCons display UI components

148 Ordinary Web ApplicaCons display UI components

149 Ordinary Web ApplicaCons nested

150 Ordinary Web ApplicaCons

151 Live Objects ApplicaCons nested front end to back end

152 Live Objects ApplicaCons nested front end to back end data pipeline

153 Live Objects ApplicaCons nested front end to back end data pipeline UI component

154 Live Objects ApplicaCons nested front end to back end data pipeline MPEG 2 decoder UI component

155 Live Objects ApplicaCons nested front end to back end data pipeline AES decryptor MPEG 2 decoder UI component

156 Live Objects ApplicaCons nested front end to back end data pipeline reliable transport AES decryptor MPEG 2 decoder UI component

157 Live Objects ApplicaCons nested front end to back end data pipeline unreliable transport reliable transport AES decryptor MPEG 2 decoder UI component

158 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end data pipeline

159 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

160 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

161 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

162 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

163 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

164 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

165 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

166 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

167 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

168 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

169 Live Objects ApplicaCons data pipeline

170 Live Objects ApplicaCons data pipeline data pipeline

171 data pipeline Live Objects ApplicaCons data pipeline data pipeline

172 Live Objects ApplicaCons XML

173 References channel channel reference XML accvate channel proxy

174 References channel channel reference XML accvate channel proxy

175 References channel channel reference XML accvate channel proxy

176 References channel channel reference XML points to channel proxy

177 channel reference XML points to References channel proxy XML XML channel channel content

178 References XML points to XML XML points to

179 References XML points to XML XML points to

180 References XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML

181 Ordinary Web ApplicaCons nested XML markup

182 Live Objects ApplicaCons XML XML XML XML XML XML XML XML

183 Live Objects ApplicaCons

184 Live Objects ApplicaCons space

185 Live Objects ApplicaCons space XML plane 1

186 Live Objects ApplicaCons space XML XML plane 1 plane 2

187 Live Objects ApplicaCons space XML XML XML plane 1 plane 2 building 1

188 Live Objects ApplicaCons space XML XML XML XML plane 1 plane 2 map building 1

189 Live Objects ApplicaCons XML Cle 1

190 Live Objects ApplicaCons XML XML Cle 1 Cle 2

191 Live Objects ApplicaCons

192 Live Objects ApplicaCons desktop

193 Live Objects ApplicaCons desktop XML text 2

194 Live Objects ApplicaCons desktop XML XML text 2 image 1

195 Live Objects ApplicaCons desktop XML XML XML text 2 image 1 desktop 2

196 Live Objects ApplicaCons desktop XML XML XML text 2 image 1 desktop 2 XML text 3

197 Live Objects ApplicaCons desktop 1

198 Live Objects ApplicaCons desktop 1 XML desktop 2

199 Live Objects ApplicaCons desktop 1 XML XML desktop 2 desktop 3

200 Live Objects ApplicaCons desktop 1 XML XML XML desktop 2 XML desktop 3 XML text 1

201 Live Objects ApplicaCons desktop 1 XML XML XML desktop 2 XML desktop 3 XML text 1

202 Conclusions

203 Conclusions 1. Cloud and edge technologies can work together but we need a new storage abstraccon. 2. Checkpointed Channels (CCs) a) Support a variety of protocols: client server, P2P, distributed replicacon, append log files, etc., b) Can be used at any level of the protocol stack, at the fronted and at the backend, c) Can efficiently store structured mashup content, d) Can be hyperlinked into webs of CCs; these could serve as a basis for a new Web architecture.

204 Thanks

JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris

JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris JXTA Overview Mathieu Jan IRISA Rennes Projet Paris Plan Why peer-to-peer (P2P)? Introduction to JXTA Goals Basic concepts Protocols JXTA 2.0 Loosely-Consistent DHT Conclusion 2 Why peer-to-peer (P2P)?

More information

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing WHITE PAPER Prepared by: Mark Hoffmann Coyote Point Systems Inc. Abstract: This white paper describes

More information

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared

More information

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration

More information

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto (franziskus.ekadiyanto@stud.uni-due.de) CONTENTS Why P2P? The P2P Overlay

More information

Skype characteristics

Skype characteristics Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications

More information

Content Delivery Networks

Content Delivery Networks Content Delivery Networks Silvano Gai Cisco Systems, USA Politecnico di Torino, IT sgai@cisco.com 1 Agenda What are Content Delivery Networks? DNS based routing Server Load Balancing Content Routers Ethical

More information

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

Dependability in Web Services

Dependability in Web Services Dependability in Web Services Christian Mikalsen chrismi@ifi.uio.no INF5360, Spring 2008 1 Agenda Introduction to Web Services. Extensible Web Services Architecture for Notification in Large- Scale Systems.

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Software Life-Cycle Management

Software Life-Cycle Management Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema

More information

Step into the Future: HTML5 and its Impact on SSL VPNs

Step into the Future: HTML5 and its Impact on SSL VPNs Step into the Future: HTML5 and its Impact on SSL VPNs Aidan Gogarty HOB, Inc. Session ID: SPO - 302 Session Classification: General Interest What this is all about. All about HTML5 3 useful components

More information

Introduction to Azure: Microsoft s Cloud OS

Introduction to Azure: Microsoft s Cloud OS Introduction to Azure: Microsoft s Cloud OS DI Andreas Schabus Technology Advisor Microsoft Österreich GmbH aschabus@microsoft.com www.codefest.at Version 1.0 Agenda Cloud Computing Fundamentals Windows

More information

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,

More information

Introduction to Windows Azure Cloud Computing Futures Group, Microsoft Research Roger Barga, Jared Jackson,Nelson Araujo, Dennis Gannon, Wei Lu, and

Introduction to Windows Azure Cloud Computing Futures Group, Microsoft Research Roger Barga, Jared Jackson,Nelson Araujo, Dennis Gannon, Wei Lu, and Introduction to Windows Azure Cloud Computing Futures Group, Microsoft Research Roger Barga, Jared Jackson,Nelson Araujo, Dennis Gannon, Wei Lu, and Jaliya Ekanayake Range in size from edge facilities

More information

Realtime Multi-party Video Conferencing Service over Information Centric Networks

Realtime Multi-party Video Conferencing Service over Information Centric Networks Realtime Multi-party Video Conferencing Service over Information Centric Networks (Anil Jangam, Ravishankar Ravindran, Asit Chakraborti, Xili Wan, Guoqiang Wang ) University of Maryland, Baltimore County,

More information

Session Storage in Zend Server Cluster Manager

Session Storage in Zend Server Cluster Manager Session Storage in Zend Server Cluster Manager Shahar Evron Technical Product Manager, Zend Technologies Welcome! All Phones are muted type your questions into the Webex Q&A box A recording of this session

More information

Skype network has three types of machines, all running the same software and treated equally:

Skype network has three types of machines, all running the same software and treated equally: What is Skype? Why is Skype so successful? Everybody knows! Skype is a P2P (peer-to-peer) Voice-Over-IP (VoIP) client founded by Niklas Zennström and Janus Friis also founders of the file sharing application

More information

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache. JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7

More information

SWIFT. Page:1. Openstack Swift. Object Store Cloud built from the grounds up. David Hadas Swift ATC. HRL davidh@il.ibm.com 2012 IBM Corporation

SWIFT. Page:1. Openstack Swift. Object Store Cloud built from the grounds up. David Hadas Swift ATC. HRL davidh@il.ibm.com 2012 IBM Corporation Page:1 Openstack Swift Object Store Cloud built from the grounds up David Hadas Swift ATC HRL davidh@il.ibm.com Page:2 Object Store Cloud Services Expectations: PUT/GET/DELETE Huge Capacity (Scale) Always

More information

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways

More information

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Load Balancing and Sessions C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Scalability multiple servers Availability server fails Manageability Goals do not route to it take servers

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Content Delivery Networks

Content Delivery Networks Content Delivery Networks Terena 2000 ftp://ftpeng.cisco.com/sgai/t2000cdn.pdf Silvano Gai Cisco Systems, USA Politecnico di Torino, IT sgai@cisco.com Terena 2000 1 Agenda What are Content Delivery Networks?

More information

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca

More information

Computer Networks. Examples of network applica3ons. Applica3on Layer

Computer Networks. Examples of network applica3ons. Applica3on Layer Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice

More information

SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術. 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw

SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術. 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw Contents 1 2 3 4 5 6 Introduction to SDN Networks Key Issues of SDN Switches Machine

More information

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks Bernard Traversat tra@jxta.org JXTA Chief Architect Sun Microsystems 2005 JavaOne SM Conference Session 7208 Extended and

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Practical Aspects of IP based Take Over Mechanisms. Christof Fetzer, Neeraj Suri AT&T Labs Research, Florham Park, NJ TU Darmstadt, Germany

Practical Aspects of IP based Take Over Mechanisms. Christof Fetzer, Neeraj Suri AT&T Labs Research, Florham Park, NJ TU Darmstadt, Germany Practical Aspects of IP based Take Over Mechanisms Christof Fetzer, Neeraj Suri AT&T Labs Research, Florham Park, NJ TU Darmstadt, Germany Motivation Problem: What is a good way to increase the availability

More information

Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION

Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION October 2013 Daitan White Paper Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION Highly Reliable Software Development Services http://www.daitangroup.com Cloud

More information

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack. Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.

More information

Rev. 1.04 Technology Document

Rev. 1.04 Technology Document Rev. 1.04 Technology Document Table of Contents 1. ABOUT THE AREL ICP PLATFORM...1 2. SYSTEM COMPONENTS AND ARCHITECTURE...2 3. AUDIO AND VIDEO...3 4. TRANSPORT LAYER...4 5. FIREWALLS & PROXIES...5 5.1.

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

The Google File System

The Google File System The Google File System Motivations of NFS NFS (Network File System) Allow to access files in other systems as local files Actually a network protocol (initially only one server) Simple and fast server

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Advancing Integration Competency and Excellence with the WSO2 Integration Platform

Advancing Integration Competency and Excellence with the WSO2 Integration Platform Advancing Integration Competency and Excellence with the WSO2 Integration Platform Dushan Abeyruwan Associate Technical Lead WSO2 Shammi Jayasinghe Associate Technical Lead WSO2 Agenda Fundamentals of

More information

Replication architecture

Replication architecture Replication INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Roman Vitenberg 1 Replication architecture Client Front end Replica Client Front end Server Replica INF5040, Roman Vitenberg 2 INF 5040

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

Dynamic Load Balancing and Node Migration in a Continuous Media Network

Dynamic Load Balancing and Node Migration in a Continuous Media Network Dynamic Load Balancing and Node Migration in a Continuous Media Network Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Draft: April 9, 2001 Abstract This report examines current technologies

More information

Virtual machine interface. Operating system. Physical machine interface

Virtual machine interface. Operating system. Physical machine interface Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that

More information

Datacenter Operating Systems

Datacenter Operating Systems Datacenter Operating Systems CSE451 Simon Peter With thanks to Timothy Roscoe (ETH Zurich) Autumn 2015 This Lecture What s a datacenter Why datacenters Types of datacenters Hyperscale datacenters Major

More information

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University

More information

A Standard Modest WebSite

A Standard Modest WebSite A Standard Modest WebSite 3-tier application using Servlets and JDBC HTTP Servlet JDBC JSP...... Servlet DBMS Clients Application Server Roadmap Want to grow to robust enterprise-scale systems: replicated

More information

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial

More information

LARGE SCALE INTERNET SERVICES

LARGE SCALE INTERNET SERVICES 1 LARGE SCALE INTERNET SERVICES 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview Background Knowledge Architectural Case Studies Real-World Case Study 3 Overview Overview

More information

Research on AWS. Genomics Research Statistical Analysis Mathematical Modeling Computational Fluid Dynamics Grid/Cluster/High Performance Computing

Research on AWS. Genomics Research Statistical Analysis Mathematical Modeling Computational Fluid Dynamics Grid/Cluster/High Performance Computing Research on AWS Genomics Research Statistical Analysis Mathematical Modeling Computational Fluid Dynamics Grid/Cluster/High Performance Computing Research use cases on AWS (examples) Carat is an application

More information

THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES

THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES Pamela Zave AT&T Laboratories Research Florham Park, New Jersey, USA Jennifer Rexford Princeton University Princeton, New Jersey, USA THE

More information

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers Ideal: Simple Network Model Middleboxes Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 hgp://www.cs.princeton.edu/courses/archive/spr12/cos461/ Globally unique

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

Application Note. Onsight Connect Network Requirements v6.3

Application Note. Onsight Connect Network Requirements v6.3 Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...

More information

Big Data With Hadoop

Big Data With Hadoop With Saurabh Singh singh.903@osu.edu The Ohio State University February 11, 2016 Overview 1 2 3 Requirements Ecosystem Resilient Distributed Datasets (RDDs) Example Code vs Mapreduce 4 5 Source: [Tutorials

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl

More information

CENG 492 TEST SPECIFICATIONS REPORT SECURE VIDEO STREAMING PROXY SERVER

CENG 492 TEST SPECIFICATIONS REPORT SECURE VIDEO STREAMING PROXY SERVER CENG 492 TEST SPECIFICATIONS REPORT SECURE VIDEO STREAMING PROXY SERVER TEAM PRIME Ant OngunKefeli DoğanPoyraz YurdakulGöksuOrhun OnurCemSırlı April 24, 2011 Contents 1. Introduction... 1 1.1. Purpose

More information

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue

More information

Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks

Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks Yuan Feng Baochun Li Bo Li University of Toronto HKUST 1 Multi-party video conferencing 2 Multi-party video conferencing

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet? What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth

More information

Disaster Recovery White Paper

Disaster Recovery White Paper Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase

More information

The Picture must be Clear. IPTV Quality of Experience

The Picture must be Clear. IPTV Quality of Experience The Picture must be Clear IPTV Quality of Experience 1 Video-over-IP vs IPTV? Video-over-IP A technology for moving video from A to B How about: Video-over-wire? Video-over-UHF? Video-over-Satellite? Can

More information

Application Note. Onsight Connect Network Requirements V6.1

Application Note. Onsight Connect Network Requirements V6.1 Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. WASv61_SIP_overview.ppt Page 1 of 27 This presentation will provide an overview of

More information

Scalable Internet Services and Load Balancing

Scalable Internet Services and Load Balancing Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Load Balancing for Microsoft Office Communication Server 2007 Release 2 Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks

More information

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014 Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents

More information

Designing a Cloud Storage System

Designing a Cloud Storage System Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes

More information

Implementing the Application Control Engine Service Module

Implementing the Application Control Engine Service Module Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Corneliu Claudiu Prodescu School of Engineering and Sciences Jacobs University Bremen Campus Ring 1, 28759 Bremen, Germany Monday 22 nd April,

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

Lecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia

Lecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia Streaming Media Lecture 33 Streaming Audio & Video April 20, 2005 Classes of applications: streaming stored video/audio streaming live video/audio real-time interactive video/audio Examples: distributed

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

An Open Source SCADA Toolkit

An Open Source SCADA Toolkit An Open Source SCADA Toolkit Stanley A. Klein Open Secure Energy Control Systems, LLC (301) 565 4025 sklein@cpcug.org This work was supported by the United States Department of Homeland Security Agenda

More information

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Voice over IP (VoIP) David Feiner ACN 2004 Overview Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Introduction Voice Calls are transmitted over Packet Switched Network instead

More information

Voice over IP Communications

Voice over IP Communications SIP The Next Big Step Voice over IP Communications Presented By: Stephen J. Guthrie VP of Operations Blue Ocean Technologies Goals What are our Goals for Today? Executive Summary: It is expected that real-time

More information

Google Compute Engine Configuration

Google Compute Engine Configuration Google Compute Engine Configuration GCE Deployment Setup for VNS3 2014 1 Contents Introduction 3 Step 1: GCE VNS3 Image Delivery 9 Step 2: GCE Network Setup 16 Step 3: Launching a VNS3 Manager 19 Instance

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

Apache Tomcat. Load-balancing and Clustering. Mark Thomas, 20 November 2014. 2014 Pivotal Software, Inc. All rights reserved.

Apache Tomcat. Load-balancing and Clustering. Mark Thomas, 20 November 2014. 2014 Pivotal Software, Inc. All rights reserved. 2 Apache Tomcat Load-balancing and Clustering Mark Thomas, 20 November 2014 Introduction Apache Tomcat committer since December 2003 markt@apache.org Tomcat 8 release manager Member of the Servlet, WebSocket

More information

Deliuery Networks. A Practical Guide to Content. Gilbert Held. Second Edition. CRC Press. Taylor & Francis Group

Deliuery Networks. A Practical Guide to Content. Gilbert Held. Second Edition. CRC Press. Taylor & Francis Group A Practical Guide to Content Deliuery Networks Second Edition Gilbert Held CRC Press Taylor & Francis Group Boca Raton London NewYork CRC Press is an imprint of the Taylor & Francis Croup, an informa business

More information

Principles of Network Applications. Dr. Philip Cannata

Principles of Network Applications. Dr. Philip Cannata Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).

More information

OPCNet Broker TM for Industrial Network Security and Connectivity

OPCNet Broker TM for Industrial Network Security and Connectivity OPCNet Broker TM for Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity from Integration Objects Compatible for DA, HDA

More information

Live Communications Server 2005 SP1 Office Communications Server 2007. Matt Newton Network Engineer MicroMenders, Inc

Live Communications Server 2005 SP1 Office Communications Server 2007. Matt Newton Network Engineer MicroMenders, Inc Live Communications Server 2005 SP1 Office Communications Server 2007 Matt Newton Network Engineer MicroMenders, Inc Focus of this Presentation Of the Unified Communications and Collaboration capabilities,

More information

Source-Connect Network Configuration Last updated May 2009

Source-Connect Network Configuration Last updated May 2009 Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network

More information

How To Write A Network Operating System For A Network (Networking) System (Netware)

How To Write A Network Operating System For A Network (Networking) System (Netware) Otwarte Studium Doktoranckie 1 Adaptable Service Oriented Architectures Krzysztof Zieliński Department of Computer Science AGH-UST Krakow Poland Otwarte Studium Doktoranckie 2 Agenda DCS SOA WS MDA OCL

More information

How To Retire A Legacy System From Healthcare With A Flatirons Eas Application Retirement Solution

How To Retire A Legacy System From Healthcare With A Flatirons Eas Application Retirement Solution EAS Application Retirement Case Study: Health Insurance Introduction A major health insurance organization contracted with Flatirons Solutions to assist them in retiring a number of aged applications that

More information

Client/Server Computing Distributed Processing, Client/Server, and Clusters

Client/Server Computing Distributed Processing, Client/Server, and Clusters Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the

More information

Web-Application Security

Web-Application Security Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice

More information

Network and Services (NETW-903)

Network and Services (NETW-903) Network and Services (NETW-903) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Fall 2015 Course Outline Introduction to Network Services. Web Services. Multimedia Services. Mobile Services Computation

More information

S y s t e m A r c h i t e c t u r e

S y s t e m A r c h i t e c t u r e S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual

More information

Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas

Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas 3. Replication Replication Goal: Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas Problems: Partial failures of replicas and messages No

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

Distributed File Systems

Distributed File Systems Distributed File Systems Mauro Fruet University of Trento - Italy 2011/12/19 Mauro Fruet (UniTN) Distributed File Systems 2011/12/19 1 / 39 Outline 1 Distributed File Systems 2 The Google File System (GFS)

More information

Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University Voice-Over-IP Daniel Zappala CS 460 Computer Networking Brigham Young University Coping with Best-Effort Service 2/23 sample application send a 160 byte UDP packet every 20ms packet carries a voice sample

More information

Network Applications

Network Applications Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing

More information

Core Solutions of Microsoft Lync Server 2013

Core Solutions of Microsoft Lync Server 2013 Course 20336A: Core Solutions of Microsoft Lync Server 2013 Length: Audience(s): 5 Days Level: 300 IT Professionals Technology: Microsoft Lync Server 2013 Type: Delivery Method: Course Instructor-led (classroom)

More information

CSC2231: Akamai. http://www.cs.toronto.edu/~stefan/courses/csc2231/05au. Stefan Saroiu Department of Computer Science University of Toronto

CSC2231: Akamai. http://www.cs.toronto.edu/~stefan/courses/csc2231/05au. Stefan Saroiu Department of Computer Science University of Toronto CSC2231: Akamai http://www.cs.toronto.edu/~stefan/courses/csc2231/05au Stefan Saroiu Department of Computer Science University of Toronto Administrivia Project proposals due today!!! No lecture on Monday:

More information