Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman"

Transcription

1 Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman Cornell University {krzys

2 Agenda

3 Agenda 1. A new, versacle storage abstraccon: Checkpointed Channel (CC) 2. A new web applicacon architecture: A web of (hyperlinked) CCs

4 IntroducCon

5 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

6 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

7 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

8 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

9 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

10 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

11 Storing Content in the Cloud edge cloud content server in a data center client server interaccons

12 Storing Content in the Cloud update relayed through the server content server in a data center client server interaccons

13 Storing Content in the Cloud edge cloud content server in a data center explicit request, e.g. HTTP GET

14 hrp://liveobjects.cs.cornell.edu

15 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica

16 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica

17 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica

18 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica

19 Storing Content at the Edge edge content replica updated server in a data center peer to peer interaccons content replica content replica

20 Storing Content at the Edge edge content replica updated server in a data center mulccast peer to peer interaccons content replica content replica

21 Storing Content at the Edge edge content replica updated server in a data center updated content replica updated content replica

22 Storing Content at the Edge edge content replica server in a data center replicated state machine content replica content replica

23 Storing Content at the Edge edge content replica server in a data center manage membership content replica content replica

24 Storing Content at the Edge edge server in a data center control data

25 Storing Content at the Edge edge server in a data center control data

26 Cloud vs. Edge? edge cloud content server in a data center edge content replica server in a data center clientserver interaccons content replica peer to peer interaccons content replica

27 Cloud vs. Edge? edge server in a data center

28 Cloud vs. Edge? edge server in a data center

29 Cloud vs. Edge? edge server in a data center

30 Cloud vs. Edge? edge server in a data center no replicas lev

31 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

32 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

33 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

34 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

35 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates

36 Cloud vs. Edge? Server capacity: SecondLife: ~40 clients/server Second Life and the New Genera2on of Virtual Worlds. S. Kumar et al IEEE Computer, 41(9):46 53

37 Cloud vs. Edge? Server capacity: SecondLife: ~40 clients/server virtual island

38 Cloud Edge? persistence and scalability edge cloud content server in a data center clientserver interaccons edge + content replica content replica peer to peer interaccons server in a data center content replica

39 cloud Extending Cloud to the Edge edge server

40 cloud Extending Cloud to the Edge edge server

41 Extending Cloud to the Edge cloud content server peer to peer interaccons client server interaccons content

42 Extending Cloud to the Edge cloud content distributed protocol (client server, peer to peer, etc.) server peer to peer interaccons client server interaccons content

43 cloud Extending Cloud to the Edge edge server

44 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

45 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

46 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

47 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

48 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized

49 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

50 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

51 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

52 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

53 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

54 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams

55 hrp://liveobjects.cs.cornell.edu

56 Checkpointed Channels (CC)

57 Architecture

58 Architecture

59 Architecture

60 Architecture

61 Architecture

62 Architecture network messages

63 content physically resides outside the channel but it could also be cached in it the edge may cut through the channel

64 content physically resides outside the channel but it could also be cached in it the edge may cut through the channel

65 content physically resides outside the channel but it could also be cached in it the edge may cut through the channel

66 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

67 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

68 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

69 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

70 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

71 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

72 Dynamics (local) Checkpointed CommunicaCon Channel (CC) inical checkpoint C U U U U

73 Dynamics (local) Checkpointed CommunicaCon Channel (CC) inical checkpoint mulcple updates C U U U U

74 Dynamics (local) Checkpointed CommunicaCon Channel (CC) inical checkpoint mulcple updates C U U U U

75 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

76 Dynamics (local) Checkpointed CommunicaCon Channel (CC) U updates U U

77 Dynamics (local) Checkpointed CommunicaCon Channel (CC) U updates U U

78 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

79 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

80 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates

81 Dynamics (local) Checkpointed CommunicaCon Channel (CC) request checkpoint R

82 Dynamics (local) Checkpointed CommunicaCon Channel (CC) request checkpoint R

83 Dynamics (local) Checkpointed CommunicaCon Channel (CC) checkpoint C

84 Dynamics (local) Checkpointed CommunicaCon Channel (CC) checkpoint C

85 Dynamics (global) Checkpointed Channel (CC)

86 Dynamics (global) connect Checkpointed Channel (CC)

87 Dynamics (global) connect Checkpointed Channel (CC) inicalize

88 Dynamics (global) connect inicalize need checkpoint

89 Dynamics (global) R inicalize need checkpoint

90 Dynamics (global) need checkpoint request checkpoint

91 Dynamics (global) R request checkpoint

92 Dynamics (global) inicalize request checkpoint need checkpoint R

93 Dynamics (global) need checkpoint request checkpoint provide checkpoint

94 Dynamics (global) request checkpoint checkpoint provide checkpoint C

95 Dynamics (global) checkpoint provide checkpoint C

96 Dynamics (global) transfer checkpoint C

97 Dynamics (global) transfer checkpoint C

98 Dynamics (global) checkpoint C transfer checkpoint

99 Dynamics (global) deliver checkpoint checkpoint C

100 Dynamics (global) deliver checkpoint checkpoint C

101 consume checkpoint Dynamics (global) deliver checkpoint C

102 Dynamics (global) consume checkpoint wants to update C

103 consume checkpoint Dynamics (global) update wants to update C U

104 Dynamics (global) update wants to update request update U

105 Dynamics (global) update request update U

106 Dynamics (global) propagate update U

107 Dynamics (global) propagate update U

108 Dynamics (global) update U propagate update U U U

109 Dynamics (global) update deliver update U U U U

110 Dynamics (global) deliver update U U U U

111 Dynamics (global) deliver update U U U U

112 Dynamics (global) consume update U U U U

113 SemanCcs U C C' + = earlier checkpoint or state incremental update new checkpoint or state

114 SemanCcs U C C' + = earlier checkpoint or state incremental update new checkpoint or state

115 SemanCcs U C C' + = earlier checkpoint or state incremental update new checkpoint or state

116 SemanCcs checkpoint mulcple updates C k U 1 U 2 U n

117 SemanCcs C k U 1 U 2 U n

118 SemanCcs C k U 1 U 2 U n C = C + k+1 k U 1

119 SemanCcs C k U 1 U 2 U n C k+1 C = C + k+2 k+1 U 2

120 SemanCcs C k U 1 U 2 U n C k+1 C k+2 C k+n C k+n 1 + Un

121 SemanCcs C k U 1 U 2 U n C k+1 C k+2 C k+n

122 SemanCcs C k U 1 U 2 U n C k+1 C k+2 C k+n

123 SemanCcs U 2 U 3 C 4 U 5 C C 6 1

124 SemanCcs U 2 U 3 C 4 U 5 C C 6 1 C 2 C 3 C 5

125 SemanCcs U 2 U 3 C 4 U 5 C C 6 1 C 2 C 3 C 5

126 SemanCcs U 2 U 3 C 4 U 5 C C 6 1 C 2 C 3 C 5

127 SemanCcs C 1 C n C 2 C 3 master sequence

128 SemanCcs C 1 C 2 C 3 C n master sequence C 1 U 1 U 2 U n 1 submired updates

129 SemanCcs C 1 C 2 C 3 C n master sequence every applicacon observes a subset of the master sequence C 1 C 5 C 8 C 9 C 15

130 SemanCcs C 1 C 2 C 3 C n master sequence every applicacon observes a subset of the master sequence C 1 C 5 C 8 C 9 C 15 and nobody lags behind

131 Types Checkpointed CommunicaCon Channel (CC) can be classified based on: the type of checkpoints, the type of updates, (and many other factors we won t dicuss)

132 Types Checkpointed CommunicaCon Channel (CC) can be classified based on: the type of checkpoints, the type of updates, (and many other factors we won t dicuss)

133 Types XML documents standardized edits on XML documents C U XML Channel (XC)

134 Types XML documents standardized edits on XML documents C U XML Channel (XC)

135 Types XML documents standardized edits on XML documents C U XML Channel (XC)

136 Types XML documents standardized edits on XML documents C U XML Channel (XC)

137 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>

138 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>

139 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>

140 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>

141 hrp://liveobjects.cs.cornell.edu

142 Live Distributed Objects (LO)

143 Ordinary Web ApplicaCons display UI components

144 Ordinary Web ApplicaCons display UI components

145 Ordinary Web ApplicaCons display UI components

146 Ordinary Web ApplicaCons display UI components

147 Ordinary Web ApplicaCons display UI components

148 Ordinary Web ApplicaCons display UI components

149 Ordinary Web ApplicaCons nested

150 Ordinary Web ApplicaCons

151 Live Objects ApplicaCons nested front end to back end

152 Live Objects ApplicaCons nested front end to back end data pipeline

153 Live Objects ApplicaCons nested front end to back end data pipeline UI component

154 Live Objects ApplicaCons nested front end to back end data pipeline MPEG 2 decoder UI component

155 Live Objects ApplicaCons nested front end to back end data pipeline AES decryptor MPEG 2 decoder UI component

156 Live Objects ApplicaCons nested front end to back end data pipeline reliable transport AES decryptor MPEG 2 decoder UI component

157 Live Objects ApplicaCons nested front end to back end data pipeline unreliable transport reliable transport AES decryptor MPEG 2 decoder UI component

158 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end data pipeline

159 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

160 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

161 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

162 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

163 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end

164 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

165 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

166 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

167 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

168 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component

169 Live Objects ApplicaCons data pipeline

170 Live Objects ApplicaCons data pipeline data pipeline

171 data pipeline Live Objects ApplicaCons data pipeline data pipeline

172 Live Objects ApplicaCons XML

173 References channel channel reference XML accvate channel proxy

174 References channel channel reference XML accvate channel proxy

175 References channel channel reference XML accvate channel proxy

176 References channel channel reference XML points to channel proxy

177 channel reference XML points to References channel proxy XML XML channel channel content

178 References XML points to XML XML points to

179 References XML points to XML XML points to

180 References XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML

181 Ordinary Web ApplicaCons nested XML markup

182 Live Objects ApplicaCons XML XML XML XML XML XML XML XML

183 Live Objects ApplicaCons

184 Live Objects ApplicaCons space

185 Live Objects ApplicaCons space XML plane 1

186 Live Objects ApplicaCons space XML XML plane 1 plane 2

187 Live Objects ApplicaCons space XML XML XML plane 1 plane 2 building 1

188 Live Objects ApplicaCons space XML XML XML XML plane 1 plane 2 map building 1

189 Live Objects ApplicaCons XML Cle 1

190 Live Objects ApplicaCons XML XML Cle 1 Cle 2

191 Live Objects ApplicaCons

192 Live Objects ApplicaCons desktop

193 Live Objects ApplicaCons desktop XML text 2

194 Live Objects ApplicaCons desktop XML XML text 2 image 1

195 Live Objects ApplicaCons desktop XML XML XML text 2 image 1 desktop 2

196 Live Objects ApplicaCons desktop XML XML XML text 2 image 1 desktop 2 XML text 3

197 Live Objects ApplicaCons desktop 1

198 Live Objects ApplicaCons desktop 1 XML desktop 2

199 Live Objects ApplicaCons desktop 1 XML XML desktop 2 desktop 3

200 Live Objects ApplicaCons desktop 1 XML XML XML desktop 2 XML desktop 3 XML text 1

201 Live Objects ApplicaCons desktop 1 XML XML XML desktop 2 XML desktop 3 XML text 1

202 Conclusions

203 Conclusions 1. Cloud and edge technologies can work together but we need a new storage abstraccon. 2. Checkpointed Channels (CCs) a) Support a variety of protocols: client server, P2P, distributed replicacon, append log files, etc., b) Can be used at any level of the protocol stack, at the fronted and at the backend, c) Can efficiently store structured mashup content, d) Can be hyperlinked into webs of CCs; these could serve as a basis for a new Web architecture.

204 Thanks

JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris

JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris JXTA Overview Mathieu Jan IRISA Rennes Projet Paris Plan Why peer-to-peer (P2P)? Introduction to JXTA Goals Basic concepts Protocols JXTA 2.0 Loosely-Consistent DHT Conclusion 2 Why peer-to-peer (P2P)?

More information

Content Delivery Networks

Content Delivery Networks Content Delivery Networks Silvano Gai Cisco Systems, USA Politecnico di Torino, IT sgai@cisco.com 1 Agenda What are Content Delivery Networks? DNS based routing Server Load Balancing Content Routers Ethical

More information

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared

More information

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition

Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto (franziskus.ekadiyanto@stud.uni-due.de) CONTENTS Why P2P? The P2P Overlay

More information

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture

HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web

More information

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing WHITE PAPER Prepared by: Mark Hoffmann Coyote Point Systems Inc. Abstract: This white paper describes

More information

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype

Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration

More information

Network Architecture and the OSI Reference Model

Network Architecture and the OSI Reference Model Network Architecture and the OSI Reference Model Advanced Computer Networks D12 Architecture Outline The Internet and IP Network Architecture Protocols and s Encapsulation The OSI Reference Model The Seven

More information

SWIFT. Page:1. Openstack Swift. Object Store Cloud built from the grounds up. David Hadas Swift ATC. HRL davidh@il.ibm.com 2012 IBM Corporation

SWIFT. Page:1. Openstack Swift. Object Store Cloud built from the grounds up. David Hadas Swift ATC. HRL davidh@il.ibm.com 2012 IBM Corporation Page:1 Openstack Swift Object Store Cloud built from the grounds up David Hadas Swift ATC HRL davidh@il.ibm.com Page:2 Object Store Cloud Services Expectations: PUT/GET/DELETE Huge Capacity (Scale) Always

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

Step into the Future: HTML5 and its Impact on SSL VPNs

Step into the Future: HTML5 and its Impact on SSL VPNs Step into the Future: HTML5 and its Impact on SSL VPNs Aidan Gogarty HOB, Inc. Session ID: SPO - 302 Session Classification: General Interest What this is all about. All about HTML5 3 useful components

More information

Content Delivery Networks

Content Delivery Networks Content Delivery Networks Terena 2000 ftp://ftpeng.cisco.com/sgai/t2000cdn.pdf Silvano Gai Cisco Systems, USA Politecnico di Torino, IT sgai@cisco.com Terena 2000 1 Agenda What are Content Delivery Networks?

More information

Introduction to Windows Azure Cloud Computing Futures Group, Microsoft Research Roger Barga, Jared Jackson,Nelson Araujo, Dennis Gannon, Wei Lu, and

Introduction to Windows Azure Cloud Computing Futures Group, Microsoft Research Roger Barga, Jared Jackson,Nelson Araujo, Dennis Gannon, Wei Lu, and Introduction to Windows Azure Cloud Computing Futures Group, Microsoft Research Roger Barga, Jared Jackson,Nelson Araujo, Dennis Gannon, Wei Lu, and Jaliya Ekanayake Range in size from edge facilities

More information

Distributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems. Distributed Web-Based Systems. Multi-tiered architectures

Distributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems. Distributed Web-Based Systems. Multi-tiered architectures Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 12: Version: December 10, 2012 1 / 19 Distributed -based systems Essence The WWW

More information

SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術. 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw

SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術. 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw Contents 1 2 3 4 5 6 Introduction to SDN Networks Key Issues of SDN Switches Machine

More information

Skype characteristics

Skype characteristics Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Software Life-Cycle Management

Software Life-Cycle Management Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema

More information

How to Make the Client IP Address Available to the Back-end Server

How to Make the Client IP Address Available to the Back-end Server How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration

More information

Dependability in Web Services

Dependability in Web Services Dependability in Web Services Christian Mikalsen chrismi@ifi.uio.no INF5360, Spring 2008 1 Agenda Introduction to Web Services. Extensible Web Services Architecture for Notification in Large- Scale Systems.

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7

More information

Introduction to Azure: Microsoft s Cloud OS

Introduction to Azure: Microsoft s Cloud OS Introduction to Azure: Microsoft s Cloud OS DI Andreas Schabus Technology Advisor Microsoft Österreich GmbH aschabus@microsoft.com www.codefest.at Version 1.0 Agenda Cloud Computing Fundamentals Windows

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

Session Storage in Zend Server Cluster Manager

Session Storage in Zend Server Cluster Manager Session Storage in Zend Server Cluster Manager Shahar Evron Technical Product Manager, Zend Technologies Welcome! All Phones are muted type your questions into the Webex Q&A box A recording of this session

More information

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache. JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming

More information

Virtual machine interface. Operating system. Physical machine interface

Virtual machine interface. Operating system. Physical machine interface Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that

More information

Implementing the Application Control Engine Service Module

Implementing the Application Control Engine Service Module Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application

More information

The Picture must be Clear. IPTV Quality of Experience

The Picture must be Clear. IPTV Quality of Experience The Picture must be Clear IPTV Quality of Experience 1 Video-over-IP vs IPTV? Video-over-IP A technology for moving video from A to B How about: Video-over-wire? Video-over-UHF? Video-over-Satellite? Can

More information

Rev. 1.04 Technology Document

Rev. 1.04 Technology Document Rev. 1.04 Technology Document Table of Contents 1. ABOUT THE AREL ICP PLATFORM...1 2. SYSTEM COMPONENTS AND ARCHITECTURE...2 3. AUDIO AND VIDEO...3 4. TRANSPORT LAYER...4 5. FIREWALLS & PROXIES...5 5.1.

More information

Cloud Storage Backup for Storage as a Service with AT&T

Cloud Storage Backup for Storage as a Service with AT&T WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

More information

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

4D Deployment Options for Wide Area Networks

4D Deployment Options for Wide Area Networks 4D Deployment Options for Wide Area Networks By Jason T. Slack, Technical Support Engineer, 4D Inc. Technical Note 07-32 Abstract 4 th Dimension is a highly flexible tool for creating and deploying powerful

More information

Security Testing For RESTful Applications

Security Testing For RESTful Applications Security Testing For RESTful Applications Ofer Shezaf, HP Enterprise Security Products ofr@hp.com What I do for a living? Product Manager, Security Solutions, HP ArcSight Led security research and product

More information

Practical Aspects of IP based Take Over Mechanisms. Christof Fetzer, Neeraj Suri AT&T Labs Research, Florham Park, NJ TU Darmstadt, Germany

Practical Aspects of IP based Take Over Mechanisms. Christof Fetzer, Neeraj Suri AT&T Labs Research, Florham Park, NJ TU Darmstadt, Germany Practical Aspects of IP based Take Over Mechanisms Christof Fetzer, Neeraj Suri AT&T Labs Research, Florham Park, NJ TU Darmstadt, Germany Motivation Problem: What is a good way to increase the availability

More information

An Open Source SCADA Toolkit

An Open Source SCADA Toolkit An Open Source SCADA Toolkit Stanley A. Klein Open Secure Energy Control Systems, LLC (301) 565 4025 sklein@cpcug.org This work was supported by the United States Department of Homeland Security Agenda

More information

CENG 492 TEST SPECIFICATIONS REPORT SECURE VIDEO STREAMING PROXY SERVER

CENG 492 TEST SPECIFICATIONS REPORT SECURE VIDEO STREAMING PROXY SERVER CENG 492 TEST SPECIFICATIONS REPORT SECURE VIDEO STREAMING PROXY SERVER TEAM PRIME Ant OngunKefeli DoğanPoyraz YurdakulGöksuOrhun OnurCemSırlı April 24, 2011 Contents 1. Introduction... 1 1.1. Purpose

More information

By: Chunyan Fu, PhD, Ericsson Canada

By: Chunyan Fu, PhD, Ericsson Canada TCP/UDP Basics By: Chunyan Fu, PhD, Ericsson Canada Internet Model Application TCP/UDP IP Link layer Physical layer Transport Service Overview Provide service to application layer by using the service

More information

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,

More information

Realtime Multi-party Video Conferencing Service over Information Centric Networks

Realtime Multi-party Video Conferencing Service over Information Centric Networks Realtime Multi-party Video Conferencing Service over Information Centric Networks (Anil Jangam, Ravishankar Ravindran, Asit Chakraborti, Xili Wan, Guoqiang Wang ) University of Maryland, Baltimore County,

More information

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Load Balancing and Sessions C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Scalability multiple servers Availability server fails Manageability Goals do not route to it take servers

More information

Cisco Application Control Engine Appliance

Cisco Application Control Engine Appliance Course: Cisco Application Control Engine Appliance Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Cisco ACE Appliance

More information

Private Cloud Storage for Media Applications. Bang Chang Vice President, Broadcast Servers and Storage bang.chang@xor-media.com

Private Cloud Storage for Media Applications. Bang Chang Vice President, Broadcast Servers and Storage bang.chang@xor-media.com Private Cloud Storage for Media Bang Chang Vice President, Broadcast Servers and Storage bang.chang@xor-media.com Table of Contents Introduction Cloud Storage Requirements Application transparency Universal

More information

Chapter 10 Transparency

Chapter 10 Transparency Chapter 10 1 2 Statement Complexity Distributed systems consist of many interacting components. Given the connectivity and even the existence of many components may vary during operation. The system is

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack. Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Live Communications Server 2005 SP1 Office Communications Server 2007. Matt Newton Network Engineer MicroMenders, Inc

Live Communications Server 2005 SP1 Office Communications Server 2007. Matt Newton Network Engineer MicroMenders, Inc Live Communications Server 2005 SP1 Office Communications Server 2007 Matt Newton Network Engineer MicroMenders, Inc Focus of this Presentation Of the Unified Communications and Collaboration capabilities,

More information

Skype network has three types of machines, all running the same software and treated equally:

Skype network has three types of machines, all running the same software and treated equally: What is Skype? Why is Skype so successful? Everybody knows! Skype is a P2P (peer-to-peer) Voice-Over-IP (VoIP) client founded by Niklas Zennström and Janus Friis also founders of the file sharing application

More information

Client Overview. Engagement Situation. Key Requirements for Platform Development :

Client Overview. Engagement Situation. Key Requirements for Platform Development : Client Overview Our client provides leading video platform for enterprise HD video conferencing and has product suite focused on product-based visual communication solutions. Our client leverages its solutions

More information

Client/Server Computing Distributed Processing, Client/Server, and Clusters

Client/Server Computing Distributed Processing, Client/Server, and Clusters Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Application Note. Onsight Connect Network Requirements v6.3

Application Note. Onsight Connect Network Requirements v6.3 Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...

More information

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks Bernard Traversat tra@jxta.org JXTA Chief Architect Sun Microsystems 2005 JavaOne SM Conference Session 7208 Extended and

More information

THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES

THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES Pamela Zave AT&T Laboratories Research Florham Park, New Jersey, USA Jennifer Rexford Princeton University Princeton, New Jersey, USA THE

More information

Classic Grid Architecture

Classic Grid Architecture Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes

More information

SmartCenter for Pointsec - MI Overview

SmartCenter for Pointsec - MI Overview Chapter SmartCenter for Pointsec - MI Overview 1 SmartCenter for Pointsec - MI is a management and administration framework solution for the Check Point Endpoint Security product line that integrates with

More information

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Load Balancing for Microsoft Office Communication Server 2007 Release 2 Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks

More information

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

Advancing Integration Competency and Excellence with the WSO2 Integration Platform

Advancing Integration Competency and Excellence with the WSO2 Integration Platform Advancing Integration Competency and Excellence with the WSO2 Integration Platform Dushan Abeyruwan Associate Technical Lead WSO2 Shammi Jayasinghe Associate Technical Lead WSO2 Agenda Fundamentals of

More information

Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION

Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION October 2013 Daitan White Paper Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION Highly Reliable Software Development Services http://www.daitangroup.com Cloud

More information

DMZ Network Visibility with Wireshark June 15, 2010

DMZ Network Visibility with Wireshark June 15, 2010 DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ

More information

LARGE SCALE INTERNET SERVICES

LARGE SCALE INTERNET SERVICES 1 LARGE SCALE INTERNET SERVICES 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview Background Knowledge Architectural Case Studies Real-World Case Study 3 Overview Overview

More information

Datacenter Operating Systems

Datacenter Operating Systems Datacenter Operating Systems CSE451 Simon Peter With thanks to Timothy Roscoe (ETH Zurich) Autumn 2015 This Lecture What s a datacenter Why datacenters Types of datacenters Hyperscale datacenters Major

More information

Implementing the Application Control Engine Service Module

Implementing the Application Control Engine Service Module Course: Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: (ACESM) is a four-day, instructor-led, lecture and lab course that teaches learners

More information

A Standard Modest WebSite

A Standard Modest WebSite A Standard Modest WebSite 3-tier application using Servlets and JDBC HTTP Servlet JDBC JSP...... Servlet DBMS Clients Application Server Roadmap Want to grow to robust enterprise-scale systems: replicated

More information

EAS Application Retirement Case Study: Health Insurance

EAS Application Retirement Case Study: Health Insurance EAS Application Retirement Case Study: Health Insurance Introduction A major health insurance organization contracted with Flatirons Solutions to assist them in retiring a number of aged applications that

More information

WebRTC: Why You Should Care and How Avaya Can Help You. Joel Ezell Lead Architect, Collaboration Environment R&D

WebRTC: Why You Should Care and How Avaya Can Help You. Joel Ezell Lead Architect, Collaboration Environment R&D WebRTC: Why You Should Care and How Can Help You Joel Ezell Lead Architect, Collaboration Environment R&D What is WebRTC? A set of standards being defined by the IETF (protocols) and the W3C (JavaScript

More information

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0 ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers Ideal: Simple Network Model Middleboxes Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 hgp://www.cs.princeton.edu/courses/archive/spr12/cos461/ Globally unique

More information

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe

Software-Defined Networking for the Data Center. Dr. Peer Hasselmeyer NEC Laboratories Europe Software-Defined Networking for the Data Center Dr. Peer Hasselmeyer NEC Laboratories Europe NW Technology Can t Cope with Current Needs We still use old technology... but we just pimp it To make it suitable

More information

Disaster Recovery White Paper

Disaster Recovery White Paper Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase

More information

Web-Application Security

Web-Application Security Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice

More information

Research on AWS. Genomics Research Statistical Analysis Mathematical Modeling Computational Fluid Dynamics Grid/Cluster/High Performance Computing

Research on AWS. Genomics Research Statistical Analysis Mathematical Modeling Computational Fluid Dynamics Grid/Cluster/High Performance Computing Research on AWS Genomics Research Statistical Analysis Mathematical Modeling Computational Fluid Dynamics Grid/Cluster/High Performance Computing Research use cases on AWS (examples) Carat is an application

More information

Radware s AppDirector and Microsoft Windows Terminal Services 2008 Integration Guide

Radware s AppDirector and Microsoft Windows Terminal Services 2008 Integration Guide Radware s AppDirector and Microsoft Windows Terminal Services 2008 Integration Guide Contents SOLUTION OVERVIEW... 2 RADWARE APPDIRECTOR OVERVIEW... 2 MICROSOFT WINDOWS TERMINAL SERVICES 2008... 2 SOLUTION

More information

Xerox DocuShare Private Cloud Service. Security White Paper

Xerox DocuShare Private Cloud Service. Security White Paper Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial

More information

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca

More information

Application Note. Onsight Connect Network Requirements V6.1

Application Note. Onsight Connect Network Requirements V6.1 Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

Computer Networks. Examples of network applica3ons. Applica3on Layer

Computer Networks. Examples of network applica3ons. Applica3on Layer Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice

More information

ALERT & Cisco CallManager

ALERT & Cisco CallManager Micromedia International Technical specification Author : Pierre Chevrier Pages : 28 Company : Micromedia International Date : 26/05/2011 Réf. : ETT_20090618_000001.docx ALERT & Cisco CallManager This

More information

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. WASv61_SIP_overview.ppt Page 1 of 27 This presentation will provide an overview of

More information

Introduction to. Bill Rose: President, WJR Consulting, Inc. Chairman: CEA R7 Home Networking Committee CEA Technology and Standards Council

Introduction to. Bill Rose: President, WJR Consulting, Inc. Chairman: CEA R7 Home Networking Committee CEA Technology and Standards Council Introduction to Bill Rose: President, WJR Consulting, Inc. Chairman: CEA R7 Home Networking Committee CEA Technology and Standards Council Copyright 2005 High-Definition Audio-Video Network Alliance. All

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered

More information

CST171 DB Management Approaches Page 1

CST171 DB Management Approaches Page 1 CST171 DB Management Approaches Page 1 1 2 3 4 5 6 7 Database Management Approaches CST171 Distributed DBMS (DDBMS) (Page 1) Computers at various sites can be connected with communications network or network

More information

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue

More information

Network and Services (NETW-903)

Network and Services (NETW-903) Network and Services (NETW-903) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Fall 2015 Course Outline Introduction to Network Services. Web Services. Multimedia Services. Mobile Services Computation

More information

Design and Implementation of Video Conference System Over the Hybrid Peer-to- Peer Networks

Design and Implementation of Video Conference System Over the Hybrid Peer-to- Peer Networks Design and Implementation of Conference System Over the Hybrid Peer-to- Peer Networks Hyen Ki Kim Department of Multimedia Engineering Andong National University 388 Songcheon-dong Andong city Kyungbuk

More information

A distributed system is defined as

A distributed system is defined as A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency

More information

Centralized logging system based on WebSockets protocol

Centralized logging system based on WebSockets protocol Centralized logging system based on WebSockets protocol Radomír Sohlich sohlich@fai.utb.cz Jakub Janoštík janostik@fai.utb.cz František Špaček spacek@fai.utb.cz Abstract: The era of distributed systems

More information

Designing a Cloud Storage System

Designing a Cloud Storage System Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes

More information

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC

More information

Course Outline. Course 20336B: Core Solutions of Microsoft Lync Server 2013. Duration: 5 Days

Course Outline. Course 20336B: Core Solutions of Microsoft Lync Server 2013. Duration: 5 Days Course 20336B: Core Solutions of Microsoft Lync Server 2013 Duration: 5 Days What you will learn This instructor-led course teaches IT professionals how to plan, design, deploy, configure, and administer

More information