Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman
|
|
- Oscar Powell
- 8 years ago
- Views:
Transcription
1 Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski, Ken Birman Cornell University {krzys
2 Agenda
3 Agenda 1. A new, versacle storage abstraccon: Checkpointed Channel (CC) 2. A new web applicacon architecture: A web of (hyperlinked) CCs
4 IntroducCon
5 Storing Content in the Cloud edge cloud content server in a data center client server interaccons
6 Storing Content in the Cloud edge cloud content server in a data center client server interaccons
7 Storing Content in the Cloud edge cloud content server in a data center client server interaccons
8 Storing Content in the Cloud edge cloud content server in a data center client server interaccons
9 Storing Content in the Cloud edge cloud content server in a data center client server interaccons
10 Storing Content in the Cloud edge cloud content server in a data center client server interaccons
11 Storing Content in the Cloud edge cloud content server in a data center client server interaccons
12 Storing Content in the Cloud update relayed through the server content server in a data center client server interaccons
13 Storing Content in the Cloud edge cloud content server in a data center explicit request, e.g. HTTP GET
14 hrp://liveobjects.cs.cornell.edu
15 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica
16 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica
17 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica
18 Storing Content at the Edge edge content replica server in a data center peer to peer interaccons content replica content replica
19 Storing Content at the Edge edge content replica updated server in a data center peer to peer interaccons content replica content replica
20 Storing Content at the Edge edge content replica updated server in a data center mulccast peer to peer interaccons content replica content replica
21 Storing Content at the Edge edge content replica updated server in a data center updated content replica updated content replica
22 Storing Content at the Edge edge content replica server in a data center replicated state machine content replica content replica
23 Storing Content at the Edge edge content replica server in a data center manage membership content replica content replica
24 Storing Content at the Edge edge server in a data center control data
25 Storing Content at the Edge edge server in a data center control data
26 Cloud vs. Edge? edge cloud content server in a data center edge content replica server in a data center clientserver interaccons content replica peer to peer interaccons content replica
27 Cloud vs. Edge? edge server in a data center
28 Cloud vs. Edge? edge server in a data center
29 Cloud vs. Edge? edge server in a data center
30 Cloud vs. Edge? edge server in a data center no replicas lev
31 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates
32 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates
33 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates
34 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates
35 edge cloud Cloud vs. Edge? content borleneck server in a data center client server interaccons flow of updates
36 Cloud vs. Edge? Server capacity: SecondLife: ~40 clients/server Second Life and the New Genera2on of Virtual Worlds. S. Kumar et al IEEE Computer, 41(9):46 53
37 Cloud vs. Edge? Server capacity: SecondLife: ~40 clients/server virtual island
38 Cloud Edge? persistence and scalability edge cloud content server in a data center clientserver interaccons edge + content replica content replica peer to peer interaccons server in a data center content replica
39 cloud Extending Cloud to the Edge edge server
40 cloud Extending Cloud to the Edge edge server
41 Extending Cloud to the Edge cloud content server peer to peer interaccons client server interaccons content
42 Extending Cloud to the Edge cloud content distributed protocol (client server, peer to peer, etc.) server peer to peer interaccons client server interaccons content
43 cloud Extending Cloud to the Edge edge server
44 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized
45 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized
46 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized
47 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized
48 Edge is Larger than the Cloud There are: 40+ Cmes more PCs than servers (billions today, to double in five years) client PCs per Google server 40,000+ Cmes more client PCs purchased each year by home users than new servers purchased each year by MicrosoV => a lot of computaconal power and resources at the edge that are greatly underuclized
49 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams
50 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams
51 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams
52 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams
53 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams
54 New Storage AbstracCon Unify different content access models: Centralized vs. replicated Centralized: web service, database Replicated: distributed P2P replicacon protocols Persistent vs. temporary Persistent: server in a data center Temporary: collaboracon session formed ad hoc Server side vs. client side Shared public vs. shared private Public: web service or collaboracon session Private: session state, cookies, etc. Stateful vs. stateless Stateful: variables, files, objects, database tables Stateless: video or nocficacon streams
55 hrp://liveobjects.cs.cornell.edu
56 Checkpointed Channels (CC)
57 Architecture
58 Architecture
59 Architecture
60 Architecture
61 Architecture
62 Architecture network messages
63 content physically resides outside the channel but it could also be cached in it the edge may cut through the channel
64 content physically resides outside the channel but it could also be cached in it the edge may cut through the channel
65 content physically resides outside the channel but it could also be cached in it the edge may cut through the channel
66 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
67 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
68 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
69 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
70 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
71 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
72 Dynamics (local) Checkpointed CommunicaCon Channel (CC) inical checkpoint C U U U U
73 Dynamics (local) Checkpointed CommunicaCon Channel (CC) inical checkpoint mulcple updates C U U U U
74 Dynamics (local) Checkpointed CommunicaCon Channel (CC) inical checkpoint mulcple updates C U U U U
75 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
76 Dynamics (local) Checkpointed CommunicaCon Channel (CC) U updates U U
77 Dynamics (local) Checkpointed CommunicaCon Channel (CC) U updates U U
78 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
79 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
80 Interfaces Checkpointed CommunicaCon Channel (CC) a writable stream of checkpoints and updates
81 Dynamics (local) Checkpointed CommunicaCon Channel (CC) request checkpoint R
82 Dynamics (local) Checkpointed CommunicaCon Channel (CC) request checkpoint R
83 Dynamics (local) Checkpointed CommunicaCon Channel (CC) checkpoint C
84 Dynamics (local) Checkpointed CommunicaCon Channel (CC) checkpoint C
85 Dynamics (global) Checkpointed Channel (CC)
86 Dynamics (global) connect Checkpointed Channel (CC)
87 Dynamics (global) connect Checkpointed Channel (CC) inicalize
88 Dynamics (global) connect inicalize need checkpoint
89 Dynamics (global) R inicalize need checkpoint
90 Dynamics (global) need checkpoint request checkpoint
91 Dynamics (global) R request checkpoint
92 Dynamics (global) inicalize request checkpoint need checkpoint R
93 Dynamics (global) need checkpoint request checkpoint provide checkpoint
94 Dynamics (global) request checkpoint checkpoint provide checkpoint C
95 Dynamics (global) checkpoint provide checkpoint C
96 Dynamics (global) transfer checkpoint C
97 Dynamics (global) transfer checkpoint C
98 Dynamics (global) checkpoint C transfer checkpoint
99 Dynamics (global) deliver checkpoint checkpoint C
100 Dynamics (global) deliver checkpoint checkpoint C
101 consume checkpoint Dynamics (global) deliver checkpoint C
102 Dynamics (global) consume checkpoint wants to update C
103 consume checkpoint Dynamics (global) update wants to update C U
104 Dynamics (global) update wants to update request update U
105 Dynamics (global) update request update U
106 Dynamics (global) propagate update U
107 Dynamics (global) propagate update U
108 Dynamics (global) update U propagate update U U U
109 Dynamics (global) update deliver update U U U U
110 Dynamics (global) deliver update U U U U
111 Dynamics (global) deliver update U U U U
112 Dynamics (global) consume update U U U U
113 SemanCcs U C C' + = earlier checkpoint or state incremental update new checkpoint or state
114 SemanCcs U C C' + = earlier checkpoint or state incremental update new checkpoint or state
115 SemanCcs U C C' + = earlier checkpoint or state incremental update new checkpoint or state
116 SemanCcs checkpoint mulcple updates C k U 1 U 2 U n
117 SemanCcs C k U 1 U 2 U n
118 SemanCcs C k U 1 U 2 U n C = C + k+1 k U 1
119 SemanCcs C k U 1 U 2 U n C k+1 C = C + k+2 k+1 U 2
120 SemanCcs C k U 1 U 2 U n C k+1 C k+2 C k+n C k+n 1 + Un
121 SemanCcs C k U 1 U 2 U n C k+1 C k+2 C k+n
122 SemanCcs C k U 1 U 2 U n C k+1 C k+2 C k+n
123 SemanCcs U 2 U 3 C 4 U 5 C C 6 1
124 SemanCcs U 2 U 3 C 4 U 5 C C 6 1 C 2 C 3 C 5
125 SemanCcs U 2 U 3 C 4 U 5 C C 6 1 C 2 C 3 C 5
126 SemanCcs U 2 U 3 C 4 U 5 C C 6 1 C 2 C 3 C 5
127 SemanCcs C 1 C n C 2 C 3 master sequence
128 SemanCcs C 1 C 2 C 3 C n master sequence C 1 U 1 U 2 U n 1 submired updates
129 SemanCcs C 1 C 2 C 3 C n master sequence every applicacon observes a subset of the master sequence C 1 C 5 C 8 C 9 C 15
130 SemanCcs C 1 C 2 C 3 C n master sequence every applicacon observes a subset of the master sequence C 1 C 5 C 8 C 9 C 15 and nobody lags behind
131 Types Checkpointed CommunicaCon Channel (CC) can be classified based on: the type of checkpoints, the type of updates, (and many other factors we won t dicuss)
132 Types Checkpointed CommunicaCon Channel (CC) can be classified based on: the type of checkpoints, the type of updates, (and many other factors we won t dicuss)
133 Types XML documents standardized edits on XML documents C U XML Channel (XC)
134 Types XML documents standardized edits on XML documents C U XML Channel (XC)
135 Types XML documents standardized edits on XML documents C U XML Channel (XC)
136 Types XML documents standardized edits on XML documents C U XML Channel (XC)
137 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>
138 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>
139 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>
140 Types Checkpointed Channel (CC) Text Channel Binary Channel XML Channel (XC) RSS Channel XHTML Channel XAML Channel Reference Channel CollecCon<T>
141 hrp://liveobjects.cs.cornell.edu
142 Live Distributed Objects (LO)
143 Ordinary Web ApplicaCons display UI components
144 Ordinary Web ApplicaCons display UI components
145 Ordinary Web ApplicaCons display UI components
146 Ordinary Web ApplicaCons display UI components
147 Ordinary Web ApplicaCons display UI components
148 Ordinary Web ApplicaCons display UI components
149 Ordinary Web ApplicaCons nested
150 Ordinary Web ApplicaCons
151 Live Objects ApplicaCons nested front end to back end
152 Live Objects ApplicaCons nested front end to back end data pipeline
153 Live Objects ApplicaCons nested front end to back end data pipeline UI component
154 Live Objects ApplicaCons nested front end to back end data pipeline MPEG 2 decoder UI component
155 Live Objects ApplicaCons nested front end to back end data pipeline AES decryptor MPEG 2 decoder UI component
156 Live Objects ApplicaCons nested front end to back end data pipeline reliable transport AES decryptor MPEG 2 decoder UI component
157 Live Objects ApplicaCons nested front end to back end data pipeline unreliable transport reliable transport AES decryptor MPEG 2 decoder UI component
158 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end data pipeline
159 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end
160 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end
161 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end
162 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end
163 nested <Object xsi:type="referenceobject" id= > <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> <Parameter id= "> <Value xsi:type="referenceobject" id= "> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Value> </Parameter> </Object> front end to back end
164 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component
165 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component
166 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component
167 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component
168 Live Objects ApplicaCons web service proxy membership client recovery protocol TCP transport UDP transport hole punching IP mulccast reliable mulccast AES decryptor MPEG 2 decoder UI component
169 Live Objects ApplicaCons data pipeline
170 Live Objects ApplicaCons data pipeline data pipeline
171 data pipeline Live Objects ApplicaCons data pipeline data pipeline
172 Live Objects ApplicaCons XML
173 References channel channel reference XML accvate channel proxy
174 References channel channel reference XML accvate channel proxy
175 References channel channel reference XML accvate channel proxy
176 References channel channel reference XML points to channel proxy
177 channel reference XML points to References channel proxy XML XML channel channel content
178 References XML points to XML XML points to
179 References XML points to XML XML points to
180 References XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML XML
181 Ordinary Web ApplicaCons nested XML markup
182 Live Objects ApplicaCons XML XML XML XML XML XML XML XML
183 Live Objects ApplicaCons
184 Live Objects ApplicaCons space
185 Live Objects ApplicaCons space XML plane 1
186 Live Objects ApplicaCons space XML XML plane 1 plane 2
187 Live Objects ApplicaCons space XML XML XML plane 1 plane 2 building 1
188 Live Objects ApplicaCons space XML XML XML XML plane 1 plane 2 map building 1
189 Live Objects ApplicaCons XML Cle 1
190 Live Objects ApplicaCons XML XML Cle 1 Cle 2
191 Live Objects ApplicaCons
192 Live Objects ApplicaCons desktop
193 Live Objects ApplicaCons desktop XML text 2
194 Live Objects ApplicaCons desktop XML XML text 2 image 1
195 Live Objects ApplicaCons desktop XML XML XML text 2 image 1 desktop 2
196 Live Objects ApplicaCons desktop XML XML XML text 2 image 1 desktop 2 XML text 3
197 Live Objects ApplicaCons desktop 1
198 Live Objects ApplicaCons desktop 1 XML desktop 2
199 Live Objects ApplicaCons desktop 1 XML XML desktop 2 desktop 3
200 Live Objects ApplicaCons desktop 1 XML XML XML desktop 2 XML desktop 3 XML text 1
201 Live Objects ApplicaCons desktop 1 XML XML XML desktop 2 XML desktop 3 XML text 1
202 Conclusions
203 Conclusions 1. Cloud and edge technologies can work together but we need a new storage abstraccon. 2. Checkpointed Channels (CCs) a) Support a variety of protocols: client server, P2P, distributed replicacon, append log files, etc., b) Can be used at any level of the protocol stack, at the fronted and at the backend, c) Can efficiently store structured mashup content, d) Can be hyperlinked into webs of CCs; these could serve as a basis for a new Web architecture.
204 Thanks
JXTA Overview. Mathieu Jan IRISA Rennes Projet Paris
JXTA Overview Mathieu Jan IRISA Rennes Projet Paris Plan Why peer-to-peer (P2P)? Introduction to JXTA Goals Basic concepts Protocols JXTA 2.0 Loosely-Consistent DHT Conclusion 2 Why peer-to-peer (P2P)?
More informationImplementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing
Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing WHITE PAPER Prepared by: Mark Hoffmann Coyote Point Systems Inc. Abstract: This white paper describes
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationCommon P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype
Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration
More informationPeer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition
Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto (franziskus.ekadiyanto@stud.uni-due.de) CONTENTS Why P2P? The P2P Overlay
More informationSkype characteristics
Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications
More informationContent Delivery Networks
Content Delivery Networks Silvano Gai Cisco Systems, USA Politecnico di Torino, IT sgai@cisco.com 1 Agenda What are Content Delivery Networks? DNS based routing Server Load Balancing Content Routers Ethical
More informationHexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture
White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationDependability in Web Services
Dependability in Web Services Christian Mikalsen chrismi@ifi.uio.no INF5360, Spring 2008 1 Agenda Introduction to Web Services. Extensible Web Services Architecture for Notification in Large- Scale Systems.
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationSoftware Life-Cycle Management
Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema
More informationStep into the Future: HTML5 and its Impact on SSL VPNs
Step into the Future: HTML5 and its Impact on SSL VPNs Aidan Gogarty HOB, Inc. Session ID: SPO - 302 Session Classification: General Interest What this is all about. All about HTML5 3 useful components
More informationIntroduction to Azure: Microsoft s Cloud OS
Introduction to Azure: Microsoft s Cloud OS DI Andreas Schabus Technology Advisor Microsoft Österreich GmbH aschabus@microsoft.com www.codefest.at Version 1.0 Agenda Cloud Computing Fundamentals Windows
More informationSecure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
More informationIntroduction to Windows Azure Cloud Computing Futures Group, Microsoft Research Roger Barga, Jared Jackson,Nelson Araujo, Dennis Gannon, Wei Lu, and
Introduction to Windows Azure Cloud Computing Futures Group, Microsoft Research Roger Barga, Jared Jackson,Nelson Araujo, Dennis Gannon, Wei Lu, and Jaliya Ekanayake Range in size from edge facilities
More informationRealtime Multi-party Video Conferencing Service over Information Centric Networks
Realtime Multi-party Video Conferencing Service over Information Centric Networks (Anil Jangam, Ravishankar Ravindran, Asit Chakraborti, Xili Wan, Guoqiang Wang ) University of Maryland, Baltimore County,
More informationSession Storage in Zend Server Cluster Manager
Session Storage in Zend Server Cluster Manager Shahar Evron Technical Product Manager, Zend Technologies Welcome! All Phones are muted type your questions into the Webex Q&A box A recording of this session
More informationSkype network has three types of machines, all running the same software and treated equally:
What is Skype? Why is Skype so successful? Everybody knows! Skype is a P2P (peer-to-peer) Voice-Over-IP (VoIP) client founded by Niklas Zennström and Janus Friis also founders of the file sharing application
More informationWeb. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
More information1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
More informationMicrosoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE
Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7
More informationSWIFT. Page:1. Openstack Swift. Object Store Cloud built from the grounds up. David Hadas Swift ATC. HRL davidh@il.ibm.com 2012 IBM Corporation
Page:1 Openstack Swift Object Store Cloud built from the grounds up David Hadas Swift ATC HRL davidh@il.ibm.com Page:2 Object Store Cloud Services Expectations: PUT/GET/DELETE Huge Capacity (Scale) Always
More informationConcepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches
Concepts of Database Management Seventh Edition Chapter 9 Database Management Approaches Objectives Describe distributed database management systems (DDBMSs) Discuss client/server systems Examine the ways
More informationLoad Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.
Load Balancing and Sessions C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Scalability multiple servers Availability server fails Manageability Goals do not route to it take servers
More informationComputer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
More informationContent Delivery Networks
Content Delivery Networks Terena 2000 ftp://ftpeng.cisco.com/sgai/t2000cdn.pdf Silvano Gai Cisco Systems, USA Politecnico di Torino, IT sgai@cisco.com Terena 2000 1 Agenda What are Content Delivery Networks?
More informationAn Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca
More informationComputer Networks. Examples of network applica3ons. Applica3on Layer
Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice
More informationSDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術. 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw
SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw Contents 1 2 3 4 5 6 Introduction to SDN Networks Key Issues of SDN Switches Machine
More informationJXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks
JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks Bernard Traversat tra@jxta.org JXTA Chief Architect Sun Microsystems 2005 JavaOne SM Conference Session 7208 Extended and
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationPractical Aspects of IP based Take Over Mechanisms. Christof Fetzer, Neeraj Suri AT&T Labs Research, Florham Park, NJ TU Darmstadt, Germany
Practical Aspects of IP based Take Over Mechanisms Christof Fetzer, Neeraj Suri AT&T Labs Research, Florham Park, NJ TU Darmstadt, Germany Motivation Problem: What is a good way to increase the availability
More informationReference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION
October 2013 Daitan White Paper Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION Highly Reliable Software Development Services http://www.daitangroup.com Cloud
More informationRepeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
More informationRev. 1.04 Technology Document
Rev. 1.04 Technology Document Table of Contents 1. ABOUT THE AREL ICP PLATFORM...1 2. SYSTEM COMPONENTS AND ARCHITECTURE...2 3. AUDIO AND VIDEO...3 4. TRANSPORT LAYER...4 5. FIREWALLS & PROXIES...5 5.1.
More informationSOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
More informationThe Google File System
The Google File System Motivations of NFS NFS (Network File System) Allow to access files in other systems as local files Actually a network protocol (initially only one server) Simple and fast server
More informationAn Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
More informationAdvancing Integration Competency and Excellence with the WSO2 Integration Platform
Advancing Integration Competency and Excellence with the WSO2 Integration Platform Dushan Abeyruwan Associate Technical Lead WSO2 Shammi Jayasinghe Associate Technical Lead WSO2 Agenda Fundamentals of
More informationReplication architecture
Replication INF 5040 autumn 2007 lecturer: Roman Vitenberg INF5040, Roman Vitenberg 1 Replication architecture Client Front end Replica Client Front end Server Replica INF5040, Roman Vitenberg 2 INF 5040
More informationCSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
More informationDynamic Load Balancing and Node Migration in a Continuous Media Network
Dynamic Load Balancing and Node Migration in a Continuous Media Network Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Draft: April 9, 2001 Abstract This report examines current technologies
More informationVirtual machine interface. Operating system. Physical machine interface
Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that
More informationDatacenter Operating Systems
Datacenter Operating Systems CSE451 Simon Peter With thanks to Timothy Roscoe (ETH Zurich) Autumn 2015 This Lecture What s a datacenter Why datacenters Types of datacenters Hyperscale datacenters Major
More informationMathematical Modelling of Computer Networks: Part II. Module 1: Network Coding
Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University
More informationA Standard Modest WebSite
A Standard Modest WebSite 3-tier application using Servlets and JDBC HTTP Servlet JDBC JSP...... Servlet DBMS Clients Application Server Roadmap Want to grow to robust enterprise-scale systems: replicated
More informationIndustrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
More informationLARGE SCALE INTERNET SERVICES
1 LARGE SCALE INTERNET SERVICES 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview Background Knowledge Architectural Case Studies Real-World Case Study 3 Overview Overview
More informationResearch on AWS. Genomics Research Statistical Analysis Mathematical Modeling Computational Fluid Dynamics Grid/Cluster/High Performance Computing
Research on AWS Genomics Research Statistical Analysis Mathematical Modeling Computational Fluid Dynamics Grid/Cluster/High Performance Computing Research use cases on AWS (examples) Carat is an application
More informationTHE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES
THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES Pamela Zave AT&T Laboratories Research Florham Park, New Jersey, USA Jennifer Rexford Princeton University Princeton, New Jersey, USA THE
More informationMiddleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers
Ideal: Simple Network Model Middleboxes Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 hgp://www.cs.princeton.edu/courses/archive/spr12/cos461/ Globally unique
More information1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationBig Data With Hadoop
With Saurabh Singh singh.903@osu.edu The Ohio State University February 11, 2016 Overview 1 2 3 Requirements Ecosystem Resilient Distributed Datasets (RDDs) Example Code vs Mapreduce 4 5 Source: [Tutorials
More informationA Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl
More informationCENG 492 TEST SPECIFICATIONS REPORT SECURE VIDEO STREAMING PROXY SERVER
CENG 492 TEST SPECIFICATIONS REPORT SECURE VIDEO STREAMING PROXY SERVER TEAM PRIME Ant OngunKefeli DoğanPoyraz YurdakulGöksuOrhun OnurCemSırlı April 24, 2011 Contents 1. Introduction... 1 1.1. Purpose
More informationExecutive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits
Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue
More informationAirlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks
Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks Yuan Feng Baochun Li Bo Li University of Toronto HKUST 1 Multi-party video conferencing 2 Multi-party video conferencing
More informationWhat s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?
What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth
More informationDisaster Recovery White Paper
Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase
More informationThe Picture must be Clear. IPTV Quality of Experience
The Picture must be Clear IPTV Quality of Experience 1 Video-over-IP vs IPTV? Video-over-IP A technology for moving video from A to B How about: Video-over-wire? Video-over-UHF? Video-over-Satellite? Can
More informationApplication Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
More informationThe Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationThis presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.
This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1. WASv61_SIP_overview.ppt Page 1 of 27 This presentation will provide an overview of
More informationScalable Internet Services and Load Balancing
Scalable Services and Load Balancing Kai Shen Services brings ubiquitous connection based applications/services accessible to online users through Applications can be designed and launched quickly and
More informationAssignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
More informationLoad Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
More informationDistributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationDesigning a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
More informationImplementing the Application Control Engine Service Module
Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application
More informationInside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Corneliu Claudiu Prodescu School of Engineering and Sciences Jacobs University Bremen Campus Ring 1, 28759 Bremen, Germany Monday 22 nd April,
More informationA distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
More informationLecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia
Streaming Media Lecture 33 Streaming Audio & Video April 20, 2005 Classes of applications: streaming stored video/audio streaming live video/audio real-time interactive video/audio Examples: distributed
More informationStateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
More informationAn Open Source SCADA Toolkit
An Open Source SCADA Toolkit Stanley A. Klein Open Secure Energy Control Systems, LLC (301) 565 4025 sklein@cpcug.org This work was supported by the United States Department of Homeland Security Agenda
More informationVoice over IP (VoIP) Overview. Introduction. David Feiner ACN 2004. Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples
Voice over IP (VoIP) David Feiner ACN 2004 Overview Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples Introduction Voice Calls are transmitted over Packet Switched Network instead
More informationVoice over IP Communications
SIP The Next Big Step Voice over IP Communications Presented By: Stephen J. Guthrie VP of Operations Blue Ocean Technologies Goals What are our Goals for Today? Executive Summary: It is expected that real-time
More informationGoogle Compute Engine Configuration
Google Compute Engine Configuration GCE Deployment Setup for VNS3 2014 1 Contents Introduction 3 Step 1: GCE VNS3 Image Delivery 9 Step 2: GCE Network Setup 16 Step 3: Launching a VNS3 Manager 19 Instance
More informationDistributed Systems. 2. Application Layer
Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social
More informationApache Tomcat. Load-balancing and Clustering. Mark Thomas, 20 November 2014. 2014 Pivotal Software, Inc. All rights reserved.
2 Apache Tomcat Load-balancing and Clustering Mark Thomas, 20 November 2014 Introduction Apache Tomcat committer since December 2003 markt@apache.org Tomcat 8 release manager Member of the Servlet, WebSocket
More informationDeliuery Networks. A Practical Guide to Content. Gilbert Held. Second Edition. CRC Press. Taylor & Francis Group
A Practical Guide to Content Deliuery Networks Second Edition Gilbert Held CRC Press Taylor & Francis Group Boca Raton London NewYork CRC Press is an imprint of the Taylor & Francis Croup, an informa business
More informationPrinciples of Network Applications. Dr. Philip Cannata
Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).
More informationOPCNet Broker TM for Industrial Network Security and Connectivity
OPCNet Broker TM for Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity from Integration Objects Compatible for DA, HDA
More informationLive Communications Server 2005 SP1 Office Communications Server 2007. Matt Newton Network Engineer MicroMenders, Inc
Live Communications Server 2005 SP1 Office Communications Server 2007 Matt Newton Network Engineer MicroMenders, Inc Focus of this Presentation Of the Unified Communications and Collaboration capabilities,
More informationSource-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network
More informationHow To Write A Network Operating System For A Network (Networking) System (Netware)
Otwarte Studium Doktoranckie 1 Adaptable Service Oriented Architectures Krzysztof Zieliński Department of Computer Science AGH-UST Krakow Poland Otwarte Studium Doktoranckie 2 Agenda DCS SOA WS MDA OCL
More informationHow To Retire A Legacy System From Healthcare With A Flatirons Eas Application Retirement Solution
EAS Application Retirement Case Study: Health Insurance Introduction A major health insurance organization contracted with Flatirons Solutions to assist them in retiring a number of aged applications that
More informationClient/Server Computing Distributed Processing, Client/Server, and Clusters
Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the
More informationWeb-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
More informationNetwork and Services (NETW-903)
Network and Services (NETW-903) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Fall 2015 Course Outline Introduction to Network Services. Web Services. Multimedia Services. Mobile Services Computation
More informationS y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
More informationAvoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas
3. Replication Replication Goal: Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas Problems: Partial failures of replicas and messages No
More informationGuidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
More informationDistributed File Systems
Distributed File Systems Mauro Fruet University of Trento - Italy 2011/12/19 Mauro Fruet (UniTN) Distributed File Systems 2011/12/19 1 / 39 Outline 1 Distributed File Systems 2 The Google File System (GFS)
More informationVoice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Voice-Over-IP Daniel Zappala CS 460 Computer Networking Brigham Young University Coping with Best-Effort Service 2/23 sample application send a 160 byte UDP packet every 20ms packet carries a voice sample
More informationNetwork Applications
Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing
More informationCore Solutions of Microsoft Lync Server 2013
Course 20336A: Core Solutions of Microsoft Lync Server 2013 Length: Audience(s): 5 Days Level: 300 IT Professionals Technology: Microsoft Lync Server 2013 Type: Delivery Method: Course Instructor-led (classroom)
More informationCSC2231: Akamai. http://www.cs.toronto.edu/~stefan/courses/csc2231/05au. Stefan Saroiu Department of Computer Science University of Toronto
CSC2231: Akamai http://www.cs.toronto.edu/~stefan/courses/csc2231/05au Stefan Saroiu Department of Computer Science University of Toronto Administrivia Project proposals due today!!! No lecture on Monday:
More information