CommunicationServices. JohnBresnahan,IanFoster,JosephInsley,BrianToonen,StevenTuecke

Size: px
Start display at page:

Download "CommunicationServices. JohnBresnahan,IanFoster,JosephInsley,BrianToonen,StevenTuecke"

Transcription

1 CommunicationServices foradvancednetworkapplications JohnBresnahan,IanFoster,JosephInsley,BrianToonen,StevenTuecke MathematicsandComputerScienceDivision ArgonneNationalLaboratory Argonne,IL,U.S.A. AbstractAdvancednetworkapplicationssuchas remoteinstrumentcontrol,collaborativeenvironments,andremotei/oaredistinguishedfrom\traditional"applicationssuchasvideoconferencingby theirneedtocreatemultiple,heterogeneousows withdierentcharacteristics.forexample,asingleapplicationmayrequireremotei/oforraw datasets,sharedcontrolsforacollaborativeanalysissystem,streamingvideoforimagerendering data,andaudioforcollaboration.furthermore, eachowcanhavedierentrequirementsinterms ofreliability,networkqualityofservice,security, etc.wearguethatnewapproachestocommunicationservices,protocols,andnetworkarchitecture arerequiredbothtoprovidehigh-levelabstractions forcommonowtypesandtosupportuser-level managementofowcreationandquality.wedescribeexperienceswiththedevelopmentofsuchapplicationsandcommunicationservices. Keywords:Networkapplications,communicationlibraries,Nexus,CollaboratoryInteroperabilityFramework(CIF) 1Introduction Advancednetworkapplicationssuchasremoteinstrumentcontrol,collaborativeenvironments,andremoteI/Oaredistinguished from\traditional"networkedapplicationssuch asvideoconferencingbytheirneedtomaintainmultiple,heterogeneousowswithdifferentcharacteristics.forexample,asingle applicationmayrequireremotei/oforraw datasets,sharedcontrolsforacollaborative analysissystem,streamingvideoforimagerenderingdata,andaudioforcollaboration.furthermore,eachowcanhavedierentrequirementsintermsofreliability,networkquality ofservice,security,andsoon.forexample, inatele-immersivecollaborativeenvironment, trackinginformationneednotbepropagated reliablybutcanoftenbenetfrommulticast, whiledatabaseupdatesrequirereliablecommunicationbutcannotalwaysusemulticast capabilities.mechanismsarerequiredthatallowbothconvenientspecicationoftheseapplicationsandecientexecutioninavariety ofenvironments. Historically,suchapplicationseitherhave usedasinglelow-levelcommunicationprotocolforallows(e.g.,tcp/ip[1,2,3])orhave usedamixtureofdierent,oftenspecialized APIsfordierentows[4,5,6].Neitherapproachisideal.Therstapproachleadstoa protocolthatisgoodforsomepurposesbut lessidealforothers;inthesecond,program complexityisincreasedandportabilityishard toachieve.inbothcases,avarietyofissues relatingtothecoordinationofmultipleows (e.g.,synchronizationofaudioandvideo,prioritizationofdierentows)havetypicallynot beenaddressedatall. Webelievethatsuchapplicationsrequire moresophisticatedcommunicationservices with,ideally,thefollowingcharacteristics: AuniformAPIallowsbothhigh-level specicationofcommunicationstructure andindependentspecicationofcommunicationmechanisms.

2 Avarietyofowtypesandinteraction modelsaresupported,includingvarious typesofstreamingdata,sharedcontrols, anddatabaseupdates. Supportisprovidedforautomaticand user-managedmanipulationofowcharacteristics,suchasprivacy,integrity,compression,andnetworkquality-of-service. Supportisprovidedforthecoordinationandmanagementofensemblesof ows,enabling,forexample,programmercontrolledprioritization,synchronization, andaggregationofowsinvarioustypes ofnetwork. Integratedinstrumentationallowsuserlevelmonitoringofowqualityandnotication,forthepurposeofadaptation, ofviolationsinperformancecontracts. Ourviewsonthesetopicshavebeenshaped byourexperiencesdevelopingbothadvanced networkedapplicationsandcommunicationlibrariesdesignedtosupportsuchapplications. Inthispaper,wereviewtheseexperiences,focusingononeparticularlydemandingapplicationandthreedierentcommunicationlibraries. 2MotivatingExample Weuseasingleexampleapplicationtomotivatesomeofthediscussionthatfollows.Our chosenapplicationistypicalofanemerging classofso-called\grid"applicationsthatcouplegeographicallydistributedresourcesofvarioustypestocreatevirtualdeviceswithunique capabilities[7].inthiscase,theresources inquestionareaspecializedscienticinstrument,theadvancedphotonsource(aps)at ArgonneNationalLaboratory,usedtoprobe theinteriorstructureofmaterialsatverysmall scalesusing,inthiscase,atechniquecalled computedmicrotomography(cmt);asupercomputer,usedtoreconstruct3-dmaterial densitiesfromthesequenceof2-drawdata \slices"providedbytheinstrument;anda numberofbothhigh-endandlow-enddisplay devices,usedtosupportcollaborativeanalysisofthereconstructeddata.theseresources workinconcerttoenablequasi-real-timereconstructionandcollaborativeanalysisofaps data,sothatusersatremotesitescanbe manipulatinganddiscussingthree-dimensional imagedatajustminutesafterdatacollection begins[8]. 2.1VisualizationCapabilities Thevisualizationsystemusesaspecialized graphicsutility,thesgivolumizerlibrary,to producehigh-quality,3-dvolume-renderedimagesofthedataset.asillustratedinfigures1 and2,thisdatacanbedisplayedinmultipleways,dependingonthecapabilitiesofthe user'svisualizationenvironment: Virtualrealitydisplay:CAVEorImmersaDesk(Idesk)immersivedisplaydevicessupporthigh-quality,3-Dstereodisplay.Theusercancontrolthedisplaythroughtheuseofacontrolpanel providedwithinthevirtualenvironment. Thiscontrolpanelallowsoperationssuch asrotation,volumecropping,andassignmentofcolorandopacitytodatasetvoxels. Desktopdisplay:Ratherthanrewriting thevolumerenderertorunonlesscapable desktophardware,weuseremotelyrenderedvideoforthedesktopdisplay.the high-qualityimagesproducedbythesgibasedvolumerenderinghardwareand softwarearecaptured,compressed,and sentoverthenetworkfordisplayusing standardnetworkvideodisplaytools.a Javacontrolpanelsupportsdesktopcontroloftherenderingprocess. Webdisplay:Thesamesoftwarecan alsocaptureindividualimagesfromthe sceneandputthemonawebpage,fora verylow-endsolutionthatprovideshighqualityimages.

3 Figure1:AscreenshotoftheImmersaDesk takenduringacollaborativesessionwithtwo users. Shared-statemechanismsareusedtolink thevirtualrealityanddesktopdisplays,sothat usersatdierentlocationsandondierent systemscancooperateinthesteeringofthe volume-renderingprocess. 2.2CommunicationRequirements TheapplicationistypicalofadvancedGridapplicationsinitssimultaneoususeofmanyunderlyingcommunicationstructures: Thetransferof2-DimagesfromtheAPS tothesupercomputer,andof3-ddatasets fromthesupercomputertothevisualizationsystem,requireshigh-bandwidth(10s ofmb/stoday,gb/sormoreinthefuture),unicastcommunication. Communicationwithintheparallel3-Dreconstructionprogramrequireshighbandwidthandlow-latencycommunication,as istypicallyavailableonparallelsupercomputersthroughthemessagepassinginterface(mpi)orshared-memorylibraries. Thevideostreamusesstandard,unreliableIPmulticastprotocols(e.g.,RTP andrtcp).wecommonlyused800x600 pixelh.261video,whichrequiresapproximately300kbpsofbandwidthwhenthe Figure2:Ascreenshotofalow-resolution graphicsworkstationtakenduringacollaborativesessionwithtwousers. imageisrapidlychanging;signicantly higherresolutionisdesirable. Audiostreamsbetweenthecollaborators canalsousestandard,unreliableipmulticastprotocols.audiorequireslessbandwidththanvideobutismoresusceptible toqualitydegradationduetolostpackets. Thecommunicationbetweenthecontrol panelsofthecollaboratorsusesbothreliableandunreliablemulticastprotocols. Unreliableprotocolscanbeusedforincrementalupdatesofthepanels,forexamplewhileauserisdraggingaslideron thepanel.reliableprotocolsareusedto ensurethatallparticipantsaresynchronized,forexamplewhentheuserreleases theslideronthepaneltosetanalvalue. Hence,eveninthisrelativelysimpleapplicationweseeaneedfortensofows(ifmultiplecollaboratorsareparticipating)withwidely varyingcharacteristics.otherapplicationscan placeyetmorecomplexdemandsonacommunicationsinfrastructure.forexample,defanti andstevensidentifynineowtypesincollaborativedesignapplications[9].

4 3Nexus Theprecedingsectionoutlinesthewidevarietyofcommunicationmodalitiesthatmust besimultaneouslysupportedinanadvanced networkapplicationsuchasthecmtcollaborativeanalysisandvisualizationsystem.in general,weobservethatthelow-levelmethod usedtoachieveacommunicationcanvaryaccordingtowherecommunicationisbeingperformed,whatisbeingcommunicated,orwhen communicationisperformed[10]. Currently,developersofsuchapplications mustprogramtoavarietyofapisforthese variousows(e.g.,tcpsockets,ipmulticast, reliablemulticastlibraries,mpi)andmust knowmyriaddetailsabouteachapiinorder toachievegoodperformance(e.g.,tcpsocket buersizes).thisburdenwillonlyincreaseas theseapplicationsaddsuchfeaturesassecurity andnetworkqualityofservice. Webelievethatthesolutiontothisproblemistoallowfortheseparatespecication ofthecommunicationstructureofanapplicationandthemethodsusedtoachievethat communication.thenexuscommunicationlibrary[11,10]representsbothanambitiousexperimentinthisregardandasubstantialsoftwaresystemthathasbeenusedinmanytool developmentandapplicationprojects,rangingfromparallellanguagecompilerstohighlevelcommunicationlibrariesanddistributed performanceprolingsystems.nexusalso servesasthecommunicationcomponentofthe Globustoolkit. Nexusprovidessimple,generalwaysforexpressingcommunication,basedontheabstractionsofstartpoints,endpoints,communication links,andremoteservicerequests.theseabstractionsareabletoexpressthewidevarietyofcommunicationmodalitiesdescribed above.thenexusimplementationmapsthese abstractionsontoawidevarietyofunderlying communicationmethods. Nexusprogramsbindcommunicationstartpointsandendpointstoformcommunication links.ifmultiplestartpointsareboundtoan endpoint,incomingcommunicationsareinterleaved,inthesamemannerasmessagessent tothesamenodeinamessagepassingsystem.ifastartpointisboundtomultipleendpoints,communicationresultsinamulticast operation.astartpointcanbecopiedbetween processors,causingnewcommunicationlinks tobecreatedthatmirrorthelinksassociated withtheoriginalstartpoint.hence,startpoints canbeusedasglobalnamesforobjectsthat canbecommunicatedandusedanywhereina distributedsystem. Acommunicationlinksupportsasingle communicationoperation:anasynchronousremoteservicerequest(rsr).anrsrisapplied toastartpointbyprovidingaprocedurename andadatabuer.foreachendpointlinked tothestartpoint,thersrtransfersthedata buertotheaddressspaceinwhichtheendpointislocatedandremotelyinvokesthespeciedprocedure,passingtheendpointandthe databuerasarguments.alocaladdresscan beassociatedwithanendpoint,inwhichcase startpointsassociatedwiththeendpointcanbe thoughtofas\globalpointers"tothataddress. Anadvantageofthestartpointconstructin adistributedcomputingenvironmentisthat thestartpointcanbeusedtoencapsulatenot onlyinformationaboutwherecommunication shouldbeperformed,butalsohowtocommunicate.dierentcommunicationmethodscan beassociatedwithdierentcommunication links,withselectionbeingeitherautomaticor userguided.thecommunicationmethodscurrentlysupportedbynexusarelistedintable1. Inaddition,amessagetransform,orlter, canbeappliedtoeachcommunicationlink. Thisfeatureallowsoperationssuchascompression,encryption,andprolingtobespecied andperformedonaper-linkbasis. OurexperienceisthattheNexusabstractionscapturenicelynumerouscommunication structuresandmapcleanlyontoavarietyof underlyingprotocolsandcapabilities(e.g.,securityandqualityofservice).theonelimitationofwhichweareawarerelatestosupport formulticastcommunication.thenexusapi forcreatingstartpointsandendpointsiscurrentlybettersuitedforthecreationofunicast

5 Table1:CommunicationmethodssupportedbyNexus Name Description Local Reliableorderedunicastwithinasingleprocess SysV Reliableorderedunicastbetweenprocesses onthesamecomputer,viasystemvsharedmemory MPI/MPL/INXReliableorderedunicastbetweenprocesseson dierentnodesofasingledistributed-memorycomputer, vialow-levelcommunicationlibraries TCP Reliableorderedunicast UDP Unreliable,unorderedororderedunicast IPmulticastUnreliable,unorderedororderedmulticast XTP Reliable,source-orderedmulticast Totem Reliable,totallyorderedmulticast communicationthanformulticastcommunication.inparticular,thereiscurrentlynowayto directlybindastartpointtomulticastgroup. Instead,onemustrstcreateanendpointthat isboundtothemulticastgroup,andthenbind astartpointtothatendpoint.thiscanbeannoyingforprocessesthatonlywanttosend toaparticularmulticastgroup.thisproblem canbecorrectedbyaddingthecommunication linkmanagementtotheapiandthenallowing startpointsandendpointstodirectlybindto thecommunicationlink.therefore,multicast communicationwouldbesetupbycreatinga communicationlinkwithmulticastproperties andbybindingoneormorestartpointsand endpointstothatcommunicationlink. 4CIFCommLibrary WhileNexusdemonstratesthatauniforminterfacecanbeconstructedforavarietyofprotocolsandmessaginglibraries,thisinterface (whichwasoriginallydesignedforusebycompilers)istoolowlevelforallbutthemost expertprogrammer.hence,inamorerecent projectwehavedevelopedahigher-levelinterfacethatmakesthesameprotocolsavailable inamoreconvenientform.thisinterface,developedaspartofthedoe2000collaboratory InteroperabilityFramework(CIF)project,is termedcifcomm. TheCIFCommdesignemploysobjectorientedconceptsasameansofencapsulating protocoldetails.theinterfaceconsistsofthree coreclasses:abstractconnectionandlistener classes,andafactoryclasstoinstantiatethem. Theabstractconnectionclassprovidesa simpleinterfaceforsendingandreceivingmessages.itisfromthisclassthatallprotocolspecicconnectionclassesarederived.as theclassnameandcapabilitiesimply,eachof theprotocol-specicimplementationsprovide aconnection-oriented,message-passingstyle viewofthecommunicationirrespectiveofthe underlyingprotocol.hence,applicationscan switchbetweendierentprotocolssimplyby instantiatingadierentclass. Theabstractlistenerclassallowstraditional client-serverapplicationstoimplementserversidefunctionalityusingcifcomm.oncea classhasbeeninstantiated,thelistenerwaits forconnectionrequestsfromremoteconnectionobjects.theseconnectionrequestsare transformedintolocalconnectionobjectswhen theapplicationrequeststhenextincomingconnectionfromthelistener. Inreality,anapplicationneverinstantiates aprotocol-specicconnectionorlistenerclass. Instead,itmakesarequesttothefactoryclass, whichperformstheinstantiationonitsbehalf.tofacilitateprotocolindependenceinthe factory,allrequestsaremadeusingurlsin whichtherstcomponentspeciestheproto-

6 coltobeused.thisprotocolinformationis usedtoinstantiatethecorrectconnectionor listenerclass,whichisthenpassedtheremainderoftheurl. Atpresent,bothC++andJavabindings havebeenimplementedforthecifcomminterface,supportingtcp,udp,ipmulticast, andtotem.inaddition,xtpissupportedin thec++implementationandwillsoonbesupportedinjavaaswell.withtheseprotocols, theapplicationhasthefullcrossproductof reliable/unreliableandunicast/multicastcommunicationavailabletoit. Todate,CIFCommhasbeenusedintwo applications:amulti-usercameracontroller systemdevelopedbydebagarwalatlawrence BerkeleyNationalLaboratoryandtheCIF SharedStatelibrary(describedbelow),afundamentalpieceoftheCMTapplication. 5CIFSharedStateLibrary Collaborativeapplicationsrequiremechanisms formaintainingandsynchronizingupdatesto theshareddataelementsthatrepresentsthe stateoftheworldinwhichcollaborationoccurs.forexample,inthecmtdataanalysis systemthissharedstateincludesthevarious controlsfortheremotevisualizationsystem: pointofview,colormap,andsoforth.wehave usedcifcommtoimplementashared-state abstractionlibrary,cifsharedstate,which wasthenusedtoimplementthecmtcollaborativedataanalysissystem. TheSharedStatecomponentofCIFallows forsharedcontrolofabstractstatesincollaborativespaceacrossmultipleplatforms.aninitialimpetusforthecreationoftheshared-state librarywastoallowforsharedcontrolof\widgets"acrossdierentcomputerarchitectures andlanguages.(othersystems,inparticular NCSA'sHabanero,supportashared-stateabstraction,butonlywithinaJavaframework.) Ifsharedcontrolofsliders,buttons,andother arbitrarycomponentscouldbeestablished,a graphicalprogramrunningonahigh-endresourcecouldbecontrolledremotelyfroma simpler,moreaccessiblecomputer.thecmt collaborativevisualizationapplicationusesthe CIFSharedStateLibrarytodojustthat. TheCIFSharedStatelibraryisanobjectorientedAPIwithbothC++andJavaimplementationsthatallowsforsharedcontrol ofabstractstates.(ajavaimplementation isprovidedforportabilityandac++implementationforuseonhigh-endplatformsandin C-basedapplications;acommonNexus-based wireprotocolallowsforinteroperability.)the abstractstatescanbeimplementedasgui components(sliders,buttons,toggles)ormore simplyasarraysofdataprimitives(integers, oatingpointnumbers,bytes).tocreatea sharedstate,theuserneedsonlytoprovidea mechanismforpackingandunpackingitscurrentvaluesintoacifsharedstate\serial" objectviaconvenientmethodsprovidedbythe API. Theuseofshared-stateinformationrather thancollectivecontrolfunctionsasourbasicprimitiveprovedextremelyeectiveinthe CMTapplication.Wewereabletocreateunorthodoxvisualcomponentsthatprovidedno controltotheuserbutwereusedtodisplay usefulinformation,suchashistogramgraphs, colorbandwidthltercurves,andimagesof alloftheuserscurrentlyparticipatinginthe collaborativesession.thislayerofabstraction betweenshareddataandvisualcontrolalsoallowedustocoupledierentvisualcomponent packageswiththemessagingstructure:ajavabasedcontrolguifordesktopclientsandaset of3-dwidgetsforuseinthecave. 6Conclusions Emergingnetworkedapplicationsinvolvemultipleowswithdierentandtime-varyingrequirementsforlow-levelprotocols,security, performance,andsoon.wehavearguedthat thecommunicationservicesthatweprovide tosupporttheseapplicationsneedtorecognizethisfactandprovideexplicitsupportboth fortheseparatespecicationofcommunicationowandcommunicationmethodandfor

7 themanagementofensemblesofowsinan integratedfashion.wehavedescribedthree softwaresystemsthatwehavedevelopedto addresstherstoftheseconcerns,namely, thenexuscommunicationlibraryandthecif CommandCIFSharedStatelibraries.Applicationexperienceswiththesesystemsindicate thattheseparatespecicationofcommunicationsstructureandmethodisindeeddesirable. Infuturework,wewilladdresstheassociation ofquality-of-serviceattributeswithowsand themanagementofowensembles. Acknowledgments Wegratefullyacknowledgethemanycolleagues whohavecontributedtothedevelopmentof Nexus,theCIFlibraries,andtheCMTapplication,inparticularGregorvonLaszewskiand SteveWangatArgonne;CarlKesselmanand MeiSuatUSC/ISI;DebAgarwalatLBNL; andbrucemahatsnl/ca.thisworkwas supportedinpartbythemathematical,information,andcomputationalsciencesdivision subprogramoftheoceofcomputationaland TechnologyResearch,U.S.DOE,underContractW Eng-38;byDARPAundercontractN C-8523;andbyNSF. References [1]C.ShawandM.Green.TheMR toolkitpeerspackageandenvironment.in ProceedingsoftheIEEEVirtualReality AnnualInternationalSymposium.IEEE ComputerSocietyPress,1993. [2]K.Birman.Theprocessgroupapproach toreliabledistributedcomputing.communicationsoftheacm,36(12):37{53, [3]C.CarlssonandO.Hagsand.DIVEamulti-uservirtualrealitysystem.In ProceedingsoftheIEEEVirtualReality AnnualInternationalSymposium.IEEE ComputerSocietyPress,1993. [4]J.Mandeville,J.Furness,andT.Kawahata.Greenspace:Creatingadistributed virtualenvironmentforglobalapplications.inproceedingsoftheieeenetworkedvirtualrealityworkshop.ieee ComputerSocietyPress,1995. [5]M.Roussos,A.Johnson,J.Leigh, C.Valsilakis,C.Barnes,andT.Moher. NICE:Combiningconstructionism,narrative,andcollaborationinavirtuallearningenvironment.ComputerGraphics, 31(3):62{63,August1997. [6]M.MacedoniaandM.Zyda.Ataxonomyfornetworkedvirtualenvironments. InProceedingsofthe1995Workshopon NetworkedRealities [7]I.FosterandC.Kesselman,editors.The Grid:BlueprintforaFutureComputing Infrastructure.MorganKaufmannPublishers,1999. [8]G.vonLaszewski,I.Foster,J.Insley,J.Bresnahan,C.KesselmanM.Su, M.Thiebaux,M.Rivers,I.McNulty, B.Tieman,andS.Wang.Real-timeanalysis,visualization,andsteeringofmicrotomographyexperimentsatphotonsources. InProceedingsoftheNinthSIAMConferenceonParallelProcessingforScientic Computing.SIAM,1999. [9]T.DeFantiandR.Stevens.Teleimmersion.In[7],pages131{156. [10]I.Foster,J.Geisler,C.Kesselman,and S.Tuecke.Managingmultiplecommunicationmethodsinhigh-performance networkedcomputingsystems.journal ofparallelanddistributedcomputing, 40:35{48,1997. [11]I.Foster,C.Kesselman,andS.Tuecke. TheNexusapproachtointegratingmultithreadingandcommunication.JournalofParallelandDistributedComputing,37:70{82,1996.

John Bresnahan, Ian Foster, Joseph Insley, Brian Toonen, Steven Tuecke. analysis system, streaming video for image rendering

John Bresnahan, Ian Foster, Joseph Insley, Brian Toonen, Steven Tuecke. analysis system, streaming video for image rendering Communication Services for Advanced Network Applications John Bresnahan, Ian Foster, Joseph Insley, Brian Toonen, Steven Tuecke Mathematics and Computer Science Division Argonne National Laboratory Argonne,

More information

2015-10-22 19:22:59 Report Generated: 10/22/2015 20:03 UTC. CPU Intel Xeon E5-2670 v2 2.50GHz Connections 1 Mean Jitter 10/22/15 1

2015-10-22 19:22:59 Report Generated: 10/22/2015 20:03 UTC. CPU Intel Xeon E5-2670 v2 2.50GHz Connections 1 Mean Jitter 10/22/15 1 2015-10-22 19:22:59 Report Generated: 10/22/2015 20:03 UTC Page 1 of 10 Provider Amazon Web Services Test Protocol TCP Mean Bandwidth Service Amazon EC2 Direction Up Median Bandwidth Region us-west-2 Duration

More information

for Advanced Network Applications

for Advanced Network Applications \ 4 Communication Services for Advanced Network Applications The submitted manuscript has been createc by the University of Chicago as Operator O( Argonne National Laboratory ( Argonne ; under Contract

More information

SoftwareDefinedNetworking: Bridgingthegapbetweendistributed-systemsand networked-systemsresearch

SoftwareDefinedNetworking: Bridgingthegapbetweendistributed-systemsand networked-systemsresearch SoftwareDefinedNetworking: Bridgingthegapbetweendistributed-systemsand networked-systemsresearch PaulMueller IntegratedCommunicationSystemsLab.(ICSY) UniversityKaiserslautern PaulEhrlichStreetBld.34 67663Kaiserslautern

More information

MilsVPN VPN Tunnel Port Translation. Table of Contents...1 1. Introduction...2 2. VPN Tunnel Settings...2

MilsVPN VPN Tunnel Port Translation. Table of Contents...1 1. Introduction...2 2. VPN Tunnel Settings...2 Page 1 of 8 Table of Contents Table of Contents...1 1. Introduction...2 2. VPN Tunnel Settings...2 2.1 VPN Settings...2 2.2 MilsVPN Service Properties...3 3. Service Object Creation...3 4. Firewall rules

More information

Network Management. Simulation can use real network data and execute near its origin. Adaptable monitoring improves scalability and flexibility

Network Management. Simulation can use real network data and execute near its origin. Adaptable monitoring improves scalability and flexibility ANCORS:AdaptableNetworkCOntrolandReporting SRI-CSL-98-01 System LivioRicciulli,PhillipPorras,NachumShacham March19,1998 agement,activenetworking,anddistributedsimulationinauniedparadigmtoassist intheassessment,control,anddesignofcomputernetworks.thispaperexplores

More information

1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5

1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5 Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound

More information

Configuring Windows Firewall for Remote Connection in Windows XP SP2:

Configuring Windows Firewall for Remote Connection in Windows XP SP2: Configuring Windows Firewall for Remote Connection in Windows XP SP2: Follow these steps to configure the new Windows XP SP2 Firewall to allow you to connect from a remote location: Note: this should be

More information

Centerity Monitor. Technical Guide: Centerity VCE VBlock Monitoring V6.15

Centerity Monitor. Technical Guide: Centerity VCE VBlock Monitoring V6.15 Centerity Monitor Technical Guide: Centerity VCE VBlock Monitoring V6.15 2 OVERVIEW Centerity provides next-gen, end-to-end IT monitoring and Business Service Management (BSM) support for VCE s converged

More information

How To Monitor Network Traffic On A Cell Phone

How To Monitor Network Traffic On A Cell Phone Location-aware Network Monitoring using IPFIX/NetFlow Abdelkader Lahmadi Julien Vaubourg Olivier Festor Université de Lorraine Rick Hofstede Aiko Pras University of Twente NMRG meeting July 30, 2013 (compiled

More information

How to Make the Client IP Address Available to the Back-end Server

How to Make the Client IP Address Available to the Back-end Server How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Build and run online Unity 3D games for FREE!

Build and run online Unity 3D games for FREE! Build and run online Unity 3D games for FREE! What is Game Cloud Continental? GCC is next generation Unity based cloud platform built on.net 4.5. Unlike any other solution we provide not just simple messaging

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Cisco Application Control Engine in the Virtual Data Center

Cisco Application Control Engine in the Virtual Data Center Cisco Application Control Engine in the Virtual Data Center Q. What is Cisco Application Control Engine (ACE) the Virtual Data Center (AVDC)? A. AVDC is a solution that focuses on integrating key data

More information

Yale Software Library http://www.yale.edu/software/

Yale Software Library http://www.yale.edu/software/ e/ Yale Software Library http://www.yale.edu/software/ For assistance contact the ITS Help Desk 785-3200, 432-9000, helpdesk@yale.edu Windows XP Firewall Windows XP SP2 includes the new Windows Firewall,

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast. Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport

More information

Cisco Data Centre: Introducing Cisco Data Center Networking

Cisco Data Centre: Introducing Cisco Data Center Networking coursemonster.com/uk Cisco Data Centre: Introducing Cisco Data Center Networking View training dates» Overview In the Introducing Cisco Data Center Networking training course, delegates will learn to:â

More information

Network performance in virtual infrastructures

Network performance in virtual infrastructures Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso

More information

Building Applications With Sockets

Building Applications With Sockets C C Building Applications With Sockets Topics & Goals: Sockets mechanism & its use App layer design & implementation principles Building applications using sockets D Sockets: Unifying Transport API Simplify

More information

Kollective Technology Overview

Kollective Technology Overview Kollective Technology Overview HOW IT WORKS As enterprise networks have grown in size, complexity and importance, corporate IT often struggles to keep up with the pace of change. Traditional networks,

More information

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall 70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow

More information

Basic instructions for configuring PPP MSSQL Express Firewall Settings for Server 2008 and Windows 7 Operating Systems

Basic instructions for configuring PPP MSSQL Express Firewall Settings for Server 2008 and Windows 7 Operating Systems Basic instructions for configuring PPP MSSQL Express Firewall Settings for Server 2008 and Windows 7 Operating Systems Prerequisites and Assumptions: PPP, MSSQL Express and Pervasive 32-bit and/or 64-bit

More information

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs CONTENTS 1 Introduction... 2 2 Availability Level Objective Calculation... 2 3 Compute Platform on VDC... 2 3.1 Availability Level... 2 4 EBS Storage Platform on VDC... 3 4.1 Availability Level... 3 4.2

More information

State Health Repository Tool (SHRT) Testing Instructions

State Health Repository Tool (SHRT) Testing Instructions Step 1 - Access the SHRT State Health Repository Tool (SHRT) Testing Instructions 1. Close out any other open browsers. 2. Enter https://shrt.adp.com in the Address field of your browser and press Enter

More information

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs CONTENTS 1 Introduction... 2 2 Infrastructure Level Objectives... 2 2.1 Availability Calculation:... 2 3 Compute Platform... 2 3.1 Availability Level... 2 3.1.1 Availability Objectives... 2 3.1.2 Unavailability...

More information

F O U N D A T I O N. Using OPC via DCOM with Microsoft Windows XP Service Pack 2. Karl-Heinz Deiretsbacher, Siemens AG

F O U N D A T I O N. Using OPC via DCOM with Microsoft Windows XP Service Pack 2. Karl-Heinz Deiretsbacher, Siemens AG Using OPC via DCOM with Karl-Heinz Deiretsbacher, Siemens AG Jim Luth, ICONICS, Inc. OPC Foundation Technical Director Rashesh Mody, Invensys/Wonderware OPC Foundation Chief Architect Abstract The major

More information

Monitor network traffic in the Dashboard tab

Monitor network traffic in the Dashboard tab As a network analyzer (aka. packet sniffer & protocol analyzer), Capsa makes it easy for us to monitor and analyze network traffic in its intuitive and information-rich tab views. With Capsa's network

More information

Cisco Intercloud Fabric Security Features: Technical Overview

Cisco Intercloud Fabric Security Features: Technical Overview White Paper Cisco Intercloud Fabric Security Features: Technical Overview White Paper May 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of

More information

Kodo - Cross-platform Network Coding Software Library. Morten V. Pedersen - Aalborg University / Steinwurf ApS mvp@es.aau.dk

Kodo - Cross-platform Network Coding Software Library. Morten V. Pedersen - Aalborg University / Steinwurf ApS mvp@es.aau.dk Kodo - Cross-platform Network Coding Software Library Morten V. Pedersen - Aalborg University / Steinwurf ApS mvp@es.aau.dk Background Academia Network coding key enabler for efficient user cooperation

More information

DTK Overview. Zendesk Connector. Abstract DTK Zendesk connector overview and configuration document.

DTK Overview. Zendesk Connector. Abstract DTK Zendesk connector overview and configuration document. DTK Overview Zendesk Connector Abstract DTK Zendesk connector overview and configuration document. Contents... 0 DTK Overview... 2 DTK Zendesk Connector Configuration... 4 Automatic number identification

More information

Installation procedure for Chromis REC for 3CX

Installation procedure for Chromis REC for 3CX Installation procedure for Chromis REC for 3CX According to 3CX recommendations Chromis REC system should be installed on separate computer than 3CX Phone system due to necessary Microsoft SQL Server which

More information

Presented by Aurang Zeb 14CS-03. Network Management System

Presented by Aurang Zeb 14CS-03. Network Management System Presented by Aurang Zeb 14CS-03 Network Management System INTRODUCTION o We can define network management as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements.

More information

Special Note Ethernet Connection Problems and Handling Methods (CS203 / CS468 / CS469)

Special Note Ethernet Connection Problems and Handling Methods (CS203 / CS468 / CS469) Special Note Connection Problems and Handling Methods (CS203 / CS468 / CS469) Sometimes user cannot find the RFID device after installing the CSL Demo App and the RFID reader is connected. If user cannot

More information

How To Set Up Mybpx Security Configuration Guide V1.2.2 (V1.3.2) On A Pc Or Mac)

How To Set Up Mybpx Security Configuration Guide V1.2.2 (V1.3.2) On A Pc Or Mac) MyPBX Security Configuration Guide Version: V1.2 Date: October 15 th, 2012 Yeastar Technology Co., Ltd. http://www.yeastar.com 1/11 Contents 1. Security Configuration for Web GUI... 3 1.1 Change the default

More information

Firewall and Port Settings

Firewall and Port Settings Firewall and Port Settings If you re having trouble accessing the shares and accounts that have been created on your MSS II your firewall settings could be the problem. The firewalls job is to protect

More information

Firewall Access Request Form

Firewall Access Request Form SECTION 1 TO BE COMPLETED BY THE APPLICANT By completing the below information the requestor/applicant acknowledges and agrees that he/she has read, understood and will comply with the following: CHECK

More information

CA CPT CICS Programmers Toolkit for TCP/IP r6.1

CA CPT CICS Programmers Toolkit for TCP/IP r6.1 PRODUCT BRIEF: CA CPT CICS PROGRAMMERS TOOLKIT FOR TCP/IP CA CPT CICS Programmers Toolkit for TCP/IP r6.1 CA CPT CICS PROGRAMMERS' TOOLKIT FOR TCP/IP PROVIDES CICS PROGRAMMERS WITH AN EASY TO USE SET OF

More information

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program

More information

EXTENSIBLE AGENTS FACILITATE THE EXTENSION OF SNMP AGENTS WITH NEW MIB MODULES SEPARATE SNMP PROTOCOL ENGINE FROM MIB INSTRUMENTATION

EXTENSIBLE AGENTS FACILITATE THE EXTENSION OF SNMP AGENTS WITH NEW MIB MODULES SEPARATE SNMP PROTOCOL ENGINE FROM MIB INSTRUMENTATION UNIVERSITY OF TWENTE The SimpleWeb EXTENSIBLE AGENTS FACILITATE THE EXTENSION OF SNMP AGENTS WITH NEW MIB MODULES SEPARATE SNMP PROTOCOL ENGINE FROM MIB INSTRUMENTATION ALLOW DYNAMIC ADDITION OF NEW MIB

More information

Load Balancing SIP Quick Reference Guide v1.3.1

Load Balancing SIP Quick Reference Guide v1.3.1 Load Balancing SIP Quick Reference Guide v1.3.1 About this Guide This guide provides a quick reference for setting up SIP load balancing using Loadbalancer.org appliances. SIP Ports Port Protocol 5060

More information

How To Build An Internet Of Things (Iot)

How To Build An Internet Of Things (Iot) The Internet of Things: Devices, Avatars, Worlds, and APPs Tom Berarducci Director, Platform Product Mgmt Zebra Technologies Corp. Zebra Technologies Corp. Goal of the Internet of Things (IoT) A key goal

More information

Quantum Hyper- V plugin

Quantum Hyper- V plugin Quantum Hyper- V plugin Project blueprint Author: Alessandro Pilotti Version: 1.0 Date: 01/10/2012 Hyper-V reintroduction in OpenStack with the Folsom release was primarily focused

More information

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

SIP-H.323 Interworking

SIP-H.323 Interworking SIP-H.323 Interworking Phone (408) 451-1430 1762 Technology Drive Suite 124 Fax (408) 451-1440 San Jose CA 95110-1307 USA URL www.ipdialog.com Joon Maeng jmaeng@ipdialog.com SIP and H.323! IETF SIP! Session

More information

TREK GETTING STARTED GUIDE

TREK GETTING STARTED GUIDE TREK GETTING STARTED GUIDE September 2014 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 2 1.1 About TReK... 2 1.2 About this Guide... 2 1.3 Important

More information

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable

Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable Brocade Flow Optimizer Making SDN Consumable Business And IT Are Changing Like Never Before Changes in Application Type, Delivery and Consumption Public/Hybrid Cloud SaaS/PaaS Storage Users/ Machines Device

More information

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs

VDC SLA Annex Additional Terms for Virtual Data Centre - SLAs CONTENTS 1 Introduction... 2 2 Infrastructure Service Level Objectives... 2 2.1 Availability Calculation:... 2 3 Compute Platform... 2 3.1 Availability Service Level... 2 3.1.1 Availability Objectives...

More information

Technical Support Information

Technical Support Information Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband

More information

Generalised Socket Addresses for Unix Squeak 3.9 11

Generalised Socket Addresses for Unix Squeak 3.9 11 Generalised Socket Addresses for Unix Squeak 3.9 11 Ian Piumarta 2007 06 08 This document describes several new SocketPlugin primitives that allow IPv6 (and arbitrary future other) address formats to be

More information

IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.

IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd. IMF Tune Quarantine & Reporting Running SQL behind a Firewall WinDeveloper Software Ltd. 1 Basic Setup Quarantine & Reporting Web Interface must be installed on the same Windows Domain as the SQL Server

More information

ARM mbed IoT Device Platform. November 3 rd, 2014

ARM mbed IoT Device Platform. November 3 rd, 2014 ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the

More information

Firewalls. Firewall types. Packet filter. Proxy server. linux, iptables-based Windows XP s built-in router device built-ins single TCP conversation

Firewalls. Firewall types. Packet filter. Proxy server. linux, iptables-based Windows XP s built-in router device built-ins single TCP conversation Firewalls David Morgan Firewall types Packet filter linux, iptables-based Windows XP s built-in router device built-ins single TCP conversation Proxy server specialized server program on internal machine

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server Multihomed hosting 2011 IBM Corporation Multihoming allows you to have a single application communicate with different user agent clients and user agent servers on different

More information

Ethereal Lab: DNS PART 1. 1.Run nslookup to obtain the IP address of a Web server in Asia. I performed nslookup for www.rediff.com

Ethereal Lab: DNS PART 1. 1.Run nslookup to obtain the IP address of a Web server in Asia. I performed nslookup for www.rediff.com Ethereal Lab: DNS PART 1 1.Run nslookup to obtain the IP address of a Web server in Asia. I performed nslookup for www.rediff.com Screenshot taken after question 1 2. Run nslookup to determine the authoritative

More information

PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.

PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway. PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Published Date July 2015 Contents Executive Summary 3 Introduction

More information

M2M Series Routers. Port Forwarding / DMZ Setup

M2M Series Routers. Port Forwarding / DMZ Setup Introduction Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. Many internet services and applications use designated

More information

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)? Is it really necessary for the three ports mentioned in Troubleshooting (UDP 88, UDP 3074, and TCP 3074) to be opened for Xbox Live to work properly? Most cable/dsl routers implement Network Address Translation

More information

A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration

A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration Thomas Oistrez Research Centre Juelich Juelich Supercomputing Centre August 21, 2008 1 / 16 Overview 1 UNICORE

More information

Magnet Voice Windows PC Softphone Installation

Magnet Voice Windows PC Softphone Installation Magnet Voice Windows PC Softphone Installation Contents 1. Introduction 3 2. Installation 3 Step 1: Install the Software on your PC 4 Step 2: Input your registration details 4 3. Connected State 6 6. Port

More information

TREK GETTING STARTED GUIDE

TREK GETTING STARTED GUIDE TREK GETTING STARTED GUIDE February 2015 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 2 1.1 About TReK... 2 1.2 About this Guide... 2 1.3 Important

More information

Target Groups for Bachelor Projects

Target Groups for Bachelor Projects Kick-off meeting and presentation of project offers Bachelor- /Master Projects in WS 15/16 at Institute of Computer Engineering Thursday 22.10.2015 at 10:00 in BB 311 Target Groups for Bachelor Projects

More information

The MoCA CIS LIS WSDL Network SOAP/WS

The MoCA CIS LIS WSDL Network SOAP/WS MoCA/WS: A Web Service Personality of MoCA (Mobile Collaboration Architecture) Marcelo Malcher and Markus Endler Overview The main purpose of MoCA/WS is to allow non-java client programs to access and

More information

netflow-indexer Documentation

netflow-indexer Documentation netflow-indexer Documentation Release 0.1.28 Justin Azoff May 02, 2012 CONTENTS 1 Installation 2 1.1 Install prerequisites............................................ 2 1.2 Install netflow-indexer..........................................

More information

Software Defined Networking (SDN) Networking excellence Maniyan Sundaresan

Software Defined Networking (SDN) Networking excellence Maniyan Sundaresan Software Defined Networking (SDN) Networking excellence Maniyan Sundaresan Summary Software Defined Networking (SDN) is an emerging trend in today's networking industry. It is changing the way a network

More information

Configuring Health Monitoring Using Health Probes

Configuring Health Monitoring Using Health Probes CHAPTER10 Configuring Health Monitoring Using Health Probes This chapter describes how to configure a health probe on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains

More information

Splunk for.net Developers

Splunk for.net Developers Copyright 2014 Splunk Inc. Splunk for.net Developers Glenn Block Senior Product Manager, Splunk Disclaimer During the course of this presentahon, we may make forward- looking statements regarding future

More information

JGroups: : a Java system for communicating with a group of machines

JGroups: : a Java system for communicating with a group of machines Hello IP API JGroups: : a Java system for communicating with a group of machines Savaş Ali TOKMEN MSc in Computer Engineering UFR IMA, Grenoble, FRANCE 2006 - Savaş Ali TOKMEN JGroups - page 1 IP IP API

More information

LinuxCon Europe 2013. Cloud Monitoring and Distribution Bug Reporting with Live Streaming and Snapshots. mathieu.desnoyers@efficios.

LinuxCon Europe 2013. Cloud Monitoring and Distribution Bug Reporting with Live Streaming and Snapshots. mathieu.desnoyers@efficios. LinuxCon Europe 2013 Cloud Monitoring and Distribution Bug Reporting with Live Streaming and Snapshots mathieu.desnoyers@efficios.com 1 Presenter Mathieu Desnoyers http://www.efficios.com Author/Maintainer

More information

Remote Network Analysis

Remote Network Analysis Remote Network Analysis Torsten Hoefler htor@cs.tu-chemnitz.de (DMZ), mostly between two packet filters and application gateways. The different possibilities to connect DMZ-hosts are also shown in Figure

More information

to-end Packet Loss Estimation for Grid Traffic Monitoring

to-end Packet Loss Estimation for Grid Traffic Monitoring Passive End-to to-end Packet Loss Estimation for Grid Traffic Monitoring Antonis Papadogiannakis, Alexandros Kapravelos, Michalis Polychronakis, Evangelos P. Markatos Institute of Computer Science (ICS)

More information

PRACTICAL EXPERIENCES BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR. ` Mark Graham

PRACTICAL EXPERIENCES BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR. ` Mark Graham PRACTICAL EXPERIENCES OF BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR ` Mark Graham OUTLINE RESEARCH PROBLEM: Botnet detection in Cloud Providers FLOW: IPFIX and NetFlow CONCEPTUAL FRAMEWORK: Build

More information

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC

More information

Measuring Internet Experience from Home Networks. Renata Teixeira Muse Team Inria Paris-Rocquencourt

Measuring Internet Experience from Home Networks. Renata Teixeira Muse Team Inria Paris-Rocquencourt Measuring Internet Experience from Home Networks Renata Teixeira Muse Team Inria Paris-Rocquencourt Internet connectivity is central in today s homes 70% of broadband users under 35 get at least some of

More information

USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA

USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA CPSC 441 TUTORIAL JANUARY 30, 2012 TA: RUITING ZHOU The content of these slides are taken from CPSC 526 TUTORIAL by Nashd Safa (Extended and partially

More information

Citrix EasyCall Gateway Pre-Installation Checklist

Citrix EasyCall Gateway Pre-Installation Checklist Citrix EasyCall Gateway Pre-Installation Checklist This checklist is for EasyCall Gateway administrators. Information for telephony system integrators is provided in the EasyCall Gateway Telephony System

More information

Socket Programming. Srinidhi Varadarajan

Socket Programming. Srinidhi Varadarajan Socket Programming Srinidhi Varadarajan Client-server paradigm Client: initiates contact with server ( speaks first ) typically requests service from server, for Web, client is implemented in browser;

More information

Iperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH

Iperf Tutorial. Jon Dugan <jdugan@es.net> Summer JointTechs 2010, Columbus, OH Iperf Tutorial Jon Dugan Summer JointTechs 2010, Columbus, OH Outline What are we measuring? TCP Measurements UDP Measurements Useful tricks Iperf Development What are we measuring? Throughput?

More information

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions

More information

VPN: Installing the IPSec client

VPN: Installing the IPSec client IS1505 VPN: Installing the IPSec client Page 1 of 6 VPN: Installing the IPSec client This document outlines the process for installing and configuring the IPSec client on Windows 2000, XP and Vista User

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and 1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise

More information

HOWTO: Setting up WP7 monitoring tools with GLite

HOWTO: Setting up WP7 monitoring tools with GLite HOWTO: Setting up WP7 monitoring tools with GLite Paul Mealor October 2004 1 Downloads and installation 1.1 Unmodified WP7 work The EDG RPM repository can be reached from WP6 s website at http://marianne.in2p3.fr/.

More information

The Transport Layer. Antonio Carzaniga. October 24, 2014. Faculty of Informatics University of Lugano. 2005 2007 Antonio Carzaniga

The Transport Layer. Antonio Carzaniga. October 24, 2014. Faculty of Informatics University of Lugano. 2005 2007 Antonio Carzaniga The Transport Layer Antonio Carzaniga Faculty of Informatics University of Lugano October 24, 2014 Outline Basic concepts in transport-layer protocols Multiplexing/demultiplexing UDP message format Reliable

More information

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual

More information

Flexible Building Blocks for Software Defined Network Function Virtualization (Tenant-Programmable Virtual Networks)

Flexible Building Blocks for Software Defined Network Function Virtualization (Tenant-Programmable Virtual Networks) Flexible Building Blocks for Software Defined Network Function Virtualization (Tenant-Programmable Virtual Networks) Aryan TaheriMonfared Chunming Rong Department of Electrical Engineering and Computer

More information

Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses

More information

Springpath Data Platform with Cisco UCS Servers

Springpath Data Platform with Cisco UCS Servers Springpath Data Platform with Cisco UCS Servers Reference Architecture March 2015 SPRINGPATH DATA PLATFORM WITH CISCO UCS SERVERS Reference Architecture 1.0 Introduction to Springpath Data Platform 1 2.0

More information

Windows Sockets Network Programming

Windows Sockets Network Programming Windows Sockets Network Programming Bob Quinn Dave Shute TT ADDISON-WESLEY PUBLISHING COMPANY Reading, Massachusetts Menlo Park, California New York Don Mills, Ontario Wokingham, England Amsterdam Bonn

More information

Computer Networks. Examples of network applica3ons. Applica3on Layer

Computer Networks. Examples of network applica3ons. Applica3on Layer Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice

More information

MS Skype for Business and Lync. Integration Guide

MS Skype for Business and Lync. Integration Guide MS Skype for Business and Lync Integration Guide June 03, 2016 Contents Introduction 4 How to use StarLeaf with Microsoft Skype for Business 2015 Server 5 Pre-requisites 5 Step One: Federate between the

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

Polycom. RealPresence Ready Firewall Traversal Tips

Polycom. RealPresence Ready Firewall Traversal Tips Polycom RealPresence Ready Firewall Traversal Tips Firewall Traversal Summary In order for your system to communicate with end points in other sites or with your customers the network firewall in all you

More information

Non-authoritative answer: home.web.cern.ch canonical name = drupalprod.cern.ch. Name: drupalprod.cern.ch Address: 137.138.76.28

Non-authoritative answer: home.web.cern.ch canonical name = drupalprod.cern.ch. Name: drupalprod.cern.ch Address: 137.138.76.28 1. Run nslookup to obtain the IP address of a Web server in Europe. frigate:desktop drb$ nslookup home.web.cern.ch Server: 130.215.32.18 Address: 130.215.32.18#53 Non-authoritative answer: home.web.cern.ch

More information

Transport Layer. Chapter 3.4. Think about

Transport Layer. Chapter 3.4. Think about Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is

More information

UDR: UDT + RSYNC. Open Source Fast File Transfer. Allison Heath University of Chicago

UDR: UDT + RSYNC. Open Source Fast File Transfer. Allison Heath University of Chicago UDR: UDT + RSYNC Open Source Fast File Transfer Allison Heath University of Chicago Motivation for High Performance Protocols High-speed networks (10Gb/s, 40Gb/s, 100Gb/s,...) Large, distributed datasets

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

Configuration Notes 0215

Configuration Notes 0215 Mediatrix Digital and Analog VoIP Gateways DNS SRV Configuration for a Redundant Server Solution (SIP) Introduction... 2 Deployment Scenario... 2 DNS SRV (RFC 2782)... 3 Microsoft Server Configuration...

More information