Development of Dependable Web Services out of Undependable Web Components
|
|
|
- Jared Richardson
- 10 years ago
- Views:
Transcription
1 School of Computing Science, University of Newcastle upon Tyne Development of Dependable Web Services out of Undependable Web Components A. Gorbenko, V. Kharchenko, P. Popov, A. Romanovsky, A. Boyarchuk Technical Report Series CS-TR-863 October 2004 Copyright c 2004 University of Newcastle upon Tyne Published by the University of Newcastle upon Tyne, School of Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE 7RU, UK.
2 Development of Dependable Web Services out of Undependable Web Components A. Gorbenko V. Kharchenko P. Popov A. Romanovsky A. Boyarchuk National National City University University of National Aerospace Aerospace London Newcastle upon Aerospace University University Tyne University UK Kharkiv, Ukraine Kharkiv, Ukraine UK Kharkiv, Ukraine CONTENTS Introduction...2 i.. The Aim and Tasks...2 i.2. Structure of the Report...2 i.3. Glossary...2. Web Services and Dependability On Web Services Architectures Analysis of the Web Service Failures Web Security as an Attribute of WS Dependability On Dependable Web Service Composition Web Service Composition Actions Structured Approach to Web Service Development Elements of the Approach Ensuring Fault-Tolerance and Dependability Modelling of the Composite Web Services Dependability A General Approach to Modelling General Model Description Specification of the Composite WS Simulation Model Application of the General Model Assumptions and their Foundation Scheme of the Model and its Operation Input Data. Foundation of their Values Simulation Results Discussion On Dependability of Composite Web Services with Components Upgraded Online Upgrading problem of Composite Web Services First Upgrading Mode: Several Releases of the Same WS are Operational Second Upgrading Mode: Only the Latest Release of a WS is Operational Directions of Dependable Web Services Development Composing Dependable Web Services Out of Undependable Components Measures and Metrics of Web Services and Components Diversity as a Means of Improving Dependability of Web Services Adaptive Web Services Categorization of Requests and Procedures of their Accounting Structured Approach...32 Conclusions and Future Work...34 Acknowledgments...35 References...35
3 Introduction i.. The Aim and Tasks The aim of this work is to develop novel approaches to constructing and modelling dependable Web Services (WSs) built out of Web Components that can be undependable. To achieve this aim we have been working on the following tasks: Analysing the WS failures modes and introducing a failure taxonomy; Analysing Web security as an attribute of WS dependability; Investigating a structured approach to the Web Service development that is based the Web Service Composition Actions (WSCA) scheme; Proposing an event-driven simulation model of the Composite WSs; Analysing the WS upgrading problem and developing schemes for WSs online upgrade; Outlining future directions of WSCA-based systems development focusing specifically on the means for dependability achievement and assessment. i.2. Structure of the Report This report consists of three parts and five sections. Section introduces the Web Service architecture, attributes of Web Service dependability and the general problem of dependable Web Services development. A structured approach to the Web Service development based on the Web Service Composition Action technique developed earlier is proposed in section 2. Section 3 describes our approach to the Composite Web Services modelling and obtained simulation results. Section 4 describes solutions to solve problem of online Web Services upgrading. In Section 5 we propose actual approaches to Web Services development and measuring of the WSs dependability. i.3. Glossary WS web service; CtWS composite web service; CnWS component web service; CA-actions coordinated atomic actions; WSCA web service composition action; NA nested action; OTS components - off-the-shelves components; AR arrived request (request arriving from the users to the WS); DS dedicated server; RMD radial metrics diagram. 2
4 . Web Services and Dependability.. On Web Services Architectures The Web Service architecture [Ferguson et al 2003] is rapidly becoming a de facto standard environment for achieving interoperability between different software applications running on a variety of platforms. This architecture supports development and deployment of open systems in which component discovery and system integration can be postponed until the systems are executed. The individual components (i.e. Web Services WSs) advertise their services via a registry (typically developed using the UDDI standard ) in which their descriptions, given in a standard XML-based language called Web Service Definition Language (WSDL 2 ), can be looked up. After a WS capable of delivering the required service, has been found it can be used or even dynamically integrated into a Composite WS. Developing the WS architecture is in effect a further step in the evolution of the well-known component-based system development techniques supporting the integration of the off-theshelves (OTS) components. The main advances enabling this architecture have been made by the standardisation of the integration process (of a set of interrelated standards such as SOAP, WSDL, UDDI, etc.). WSs are the OTS components for which a standard way of advertising their functionality has been widely adopted. The WS architecture is now extensively used in developing various critical applications such as banking, auctions, internet shopping, hotel/car/flight/train reservation and booking, e- business, e-science, business account management. This is why ensuring dependability in this architecture is an emerging area of research and development [Ferguson et al 2003], [Tartanoglu et al 2003]. The challenge here is posed by the specific characteristics of this architecture, including its openness, heterogeneity of components and platforms, asynchronous nature of communication and autonomy of components. In addition to that, the components to be integrated are ready-made black boxes of unknown quality, which belong to different organizations and are outside of the control of the systems using them. Dependable WS composition is an emerging area of research. Paper [Tartanoglu et al 2003] analyses several existing approaches to incorporating fault tolerance measures (including both, backward and forward error recovery mechanisms) into the Composite WS
5 .2. Analysis of the Web Service Failures The web service dependability consists of several constituents. First of all these are: reliability, security, performance/responsiveness. For the e-commerce, in particular, the serviceability describing the user s satisfaction and the availability of the required services is an important characteristics. Performance and responsiveness undoubtedly are the important characteristics, but it is easy to provide them using the parallel computing (web-cluster) and hardware upgrading (but this is outside of the scope of this report). In this section we will focus on web service reliability and security which are very challenging problems. We have developed a new failure taxonomy (Fig..) to be used in analysing possible web service failures by studying the existing work [Avizienis et al 2002], [Chandra et al 2000], [Deswarte et al 998]. This taxonomy differs from the work [Chandra et al 2000], [Deswarte et al 998] that views the failures of the WSs from the point of view of the developers and the end-users. Our classification will help in defining the necessary fault-tolerance means for specific failure modes. This taxonomy allows us to define all possible failures modes. which are shown on the Fig..2 as a failure mode graph. This graph can be presented as a matrix (see Table.). Its columns correspond to the different graph paths. The symbol at the intersection of i-th row and j-th column of matrix means that the i-th classification attribute is applied for the j-th failure mode. The simulation model of the Composite Web Service (see section 4) can be refined taking into account the modes of failures and the possible fault-tolerance techniques. Note that the proposed taxonomy does not specifically address the problems of WS security, which is clearly a very important area of R&D. 4
6 Failure specification criterions Failure species Failure dependence Environment-dependent failures Application-specific failures Hardware (HW) environment Application software Failure source Web-server (WS) Software(SW) environment Operation System (OS) Software services Application server (AS) DBMS Servlets and CGI applications DB stored procedures and triggers Stability of occurrence Permanent Transient Influence on system and its components Crash of HW or SW components (OS, services or application ) Suspension of HW or SW Deny of service without pernicious influence Means for failure effect recovery Recovery or reinstall of HW, or SW components Data recovery Restart of HW or SW components No means Fault-tolerance means Replication of SW environment Redundancy of HW environment Data Replication Diversity of SW environment N-version programing Operation retry with rollback recovery block (time redundancy) Diversity of application SW N-self-checking programing Application specific error exception handling Fault-tolerance and failure recovery means Fig... Failure taxonomy 5
7 Failure specification criterions Web-service failures Failure dependence Environment-dependent failures Application-specific failures HW environment SW environment Application software Failure source OS SW services Web-server Application server DBMS Servlets and CGI applications DB stored procedures and triggers Stability of occurrence Transient Permanent Transient Permanent Transient Permanent Transient Permanent Transient Influence on system and its components Crash of HW environment Crash of SW environment Stored data loss Session data loss Crash of HW environment OS suspension Session data loss OS suspension Session data loss Application error without pernicious influence Crash of SW environment Stored data loss Session data loss OS suspension Application error without pernicious influence Application error without pernicious influence Suspension of SW services with or without application Crash of SW application Session data loss Session data loss Stored data loss Session data loss Application error without pernicious influence Suspension of SW application Session data loss Application error without pernicious influence 6 Means for failure effect recovery Replacement of crashed HW component Reinstall SW components Stored data recovery Replacement of crashed HW component Session data recovery Restart of HW/SW environment Session data recovery No means Reinstall SW of environment Stored data recovery Session data recovery Restart of HW/SW environment Session data recovery No means No means Restart of SW services with or without application Session data recovery Reinstall of SW application Stored data recovery Session data recovery No means Restart of SW application Session data recovery No means Session data recovery Fault-tolerance means Redundancy of HW environment Replication of SW environment Data replication Operation retry with rollback recovery block Redundancy of HW environment Diversity of SW environment Data replication Operation retry with rollback recovery block Application specific error exception handling Diversity of application software Data replication Operation retry with rollback recovery block Fig..2. Failure mode graph
8 Table.. Matrix of the failure modes 7 Failure Failure modes classification Failure mode classification attributes criteria Failure Environment-dependent failures dependence Application-specific failures Hardware (HW) environment Operation System (OS) Web-server Software Application services server Failure source Software (SW) environment DBMS Application Servlets and CGI applications software DB stored procedures and triggers Stability of Permanent occurrence Transient Influence on system and its components Means for failure effect recovery Fault-tolerance means HW environment Crash of SW environment DB stored procedures Halt of Operation System Web-system Suspension SW service of Application software Loss of Stored data Session data No pernicious influence Replacement of crashed HW components Reinstall of SW components Recovery of Stored data Session data OS Restart of Software services Application software No special means Redundancy of HW environment Replication of SW environment Data replication Diversity of SW environment Diversity of application software Operation retry with rollback recovery block (time redundancy) Application specific error exception handling
9 .3. Web Security as an Attribute of WS Dependability Security is one of the most important characteristics of WSs and it should be addressed during the design and implementation of the components of the WS architecture. A key benefit of the emerging WS architecture is the ability to deliver interoperable solutions. Ensuring the integrity, confidentiality and security of Web Services through the application of a comprehensive security model is critical, both for organizations and their customers. IBM, Microsoft, and other companies have proposed several new specifications 3 to provide the foundation upon which the secure interoperable Web Services can be established: WS-Security Policy provides a framework for defining security, privacy, and other policies on machines involved in Web Services transactions. WS-Privacy implements privacy policies that WS-Security Policy defines and lets Web Services providers and users state privacy preferences and practices. WS-Trust provides a framework of models for establishing both direct and brokered trust relationships for secure Web Services interoperation. WS-Authorization defines how Web Services manage authorization policies. Web service security is expansive direction especially in the area of e-commerce application. Providing security policy in e-commerce can be divided into two directions: reducing the risks of resource provider and of the customer. The main customer s risks are: threat of disclosure of private data (name, address, credit card number etc) by violator; threat of payment for non-booked services ordered by violator through wiretapping and modification of transferred requests. Owner s risks include: wiretapping of confidential information by violator; getting an access to the confidential information (reading and modification) by violator; getting an access to unpaid service or to the service more expensive than one was paid; customer demands a repayment after service utilization because allegedly hi booked nothing. 3 Security in a Web Services World: A Proposed Architecture and Roadmap // A joint security whitepaper from IBM Corporation and Microsoft Corporation. April 7, 2002, Version
10 The threats mentioned above can be tolerated by using various existing techniques and means (see Table.2). Table.2. Security guard means Security guard means Access rights control Data encrypting Digital signature Organization methods Security threats Threat of disclosure of private data (name, address, credit card number, etc.) by violator Customer Threat of payment for non-booked services risks ordered by violator through wiretapping and modification of transferred requests Wiretapping of confidential information by violator Owner s risks Getting an access to the confidential information (reading and modification) by violator Getting an access to unpaid service or to the service more expensive than one was paid Customer demands a repayment after service utilization because allegedly hi booked nothing OS Web-server DBMS Scripts languages Asymmetrical Symmetrical Combined VeriSign certificates Electronic digital signature Physical delimitation of documents space The implementation of the mentioned means for the Composite Web Services has certain features. For example, the encoding methods can be implemented in the following way:. Different encoding methods (or one method with different secure keys) will be used for data encryption at the different levels of Composite Web Service. It will be beneficial to employ the cluster (multi-server) architecture of Composite WS, when each composite service runs at the distinct (maybe remote) server. But in this case the number of potential points for unauthorized access or document s integrity damage is increasing. So the use of this variant of encoding decreases the probability of decoding. 2. Different methods or the same methods of encoding (or one method with different secure keys) may be used for each Component WS. If the violator has decoded the data of one composite (or he has received the secure key) he will not able to decode the data of other Composite WS because it use the other encoding method (or secure key). Besides, within the Composite Web Services the access methods also can be improved. As a rule, the checking of the user s permissions executed once per session when hi registers at the system (or enters into the document space). But we have to remember such variant of user behavior when it seems that he is going to get the resource A but really he tries to get an access to the resource B. In other words, the registered user tries to get the resources 9
11 having no permissions for them. To prevent such situation the authorization system has to control the permissions not at user login but at the each level of Composite Web Service. Accordingly, we have to conduct the analysis and elaborate the information about the characteristics of the different threats, intrusions upon the Composite Web Service and its components to develop and introduce the services of monitoring for independent information processing. 2. On Dependable Web Service Composition 2.. Web Service Composition Actions In our previous work we have developed a structured approach to the composition of Web Services [Tartanoglu et al 2003]. Web Service Composition Actions (WSCA) allow Composite WSs to be structured in terms of coordinated atomic actions (CA-actions) [Xu et al 995] that have a well-defined behaviour, both in the absence and in the presence of service failures. This scheme supports forward error recovery by cooperative exception handling as the main means of providing fault tolerance. It relies on recursive system structuring during the system integration and allows each action to deliver a number of outcomes. When an exceptional outcome is reported all responsibility for the recovery is transferred to the higher level of in the system structure (the containing WSCA action) Structured Approach to Web Service Development Elements of the Approach The structured approach we are putting forward is based on the development of a Composite Web Service as a system built as a multilevel hierarchy with regular and nested recursive structure. The basic principles of the structured approach are as follow:. 2. Requests (ARs), arriving from the users to the Composite WS are the WSCAs at the top level of the hierarchy. There are several types of ARs to be processed by the Composite WS. Each of these requests is composed of several nested actions (NAs). The type of partial AR (WSCA, in the general case) depends on the number and the types of the nested actions. In turn, each of the NAs is a WSCA of the adjacent lower level, which also can be decomposed in several NAs, and so on as shown in Fig.2.. The Composite Web Service has a multilevel structure (Fig.2.2), which, as a whole, coincides with the WSCA nesting scheme. The Composite WS is a white box. It contains a number of Component Web Services (Component WS) that process separate parts of the arriving requests (i.e. a set of nested WSCAs). From this viewpoint on a 0
12 Composite WS any of the Component WSs is a black box. However, the Component WS inside also can be treated as a white box which in turn is composed of a number of Component Web Services at the next lower decomposition layer, and so on. Thus, at any decomposition level we can consider two alternative views on the structure: the white box one (j-th Composite WS of i-th level) and several black boxes (set of Component WS related to the i,j-th Composite WS), i.e. a Composite Web Service is structured in both the vertical and the horizontal directions, as shown in Fig Nesting Scheme of Web Services Composition Actions th level WSCA, Arrived Request of -th type... WSCA,n Arrived Request of n -th type 2 th level WSCA 2, WSCA 2,2 WSCA 2,n WSCA 2,n 2... k th level WSCA k, WSCA k,2 WSCA k,3... WSCA k,n k -2 WSCA k,n k - WSCA k,n k Fig. 2.. WSCA nesting scheme th level User Requests Composite Web Service WSCA,i Answer(WSCA,i ) Answers 2 th level Component WS 2, Composite WS 2, 3 th level Component WS 3, Component WS 3,n 3 Composite WS 3, Composite WS,n 3... Component WS 2,2... Component WS 2,n 2... k th level Component WS k,... Component WS k,i Component WS k,j... Component WS k,n k DBs DBs External resources and services Fig Structure of Composite Web Service
13 3. Generally, the Component WSs at the bottom of the hierarchy are the pre-developed services with known or predicted characteristics (reliability, security, dependability in general). New web services are built by various compositions out of these Component WSs. A partial Component WS is described by its functionality, i.e., realised function {F CnWS }, and a set of metrics {Met CnWS } which characterise this function (its reliability, security, execution time, etc.). A Component WS produces results V CnWS of two main types: a) success (Sc), b) failure (Fl). In some cases, a partial result (Pt) also can by provided as it is spelled out later. The value V i CnWS {Sc, Fl} depends on the values of the metrics {F i CnWS } and the individual parameters of the processed WSCA. The behaviour of a Component WS may in some cases depend on time as well. 4. To process WSCAs a Composite WS executes a number of corresponding operations by invoking one or several Component WSs and analysing their results. Inside a Composite WS there three types of results returned by a WSCA are defined V CpWS {Nr, Pt, Fl}: a) if all of the nested actions of a WSCA are processed successfully by the set of the Component WSs, then V CpWS = Nr; b) if not all of the nested actions of a WSCA are processed successfully, then V CpWS = Pt; c) if all of the nested actions of a WSCA are processed with failures, then V CpWS = Fl. The third type of result which can be returned by a WSCA, called here partial result depends on: a) the type and the individual parameters of the processed WSCA; b) the dependability characteristics of the Composite WSs c) the dependability characteristics of all the Component WSs involved in the processing of WSCA nested actions. During the development of a Composite Web Service, the designer decides which of the Component WSs to use depending on their functionality, dependability and other characteristics (such as performance, cost and time of development). The overall structure of the Composite Web Service will be defined by its granularity. 2
14 Ensuring Fault-Tolerance and Dependability The WSCA concept for tolerating faults is based on an application specific exception handling of two types: internal (i.e. inside the Component WS) and external (which require cooperative handling at the level of the Composite WS) exception handling. Besides, the dependability of the Composite Web Service may also be ensured by the following means: degree of redundancy of the WSCAs taking into account their characteristics; development technique of the Component and the Composite WS with the required functionality and dependability; development of special procedures supporting tolerance by the basic elements of the Composite WS to different failures (design, physical, interaction; software, hardware, malicious, etc); application of different kinds of redundancy, diversity on the different levels of Composite WS hierarchy. 3. Modelling of the Composite Web Services Dependability 3.. A General Approach to Modelling 3... General Model Description We use a two-level WSCA-based approach for the Composite WS modelling. At the first level, we have a Composite WS which processes the input request stream and returns answers to the answer stream. The arriving requests (WSCAs of first level) are decomposed into a number of nested WSCAs (WSCAs of first level). These nested WSCAs are then processed by the corresponding Component WSs. The logical subsystem (Fig.3.) of the simulation model defines the set of ARs to be processed by the Composite WS, the set of the nested WSCAs on which each of the ARs can be decomposed, and the set of the Component WSs that process the defined type of nested WSCAs. The physical subsystem (Fig.3.2) of the simulation model defines a relationship between the logical model and the overall hardware architecture. 3
15 th Level Requests stream AR i-th type Composite WS Answers stream Answer(AR i-th type ) 2 th Level WSCA Component Result(WSCA ) WS WSCA 2 Component Result(WSCA 2 ) WS 2... WSCA m Component Result(WSCA m ) WS m Fig. 3.. Logical model of Composite Web-Service th Level Requests stream AR i-th type Main Main Web-Server Composite WS Answers stream Answer(AR i-th type ) 2 th Level WSCA, WSCA 2 Component WS Component WS 2 Result(WSCA,WSCA 2 ) Dedicated Server... WSCA m Component WS m Dedicated Server s Result(WSCA m ) Fig Physical model of Composite Web-Service Each Component WS that processes only WSCAs of a specified type may be executed on a Dedicated Server (DS). In case, when all WSCAs are processed in parallel on different DSs the better throughput can be achieved. In other cases when several Component WSs are executed on the same server, WSCAs are processed in a parallel-sequential mode. The application logic of the Composite WS can affect the mode of request execution as well. The failures are simulated in the following way. At the second level of the model, the failures are represented as the situations in which the Component WS cannot deliver the service requested by WSCA cased by the following: 4
16 a) hardware faults; b) software faults; c) application-specific situations when Component WS cannot satisfy the WSCA requirements. In case of failure, the Component WS catches an exception and activates the error handling mechanism. As a result of error handling some of the failures will be tolerated inside the Component WS. The Composite WS will not even know about them (encapsulation of the internal behaviour). Thus, for the nested WSCA, which is processed by a Component WS two outcomes are possible: a) the WSCA is processed successfully (including the situations, when a failure occurred but was tolerated inside of Component WS). Component WS returns a normal result back to the Composite WS. b) the WSCA is processed with a failure not tolerated by the error handling inside of the Component WS. In this case, the Component WS raises an exception to the Composite WS. The failures at the top level of the model include the exceptions propagated by the Component WSs as well as the exceptions raised by the Composite WS itself when it detects own errors. These failures can also be tolerated using the error handling by the Composite WS. When the Composite WS fails to deliver the service required by an AR, it reports an exceptional outcome to the answer stream Specification of the Composite WS Simulation Model. There are several types of requests { } n i AR = AR i = to be processed by the Composite WS. The arriving requests can be decomposed into several nested WSCAs of different type WSCA = WSCAs. { WSCA } m j j =. The type of the AR defines the number and the types of the nested arr { } n i i Par = is a set of variables that specify the probabilities of AR of i-th type. Matrix ARxWSCA specifies the correspondence between the ARs and the WSCAs. The rows of this matrix are the set of ARs of different type. The columns are the 5
17 WSCAs of different type. The symbol at the intersection of i-th row and j-th column means that the j-th WSCAs is a part of AR of i-th type. The following variables specify the probabilities of various outcomes for each AR: o succ Par i - AR of i-th type processed with no failures (all of the nested WSCAs are processed successfully including the situations, when a failure occurred but was tolerated inside the Component WSs); o succ 2 Par i - AR of i-th type is processed with failures (one or several of nested WSCAs are processed with failures which were not tolerated inside the Component WSs), but the Composite WS tolerated them; o err Par i - AR of i-th type is erroneous (fully or partial) despite the error handling at both the Composite and the Component levels. The values of these variables depend on the AR type and on the outcomes of WSCAs on which a partial AR is decomposed. succ n { } = Tcri i is a set of variables which specify the mean time of successful processing of AR of i-th type. The values of these variables depend on the AR type, the outcomes of the WSCAs, on which the AR is decomposed, and the overall system architecture (in particular, on the available number of the Dedicated Servers). exc { } n i Tcri = is a set of variables which specify the additional time which a Composite WS spends on exception handling of AR of i-th type when failures are detected. { } m j 2. CnWS = CnWS j is a set of Component WSs that are used by the Composite WS to = provide the required service. Each of Component WSs processes one of the nested WSCAs of a certain type. The following variables specify the probabilities of different outcomes for each Component WS: succ Pcnws j is the probability that a Component WS of j-th type processes the corresponding WSCA without a failure; succ 2 Pcnws j - is the probability that a failure occurs during WSCA processing but it is tolerated inside the Component WS of j-th type; and err Pcnws j - is the probability that a non-tolerated failure occurs. 6
18 succ m { Tcnws j } j = Component WS of j-th type. exc m { } Tcnws j j= is a set of variables which specify the normal execution time for the is the set of variables which specify the additional time which a Component WS of j-th type spends on exception handling of a WSCA when a failure is detected. 4. There is a set of Dedicated Servers { } s k DS = DS k =, each of which can serve one or several Component WSs. A matrix DS*CnWS specifies the correspondence between the dedicated servers and the Component WSs. Its rows correspond to the set of DSs. The columns are the Component WSs of different type. The symbol at the intersection of k-th row and j-th column means that the k-th dedicated server serves the j-th Component WSs Application of the General Model In this section we demonstrate how the general model developed in section 3. can be instantiated and used for a specific target environment Assumptions and their Foundation We simulate a specific behaviour of a Composite Web Service under the following assumptions: the failures of the Component WSs occur when Component WSs fail to deliver the services that WSCAs require; these failures can be tolerated inside the Component WSs by the error handling. The probability of tolerating errors is given for each of the Component WSs; the time of error handling is equal to the normal (with no failures) execution time of the Component WS; when the Component WS cannot tolerate a failure, it reports an exception up to the Composite WS; the failures of the Composite WS are reported as exceptions propagated by them; the probability with which the Composite WS can tolerate these failures is proportional to the ratio between the number of nested WSCAs processed without failures by the Component WSs and the total number of nested WSCAs; 7
19 the time of error handling executed by the Composite WS is equal to the normal (with no failures) execution time of the arrived request; when the Composite WS cannot tolerate these failures, it reports an exceptional outcome to the answer stream Scheme of the Model and its Operation An event-driven simulation model (Fig. 3.3) of the Composite WS was developed to analyse its overall performance as a function of the number and characteristics of the Component WSs. CnCount ServCount ReqCount PCn[ ] TCn[ ] MReq[ ] PReq[ ] MServ[ ] Input data and settings Request random generation ReqNo Composite Web Service event-driven simulation model TReq CnOut[ ] ReqOut ReqStat ServLoad[ ] Statistical storage & Result analiser Fig Composite WS simulation schema The model is developed using the M-File programming and simulated in the MATLAB 6.0 environment. The input data and settings for the simulation are: CnCount is the number of WSCAs of different types (equal to the number of the Component WSs processing them); ReqCount is the number of different types of requests; ServCount is the number of DSs on which the Component WSs can be deployed; PCn[..CnCount,..3] is a matrix which specifies the probabilities of different outcomes of processing a WSCA (failure free, tolerated failure and non-tolerated failure) for each of the Component WSs; 8
20 TCn[..CnCount] is an array which specifies the execution time of processing a WSCA without failures for each of the Component WSs, in seconds; MReq[..ReqCount,..CnCount] is a matrix which specifies the set of arriving requests; PReq[..ReqCount] is an array which specifies the probabilities of arrival of the requests of each type; MServ[..ServCount,..CnCount] is an array which specifies the set of DSs. The simulation data and the recorded results are as follows: ReqNo is the type of the current arriving request (..ReqCount); TReq is the execution time for the arriving request, in seconds; CnOut[..CnCount] is an array which specifies the processing result of the nested WSCAs initiated by the arriving request: o 0 this WSCA is not executed (the arriving request does not require the WSCA); o WSCA executes without failures; o 2 WSCA executes with a failure but is tolerated by the error handling mechanism of the Component WS; o 3 WSCA executes with a failure which is not tolerated. ReqOut presents the detailed processing result of the arriving request: o all nested WSCAs are processed successfully; o 2 several nested WSCAs were processed with failure but all of them were tolerated because of error handling inside the Component WS; o 3 several nested WSCAs were processed with failure and despite the error handling not all of them were tolerated inside the Component WSs. However, the partially executed request was tolerated because of error handling of the Composite WS; o 4 several (or all) nested WSCAs were processed with failure and despite the error handling not all of them were tolerated inside the Component WSs. Besides, the partially executed request was no tolerated despite the error handling mechanism of the Composite WS; ReqStat execution outcomes of processing an arriving request (IF ReqOut = {,2,3} THEN ReqStat = ELSE ReqStat =0): 9
21 o the request is executed successfully (includes the situation when failures occurred, but they were tolerated inside the Component WSs or by the Composite WS); o 0 the request is executed with failures which were not tolerated. o ServLoad[..ServCount] array, which specifies the load time for each of the dedicated servers during the processing of an arriving request, in seconds Input Data. Foundation of their Values The results, represented in the next part, were obtained by simulation of a travel agency (TA) web-service which takes into account the results stated in [Tartanoglu et al 2003]. The next input data and settings were accepted for the TA simulation:. There are four types of Component WS (CnCount = 4): CnWS Booking of through ticket, that process WSCA Through ticket ; CnWS 2 Booking of back ticket, that process WSCA 2 Back ticket ; CnWS 3 Hotel reservation, that process WSCA 3 Hotel ; CnWS 4 Excursion order, that process WSCA 4 Excursion. 2. Because of error handling suppose that there are three possible outcomes for each of the composites: PCnWS probability that the Component WS processes WSCA without failure; PCnWS 2 probability that the Component WS 2 processes WSCA 2 with a failure tolerated by the error handling of Component WS 2 ; PCnWS 3 probability that the Component WS 3 processes WSCA 3 with a failure not tolerated by the error handling of Component WS 3. Suppose, that the probabilities of the different outcomes are defined for each type of Component WSs as follows: PCn (CnWS ) = 0.5; PCn 2 (CnWS ) = 0.25; PCn 3 (CnWS ) = 0.25; PCn (CnWS 2 ) = 0.5; PCn 2 (CnWS 2 ) = 0.25; PCn 3 (CnWS 2 ) = 0.25; PCn (CnWS 3 ) = 0.5; PCn 2 (CnWS 3 ) = 0.25; PCn 3 (CnWS 3 ) = 0.25; PCn (CnWS 4 ) = 0.5; PComp 2 (C 4 ) = 0.25; PComp 3 (C 4 ) = Thus, PCn = [0.5, 0.25, 0.25; 0.5, 0.25, 0.25; 0.5, 0.25, 0.25; 0.5, 0.25, 0.25]; 3. Suppose that the normal (with no failure) execution time of each Component WS are as follows: 20
22 T(CnWS ) = 0. sec; T(CnWS 2 ) = 0. sec; T(CnWS 3 ) = 0. sec; T(CnWS 4 ) = 0. sec. Thus, TCn = [0., 0., 0., 0.]; 4. Suppose that there are seven types of requests, which arrive to the Composite WS: (ReqCount = 7): AR = {WSCA }; R 2 = {WSCA 2 }; AR 3 = {WSCA, WSCA 2 }; AR 4 = {WSCA, WSCA 3 }; AR 5 = {WSCA, WSCA 2, WSCA 3 }; AR 6 = {WSCA, WSCA 3, WSCA 4 }; AR 7 = {WSCA, WSCA 2, WSCA 3, WSCA 4 }. Thus, MReq = [, 0, 0, 0; 0,, 0, 0;,, 0, 0;, 0,, 0;,,, 0;, 0,, ;,,, ]; 5 Suppose that the probabilities of arrival of each type of requests are equal (/ReqCount): Thus, PReq = [0.4286, , , , , , ]; 6 We explored several physical configuration of Composite Web Service with one, two, three and four dedicated servers. For example, for the three-servers configuration (Fig. 3.4) we supposed that: ServCount = 3; dedicated server DS serves the Composite WSs CnWS and CnWS 2 ; dedicated server DS 2 serves the Composite WS CnWS 3 ; dedicated server DS 3 serves the Composite WS CnWS 4. Thus, MServ = [,, 0, 0; 0, 0,, 0; 0, 0, 0, ]; 2
23 Partial simulation Result ReqNo = 5 ReqStat = TReq = 0.3 CnOut = 2 0 ReqOut = 2 ServLoad = Composite Web Service event-driven simulation model PCn = [0.5, 0.25, 0.25; 0.5, 0.25, 0.25; 0.5, 0.25, 0.25; 0.5, 0.25, 0.25] ReqStat= TReq = 0.3 CnOut = [ 2 0] ReqOut = 2 ReqNo = 5 TCn = [0., 0., 0., 0.] ServLoad = [ ] Set of Conponent WSs ServLoad = Request random generation 5 Request composer and server loader Req 5 = [,,, 0] {WSCA, WSCA 2 } {WSCA 3 } { } DS CnWS CnWS 2 CnOut = {,2} ServLoad = 0. CnOut = {} Result analiser PReq = [0.4286, , , , , , ] MReq = [, 0, 0, 0; 0,, 0, 0;,, 0, 0;, 0,, 0;,,, 0;, 0,, ;,,, ] DS 2 CnWS 3 DS 3 ServLoad = 0.0 CnOut = { } MServ = [,, 0, 0; 0, 0,, 0; 0, 0, 0, ] CnWS 4 Fig TA model (three-servers configuration) and partial simulation results
24 Simulation Results The results were obtained by averaging the simulation outcomes for 000 arriving requests. These results were compared for the Composite WSs with and without the error handling mechanism under the assumption that this mechanism is capable of tolerating all detected faults.. Simulation results for Composite WSs with error handling at the Component and Composite WSs levels are shown in Fig Composite WS with error handling Requests Number of Mean request processing time outcomes requests by (ReqOut) ServCount= ServCount= ServCount= ServCount= outcomes ,64 0,295 0,229 0, ,36 0,2694 0,256 0, ,6326 0,4335 0,4026 0,3 Successful requests 746 0, , , , ,628 0,4374 0,4005 0,3 Unsuccessful requests 254 0,628 0,4374 0,4005 0,3 Total , , ,25 * MServ = [,,, ]; ** MServ = [,, 0, 0; 0, 0,, ]; ***MServ = [,, 0, 0; ***MServ = [, 0, 0, 0; 0, 0,, 0; 0,, 0, 0; 0, 0, 0, ]; 0, 0,, 0; 0, 0, 0, ]; 0,7 Composite WS with error handling 0,6 Mean request processing time, sec 0,4 0,3 0,2 0, 0 ServCount= ServCount=2 ServCount=3 ServCount=4 Successful requests Unsuccessful requests Fig.3.5. Simulation results for a Composite WS with error handling 23
25 2. Simulation results for Composite WSs without error handling are given in Fig Composite WS without error handling Number of Mean request processing time requests by ServCount= ServCount= ServCount= outcomes ,633 0,298 0,258 0, Requests outcomes (ReqOut) ServCount= 4 Successful requests 240 0,633 0,298 0,258 0, ,649 0,325 0,26 0, Unsuccessful requests 760 0,649 0,325 0,26 0, Total 000 0,64 0,35 0,2595 0, * MServ = [,,, ]; ** MServ = [,, 0, 0; 0, 0,, ]; ***MServ = [,, 0, 0; ***MServ = [, 0, 0, 0; 0, 0,, 0; 0,, 0, 0; 0, 0, 0, ]; 0, 0,, 0; 0, 0, 0, ]; Mean request processing time, sec 0,8 0,6 0,4 0,2 0, 0,08 0,06 0,04 0,02 Composite WS without error handling 0 ServCount= ServCount=2 ServCount=3 ServCount=4 Successful requests Unsuccessful requests Fig Simulation results for a Composite WS without error handling 3. Fig.3.7 shows the comparison of the number and the request processing times of successful and unsuccessful requests for Composite WSs with and without error handling. 24
26 800 Different request outcomes for composite web services with and without error handling 700 Number of requests by outcomes Alternative request outcomes (ReqOut) Composite web service with error handling Composite web service without error handling Composite web service without error handling Resulting requests outcomes for composite web services with and without error handling Composite web service with error handling Number of requests Unsuccessful requests Successful requests Mean request processing time, sec 0,45 0,4 0,35 0,3 0,25 0,2 0, 0,05 0 Mean processing time of successful requests for composite web services with and without error handling ServCount= ServCount=2 ServCount=3 ServCount=4 Composite web service with error handling Composite web service without error handling Fig.3.7. Comparison of the number and request processing times for a Composite WS with and without error handling 25
27 Discussion As follows from the analysis above, the composition of WSs and the use of exceptions handling allow us to significantly increase the ratio of the successfully serviced requests. At the same time, there is an increase of the mean time of request processing. However, using more then one dedicated servers makes it possible to essentially decrease this time as Fig. 3.7 clearly indicates. We can conclude, therefore, that the performance of the Composite WSs depends significantly on the hardware architecture and as the level of concurrency increases the negative impact of the overhead due to exception handling decreases. The results reported here have been obtained under the assumption that the confidence intervals of the initial values used in the simulation and the settings may be determined using data from the previous experience or trustworthy prediction methods. By changing parameters used in the particular simulation setup (e.g. varying the values of the times used and probabilities of the various events involved) we can analyse whether the observed effects depend on the values of the parameters or not. For instance, for a wide range of parameters the negative impact of exception handling on the performance is observed (see Fig. 3.7), in these cases extensive concurrency of WSs with exception handling can be recommended. Note, that the analysis above ignores the additional cost caused by the increased level of concurrency. Although it is clear that in some application-specific situations, there will be no additional cost. It is in our future plan to work on a refined model dealing with this issue. 4. On Dependability of Composite Web Services with Components Upgraded Online 4.. Upgrading problem of Composite Web Services The problem of dealing with online system upgrades is well known and a number of solutions have been proposed (see, for example [Romanovsky et al 2002]). The main reasons for upgrading systems are improving/adding functionality or correction of bugs. The difficulties in dealing with upgrades of COTS components in a dependable way are well recognised and a number of solutions have been proposed. The WS architecture poses a new set of problems manly caused by its openness and by the fact that the component WSs are executed in different management domains and are outside of the control of the composite WS. Moreover, switching such systems off or inflicting any 26
28 serious interruptions in the service they provide is not acceptable, so all upgrades have to be dealt with seamlessly and online. Suppose we construct a Composite Web Service which depends on WSs provided by third parties, as shown in Fig. 4.. URL:My Node Composite WS Composite Web-Service URL:Node Web-Service WS All Web-Services are published with their interfaces respective according WSDL. The Composite Web-Service uses Web-Service and Web-Service2 WS 2 URL:Node 2 Web-Service 2 Fig. 4.. A Deployment diagram of a Composite Web Service which depends on two other Web Services provided by third parties, Web Service and Web Service 2, accordingly The fact that the Composite WS depends on third-party services poses a problem, which is well-known for any component-based software development with off-the-shelf (OTS) components. When a new release of an OTS component is made available the system integrator has two options: they change their integrated solution 4 to use the new release of the OTS component. This may cause problems for the integrated solution and may require significant effort to rectify. they stick to the old version of the OTS component but risk to face the consequences if the vendor of the OTS component ceases to support the old releases of the OTS component. The choice between these two options is available to the integrator. Each of the options has its pros and cons. In many cases the integrator would take the first option even though no immediate problems have been observed to originate from the old OTS component. Almost 4 A term which I picked up at ECUA: 27
29 always such lock-in with a particular vendor is dictated by the need for support of the OTS component by the vendor. The situation with a Composite Web-Service can be seen as very similar with the one with any other OTS software component. Indeed the Web-Service and Web-service 2 in Fig. 4. are two components integrated in the Composite Web-Service; conceptually this is equivalent to integrating any other OTS software component in an integrated solution. There may, however, a difference from the point of view of maintenance of the Composite Web- Service compared with the maintenance of the integrated solution. In the latter case, as indicated above, the integrator has a choice whether to update the integrated solution with every new release of the OTS components or not. Such a choice may not exist in the former case of Composite Web-services. The deployment of a Composite Web-Service assumes that the Web-Services used by the composite service (Web-Service and Web-Service 2 in our example in Fig. 4.) have been deployed by their respective providers. If the providers decide to, bring down their services the composite service may become unavailable, too. What seems more interesting is that when the provider of a service on which the composite service depends decides to update their service the provider of the composite service may not be even notified about the update. The composite service may be affected without its provider being able to do anything to prevent this from happening. Thus the provider of the Composite WS is automatically locked-in by the very decision to depend on another WS. Are there ways out of the lock-in? If not, can the provider of the Composite WS do something at least to make the users of the composite service they offer aware of the potential problems as a result of the update(s) beyond their control? Here we discuss two plausible alternatives: ) Several releases of the same WS are operational; 2) Only the latest release of a WS is operational. More detail description of the different solutions to solve the problem of Web Services online upgrading presented in [Kharchenko et al 2004] First Upgrading Mode: Several Releases of the Same WS are Operational This scenario is depicted in Fig The choice of whether to switch to a new release of a WS used by the composite service is returned back to the provider of the Composite WS. The provider of the composite service may use whatever methods are available to them to assess the quality of the new release before deciding whether or not to move to the upgraded version(s) of the used WS. 28
30 Composite WS URL:My Node Composite Web-Servic URL:Node Web-Service.0 WS.0 Web-Service. URL:Node 2 WS. Web-Service 2 WS 2 a) Composite WS URL:My Node Composite Web-Service URL:Node Web-Service.0 WS.0 URL:Node 2 Web-Service 2 Web-Service. WS. WS 2 b) Fig A new release, v.., of a composite service (Web-Service ) is released, but the old version is also kept operational. The new release has no effect on the composite services which depend on the previous release, 2a). Eventually, the composite service is upgraded and now it uses the newer version of Web-Service.. The designer of the composite service may even make provisions at design stage of the Composite WS which facilitates the assessment of the new releases of the services the composite service depends on when these become available. An example of such design would be making it possible to run back-to-back the old and the new releases of the WS used in the composite service. During the transitional period (when the new release WS. becomes available) the old version will continue to be the version used by the Composite WS, but by comparing the results coming from the old and the new release, WS.0 and WS. respectively, the provider of the Composite WS will gain empirical evidence which will help to build confidence that the new release, WS., is of adequate quality. Designs which allow for co-existence of several releases and, thus facilitate the transition from an older to a newer version, have been used in the past. An example is the architecture 29
31 of Clustra SQL server [Torbjornsen 995], now acquired by Sun. One of the main qualities emphasised by the developers of Clustra, possible as a result of allowing several versions of the server to run concurrently (dynamically added and taken off the cluster) is the extremely high availability which this design allows to achieve. Building confidence about the quality of the new release of a WS can be formalised. We have reported elsewhere in a different context how Bayesian inference can be used to assess the reliability of a fault-tolerant software [Littlewood et al 2000]. The same approach is directly applicable in the new context of WSs. Dynamically updating the confidence in the quality of the WS (both of an old or new release) may be a useful parameter which can be made known to the users of the WS. Specifying the confidence in the quality of the service statically, i.e. in the description of the service (according to WSDL), or making it available on demand (as one of the operations published through the WS s interface), may be useful to the users of the service or providers of the composite services when they assess the risk of using the particular WS or merely as a factor affecting the cost for a service (the higher the assurance provided the higher the cost) Second Upgrading Mode: Only the Latest Release of a WS is Operational Under this scenario Fig. 4.2b is automatically arrived at with every new release of WS. The options left to the provider of the composite service are very limited. Yet, publishing the release of the WS (in the example above.0 will be replaced by.) can be used by the provider of the composite service to adjust the confidence that the provider of the composite service can declare to its user. A conservative view would be to reduce the confidence in the quality of the service every time a new release is made available compared with the confidence achieved with the old release of the WS. A discussion of how the confidence issue can be treated has been presented elsewhere, [Popov 2002]. Although the discussion was given for a different context of safety-critical systems (in which dependability requirements are normally stated explicitly in quantitative terms) the approach of assessing the confidence in quality (i.e. probability of failure on demand) is applicable for WS without any modifications. This may achieve the goal of making the users of the WS aware of what quality of a WS its honest provider is able to claim. 30
32 5. Directions of Dependable Web Services Development 5.. Composing Dependable Web Services Out of Undependable Components One of the important conclusions we have reached while working on this report is that, paraphrasing the famous statement of von Neumann s about building reliable units out of unreliable elements (schemes), the general aim of current work in WSs should be building dependable Composite Web Services out of undependable Web Components Measures and Metrics of Web Services and Components Dependability of WSs can by measured by various parameters and metrics. In case of Composite WSs, we can measure both the Component WSs and the Composite WS as a whole, taking into account the system architecture. Besides, using metrics divided into several subsets for assessment of different dependability sub-characteristics, such as functionality, reliability, security, etc. In this case, the two main problems to be solved are: ) the problem of trustworthy collection of initial data for measurement; 2) the problem of representation of the measurements results, their analysis and interpretation. Using standard and specially developed tools for monitoring Web Services can solve the first problem. Solving the second problem can be based on applying of radial metrics diagrams (RMD), which is an analogue of the kiviat-diagrams, and a set of special operations on external and internal RMD s transformation (RMD s building an hierarchy, convolution, modification, etc), proposed in [Kharchenko et al 2003]. Examples of using RMDs for Composite Web services dependability assessment is shown in Fig. 5.. There are two possible variants of convolution of Component WSs RMDs. The first variant is a component convolution (left-hand part of Fig.5.) for which the dependability attributes of every Component WS are convoluted into component RMD of Composite Web Services. In the second variant (right-hand part of Fig.5.) the dependability attributes of every Component WS are convoluted into dependability attributes RMD of the Composite Web Services Diversity as a Means of Improving Dependability of Web Services Diversity as a means of improving dependability of Web Services may be applied on different levels of the structured model and in different forms. There may be horizontal and vertical diversity at the levels of Composite Web Services. Besides, there may be different kinds of diversity of WS components at the nested level. 3
33 Component WS Composite Web Service Reliability Availability Safety Component WS 2 Component WS 3 Integrity Confidentiality Maintainability Availability Availability Availability Reliability Safety Reliability Safety Reliability Safety Integrity Confidentiality Integrity Confidentiality Integrity Confidentiality Maintainability Maintainability Maintainability Component WS Component WS 2 Component WS 2 Fig. 5.. RMD application for Composite WS dependability assessment 5.4. Adaptive Web Services Improved flexibility and dependability of Web Services can be reached by using dynamic monitoring, assessment, correction of the composite service, configuration of the components and services according to the various parameters of environment, such as the user region, day & night requests rate variation, psychology of waiting etc. These parameters must be taken into consideration for changing the operation of the Web service. For example, with respect to the request rate variation we can provide more reliable or faster request processing Categorization of Requests and Procedures of their Accounting One of the attractive features that can be added to the Web Services is the request categorisation. It will allow a necessary quality of service to be provided. To do this all user's requests will be categorised by the required level of reliability, security, priority, etc. The request category, guarantee and payment will have to be defined before the user and the Web Service enter into service agreement Structured Approach The proposed structured approach to the Composite Web Services development implies both vertical and horizontal structuring (Fig.5.2). Horizontal structuring is proposed in order 32
34 to fragment the universal Component WSs into several specialised services. It can take place, for example, at creation of the global travel Web Service by integration the services provided by several travel agencies, placed in different regions of the world. It can provide the complex service round-the-world travel. At the large quantity of the Web Components, it is necessary to solve a problem of optimization of a number of the service vertical levels (i.e. vertical structuring). Besides vertical structuring can be used for decentralisation of the control flow and decomposition of the service functionality, for example, to create such services chain: recreation > kinds of recreation > tourism > kinds of tourism > mountaneering etc. Composite WS Horizontal strucrurization Composite WS Component WS Component WS 2 CnWS CnWS 2 CnWS 3 CnWS 4 CnWS 5 CnWS 6 CnWS 7 CnWS 8 Vertical strucrurization Both vertical and horizontal strucrurization Global servicing Composite WS - CtWS - CtWS 2- CtWS 2-2 CtWS 2- Local servicing CtWS 2-2 CtWS 3- CtWS 3-2 CtWS 3- CtWS 3-2 CtWS 3-3 CtWS 3-4 Component WS Component WS 2 CnWS CnWS 2 CnWS 3 CnWS 4 CnWS 5 CnWS 6 CnWS 7 CnWS 8 Fig.5.2. Vertical and horizontal structuring on Composite Web Services development Horizontal and vertical structuring also provide flexibility of the Composite Web Service and simplicity of the Component WSs implementation. If it is necessary to change or modify several Component WSs we can easily do it without significant change of the whole Web Service. Besides, the horizontal structuring allows to reduce the request processing time due to the parallel processing, when the vertical structuring can provide it due to the local servicing in the intermediate Composite WSs if global servicing did not require (see Fig.5.2.). 33
35 Conclusions and Future Work We are planning to continue our work in the following three directions: theoretical, simulation and practical experiments with WSs. Firstly, further theoretical works is required to address: Development of a taxonomy of the faults of WSs stipulated by different causes. The taxonomy may be based on faults classification described in [Avizienis et al 2002] taking into consideration both the specificity of the WSs as a whole and the features of the possible failures connected with the upgrading of the Web-components. It s necessary to underline that the taxonomy of the WS fault must be considered according to concepts of Web-services dependability; Selection of measures (metrics) to assess WSs dependability as a whole and their old and new components. For this the technique, based on the analysis of the assumptions and on the radial metrics diagrams convolution, may be used [Kharchenko et al 2003]; Development of models of WSs dependability. In particular, obtaining and processing trustworthy dependability-related information is very important. The choice of the Component WSs and the architecture of the most reliable Composite WS will depend on the accuracy of the measurements and the correctness of the made assumptions, both of which will be imperfect and subject to some level of uncertainty. Development of methods and techniques to ensure WSs dependability which take into account the additional risks caused by WSs upgrading, security and other factors. The problem of dependability assurance of the WSs as a whole was formulated above as the problem of development of dependable WSs out of undependable Web-components. Secondly, the simulation works will be continued to address: Extend the simulation modeling to cover a wide range of model parameters and architectures plausible for WSs and measure various aspects of WSs dependability; Simulation of more complex scenarios in which adaptive mechanisms will be deployed for adjusting the architecture of the Composite WS to new releases of Component WS services. Adjustment of the monitoring techniques to perfect the control procedures. To rise trustworthiness of results may be used several diverse techniques based on so-called multiversion approach to assessment [Kharchenko 999]. Thirdly, experimental works with WSs will be connected with decision on the following tasks: 34
36 Detailed development of Composite Web-services architectures of different solutions described and discussed in sections 3-5. The design of software supporting WSs performance with several upgrading components; Implementation of proposed technique for different applications (e-commerce, banking, travel agencies, etc); Development of upgrading WSs management technique. Acknowledgments V. Kharchenko has been partially supported by the Royal Society grant (RS 64). References [Avizienis et al 2002] A. Avivienis, J.-C. Laprie, B. Randell. Fundamental Concepts of Dependability, UCLA CSD Report no.00028, LAAS Report No. 0-45, Newcastle university Report No. CS-TR-739, 2002, 20 p. [Chandra et al 2000] S. Chandra, P. M. Chen. Whither Generic Recovery From Application Faults? A Fault Study using Open-Source Software. Proc. International Conference on Dependable Systems and Networks (DSN/FTCS), 2000, pp [Deswarte et al 998] Y. Deswarte, K. Kanoun, J.-C. Laprie. Diversity against Accidental and Deliberate Faults. Proc. of Computer Security, Dependability, and Assurance (SCDA): From Needs to Solutions, York, England, 998, pp [Ferguson et al 2003] D. F. Ferguson, T. Storey, B. Lovering J. Shewchuk. Secure, Reliable, Transacted Web Services: Architecture and Composition. MS and IBM. Technical Report ( [Kharchenko 999] V.S. Kharchenko. Methods of Estimation of Multiversion Safety Systems. In Proc. of the 7th International System Safety Conference, Orlando, USA, 999, pp [Kharchenko et al 2003] V.S. Kharchenko, B.M. Konorev, O.M. Tarasyuk, A.V. Volkoviy. Techniques and Tools of Safety-Related Software Requirements Profiling and Assessment. Proc. of the st International conf. ACSN, Lviv, Ukraine, 2003, pp [Kharchenko et al 2004] V. Kharchenko, P. Popov, A. Romanovsky. On Dependability of Composite Web Services with Components Upgraded Online. Proc. of the International Conference on Dependable Systems and Networks (DSN 2004), Florence, Italy, 2004, Supplemental Volume, pp
37 [Littlewood et al 2000] B. Littlewood, P. Popov, L. Strigini. Assessment of the Reliability of Fault-Tolerant Software: a Bayesian Approach. Proc. 9 th International Conference on Computer Safety, Reliability and Security, SAFECOMP'2000, Rotterdam, Netherlands, 2000, pp [Popov 2002] P. Popov. Reliability Assessment of Legacy Safety-Critical Systems Upgraded with Off-the-Shelf Components. Proc. of the SAFECOMP'2002, Catania, Italy, 2002, pp [Romanovsky et al 2002] A. Romanovsky and I. Smith. Dependable On-line Upgrading of Distributed Systems. Proc. of the COMPSAC Oxford. p [Tartanoglu et al 2003] F. Tartanoglu, V. Issarny. A. Romanovsky. N. Levy. Coordinated Forward Error Recovery for Composite Web Services. Proc. of the 22 th Symposium on Reliable Distributed Systems (SRDS), Florence, Italy, 2003, pp [Torbjornsen 995] O. Torbjornsen. Multi-Site Declustering Strategies for Very High Database Service Availability. Department of Computer Systems and Telematics, Faculty of Electrical Engineering and Computer Science. Trondheim, Norwegian Institute of Technology, University of Trondheim, 995, 76 p. [Xu et al 995] J. Xu, B. Randell, A. Romanovsky, C.M.F. Rubira-Calsavara, R.J. Stroud, Z. Wu. Fault Tolerance in Concurrent Object-Oriented Software through Coordinated Error Recovery. Proc. of the 25 th Int. Symposium on Fault-Tolerant Computing, (FTCS-25), Pasadena, California, USA, 995, pp
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
3. Where can I obtain the Service Pack 5 software?
Reasons to upgrade: 1. What are the features of BlackBerr y Enterprise Server 4.1 Service Pack 5? What issues does Service Pack 5 address? Are there any current known issues with Service Pack 5? The BlackBerry
Getting started with API testing
Technical white paper Getting started with API testing Test all layers of your composite applications, not just the GUI Table of contents Executive summary... 3 Introduction... 3 Who should read this document?...
Fax Server Cluster Configuration
Fax Server Cluster Configuration Low Complexity, Out of the Box Server Clustering for Reliable and Scalable Enterprise Fax Deployment www.softlinx.com Table of Contents INTRODUCTION... 3 REPLIXFAX SYSTEM
Deploying a distributed data storage system on the UK National Grid Service using federated SRB
Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications
Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures
Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable
SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE
SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE Breno Mansur Rabelo Centro EData Universidade do Estado de Minas Gerais, Belo Horizonte, MG, Brazil [email protected] Clodoveu Augusto Davis
Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for
Information Technology Engineers Examination Network Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0
Windows Server 2003. Your data will be non-compliant & at risk on
Your data will be non-compliant & at risk on Windows Server 2003. On July 14 th 2015, Microsoft will cease its support (including automatic bug fixes, updates and online technical assistance) for Windows
Software Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:
Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
Real-time Data Replication
Real-time Data Replication from Oracle to other databases using DataCurrents WHITEPAPER Contents Data Replication Concepts... 2 Real time Data Replication... 3 Heterogeneous Data Replication... 4 Different
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform
Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Why clustering and redundancy might not be enough This paper discusses today s options for achieving
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users
Scientific versus Business Workflows
2 Scientific versus Business Workflows Roger Barga and Dennis Gannon The formal concept of a workflow has existed in the business world for a long time. An entire industry of tools and technology devoted
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Distributed Database Management Systems
Distributed Database Management Systems (Distributed, Multi-database, Parallel, Networked and Replicated DBMSs) Terms of reference: Distributed Database: A logically interrelated collection of shared data
Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery
Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Dimitrios Kourtesis, Iraklis Paraskakis SEERC South East European Research Centre, Greece Research centre of the University
Availability Digest. www.availabilitydigest.com. SAP on VMware High Availability Analysis. A Mathematical Approach. December 2012
the Availability Digest www.availabilitydigest.com SAP on VMware High Availability Analysis A Mathematical Approach December 2012 Vas Mitra SAP Virtualization Architect Editor s note: Vas Mitra is a SAP
Efficient database auditing
Topicus Fincare Efficient database auditing And entity reversion Dennis Windhouwer Supervised by: Pim van den Broek, Jasper Laagland and Johan te Winkel 9 April 2014 SUMMARY Topicus wants their current
5-Layered Architecture of Cloud Database Management System
Available online at www.sciencedirect.com ScienceDirect AASRI Procedia 5 (2013 ) 194 199 2013 AASRI Conference on Parallel and Distributed Computing and Systems 5-Layered Architecture of Cloud Database
Deploy App Orchestration 2.6 for High Availability and Disaster Recovery
Deploy App Orchestration 2.6 for High Availability and Disaster Recovery Qiang Xu, Cloud Services Nanjing Team Last Updated: Mar 24, 2015 Contents Introduction... 2 Process Overview... 3 Before you begin...
Architecture Design & Sequence Diagram. Week 7
Architecture Design & Sequence Diagram Week 7 Announcement Reminder Midterm I: 1:00 1:50 pm Wednesday 23 rd March Ch. 1, 2, 3 and 26.5 Hour 1, 6, 7 and 19 (pp.331 335) Multiple choice Agenda (Lecture)
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
A Review of Distributed Workflow Management Systems
A Review of Distributed Workflow Management Systems F. Ranno and S. K. Shrivastava Department of Computing Science, Newcastle University, Newcastle upon Tyne, NE1 7RU, UK. Abstract: An increasing number
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
Chapter 7, System Design Architecture Organization. Construction. Software
Chapter 7, System Design Architecture Organization Object-Oriented Software Construction Armin B. Cremers, Tobias Rho, Daniel Speicher & Holger Mügge (based on Bruegge & Dutoit) Overview Where are we right
Introduction to Parallel and Distributed Databases
Advanced Topics in Database Systems Introduction to Parallel and Distributed Databases Computer Science 600.316/600.416 Notes for Lectures 1 and 2 Instructor Randal Burns 1. Distributed databases are the
Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1
Web Service Security Vulnerabilities and Threats in the Context of WS-Security
Web Service Security Vulnerabilities and Threats in the Context of WS-Security Jesper Holgersson Eva Söderström University of Skoevde, Sweden SIIT 2005, ITU, Geneva, September 2005 Outline of presentation
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Affordable Remote Data Replication
SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted
Module 12: Microsoft Windows 2000 Clustering. Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8
Module 12: Microsoft Windows 2000 Clustering Contents Overview 1 Clustering Business Scenarios 2 Testing Tools 4 Lab Scenario 6 Review 8 Information in this document is subject to change without notice.
Organizational Requirements Engineering
Chapter 9, Non-functional Requirements Organizational Requirements Engineering Prof. Dr. Armin B. Cremers Sascha Alda Armin B. Cremers, Sascha Alda Organizational Requirements Engineering 1 Overview of
Web Services Implementation Methodology for SOA Application
Web Services Implementation Methodology for SOA Application Siew Poh Lee Lai Peng Chan Eng Wah Lee Singapore Institute of Manufacturing Technology Singapore Institute of Manufacturing Technology Singapore
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Performance Prediction, Sizing and Capacity Planning for Distributed E-Commerce Applications
Performance Prediction, Sizing and Capacity Planning for Distributed E-Commerce Applications by Samuel D. Kounev ([email protected]) Information Technology Transfer Office Abstract Modern e-commerce
Contents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
Embedded Systems Lecture 9: Reliability & Fault Tolerance. Björn Franke University of Edinburgh
Embedded Systems Lecture 9: Reliability & Fault Tolerance Björn Franke University of Edinburgh Overview Definitions System Reliability Fault Tolerance Sources and Detection of Errors Stage Error Sources
Availability Guide for Deploying SQL Server on VMware vsphere. August 2009
Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...
Distributed Systems Architectures
Software Engineering Distributed Systems Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the advantages and disadvantages of different distributed systems
Information Systems Analysis and Design CSC340. 2004 John Mylopoulos. Software Architectures -- 1. Information Systems Analysis and Design CSC340
XIX. Software Architectures Software Architectures UML Packages Client- vs Peer-to-Peer Horizontal Layers and Vertical Partitions 3-Tier and 4-Tier Architectures The Model-View-Controller Architecture
Database high availability
Database high availability Seminar in Data and Knowledge Engineering Viktorija Šukvietytė December 27, 2014 1. Introduction The contemporary world is overflowed with data. In 2010, Eric Schmidt one of
Lecture 7: Concurrency control. Rasmus Pagh
Lecture 7: Concurrency control Rasmus Pagh 1 Today s lecture Concurrency control basics Conflicts and serializability Locking Isolation levels in SQL Optimistic concurrency control Transaction tuning Transaction
Service Oriented Architectures
8 Service Oriented Architectures Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) [email protected] http://www.iks.inf.ethz.ch/ The context for SOA A bit of history
A dual redundant SIP service. White paper
A dual redundant SIP service White paper Ian Colville, Product Manager, Aculab Introduction The Session Initiation Protocol (SIP) eco-system: a unit of interdependent protocols functioning together within
SECTION 4 TESTING & QUALITY CONTROL
Page 1 SECTION 4 TESTING & QUALITY CONTROL TESTING METHODOLOGY & THE TESTING LIFECYCLE The stages of the Testing Life Cycle are: Requirements Analysis, Planning, Test Case Development, Test Environment
HARVARD RESEARCH GROUP, Inc.
HARVARD RESEARCH GROUP,Inc. 1740 MASSACHUSETTS AVENUE BOXBOROUGH, MASSACHUSETTS 01719 Tel (978) 263-3399 Vol1 The High-Availability Challenge 1999 Recently Harvard Research Group (HRG) completed the analysis
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
Why the Subsystem Storage Is a Must for the Applications of. Mission Critical Surveillance Projects? Application Notes
Why the Subsystem Storage Is a Must for the Applications of Mission Critical Surveillance Projects? Application Notes What is Mission Critical? Mission critical surveillance projects indicate any failure
Federation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
Overview of Luna High Availability and Load Balancing
SafeNet HSM TECHNICAL NOTE Overview of Luna High Availability and Load Balancing Contents Introduction... 2 Overview... 2 High Availability... 3 Load Balancing... 4 Failover... 5 Recovery... 5 Standby
How To Virtualize A Storage Area Network (San) With Virtualization
A New Method of SAN Storage Virtualization Table of Contents 1 - ABSTRACT 2 - THE NEED FOR STORAGE VIRTUALIZATION 3 - EXISTING STORAGE VIRTUALIZATION METHODS 4 - A NEW METHOD OF VIRTUALIZATION: Storage
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
Cisco Active Network Abstraction Gateway High Availability Solution
. Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and
How To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
Using Multipathing Technology to Achieve a High Availability Solution
Using Multipathing Technology to Achieve a High Availability Solution Table of Contents Introduction...3 Multipathing Technology...3 Multipathing I/O Implementations...5 Storage Redundancy...5 Infortrend
Modular Communication Infrastructure Design with Quality of Service
Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute
DATA SECURITY MODEL FOR CLOUD COMPUTING
DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing
Introduction to UDDI: Important Features and Functional Concepts
: October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...
High Availability Guide for Distributed Systems
Tivoli IBM Tivoli Monitoring Version 6.2.2 Fix Pack 2 (Revised May 2010) High Availability Guide for Distributed Systems SC23-9768-01 Tivoli IBM Tivoli Monitoring Version 6.2.2 Fix Pack 2 (Revised May
Service-oriented architectures (SOAs) support
C o v e r f e a t u r e On Testing and Evaluating Service-Oriented Software WT Tsai, Xinyu Zhou, and Yinong Chen, Arizona State University Xiaoying Bai, Tsinghua University, China As service-oriented architecture
High Availability Essentials
High Availability Essentials Introduction Ascent Capture s High Availability Support feature consists of a number of independent components that, when deployed in a highly available computer system, result
Integrating Big Data into the Computing Curricula
Integrating Big Data into the Computing Curricula Yasin Silva, Suzanne Dietrich, Jason Reed, Lisa Tsosie Arizona State University http://www.public.asu.edu/~ynsilva/ibigdata/ 1 Overview Motivation Big
White Paper. Recording Server Virtualization
White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...
Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
Service Oriented Architecture
Service Oriented Architecture Version 9 2 SOA-2 Overview Ok, now we understand the Web Service technology, but how about Service Oriented Architectures? A guiding analogy Terminology excursion Service,
Design and Implementation of RMP - A Virtual Electronic Market Place
Design and Implementation of RMP - A Virtual Electronic Market Place 1 Introduction Susanne Boll*, Wolfgang Klas*, Bernard Battaglin** Electronic commerce is one of the currently most exciting and fast
HP Business Service Management
HP Business Service Management for the Windows and Linux operating systems Software Version: 9.10 Business Process Insight Server Administration Guide Document Release Date: August 2011 Software Release
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
1. INTRODUCTION TO RDBMS
Oracle For Beginners Page: 1 1. INTRODUCTION TO RDBMS What is DBMS? Data Models Relational database management system (RDBMS) Relational Algebra Structured query language (SQL) What Is DBMS? Data is one
Data Management in the Cloud
Data Management in the Cloud Ryan Stern [email protected] : Advanced Topics in Distributed Systems Department of Computer Science Colorado State University Outline Today Microsoft Cloud SQL Server
Introduction into Web Services (WS)
(WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Distributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
Quality Model for Web Services
Quality Model for Web Services September 2005 Document identifier: WSQM -2.0 Location: Editor: Eunju Kim (NCA), Youngkon Lee (KOREA Polytechnic University) Abstract: The purpose of this document is to
COMPUTING SCIENCE. Designing a Distributed File-Processing System Using Amazon Web Services. Students of MSc SDIA 2008-09 TECHNICAL REPORT SERIES
COMPUTING SCIENCE Designing a Distributed File-Processing System Using Amazon Web Services Students of MSc SDIA 2008-09 TECHNICAL REPORT SERIES No. CS-TR-1198 April 2010 TECHNICAL REPORT SERIES No. CS-TR-1198
Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION
October 2013 Daitan White Paper Reference Model for Cloud Applications CONSIDERATIONS FOR SW VENDORS BUILDING A SAAS SOLUTION Highly Reliable Software Development Services http://www.daitangroup.com Cloud
Comparison of SNMP. Versions 1, 2 and 3
Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,
Hadoop Architecture. Part 1
Hadoop Architecture Part 1 Node, Rack and Cluster: A node is simply a computer, typically non-enterprise, commodity hardware for nodes that contain data. Consider we have Node 1.Then we can add more nodes,
Upgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper
Upgrading to advanced editions of Acronis Backup & Recovery 10 Technical white paper Table of contents 1 Introduction...3 2 Choosing the way to upgrade...3 2.1 Gradual upgrade... 3 2.2 Importing backup
