Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition
|
|
|
- Brook Lawrence
- 10 years ago
- Views:
Transcription
1 Peer-to-peer framework of Distributed Environment for Cooperative and Collaborative Work Service Composition F. Astha Ekadiyanto
2 CONTENTS Why P2P? The P2P Overlay Network (JXTA) Service Oriented Computing A Platform for Service Provisioning Groupware Service Applications Video Conferencing Synchronization as the basic building block of P2P groupware Services Extensions 2of 34
3 WHY P2P? Client-Server poses the single point of failure threat Cost related to scale because servers need to be reliable More and more computing power are available in the internet waiting to be harnessed Users and computing power are distributed in nature 3of 34
4 The Network is the service provider A network of services among group-peers. Winter Semester 2013/14 Lecturer: 4of 34
5 CONTENTS Why P2P? The P2P Overlay Network (JXTA) Service Oriented Computing A Platform for Service Provisioning Groupware Service Applications Video Conferencing Synchronization as the basic building block of P2P groupware Services Extensions 5of 34
6 P2P Overlay using JXTA (Architecture) Platform Layer (JXTA Core) encapsulates minimal and essential primitives that are common to P2P networking Services Layer includes network services that may not be absolutely necessary for a P2P network to operate, but are common or desirable in the P2P environment Applications Layer includes implementation of integrated applications Winter Semester 2013/2014 6of 34 Lecturer:
7 JXTA Architecture: Key Aspects Three essential aspects of the JXTA architecture distinguish it from other distributed network models: The use of XML documents to describe network resources Abstraction of pipes to peers, and peers to endpoints without reliance upon a central naming/addressing authority such as DNS A uniform peer addressing scheme (peer IDs) Winter Semester 2013/2014 7of 34 Lecturer:
8 JXTA Network Organization The JXTA network is an ad hoc, multi-hop, and adaptive network composed of connected peers Connections in the network may be transient, and message routing between peers is nondeterministic Peers may join or leave the network at any time, and routes may change frequently Winter Semester 2013/2014 8of 34 Lecturer:
9 JXTA Network Organization - 2 The organization of the network is not mandated by the JXTA framework, but in practice four kinds of peers are typically used: Minimal peer can send and receive messages, but does not cache advertisements or route messages for other peers. Suitable for: PDA, cell phone, etc Simple peer can send and receive messages, and will typically cache advertisements, but does not forward any discovery requests. Most peers are likely to be simple peers Rendezvous peer like any other peer, maintains a cache of advertisements, also forward discovery requests to help other peers discover resources Relay peer maintains information about the routes to other peers and routes messages to peers Winter Semester 2013/2014 9of 34 Lecturer:
10 Rendezvous peers Any simple peer can configure itself as a rendezvous peer A peer can be configured to use one or more rendezvous peers Each rendezvous peer maintains a list of other known rendezvous peers and also the peers that are using it as a rendezvous Req 2 JXTA Peer R2 Rendezvous Req 3 JXTA Peer C (Uses R2) Internet Req 1 Req 3 Req 2 JXTA Peer A (Uses R1) JXTA Peer R1 Rendezvous (knows R2 and R3) JXTA Peer R3 Rendezvous Winter Semester 2013/2014 JXTA Peer B (Uses R1) 10 of 34 Lecturer:
11 Firewalls and NATs A peer outside the firewall cannot establish a connection directly with a peer behind the firewall. For JXTA peers to communicate with each other across a firewall, the following conditions must exist: At least one peer in the peer group inside the firewall must be aware of at least one peer outside of the firewall The peer inside and the peer outside the firewall must be aware of each other and must support HTTP The firewall has to allow HTTP data transfers JXTA Peer C Relay Internet JXTA Peer A Winter Semester 2013/2014 JXTA Peer B 11 of 34 Lecturer:
12 Platform: JXTA Technology Sing Li, JXTA 2: A high-performance, massively scalable P2P network, Nov Winter Semester 2013/14 Lecturer:
13 The JXTA Protocol Stack Winter Semester 2013/ of 34 Lecturer:
14 CONTENTS Why P2P? The P2P Overlay Network (JXTA) Service Oriented Computing A Platform for Service Provisioning Groupware Service Applications Video Conferencing Synchronization as the basic building block of P2P groupware Services Extensions 14 of 34
15 Service Oriented Computing in Groupwares Focus on Behavior Customizable Implementation Flexibility (Task-Technology Fit) on: Communication Media selection Types of shared information object Types of Collaboration Coordination Types of Awareness Information Style of Conference Management X. Xu, Y. Fan, and Z. Chen, Research on a Service-Oriented Approach to Groupware Design, International Conference on Information Management, Innovation Management and Industrial Engineering, Los Alamitos, CA, USA: IEEE Computer Society, 2008, pp Winter Semester 2013/14 Lecturer: 15 of 34
16 Groupware Service Approach I. Jorstad, S. Dustdar, and D.V. Thanh, A Service Oriented Architecture Framework for Collaborative Services, wetice, Los Alamitos, CA, USA: IEEE Computer Society, 2005, pp X. Xu, Y. Fan, and Z. Chen, Research on a Service-Oriented Approach to Groupware Design, International Conference on Information Management, Innovation Management and Industrial Engineering, Los Alamitos, CA, USA: IEEE Computer Society, 2008, pp Winter Semester 2013/14 Lecturer: 16 of 34
17 CONTENTS Why P2P? The P2P Overlay Network (JXTA) Service Oriented Computing A Platform for Service Provisioning Groupware Service Applications Video Conferencing Synchronization as the basic building block of P2P groupware Services Extensions 17 of 34
18 Platform Challenge How a service can be implemented on the P2P Network to alleviate single point of failure problem and provide high degree of reliability/scalability Winter Semester 2013/14 Lecturer:
19 Service Provisioning Scheme User3 User2 User1 Discover & Init Groupware Services Peer Group Broker Service Service request Serve Deploy Services Agent Services Serve Search Deploy Services Agent Agent Serve New Services Relay Agent Winter Semester 2013/14 Existing Services Lecturer: 19 of 34
20 Methods for fault tolerance in service provision Any peer that are willing to share their resources should run an Agent Service and publish it into the P2P Network Brokers are responsible for maintaining fault tolerance in service provisioning. Brokers are standard service located in every rendezvous peers. Brokers share services advertisements as well as provisioning advertisements. Provisioning Advertisements are special messages that are maintained by the PeerGroup Broker. Provisioning is performed based on the following methods: Method Advance Provisioning Backtracking User s provisioning strategy Goals Ensure all resources/services are available at the same time Replace failed/unavailable resources/services User specify their own provisioning/recovery strategy Winter Semester 2013/14 Lecturer: 20 of 34
21 Provisioning Protocol Start Provisioning Client Broker Agent Service Description (request) Send multiple requests (n) Receive multiple offers (m) [m<n] Evaluate Service Description (request) Reply( ) Check Service Description Evaluate Reply Begin negotiation with first x best offers Select best offer Negotiation Phase Inform Reply(ACK) Adjust/make new offer Send confirmation reply Deploy Service Consume Service Deployed (ACK) Deployed (ACK) Status Updates Winter Semester 2013/14 Lecturer:
22 Maintenance Protocol Client Broker Agent Evaluate Recovery Service Failure Stop Provisioning Service Failure( ) If Recovery not possible If Recovery possible Initiate Provisioning Service Recovered( ) Deployed (ACK) Consume Service End Session/ Stop Provisioning Service Description( ) End Service(Service Desc.) Service Ended (ACK) Service Ended (ACK) Winter Semester 2013/14 Lecturer:
23 CONTENTS Why P2P? The P2P Overlay Network (JXTA) Service Oriented Computing A Platform for Service Provisioning Groupware Service Applications Video Conferencing Synchronization as the basic building block of P2P groupware Services Extensions 23 of 34
24 Video Conferencing Scenario RTP Distributor A2 User C RTP Distributor A1 RTP Distributor B User A P2P Overlay User B 24 of 34
25 Video Conferencing Scenario RTP Distributor C1 User C RTP Distributor C2 User A P2P Overlay User B 25 of 34
26 RTP DISTRIBUTOR Network RTP SessionManager DataSource Network Processor DataSource SessionManager JPEG_RTP Network Participants List addtarget () Network 26 of 34
27 Video Conferencing Sequence Start RTP Distributor Server Overlay Client RTP Distributor Service Desc. Deployed (ACK) Service Provisioning Start Transmission RTP Participant Request() RTP Distributor ID Register Target() RTP Winter Semester 2013/14 Lecturer:
28 CONTENTS Why P2P? The P2P Overlay Network (JXTA) Service Oriented Computing A Platform for Service Provisioning Groupware Service Applications Video Conferencing Synchronization as the basic building block of P2P groupware Services Extensions 28 of 34
29 Synchronization as Basic Building Block Groupware Application Scenarios Logical Operations Object Manipulations Shared Objects/Context XML Data Synchronization Services P2P Overlay Network 29 of 34
30 Differential Synchronization Algorithm Neil Fraser, Differential Synchornization, Google, 30 of 34
31 Differential Synchronization Topology Neil Fraser, Differential Synchornization, Google, 31 of 34
32 Differential Synchronization Topology P2P Overlay Neil Fraser, Differential Synchornization, Google, 32 of 34
33 CONTENTS Why P2P? The P2P Overlay Network (JXTA) Service Oriented Computing A Platform for Service Provisioning Groupware Service Applications Video Conferencing Synchronization as the basic building block of P2P groupware Services Extensions 33 of 34
34 Scenario/Application Logic Overlay Services Internet Winter Semester 2013/14 Scenario/ Application Logic Overlay Services Lecturer: 34 of 34 Web Service Connectors/ Cloud Interfacing Web Service Connectors/ Cloud Interfacing Transport Service 1 Transport Service 3 Transport Service 4 Connector Proxy Services Transport Service 1 Transport Service 2 Transport Service 4 Connector Proxy Services Services Extensions Cloud/Web Service Extended Resource Sharing
35 Q & A Thank you for your attention Winter Semester 2013/14 Lecturer: 35 of 34
Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype
Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration
Classic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
Software design (Cont.)
Package diagrams Architectural styles Software design (Cont.) Design modelling technique: Package Diagrams Package: A module containing any number of classes Packages can be nested arbitrarily E.g.: Java
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
Advanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering
Gajaba: Dynamic Rule Based Load Balancing Framework
International Journal of Computer and Communication Engineering, Vol. 2, No. 5, September 2013 Gajaba: Dynamic Rule Based Load Balancing Framework Y. Pandithawattha, K. Perera, M. Perera, M. Miniruwan,
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
This presentation describes the IBM Tivoli Monitoring 6.1 Firewall Implementation: KDE Gateway Component.
This presentation describes the IBM Tivoli Monitoring 6.1 Firewall Implementation: KDE Gateway Component. Functional Overview of Gateway Topology, Gateway Configuration, and Gateway XML Structure Page
RELOAD Usages for P2P Data Storage and Discovery
RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf [email protected] Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Advertising Peer-to-Peer Networks over the Internet
Advertising Peer-to-Peer Networks over the Internet Matthieu Weber 1, Jarkko Vuori 2, and Mikko Vapa 3 1 University of Jyväskylä ([email protected]) 2 University of Jyväskylä ([email protected]) 3 University
Web Services Software Architecture
Web Services Software Architecture Syahrul Fahmy School of Informatics, The University of Manchester, PO Box 88, Manchester M60 1QD, United Kingdom [email protected] Abstract. Web
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
Bridging the gap between peer-to-peer and conventional SIP networks
1 Bridging the gap between peer-to-peer and conventional SIP networks Mosiuoa Tsietsi, Alfredo Terzoli, George Wells Department of Computer Science Grahamstown, South Africa Tel: +27 46 603 8291 [email protected]
How To Understand The Concept Of A Distributed System
Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz [email protected], [email protected] Institute of Control and Computation Engineering Warsaw University of
Fundamentals of a Windows Server Infrastructure MOC 10967
Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation
Module: Sharepoint Administrator
Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture
Realtime Multi-party Video Conferencing Service over Information Centric Networks
Realtime Multi-party Video Conferencing Service over Information Centric Networks (Anil Jangam, Ravishankar Ravindran, Asit Chakraborti, Xili Wan, Guoqiang Wang ) University of Maryland, Baltimore County,
A distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.
Load Balancing and Sessions C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Scalability multiple servers Availability server fails Manageability Goals do not route to it take servers
Developing Windows Azure and Web Services
Course M20487 5 Day(s) 30:00 Hours Developing Windows Azure and Web Services Introduction In this course, students will learn how to design and develop services that access local and remote data from various
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
DFSgc. Distributed File System for Multipurpose Grid Applications and Cloud Computing
DFSgc Distributed File System for Multipurpose Grid Applications and Cloud Computing Introduction to DFSgc. Motivation: Grid Computing currently needs support for managing huge quantities of storage. Lacks
LinuxWorld Conference & Expo Server Farms and XML Web Services
LinuxWorld Conference & Expo Server Farms and XML Web Services Jorgen Thelin, CapeConnect Chief Architect PJ Murray, Product Manager Cape Clear Software Objectives What aspects must a developer be aware
Automating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology
Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India [email protected]
THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES
THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES Pamela Zave AT&T Laboratories Research Florham Park, New Jersey, USA Jennifer Rexford Princeton University Princeton, New Jersey, USA THE
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB
IBM Software for WebSphere Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB Presenter: Kim Clark Email: [email protected] Date: 27/02/2007 SOA Design with WebSphere
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
E-Business Technologies for the Future
E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.sis.pitt.edu/~spring Overview
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
CompatibleOne Open Source Cloud Broker Architecture Overview
CompatibleOne Open Source Cloud Broker Architecture Overview WHITE PAPER October 2012 Table of Contents Abstract 2 Background 2 Disclaimer 2 Introduction 2 Section A: CompatibleOne: Open Standards and
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
CSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Final Review Stefan Savage Final Mechanics Will cover entire year of material (but likely with some bias to the material post-midterm) Based on lecture material,
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Literature Review Service Frameworks and Architectural Design Patterns in Web Development
Literature Review Service Frameworks and Architectural Design Patterns in Web Development Connor Patrick [email protected] Computer Science Honours University of Cape Town 15 May 2014 Abstract Organizing
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
Part 2: The Neuron ESB
Neuron ESB: An Enterprise Service Bus for the Microsoft Platform This paper describes Neuron ESB, Neudesic s ESB architecture and framework software. We first cover the concept of an ESB in general in
MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
OpenText Secure MFT Network and Firewall Requirements
NETWORK OpenText Secure MFT Network and Firewall Requirements Secure MFT is a client-server solution that provides accelerated transfer of large files over any network connection. The solution architecture
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
Course Outline. ttttttt
10967 - Fundamentals of a Windows Server Infrastructure General Description Learn the fundamental knowledge and skills that you need to build a Windows Server infrastructure with Windows Server 2012. This
Big Data Storage Architecture Design in Cloud Computing
Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,
How To Design A Layered Network In A Computer Network
A Layered Approach to Computer Networks Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Different layer of abstraction Different error control
Basic Concepts. Software Architecture Lecture 3. Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved.
Basic Concepts Software Architecture Lecture 3 Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. Learning Objectives Formally define software architecture Distinguish
Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution
Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution White Paper January 2012 Radware GSLB Solution White Paper Page 1 Table of Contents 1. EXECUTIVE SUMMARY... 3 2. GLOBAL
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Fault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
Interoperability of Peer-To-Peer File Sharing Protocols
Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture
White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web
FortiBalancer: Global Server Load Balancing WHITE PAPER
FortiBalancer: Global Server Load Balancing WHITE PAPER FORTINET FortiBalancer: Global Server Load Balancing PAGE 2 Introduction Scalability, high availability and performance are critical to the success
BUY ONLINE AT: http://www.itgovernance.co.uk/products/730
IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology
SOFTWARE ARCHITECTURE FOR FIJI NATIONAL UNIVERSITY CAMPUS INFORMATION SYSTEMS
SOFTWARE ARCHITECTURE FOR FIJI NATIONAL UNIVERSITY CAMPUS INFORMATION SYSTEMS Bimal Aklesh Kumar Department of Computer Science and Information Systems Fiji National University Fiji Islands [email protected]
New possibilities for the provision of value-added services in SIP-based peer-to-peer networks
New possibilities for the provision of value-added services in -based peer-to-peer networks A.Lehmann 1,2, W.Fuhrmann 3, U.Trick 1, B.Ghita 2 1 Research Group for Telecommunication Networks, University
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
CMiS: A Cloud Computing Based Management Information System
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 15-20 International Research Publications House http://www. irphouse.com /ijict.htm CMiS:
Virtual machine interface. Operating system. Physical machine interface
Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that
IP-Telephony SIP & MEGACO
IP-Telephony SIP & MEGACO Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Session Initiation Protocol Introduction Examples Media Gateway Decomposition Protocol 2 IETF Standard
IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
Status of the CORBA Firewall Traversal RFP
Status of the CORBA Traversal RFP Brian Niebuhr Network Associates - NAI Labs DOCsec2001 - Annapolis, MD Overview Problem Statement Initial Solution RFP Information Current Submission Questions Status
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach
Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach Simone Leggio, Jukka Manner, Antti Hulkkonen, Kimmo Raatikainen Department of Computer Science University of Helsinki,
MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
Why SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. [email protected] What are we all trying to achieve? Fully transparent network access
Key Elements of a Successful SIP Device Provisioning System
Key Elements of a Successful SIP Device Provisioning System A white paper by Incognito Software April, 2006 2006 Incognito Software Inc. All rights reserved. Page 1 of 6 Key Elements of a Successful SIP
Module 6. Designing and Deploying External Access. MVA Jump Start
Module 6 Designing and Deploying External Access MVA Jump Start Module Overview Conferencing and External Capabilities of Lync Server 2013 Planning for IM and Presence Federation Designing Edge Services
Sentinet for Windows Azure SENTINET
Sentinet for Windows Azure SENTINET Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
Cloudbuz at Glance. How to take control of your File Transfers!
How to take control of your File Transfers! A MFT solution for ALL organisations! Cloudbuz is a MFT (Managed File Transfer) platform for organisations and businesses installed On-Premise or distributed
Application Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
Towards a Peer-to-Peer Extended Content Delivery Network
Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi
04/09/2007 EP520 IP PBX. 1.1 Overview
1.1 Overview The EP520 IP PBX is an embedded Voice over IP (VoIP) Server with Session Initiation Protocol (SIP) to provide IP extension phone connection for global virtual office of small-to-medium business
