Robust cloud management of MANET checkpoint sessions
|
|
|
- Bertram Pitts
- 10 years ago
- Views:
Transcription
1 14th International Symposium on Parallel and Distributed Computing Robust cloud management of MANET checkpoint sessions Hazzaa Naif Alshareef Department of Computer Science University College Cork (UCC) Cork, Ireland Abstract In a traditional mobile ad-hoc network (MANET), if two nodes are engaged in a session and one of them departs suddenly, their communication is aborted. The session is not active any more, work is lost and, consequently, the energy of the batteries has been wasted. This paper proposes a model that uses a cloud service to register, save, pause and resume sessions between MANET member nodes so that both work in progress and energy are saved. A checkpoint technique is introduced to capture the progress of a session and allow it to be resumed. This is an additional service to our cloud management of the MANET. The model proposed in this paper was tested on Android-based devices and an Amazon cloud instance. Experimental results show that the model is feasible, robust, saves time and, more importantly, energy if session breaks occur frequently. Keywords - component; MANET; checkpoint; cloud; sessions. I. INTRODUCTION The most recent mobile devices offer greater functionality to users than simply receiving and making calls. Users can check s, browse the internet, and share data or play games with friends. One example of the tasks a mobile device can support is starting a session to do a job as part of a client-server relationship within a mobile ad-hoc network (MANET). However, these sessions can be affected due to mobile device features such as mobility or limited battery power. Therefore, solutions for saving device resources have to be considered in the context of sessions between MANET nodes. In a previous paper [1], we proposed a model that introduced cloud services to deal with difficult MANET management operations, such as IP allocation, split, merge and the sudden departure of mobile users. After the set-up of a MANET, any node can establish a session to perform a task, for example, sharing a file, with another node of the same MANET. Traditionally, if an active MANET session is interrupted because one of its parties suddenly departs, the session will be aborted/terminated and data lost. In this paper, we propose a solution to deal with session breaks during execution. As an extension to our previous MANET management cloud service, a new cloud service is introduced to help active sessions to be registered, saved and resumed. If the session has been saved, when two correspondents in an interrupted session become active again, the session can be resumed from the point that had been reached before disconnection occurred. Doing so will Dan Grigoras Department of Computer Science University College Cork (UCC) Cork, Ireland [email protected] avoid executing the whole session from the beginning, as is normally the case in a MANET. To report session progress, a checkpoint technique is proposed whereby information about the session is captured and stored locally on mobile devices. Using checkpoints makes it easier to resume a session. Different methods for setting up checkpoints are introduced, based on how resource-intensive and important the session is. When an interruption occurs, the latest, or every, checkpoint is uploaded to the cloud. The cloud will then monitor the connectivity of the nodes to notify them when both node states change from disconnected to active. As an additional benefit of using cloud storage, the cloud service can take on responsibility for completing interrupted sessions if both parties are not directly connected. The rest of the paper is organized as follows: section II discusses similar works; section III introduces our model; section IV describes the implementation and experimental framework; section V presents the experimental results and their interpretation. Finally, section VI presents our conclusions and future work. II. RELATED WORK Different approaches to set up checkpoints have been presented by Khunteta and Pooja [2]. They take into account MANET properties such as mobility and device limitations. The paper defines a checkpoint as a faulttolerant technique that is a designated place in a program at which normal processing is interrupted specifically to preserve the status of information necessary to allow resumption of processing at a later time (p.31). Therefore, if a failure occurs, the computation can be restarted from the most recent checkpoint instead of repeating the whole task from the beginning. A checkpoint-restart solution is provided to deal with the dynamic and long runtime of Infrastructure-as-a-Service (IaaS) clouds by Nicolae and Franck [3]. The solution is intended to reduce storage space and computational overheads. The idea concerns attaching virtual machine (VM) disk images to the checkpoint protocol at the user level to accelerate resumption of the application process. A number of similar projects that use fault tolerance are also discussed by Elnozahy et al. [4]. The system presented, known as BlobCR, periodically saves the global status of an application to maintain stable storage and then restarts the application from an intermediate point if an interruption occurs. The authors claim that checkpoints of disk-only snapshots are more compact and faster than those for the whole status of a VM instance /15 $ IEEE DOI /ISPDC
2 A system involving follow me sessions is proposed by Handorean et al. [5], whereby a session follows the client and can be continued with another peer if disconnection occurs. As a result, the client is connected to a service instead of being connected to a server. The paper assumes that the new provider node offers the same functionality. The checkpoint technique is used to record the execution state for the purpose of resuming the session from an intermediary point, preventing processor time being wasted. Two types of migration are provided: weak migration, where a session can be run from the beginning (not resumed), and strong migration, where a session is stopped, transferred, and resumed. The latter is more powerful but is also more expensive to perform in terms of network, resources and delays. To sum up, the idea of creating checkpoints in the MANET area is not new. However, to the best of our knowledge, there has not been much done in the way of research/solutions that has introduced cloud services to save MANET active sessions. Resuming a session can be done in two ways: either by the cloud, where it sends a request to the users who were involved in the session to remind them of the suspended job, or by the users, where one of them sends a request to the cloud to reactivate the session. One important advantage of using the cloud is that it works as a bridge between the two users if they cannot communicate directly. B. Session protocols A protocol execution is triggered when a user sends a request to the cloud to register a session. The request includes application details (ID, name, description, payload, etc.) and sender/receiver details (IDs, MANET, IPs, etc.). The cloud generates a unique ID and two security keys for this session and then sends them to the requester. When the requester receives the session ID and the two keys, the session can start. Figure 2 presents these steps graphically. III. SYSTEM DESIGN A. Model overview The architecture of the system considered in this paper is that of the mobile cloud. Mobile devices can connect to the cloud, either directly or indirectly, using a cellular or Wi-Fi network. Mobile devices can organize a MANET and carry on joint tasks. Figure 1. The mobile cloud model Figure 1 shows a high-level view of our model, whereby users can register, save and resume a session with a cloud session management service introduced to deal with disconnection issues. When one of the correspondents involved in the session is disconnected, the session can be saved in the cloud and resumed when both users are reconnected. With the cloud service, the session can be completed even if the two users are reconnected to different MANETs. To avoid losing the job, each user creates a checkpoint locally that contains what has been performed so far. The most recent checkpoint is stored in the cloud when a disconnection occurs. As a result, when both users become active again, the session is re-established from this checkpoint instead of starting the session from scratch. Figure 2. The sequence of operations needed to start a new session When a session is established, the sender will create a new checkpoint each time an acknowledgement is received from the receiver. On the other side, the receiver will create a new checkpoint every time a new message is received. All the checkpoints are stored locally in a mobile device database to minimize communication with the cloud. Only the most recently stored checkpoint will be sent to the cloud if a disconnection occurs. If the session is completed, the sender notifies the cloud about the completion of the session, whereupon the cloud stores the session information in the log table in its database. Figure 3 shows an exchange of messages between the sender, the receiver and the cloud to perform a session that is completed without any interruption. If a session is aborted, the sender sends an uncompleted session request to the cloud attaching the most recently created checkpoint to the request. It is assumed that the receiver also has the recent checkpoint saved locally. The cloud updates the status of the session in its database then checks both users connectivity and sends a reminder when both users are reconnected. Figure 4 provides an illustration of this. 67
3 Figure 3. A sequence diagram showing the start and completion of a session without interruption Figure 4. A sequence diagram of a session that has been interrupted C. Checkpoint framework The main purpose of creating checkpoints is to determine the progress of a session. This means that by reading such a checkpoint, the session can be resumed without the need to start again from the beginning. Therefore, each checkpoint has to include information such as application details and what has been done so far, as well as what is left to complete the session. In mobile devices, each checkpoint is represented as a row in a table. Table I provides the fields that each checkpoint has to include, as well as a description of each one. A new checkpoint is created each time any interaction between the sender and the receiver occurs. Checkpoints can be useful when the session is a long one and there is a strong possibility of it being interrupted. However, in some cases, checkpoints could add an unnecessary overhead to a session. Therefore, different checkpoint models are proposed here: Intensive: this creates a checkpoint each time a new interaction occurs and, at the same time, stores it in a device database as well as uploading it to the cloud. The benefit of using this model is that it will save mobile storage; users can delete checkpoints and retrieve them when a resumption process is started. On the other hand, it adds extra cost in terms of time and energy. Normal: this creates a checkpoint locally and only if a session is interrupted will it be uploaded to the cloud. Local: this creates a checkpoint locally each time a new interaction occurs. Checkpoints will not be uploaded to the cloud at all, even if the session is interrupted. None: the checkpoint technique is not used at all. The latest, or every, checkpoint can be retrieved in the case that it has been deleted due to the limited storage space of the mobile device. Retrieving a checkpoint can be done locally between the sender and the receiver or from the cloud. In the latter case, the cloud has to check if the user is part of the session or is eligible to retrieve a checkpoint from the sender. TABLE I. CHECKPOINT INFORMATION Field Description ID App ID Checkpoint type Data sent Data path Sender ID Target ID User key MANET ID Registration ID Progress Created time Uploaded to the cloud The unique ID of a checkpoint. A unique ID that is generated by the session issuer. Contains the checkpoint model. Contains the ID of a recently sent chunk/part of the app's payload. This field is used only for a file path in mobile external storage. The cloud ID of the sender. The cloud ID of the receiver. The key that is generated by the cloud when the session is registered. The ID of the connected MANET. The ID received from the cloud after the session is registered in the cloud. What has been executed so far as a proportion of the whole job. A timestamp generated when the checkpoint is created. Flag: YES - the checkpoint was sent to the cloud; NO the checkpoint was not sent to the cloud. When a session correspondent does not receive any new ACKs from the other party, it will be assumed that a disconnection has occurred. Resuming the session after an interruption will be done either by the cloud or by one of the users involved in the session. The following subsection presents the two scenarios. 1)Resumption by the session issuer The sender can resume a suspended session from the latest checkpoint when the correspondent reconnects. However, if the correspondent is not reachable because it is not connected to the same MANET, is not a one-hop neighbour of the sender, or is not connected any more (for example because of a dead battery), the sender can issue a request to the cloud to look for the receiver to finish the 68
4 session. The result of the look-up will be one of the following: The receiver is not connected to the cloud and its status is inactive: the cloud notifies the sender of the receiver status. The receiver is connected to a different MANET: the cloud will either merge the two MANETs, as presented in our previous paper [1], or takes on the responsibility for completing the session, which means the cloud acts as a bridge between the two. The receiver is connected to the same MANET but is not a one-hop neighbour of the sender: both users will complete the session using an intermediate node link. 2)Resumption by the cloud If a session status is marked in the cloud as paused, the cloud will monitor the connectivity of the two users involved in the session. When both users are reconnected, a notification message is sent to the session issuer (the sender). The action the cloud takes will depend on the reply from that user. If the session issuer (the sender) is interested in completing the session, the cloud will then check to which MANET each of the users is connected. If both users are connected to the same MANET, the cloud waits for any update to the session status. However, if the users are connected to different MANETs, the cloud takes on the notification finishing the session. In contrast, if the session issuer is not interested in completing the session, the session data and details will be deleted. The second user (the receiver) will also be notified that the session has been ignored at the sender s side. D. Security mechanism Only users who have an account in the cloud can register and resume a session. Nevertheless, the sender has the authority to resume a session on another member s behalf. Once a session is registered in the cloud, two keys will be distributed. Each key has a unique hash value that is generated by the cloud. The first key is for the sender and the second is for the receiver. Hence, a user who is part of such a session has to provide a key as well as a session ID to resume that session. As a result, the cloud will match the requester s ID, its key and the session ID to ensure no rogue devices are attempting to claim resumption of a session of which they were not a part. Regarding the session content, all data will be encrypted on the sender side, and decrypted on the receiver side. This ensures a high level of protection. E. Session management in the cloud Once a session registration request is received by the cloud, the registration ID and security keys are generated and sent back to the session s issuer. After sending a session ID and user keys to the requester, the cloud starts monitoring this session. IV. SYSTEM IMPLEMENTATION AND EVALUATION This section presents the implementation of the aforementioned model. Two terms will be used frequently: The session issuer (or sender): the user who starts the session, also called the sender. The target user (or receiver): the neighbour chosen by the sender with whom to perform the session. A. Testing applications Two sorts of application were used to test the protocol validity: a sharing file application and a database transaction application. 1)Sharing file application a) App description The file can, for example, be a utilities map of a city that is shared by the rescue team in a disaster area (e.g., after a hurricane or earthquake). The MANET is set up and registered in the cloud before deploying it in the disaster area. The shared file will be split into several equal parts. b) App interaction When the session is registered and acknowledged by the target user, the sender starts sending parts of the file. Each time a part is received, the next part is sent and a checkpoint is also created locally in the databases of both mobile devices. This checkpoint is only uploaded to the cloud if an intensive checkpoint is chosen. When all parts have been sent and received successfully, the cloud will be notified about the termination of the session. The receiver merges all the file parts to obtain the original file. 2)Transaction application a) App description A session can be extended to perform transactions such as executing queries on a database or downloading a file from a remote server using the neighbours links. We implemented a transaction to execute a number of database queries on the neighbour s side, as well as for retrieving textual information from a cloud database. b) App interaction A database query will be sent to the target user. When the target user has received the request, it will acknowledge the sender in order to create a checkpoint. Afterwards, the sender waits for the query to be executed. Once the query is executed successfully, the target user will redirect the result to the sender. Finally, the sender sends an acknowledgement if the data are received successfully and creates a new checkpoint. If the session is completed without a break, a notification will be sent to the cloud. The latest checkpoint will be uploaded with the progress of the session if a break is detected. B. Database modelling Two databases were used in our model. A mobile device database (DB) was used to store checkpoints periodically during an active session. Secondly, the cloud database was used to store session details and checkpoints. The following two sections present these databases and their tables. 1)Mobile device DB Two tables were created for the mobile device storage: 69
5 a) A checkpoint table that holds all the checkpoint information (see Table I). b) A session table that holds all the information for the sessions (see Table II). 2) Cloud DB The cloud will host a table in its database called the session table. The table has similar fields to those presented in Table II. TABLE II. SESSION TABLE INFORMATION Field Description Contains a unique ID for the chosen App ID application. Contains the chosen application name (for App name example: file-sharing). App Contains the chosen application description description. App Specifies if the session is outgoing or direction ingoing. Sender ID Contains the sender ID in the cloud and & IP the MANET IP address. Contains the receiver ID in the cloud and Target ID the MANET IP address. Contains the sender s and the receiver s Users keys security keys to be used for resuming the session. MANET Contains the SSID of the connected SSID MANET. Registration Remains null unless the session is ID registered in the cloud. Specifies session current progress. It contains one of the following: Startup when the session has just Progress started. Finished when the session is completed. Paused when the session is interrupted. Contains data and time regarding when the Created at session is created. Contains either YES or NO depending on whether session information was stored in the cloud database or not. Stored in the cloud Latest checkpoint Remains null unless a session is paused and a new checkpoint created. C. Test scenarios The experimental scenarios performed were: a) Session is completed without interruptions. b) Interruptions occur. Session is interrupted before receiving the last chunk/part of the session s payload. c) Resumptions By the session s issuer: o Session is resumed from the beginning. o Session is resumed from the latest checkpoint that was sent before the session was interrupted. By a one-hop neighbour. By the cloud, where the cloud will only send a notification to the session issuer when both parties become reconnected. D. Android app framework and interactions The mobile cloud system presented in our previous paper was extended to evaluate this paper s model. The MANET activities (neighbour discovery, routing protocol) and cloud operations (login, logout, tracking membership) are dealt with in the pre-existing system, where only session management is added. New activities were created in the mobile app to serve this model. a) Starting a new session activity This activity provides the interface required to start a new session. b) Resuming a paused session activity In this activity, a list of all paused sessions is presented. If a user clicks on one of these paused sessions, a resumption operation is started. c) All session activity This activity shows a list of all the sessions in a mobile database, completed as well as non-completed. d) All checkpoint activity This activity lists all the created checkpoints with the ability to read the details of each checkpoint. Users can delete a checkpoint from the list, in which case the session is resumed from the beginning if the deleted checkpoint was the latest created in a paused session. E. Cloud instance configurations and interactions A Java Server Pages (JSP) page, hosted on the EC2 cloud [6], was developed to deal with mobile users requests. For instance, if a user sends a session registration request to the cloud, the request, including the generation of security keys, etc., will be dealt with on this page. Communication between mobile users and the cloud database is also dealt with through this page. F. Data collection Time and energy were calculated both in the case of interruption using no checkpoint and when our checkpoint model was used. We were interested in comparing in terms of energy and delay costs the no checkpointing case against the checkpointing cases, where a session is resumed from the latest checkpoint. This would show the overhead cost of resuming a session, as well as the cost when no checkpoint was used. An Eclipse IDE tool [7] was used to develop an Android app using an ADT plugin [8] and cloud services using an AWS plugin [9]. Another plugin, called Trepn [10], captured energy consumption. A Trepn Profiler is a diagnostic tool that allows developers to profile the performance and power consumption of Android applications. V. EXPERIMENTAL RESULTS AND INTERPRETATION The experiments were run on four devices: three Samsung Galaxy S III smartphones and one HTC One smart 70
6 device. The devices were located within their radio frequency range. Each experiment was run five times. A. Checkpoint models The main purpose of the experiment was to determine the running cost of different checkpoint models. All the aforementioned checkpoint models (intensive, local, normal and none) were tested. Figure 5. Checkpoint models costs in terms of time Figure 6. Checkpoint models cost in terms of power Figures 5 and 6 show that using an intensive checkpoint has the highest cost because each time a new checkpoint is created, it is uploaded to the cloud at the same time. The normal model was less costly but still higher than the local and none models. However, using a local checkpoint results in a cost comparable with not using a checkpoint. For example, completing a session using intensive checkpoints results in around a 50% increase in the cost versus completing the session without creating checkpoints. Here, repeating the session from the beginning would be better than using the intensive model. Therefore, using intensive and normal modes will add an unnecessary overhead to the system if the session is short or its completion is not essential. However, it would be counterproductive if the session were sensitive, requiring a long computational process, such as joining multi-queries in the case of a database transaction, or the link was not stable and there was a higher chance that a break could occur. B. The cost of using checkpoints We calculated the checkpoint cost using the following equation: = + (1) Where is the cost of completing the session without interruption and is the cost of completing the session using a checkpoint technique. This includes the total overhead. 1) File app results Looking at the left-hand side of Figures 5 and 6, it is clear that using local checkpoints results in a slightly higher cost in terms of time and energy compared with no checkpoint: 13-18% and 6-14%, respectively, higher than performing the session without creating any checkpoints. However, this extra cost adds strength to the app; it guarantees that progress is saved and what it has already performed will not be repeated. 2) Database transactions app results Three different database queries - create, insert, and union - were sent from one device to another within the same MANET. The right-hand side of Figures 5 and 6 shows that creating checkpoints locally will result in a slightly higher cost compared with the cost resulting from executing the session normally. Using the normal and intensive models will result in a higher cost compared with both no checkpointing and local models. These models are recommended in the case of an unstable link between two nodes, or if the session has a large amount of data. C. Session resumption overheads 1)Locally This experiment reported the overheads associated with resuming a session. When a session is interrupted and a checkpoint technique has been used, the session can be resumed from the latest checkpoint. The type of application that was used in this session had no impact on this process. However, before resuming a session, the following actions were performed: Retrieving the session details, including the latest checkpoint ID. Retrieving the latest checkpoint to identify what had been sent and received before the session break. Checking if the target user who was involved in the session is active and reachable. Delays resulting from the above operations were collected and are presented in the following chart. Figure 7. Resuming sessions overheads in terms of time Figure 7 shows that the average delay time resulting from preparing a paused session for resumption is around 30 milliseconds. This amount of time is reasonable and ensures that the session will not restart from scratch. 71
7 2)Cloud initiative Resuming the suspended session can be done by the cloud, as mentioned earlier. We found that sending a resume request to the cloud took around 2 seconds and consumed around 1 milliwatt per hour. These results were higher than resumption overheads locally. As devices can only run in one mode, either in the ad-hoc or normal mode, a cellular interface is required to reach the cloud. However, if users can reach the cloud using a Wi-Fi connection while connecting to an active MANET, this will result in around half of that delay with less energy usage. Figures 8 and 9 present the overheads incurred when the paused sessions were resumed using the cloud services with 95% confident intervals. the cost resulting from a interrupted session that used checkpoints and,which is the cost of completing the session from the latest checkpoint (see Equation 3). = + (3) Figure 10 compares the cost resulting from resuming a session when a checkpoint technique was used with one when it was not. The left-hand side of this chart shows that using a checkpoint technique can save up to 37% more energy than an interrupted session that did not create checkpoints. For the database application, we calculated the cost resulting from resuming a transaction session using Equations 2 and 3. The right-hand side of Figure 10 indicates that using our scheme could save up to 36% of the cost resulting from a session that is interrupted and no checkpoints were created. Figure 8. Resumption overheads using cloud services in terms of time Figure 9. Resumption overheads using cloud services in terms of power D. Energy consumption For the file-sharing application, we compared the total amount of battery energy used to resume a session using a checkpoint technique with the energy used to resume a session without checkpoints. We calculated the cost of resumption by using Equation 2: If is the cost of completing the session after a break occurs and is the cost resulting from interrupting the session before the last part is received, the cost of resuming the session,, will be: = + (2) Once no checkpoint is used, the session will start from scratch, which means the value of will be equal to the cost resulting from performing the session without incident. On the other side, the cost of resuming the session when checkpoints are used,, will be the sum of which is Figure 10. Cost of resuming sessions in terms of energy E. Resumption by a peer This experiment showed the cost of resuming an interrupted session via a neighbour who is one hop away from both users (sender and receiver). We calculated the cost of resuming the session via a peer using Equation 4: = + (4) Where is the cost resulting from an interrupted session that used checkpoints and is the cost of completing a session from the latest checkpoint through a peer. We used the OLSR routing protocol, thus an intermediate peer was chosen from the routing table. Figures 11 and 12 show the cost of resuming an interrupted session through another neighbour and the cost of resuming a session without using a checkpoint technique. These two charts show that the cost of resuming a session via a peer one hop away from the sender and the receiver consumed around 30% more power than that consumed by repeating the session from the beginning when the break in the link occurred. However, the receiver might not be reachable any more. However, since the receiver might not be reachable any more, the extra cost that this entails should be taken into account when considering the peer resumption method as a possible solution.. Furthermore, each time the sender fails to reach the receiver, the total cost will be increased, so resuming the session from the beginning may result in higher costs than resuming the session through another peer. 72
8 Future work will include the aforementioned security mechanism. We will also implement session resumption using the cloud and we plan to capture the time and energy consumed by that type of resumption. ACKNOWLEDGEMENT Hazzaa Alshareef s PhD research is funded by the Saudi Electronic University in Saudi Arabia. REFERENCES Figure 11. The cost of resuming via a peer and the cost of resuming normally in terms of time Figure 12. The cost of resuming via a peer and the cost of resuming normally in terms of power VI. CONCLUSIONS AND FUTURE WORK Loss of work and resources in a MANET when sessions are broken is a serious problem. This paper demonstrates empirically that saving session details in the cloud will provide robustness to the network as a session can be resumed as soon as the disconnected node(s) reconnect. Furthermore, if the corresponding nodes are connected to different MANETs, the session can still be completed by the cloud as the cloud works as a bridge to finish the session. The use of the cloud service does not affect the ad-hoc nature of a MANET. On the contrary, it supports the session completion in the context of users mobility and mobile devices scarce resources. According to the experimental results, the energy consumed by resuming a session locally is around one-third lower than when a session is interrupted and no checkpoint is used. Using a checkpoint technique will add 6-14% extra cost (in terms of energy) to the session but will ensure the session will not restart from scratch. In addition, an interrupted session can be resumed if its users cannot communicate directly. Even though this will consume more power, it can be considered as a feasible solution. The results could be even better if a session takes a long time due to large data transfers. The results presented in this paper can be used as a guide for the best practice regarding session management in a MANET. Applications history or current network parameters can be used as input into the decision component to decide before a session starts if checkpoints are worth using or not. [1] H. Alshareef and D. Grigoras, "Mobile Ad-hoc Network Management in the Cloud," Parallel and Distributed Computing (ISPDC), 2014 IEEE 13th International Symposium, pp , [2] A. Khunteta and S. Pooja, "A Survey of Checkpointing Algorithms in Mobile Ad Hoc Network," Global Journal of Computer Science and Technology, pp , [3] Amazon, "AWS Amazon Elastic Compute Cloud (EC2) Scalable Cloud Servers.," [Online]. Available: [Accessed 21 Feb 2014]. [4] Amazon, "AWS Toolkit for Eclipse," Amzon, [Online]. Available: [Accessed 23 Feb 2014]. [5] Eclipse IDE, "The Eclipse Foundation," [Online]. Available: [6] Android Development, "Android Development Tools (ADT)," [Online]. Available: [Accessed 23 Feb 2014]. [7] E. N. M. Elnozahy, L. Alvisi, Y.-M. Wang and D. B. Johnson, "A Survey of Rollback-recovery Protocols in Message-passing Systems," ACM Computing Surveys (CSUR), no. ACM, pp , [8] R. Handorean, R. Sen, G. Hackmann and G.-C. Roman, "Context Aware Session Management for Services in Ad Hoc Networks," IEEE International Conference on Services Computing, no. IEEE, pp , [9] B. Nicolae and C. Franck, "BlobCR: Efficient Checkpoint-restart for HPC Applications on IaaS Clouds Using Virtual Disk Image Snapshots," Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, no. IEEE, pp. 1-12, [10] Qualcomm, "Trepn Profiler," [Online]. Available: [Accessed ]. 73
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
RedundancyMaster Help. 2014 Kepware Technologies
2014 Kepware Technologies 2 RedundancyMaster Help Table of Contents Table of Contents 2 Introduction 4 System Requirements 10 Accessing the Administration Menu 11 Setting Up Redundancy 11 Adding Redundancy
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Final Project Proposal. CSCI.6500 Distributed Computing over the Internet
Final Project Proposal CSCI.6500 Distributed Computing over the Internet Qingling Wang 660795696 1. Purpose Implement an application layer on Hybrid Grid Cloud Infrastructure to automatically or at least
Managing Mobile Devices Over Cellular Data Networks
Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
CLEVER: a CLoud-Enabled Virtual EnviRonment
CLEVER: a CLoud-Enabled Virtual EnviRonment Francesco Tusa Maurizio Paone Massimo Villari Antonio Puliafito {ftusa,mpaone,mvillari,apuliafito}@unime.it Università degli Studi di Messina, Dipartimento di
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Serval User Manual Release Version: Serval-0.05 15 August 2011
Release Version: Serval-0.05 15 August 2011 Table of Contents 1 Release Information... 1 2 Installing Serval... 1 2.1 Requirements... 1 2.2 Phone Configuration... 1 2.3 Super User Access (Root)... 1 2.4
CloudFTP: A free Storage Cloud
CloudFTP: A free Storage Cloud ABSTRACT: The cloud computing is growing rapidly for it offers on-demand computing power and capacity. The power of cloud enables dynamic scalability of applications facing
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
HarePoint Workflow Extensions for Office 365. Quick Start Guide
HarePoint Workflow Extensions for Office 365 Quick Start Guide Product version 0.91 November 09, 2015 ( This Page Intentionally Left Blank ) HarePoint.Com Table of Contents 2 Table of Contents Table of
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture Sushant G.Gaikwad Department of Computer Science and engineering, Walchand College of Engineering, Sangli, India. M.A.Shah
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
TECHNOLOGY WHITE PAPER Jun 2012
TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache
Trepn plug-in for Eclipse FAQ
Trepn plug-in for Eclipse FAQ Introduction and Technical Problem Q: What is Trepn plug-in for Eclipse? A: The Trepn plug-in for Eclipse is a power profiling tool created by Qualcomm Technologies Inc. for
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Microsoft Visual Studio Integration Guide
Microsoft Visual Studio Integration Guide MKS provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access MKS Integrity s workflow and configuration
IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications
Open System Laboratory of University of Illinois at Urbana Champaign presents: Outline: IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications A Fine-Grained Adaptive
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
A Study of Application Recovery in Mobile Environment Using Log Management Scheme
A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, [email protected], [email protected],[email protected], Bit Campus,
Technical Support Set-up Procedure
Technical Support Set-up Procedure How to Setup the Amazon S3 Application on the DSN-320 Amazon S3 (Simple Storage Service) is an online storage web service offered by AWS (Amazon Web Services), and it
How To Shut Down A Powerchute On A Hyperv V3.2.2 (Powerchute) On A Powerpack V3 (Powerchip) On An Uniden V3 On A Pc Or Mac (Powercheute)
User Guide PowerChute Network Shutdown v4.1 Hyper-V and SCVMM 990-4595D-001 07/2015 Schneider Electric Legal Disclaimer The information presented in this manual is not warranted by Schneider Electric to
Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services
Enterprise Networks that Deliver Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services Developed by Hughes Network Systems Enterprise Networks that Deliver Galaxy Broadband Communications
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
TECHNOLOGY WHITE PAPER Jan 2016
TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
A Virtual Cloud Computing Provider for Mobile Devices
A Virtual Cloud Computing Provider for Gonzalo Huerta-Canepa, Dongman Lee 1st ACM Workshop on Mobile Cloud Computing & Services Presented by: Daniel Ogleja Vrije Universiteit Amsterdam Faculty of Sciences
Informatica Cloud & Redshift Getting Started User Guide
Informatica Cloud & Redshift Getting Started User Guide 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
Monitoring PostgreSQL database with Verax NMS
Monitoring PostgreSQL database with Verax NMS Table of contents Abstract... 3 1. Adding PostgreSQL database to device inventory... 4 2. Adding sensors for PostgreSQL database... 7 3. Adding performance
System Copy GT Manual 1.8 Last update: 2015/07/13 Basis Technologies
System Copy GT Manual 1.8 Last update: 2015/07/13 Basis Technologies Table of Contents Introduction... 1 Prerequisites... 2 Executing System Copy GT... 3 Program Parameters / Selection Screen... 4 Technical
Pharos Control User Guide
Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Aeroqual Connect and Cloud
Aeroqual Connect and Cloud Page 1 Contents 1. Introduction to Aeroqual Connect and Cloud... 3 1.2. Aeroqual Connect... 3 1.3. Aeroqual Cloud... 3 2. How to Connect... 4 2.1. Aeroqual Connect... 4 2.1.1.
User Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
High Availability Setup Guide
High Availability Setup Guide Version: 9.0 Released: March 2015 Companion Guides: The UniPrint Infinity Administrator s Guide, Cluster Guide and Mobile Setup Guide can be found online for your convenience
Early Cloud Experiences with the Kepler Scientific Workflow System
Available online at www.sciencedirect.com Procedia Computer Science 9 (2012 ) 1630 1634 International Conference on Computational Science, ICCS 2012 Early Cloud Experiences with the Kepler Scientific Workflow
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Multilevel Communication Aware Approach for Load Balancing
Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1
Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud
Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud Pooja H 1, S G Maknur 2 1 M.Tech Student, Dept. of Computer Science and Engineering, STJIT, Ranebennur (India) 2 Head of Department,
Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity
P3 InfoTech Solutions Pvt. Ltd http://www.p3infotech.in July 2013 Created by P3 InfoTech Solutions Pvt. Ltd., http://p3infotech.in 1 Web Application Deployment in the Cloud Using Amazon Web Services From
FileCruiser. Desktop Agent Guide
FileCruiser Desktop Agent Guide FileCruiser Desktop Agent Guide Contents Contents Getting Started with FileCruiser 1 Using the FileCruiser Agent 2 Desktop Shortcut 2 Log in to FileCruiser Agent 3 Using
Hyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
Flight Workflow User's Guide. Release 12.0.0
Flight Workflow User's Guide Release 12.0.0 Copyright 2015 Signiant Inc. All rights reserved. Contents CHAPTER 1 Flight Introduction 4 FlightUploadReference 4 FlightDownloadReference 4 Cloud Storage Configuration
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper,
A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks
1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many
Studio 5.0 User s Guide
Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
Remote Network Accelerator
Remote Network Accelerator Evaluation Guide LapLink Software 10210 NE Points Drive Kirkland, WA 98033 Tel: (425) 952-6000 www.laplink.com LapLink Remote Network Accelerator Evaluation Guide Page 1 of 19
Security Issues In Cloud Computing and Countermeasures
Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department
026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide
026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
BillQuick Agent 2010 Getting Started Guide
Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)
A Monitored Student Testing Application Using Cloud Computing
A Monitored Student Testing Application Using Cloud Computing R. Mullapudi and G. Hsieh Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA [email protected], [email protected]
Android Multi-Hop Video Streaming using. wireless networks.
Android Multi-Hop Video Streaming using Wireless Network Shylaja.B.R [email protected] Abstract Modern world has deep penetration of smartphones Which provides an greater range of multimedia content
Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION
WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Reduction of Data at Namenode in HDFS using harballing Technique
Reduction of Data at Namenode in HDFS using harballing Technique Vaibhav Gopal Korat, Kumar Swamy Pamu [email protected] [email protected] Abstract HDFS stands for the Hadoop Distributed File System.
Efficient DNS based Load Balancing for Bursty Web Application Traffic
ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf
Qsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080
Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.
Working with Mail (Hosted Exchange)
TM Control Panel User Guide Working with Mail (Hosted Exchange) 1 Working with Mail (Hosted Exchange) TM offers Microsoft Exchange hosting as a powerful messaging solution allowing you to create and manage
User's Guide. [Home Network] app. Model No.
User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
GeoCloud Project Report GEOSS Clearinghouse
GeoCloud Project Report GEOSS Clearinghouse Qunying Huang, Doug Nebert, Chaowei Yang, Kai Liu 2011.12.06 Description of Application GEOSS clearinghouse is a FGDC, GEO, and NASA project that connects directly
Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2
Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2 Assistant Professor B.E. Student Computer Department Computer Department Shree Swami Atmanand Saraswati
Availability Digest. MySQL Clusters Go Active/Active. December 2006
the Availability Digest MySQL Clusters Go Active/Active December 2006 Introduction MySQL (www.mysql.com) is without a doubt the most popular open source database in use today. Developed by MySQL AB of
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center
Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Presented by: Dennis Liao Sales Engineer Zach Rea Sales Engineer January 27 th, 2015 Session 4 This Session
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
A programming model in Cloud: MapReduce
A programming model in Cloud: MapReduce Programming model and implementation developed by Google for processing large data sets Users specify a map function to generate a set of intermediate key/value
Software Requirements Specification
METU DEPARTMENT OF COMPUTER ENGINEERING Software Requirements Specification SNMP Agent & Network Simulator Mustafa İlhan Osman Tahsin Berktaş Mehmet Elgin Akpınar 05.12.2010 Table of Contents 1. Introduction...
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Sophos Mobile Control Startup guide. Product version: 3.5
Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
CentreWare Internet Services Setup and User Guide. Version 2.0
CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and
Running a Workflow on a PowerCenter Grid
Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
