Robust Communication for Jungle Computing
|
|
- Wilfrid Stephens
- 8 years ago
- Views:
Transcription
1 Robust Communication for Jungle Computing Jason Maassen Computer Systems Group Department of Computer Science VU University, Amsterdam, The Netherlands
2 Requirements (revisited) Resource independence Transparent / easy deployment Middleware independence & interoperability Jungle-aware middleware Jungle-aware communication Robust connectivity System-support for malleability and fault-tolerance Globally unique naming Transparent parallelism & application-level fault-tolerance Easy integration with external software MPI, OpenCL, CUDA, C, C++, scripts, ComplexHPC Spring School
3 Requirements (revisited) Resource independence Transparent / easy deployment Middleware independence & interoperability Jungle-aware middleware Jungle-aware communication Robust connectivity System-support for malleability and fault-tolerance Globally unique naming Transparent parallelism & application-level fault-tolerance Easy integration with external software MPI, OpenCL, CUDA, C, C++, scripts, ComplexHPC Spring School
4 Low-level problems Many sites have connectivity issues Firewalls Network Address Translation (NAT) Non-routed networks Multi homing Mis-configured machines... This makes it very hard to use a combination of machines! ComplexHPC Spring School
5 High-level problems We need more advanced features: Malleability: machines come and go during the application lifetime Fault Tolerance: machines may crash at any time Robust and globally unique naming Flexible communication primitives Multicast or many-to-one communication Efficient serialization of complex data structures Need to be robust! ComplexHPC Spring School
6 Existing libraries Sockets is too low-level for daily use Only point-to-point No resource management MPI is too inflexible Focus on SPMD model Little/no support for malleability or fault tolerance Neither can handle firewalls/nat/etc. ComplexHPC Spring School
7 Ibis Ibis offers Jungle proof communication: SmartSockets Sockets library (on top of regular TCP/IP) Solves low-level connectivity problems Ibis Portability Layer (IPL) MPI for Jungle computing Offers high-level communication primitives ComplexHPC Spring School
8 Where are we? ComplexHPC Spring School
9 SmartSockets What problems does it solve? Unreachable machines: Behind firewall / NAT or on private network Machine identification: Machines have multiple IPs Multiple machines have the same (private) IP ComplexHPC Spring School
10 Problem 1: Firewalls Blocks 'inappropriate' connections Usually only blocks incoming connections Some also block outgoing connection ComplexHPC Spring School
11 Problem 2: Network Address Translation Allows multiple machines to share an IP address ComplexHPC Spring School
12 Problem 2: Network Address Translation ComplexHPC Spring School
13 Problem 2: Network Address Translation ComplexHPC Spring School
14 Problem 2: Network Address Translation ComplexHPC Spring School
15 Problem 2: Network Address Translation ComplexHPC Spring School
16 Problem 3: Multi Homing Some sites have multiple networks The target address depends on the source of the connection ComplexHPC Spring School
17 Problem 4: Non-routed Networks No route between local network and internet Only the frontend is reachable ComplexHPC Spring School
18 Problem 5: Machine Identification Private IPs (NAT/non-routed) lead to machine identification problems ComplexHPC Spring School
19 SmartSockets Solutions The SmartSockets library Detects connectivity problems Tries to solve them automatically using: Smart Addressing Side channel... and various tricks: SSH Tunneling (pass through firewalls) STUN (detect external IP of NAT) UPnP (automatic port forwarding)... ComplexHPC Spring School
20 SmartSockets Library Integrates existing and new solutions into one library With as little help from the user as possible Mostly transparent to user! Offers a socket-like interface Addressing is different ComplexHPC Spring School
21 Smart Addressing Instead of using a single IP:port combination for each machine we use: All machine addresses Add extra information External address + port for NAT (STUN, UPnP) SSH contact information UUID (if entire address is private) ComplexHPC Spring School
22 Addressing Examples ComplexHPC Spring School
23 Creating a Connection ComplexHPC Spring School
24 Using Smart Addresses This solves machine identification problems All addresses are known with multi-homing Each identity is unique with private IPs The identity is always checked Assumes anyone can create a connection This will not help when target is behind NAT/Firewall To solve this we need a side channel ComplexHPC Spring School
25 Side channel Overlay network implemented using a set of hubs Support processes for the application Started in advance Hubs are run on machines with 'more connectivity' Such as cluster frontends, 'open' machines, etc. How / where you start them is a separate problem Solved by IbisDeploy ComplexHPC Spring School
26 Hubs Similar to a peer-to-peer overlay network Hubs connect to each other Gossip information about other hubs Automatically discover new hubs and routes Need to set up spanning tree (or better) Use direct connections and SSH tunnels Clients connect to a 'local' hub Use as side channel for connection setup ComplexHPC Spring School
27 Hub Overlay Network ComplexHPC Spring School
28 Advanced Connection Setup ComplexHPC Spring School
29 Advanced Connection Setup Reverse direction of connection setup Send message to target using hub and wait for incoming connection Results in direct connection Route via overlay Create virtual connection using hubs Forward all data over side channel Results in indirect connection ComplexHPC Spring School
30 SmartSockets All problems solved Unreachable machines: SSH tunnels Reverse connection setup Routing over hubs Machine identification: Smart addressing Identity check at connection setup ComplexHPC Spring School
31 ComplexHPC Spring School
32 Hub Network ComplexHPC Spring School
33 Evaluation Regular TCP/IP only worked in 6 out of 30 SmartSockets worked in 30 out of 30! ComplexHPC Spring School
34 Evaluation ComplexHPC Spring School
35 Summary In Jungle computing communication is hard! Many connectivity problems occur Takes a lot of work to find the problems and work around them SmartSockets reduces this to a single problem: How to set up a spanning tree of hubs The rest is done automatically! ComplexHPC Spring School
36 However. Sockets is too low level for daily use For Jungle computing we need support for Malleability Fault Tolerance Robust and globally unique naming Flexible communication primitives Provided by the Ibis Portability Layer (IPL) ComplexHPC Spring School
37 Ibis Portability Layer (IPL) Simple API for Jungle Communication Flexible communication model Connection oriented messaging Abstract addressing scheme Resource tracking Notifications when machines join/leave/crash Efficient serialization Send bytes, doubles, objects, etc. Portable: SmartSockets, TCP, UDP, MPI, MX, BlueTooth, ComplexHPC Spring School
38 Communication Model Simple communication model Unidirectional pipes Two end points (send and receive ports) send port receive port Connection oriented Allows streaming (good with high latency) Portable model Easy to implement on Sockets/MPI/MX/ ComplexHPC Spring School
39 Communication Model Flexible model! ComplexHPC Spring School
40 Port Types All ports have a type Defined at runtime Specify set of capabilities Types must match when connecting! X ComplexHPC Spring School
41 Port Types Consists of a set of capabilities: Connection patterns Unicast, many-to-one, one-to-many, many-to-many. Communication properties: Fifo ordering, numbering, reliability. Serialization properties: Bytes, primitive types, objects Message delivery: Explicit receipt, automatic upcalls, polling ComplexHPC Spring School
42 Port Types Forces programmer to specify how each communication channel is used Prevents bugs Exception when contract is breached Allows efficient implementation to be selected Unicast only? Transfer bytes only? Can save a lot complexity! ComplexHPC Spring School
43 Messages Ports communicate using 'messages' Contain read or write methods for Primitive types (byte, int,...) Object Arrays slices (partial write / read in place) Unlimited message size Streaming ComplexHPC Spring School
44 Abstract addressing IbisIdentifier: Abstract 'machine address' object Hides network specific details Examples: SmartSockets addresses, hostnames, IP addresses, MPI ranks, etc Results in more portable applications Independent of network infrastructure Why don't we use ranks? Hard to support malleability and fault-tolerance! ComplexHPC Spring School
45 Resource Tracking IPL offers JEL (join, elect, leave) model Application gets signal when a machine joins or leaves Supports elections for distributed decision making Allows machines to be elected as master Can ensure totally ordered notifications Implemented using separate registry component Server that tracks application participants Can track multiple applications simultaneously, each in its own pool ComplexHPC Spring School
46 Registry Example ibis-bad9955 pool-1 ibis-983qq8f pool-3 ibis-rt66pp2 Registry ibis-az33zx7 ibis-34fdw21 pool-2 ibis-99wf331 ComplexHPC Spring School
47 Registry Many implementations Centralized, broadcast, gossiping, etc. Different tradeoffs in functionality, complexity, robustness, scalability and consistency Application can select the functionality and consistency that is needed Reducing functionality or consistency further improves scalability ComplexHPC Spring School
48 Elections JEL also offers an 'election' Allows a group to determine who's special Ranks don't work in a malleable Jungle! Each election Has a name (String) Produces IbisIdentifier of the winner Is not democratic You can also be 'an observer' ComplexHPC Spring School
49 Ibis Capabilities When initializing the application must specify: The PortTypes it is going to use Defines what kind of communication you need The Resource tracking behaviour it needs Totally ordered upcalls, reliable elections etc... Closed world pool, malleable pool, etc... The IPL implementation it prefers SmartSockets, MX, MPI, etc. This allows the runtime to check if the requested combination is feasable ComplexHPC Spring School
50 Example ComplexHPC Spring School
51 Example ComplexHPC Spring School
52 Performance Evaluation Data Parallel Image Processing ComplexHPC Spring School
53 Performance Evaluation Data Parallel Image Processing ComplexHPC Spring School
54 Jungle Computing ComplexHPC Spring School
55 Conclusion SmartSockets provides robust connectivity Solves issues caused by firewalls/nat/multihoming/... IPL adds high-level communication primitives System-support for malleability and fault-tolerance Globally unique naming The combination is a perfect match to create Jungle proof applications and programming models ComplexHPC Spring School
SmartSockets: Solving the Connectivity Problems in Grid Computing
SmartSockets: Solving the Connectivity Problems in Grid Computing Jason Maassen and Henri E. Bal Dept. of Computer Science, Vrije Universiteit Amsterdam, The Netherlands jason@cs.vu.nl, bal@cs.vu.nl ABSTRACT
More informationWelcome to the Jungle
Welcome to the Jungle Dr. Frank J. Seinstra Jungle Computing Research & Applications Group Department of Computer Science VU University, Amsterdam, The Netherlands SARA: 1971-2011 Congratulations! 2 A
More informationCS555: Distributed Systems [Fall 2015] Dept. Of Computer Science, Colorado State University
CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Daisy chain MapReduce jobs? Multiple
More informationMulti-Channel Clustered Web Application Servers
THE AMERICAN UNIVERSITY IN CAIRO SCHOOL OF SCIENCES AND ENGINEERING Multi-Channel Clustered Web Application Servers A Masters Thesis Department of Computer Science and Engineering Status Report Seminar
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationProject 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
More informationIntroduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
More informationDistrict of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
More informationResource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
More informationREMOTE ASSISTANCE SOLUTIONS Private Server
REMOTE ASSISTANCE SOLUTIONS Private Server UBIQUITY components Control Center: client on the remote assistance PC Ubiquity Runtime: software installed on the remote device Ubiquity Server Infrastructure:
More informationFile Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
More informationWeb Service Robust GridFTP
Web Service Robust GridFTP Sang Lim, Geoffrey Fox, Shrideep Pallickara and Marlon Pierce Community Grid Labs, Indiana University 501 N. Morton St. Suite 224 Bloomington, IN 47404 {sblim, gcf, spallick,
More informationIngegneria del Software II academic year: 2004-2005 Course Web-site: [www.di.univaq.it/ingegneria2/]
Course: Ingegneria del Software II academic year: 2004-2005 Course Web-site: [www.di.univaq.it/ingegneria2/] Middleware Technology: Middleware Applications and Distributed Systems Lecturer: Henry Muccini
More informationArchitectural Patterns. Layers: Pattern. Architectural Pattern Examples. Layer 3. Component 3.1. Layer 2. Component 2.1 Component 2.2.
Architectural Patterns Architectural Patterns Dr. James A. Bednar jbednar@inf.ed.ac.uk http://homepages.inf.ed.ac.uk/jbednar Dr. David Robertson dr@inf.ed.ac.uk http://www.inf.ed.ac.uk/ssp/members/dave.htm
More informationTomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationCHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
More informationChapter 8 Jungle Computing: Distributed Supercomputing Beyond Clusters, Grids, and Clouds
Chapter 8 Jungle Computing: Distributed Supercomputing Beyond Clusters, Grids, and Clouds Frank J. Seinstra, Jason Maassen, Rob V. van Nieuwpoort, Niels Drost, Timo van Kessel, Ben van Werkhoven, Jacopo
More informationAlfresco Enterprise on Azure: Reference Architecture. September 2014
Alfresco Enterprise on Azure: Reference Architecture Page 1 of 14 Abstract Microsoft Azure provides a set of services for deploying critical enterprise workloads on its highly reliable cloud platform.
More informationICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration
ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there
More informationWhite Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments
White Paper SSL vs. IPSec Streamlining Site-to-Site VPN Deployments May 2011 SiteDirect Access. Security. Delivery. Introduction Traditionally, corporate users rely on IPSec for site-to-site access. However,
More informationWindows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
More informationChapter 2: Remote Procedure Call (RPC)
Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationMilsVPN VPN Tunnel Port Translation. Table of Contents...1 1. Introduction...2 2. VPN Tunnel Settings...2
Page 1 of 8 Table of Contents Table of Contents...1 1. Introduction...2 2. VPN Tunnel Settings...2 2.1 VPN Settings...2 2.2 MilsVPN Service Properties...3 3. Service Object Creation...3 4. Firewall rules
More informationWhy SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. aidan.gogarty@hob.de What are we all trying to achieve? Fully transparent network access
More informationDissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
More informationTel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com. CAIL Security Facility
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary
More informationLoad Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
More informationHow To. Instreamer to Exstreamer connection. Project Name: Document Type: Document Revision: Instreamer to Exstreamer connection. How To 1.
Instreamer to Exstreamer connection Project Name: Document Type: Document Revision: Instreamer to Exstreamer connection 1.11 Date: 06.03.2013 2013 Barix AG, all rights reserved. All information is subject
More informationApplications of Passive Message Logging and TCP Stream Reconstruction to Provide Application-Level Fault Tolerance. Sunny Gleason COM S 717
Applications of Passive Message Logging and TCP Stream Reconstruction to Provide Application-Level Fault Tolerance Sunny Gleason COM S 717 December 17, 2001 0.1 Introduction The proliferation of large-scale
More informationControlling Ashly Products From a Remote PC Location
Controlling Ashly Products From a Remote PC Location Introduction Ashly networked products can be accessed from a remote PC on a different network if the router used for the Ashly device is properly configured.
More informationELIXIR LOAD BALANCER 2
ELIXIR LOAD BALANCER 2 Overview Elixir Load Balancer for Elixir Repertoire Server 7.2.2 or greater provides software solution for load balancing of Elixir Repertoire Servers. As a pure Java based software
More informationCSci 8980 Mobile Cloud Computing. Mobile Cloud Programming
CSci 8980 Mobile Cloud Computing Mobile Cloud Programming Introduction Mobile applications are multi-platform, multi-user Introduction Code and data spread across many systems The Problem Deployment logic
More informationA Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl
More informationNAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
More informationImproved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
More informationNAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25
NAT & IP Masquerade Page 1 of 5 INTRODUCTION Pre-requisites TCP/IP IP Address Space NAT & IP Masquerade Protocol version 4 uses a 32 bit IP address. In theory, a 32 bit address space should provide addresses
More information13th IFIP/IEEE International Workshop on Distributed Systems: Operations & Management
13th IFIP/IEEE International Workshop on Distributed Systems: Operations & Management October 21-23, 2002, Montreal, Canada A Hot-Failover State Machine for Gateway Services and its Application to a Linux
More informationFirewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationSSC - Communication and Networking Java Socket Programming (II)
SSC - Communication and Networking Java Socket Programming (II) Shan He School for Computational Science University of Birmingham Module 06-19321: SSC Outline Outline of Topics Multicast in Java User Datagram
More informationRef: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on 16 10 2010
IPv4 Addressing There are several non-profit organizations in the world that have the authority for assigning IP addresses to institutions that need access to the Internet. These organizations are (for
More informationChapter 17: Distributed Systems
Chapter 17: Distributed Systems Chapter 17: Distributed Systems Advantages of Distributed Systems Types of Network-Based Operating Systems Network Structure Communication Structure Communication Protocols
More informationTunnel Broker System Using IPv4 Anycast
Tunnel Broker System Using IPv4 Anycast Xin Liu Department of Electronic Engineering Tsinghua Univ. lx@ns.6test.edu.cn Xing Li Department of Electronic Engineering Tsinghua Univ. xing@cernet.edu.cn ABSTRACT
More informationBT Business Broadband
Small Office Network Guide BT Business Broadband with the BT Business Hub www.btbroadbandoffice.com Notice to users Updates and additions to software may require an additional charge. Subscriptions to
More informationNetwork Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
More information0018-9162/10/$26.00 2010 IEEE
Rese arch FE ATURE Real-World Distributed Computing with Ibis Henri E. Bal, Jason Maassen, Rob V. van Nieuwpoort, Niels Drost, Roelof Kemp, Timo van Kessel, Nick Palmer, Gosia Wrzesi ska, Thilo Kielmann,
More informationRequired Ports and Protocols. Communication Direction Protocol and Port Purpose Enterprise Controller Port 443, then Port 11165 Port 8005
Oracle Enterprise Manager Ops Center Ports and Protocols Guide 12c Release 2 (12.2.2.0.0) E51942-04 December 2014 This document contains the latest information on the ports and protocols that Oracle Enterprise
More informationIBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
More informationCisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture
Reference Architecture Cisco Hybrid Cloud Solution: Deploy an E-Business Application with Cisco Intercloud Fabric for Business Reference Architecture 2015 Cisco and/or its affiliates. All rights reserved.
More informationWhat can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications.
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. 2 Contents: Abstract 3 What does DDS do 3 The Strengths of DDS 4
More informationApplication Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
More informationFig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
More informationIRATI - Investigating RINA as an Alternative to TCP/IP
Títol de la presentació de powerpoint IRATI - Investigating RINA as an Alternative to TCP/IP FIRE Engineering Workshop, Ghent, Belgium November 6th, 2012 Sergi Figuerola Project coordinator Director @
More informationInternet Protocol version 4 Part I
Internet Protocol version 4 Part I Claudio Cicconetti International Master on Information Technology International Master on Communication Networks Engineering Table of Contents
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationTiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008)
Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008) Dominique Im Obersteg Distributed Systems Seminar 2011, ETH Zurich
More informationArchitecture of a Distributed Object Firewall Proxy. Abstract
NAI Labs #0768 Architecture of a Distributed Object Firewall Proxy July 16, 2000 Gary Lamperillo Gary_Lamperillo@NAI.com NAI Labs - The Security Research Division Network Associates 3415 S. Sepulveda Blvd.
More informationComputer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University
Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier
More informationPLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure
Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling
More informationDr Markus Hagenbuchner markus@uow.edu.au CSCI319. Distributed Systems
Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 Distributed Systems CSCI319 Chapter 8 Page: 1 of 61 Fault Tolerance Study objectives: Understand the role of fault tolerance in Distributed Systems. Know
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationJGroups: : a Java system for communicating with a group of machines
Hello IP API JGroups: : a Java system for communicating with a group of machines Savaş Ali TOKMEN MSc in Computer Engineering UFR IMA, Grenoble, FRANCE 2006 - Savaş Ali TOKMEN JGroups - page 1 IP IP API
More informationDeploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks
Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks Document Overview This document provides an overview of how to effectively and securely provide IP-based videoconferencing
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationPlug-and-play Virtual Appliance Clusters Running Hadoop. Dr. Renato Figueiredo ACIS Lab - University of Florida
Plug-and-play Virtual Appliance Clusters Running Hadoop Dr. Renato Figueiredo ACIS Lab - University of Florida Advanced Computing and Information Systems laboratory Introduction You have so far learned
More information7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
More informationIP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
More informationComputer Networks Practicum 2015
Computer Networks Practicum 2015 Vrije Universiteit Amsterdam, The Netherlands http://acropolis.cs.vu.nl/ spyros/cnp/ 1 Overview This practicum consists of two parts. The first is to build a TCP implementation
More informationNAT Traversal for VoIP. Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University
NAT Traversal for VoIP Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University 1 What is NAT NAT - Network Address Translation RFC 3022
More informationProxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
More informationIP Multicasting. Applications with multiple receivers
IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data
More informationNAT REFERENCE GUIDE. VYATTA, INC. Vyatta System NAT. Title
Title VYATTA, INC. Vyatta System NAT REFERENCE GUIDE NAT Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) Copyright COPYRIGHT Copyright 2005
More informationModular Communication Infrastructure Design with Quality of Service
Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute
More informationChapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationCORBA and object oriented middleware. Introduction
CORBA and object oriented middleware Introduction General info Web page http://www.dis.uniroma1.it/~beraldi/elective Exam Project (application), plus oral discussion 3 credits Roadmap Distributed applications
More informationDetecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
More informationWindows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products
Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products 1.0 Overview By default, Windows XP Service Pack 2 (SP2) enables Windows Firewall, previously known as Internet
More informationScalable Linux Clusters with LVS
Scalable Linux Clusters with LVS Considerations and Implementation, Part I Eric Searcy Tag1 Consulting, Inc. emsearcy@tag1consulting.com April 2008 Abstract Whether you are perusing mailing lists or reading
More informationNAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:simon.perreault@viagenie.ca http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
More informationStrategies. Addressing and Routing
Strategies Circuit switching: carry bit streams original telephone network Packet switching: store-and-forward messages Internet Spring 2007 CSE 30264 14 Addressing and Routing Address: byte-string that
More informationLoad Balancing using Pramati Web Load Balancer
Load Balancing using Pramati Web Load Balancer Satyajit Chetri, Product Engineering Pramati Web Load Balancer is a software based web traffic management interceptor. Pramati Web Load Balancer offers much
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationDefinition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
More informationLimi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming
Socket Programming Limi Kalita M.Tech Student, Department of Computer Science and Engineering, Assam Down Town University, Guwahati, India. Abstract: The aim of the paper is to introduce sockets, its deployment
More informationSERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
More informationNetfilter / IPtables
Netfilter / IPtables Stateful packet filter firewalling with Linux Antony Stone Antony.Stone@Open.Source.IT Netfilter / IPtables Quick review of TCP/IP networking & firewalls Netfilter & IPtables components
More informationScalability in Grids. Thilo Kielmann Vrije Universiteit, Amsterdam kielmann@cs.vu.nl
Scalability in Grids Thilo Kielmann Vrije Universiteit, Amsterdam kielmann@cs.vu.nl Scalability...is a desirable property of a system, a network or a process, which indicates its ability to either handle
More informationADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
More informationLoad Balancing SIP Quick Reference Guide v1.3.1
Load Balancing SIP Quick Reference Guide v1.3.1 About this Guide This guide provides a quick reference for setting up SIP load balancing using Loadbalancer.org appliances. SIP Ports Port Protocol 5060
More informationTHE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES
THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES Pamela Zave AT&T Laboratories Research Florham Park, New Jersey, USA Jennifer Rexford Princeton University Princeton, New Jersey, USA THE
More informationSetting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer
Setting up a reflector-reflector interconnection using Alkit Reflex RTP reflector/mixer Mathias Johanson Alkit Communications AB Introduction The Alkit Reflex reflector/mixer system can be set-up to interconnect
More informationNetworking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
More informationPeerMon: A Peer-to-Peer Network Monitoring System
PeerMon: A Peer-to-Peer Network Monitoring System Tia Newhall, Janis Libeks, Ross Greenwood, Jeff Knerr Computer Science Department Swarthmore College Swarthmore, PA USA newhall@cs.swarthmore.edu Target:
More informationAS/400e. TCP/IP routing and workload balancing
AS/400e TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000. All rights reserved. US Government Users Restricted
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More information