SyncML Device Management
|
|
|
- Luke Harrington
- 10 years ago
- Views:
Transcription
1 SyncML Device Management An overview and toolkit implementation Radu State Ph.D. The MADYNES Research Team LORIA INRIA Lorraine 615, rue du Jardin Botanique Villers-lès-Nancy France MADYNES
2 Tutorial Outline SyncML-DM : an Approach for Managing Dynamic Devices Representation Protocol for Device Management Device Management Protocol Standardized Objects Device Management Tree MAD-MAX Toolkit Benchmarkings MADYNES
3 Towards open data synchronization 2000: creation of the SyncML consortium ( Members : More than 600 companies-ibm, Nokia, Motorola, Ericsson, Matsushita, Symbian, Openwave.. Objective : Develop an Open Standard for data Synchronization Additional Results : Device Management Framework for managing devices. Synchronization Markup Language is an Open Specification for universal synchronization MADYNES
4 Use cases for Device Management Remote service management Troubleshooting Personal Management Storage Management Monitoring Software download Over the air Mass Configuration MADYNES
5 Challenges in Device Management Heterogeneous devices Many applications Multiple network connectivity Limited resources MADYNES
6 Requirements for Device Management Operate effectively over wireless and wired networks Support a variety of transport protocols Support arbitrary networked data Enable data access from a variety of applications Address the resource limitations of the mobile device Build upon existing Internet and Web technologies MADYNES
7 Wireless/Wired Network Operations Ubiquitous wireless access Redefine Management 1. High network latency 2. Limited bandwidth 3. Low reliability of both data and connectivity 4. Dynamic Addresses and network connectivity 5. Firewall, Nats several management domains 6. Out of coverage factors 1. Management might be to late 2. Manage efficiently (whenever it s required without wasting resources) 3. Connection Oriented management 4. Application level naming and addressing 5. Device initiated management 6. Different Fault behavior management MADYNES
8 Scope of SyncML XML based framework for data synchronization Message oriented data exchange protocol Transport agnostic Universal deployment Extension for device management MADYNES
9 SyncML Specifications More than just XML Device Description Framework Synchronization Protocol Device Information DTD Bootstrapping Representation Protocol Device Management Protocol Synchronization Framework Device Management Framework HTTP OBEX WSP Transport Technology Bindings MADYNES
10 Representation Protocol - Objective 1. Specifies the structure of SyncML messages 2. Defines a vocabulary to describe management data and operations 3. Core component of the SyncML framework on which all others components are based Container Element SyncML Message Container Element SyncML Header Container Element SyncML Body Data description elements We will cover them in this order: Common Use Elements Protocol Management Elements Command Elements Data Description Elements Message Container Elements Common Use Elements Protocol Management Elements Commands MADYNES
11 Protocol Management Element(s) <MsgID>1</MsgID> <Get> <CmdID>1</CmdID> <Item> <Target> <LocURI>./Contacts/John</LocURI> </Target> </Item> </Get> Management Operations (one SyncML Message) Manager Status Code Result for each operation Agent <Status> <CmdID>4</CmdID> <MsgRef>1</MsgRef> <CmdRef> 1</CmdRef> <Cmd>Get<Cmd> <TargetRef><LocURI>./Contacts/John</LocURI> </TargetRef> <Data>401</Data> </Status> MADYNES
12 Command Elements functional classification 1. Data Command Elements used to change application data Add - creates a new interior node Copy copies values from a node to another at the client side Delete deletes a node (and all its subnodes) Exec process execution on the target Replace overwites value for an existing node Get retrieves data from the target 1. DataStore Command Elements Actions for an entire datastore Alert used for notifications, text displays Results contains results from a Get 2. Process Flow Commands enhanced processing control Atomic all subcommands must be executed Sequence subcommands must be executed in order MADYNES
13 The Duo: Get and Results <MsgID>1</MsgID> <Get> <CmdID>2</CmdID> <Item> <Target> <LocURI>./Contacts/John</LocURI> </Target> </Item> </Get> <Results> <MsgRef>1</MsgRef> <CmdRef>2</CmdRef> <CmdID>2</CmdID> <Item> <Source> <LocURI>./Contacts/John</LocURI> </Source> <Data>Tel: </Data> </Item> </Results> MADYNES
14 Data Description Elements 1. <Data>.</Data> encloses SyncML payload data 2. <Item>.</Item> isolates a command from the underlying data Contains Data, Identification and Metadata 3. <Meta>..</Meta> provides meta-information about the data Type of the data Size of the data Meta Data Item MADYNES
15 Device Management Framework Describes the management information and how to access it Management Tree 1. Framework for describing management information 2. Management Tree 3. Standardized Objects Managed Object MADYNES
16 Purpose of the Device Management Framework Generic device description framework SyncML Describes methodology for describing managed device Device Model specific to an equipment models Uses Management Protocol Managed Device Management Application MADYNES
17 Modeling Management Information in SyncML <!ELEMENT Node (NodeName, Path?, RTProperties?, DFProperties, (Node* Value?))> <!ELEMENT NodeName (#PCDATA)> <!ELEMENT Path (#PCDATA)> <!ELEMENT Value (#PCDATA)> <!ELEMENT RTProperties (ACL, Format, Name, Size?, Title?, TStamp?, Type?, VerNo?)> <!ELEMENT ACL (#PCDATA)> <!ELEMENT Format (b64 bool chr int node null xml)> Dynamic self-described management information A XML Tree Node captures information about : Name of the managed object ACL Subtrees Value Data Type of the Managed Object MADYNES B C E F G Management Information
18 Framework properties of a Managed Object DFProperties Occurence AccessType DFType DFFormat Description Which operations are possible? Add, Copy, Delete, Exec, Mime type Get, Replace of the node value Data Format of the node Eg. bool, chr, int, node, null, xml Description of the node Framework properties do not change at run-time. Analogous to a MIB2 definition MADYNES
19 Runtime Properties of the Managed Object ACL If used, indicates ACL Node RTProperties Name Same as NodeName NodeName Format Format of the value Size Size of the node in bytes Tstamp Timestamp of last change Type Objective : Describe instantiated Managed Object type of the node MADYNES
20 Access Control Lists (ACL) ACL Property regulate access to a MO MO A B ACL A ACL B Get=Server A&Replace=Server B C ACL C D ACL D Server A Server B ACL operation 1. Internal Nodes access to ACL is regulated by the ACL itself 2. Terminal Nodes Parent Node ACL regulates ACL modifications 3. If ACL empty then closest ancestor ACL is used MADYNES
21 Addressing Object Values and Properties Addressing node values : Object is identified by complete path to the root of the management tree Example : <LocURI>NodeA/NodeB</LocURI> B A Extended usage of the tags: Meta, Format, Type <Meta> <Format>chr</Format> <Type>text/plain</Type> </Meta> Meta to indicate metainformation Format (string in this example) for the data format via Runtime property Format Type =value for the Mime type Addressing Property values : node URI+?prop=<property_name> Example : addressing ACL property of Node B : /SyncML/NodeA/NodeB?prop=ACL MADYNES
22 Device Management Standardized Objects Mandatory Device Management Objects for any SyncML device Management Information Regarding : 1. Connectivity information (protocol IPv4/IPV6, addresses, ports) 2. Accepted authentication methods 3. Bearer type (eg. Obex, GSM, CDMA) 4. Management server ID 5. Manufacturer ID, 6. Model and Device ID 7. Software version Think MIB 2 for device management.. MADYNES
23 Requirements for the Device Management Protocol Requirement: Ability to deal with dynamic environments Dynamic network connectivity Unreliable communication medium Not always on-line devices due to out of coverage or limited mobility management Limited incoming connections for devices Management Traffic Device Foreign Access Network Firewall WAN BT Router Management Application Home Network Access network Management domain WAN Management domain Home Network Management domain MADYNES
24 Design choices for the Device Management Protocol 1. Session Oriented 2. Client initiated 3. Out of band notification support 4. XML encoded 5. User interaction enabled Notification I want to manage you! Management Session Client initiated Rationale 1. Devices might not be always online 2. Most firewalls will allow only device initiated connections 3. Notification support needed for server initiated sessions 4. User might have other priorities MADYNES
25 A Management Session Package 0 Optional Notification Server Client Package 1 Client initiates session Package 2 Server initiatialisation+mgt requests Package 3 Results (for mgt requests) Five logical packages In most cases one package is a SyncML message { { Package 4 Mgt. Requests Package 3 Results (for mgt requests) Package 4 Mgt. Requests Oversized packages can be included in several message Protocol state (each site) is determined by current protocol Package 3 Results (for mgt requests) MADYNES
26 Security in SyncML Management Device Server Package 0 Optional Notification Package 1 Client initiates session 1. Authentication of Server 2. Integrity check of the message (MD5/basic authentication) { { Package 2 Server initiatialisation+mgt requests Package 3 Results (for mgt requests) Package 4 Mgt. Requests Package 3 Results (for mgt requests) Package 4 Mgt. Requests Package 3 Results (for mgt requests) 1. Two way authentication 2. Integrity check of the message 3. Access Control List mechanism 4. Confidentiality provided by transport level (HTTPS, SSL, OBEX) MADYNES
27 Existing Implementations Proprietary implementations : Major actors and contributors to the standard. Open Source : Sync4J ( for the data synchronization. No device management functionality. LORIA/MADYNES : SyncML Agent toolkit ( MADYNES
28 MAD-MAX Overall functionality Device Description Framework Methodology for describing device information models Management Application Device Specific Information Model uses Management Protocol Management Tree /MgtTree/Vendor/ Ring_signals /MgtTree /MgtTree/Vendor /MgtTree/Vendor/ Ring_signals/Beep Managed Device { { Package 0 Optional Notification Package 1 Client initiates session Package 2 Server authentication+mgt requests Package 3 Results (for mgt requests) Package 4 Mgt. Requests Package 3 Results (for mgt requests) Package 4 Mgt. Requests Package 3 Results (for mgt requests) Example of a SyncML message <SyncHdr>. </SyncHdr> <SyncBody> <Status> <CmdID>5</CmdID> <MsgRef>2</MsgRef> <CmdRef>0</CmdRef> <Cmd>SyncHdr</Cmd> <Data>212</Data> </Status> <Results> <CmdID>6</CmdID> <CmdRef>1</CmdRef> <MsgRef>2<MsgRef> <Cmd>Get</Cmd> <item> <Source>..</Source> <Data>Returned value</data> <Item> </Results> <Final/>. MADYNES
29 MAD-MAX Functional Architecture Agent Toolkit SyncML DM MO DM Tree Browser Extension Manager DeviceLet Factory HTTP Adaptor TCP Adaptor DM Protocol Engine DM Tree Manager Custom DeviceLets Custom DeviceLets Security Manager Extendible Agent Custom DeviceLets MADYNES
30 The Protocol Engine Protocol state machine design and implementation MADYNES
31 DM Tree Browser MADYNES
32 Extensibility MADYNES
33 Extension Mechanisms MADYNES
34 Benchmarks Encoding strategies One message with several requests versus several individual messages Management Bandwidth Management Traffic for one global message Management Traffic for one request per message Number of management requests MADYNES
35 Bandwidth efficiency Experimental efficiency assessment Bandwith overhead Bandwith overhead Bandwitdth ratio Number of management requests MADYNES
36 Benchmarking the latency One message with several requests versus several individual messages Response Time Analysis Response Time for one global message Response Time for one request per message Number of management requests Time is Money MADYNES
37 SyncML DM summary SyncML DM is more than just XML based configuration Framework for describing management information A set of standard Managed Objects Transaction oriented Management Protocol Network level transport agnostic Flexible Access Control Adaptation of conceptual design approaches from the SNMP framework towards device mobility Similar building blocks to the SMI, MIB2 and SNMP and Get/Set semantics Reversed roles : a managed Device initiates a management session Power for the users : allow/deny management actions What to expect More OpenSource implementations Interoperability studies Performance analysis and large scale deployment tests MADYNES
SyncML Device Management Bootstrap
1 of 18 Pages SyncML Device Management Bootstrap Abstract This document defines the how a SyncML DM device is brought from a clean state, to a state where it is capable to initiate a management session
Open Mobile Alliance (OMA) Device Management Overview. Peter Thompson Mark Staskauskas Qualcomm Incorporated
Open Mobile Alliance (OMA) Device Management Overview Peter Thompson Mark Staskauskas Qualcomm Incorporated Motivation for this Presentation Many of the features envisioned for the TR-50 Smart Device Communications
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
[MS-MDM]: Mobile Device Management Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-MDM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
ITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do
TELE 301 Network Management
TELE 301 Network Management Lecture 20: Management Tools and Protocols Haibo Zhang Computer Science, University of Otago TELE301 Lecture 20: Management tools and protocols 1 What is Network Management?
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
A Comparison of Protocols for Device Management and Software Updates
B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013
Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues
Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
Active Management Services
Active Management Services White Paper 2.0 for Ricoh Customers Prepared by Professional Services department of Ricoh International B.V. Monday, 14 January 2013 TABLE OF CONTENT 1. Introduction... 4 2.
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH MICROSOFT WINDOWS SERVER 2008 TERMINAL SERVICES Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the
DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services
DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
System and Network Management
- System and Network Management Network Management : ability to monitor, control and plan the resources and components of computer system and networks network management is a problem created by computer!
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
Simple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5
Technical Note Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 In the VMware Infrastructure (VI) Perl Toolkit 1.5, VMware
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
Building a protocol validator for Business to Business Communications. Abstract
Building a protocol validator for Business to Business Communications Rudi van Drunen, Competa IT B.V. ([email protected]) Rix Groenboom, Parasoft Netherlands ([email protected]) Abstract
DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0
DEPLOYMENT GUIDE Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0 Introducing the F5 and Microsoft Dynamics CRM configuration Microsoft Dynamics CRM is a full customer relationship
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
SETUP SSL IN SHAREPOINT 2013 (USING SELF-SIGNED CERTIFICATE)
12/15/2012 WALISYSTEMSINC.COM SETUP SSL IN SHAREPOINT 2013 (USING SELF-SIGNED CERTIFICATE) Setup SSL in SharePoint 2013 In the last article (link below), you learned how to setup SSL in SharePoint 2013
Lecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
HexaCorp. White Paper. SOA with.net. Ser vice O rient ed Ar c hit ecture
White Paper SOA with.net Ser vice O rient ed Ar c hit ecture Introduction SOA, a rich technology foundation designed for building distributed service-oriented applications for the enterprise and the web
Certes Networks Layer 4 Encryption. Network Services Impact Test Results
Certes Networks Layer 4 Encryption Network Services Impact Test Results Executive Summary One of the largest service providers in the United States tested Certes Networks Layer 4 payload encryption over
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
WLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL *
WLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL * Bhargavi Hiremagalur and Dulal C. Kar Department of Computing and Mathematical Sciences, Texas A&M University-Corpus Christi,
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Microsoft Exchange Server 2007 Table of Contents Table of Contents Deploying F5 devices with Microsoft Exchange Server 2007 Client Access Servers Prerequisites
Grandstream Networks, Inc.
Grandstream Networks, Inc. XML Based Downloadable Phone Book Guide GXP21xx/GXP14xx/GXP116x IP Phone Version 2.0 XML Based Downloadable Phone Book Guide Index INTRODUCTION... 4 WHAT IS XML... 4 WHY XML...
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 Deploying F5 with Microsoft IIS 7.0 and 7.5 F5's BIG-IP system can increase the existing benefits of deploying
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
WiMAX Forum Proprietary
Architecture, detailed Protocols and Procedures WiMAX Over-The-Air Provisioning & Activation Protocol based on OMA DM Specifications WMF-T-0-R0v0 WMF Approved (0--) WiMAX Forum Proprietary Copyright 0
App Orchestration 2.5
App Orchestration 2.5 Configuring SSL for App Orchestration 2.5 Prepared by: Andy Zhu Last Updated: July 25, 2014 Contents Introduction... 3 Configure SSL on the App Orchestration configuration server...
Data Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008
DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008 Table of Contents Table of Contents Deploying F5 with Microsoft Windows Server 2008 Prerequisites and configuration notes...1-1 Deploying
Barracuda Networks Web Application Firewall
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Barracuda Networks Web Application Firewall January 30, 2015 Barracuda Networks Web Application Firewall Page 1 of 10 Important
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
WEBCONNECT INSTALLATION GUIDE. Version 1.96
WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration
OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration Instructor-Led Training For versions 9.0, 9.01, & 9.10 OVERVIEW This 5-day instructor-led course focuses on advanced administration topics
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
Portal Factory 1.0 - CMIS Connector Module documentation
DOCUMENTATION Portal Factory 1.0 - CMIS Connector Module documentation Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels
FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0
FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 June 10, 2014 01-500-96996-20140610
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Oracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
ARIB STD-T63-27.103 V3.1.0. Wide area network synchronisation standard
ARIB STD-T63-27.103 V3.1.0 Wide area network synchronisation standard Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T63 for Related Industrial Property Rights. Refer to "Notice"
DEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1
DEPLOYMENT GUIDE Version 1.0 Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1 Introducing the F5 and Oracle Fusion Middleware SOA Suite configuration Welcome to the F5 and Oracle Fusion Middleware
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1
3GPP TS 31.220 V8.0.0 (2008-03)
TS 31.220 V8.0.0 (2008-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Characteristics of the Contact Manager for UICC applications
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Controller Management
Controller Management - Setup & Provisioning - 1 PRONTO SERVICE CONTROLLER (PN-CPP-A-1422) 2 PSC Key Features Fully interoperable with IEEE802.11b/g compliant products External AP support and management
Funambol Exchange Connector v6.5 Installation Guide
Funambol Exchange Connector v6.5 Installation Guide Last modified: May 7, 2008 Table of Contents 1.Introduction...3 1.1. Prerequisites...3 1.2. Related documents...3 2.Funambol Exchange Synchronization
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com
Dgw v2.0 May 14, 2015 www.media5corp.com Table of Contents Configuration Backup and Restore... 3 File Servers... 4 Configuring the FTP Server...4 Configuring the TFTP Server...4 Configuring the HTTP Server...
Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence
Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies
Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA
White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3
WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113
The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance
The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance Mohammad Ali Arsyad bin Mohd Shuhaimi Hang Tuah Jaya, 76100 Durian Tunggal,
ANS Monitoring as a Service. Customer requirements
ANS Monitoring as a Service Customer requirements Version History Version: 1.0 Date: 29/03/2015 Version Date Summary Of Changes Pages Changed Author 0.1 17/07/15 Initial document created ALL Dale Marshall
PHIN MS Detailed Security Design
The Public Health Information Network Messaging System (PHINMS) sends and receives sensitive data over the internet to the public health information systems using Electronic Business Extensible Markup
ZooKeeper. Table of contents
by Table of contents 1 ZooKeeper: A Distributed Coordination Service for Distributed Applications... 2 1.1 Design Goals...2 1.2 Data model and the hierarchical namespace...3 1.3 Nodes and ephemeral nodes...
Security Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
