A CC/PP aware Apache Web Server
|
|
|
- Geraldine Oliver
- 9 years ago
- Views:
Transcription
1 1. Introduction A CC/PP aware Apache Web Server Christos Papachristos, Evangelos Markatos 1 Institute of Computer Science Foundation for Research and Technology While current Internet is looking for standards that it can be based and grown upon them in a stable manner, different protocols have been suggested by several consortiums and groups. The Internet of the future will likely contain not only the standard PCs and portable computers but many other devices as well. We have already seen the mobile phones that are trying to access the world of Internet despite their limited capabilities in power and size. In order for such mobile devices to access the Internet a new protocol must be used. The weaknesses mentioned, about the low power and limited size that such devices may have forced us to treat them in a different way depending on their capabilities. This can be explained by the following example. When a PC (a client) is requesting a web server for a web document the web server will return that document. When another device with some different capabilities (mobile) is requesting the same document as in the previous case the interaction between the client and the server should not be the same. Suppose that the web document contains large images. In the first case, the computer has a screen capable of presenting such images. In the latter case however, the mobile phone has a much smaller screen incapable of handling those large images. Such devices need to be integrated with the current Internet in a way that they receive the best result depending on their capabilities. For that reason, we need a protocol that will take care of the interaction between clients and servers and make servers 'recognize' the kind and the capabilities of the client of each incoming request. Such protocol, that could provide the web servers with the information of what kind of client performs a request each time, is the new CC/PP (Composite Capabilities/Preferences Profiles) protocol. This protocol is suggested as a standard from the W3C group [WWW] ( ). 2. Related Work & Possible Solutions Currently there are not many implementations that can support the CC/PP protocol. A web server at the moment that is capable of handling HTTP requests containing CC/PP headers is the Jigsaw web server implemented by the W3C. Other implementations have been developed by the Keio University [KY] and the University of Wales [STL]. Researchers from Keio University have developed their own browser which supports the CC/PP protocol (called PANDA) and they make use of a CC/PP aware server proxy to communicate with the web server. In the second case of University of Wales a server proxy and a browser proxy have been used in order to test the functionality of the CC/PP. The browser proxy was used to help current browsers and devices (without CC/PP) interact with the CC/PP compliant part of the system designed. The server proxy was in front of the web server containing the data requested, and it 1 {cpapachr,markatos}@ics.forth.gr
2 was responsible of requesting the data with traditional HTTP headers without CC/PP. The communication with the HTTP+CC/PP headers is held between these two proxies. There is also another application developed in Monash University that can serve a mobile device with content read from a file [LT]. The system takes as input a document in MS excel format. It then applies some constraints, that specify the layout of the output document. Depending on the CC/PP attributes read from.ccpp file it produces a file that can be shown in a PalmOS emulator. The format of the file containing the CC/PP attributes is conformant to the W3C suggestions about the format of the Profile header. In this approach the CC/PP information is not sent by the client using a known protocol like HTTP. HTTP protocol may be involved in a newer version. Four different approaches can be used in order to provide CC/PP functionality to a client: 1. The first approach is implemented with two intermediary proxies, a client proxy and server proxy. In this architecture CC/PP information is only transferred between these two proxies and they are responsible to perform the protocol translation in order the endto-end (client through server) communication to be achieved (Figure 1). Having these two proxies between the corresponding client and the server may make the communication slow. There is also the issue that adding more intervening parts in the system is like adding more failure points to the round-trip request-response scenario and becomes less flexible in possible future changes. Figure 1: Architecture using two edge proxies supporting CC/PP communication between two hosts. 2. The second approach adopted from the Keio University includes one intermediary proxy, a server proxy. The PANDA browser implemented is CC/PP aware, so the client proxy for the translation between HTTP to HTTP+CC/PP and vice versa is not needed (Figure 2). In this approach the new browser implemented helped the researchers to test the functionality of the CC/PP protocol. Having only one proxy is a common case as this architecture is widely used in current Internet. The difference is that proxy's current usage is focused on serving clients with the cached documents so they are placed closer to the clients and away from the server in order to minimize the transfer delay of the documents. Locating a proxy away from the client may not have the same effects.
3 Figure 2: Communication between a client supporting CC/PP and a server that does not through a server proxy. 3. The third approach is to implement a CC/PP aware web server communicating with an intermediary client proxy, as seen in Figure 3. That means, that a web server must be capable of handling HTTP with CC/PP headers. The client proxy is used to translate the HTTP requests of each client to new HTTP requests including CC/PP information. Figure 3: Communication between a web server supporting the CC/PP protocol with a client not supporting CC/PP. Usage of client proxy. An alternative is to enhance the functionality of the client proxy in a client patch that will perform this translation as shown in Figure 4. This can give each client the oppurtunity to test if the CC/PP functionality provided by this new protocol offers any advantages in his/her daily navigation through the World Wide Web. Figure 4: Communication between a configured Apache to support CC/PP and the usage of a software patch in the client side.
4 4. At last, there is the ideal approach of both server and client capable of sending and receiving CC/PP headers. Though is the best approach it is better to make one stable step each time and pass through some of the mentioned approaches (Figure 5). Figure 5: Ideal communication between two CC/PP compliant end hosts. 3. Functionality of proxies and software patch. 3.1 Client Proxy and Software Patch. A client proxy as shown in the figures 1 and 3 communicates with the web client with the standard HTTP protocol. The functionality of the client proxy is to convert the standard HTTP headers sent by the web client to extended HTTP headers that contain CC/PP headers (HTTP headers + CC/PP headers). The new headers are then sent to the appropriate web server. If the web server is CC/PP aware then the headers are sent directly to that server. Otherwise the headers will be sent to a server proxy to make the appropriate translation. 3.2 Server Proxy. A server proxy is used in implementations where the web server has not been transformed to support the CC/PP protocol. Its functionality is to: 1. perform any necessary parsing in the headers (the CC/PP part) 2. send the parsed headers to the appropriate web server (only HTTP headers) 3. convert the returned results from the web server according to the CC/PP headers that where previously parsed 4. send back the reply to the client. The client could be the browser or a client proxy. A client proxy and a server proxy have similar functionality except that they communicate with different end-parts, the client and the server respectively. 4. Our approach Our approach is based on the usage of a client proxy and is focused on integrating the server's proxy functionality inside a web server as a module. The whole system includes a client proxy, a web client (e.g iexplorer netscape) and the transformed server with the new module (Figure 6).
5 A well-known web server that is open source and is widely used is the Apache web server. These features made our choice easier between other existing web servers. The API (Application Programming Interface) provided from the Apache web server enables the implementation of new modules. We chose not to consider the issue of the client part as we wanted to focus on the server-side. Instead of trying to extend a well-known client with the CC/PP protocol, we decided to use a simple client proxy that could do the appropriate work of the transformation between original HTTP and extended HTTP (CC/PP headers included). Figure 6: The communication between a CC/PP aware Apache server with a client proxy The full functionality of a server proxy can be incorporated into the Apache web server. With regard to the client side, we developed a proxy that mediates between the Apache server and the web browser. In a future version we may try to transform the client proxy into a software patch (Figure 4). Till now we have implemented a module for the Apache server that handles the CC/PP headers. This module is called mod_ccpp (mod_ccpp.c). It can be imported to the Apache like all the other extra modules with the usage of '--activate-module' directive. This can be done in the initial configuration of the server. In order to test our module we have linked it with the ImageMagick (an image processing tool) library which can be used to transform images. ImageMagick library provides an API to transform images between formats and sizes. The generated web page is now dependant on the client's device characteristics sent in the CC/PP header. Including that library inside the module makes the deployment of the module little more complicated. One automatic generated Makefile had to be altered in order to link the module with the ImageMagick library. Having installed the module, we were able to make requests to the Apache with various values for the CC/PP header fields. The server responded as expected in all cases. As future work we may try to develop a client patch that could enable a browser (Mozilla) to sent CC/PP headers and avoid the usage of the client proxy. Some measurements will be also held to determine the overhead of the CC/PP headers processing and the image transformation. 5. References 1. [LT] Lawrence Teo, "Constraint-Based Document Layout for Mobile Computers", t/report.html
6 2. [WWW] World Wide Web Consortium, Composite Capabilities/Preference Profiles Working Group, 3. [KY] Kinuko Yasuda, "Implementation and Evaluation of Keio CC/PP Implementation", 4. [STL] Stuart David Lewis, "Content Negotiation for Varying Web Enabled Devices",
The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:
The Web: some jargon Web page: consists of objects addressed by a URL Most Web pages consist of: base HTML page, and several referenced objects. URL has two components: host name and path name: User agent
Web Design and Development ACS-1809
Web Design and Development ACS-1809 Chapter 1 9/9/2015 1 Pre-class Housekeeping Course Outline Text book : HTML A beginner s guide, Wendy Willard, 5 th edition Work on HTML files On Windows PCs Tons of
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
Oracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001
Oracle9i Application Server: Options for Running Active Server Pages An Oracle White Paper July 2001 Oracle9i Application Server: Options for Running Active Server Pages PROBLEM SUMMARY...3 INTRODUCTION...3
THE SNMP PROTOCOL THE SNMP REQUEST MIB SATELLAR 2DS/20DS SIMPLE NETWORK MANAGEMENT PROTOCOL SATELLAR MANAGEMENT WITH SNMP GET AND SET SMART RADIO
SATELLAR 2DS/20DS SIMPLE NETWORK MANAGEMENT PROTOCOL SATELLAR MANAGEMENT WITH SNMP GET AND SET Technical Bulletin 2/14 THE SNMP PROTOCOL The SIMPLE NETWORK MANAGEMENT PROTOCOL, SNMP is a widely used management
The Evolution of Application Acceleration:
WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda
Titolo del paragrafo. Titolo del documento - Sottotitolo documento The Benefits of Pushing Real-Time Market Data via a Web Infrastructure
1 Alessandro Alinone Agenda Introduction Push Technology: definition, typology, history, early failures Lightstreamer: 3rd Generation architecture, true-push Client-side push technology (Browser client,
CS 213, Fall 2000 Lab Assignment L5: Logging Web Proxy Assigned: Nov. 28, Due: Mon. Dec. 11, 11:59PM
CS 213, Fall 2000 Lab Assignment L5: Logging Web Proxy Assigned: Nov. 28, Due: Mon. Dec. 11, 11:59PM Jason Crawford ([email protected]) is the lead person for this assignment. Introduction A web proxy
Developing ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
Bandwidth consumption: Adaptive Defense and Adaptive Defense 360
Contents 1. 2. 3. 4. How Adaptive Defense communicates with the Internet... 3 Bandwidth consumption summary table... 4 Estimating bandwidth usage... 5 URLs required by Adaptive Defense... 6 1. How Adaptive
Adding Advanced Caching and Replication Techniques to the Apache Web Server
Adding Advanced Caching and Replication Techniques to the Apache Web Server Joachim Marder, Steffen Rothkugel, Peter Sturm University of Trier D-54286 Trier, Germany Email: [email protected], [email protected],
System Architectures for Integrating Web-Based User Interfaces into (Legacy) Database Applications
System Architectures for Integrating Web-Based User Interfaces into (Legacy) Database Applications Jun Han, Peninsula School of Computing and Information Technology, Monash University, McMahons Road, Frankston,
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW About this Course This course provides SharePoint developers the information needed to implement SharePoint solutions
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper
Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper
Developing Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Page 1 of 9 Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: 4 days; Instructor-Led Introduction
Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence
Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &
XML Processing and Web Services. Chapter 17
XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Working With Virtual Hosts on Pramati Server
Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name
Service Manager and the Heartbleed Vulnerability (CVE-2014-0160)
Service Manager and the Heartbleed Vulnerability (CVE-2014-0160) Revision 1.0 As of: April 15, 2014 Table of Contents Situation Overview 2 Clarification on the vulnerability applicability 2 Recommended
Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
McAfee Product Entitlement Definitions
McAfee Product Entitlement Definitions McAfee. Part of Intel Security. 2821 Mission College Blvd Santa Clara, CA 95054 www.intelsecurity.com Application Server CPU CPU Core Database An Application Server
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web
Multilingual Interface for Grid Market Directory Services: An Experience with Supporting Tamil
Multilingual Interface for Grid Market Directory Services: An Experience with Supporting Tamil S.Thamarai Selvi *, Rajkumar Buyya **, M.R. Rajagopalan #, K.Vijayakumar *, G.N.Deepak * * Department of Information
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led
Developing ASP.NET MVC 4 Web Applications Course 20486A; 5 Days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
ICE Trade Vault. Public User & Technology Guide June 6, 2014
ICE Trade Vault Public User & Technology Guide June 6, 2014 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange,
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
High Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
This course provides students with the knowledge and skills to develop ASP.NET MVC 4 web applications.
20486B: Developing ASP.NET MVC 4 Web Applications Course Overview This course provides students with the knowledge and skills to develop ASP.NET MVC 4 web applications. Course Introduction Course Introduction
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
A Java proxy for MS SQL Server Reporting Services
1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services
Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring 2002. Four parts
CSE 123b Communications Software Spring 2002 Lecture 11: HTTP Stefan Savage Project #2 On the Web page in the next 2 hours Due in two weeks Project reliable transport protocol on top of routing protocol
REST-based Offline e-mail System
Proceedings of the APAN Network Research Workshop 2012 REST-based Offline e-mail System Gihan Dias, Mithila Karunarathna, Madhuka Udantha, Ishara Gunathilake, Shalika Pathirathna and Tharidu Rathnayake
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge
emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in
Software Requirement Specification For Flea Market System
Software Requirement Specification For Flea Market System By Ilya Verlinsky, Alexander Sarkisyan, Ambartsum Keshishyan, Igor Gleyser, Andrey Ishuninov 1 INTRODUCTION 1.1 Purpose 1.1.1 Purpose of SRS document
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection
DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS Introduction I m InTouch is a personal remote access application that allows a user to access the data on his or her PC from a remote location,
Mobility Information Series
SOAP vs REST RapidValue Enabling Mobility XML vs JSON Mobility Information Series Comparison between various Web Services Data Transfer Frameworks for Mobile Enabling Applications Author: Arun Chandran,
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
Portal In Anger. Ray Ploski Team Lead - Solutions Architecture, JBoss by Red Hat June 22, 2010
1 Portal In Anger Ray Ploski Team Lead - Solutions Architecture, JBoss by Red Hat June 22, 2010 Agenda: Location of Atlantis Video of Big Foot Guided tour of Area 52 Meaning of Life Slight Change of Plans
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Client-server systems
**** 1 Client-server systems Introduction ***- Database + Interface with user 2 Good......Better Interface with user Translation protocol Database and retrieval engine Client-server **** description 3
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview
Configuration Guide How to Configure SSL VPN Features in DSR Series Overview This document describes how to configure D-Link DSR-500N to enable SSL VPN feature. An SSL VPN is a form of VPN that can be
World-wide online monitoring interface of the ATLAS experiment
World-wide online monitoring interface of the ATLAS experiment S. Kolos, E. Alexandrov, R. Hauser, M. Mineev and A. Salnikov Abstract The ATLAS[1] collaboration accounts for more than 3000 members located
Gofer. A scalable stateless proxy for DBI
Gofer A scalable stateless proxy for DBI 1 Gofer, logically Gofer is - A scalable stateless proxy architecture for DBI - Transport independent - Highly configuable on client and server side - Efficient,
Accelerating Mobile Access
Mobile devices are proliferating, and their use to access applications is skyrocketing, while users are less accepting of application performance issues than ever before. Since mobile devices have limited
Implementing the Application Control Engine Service Module
Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
Using SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
Network Management - SNMP
Network Management - SNMP Simple Network Management Protocol Networks are indispensable More complexity makes failure more likely Require automatic network management tools Standards required to allow
Kerberos and Single Sign On with HTTP
Kerberos and Single Sign On with HTTP Joe Orton Senior Software Engineer, Red Hat Overview Introduction The Problem Current Solutions Future Solutions Conclusion Introduction WebDAV: common complaint of
http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Lecture 2. Internet: who talks with whom?
Lecture 2. Internet: who talks with whom? An application layer view, with particular attention to the World Wide Web Basic scenario Internet Client (local PC) Server (remote host) Client wants to retrieve
OpenScape Voice V8 Application Developers Manual. Programming Guide A31003-H8080-R100-2-7620
OpenScape Voice V8 Application Developers Manual Programming Guide A31003-H8080-R100-2-7620 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001
Cisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
A Generic Database Web Service
A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey [email protected] Yanchao Wang and Swetha Desetty Georgia State University
Smartphone Enterprise Application Integration
WHITE PAPER MARCH 2011 Smartphone Enterprise Application Integration Rhomobile - Mobilize Your Enterprise Overview For more information on optimal smartphone development please see the Rhomobile White
Load Balancing using MS-Redirect Mechanism
Load Balancing using MS-Redirect Mechanism G. Naveen Kumar 1, T. Ram Kumar 2 and B.Phijik 3 Vignan s Institute of Technology and Aeronautical Engineering Deshmukhi(v), Pochampalli(M), Nalgonda, Hyderabad
SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin Release notes J System Solutions Version 3.6 JSS SSO Plugin v3.6 Release notes What's new... 3 Improved Integrated Windows Authentication... 3 BMC ITSM self service... 3 Improved BMC ITSM Incident
CONTENT of this CHAPTER
CONTENT of this CHAPTER v DNS v HTTP and WWW v EMAIL v SNMP 3.2.1 WWW and HTTP: Basic Concepts With a browser you can request for remote resource (e.g. an HTML file) Web server replies to queries (e.g.
FIVE SIGNS YOU NEED HTML5 WEBSOCKETS
FIVE SIGNS YOU NEED HTML5 WEBSOCKETS A KAAZING WHITEPAPER Copyright 2011 Kaazing Corporation. All rights reserved. FIVE SIGNS YOU NEED HTML5 WEBSOCKETS A KAAZING WHITEPAPER HTML5 Web Sockets is an important
A Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
Synology QuickConnect
Synology QuickConnect Based on DSM 5.2 Synology Inc. Table of Contents Chapter 1: Introduction What is QuickConnect?... 3 Chapter 2: How QuickConnect Works Overview... 4 QuickConnect Connectivity Test...
Global Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
Internet Content Adaptation Protocol (ICAP)
Internet Content Adaptation Protocol (ICAP) Network Appliance Version 1.01 7/30/01 Contents 1. Scope/Executive Summary 2. Introduction 3. ICAP Architecture 4. NetCache TM Deployment in Support of ICAP
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
Migrate from Exchange Public Folders to Business Productivity Online Standard Suite
Migrate from Exchange Public Folders to Business Productivity Online Standard Suite White Paper Microsoft Corporation Published: July 2009 Information in this document, including URL and other Internet
Internet Content Distribution
Internet Content Distribution Chapter 2: Server-Side Techniques (TUD Student Use Only) Chapter Outline Server-side techniques for content distribution Goals Mirrors Server farms Surrogates DNS load balancing
What are Web Services? A BT Conferencing white paper
Table of contents What are Web Services? 3 Why Web Services? 3 The BT Conference Service 3 Future Development 4 Conclusion 4 2 3 What are Web Services? Web services are self-contained business functions
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications
ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani
GLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
WHITE PAPER. Domo Advanced Architecture
WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization
Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.
USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits
Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue
This course will also teach how to create various kinds of dashboards using Reporting Services.
Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services Length : 3 Days (24 Hours) Language(s) : English Audience(s) : IT Professionals Level : 200 Technology : Microsoft SQL Server 2008
Load-balancing and scalability enabled by middleware
Load-balancing and scalability enabled by middleware Bertrand MATHIEU / Laurent REYNAUD FTR&D/DAC/LIP/OSM 14 March 2001 1 Introduction Use middleware for load-balancing and scalability features ÕChoice
Lecture 8a: WWW Proxy Servers and Cookies
Internet and Intranet Protocols and Applications Lecture 8a: WWW Proxy Servers and Cookies March, 2004 Arthur Goldberg Computer Science Department New York University [email protected] Terminology Origin
Licensing Overview. How does EPiServer work? Purchasing EPiServer. Software Subscription. Deposit of Source Code - ESCROW.
1300 762 912 [email protected] Sydney 275 alfred st north sydney nsw 2060 EPiServer CMS 5 Licensing Enterprise CMS Licensing & Service Level Agreements Melbourne 21 burwood road hawthorn vic 3122 Brisbane
