CERTI: Evolutions of the ONERA RTI Prototype
|
|
|
- Jane Hudson
- 9 years ago
- Views:
Transcription
1 CERTI: Evolutions of the ONERA RTI Prototype Benoît Bréholée, Pierre Siron ONERA-CERT Information Modelling and Processing Department 2, av E. Belin, BP 4025 F Toulouse Cedex Keywords: HLA, RTI, distributed architecture, security, domains ABSTRACT: In this paper, we discuss some works carried out at ONERA (Office National d Études et de Recherches Aérospatiales) in the distributed simulation field. Particularly, we describe the design and implementation of a RTI called CERTI. These studies started in 1996 and we summarize their present main results: an original architecture of the RTI prototype, security extensions, evolution to the version 1.3 of the HLA specifications and release as free software. Ongoing works concern mainly performance evaluation and prediction, introduction of the domain notion for large-scale simulations and significant applications using this prototype. 1 Introduction ONERA is a French governmental laboratory involved in aeronautic and spatial studies and researches. Therefore we are sharing the need, with a large community, for advanced simulation architectures. Examples of simulation studies are the design of new airports [1], the evaluation of new embedded systems, etc. Consequently we have been very soon interested in the HLA project, a generic distributed architecture, which allows distributed discrete-event simulation studies. This interest is at the origin of the ONERA HLA initiative, that we propose to survey in this paper. The main objectives of our initiative are the following: First of all, to get a better understanding of the HLA architecture from several points of view. For example, what kind of difficulties have to be overcome in designing and implementing the RTI from its specifications. Another important issue is to evaluate the underlying programming methodology of HLA in order to provide relevant support for the potential users inside ONERA. Secondly, to initiate new researches, suggested by performance issues and/or new simulation paradigms. We could here apply our skills in distributed systems and in computer security. Finally, to provide a HLA architecture with security properties, which is an important issue in both the defense and civil domains, as soon as several companies have to cooperate on the same project. To achieve these objectives, we have conducted various studies, which we detail in the following chapters: Development of a RTI: CERTI. Actually we did not have access to the RTI executable code provided by the DMSO when we started this work. Study of the security problem, and implementation and evaluation of security extensions. Development of test applications, that are useful for HLA training and for the evaluation of performances of distributed simulations. Development of the notion of domains, which is an alternative and a complement to solve both the security problem and the Data Distribution Management problem. These studies have been mainly funded by ONERA; particularly the development of CERTI, that we can consider as our main result. The security studies have
2 been funded by DGA. 1 ONERA is strongly linked to the French Ministry of Defense and our HLA skills have been largely distributed. 2 CERTI 2.1 Architecture CERTI is a prototype of RTI developed at CERT. 2 This prototype has some original characteristics, in particular it is built around an architecture of communicating processes. The RTI is a distributed system involving a local process (RTIA) a global process (RTIG) a library (librti) linked with each federate The RTI architecture is depicted by Figure 1. Federate 1 Federate 2 Federate 3 HLA Interface librti librti librti Unix socket RTIA 1 RTIA 2 RTIA The RTIA RTIG Figure 1: CERTI architecture TCP socket WAN Each federate process interacts locally with a RTI Ambassador process (RTIA) through a Unix-domain sockets (this name is unfortunately confusing with the name of a class of the RTI API). The RTIA process exchanges messages over the network with the RTIG process, via TCP (and UDP) sockets, in order to run the various distributed algorithms associated with the RTI services. 1 State Organization responsible for Armament Programmes 2 Research Centre of Toulouse of ONERA The RTIA is always listening to both the federate and the network (the RTIG). It is never blocked because its response to the requests of the federate or to the network does not imply the reception of another message. A specific role of the RTIA is to satisfy some federate requests immediately, while other requests require to send messages to the RTIG. The RTIA is receiving and sending messages concerning for example Time Management or Declaration Management, etc. A message concerning the time management is a NULL message, as explained in [2]. In a first step, we have implemented this old but robust algorithm. With the time stamp included in this kind of message, the RTIA computes the LBTS 3 for the sender federate. This LBTS indicates the lower bound on the time stamp of any subsequent message a particular federate will receive from another federate. The RTIA computes the LBTS of its federate by taking into account the logical time and the lookahead of all the regulating federates in the federation. A message concerning the object management is, in particular, associated to the implementation of the Update Attribute Values, Reflect Attribute Values, Send Interaction and Receive Interaction services. The Reflect Attribute Values and Receive Interaction messages are directed to two waiting files, one for the TSO 4 messages and the other one for the RO 5 messages. This is the function of the RTIA to manage the memory allocation, and the fact that RTIA and federate memories are separate is an aspect of the security The RTIG The first main function of the RTIG, or RTI Gateway, is to manage the communications between the RTIAs, and therefore between the federates. In the reliable mode, this is an obliged passing point between two federates, for example RTIA i and RTIA j. In fact, we do not want to use a direct TCP connection between RTIA i and RTIA j but two TCP connections: one from RTIA i to the RTIG, the other one from the RTIG to RTIA j. Globally we have TCP connections, if is 3 Lower Bound on Time Stamps 4 Time-Stamped Order 5 Receive Order
3 the number of federates. For distributed simulations with a large number of federates, which are often allocated to different local networks connected by a WAN, our project is to multiply the RTIG and to implement the necessary routing of messages in the logical network of connected RTIGs. The second main function of the RTIG is to simplify the implementation of some HLA services, because it is a centralization point in the architecture. It manages the creation and the destruction of federation executions. It records the identity of federates willing to publish the attributes of an object class (resp. an interaction class) or to subscribe to the attributes of an object class (resp. an interaction class). The RTIG uses these data to forward messages from a RTIA in a software multicast approach. We have so an emulation of a reliable multicast service. our multiprocessing approach into a multithreading approach Data-transfer scenario Figure 2 illustrates the exchange of messages involved in Update Attribute Values (this is like a data transfer). The message file is not represented in the rightside RTIA, nor the delivery condition which depends on the time management. UAV is the acronym for Update Attribute Values, and RAV refers to Reflect Attribute Values. Federate 1 RTIA RTIG RTIA UAV RAV Federate 2 UAV The librti library This is a little library in which HLA service calls are transformed into messages sent to the RTIA. Messages are built (this includes a type and input parameters) and sent to the associated RTIA. The service execution then waits for a response from the RTIA (usually an acknowledgment) and provides the output parameters. A tick primitive is added, allowing the execution of the RTI initiated services (user code associated to Time Advance Grant, Reflect Attribute Values, etc.) This tick function has no parameter, it causes the execution of one callback or it returns immediately if the RTIA cannot deliver anything (in this case, the federate has often to wait). The allocation of the CPU resource to the federate and the RTIA processes is exclusively managed by the operating system. We make the hypothesis that the user can remain unaware of this problem (well exposed in [3]). A relatively easy optimization would be to replace the communication by Unix socket between the librti and the RTIA by a communication using shared memory. Nevertheless, our performance measurements do not show that this communication is a bottleneck in the architecture. We are much more hesitating to transform ok 2.2 Schedule ok tick ok Figure 2: Data transfer scenario RAV A small team was set up to produce CERTI. The project started by the end of A first version [4] was available in September Our objective was a rapid prototyping, therefore we had selected a reduced set of HLA services, which are enough to build significative applications. Data Distribution Management and Ownership Management were not implemented. A second version was achieved in May 1998, which included some optimizations. The reliable mode of communication has been privileged, because our main
4 applications are constructive simulations (simulation for the engineer in coordinated time with conservative option). We have reduced the number and the size of the exchanged messages and we have chosen better options of the TCP protocol. The third version integrated security mechanisms (see 3). The second and third versions were robust and efficient enough for us to develop a fair number of applications. But these versions were only compliant with the version 1.1 of the HLA specifications. The fourth version, in 2000, adapts the implemented services of HLA to the version 1.3 of the specifications. This work concerns mainly a new version of the librti. The fifth version (2001) integrates the Ownership Management, and we are currently working on the Data Distribution Management. The spirit of this incremental work must be recalled. We are mainly concerned by understanding and following the philosophy of HLA. Our goal is not to achieve a commercial product, nor to immediately satisfy a DMSO HLA verification process. But we can write distributed simulations with CERTI in a well controlled environment, and adaptation effort to use the RTI-NG, for example, is minimal. 2.3 Portability The C++ language is used for the CERTI code and the development of federates. We are using standard protocols, such as TCP/IP, for the communications between the different components. We are also using standard Unix libraries for the processes management. With these assumptions, we have very few portability problems, and CERTI is currently running on workstations (Sun Solaris, SGI, HP), PC, and clusters of PC (Linux). 2.4 Release We are planning to release CERTI as free software. As previously said, our goal is not commercial and the free software development model is usually efficient to improve portability and code quality. CERTI will be released under a copyleft free software license (GNU GPL for the programs, GNU LGPL for the libraries) that doesn t prevent proprietary federates to link against the librti. Details on these licenses can be found on the GNU web site. 6 We are also planning to use a development web site providing public CVS repositories, a bug-tracking system and tools commonly used in the free software community. 3 Security Aspects 3.1 Compatibility with existing infrastructures Firewalls are often used for low risk environments. They provide controlled and audited services both from inside and outside a private network, by allowing, denying or redirecting the flow of data. Our problem is to run distributed simulations between different laboratories protected by firewalls. An application level firewall employs proxies to screen traffic. We cannot develop a new proxy, dedicated to HLA and CERTI. That would be difficult to evaluate and to accept by the network and security administrators of the laboratories. But, as we know very well the communications needed by CERTI, we can ask for a simple TCP proxy, that allows the TCP connection between the RTIA process running in a first laboratory, and the RTIG process running in another laboratory at the known TCP port and host. This TCP proxy exists soon for the majority of commercial firewalls and our request has been accepted by our administrators. Experiments have been made between three laboratories : IRIT, LAAS and ONERA. 3.2 Security extensions Work on distributed simulation security was conducted for the DGA, in particular in the framework of the SAIDA 7 project in cooperation with DERA (UK). It was aimed at providing an answer to problems of inter-company simulation, for which an unlimited information exchange must take place via the RTI Security Assurance In Distribution Applications
5 between the federates of two different companies to preserve the confidentiality of their know-how. (Fig. 3) Company A fed 1 fed 2 fed 3 fed 4 unlimited unlimited restricted communication CERTI Company B Figure 3: Inter-company simulation We have conducted a complete security study [5] : threat analysis, definition of security objectives and security functions, implementation. The result is a security architecture based on CERTI and the trusted third party principle. We suppose that the RTIG process is under the control of a third party that is not in competition with the companies owning the federates, for instance a public organization, and we have implemented secure communications and access control mechanisms Secure communications To secure communications between remote federates and the RTIG we use the GSSAPI. 8 This interface hides from its callers the details of the specific underlying security mechanism, leading to better application portability, and moving generally in the direction of a better interworking capability. We have used the implementation of [6] Access control mechanisms We propose to extend the description of the federation (the FED file) with security attributes. Each class, attribute and federate is associated with a security domain. Then the RTI filters the message according to the security domains of the object and of the federate (this is an application of research on multilevel security.) 8 Generic Security Services Application Program Interface This control is performed by the RTIG because, in our architecture, this component is already in charge of recording the publication and subscription. So the RTIG will now check the security labels of the federate and of the class whenever this federate has sent a subscription message for this class. The RTIG will record for each published class a list of authorized subscribers. As the RTIG transmits the Update Attribute Values messages only to authorized subscriber RTIAs, a federate from one company will never receive Reflect Attribute Values messages for a private object of another company because its subscription request are blocked by the security label control in the RTIG. In that case, in accordance with HLA rule, any federate are informed of the updates on any object belonging to any class in the FOM. We have studied the impact of these security mechanisms on the federation real-time behavior [7]. This impact is very weak for the access controls. 4 CERTI Applications The first test application is a billiard game. There is one main object class, the ball with position attributes. The federation is composed of any number of federates, each federate modelizing and simulating only one ball instance. It publishes and subscribes to the position attributes, so that each computer could graphically represent the current situation. The collisions are simulated by interactions. This is a time-coordinated example, with an initial synchronization point. With this example, the performances are bounded by the performances of the RTI and the physical architecture. A good criterion is the number of simulation steps per second. Figure 4 indicates performance obtained with CERTI and the RTI provided by the DMSO. The two curves are similar. We do not explain why CERTI seems faster. This is a rapid comparison and, probably, we have not reached the best results for the RTI-NG on our physical architecture (the configuration file of this RTI has a lot of parameters). Another application [8] is a fight simulation of aircraft attacking defense units. Patrols of aircraft s are equipped with anti-radar missiles. Air defense units are composed of a command post supervising
6 Steps DoD CERT 5 Domains and HLA 5.1 Concept of domain Several on-going works concern the introduction of the domain concept in CERTI and/or in federation executions. These works are mainly motivated by the scalability and the security problems Number of Federates Domains provide a solution to data distribution management with the specification of interest regions, allowing communication optimizations. Data filtering is used with relevance criteria, but other implementations of domains can provide data filtering for security purposes. This general domain concept appears in several projects: Figure 4: Performances of the billiard federation multifunction radar devices and surface-to-air missile ramps. We have chosen this problem because it is more significative and a little more complex. The object classes are Aircraft, Radar and Missile. The interactions are Radar Emission, Destruction, etc. The federates are associated with Aircraft s, the Defense Units (which both simulate the Missiles) and a Monitor like in the previous example. With this application, we have investigated the multiresolution problem. [9] details the multiresolution of entities : patrols and aircraft s, and discusses the chosen mechanisms allowing triggering aggregation from an entity-level representation, and conversely, triggering disaggregation from an aggregate representation. A multiresolution management service has been proposed. More complex distributed simulations are simulations of airports of the future [1], and simulations of radar detection of missiles and drones designed by the Departments of Physics of ONERA (a paper has to be written). Interfederations They are the connection of several federations. These federations are chosen (or designed) depending on the objectives of the global interfederation (for example security, scalability, or interoperability). The federations are linked to each other with one or more bridge federate (see 5.3). Distributed RTIG In the current architecture, optimizations can be done in the RTIA, thus preventing useless messages to reach the RTIG. This is for example the case of Declaration Management services and the subscription/publication mechanism. But one of our main concerns is that despite optimizations carried out in the previous versions of CERTI, the RTIG is still a significant bottleneck. With network architecture, it is the main obstacle to large-scale simulations. A distributed RTIG would add a domain level between local treatments (in RTIAs) and global mechanisms (involving every RTIG component), and should improve federation executions. DDM development The Data Distribution Management services of the HLA propose the use of domains with the definition of routing spaces. This has to be implemented in CERTI (see 5.2). Multicast Multicast is used to send messages to multiple recipients: the interest is that the task to route data is handled by the underlying network architecture. Possible applications of multicast concern messages sent from the RTIG to the RTIA, messages between RTIG components in the case of the
7 above distributed RTIG. And of course Data Distribution Management implementations can use multicast to group recipients by interest region. 5.2 Data Distribution Management The purpose of HLA Data Distribution Management services is to reduce the amount of irrelevant data exchanged between federates. Such relevance filtering reduces both traffic over the network and the number of messages federates have to filter. Data Distribution Management services allow federates to refine the publication/subscription information they provide to the RTI. Without these services (ie, using only Declaration Management publication and subscription), a federate subscribed to some object class attribute receives all information related to this attribute. Data Distribution Management introduces relevance of data a the attribute instance level. The principle is still a publication/subscription mechanism similar to Declaration Management services, but parameters help federates to refine the description of the information they are interested in. Such descriptions are possible thanks to the concept of routing spaces. Routing spaces are defined by their dimensions, which correspond to attributes existing in the federation. Federates subscribe to particular regions of routing spaces, thus defining the only ranges of data values they are interested in. Routing spaces help to reduce communications by preventing lots of irrelevant data to be transfered, but they have to be managed in the RTI which requires significant resources. In large-scale simulations, very numerous regions represent a time cost for the RTIG and mean additionnal message traffic over the network. Therefore reducing the number of routing regions is often an interesting compromise between Data Distribution Management optimizations and run time overhead. In particular, this is necessary in Data Distribution Management implementations using multicast groups to send messages to multiple recipients: since the number of multicast groups is limited, it s not possible to associate one group with each region in large-scale federations. Several approaches and alternatives to the traditionnal fixed-grid implementation are proposed in [10]. We do not plan to use multicast groups in our first implementation of Data Distribution Management services in CERTI: the objective is to implement the routing regions just as they are defined in the HLA, without simplifying or grouping them. More complex implementations with this kind of management improvement are scheduled for later versions of CERTI. Actually, we are focusing on taking advantage of the architecture of CERTI. Optimization with Data Distribution Management depends heavily on the coordination between the RTI internal strategies and the federation design (particularly the use of regions). With CERTI, region management can be carried out both in RTIG and RTIA. For example, managing Data Distribution Management only in the RTIG helps to reduce irrelevant messages sent to RTIAs. But another approach is to partially manage regions in the RTIA. If the RTIA is aware of all the subscription information, then it can filter update messages. The inconvenience is that RTIAs have to get informed of all subscription region modifications. 5.3 Bridge Federates A HLA bridge federate is an application that connects two or more federations, and is in charge of representing each federation to the others. There are many variants depending on the objectives, for example a bridge can represent a federation only partially, to create private objects not seen in other federations. A common design of bridge federates is based on a core component linked with federate components; each of these federates joins one federation. Then the general behavior of the interfederation should be the same as a federation based on the same federates, using only one RTI (there are exceptions, depending on the objectives of the bridge). (Fig. 5) The bridge can be used for several purposes: Interoperability A bridged federation can use several RTIs. This is useful if some federates are optimized for one particular RTI. It is also a solution to some language binding problems. In the case of CERTI, only C++ si supported, which prevents federates written in another language to use it. With a bridge federate, it s possible to use another RTI for
8 federate A bridge federate federate B federate C RTI 1 RTI 2 Figure 5: Interfederation architecture federate D this kind of federate, and to link them to a CERTIbased execution. Optimization In some simulations, the execution can be improved by running homogeneous federates in their own federations, and bridging the federations. This is the case when there are very dissimilar federates (considering SOMs or event rates) as explained in [11]. We can also think of the use of fixed grids in Data Distribution Management: one problem is that the grid resolution depends on the federate scale and behaviour, which may greatly differ, making it impossible to choose an optimal granularity. Homogenous federates can be grouped. Then the simulation uses several grid resolutions, one for each federation. Security Another use of the bridge federate is similar to the inter-company simulations problem described in 3.2. It s possible for different parties to participate to a unique simulation, based on several federations, each of which may have private parts: the only need is to share a common FOM, but inside one federation, the FOM can be larger and include attributes that will be filtered out by a bridge federate. So the general bridge federate architecture consists of a central component and several federates. Another important component is a translator, in charge of associating the identities of every entity existing in more than one federation. For example, an attribute id or a save label, may differ from one federation to another. [12] describes the way a bridge can translate HLA mechanisms from one federation to another, so that from a federate view, everything seems to be held in the same manner as in a single federation. One must remember that the bridge is not a part of a RTI or any other privileged entity of the simulation: it is an HLA application, and can only use the services available to federates. This is why some direct and unconditional mechanisms such as updating/reflecting attributes are possible through the bridge with the usual services, while some global mechanisms require the use of the MOM. 9 For example, the MOM is usually required to handle an interfederation save process: the bridge monitors the MOM to get each federate save response. If the save succeeds in every federate of a federation, then the bridge declares itself as correctly saved to the other federations. At first, we didn t consider the use of the MOM in a bridge since it is not implemented in CERTI yet. We considered some restrictions on the federations to make the bridge work without the information provided by the MOM. For example, we can use the save mechanism over a bridge if the only federate to use the result of the save process is the one which sent the save request: the bridge just has to declare itself saved in other federations, then the result of the federation save may be wrong for some federates, but is always correct in the federation were the save request was initiated. Other kinds of mechanisms such as publication/subsription can be handled without the MOM. Actually, the resulting optimization may be very poor if, for example, the bridge publishes and subscribes to every object and interaction class. But this doesn t prevent the interfederation to be executed, which can be useful when the purpose is interoperability. The goal of this first implementation is just to allow federates to use different RTIs in an interfederation. Of course, a significant improvement is the implementation of the MOM in CERTI to handle global mechanisms. We are also particularly interested in another interfederation architecture, using several cooperating bridges, as detailed in [11]. 6 Summary In this paper we described the evolution of CERTI and its associated projects. We recalled the original architecture of this prototype and the project history. 9 Management Object Model
9 We consider CERTI as our main result, but aside from the development of this RTI towards the HLA specifications, CERTI provided a distributed simulation platform for many works. Particularly, studies concerning security extensions have been carried out. Also, test applications have been developed. Eventually, several on-going works focus on the improvement of the use of domains in federation executions: in particular, the implementation of Data Distribution Management services and the development of a HLA bridge federate are considered to improve interoperability, security and scalabillity. Acknowledgments We could not complete this paper without naming all the contributors to this project: M. Adelantado, P. Bieber, S. Bonnet, B. Bréholée, P. Desseaux, F. Fayet, A. Harzi, Ph. Hautesserres, S. Lemanceau, P. Nortier, S. Prunet, P. Siron and G. Zanon. References [1] M. Adelantado. Experimenting the HLA framework for the ONERA Project Airport of the Future. In Proceedings of the 1999 Fall Simulation Interoperability Workshop, [2] K. M. Chandy and J. Misra. Distributed Simulations: A Case Study in Design and Verification of Distributed Programs. In IEEE Transactions on Software Engineering, September [3] R. D. Wuerfel. RTI-NG Process Model. In Proceedings of the 2001 Spring Simulation Interoperability Workshop, [4] P. Siron. Design and Implementation of a HLA RTI Prototype at ONERA. In Proceedings of the 1998 Fall Simulation Interoperability Workshop, [5] P. Bieber, J. Cazin, P. Siron, and G. Zanon. Security Extensions to ONERA HLA RTI Prototype. In Proceedings of the 1998 Fall Simulation Interoperability Workshop, [6] D. P. Barton and L. J. O Connor. Implementing Generic Security Services in a Distributed Environment. Technical report, CRC for Distributed Technology, April [7] P. Bieber and P. Siron. Design and Implementation of a Distributed Interactive Simulation Security Architecture. In Proceedings of the 3 rd IEEE Int. Workshop on Distributed Interactive Simulation and Real-Time Applications, October [8] M. Adelantado and P. Siron. Air-Ground Combat Simulation through the ONERA HLA Run-Time Infrastructure. In Proceedings of the Advanced Simulation Technologies Conference, April [9] M. Adelantado and P. Siron. Multiresolution Modeling and Simulation of an Air-Ground Combat Application. In Proceedings of the 2001 Spring Simulation Interoperability Workshop, [10] A. Berrached, M. Beheshti, O. Sirisaengtaksin, and A. dekorvin. Alternative Approaches to Multicast Group Allocation in HLA Data Distribution. In Proceedings of the 1998 Spring Simulation Interoperability Workshop, [11] T. Lake. Time Management Over Inter-Federation Bridges. In Proceedings of the 1998 Fall Simulation Interoperability Workshop, [12] W. Braudaway. The High Level Architecture s Bridge Federate. In Proceedings of the 1997 Fall Simulation Interoperability Workshop, Author Biographies BENOÎT BRÉHOLÉE was graduate from a french engineer school of aeronautics and computer science in Then he is a PhD student at ONERA. He is a member of the Design and Validation of Computer Systems research unit. PIERRE SIRON was graduate from a french engineer school of computer science in 1980, and received his doctorate in Then he is a Research Engineer at ONERA and he works in parallel and distributed systems and computer security. He is a member of the Design and Validation of Computer Systems research unit.
NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS HLA PERFORMANCE MEASUREMENT. Ivan Chang Kok Ping. March 2000. Thesis Co-Advisor: Eric Bachmann
NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS HLA PERFORMANCE MEASUREMENT by Ivan Chang Kok Ping March 2000 Thesis Advisor: Michael Zyda Thesis Co-Advisor: Eric Bachmann Approved for public release;
Simulating Information Warfare Using the HLA Management Object Model
Simulating Information Warfare Using the HLA Management Object Model Roger Smith BTG Inc. Orlando, Florida 32765 [email protected] Keywords: Information Operations, High Level Architecture, Management
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
EXPERIENCES PARALLELIZING A COMMERCIAL NETWORK SIMULATOR
EXPERIENCES PARALLELIZING A COMMERCIAL NETWORK SIMULATOR Hao Wu Richard M. Fujimoto George Riley College Of Computing Georgia Institute of Technology Atlanta, GA 30332-0280 {wh, fujimoto, riley}@cc.gatech.edu
Client/Server Computing Distributed Processing, Client/Server, and Clusters
Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform
Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform May 2015 Contents 1. Introduction... 3 2. What is BIM... 3 2.1. History of BIM... 3 2.2. Why Implement BIM... 4 2.3.
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
EMC Data Domain Boost and Dynamic Interface Groups
EMC Data Domain Boost and Dynamic Interface Groups Maximize the Efficiency of Multiple Network Interfaces ABSTRACT EMC delivers dynamic interface groups to simplify the use of multiple network interfaces
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Chapter 7. Address Translation
Chapter 7. Address Translation This chapter describes NetDefendOS address translation capabilities. Dynamic Network Address Translation, page 204 NAT Pools, page 207 Static Address Translation, page 210
Integrating the Internet into Your Measurement System. DataSocket Technical Overview
Integrating the Internet into Your Measurement System DataSocket Technical Overview Introduction The Internet continues to become more integrated into our daily lives. This is particularly true for scientists
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
Potential Role of an Enterprise Service Bus (ESB) in Simulation
Doug Stapleton IBM Australia Limited 28 Sydney Avenue, Forrest ACT 2603 AUSTRALIA [email protected] ABSTRACT This paper considers eight areas where an Enterprise Service Bus (ESB) can contribute to
Linux MPS Firewall Supplement
Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel
Titolo del paragrafo. Titolo del documento - Sottotitolo documento The Benefits of Pushing Real-Time Market Data via a Web Infrastructure
1 Alessandro Alinone Agenda Introduction Push Technology: definition, typology, history, early failures Lightstreamer: 3rd Generation architecture, true-push Client-side push technology (Browser client,
On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks
CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro [email protected]
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications.
What can DDS do for You? Learn how dynamic publish-subscribe messaging can improve the flexibility and scalability of your applications. 2 Contents: Abstract 3 What does DDS do 3 The Strengths of DDS 4
Architectural Patterns. Layers: Pattern. Architectural Pattern Examples. Layer 3. Component 3.1. Layer 2. Component 2.1 Component 2.2.
Architectural Patterns Architectural Patterns Dr. James A. Bednar [email protected] http://homepages.inf.ed.ac.uk/jbednar Dr. David Robertson [email protected] http://www.inf.ed.ac.uk/ssp/members/dave.htm
The H.323 NAT/FW Traversal Solution
Open Community Specification The H.323 NAT/FW Traversal Solution January 2014 International Multimedia Communications Consortium Summary This document describes the NAT/FW traversal solution defined by
BLM 413E - Parallel Programming Lecture 3
BLM 413E - Parallel Programming Lecture 3 FSMVU Bilgisayar Mühendisliği Öğr. Gör. Musa AYDIN 14.10.2015 2015-2016 M.A. 1 Parallel Programming Models Parallel Programming Models Overview There are several
You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
IP SAN BEST PRACTICES
IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...
The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS
Embedded Systems White Paper GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS September 2009 ABSTRACT Android is an open source platform built by Google that includes an operating system,
iseries TCP/IP routing and workload balancing
iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users Restricted
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
The Matrex Client/Server Specification 1.1
The Matrex Client/Server Specification 1.1 Table of Contents The Matrex Client/Server Specification 1.1...1 Introduction...1 A usage scenario...2 New project...4 Open project...5 Recently used projects...6
UNLOCK YOUR IEC 61850 TESTING EXCELLENCE
IMPROVE EFFICIENCY TEST WITH CONFIDENCE OF KNOW-HOW LEARN AND EXPAND YOUR IEC 61850 SKILLS MASTER YOUR NETWORK KNOWLEDGE GENERATE TEST RESULTS UNLOCK YOUR IEC 61850 TESTING EXCELLENCE Connect To & Read
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.
1 VoIP support configuration First used in the mid-1990s, VoIP is an emerging technology for telephone calls and other data transfer. The concept is relatively simple: Use the multiple networks that comprise
Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1
Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter
NERC CIP Ports & Services. Part 2: Complying With NERC CIP Documentation Requirements
NERC CIP Ports & Services Part 2: Complying With NERC CIP Documentation Requirements White Paper FoxGuard Solutions, Inc. November 2014 Defining Ports And Services In part 2 of our Ports and Services white
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Workflow Requirements (Dec. 12, 2006)
1 Functional Requirements Workflow Requirements (Dec. 12, 2006) 1.1 Designing Workflow Templates The workflow design system should provide means for designing (modeling) workflow templates in graphical
Software Engineering. Introduction. Software Costs. Software is Expensive [Boehm] ... Columbus set sail for India. He ended up in the Bahamas...
Software Engineering Introduction... Columbus set sail for India. He ended up in the Bahamas... The economies of ALL developed nations are dependent on software More and more systems are software controlled
Manjrasoft Market Oriented Cloud Computing Platform
Manjrasoft Market Oriented Cloud Computing Platform Innovative Solutions for 3D Rendering Aneka is a market oriented Cloud development and management platform with rapid application development and workload
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE
PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE TIGRAN HAKOBYAN SUJAL PATEL VANDANA MURALI INTRODUCTION Common Object Request
Client/Server and Distributed Computing
Adapted from:operating Systems: Internals and Design Principles, 6/E William Stallings CS571 Fall 2010 Client/Server and Distributed Computing Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Traditional
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
Fortinet Network Security NSE4 test questions and answers:http://www.it-tests.com/NSE4.html
IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : NSE4 Title : Fortinet Network Security Expert 4 Written Exam (400) Vendor
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
Receptionist Small Business
Receptionist Small Business Administrator Guide Revision 1.0 GCI Ltd Global House 2 Crofton Close Lincoln Lincolnshire LN3 4NT www.gcicom.net Copyright GCI 2012 GCI Receptionist Small Business - Administrator
Internet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
Version 14.0. Overview. Business value
PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing
Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Hewlett Packard. PRODUCT NAME: HP Distributed Computing Environment SPD 43.05.11 (DCE) Version 3.2 for OpenVMS Systems
Hewlett Packard Software Product Description PRODUCT NAME: HP Distributed Computing Environment SPD 43.05.11 (DCE) Version 3.2 for OpenVMS Systems DESCRIPTION The HP Distributed Computing Environment for
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities
Briefing Paper The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities Sean A. Ensz University of Oklahoma 200 Felgar Street, Norman, Oklahoma 73019 405.325.3954 Office 405.325.1633 Fax
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
Network setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
Niagara IT Manager s Guide
3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common
Survey on software testing techniques in cloud computing
Survey on software testing techniques in cloud computing V.Priyadharshini #1, Dr. A. Malathi *2 # PhD Research Scholar PG & Research Department of CS Government Arts College (Autonomous) Coimbatore 18.
Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)
Open EMS Suite O&M Agent Functional Overview Version 1.2 Nokia Siemens Networks 1 (18) O&M Agent The information in this document is subject to change without notice and describes only the product defined
MD Link Integration. 2013 2015 MDI Solutions Limited
MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY
Removing The Linux Routing Cache
Removing The Red Hat Inc. Columbia University, New York, 2012 Removing The 1 Linux Maintainership 2 3 4 5 Removing The My Background Started working on the kernel 18+ years ago. First project: helping
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
EVALUATING INDUSTRIAL ETHERNET
EVALUATING INDUSTRIAL ETHERNET WHAT IS STANDARD? Written by: Shuo Zhang Networks Marketing Rockwell Automation As industrial automation systems evolve, industrial Ethernet is becoming increasingly popular
Structure and Performance of Open Access Networks Case Lappeenranta Model
Structure and Performance of Open Access Networks Case Lappeenranta Model M.Juutilainen, T.Lapinlampi, J.Ikonen and J.Porras Paper Title Laboratory of Communications Engineering, Lappeenranta University
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
MEASURING WIRELESS NETWORK CONNECTION QUALITY
Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: http://www.tdcommons.org/dpubs_series
Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
CONDIS. IT Service Management and CMDB
CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Project description. Power Electronics for Reliable and Energy efficient Renewable Energy Systems
Project description Title: Power Electronics for Reliable and Energy efficient Renewable Energy Systems OBJECTIVES Principal objective Provide competence and decision basis for enabling reliable and energy
A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
Unified Threat Management Throughput Performance
Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did
