Ariba: A Framework for Developing Decentralized Services
|
|
|
- George Griffin
- 10 years ago
- Views:
Transcription
1 Ariba: A Framework for Developing Decentralized Services Christian Hübsch, Christoph P. Mayer, and Oliver P. Waldhorst NGN Service Delivery Platforms and Service Overlays, 13. November 2009, Berlin Institute of Telematics Prof. Martina Zitterbart KIT- die Kooperation von Forschungszentrum Karlsruhe GmbH und Universität Karlsruhe (TH)
2 Internet from the Service Perspective Today's services need to cope with middleboxes mobility and multihoming growing heterogeneity Resulting in not-facebook-but-network incompatibilities, complexity e.g. Skype employs large set of mechanisms to 'just work' services reside to web-based technology the Internet can provide more than just web applications use contradictive paradigms p2p uses client/server, group communication uses unicast 1
3 Existing Solutions are not autonomous require infrastructure support (e.g., agents, rendezvous/directory server, gateways, etc.) not self-organizing need manual configuration not automatically reconnecting assume end-to-end connectivity not dynamically dealing with protocol and network heterogeneity do not work across different protocol domains (e.g. IPv6/IPv4) do not adapt to network reconfiguration very costly due to servers, infrastructure, bandwidth fair for large companies, what about user-provided services? 2
4 Opportunities through decentralization? Today's services are mainly centralized low complexity, high cost for infrastructure and bandwidth Can decentralized services provide new opportunities? lowered cost for infrastructure and bandwidth service overlays more flexible and spontaneous decentralized services can't solve all problems High entrance barrier: complexity of decentralized services is orders of magnitude higher! 3
5 Ariba: Decentralized Service Framework Overlay-based virtual network substrate self-organizing transport connectivity across heterogeneous networks integrated solution with ID-based addressing, providing a virtual network per application context eases service and application development transparently copes with middleboxes, mobility, protocol heterogeneity Low cost without the complexity: Ariba hides the complexity of decentralized service development 4
6 Architecture of Ariba Network Substrate Application Video Source Video Subscriber Application Value-added Services and Applications Group Communication Service Dissemination Tree Group Communication sservice Requirementsoriented Interfaces Ariba Interface Ariba Base Overlay Base Communication Ariba Interface Ariba Decentralized overlay for signaling ID/Locator split Link/Transport split Mobility support E2E connectivity Multihoming Layer4 Transports Underlay Layer 4 Transports Handling of Middleboxes Protocol Heterogenity 5
7 Main concepts (1/2) Identifier-based addressing of Nodes and Links Node-Identifiers decouples locators (IPv4, IPv6, UDP, TCP, ) from node identity node identifier is static, locators can change allows for transparent handling of mobility, multihoming cryptographic identifiers allow for source authenticity Link-Identifiers decouple transport connections from transport context allows for transparent protocol switching during connection lifetime allows for relaying of links and piecewise transport connections 6
8 Main concepts (2/2) Requirements-oriented interfaces developers state requirements decouple developer from specifying mechanisms explicitly link properties can describe reliability, security, overlay properties can describe robustness, performance, cost, Integrated security a network substrate can integrate security securing links between nodes, handle crypto complexity authenticity of nodes through cryptographic Node-Identifiers requirements-oriented interface to security 7
9 Service Development with Ariba Ariba provides a two-fold interface: Node-specific and Communication-specific Node-specific: controlling the overlay bootstrapping/joining overlay selection, state event callbacks, DHT functionality Communication-specific: controlling links binding services to service-specific IDs establishing communication links with requirements Exemplary services spanning own overlays Application-layer multicast (ITM Karlsruhe) Event-communication and -correlation (IPVS Stuttgart) 8
10 Open Source efforts Ariba is an Open Source implementation FreeBSD license model C++ with few library dependencies runs on Linux flavors and Nokia Internet Tablets lightweight to run on mobile devices developed in context of the Spontaneous Virtual Networks project (SpoVNet) underlay.org 9
11 Summary and Outlook Ariba provides an overlay-based, flexible, and low cost solution for service developers Demo at ACM SIGCOMM09 (Honorable-Mention Award) Outlook current porting efforts (OpenWRT, Windows, iphone) bringing Ariba into the network (c.f. B. Davie, PRESTO09) integrating security (e2e link security and cryptographic identifiers) porting applications to Ariba (VLC media player) underlay.org 10
12 Institute of Telematics Thank you! Questions? 11
Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond
Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Definition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Terminology and Definitions Acronyms and Abbreviations Acknowledgement
Contents Foreword Terminology and Definitions Acronyms and Abbreviations Acknowledgement xiii xv xvii xxi 1 Introduction 1 1.1 General Introduction 1 1.2 On Voice over IP and Telephony over IP 2 1.3 Context
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research
Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt John Buford, Avaya Labs Research Topics SAM Charter Recap and Problem Statement AMT(Automatic Multicast Tunneling) Overview
Introduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, [email protected] - Add-on material included of Peterson, Davie: Computer Networks February
How To Manage Address Management In Ip Networks (Netware)
Address Management in IP Networks -Address Resolution Protocol (ARP) -Reverse Address Resolution Protocol (RARP) -Dynamic Host Configuration Protocol () IP Addresses and Physical Addresses The Forwarding
A Reference Architecture for Self-organizing Service-oriented Computing
A Reference Architecture for Self-organizing Service-oriented Computing Lei Liu, Stefan Thanheiser, Hartmut Schmeck Institute for Applied Informatics und Formal Description Methods (AIFB) Karlsruhe Institute
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks
Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France [email protected] Noel Crespi Wireless
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
Network Load Balancing
Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account
Peer-to-Peer Systems and Security IN2194
Network Architectures and Services Department of Computer Science TU München Peer-to-Peer Systems and Security IN2194 Dipl.-Inform. Heiko Niedermayer Christian Grothoff, PhD Prof. Dr.-Ing Georg Carle Course
Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Decentralized supplementary services for Voice-over-IP telephony
Decentralized supplementary services for Voice-over-IP telephony Christoph Spleiß and Gerald Kunzmann Technische Universität München 80333 Munich, Germany {christoph.spleiss,gerald.kunzmann}@tum.de Abstract.
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with
MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Facility Usage Scenarios
Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
Skype characteristics
Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications
MOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt
A SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt IETF65, Dallas March 25, 2006 Eunsoo Shim Sathya Narayanan Greg Daley Panasonic Digital Networking Laboratory Two Layer Approach
Efficient Transport of VoIP Firewall Control Signaling
Universität Stuttgart INSTITUT FÜR NACHRICHTENVERMITTLUNG UND DATENVERARBEITUNG Prof. Dr.-Ing. Dr. h. c. mult. P. J. Kühn INSTITUT FÜR KOMMUNIKATIONSNETZE UND RECHNERSYSTEME Prof. Dr.-Ing. Dr. h. c. mult.
Unit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles [email protected],[email protected] Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
From Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
Communication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: [email protected]
A Framework for Mobility and Flat Addressing in Heterogeneous Domains
A Framework for Mobility and Flat Addressing in Heterogeneous Domains Walter Wong 1, Rafael Pasquini 1, Rodolfo Villaça 1, Luciano B. de Paula 1, Fábio L. Verdi 1 and Maurício F. Magalhães 1 1 Departament
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Lecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
Research on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it
What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it The internet is a GREAT INVENTION! The Internet is great! But, ehem.. Houston, we have a problem 2012 2
DEPLOYING VoIP SECURELY
DEPLOYING VoIP SECURELY Everyone knows that Voice-over-IP (VoIP) has been experiencing rapid growth. Even still, you might be surprised to learn that: 10% of all voice traffic is now transmitted with VoIP
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration
ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there
Marratech Technology Whitepaper
Marratech Technology Whitepaper Marratech s technology builds on many years of focused R&D and key reference deployments. It has evolved into a market leading platform for Real Time Collaboration (RTC)
An Architecture for Concurrent Future Networks
An Architecture for Concurrent Future Networks Future Internet 2008 Karlsruhe, 11.11.2008 Lars Völker, Denis Martin, Ibtissam El Khayat, Christoph Werle, Martina Zitterbart (Universität Karlsruhe (TH)
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
Configuring Sonus SBC 1000/2000. with. Rogers Business Solution (RBS) SIP Trunking Service. Application Note
Configuring Sonus SBC 1000/2000 with Rogers Business Solution (RBS) SIP Trunking Service Application Note Last Updated: March 2014 Copyright 2014, Sonus Networks, Inc. All rights reserved. This document
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
Why ISPs need SDN: SDN-based Network Service Chaining and Software-defined Multicast
Why ISPs need SDN: SDN-based Network Chaining and Software-defined Multicast ZKI Herbsttagung, Kaiserslautern, Germany, 24. Sept. 2014 Jeremias Blendin, Julius Rückert, David Hausheer Department of Electrical
SAMTK: A Toolkit for Scalable Adaptive Multicast. Updates. samrg @ IETF71
SAMTK: A Toolkit for Scalable Adaptive Multicast Updates samrg @ IETF71 Nobuo Kawaguchi Nagoya University Why SAMTK? To fill the gap between researchers and real world application developers. Share the
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
Roland Bless, [email protected]. Stephan Baucke Ericsson Research
Network Virtualization within FP7 EU Project 4WARD Network of the Future Roland Bless, [email protected] Institute of Telematics, University of Karlsruhe Stephan Baucke Ericsson Research 1 4WARD Overview
White paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Peer-to-Peer Systems and Security
Peer-to-Peer Systems and Security Network Address Translation Christian Grothoff Technische Universität München April 8, 2013 Freedom of connection with any application to any party is the fundamental
software networking Jithesh TJ, Santhosh Karipur QuEST Global
software defined networking Software Defined Networking is an emerging trend in the networking and communication industry and it promises to deliver enormous benefits, from reduced costs to more efficient
IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network
IPv6/IPv4 Automatic Dual Authentication Technique for Campus Network S. CHITPINITYON, S. SANGUANPONG, K. KOHT-ARSA, W. PITTAYAPITAK, S. ERJONGMANEE AND P. WATANAPONGSE Agenda Introduction Design And Implementation
8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking & Distributed Systems
Brochure More information from http://www.researchandmarkets.com/reports/2172101/ Inter-Asterisk Exchange (IAX). Deployment Scenarios in SIP-Enabled Networks. Wiley Series on Communications Networking
Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer
Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public
SERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Introduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman [email protected]
Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.
Solutions Guide Secure Remote Access Allied Telesis provides comprehensive solutions for secure remote access. Introduction The world is generating electronic data at an astonishing rate, and that data
Implementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN)
RVS-Seminar Overlay Multicast Quality of Service and Content Addressable Network (CAN) Luca Bettosini Universität Bern Outline > Goals / Motivation ( CAN ) > Content Addressable Network > CAN Multicast
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
19531 - Telematics. 9th Tutorial - IP Model, IPv6, Routing
19531 - Telematics 9th Tutorial - IP Model, IPv6, Routing Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 06. January, 2011 Institute of Computer Science Telematics
TeamViewer Security Information
TeamViewer Security Information 2015 TeamViewer GmbH, Last update: 06/2015 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical
A distributed system is defined as
A distributed system is defined as A collection of independent computers that appears to its users as a single coherent system CS550: Advanced Operating Systems 2 Resource sharing Openness Concurrency
Tutorial Proposal for MONAMI 2012 Operating Heterogeneous Wireless Networks with SON (Self-Organizing Networks)
Tutorial Proposal for MONAMI 2012 Operating Heterogeneous Wireless Networks with SON (Self-Organizing Networks) Objectives Dr. Henning Sanneck, Lars Christoph Schmelz Providing a comprehensive introduction
A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION
Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India
UFTP High-performance data transfer for UNICORE
Mitglied der Helmholtz-Gemeinschaft UFTP High-performance data transfer for UNICORE Dr. Bernd Schuller, Tim Pohlmann Federated Systems and Data division Jülich Supercomputer Centre Forschungszentrum Jülich
24 GE + 2 GE SFP L2 Managed Switch
GEL-2670 Version: 1 24 GE + 2 GE SFP L2 Managed Switch The LevelOne GEL-2670 is an intelligent L2 Managed Switch with 24 x 1000Base-T ports and 2 x 100/1000BASE-X SFP (Small Form Factor Pluggable) slots.
Jean Parrend 1/6 SNMP. Content. 1. Introduction...1
Jean Parrend 1/6 SNMP Content 1. Introduction...1 2. SNMP architecture 1 3. The Management Information Base...3 4. Packet types and structure..4 5. Layered communication...5 Traversing the layers 6. References.6
Overview of NATO Technology Trends
Overview of NATO Technology Trends Interoperability MIL + GOV devices; ED FN and ED MC Roadmap Jan Leduc Rohde & Schwarz SIT Prague, 01.04.2015 Agenda ı NATO Technology Trends & Interoperability SCIP NINE
How To Compare Performance Of A Router On A Hypervisor On A Linux Virtualbox 2.5 (Xen) To A Virtualbox 3.5.2 (Xeen) 2.2.5-Xen-Virtualization (X
Performance Evaluation of Virtual Routers in Para-virtual Environment 1. Abhishek Bajaj [email protected] 2. Anargha Biswas [email protected] 3. Ambarish Kumar [email protected] 4.
Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
Application Delivery Networking
Application Delivery Networking. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: 8-1 Overview
