Architecture of Distributed Systems

Size: px
Start display at page:

Download "Architecture of Distributed Systems"

Transcription

1 Architecture of Distributed Systems Example HW-A1 R. H. Mak

2 Ajax and Spring Framework taken from R.H. Mak 2IMN10-UML page

3 : a system for automated network virtualization in iaas cloud infrastructures Taken from: Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example 2

4 Questions about the model 1. What building blocks (AEs) do you see? What do they represent? Are they conceptual (C) or physical (P)? 2. Same questions as 1, but now for connectors? 3. To which view(point)s does the model belong? 1. Motivate why, and identify corresponding stakeholders and their concerns. 4. Which of the following EFRs are addressed (Y + motivation N)? 1. Performance/scalability, 2. availability/reliability, 3. security, 4. maintainability, 5. other? 5. Is there a concept of distribution (Y + motivation N)? 6. Comment on the clarity/semantics of the diagram ( ) + motivation Keep you answers crisp! R.H. Mak 2IMN10-UML page

5 Building blocks (C P) Services, lifelines (C) Two scenarios (C) initialization update A global library (C) A software package (C P) Actors human (C) runtime environment (C) server (C P) R.H. Mak 2IMN10-UML page

6 Connectors (C P) All (C) Message, Method invocation Is_a relationships, to indicate special services Part-of relationships (black diamond arrows) Dependency relationship (uses) R.H. Mak 2IMN10-UML page

7 View concern stakeholder There are even some indications of a deployment view, since a technology is mentioned (jsx3.net), as are a runtime elements such as a server Development view : the class structure of some entities is shown which is of interest to programmers. Process view: system integrators, testers can see how the various parts interact. Developers (programmers) can see which class methods are used. Scenario: testers can run these to test interaction. Users can see how to interact with the system. Because of the latter, it can be argued that the model also belongs to the logical view. R.H. Mak 2IMN10-UML page

8 Extra-functional requirements (Y + motivation N) Security: N Availability & reliability: Y There are error methods exhibited Maintainability: Y Class structure is shown at a level useful for implementation and modification Performance and scalability: N R.H. Mak 2IMN10-UML page

9 Distribution, Clarity and Semantics ( ) + motivation Distribution (Y + motivation) /N: N Clarity/Semantics ( ) + motivation: A mix of a class diagram and a sequence diagram. So on the one hand, a lot of information crammed into a single model, but on the other hand this guarantees consistency between development and process view models. R.H. Mak 2IMN10-UML page

10 Building blocks (C P) Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy Building blocks: Sites, machines, gateways, bridges, network cards, networks (LAN, WAN) (all P) VLANs (C) controller process (C) Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example

11 Connectors (C P) Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy All (C) Inclusion/containment relations (production network in site, etc.) Bindings of network cards (NICs) to networks or bridges Open connections Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example

12 View concern stakeholder Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy Physical view, because we see devices and machines. Important for suppliers, system engineers and network operators and administrators who have to put the system together and operate it Logical view, because it gives an overview of intra- and inter-cloud network services. Useful for system acquirers and developers. It also indicates a management network, which is used for configuration of the network and therefore of interest to the network operators and administrators. Rudolf Mak TU/e Computer Science 2IMN10- HW example Sep-17

13 Extra-functional requirements (Y + motivation N) Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy Security: Y because VLANs isolate network traffic of various cloud tenants Availability & reliability, maintainability, performance & scalability: N Others: Operability and configurability, presence of a management network Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example

14 Distribution (Y + motivation N) Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy YES: Because we can see sites, bridges, multiple machines, multiple networks Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example

15 Clarity/Semantics ( ) + motivation Local cloud site Remote cloud site external network #1 production network network id = 2 VLAN id = 6 eth0 eth0.6 management network br6 tap6 external network #2 Open connection tapx -- network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy No clear drawing conventions Physical configuration clear, but not much context on the intended purpose, i.e., cloud tenants requiring their applications to run on isolated networks that have no interference from other applications, of the system. Therefore, VLANs have to be configured/deployed on a physical network. Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example

Building blocks: Connectors: View concern stakeholder (1..*):

Building blocks: Connectors: View concern stakeholder (1..*): 1 Building blocks: Connectors: View concern stakeholder (1..*): Extra-functional requirements (Y + motivation) /N : Security: Availability & reliability: Maintainability: Performance and scalability: Distribution

More information

Zentera Systems CoIP Platform

Zentera Systems CoIP Platform Application Note Zentera Systems CoIP Platform Traffic Isolation Using CoIP Traffic Isolation is Critical to Network Security An important attribute of any network is that it ensures certain types of traffic

More information

Execution Architecture

Execution Architecture Execution Architecture Software Architecture VO (706.706) Roman Kern Institute for Interactive Systems and Data Science, TU Graz 2018-11-07 Roman Kern (ISDS, TU Graz) Execution Architecture 2018-11-07

More information

Rajeev Grover. Maruti Kamat. Vivek Narasimhan

Rajeev Grover. Maruti Kamat. Vivek Narasimhan Distributed Routing in Ironic Integrated OpenStack Cloud Rajeev Grover Maruti Kamat Vivek Narasimhan Jonathan Bryce Executive Director Openstack Foundation Embracing Datacenter Diversity Austin Summit

More information

Software architecture: Introduction

Software architecture: Introduction 2IW80 Software specification and architecture Software architecture: Introduction Alexander Serebrenik This week sources Slides by Johan Lukkien and Rudolf Mak Software architecture Software architecture

More information

Architecture of Distributed Systems Component-based Systems

Architecture of Distributed Systems Component-based Systems Architecture of Distributed Systems 2017-2018 Component-based Systems Original : J.J Lukkien Revision: R.H. Mak 25-Oct-17 Rudolf Mak TU/e Computer Science 2II45-CBSE Goals of this lecture Students have

More information

A Generic Method for Defining Viewpoints in SysML

A Generic Method for Defining Viewpoints in SysML A Generic Method for Defining Viewpoints in SysML Takahiro Yamada Japan Aerospace Exploration Agency/Institute for Space and Astronautical Science 3-1-1 Yoshinodai, Sagamihara 229-8510, JAPAN Copyright

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10 / 2II45), on Monday November 2, 2015, from 13.30 to 16.30 hours. Indicate on

More information

Integrating NetScaler ADCs with Cisco ACI

Integrating NetScaler ADCs with Cisco ACI Docs.Citrix.com Integrating NetScaler ADCs with Cisco ACI http://docs.citrix.com/content/docs/en-us/netscaler/10-1/ns-solutions-con/cisco-aci-wrapper.html Jan. 28, 2011 citrix.com 1 Integrating NetScaler

More information

Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking

Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering

More information

COSC 3351 Software Design. An Introduction to UML (I)

COSC 3351 Software Design. An Introduction to UML (I) COSC 3351 Software Design An Introduction to UML (I) This lecture contains material from: http://wps.prenhall.com/esm_pfleeger_softengtp_2 http://sunset.usc.edu/classes/cs577a_2000/lectures/05/ec-05.ppt

More information

Networking in Virtual Infrastructure and Future Internet. NCHC Jen-Wei Hu

Networking in Virtual Infrastructure and Future Internet. NCHC Jen-Wei Hu Networking in Virtual Infrastructure and Future Internet NCHC Jen-Wei Hu Overview Virtualization Networking in Virtualization Future Internet 2 Hardware virtualization Hardware virtualization techniques

More information

Software Specification and Architecture 2IW80

Software Specification and Architecture 2IW80 Software Specification and Architecture 2IW80 Julien Schmaltz Recapitulation Session Exam» April 12.04.2016 09:00 12:00» Location: check OASE» Part I. 40 multiple choice questions (4 options)» 1 point

More information

Introduction to UML. Danang Wahyu utomo

Introduction to UML. Danang Wahyu utomo Introduction to UML Danang Wahyu utomo danang.wu@dsn.dinus.ac.id 085 740 955 623 Evolution of OO Development Methods History of OOAD leading to UML Why Model? Analyse the problem domain - Simplify reality

More information

Software architecture: Introduction

Software architecture: Introduction 2IW80 Software specification and architecture Software architecture: Introduction Alexander Serebrenik This week sources Slides by Johan Lukkien and Rudolf Mak Software architecture Software architecture

More information

Conceptual Design. The Entity-Relationship (ER) Model

Conceptual Design. The Entity-Relationship (ER) Model Conceptual Design. The Entity-Relationship (ER) Model CS430/630 Lecture 12 Slides based on Database Management Systems 3 rd ed, Ramakrishnan and Gehrke Database Design Overview Conceptual design The Entity-Relationship

More information

CS-580K/480K Advanced Topics in Cloud Computing. OpenStack

CS-580K/480K Advanced Topics in Cloud Computing. OpenStack CS-580K/480K dvanced Topics in Cloud Computing OpenStack 1 Where we are 2 Virtualization Layer Operating System 1 2 3 4 Operating System 1 2 3 4 Operating System 1 2 3 4 VM1 VM2 VM3 Virtualization Layer

More information

Software Engineering Lab Manual

Software Engineering Lab Manual Kingdom of Saudi Arabia Ministry Education Prince Sattam Bin Abdulaziz University College of Computer Engineering and Sciences Department of Computer Science Software Engineering Lab Manual 1 Background:-

More information

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV. 2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

Interoperability guide Phoenix Contact WLAN clients with Cisco Wireless LAN Controllers (WLC) Published:

Interoperability guide Phoenix Contact WLAN clients with Cisco Wireless LAN Controllers (WLC) Published: Interoperability guide Phoenix Contact WLAN clients with Cisco Wireless LAN Controllers (WLC) Published: 2018-10-16 Contents Introduction... 1 Objectives:... 1 Requirements:... 1 Procedure... 2 Default

More information

Proceedings of NetDev 1.1: The Technical Conference on Linux Networking (February 10th-12th Seville, Spain) VRF Tutorial

Proceedings of NetDev 1.1: The Technical Conference on Linux Networking (February 10th-12th Seville, Spain) VRF Tutorial v VRF Tutorial David Ahern Cumulus Networks Netdev 1.1, February 2016 Agenda VRF Overview Use Case: Management VRF Use Case: VLANs and VRFs Use Case: MPLS and VRFs Other 2 Virtual Routing and Forwarding

More information

Pluribus Data Center Interconnect Validated

Pluribus Data Center Interconnect Validated Design Guide Pluribus Data Center Interconnect Validated Design Guide www.pluribusnetworks.com Terminology Reference This is a glossary of acronyms and terms used throughout this document. AS BFD BGP L2VPN

More information

Unicast Forwarding. Unicast. Unicast Forwarding Flows Overview. Intra Subnet Forwarding (Bridging) Unicast, on page 1

Unicast Forwarding. Unicast. Unicast Forwarding Flows Overview. Intra Subnet Forwarding (Bridging) Unicast, on page 1 Unicast, on page 1 Unicast Flows Overview Intra and inter subnet forwarding are the possible unicast forwarding flows in the VXLAN BGP EVPN fabric, between leaf/tor switch VTEPs. They are explained in

More information

The following steps should be used when configuring a VLAN on the EdgeXOS platform:

The following steps should be used when configuring a VLAN on the EdgeXOS platform: EdgeXOS VLANs VLAN Overview This document provides an overview of what a VLAN is and how it is configured on the EdgeXOS platform. Use the step-by-step guide below to configure a VLAN on the Edge appliance

More information

Creating and Analyzing Software Architecture

Creating and Analyzing Software Architecture Creating and Analyzing Software Architecture Dr. Igor Ivkovic iivkovic@uwaterloo.ca [with material from Software Architecture: Foundations, Theory, and Practice, by Taylor, Medvidovic, and Dashofy, published

More information

Architecture of Distributed Systems

Architecture of Distributed Systems Architecture of Distributed Systems 2017-2018 Architectural Styles Original: J.J. Lukkien Revision: R.H. Mak 20-Sep-17 Rudolf Mak TU/e Computer Science 2IMN10-AS 1 Goals Students understand: what architectural

More information

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed. LAN interconnecting devices INTRODUCTION LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed. Connecting devices

More information

Layer 4 to Layer 7 Design

Layer 4 to Layer 7 Design Service Graphs and Layer 4 to Layer 7 Services Integration, page 1 Firewall Service Graphs, page 5 Service Node Failover, page 10 Service Graphs with Multiple Consumers and Providers, page 12 Reusing a

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10), on Thursday, January 25, 2018, from 18.00 to 21.00 hours. Before you start,

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Enterprise Architecture Frameworks

Enterprise Architecture Frameworks Enterprise Architecture Frameworks Learning Objective of Chapter 2 Topic: Enterprise Architecture Framework Content and structure of enterprise architecture descriptions This is necessary because Enterprises

More information

Alignment of Business and IT - ArchiMate. Dr. Barbara Re

Alignment of Business and IT - ArchiMate. Dr. Barbara Re Alignment of Business and IT - ArchiMate Dr. Barbara Re What is ArchiMate? ArchiMate is a modelling technique ("language") for describing enterprise architectures. It presents a clear set of concepts within

More information

VLANs. LAN Switching and Wireless Chapter 3. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

VLANs. LAN Switching and Wireless Chapter 3. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 VLANs LAN Switching and Wireless Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of VLANs in a converged network. Explain the role of trunking

More information

6/20/2018 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES. Outline for Today. Architecture views C&C Views

6/20/2018 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES. Outline for Today. Architecture views C&C Views 1 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES Outline for Today 2 Architecture views C&C Views 1 Components and Connectors (C&C) Styles 3 Elements Relations Properties

More information

Ref Data Over Coax Gateway Application Notes. Vlan Support

Ref Data Over Coax Gateway Application Notes. Vlan Support Ref.769301 Data Over Coax Gateway Application Notes Vlan Support Content Index About this Application Note...3 Functional Description of Router...3 System Interfaces description...3 Operation Modes...3

More information

Network Mul,tenancy in Xen- based Clouds. Chiradeep Vi;al CloudStack Commi;er Citrix Sep

Network Mul,tenancy in Xen- based Clouds. Chiradeep Vi;al CloudStack Commi;er Citrix Sep Network Mul,tenancy in Xen- based Clouds Chiradeep Vi;al CloudStack Commi;er Citrix Systems @chiradeep Sep 18 2013 Agenda Introduc,on to CloudStack Mul,- tenant IAAS Network Virtualiza,on / SDN L3 isola,on

More information

UML Component Diagrams A.Y 2018/2019

UML Component Diagrams A.Y 2018/2019 UML Component Diagrams A.Y 2018/2019 Component diagrams Component diagrams are integral to building your software system. Drawn out with UML diagramming software, they help your team understand the structure

More information

UML Tutorial. Unified Modeling Language UML Tutorial

UML Tutorial. Unified Modeling Language UML Tutorial UML Tutorial Unified Modeling Language UML Tutorial A Unified Modeling Language is a language for specifying, constructing, visualizing and documenting the software system and its components. UML is a

More information

Virtual Security Gateway Overview

Virtual Security Gateway Overview This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,

More information

ArchiMate 2.0. Structural Concepts Behavioral Concepts Informational Concepts. Business. Application. Technology

ArchiMate 2.0. Structural Concepts Behavioral Concepts Informational Concepts. Business. Application. Technology ArchiMate Core Structural Concepts Behavioral Concepts Informational Concepts interaction Technology Application Layer Concept Description Notation Concept Description Notation Actor An organizational

More information

S1 Informatic Engineering

S1 Informatic Engineering S1 Informatic Engineering Advanced Software Engineering Web App. Process and Architecture By: Egia Rosi Subhiyakto, M.Kom, M.CS Informatic Engineering Department egia@dsn.dinus.ac.id +6285640392988 SYLLABUS

More information

Creating a Virtual Network with Virt-manager

Creating a Virtual Network with Virt-manager Creating a Virtual Network with Virt-manager Our goal today will be to create three virtual machines on our host machine, network them together using virtual bridges, and pass some very simple traffic

More information

Analysis and designing of the automated mobile money transfer system.

Analysis and designing of the automated mobile money transfer system. Chapter 5 Analysis and designing of the automated mobile money transfer system. 5.1 Introduction Previous chapter has been discussed approaches, methods of implementing this project and technologies used.

More information

Enterprise Architecture Views and Viewpoints in ArchiMate

Enterprise Architecture Views and Viewpoints in ArchiMate member of Enterprise Architecture Views and Viewpoints in ArchiMate ArchiMate 3 Chapter 14 The Core of Architecture Description http://www.iso-architecture.org/ieee-1471/cm/ Architecture Views and Viewpoints

More information

Internet Engineering Task Force (IETF) Request for Comments: 8014 Category: Informational. M. Lasserre Independent T. Narten IBM December 2016

Internet Engineering Task Force (IETF) Request for Comments: 8014 Category: Informational. M. Lasserre Independent T. Narten IBM December 2016 Internet Engineering Task Force (IETF) Request for Comments: 8014 Category: Informational ISSN: 2070-1721 D. Black Dell EMC J. Hudson L. Kreeger M. Lasserre Independent T. Narten IBM December 2016 An Architecture

More information

Architecture of Software Intensive Systems

Architecture of Software Intensive Systems Architecture of Software Intensive Systems Architectural Styles Johan Lukkien, Rudolf Mak With input from Architectural Patterns Revisited A Pattern Language, Paris Avgeriou Uwe Zdun 1 Students understand:

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

Ali Khan < Project Name > Design Document. Version 1.0. Group Id: S1. Supervisor Name: Sir.

Ali Khan < Project Name > Design Document. Version 1.0. Group Id: S1. Supervisor Name: Sir. < Project Name > Design Document Version 1.0 Group Id: S1. Supervisor Name: Sir. Revision History Date Version Description Author Table of Contents 1. Introduction of Design Document 2. Entity Relationship

More information

Lecture 17: (Architecture V)

Lecture 17: (Architecture V) Lecture 17: (Architecture V) Software System Design and Implementation ITCS/ITIS 6112/8112 091 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte Oct. 30,

More information

Deploy the ExtraHop Discover Appliance with VMware

Deploy the ExtraHop Discover Appliance with VMware Deploy the ExtraHop Discover Appliance with VMware Published: 2018-09-26 Published: 2018-09-26 The ExtraHop virtual appliance can help you to monitor the performance of your applications across internal

More information

Managing Demand Spikes in a highly flexible and agile deployment

Managing Demand Spikes in a highly flexible and agile deployment Managing Demand Spikes in a highly flexible and agile deployment Yuki Sato S2 (Akita, Japan) Jan Hilberath Midokura (Tokyo, Japan) Agenda Company Introduction Why SUSE OpenStack with MidoNet? MidoNet Introduction

More information

Unified Modeling Language (UML) and Modeling

Unified Modeling Language (UML) and Modeling LECTURE-11 Unified Modeling Language (UML) and Modeling UML is a graphical notation useful for OO analysis and design Allows representing various aspects of the system Various notations are used to build

More information

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture

Nick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture Nick Rozanski Andy Longshaw Eoin Woods Sold! How to Describe, Explain and Justify your Architecture Objectives of Today If you are an architect who has to produce an Architectural Description, then this

More information

Cisco ACI Multi-Pod and Service Node Integration

Cisco ACI Multi-Pod and Service Node Integration White Paper Cisco ACI Multi-Pod and Service Node Integration 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 68 Contents Introduction... 3 Prerequisites...

More information

Switched Ethernet Virtual LANs

Switched Ethernet Virtual LANs Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware

More information

UML Fundamental. OutLine. NetFusion Tech. Co., Ltd. Jack Lee. Use-case diagram Class diagram Sequence diagram

UML Fundamental. OutLine. NetFusion Tech. Co., Ltd. Jack Lee. Use-case diagram Class diagram Sequence diagram UML Fundamental NetFusion Tech. Co., Ltd. Jack Lee 2008/4/7 1 Use-case diagram Class diagram Sequence diagram OutLine Communication diagram State machine Activity diagram 2 1 What is UML? Unified Modeling

More information

Packet Tracer - Subnet Scenario 2 Topology

Packet Tracer - Subnet Scenario 2 Topology Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5 Addressing Table Device Interface IP Address Subnet Mask Default Gateway G0/0 R1 S0/0/0 G0/0 S0/0/0

More information

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 05 Basics of IoT Networking-Part-I In this lecture and

More information

Software Design Description Report

Software Design Description Report 2015 Software Design Description Report CodeBenders Haldun Yıldız 1819663 Onur Aydınay 1819002 Deniz Can Yüksel 1819697 Ali Şihab Akcan 1818871 TABLE OF CONTENTS 1 Overview... 3 1.1 Scope... 3 1.2 Purpose...

More information

Principles of Application Centric Infrastructure

Principles of Application Centric Infrastructure White Paper Principles of Application Centric Infrastructure What You Will Learn One of the main innovations in application centric infrastructure (ACI) is the introduction of a highly abstracted interface

More information

UML Diagrams MagicDraw UML Diagrams

UML Diagrams MagicDraw UML Diagrams In software development, the diagram is the equivalent of a blueprint. To meet the various needs of many parties, we often need several different blueprints of the same system. Furthermore, every system

More information

Wireless LAN, WLAN Security, and VPN

Wireless LAN, WLAN Security, and VPN Wireless LAN, WLAN Security, and VPN 麟瑞科技台南辦事處技術經理張晃崚 WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate

More information

Object Oriented Analysis is popular approach that sees a system from the viewpoint of the objects themselves as they function and interact

Object Oriented Analysis is popular approach that sees a system from the viewpoint of the objects themselves as they function and interact Chapter 6 Object Oriented Analysis is popular approach that sees a system from the viewpoint of the objects themselves as they function and interact Object-oriented (O-O) analysis describes an information

More information

Generic vs. Domain-specific Modeling Languages

Generic vs. Domain-specific Modeling Languages Generic vs. Domain-specific Modeling Languages Knut Hinkelmann Generic vs. Domain-specific Modeling Languages Domain-specific languages are notation which are defined to model knowledge about a specific

More information

White Paper. Huawei Campus Switches VXLAN Technology. White Paper

White Paper. Huawei Campus Switches VXLAN Technology. White Paper White Paper Huawei Campus Switches VXLAN Technology White Paper 1 Terms Abbreviation VXLAN NVo3 BUM VNI VM VTEP SDN Full English Name Virtual Extensible Local Area Network Network Virtualization over L3

More information

The Concurrency Viewpoint

The Concurrency Viewpoint The Concurrency Viewpoint View Relationships The Concurrency Viewpoint 2 The Concurrency Viewpoint Definition: The Concurrency Viewpoint: describes the concurrency structure of the system and maps functional

More information

Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches

Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches Migration Guide Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches Migration Guide November 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is

More information

Lab Subnetting Network Topologies (Instructor Version)

Lab Subnetting Network Topologies (Instructor Version) (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Objectives Parts 1 to 5, for each network topology: Determine the number

More information

Ethernet Protection using ITU G.8031

Ethernet Protection using ITU G.8031 Ethernet Protection using ITU G.8031 Tom McDermott Fujitsu Network Communications, Inc. Why Ethernet Protection? Simple. Implementable on small (pizza-box), extended temperature range equipment - FLASHWAVE

More information

Cisco Virtualized Multi-Tenant Data Center Cloud Consumer Models

Cisco Virtualized Multi-Tenant Data Center Cloud Consumer Models Cisco Virtualized Multi-Tenant Data Center Cloud Consumer Models Last Updated: March 6, 2012 ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLEC- TIVELY, "DESIGNS") IN THIS

More information

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration

More information

Design Guide for Cisco ACI with Avi Vantage

Design Guide for Cisco ACI with Avi Vantage Page 1 of 23 Design Guide for Cisco ACI with Avi Vantage view online Overview Cisco ACI Cisco Application Centric Infrastructure (ACI) is a software defined networking solution offered by Cisco for data

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 3 Processes

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 3 Processes DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 3 Processes Context Switching Processor context: The minimal collection of values stored in the

More information

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High

More information

1/10/2011. Topics. What is the Cloud? Cloud Computing

1/10/2011. Topics. What is the Cloud? Cloud Computing Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course details Course Outline Module 1: Introduction to Azure This module explains cloud computing, and compares cloud computing and

More information

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure

More information

FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention

FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention Brian Amento, Bharath Balasubramanian, Robert J. Hall, Kaustubh Joshi, Gueyoung Jung, K. Hal Purdy AT&T Labs Research, Bedminster,

More information

Hybrid Cloud Networking

Hybrid Cloud Networking Hybrid Cloud Networking ITMCCS-2580 Follow us on Twitter for real time updates of the event: @ciscoliveeurope, #CLEUR Housekeeping We value your feedback- don't forget to complete your online session evaluations

More information

CHAPTER 5 CO:-Sketch component diagram using basic notations 5.1 Component Diagram (4M) Sample Component Diagram 5.2 Deployment Diagram (8M)

CHAPTER 5 CO:-Sketch component diagram using basic notations 5.1 Component Diagram (4M) Sample Component Diagram 5.2 Deployment Diagram (8M) CHAPTER 5 CO:-Sketch component diagram using basic notations 5.1 Component Diagram (4M) Sample Component Diagram 5.2 Deployment Diagram (8M) Sample Deployment diagram Component diagrams are different in

More information

COP Cloud Computing. Presented by: Sanketh Beerabbi University of Central Florida

COP Cloud Computing. Presented by: Sanketh Beerabbi University of Central Florida COP6087 - Cloud Computing Presented by: Sanketh Beerabbi University of Central Florida A cloud is a collection of networked resources configured such that users can request scalable resources (VMs, platforms,

More information

How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping

How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping Introduction The following paper provides instructions on how

More information

Unit Wise Questions. Unit-1 Concepts

Unit Wise Questions. Unit-1 Concepts Unit Wise Questions Unit-1 Concepts Q1. What is UML? Ans. Unified Modelling Language. It is a Industry standard graphical language for modelling and hence visualizing a blue print of all the aspects of

More information

Antonio Cianfrani. Virtual LAN (VLAN)

Antonio Cianfrani. Virtual LAN (VLAN) Antonio Cianfrani Virtual LAN (VLAN) Ethernet Ethernet standard (IEEE 802.3) for Local Area Network (LAN). CSMA/CD (Carrier Sense Multiple Access/Collision Detection) Carrier Sense: all devices have to

More information

Open Security Controller Project Use Cases

Open Security Controller Project Use Cases Open Security Controller Project Use Cases Security Orchestration for Software-defined Infrastructure https://www.opensecuritycontroller.org Conceptual Architecture Orchestrating security policies with

More information

3.0 Object-Oriented Modeling Using UML

3.0 Object-Oriented Modeling Using UML 3.0 Object-Oriented Modeling Using UML Subject/Topic/Focus: Introduction to UML Summary: History of OOAD leading to UML UML Diagrams: Overview UML Models in the Objectory Software Development Process Literature:

More information

FIBRE CHANNEL OVER ETHERNET

FIBRE CHANNEL OVER ETHERNET FIBRE CHANNEL OVER ETHERNET A Review of FCoE Today Abstract Fibre Channel over Ethernet (FcoE) is a storage networking option, based on industry standards. This white paper provides an overview of FCoE,

More information

Avancier Methods (AM) Software Architecture Diagrams

Avancier Methods (AM) Software Architecture Diagrams Methods (AM) Software Architecture Diagrams in the AM viewpoint library It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission

More information

Enterprise Architecture Views and Viewpoints in ArchiMate - Reference

Enterprise Architecture Views and Viewpoints in ArchiMate - Reference Enterprise Architecture Views and Viewpoints in ArchiMate - Reference Source: ArchiMate 2.0 Specification, chapter 8, http://pubs.opengroup.org/architecture/archimate2-doc/chap08.html Views and Viewpoints

More information

SCION Project Testbed Trials. David Hausheer, Youssef El Biad, Kurt Baumann, Adrian Perrig

SCION Project Testbed Trials. David Hausheer, Youssef El Biad, Kurt Baumann, Adrian Perrig SCION Project Testbed Trials David Hausheer, Youssef El Biad, Kurt Baumann, Adrian Perrig SCION Project Testbed Trials 2 SCION: A Secure Internet Architecture SCION: Scalability, Control, and Isolation

More information

Layer-4 to Layer-7 Services

Layer-4 to Layer-7 Services Overview, page 1 Tenant Edge-Firewall, page 1 LBaaS, page 2 FWaaS, page 4 Firewall Configuration, page 6 Overview Layer-4 through Layer-7 services support(s) end-to-end communication between a source and

More information

Huawei CloudFabric and VMware Collaboration Innovation Solution in Data Centers

Huawei CloudFabric and VMware Collaboration Innovation Solution in Data Centers Huawei CloudFabric and ware Collaboration Innovation Solution in Data Centers ware Data Center and Cloud Computing Solution Components Extend virtual computing to all applications Transform storage networks

More information

Switch Configuration Example for Q-SYS Platform Dell PowerConnect 2808

Switch Configuration Example for Q-SYS Platform Dell PowerConnect 2808 Important Note This switch configuration example is intended to serve as a network setup guideline for systems using Q-LAN audio and video streaming within your Q-SYS system and should be used alongside

More information

Deploying DDS on a WAN and the GIG: The DDS Routing Service. Gerardo Pardo-Castellote, Ph.D. The Real-Time Middleware Experts

Deploying DDS on a WAN and the GIG: The DDS Routing Service. Gerardo Pardo-Castellote, Ph.D. The Real-Time Middleware Experts Deploying on a WAN and the GIG: The Routing Service Gerardo Pardo-Castellote, Ph.D. The Real-Time Middleware Experts Fernando Crespo Sanchez Principal Engineer, Real-Time Innovations fernando.crespo@rti.com

More information

Cisco Designing Cisco Data Center Unified Fabric (DCUFD) v5.0. Download Full Version :

Cisco Designing Cisco Data Center Unified Fabric (DCUFD) v5.0. Download Full Version : Cisco 642-996 Designing Cisco Data Center Unified Fabric (DCUFD) v5.0 Download Full Version : https://killexams.com/pass4sure/exam-detail/642-996 Answer: A QUESTION: 156 Which three functions are provided

More information

SEEM4570 System Design and Implementation Lecture 11 UML

SEEM4570 System Design and Implementation Lecture 11 UML SEEM4570 System Design and Implementation Lecture 11 UML Introduction In the previous lecture, we talked about software development life cycle in a conceptual level E.g. we need to write documents, diagrams,

More information

Introduction. Network Architecture Requirements of Data Centers in the Cloud Computing Era

Introduction. Network Architecture Requirements of Data Centers in the Cloud Computing Era Massimiliano Sbaraglia Network Engineer Introduction In the cloud computing era, distributed architecture is used to handle operations of mass data, such as the storage, mining, querying, and searching

More information

Today s Topic. Lecture 5. What is UML? Why Use UML. UML Diagrams. Introduction to UML. What is UML Why use UML? UML Diagrams

Today s Topic. Lecture 5. What is UML? Why Use UML. UML Diagrams. Introduction to UML. What is UML Why use UML? UML Diagrams Today s Topic Lecture 5 Introduction to UML What is UML Why use UML? UML Static Use case, Class, Object Deployment, Component (Physical ) Dynamic Sequence, Collaboration (Interaction ) Activity, State

More information

Configuring Y.1731 (AIS and RDI)

Configuring Y.1731 (AIS and RDI) CHAPTER 54 The Catalyst 4500 series switch supports Y.1731 Ethernet Alarm Indication Signal function (ETH-AIS) and Ethernet Remote Defect Indication function (ETH-RDI) to provide fault and performance

More information