Architecture of Distributed Systems
|
|
- Sophia Owen
- 5 years ago
- Views:
Transcription
1 Architecture of Distributed Systems Example HW-A1 R. H. Mak
2 Ajax and Spring Framework taken from R.H. Mak 2IMN10-UML page
3 : a system for automated network virtualization in iaas cloud infrastructures Taken from: Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example 2
4 Questions about the model 1. What building blocks (AEs) do you see? What do they represent? Are they conceptual (C) or physical (P)? 2. Same questions as 1, but now for connectors? 3. To which view(point)s does the model belong? 1. Motivate why, and identify corresponding stakeholders and their concerns. 4. Which of the following EFRs are addressed (Y + motivation N)? 1. Performance/scalability, 2. availability/reliability, 3. security, 4. maintainability, 5. other? 5. Is there a concept of distribution (Y + motivation N)? 6. Comment on the clarity/semantics of the diagram ( ) + motivation Keep you answers crisp! R.H. Mak 2IMN10-UML page
5 Building blocks (C P) Services, lifelines (C) Two scenarios (C) initialization update A global library (C) A software package (C P) Actors human (C) runtime environment (C) server (C P) R.H. Mak 2IMN10-UML page
6 Connectors (C P) All (C) Message, Method invocation Is_a relationships, to indicate special services Part-of relationships (black diamond arrows) Dependency relationship (uses) R.H. Mak 2IMN10-UML page
7 View concern stakeholder There are even some indications of a deployment view, since a technology is mentioned (jsx3.net), as are a runtime elements such as a server Development view : the class structure of some entities is shown which is of interest to programmers. Process view: system integrators, testers can see how the various parts interact. Developers (programmers) can see which class methods are used. Scenario: testers can run these to test interaction. Users can see how to interact with the system. Because of the latter, it can be argued that the model also belongs to the logical view. R.H. Mak 2IMN10-UML page
8 Extra-functional requirements (Y + motivation N) Security: N Availability & reliability: Y There are error methods exhibited Maintainability: Y Class structure is shown at a level useful for implementation and modification Performance and scalability: N R.H. Mak 2IMN10-UML page
9 Distribution, Clarity and Semantics ( ) + motivation Distribution (Y + motivation) /N: N Clarity/Semantics ( ) + motivation: A mix of a class diagram and a sequence diagram. So on the one hand, a lot of information crammed into a single model, but on the other hand this guarantees consistency between development and process view models. R.H. Mak 2IMN10-UML page
10 Building blocks (C P) Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy Building blocks: Sites, machines, gateways, bridges, network cards, networks (LAN, WAN) (all P) VLANs (C) controller process (C) Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example
11 Connectors (C P) Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy All (C) Inclusion/containment relations (production network in site, etc.) Bindings of network cards (NICs) to networks or bridges Open connections Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example
12 View concern stakeholder Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy Physical view, because we see devices and machines. Important for suppliers, system engineers and network operators and administrators who have to put the system together and operate it Logical view, because it gives an overview of intra- and inter-cloud network services. Useful for system acquirers and developers. It also indicates a management network, which is used for configuration of the network and therefore of interest to the network operators and administrators. Rudolf Mak TU/e Computer Science 2IMN10- HW example Sep-17
13 Extra-functional requirements (Y + motivation N) Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy Security: Y because VLANs isolate network traffic of various cloud tenants Availability & reliability, maintainability, performance & scalability: N Others: Operability and configurability, presence of a management network Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example
14 Distribution (Y + motivation N) Local cloud site Remote cloud site external network #1 management network production network network id = 2 VLAN id = 6 eth0 eth0.6 br6 tap6 external network #2 Open connection tapx network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy YES: Because we can see sites, bridges, multiple machines, multiple networks Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example
15 Clarity/Semantics ( ) + motivation Local cloud site Remote cloud site external network #1 production network network id = 2 VLAN id = 6 eth0 eth0.6 management network br6 tap6 external network #2 Open connection tapx -- network id = 3 VLAN id = 15 eth0.15 br15 tap15 Open connection tapy No clear drawing conventions Physical configuration clear, but not much context on the intended purpose, i.e., cloud tenants requiring their applications to run on isolated networks that have no interference from other applications, of the system. Therefore, VLANs have to be configured/deployed on a physical network. Rudolf Mak TU/e Computer Science 12-Sep-17 2IMN10- HW example
Building blocks: Connectors: View concern stakeholder (1..*):
1 Building blocks: Connectors: View concern stakeholder (1..*): Extra-functional requirements (Y + motivation) /N : Security: Availability & reliability: Maintainability: Performance and scalability: Distribution
More informationZentera Systems CoIP Platform
Application Note Zentera Systems CoIP Platform Traffic Isolation Using CoIP Traffic Isolation is Critical to Network Security An important attribute of any network is that it ensures certain types of traffic
More informationExecution Architecture
Execution Architecture Software Architecture VO (706.706) Roman Kern Institute for Interactive Systems and Data Science, TU Graz 2018-11-07 Roman Kern (ISDS, TU Graz) Execution Architecture 2018-11-07
More informationRajeev Grover. Maruti Kamat. Vivek Narasimhan
Distributed Routing in Ironic Integrated OpenStack Cloud Rajeev Grover Maruti Kamat Vivek Narasimhan Jonathan Bryce Executive Director Openstack Foundation Embracing Datacenter Diversity Austin Summit
More informationSoftware architecture: Introduction
2IW80 Software specification and architecture Software architecture: Introduction Alexander Serebrenik This week sources Slides by Johan Lukkien and Rudolf Mak Software architecture Software architecture
More informationArchitecture of Distributed Systems Component-based Systems
Architecture of Distributed Systems 2017-2018 Component-based Systems Original : J.J Lukkien Revision: R.H. Mak 25-Oct-17 Rudolf Mak TU/e Computer Science 2II45-CBSE Goals of this lecture Students have
More informationA Generic Method for Defining Viewpoints in SysML
A Generic Method for Defining Viewpoints in SysML Takahiro Yamada Japan Aerospace Exploration Agency/Institute for Space and Astronautical Science 3-1-1 Yoshinodai, Sagamihara 229-8510, JAPAN Copyright
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica
TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10 / 2II45), on Monday November 2, 2015, from 13.30 to 16.30 hours. Indicate on
More informationIntegrating NetScaler ADCs with Cisco ACI
Docs.Citrix.com Integrating NetScaler ADCs with Cisco ACI http://docs.citrix.com/content/docs/en-us/netscaler/10-1/ns-solutions-con/cisco-aci-wrapper.html Jan. 28, 2011 citrix.com 1 Integrating NetScaler
More informationCloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking
Cloud Networking (VITMMA02) Network Virtualization: Overlay Networks OpenStack Neutron Networking Markosz Maliosz PhD Department of Telecommunications and Media Informatics Faculty of Electrical Engineering
More informationCOSC 3351 Software Design. An Introduction to UML (I)
COSC 3351 Software Design An Introduction to UML (I) This lecture contains material from: http://wps.prenhall.com/esm_pfleeger_softengtp_2 http://sunset.usc.edu/classes/cs577a_2000/lectures/05/ec-05.ppt
More informationNetworking in Virtual Infrastructure and Future Internet. NCHC Jen-Wei Hu
Networking in Virtual Infrastructure and Future Internet NCHC Jen-Wei Hu Overview Virtualization Networking in Virtualization Future Internet 2 Hardware virtualization Hardware virtualization techniques
More informationSoftware Specification and Architecture 2IW80
Software Specification and Architecture 2IW80 Julien Schmaltz Recapitulation Session Exam» April 12.04.2016 09:00 12:00» Location: check OASE» Part I. 40 multiple choice questions (4 options)» 1 point
More informationIntroduction to UML. Danang Wahyu utomo
Introduction to UML Danang Wahyu utomo danang.wu@dsn.dinus.ac.id 085 740 955 623 Evolution of OO Development Methods History of OOAD leading to UML Why Model? Analyse the problem domain - Simplify reality
More informationSoftware architecture: Introduction
2IW80 Software specification and architecture Software architecture: Introduction Alexander Serebrenik This week sources Slides by Johan Lukkien and Rudolf Mak Software architecture Software architecture
More informationConceptual Design. The Entity-Relationship (ER) Model
Conceptual Design. The Entity-Relationship (ER) Model CS430/630 Lecture 12 Slides based on Database Management Systems 3 rd ed, Ramakrishnan and Gehrke Database Design Overview Conceptual design The Entity-Relationship
More informationCS-580K/480K Advanced Topics in Cloud Computing. OpenStack
CS-580K/480K dvanced Topics in Cloud Computing OpenStack 1 Where we are 2 Virtualization Layer Operating System 1 2 3 4 Operating System 1 2 3 4 Operating System 1 2 3 4 VM1 VM2 VM3 Virtualization Layer
More informationSoftware Engineering Lab Manual
Kingdom of Saudi Arabia Ministry Education Prince Sattam Bin Abdulaziz University College of Computer Engineering and Sciences Department of Computer Science Software Engineering Lab Manual 1 Background:-
More informationEnterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.
2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are
More informationData Center Configuration. 1. Configuring VXLAN
Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2
More informationInteroperability guide Phoenix Contact WLAN clients with Cisco Wireless LAN Controllers (WLC) Published:
Interoperability guide Phoenix Contact WLAN clients with Cisco Wireless LAN Controllers (WLC) Published: 2018-10-16 Contents Introduction... 1 Objectives:... 1 Requirements:... 1 Procedure... 2 Default
More informationProceedings of NetDev 1.1: The Technical Conference on Linux Networking (February 10th-12th Seville, Spain) VRF Tutorial
v VRF Tutorial David Ahern Cumulus Networks Netdev 1.1, February 2016 Agenda VRF Overview Use Case: Management VRF Use Case: VLANs and VRFs Use Case: MPLS and VRFs Other 2 Virtual Routing and Forwarding
More informationPluribus Data Center Interconnect Validated
Design Guide Pluribus Data Center Interconnect Validated Design Guide www.pluribusnetworks.com Terminology Reference This is a glossary of acronyms and terms used throughout this document. AS BFD BGP L2VPN
More informationUnicast Forwarding. Unicast. Unicast Forwarding Flows Overview. Intra Subnet Forwarding (Bridging) Unicast, on page 1
Unicast, on page 1 Unicast Flows Overview Intra and inter subnet forwarding are the possible unicast forwarding flows in the VXLAN BGP EVPN fabric, between leaf/tor switch VTEPs. They are explained in
More informationThe following steps should be used when configuring a VLAN on the EdgeXOS platform:
EdgeXOS VLANs VLAN Overview This document provides an overview of what a VLAN is and how it is configured on the EdgeXOS platform. Use the step-by-step guide below to configure a VLAN on the Edge appliance
More informationCreating and Analyzing Software Architecture
Creating and Analyzing Software Architecture Dr. Igor Ivkovic iivkovic@uwaterloo.ca [with material from Software Architecture: Foundations, Theory, and Practice, by Taylor, Medvidovic, and Dashofy, published
More informationArchitecture of Distributed Systems
Architecture of Distributed Systems 2017-2018 Architectural Styles Original: J.J. Lukkien Revision: R.H. Mak 20-Sep-17 Rudolf Mak TU/e Computer Science 2IMN10-AS 1 Goals Students understand: what architectural
More informationLANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.
LAN interconnecting devices INTRODUCTION LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed. Connecting devices
More informationLayer 4 to Layer 7 Design
Service Graphs and Layer 4 to Layer 7 Services Integration, page 1 Firewall Service Graphs, page 5 Service Node Failover, page 10 Service Graphs with Multiple Consumers and Providers, page 12 Reusing a
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica
TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10), on Thursday, January 25, 2018, from 18.00 to 21.00 hours. Before you start,
More informationChapter 4. Fundamental Concepts and Models
Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas
More informationEnterprise Architecture Frameworks
Enterprise Architecture Frameworks Learning Objective of Chapter 2 Topic: Enterprise Architecture Framework Content and structure of enterprise architecture descriptions This is necessary because Enterprises
More informationAlignment of Business and IT - ArchiMate. Dr. Barbara Re
Alignment of Business and IT - ArchiMate Dr. Barbara Re What is ArchiMate? ArchiMate is a modelling technique ("language") for describing enterprise architectures. It presents a clear set of concepts within
More informationVLANs. LAN Switching and Wireless Chapter 3. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
VLANs LAN Switching and Wireless Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of VLANs in a converged network. Explain the role of trunking
More information6/20/2018 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES. Outline for Today. Architecture views C&C Views
1 CS5386 SOFTWARE DESIGN & ARCHITECTURE LECTURE 5: ARCHITECTURAL VIEWS C&C STYLES Outline for Today 2 Architecture views C&C Views 1 Components and Connectors (C&C) Styles 3 Elements Relations Properties
More informationRef Data Over Coax Gateway Application Notes. Vlan Support
Ref.769301 Data Over Coax Gateway Application Notes Vlan Support Content Index About this Application Note...3 Functional Description of Router...3 System Interfaces description...3 Operation Modes...3
More informationNetwork Mul,tenancy in Xen- based Clouds. Chiradeep Vi;al CloudStack Commi;er Citrix Sep
Network Mul,tenancy in Xen- based Clouds Chiradeep Vi;al CloudStack Commi;er Citrix Systems @chiradeep Sep 18 2013 Agenda Introduc,on to CloudStack Mul,- tenant IAAS Network Virtualiza,on / SDN L3 isola,on
More informationUML Component Diagrams A.Y 2018/2019
UML Component Diagrams A.Y 2018/2019 Component diagrams Component diagrams are integral to building your software system. Drawn out with UML diagramming software, they help your team understand the structure
More informationUML Tutorial. Unified Modeling Language UML Tutorial
UML Tutorial Unified Modeling Language UML Tutorial A Unified Modeling Language is a language for specifying, constructing, visualizing and documenting the software system and its components. UML is a
More informationVirtual Security Gateway Overview
This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,
More informationArchiMate 2.0. Structural Concepts Behavioral Concepts Informational Concepts. Business. Application. Technology
ArchiMate Core Structural Concepts Behavioral Concepts Informational Concepts interaction Technology Application Layer Concept Description Notation Concept Description Notation Actor An organizational
More informationS1 Informatic Engineering
S1 Informatic Engineering Advanced Software Engineering Web App. Process and Architecture By: Egia Rosi Subhiyakto, M.Kom, M.CS Informatic Engineering Department egia@dsn.dinus.ac.id +6285640392988 SYLLABUS
More informationCreating a Virtual Network with Virt-manager
Creating a Virtual Network with Virt-manager Our goal today will be to create three virtual machines on our host machine, network them together using virtual bridges, and pass some very simple traffic
More informationAnalysis and designing of the automated mobile money transfer system.
Chapter 5 Analysis and designing of the automated mobile money transfer system. 5.1 Introduction Previous chapter has been discussed approaches, methods of implementing this project and technologies used.
More informationEnterprise Architecture Views and Viewpoints in ArchiMate
member of Enterprise Architecture Views and Viewpoints in ArchiMate ArchiMate 3 Chapter 14 The Core of Architecture Description http://www.iso-architecture.org/ieee-1471/cm/ Architecture Views and Viewpoints
More informationInternet Engineering Task Force (IETF) Request for Comments: 8014 Category: Informational. M. Lasserre Independent T. Narten IBM December 2016
Internet Engineering Task Force (IETF) Request for Comments: 8014 Category: Informational ISSN: 2070-1721 D. Black Dell EMC J. Hudson L. Kreeger M. Lasserre Independent T. Narten IBM December 2016 An Architecture
More informationArchitecture of Software Intensive Systems
Architecture of Software Intensive Systems Architectural Styles Johan Lukkien, Rudolf Mak With input from Architectural Patterns Revisited A Pattern Language, Paris Avgeriou Uwe Zdun 1 Students understand:
More informationChapter Motivation For Internetworking
Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance
More informationAli Khan < Project Name > Design Document. Version 1.0. Group Id: S1. Supervisor Name: Sir.
< Project Name > Design Document Version 1.0 Group Id: S1. Supervisor Name: Sir. Revision History Date Version Description Author Table of Contents 1. Introduction of Design Document 2. Entity Relationship
More informationLecture 17: (Architecture V)
Lecture 17: (Architecture V) Software System Design and Implementation ITCS/ITIS 6112/8112 091 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte Oct. 30,
More informationDeploy the ExtraHop Discover Appliance with VMware
Deploy the ExtraHop Discover Appliance with VMware Published: 2018-09-26 Published: 2018-09-26 The ExtraHop virtual appliance can help you to monitor the performance of your applications across internal
More informationManaging Demand Spikes in a highly flexible and agile deployment
Managing Demand Spikes in a highly flexible and agile deployment Yuki Sato S2 (Akita, Japan) Jan Hilberath Midokura (Tokyo, Japan) Agenda Company Introduction Why SUSE OpenStack with MidoNet? MidoNet Introduction
More informationUnified Modeling Language (UML) and Modeling
LECTURE-11 Unified Modeling Language (UML) and Modeling UML is a graphical notation useful for OO analysis and design Allows representing various aspects of the system Various notations are used to build
More informationNick Rozanski Andy Longshaw Eoin Woods. Sold! How to Describe, Explain and Justify your Architecture
Nick Rozanski Andy Longshaw Eoin Woods Sold! How to Describe, Explain and Justify your Architecture Objectives of Today If you are an architect who has to produce an Architectural Description, then this
More informationCisco ACI Multi-Pod and Service Node Integration
White Paper Cisco ACI Multi-Pod and Service Node Integration 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 68 Contents Introduction... 3 Prerequisites...
More informationSwitched Ethernet Virtual LANs
Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware
More informationUML Fundamental. OutLine. NetFusion Tech. Co., Ltd. Jack Lee. Use-case diagram Class diagram Sequence diagram
UML Fundamental NetFusion Tech. Co., Ltd. Jack Lee 2008/4/7 1 Use-case diagram Class diagram Sequence diagram OutLine Communication diagram State machine Activity diagram 2 1 What is UML? Unified Modeling
More informationPacket Tracer - Subnet Scenario 2 Topology
Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5 Addressing Table Device Interface IP Address Subnet Mask Default Gateway G0/0 R1 S0/0/0 G0/0 S0/0/0
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 05 Basics of IoT Networking-Part-I In this lecture and
More informationSoftware Design Description Report
2015 Software Design Description Report CodeBenders Haldun Yıldız 1819663 Onur Aydınay 1819002 Deniz Can Yüksel 1819697 Ali Şihab Akcan 1818871 TABLE OF CONTENTS 1 Overview... 3 1.1 Scope... 3 1.2 Purpose...
More informationPrinciples of Application Centric Infrastructure
White Paper Principles of Application Centric Infrastructure What You Will Learn One of the main innovations in application centric infrastructure (ACI) is the introduction of a highly abstracted interface
More informationUML Diagrams MagicDraw UML Diagrams
In software development, the diagram is the equivalent of a blueprint. To meet the various needs of many parties, we often need several different blueprints of the same system. Furthermore, every system
More informationWireless LAN, WLAN Security, and VPN
Wireless LAN, WLAN Security, and VPN 麟瑞科技台南辦事處技術經理張晃崚 WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate
More informationObject Oriented Analysis is popular approach that sees a system from the viewpoint of the objects themselves as they function and interact
Chapter 6 Object Oriented Analysis is popular approach that sees a system from the viewpoint of the objects themselves as they function and interact Object-oriented (O-O) analysis describes an information
More informationGeneric vs. Domain-specific Modeling Languages
Generic vs. Domain-specific Modeling Languages Knut Hinkelmann Generic vs. Domain-specific Modeling Languages Domain-specific languages are notation which are defined to model knowledge about a specific
More informationWhite Paper. Huawei Campus Switches VXLAN Technology. White Paper
White Paper Huawei Campus Switches VXLAN Technology White Paper 1 Terms Abbreviation VXLAN NVo3 BUM VNI VM VTEP SDN Full English Name Virtual Extensible Local Area Network Network Virtualization over L3
More informationThe Concurrency Viewpoint
The Concurrency Viewpoint View Relationships The Concurrency Viewpoint 2 The Concurrency Viewpoint Definition: The Concurrency Viewpoint: describes the concurrency structure of the system and maps functional
More informationMigrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches
Migration Guide Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches Migration Guide November 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is
More informationLab Subnetting Network Topologies (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Objectives Parts 1 to 5, for each network topology: Determine the number
More informationEthernet Protection using ITU G.8031
Ethernet Protection using ITU G.8031 Tom McDermott Fujitsu Network Communications, Inc. Why Ethernet Protection? Simple. Implementable on small (pizza-box), extended temperature range equipment - FLASHWAVE
More informationCisco Virtualized Multi-Tenant Data Center Cloud Consumer Models
Cisco Virtualized Multi-Tenant Data Center Cloud Consumer Models Last Updated: March 6, 2012 ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLEC- TIVELY, "DESIGNS") IN THIS
More informationDistributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration
More informationDesign Guide for Cisco ACI with Avi Vantage
Page 1 of 23 Design Guide for Cisco ACI with Avi Vantage view online Overview Cisco ACI Cisco Application Centric Infrastructure (ACI) is a software defined networking solution offered by Cisco for data
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 3 Processes
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 3 Processes Context Switching Processor context: The minimal collection of values stored in the
More informationPART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)
PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course details Course Outline Module 1: Introduction to Azure This module explains cloud computing, and compares cloud computing and
More informationCisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack
White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure
More informationFocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention
FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention Brian Amento, Bharath Balasubramanian, Robert J. Hall, Kaustubh Joshi, Gueyoung Jung, K. Hal Purdy AT&T Labs Research, Bedminster,
More informationHybrid Cloud Networking
Hybrid Cloud Networking ITMCCS-2580 Follow us on Twitter for real time updates of the event: @ciscoliveeurope, #CLEUR Housekeeping We value your feedback- don't forget to complete your online session evaluations
More informationCHAPTER 5 CO:-Sketch component diagram using basic notations 5.1 Component Diagram (4M) Sample Component Diagram 5.2 Deployment Diagram (8M)
CHAPTER 5 CO:-Sketch component diagram using basic notations 5.1 Component Diagram (4M) Sample Component Diagram 5.2 Deployment Diagram (8M) Sample Deployment diagram Component diagrams are different in
More informationCOP Cloud Computing. Presented by: Sanketh Beerabbi University of Central Florida
COP6087 - Cloud Computing Presented by: Sanketh Beerabbi University of Central Florida A cloud is a collection of networked resources configured such that users can request scalable resources (VMs, platforms,
More informationHow to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping
How to configure the IAC4500 Internet Access Controller for Billing by Volume Application with NCT480 IP DSLAM using port location mapping Introduction The following paper provides instructions on how
More informationUnit Wise Questions. Unit-1 Concepts
Unit Wise Questions Unit-1 Concepts Q1. What is UML? Ans. Unified Modelling Language. It is a Industry standard graphical language for modelling and hence visualizing a blue print of all the aspects of
More informationAntonio Cianfrani. Virtual LAN (VLAN)
Antonio Cianfrani Virtual LAN (VLAN) Ethernet Ethernet standard (IEEE 802.3) for Local Area Network (LAN). CSMA/CD (Carrier Sense Multiple Access/Collision Detection) Carrier Sense: all devices have to
More informationOpen Security Controller Project Use Cases
Open Security Controller Project Use Cases Security Orchestration for Software-defined Infrastructure https://www.opensecuritycontroller.org Conceptual Architecture Orchestrating security policies with
More information3.0 Object-Oriented Modeling Using UML
3.0 Object-Oriented Modeling Using UML Subject/Topic/Focus: Introduction to UML Summary: History of OOAD leading to UML UML Diagrams: Overview UML Models in the Objectory Software Development Process Literature:
More informationFIBRE CHANNEL OVER ETHERNET
FIBRE CHANNEL OVER ETHERNET A Review of FCoE Today Abstract Fibre Channel over Ethernet (FcoE) is a storage networking option, based on industry standards. This white paper provides an overview of FCoE,
More informationAvancier Methods (AM) Software Architecture Diagrams
Methods (AM) Software Architecture Diagrams in the AM viewpoint library It is illegal to copy, share or show this document (or other document published at http://avancier.co.uk) without the written permission
More informationEnterprise Architecture Views and Viewpoints in ArchiMate - Reference
Enterprise Architecture Views and Viewpoints in ArchiMate - Reference Source: ArchiMate 2.0 Specification, chapter 8, http://pubs.opengroup.org/architecture/archimate2-doc/chap08.html Views and Viewpoints
More informationSCION Project Testbed Trials. David Hausheer, Youssef El Biad, Kurt Baumann, Adrian Perrig
SCION Project Testbed Trials David Hausheer, Youssef El Biad, Kurt Baumann, Adrian Perrig SCION Project Testbed Trials 2 SCION: A Secure Internet Architecture SCION: Scalability, Control, and Isolation
More informationLayer-4 to Layer-7 Services
Overview, page 1 Tenant Edge-Firewall, page 1 LBaaS, page 2 FWaaS, page 4 Firewall Configuration, page 6 Overview Layer-4 through Layer-7 services support(s) end-to-end communication between a source and
More informationHuawei CloudFabric and VMware Collaboration Innovation Solution in Data Centers
Huawei CloudFabric and ware Collaboration Innovation Solution in Data Centers ware Data Center and Cloud Computing Solution Components Extend virtual computing to all applications Transform storage networks
More informationSwitch Configuration Example for Q-SYS Platform Dell PowerConnect 2808
Important Note This switch configuration example is intended to serve as a network setup guideline for systems using Q-LAN audio and video streaming within your Q-SYS system and should be used alongside
More informationDeploying DDS on a WAN and the GIG: The DDS Routing Service. Gerardo Pardo-Castellote, Ph.D. The Real-Time Middleware Experts
Deploying on a WAN and the GIG: The Routing Service Gerardo Pardo-Castellote, Ph.D. The Real-Time Middleware Experts Fernando Crespo Sanchez Principal Engineer, Real-Time Innovations fernando.crespo@rti.com
More informationCisco Designing Cisco Data Center Unified Fabric (DCUFD) v5.0. Download Full Version :
Cisco 642-996 Designing Cisco Data Center Unified Fabric (DCUFD) v5.0 Download Full Version : https://killexams.com/pass4sure/exam-detail/642-996 Answer: A QUESTION: 156 Which three functions are provided
More informationSEEM4570 System Design and Implementation Lecture 11 UML
SEEM4570 System Design and Implementation Lecture 11 UML Introduction In the previous lecture, we talked about software development life cycle in a conceptual level E.g. we need to write documents, diagrams,
More informationIntroduction. Network Architecture Requirements of Data Centers in the Cloud Computing Era
Massimiliano Sbaraglia Network Engineer Introduction In the cloud computing era, distributed architecture is used to handle operations of mass data, such as the storage, mining, querying, and searching
More informationToday s Topic. Lecture 5. What is UML? Why Use UML. UML Diagrams. Introduction to UML. What is UML Why use UML? UML Diagrams
Today s Topic Lecture 5 Introduction to UML What is UML Why use UML? UML Static Use case, Class, Object Deployment, Component (Physical ) Dynamic Sequence, Collaboration (Interaction ) Activity, State
More informationConfiguring Y.1731 (AIS and RDI)
CHAPTER 54 The Catalyst 4500 series switch supports Y.1731 Ethernet Alarm Indication Signal function (ETH-AIS) and Ethernet Remote Defect Indication function (ETH-RDI) to provide fault and performance
More information