1 Mobile Agents. 2 What is a Mobile Agent? 2.1 Mobile agent = code + state
|
|
- Hugo Watson
- 5 years ago
- Views:
Transcription
1 1 Mobile Agents And now for something completely different. To date, we have concentrated on programming the network with what can be termed traditional techniques. Specifically, the use of the client/server model is so common that one could be forgiven for assuming it is the only usable network application development model. Today, the vast majority of Internet-based applications conform to the client/server model. And for good reason: it works well, is well understood and is easy to work with. However, there are other models. Of them all, one of the most interesting is the mobile-agent model. 2 What is a Mobile Agent? The cute answer is: it depends on who is asked. Due to the relative immaturity of this field, the study of mobile-agent technologies has produced a number of often conflicting definitions. Rather than discuss the various definitions and risk confusing the reader, a simple working definition is presented here (with the keywords emphasized). A mobile agent is a network-aware software application that can, under certain circumstances, suspend its execution on one network device, transport to another network device and resume execution there. The mobile designation is due to the software application s ability to relocate from one network device to another. The agent designation is due to the software application doing something on behalf of a user, that is, it acts as an agent for the user. This model is very different to the client/server model. Instead of a standard, formatted message being sent from one software application to another over a network, the entire software application is sent. In the course of its execution, a mobile agent may relocate to multiple network devices, that is, it can roam. 2.1 Mobile agent = code + state A mobile agent has two main components: code and state. Obviously, in order for a software application to relocate from one network device to another, its code has to travel. It will depend on the mobileagent environment whether or not the code is in source code form, compiled form or in some intermediate form (such as bytecode). The software application s state also has to travel. This refers to the resources the software application is currently using. Do any variables exist, 1
2 and what are their values? Are any disk-files open? Does the software application hold any other resources? Again, depending on the mobile-agent environment, none, some or all of the software application s resources may travel. The entire set of resources are referred to as the software application s state. 2.2 What is a mobile-agent environment? A mobile-agent environment (MAE) is a set of technologies that provides a working space for mobile agents. The MAE has to exist on each network device that the mobile agent can execute on (and relocate to), and this includes the device that starts the mobile agent. Throughout this document, the device that starts the mobile agent is referred to as the initiating network device. The technologies used to provide an MAE vary widely. Some are network servers that operate on any compatible network device, while others are entire operating systems built from scratch to support mobile agents. Within the literature, MAEs are referred to by a number of names, with site, location and place the most popular monikers. 3 Mobile-Agent Examples In light of an understanding of what a mobile agent is, let us revisit two traditional applications and consider their re-implementation as mobile agents. 3.1 Revisiting multiwho Chapter 4 of Programming the Network with Perl includes the multiwho program, which uses the TELNET protocol to automate the production of the list of logged-in users on a collection of network devices. The TELNET protocol is classically client/server, whereby the server on a remote network device provides a terminal emulation service to a local client program. The multiwho program, built to exploit TELNET, contacts a list of network devices (each of which runs a TELNET server) and interacts with them in order to determine the list of logged-in users. It is the responsibility of the multiwho program to monitor the entire execution process, as well as process the results of each interaction and produce the concatenated list of logged-in users (the master list). The multiwho program exhibits two identifiable characteristics as follows. It is client-centric the client-side of the interaction does all the real work. In comparison, the server-side of the interaction provides a fixed 2
3 set of services which cannot be easily changed or expanded. If additional processing of the results generated by the service request is required, then this processing must occur on the client (as is the case with multiwho). It is bandwidth-intensive the network traffic generated by multiwho in relation to the results produced is disproportionate. A small amount of output results from a large amount of network traffic. This is worsened by the fact that TELNET is a very chatty protocol. A mobile-agent implementation of multiwho would begin by relocating to the first network device on the list. Once there 1, multiwho would determine the list of logged-in users and concatenate them with the master list (which would have started out empty). The multiwho mobile agent then relocates to the next network device on the list and iterates. This procedure repeats until each network device on the list is visited and the master list of logged-in users is complete. The multiwho mobile agent then returns to the initiating network device and displays the entire list of logged-in users. The mobile-agent-based multiwho is no longer client-centric, nor is it bandwidth-intensive. Network traffic is generated when a relocation from one network device to another occurs. Thankfully, the chatty TELNET protocol is nowhere to be seen. 3.2 Revisiting ipdetermine Chapter 5 of Programming the Network with Perl includes the ipdetermine program, which uses SNMP to determine a list of routers contactable from a specified routing device. The technique employed requests the contents of the routing table from a Managed Device, then processes the table to extract the required information. Typically, the routing table has tens (and sometimes hundreds) of entries, which are transferred from the SNMP server (the Managed Device) to the SNMP client (the Management Station) for processing. Like TELNET, the SNMP technologies are client/server. The ipdetermine program is both client-centric and bandwidth-intensive. Returning to the example invocation of ipdetermine from the end of Chapter 5, when executed against the router, it produced a list of just four contactable routers from the entire routing table (which had considerably more entries, 312 in all). Now, imagine a mobile-agent-capable router exists 2. An ipdetermine mobile agent transfers itself to the router, processes the routing table to 1 Note that the mobile agent is no longer executing on the initiating network device. 2 That s a big if. 3
4 determine the list of contactable routers, then returns to the initiating network device with the list. The entire contents of the routing table are no longer transferred across the network, and the reliance on SNMP is greatly reduced. An improved implementation of the ipdetermine mobile agent would involve ipdetermine cloning itself prior to its transfer to the router. The original ipdetermine mobile agent would then wait (on the initiating network device) to receive the results produced by its clone and sent to it from the router. The clone never returns to the initiating host, only the results of its execution on the router are transmitted. In this way, the network traffic generated by the clone is kept to a minimum. 4 Mobile-Agent Advantages/Disadvantages Before discussing the advantages of the mobile-agent model over others (notable the client/server model), it is important to point out that it is possible to use any development model to solve a problem. The client/server and mobile-agent versions of both multiwho and ipdetermine solve the problems they set out to. The methods used are very different, but the results are the same. The trick is to identify when it is appropriate and advantageous to use one model over the other. It might seem obvious, but the fact that mobile agents have the ability to relocate is a huge advantage. For example, if a mobile agent cannot find what it needs on one network device, it relocates to another and continues looking. As such, the mobility advantage removes some of the limitations of traditional techniques. The mobile agent can, therefore, make the most of its autonomy. Related to the mobility advantage is the ability of a mobile agent to adapt to the job at hand, providing a potentially powerful problem-solving technology. Granted, this typically involves combining mobile-agent techniques with those of the Artificial Intelligence community 3. The adaptability advantage provides a level of customization which is superior to other models. When mobile agents collaborate at locations, this advantage can enable unique and elegant solutions to problems. Efficiency is another advantage, especially as it relates to network bandwidth utilization. As the complexity of the mobile agent increases, the bandwidth requirements do not necessarily. As an example of the efficiency advantage, consider a website indexing program. When developed using traditional client/server techniques, one possible strategy employed by the client would be to request every document accessible on the website. Each document is retrieved from the HTTP server (with its own individual HTTP Request) and then stored on the 3 A topic very much beyond the scope of this document. 4
5 client s local storage. Only then can indexing occur. Even when HTTP/1.1 (with its persistent connections) is employed, the network traffic produced by this strategy is large, and gets larger as more documents are added to the website. The resulting index might be small, but, as this is produced on the client, its size has no bearing on the network bandwidth used. When a mobile-agent strategy is employed, the mobile agent relocates from the initiating network device to the website and performs the indexing in situ. When the index is created, it is transferred back to the initiating network device. The index is small and the bandwidth that it consumes pales in comparison with that generated by the client/server approach. Granted, the processing burden (that is, the creation of the index) has been shifted from the initiating network device to the website. But, bear in mind that the website no longer has to process all those HTTP Request messages, as it is assumed the mobile agent has access to the website s documents in a manner which is independent of the HTTP access mechanisms. The web-indexing example also serves to highlight the major disadvantage of using mobile agents: security concerns. For the mobile-agent model to work well, all of the participating network devices must trust each other to a high degree, or to a level of trust that is deemed acceptable by some local administrative policy. For instance, it would be foolish to widely advertise the existence of an MAE on any network device, as not all users of the network are trustworthy. The problem worsens when one considers that an MAE provides a facility to execute arbitrary blocks of code as received from another remote network device. A malicious mobile agent could wreak havoc on the network device hosting the MAE if given free rein to execute any code on the MAE. Another concern is the existence of malicious MAEs which await the arrival of non-malicious mobile agents. When they arrive, these mobile agents find themselves operating in a hostile environment. Any further discussion of the solutions to the security disadvantage are beyond the scope of this document, as the intent here is to introduce the mobile-agent model and demonstrate examples of its use. Security in mobile agents is generating considerable ongoing research among academics and commercial interests. 5 Perl Agents The application of Perl to the development of mobile-agent technologies has, unfortunately, not produced a great wealth of activity (as compared with the other networking technologies studied). Despite this fact, the area does have its pioneers. One such pioneer is Steve Purkis, who, as an undergraduate at Carleton University in Canada, developed the Agent.pm module. An unfinished, proof-of-concept technology, Agent.pm can nevertheless be used 5
6 to develop working mobile agents in Perl. Another technology is Scooby 4. Refer to the Scooby website for more information at scooby/. 4 Just why it is called Scooby is a bit of a mystery... groan. (Or maybe that should ve been woof!).g 6
Assignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More informationDRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS).
Harvard University Library Office for Information Systems DRS Policy Guide This Guide defines the policies associated with the Harvard Library Digital Repository Service (DRS) and is intended for Harvard
More informationFIPA Agent Management Support for Mobility Specification
1 2 3 4 5 6 FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS FIPA Management Support for Mobility Specification 7 8 Document title FIPA Management Support for Mobility Specification Document number PC000087B
More informationThis paper was presented at DVCon-Europe in November It received the conference Best Paper award based on audience voting.
This paper was presented at DVCon-Europe in November 2015. It received the conference Best Paper award based on audience voting. It is a very slightly updated version of a paper that was presented at SNUG
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationCategorizing Migrations
What to Migrate? Categorizing Migrations A version control repository contains two distinct types of data. The first type of data is the actual content of the directories and files themselves which are
More informationUNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections
UNIT V Introduction to Application Layer: Introduction, Client Server Programming, WWW and HTTP,FTP, e-mail, TELNET, Secure Shell, Domain Name System, SNMP. HTTP The Hyper Text Transfer Protocol (HTTP)
More informationWhat Is Service-Oriented Architecture
What Is Service-Oriented Architecture by Hao He September 30, 2003 "Things should be made as simple as possible, but no simpler." -- Albert Einstein Introduction Einstein made that famous statement many
More informationTopics in Object-Oriented Design Patterns
Software design Topics in Object-Oriented Design Patterns Material mainly from the book Design Patterns by Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides; slides originally by Spiros Mancoridis;
More informationChapter 5 INTRODUCTION TO MOBILE AGENT
Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action
More informationDo these criteria apply to work in this course?
Bonus topic fo COMP 170 Program Quality Part 2: Review of Program readability Commentary Choosing data names Code layout Commentary Pitfalls Reading a program A program is not only something to be run
More information10 TESTED LANDING PAGE ELEMENTS GUARANTEED TO IMPROVE CONVERSIONS
10 TESTED LANDING PAGE ELEMENTS GUARANTEED TO IMPROVE CONVERSIONS CONTENTS 1. INTRODUCTION 2. WHAT IS A LANDING PAGE? 3. WHY IS A LANDING PAGE IMPORTANT? 5. THE 10 ESSENTIAL PAGE ELEMENTS 12. PUTTING IT
More informationMODELS OF DISTRIBUTED SYSTEMS
Distributed Systems Fö 2/3-1 Distributed Systems Fö 2/3-2 MODELS OF DISTRIBUTED SYSTEMS Basic Elements 1. Architectural Models 2. Interaction Models Resources in a distributed system are shared between
More informationFAQ: Database System Development Life Cycle
Question 1: Why study database management system (DBMS) designs? Answer 1: Understanding and designing databases is truly an evolutionary learning process. There is not a right way or a wrong way to develop
More informationPrivacy & Cookie Statement
Privacy & Cookie Statement Version: 8 May 2018 Since day 1, WeTransfer has cared a great deal about privacy and respecting our users. We have always had a lean data policy: no sign up, no install, no retargeting.
More informationCIP Security Pull Model from the Implementation Standpoint
CIP Security Pull Model from the Implementation Standpoint Jack Visoky Security Architect and Sr. Project Engineer Rockwell Automation Joakim Wiberg Team Manager Technology and Platforms HMS Industrial
More informationLift Internal Revitalizing B2E Communication. LiftInternal.com
Lift Internal Revitalizing B2E Communication LiftInternal.com Use this document to help you plan and execute B2E communication. Even if the topic seems simple, taking the time to think through the fundamentals
More informationMobile Agent Paradigm in Computer Networks
Mobile Agent Paradigm in Computer Networks Nguyen Hong Van DSV, Stockholm University, Forum 100, SE-164 40 Kista, Sweden Email: si-hvan@dsv.su.se ABSTRACT : Mobile agent technology has recently emerged
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationEmergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo
Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)
More informationAPPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.
APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.
More informationRouting Basics. What is Routing? Routing Components. Path Determination CHAPTER
CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role
More informationLEARN READ ON TO MORE ABOUT:
For a complete picture of what s going on in your network, look beyond the network itself to correlate events in applications, databases, and middleware. READ ON TO LEARN MORE ABOUT: The larger and more
More informationCondor Local File System Sandbox Requirements Document
Condor Local File System Sandbox Requirements Document Requirements Document 1 1 Table of Contents 1 Table of Contents 2 2 Introduction 3 3 Describing the problem space 3 4 Defining the project's scope
More informationFeatures of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy
Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from
More informationSecuring Wireless Networks by By Joe Klemencic Mon. Apr
http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies
More informationJISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2)
JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2) Functional requirements and design specification for an ONIX-PL license expression drafting system 1. Introduction This document specifies a
More informationINTELLIGENT SYSTEMS OVER THE INTERNET
INTELLIGENT SYSTEMS OVER THE INTERNET Web-Based Intelligent Systems Intelligent systems use a Web-based architecture and friendly user interface Web-based intelligent systems: Use the Web as a platform
More informationBest Practice for Creation and Maintenance of a SAS Infrastructure
Paper 2501-2015 Best Practice for Creation and Maintenance of a SAS Infrastructure Paul Thomas, ASUP Ltd. ABSTRACT The advantage of using metadata to control and maintain data and access to data on databases,
More informationCorreLog. Ping Monitor Adapter Software Users Manual
CorreLog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No part
More informationCONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I
CHAPTER CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I The basic topic of internal control was introduced in 3. These next two chapters discuss the implications of automating the accounting information
More informationInstance generation from meta-models (for model transformation testing)
Instance generation from meta-models (for model transformation testing) Robbe De Jongh University of Antwerp Abstract Testing model transformations is a tedious job. One needs to make a representative
More informationCS5412: TRANSACTIONS (I)
1 CS5412: TRANSACTIONS (I) Lecture XVII Ken Birman Transactions 2 A widely used reliability technology, despite the BASE methodology we use in the first tier Goal for this week: in-depth examination of
More informationChair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and
More informationReference Requirements for Records and Documents Management
Reference Requirements for Records and Documents Management Ricardo Jorge Seno Martins ricardosenomartins@gmail.com Instituto Superior Técnico, Lisboa, Portugal May 2015 Abstract When information systems
More informationChapter 4. Fundamental Concepts and Models
Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas
More informationDesign and Implementation of Cost Effective MIS for Universities
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
More informationIntroduction Building and Using Databases for historical research December 2012
1. Introduction This is a non-tutor led course that can be completed at your own pace and at a time of your own choosing. We strongly recommend that you complete each module and its component sections
More informationBy default, the 9i instance will follow this sequence to determine its initialization parameters on most operating systems:
ORACLE9I: KISS YOUR INIT.ORA GOODBYE! Dan Norris, norris@celeritas.com, Celeritas Technologies, LLC INTRODUCTION AND OVERVIEW Oracle9i has certainly changed the RDBMS world with all of its new features
More information1: Introduction to Object (1)
1: Introduction to Object (1) 김동원 2003.01.20 Overview (1) The progress of abstraction Smalltalk Class & Object Interface The hidden implementation Reusing the implementation Inheritance: Reusing the interface
More informationMeasuring Broadband New Zealand
Measuring Broadband New Zealand Initial findings report, 2018 In 2018, the Commerce Commission appointed SamKnows to measure New Zealand s internet performance. The programme, called Measuring Broadband
More informationCryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols
More informationCS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 23: March 12, 2003 Challenges of Mobility Mobility is a huge topic Breaks existing applications Anything bandwidth intensive or synchronous Opportunities
More informationPrototyping the campus network
Prototyping the campus network Designing and Supporting Computer Networks Chapter 7 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo
More informationSALVO-a fourth-generation language for personal computers
SALVO-a fourth-generation language for personal computers by MARVIN ELDER Software Automation, Inc. Dallas, Texas ABSTRACT Personal computer users are generally nontechnical people. Fourth-generation products
More informationWhite paper. Keys to Oracle application acceleration: advances in delivery systems.
White paper Keys to Oracle application acceleration: advances in delivery systems. Table of contents The challenges of fast Oracle application delivery...3 Solving the acceleration challenge: why traditional
More informationChapter 13. Architecture Overview
Chapter 13 Architecture Overview 199 200 Storage Networks: The Complete Reference In 1993, the largest data warehouse application supported only 50GB of aggregate data. Although this appears trivial by
More informationDistributed Systems COMP 212. Lecture 10 Othon Michail
Distributed Systems COMP 212 Lecture 10 Othon Michail RMI: Remote Method Invocation Allows an object running in one Java virtual machine to invoke methods on an object running in another Java virtual machine.
More informationTECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple
APPGATE TECHNOLOGY UNIFIED TECHNOLOGY Introduction The AppGate solution truly delivers holistic security and access control where other approaches fall short. It is designed to address the security and
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationA tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents.
A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far Mobile Agents Samuel Lee Department of Electrical Engineering University of Calgary Abstract With
More informationshortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge
shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically
More informationECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective
ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective Part II: Data Center Software Architecture: Topic 3: Programming Models Piccolo: Building Fast, Distributed Programs
More informationWeb Hosting. Important features to consider
Web Hosting Important features to consider Amount of Storage When choosing your web hosting, one of your primary concerns will obviously be How much data can I store? For most small and medium web sites,
More informationstir-certs-02 IETF 93 (Prague) STIR WG Jon
stir-certs-02 IETF 93 (Prague) STIR WG Jon What we did since -01 Basic specification of the cert extension (TNAuthList) didn t change much here Cert scope may include one or more or many TNs Fleshed out
More informationIntroduction to Domain Testing
Introduction to Domain Testing Cem Kaner January, 2018 Copyright (c) 2018 Cem Kaner Domain Testing 1 What Is Domain Testing? The most widely taught technique for designing software tests Copyright (c)
More informationIntroducing Collaboration to Single User Applications
Introducing Collaboration to Single User Applications Abstract Brian Cornell UNC Chapel Hill brian@cs.unc.edu Most research in collaborative systems has been based on designing an ideal system from ground
More informationON ABANDONING XLISP-STAT 1. INTRODUCTION
ON ABANDONING XLISP-STAT JAN DE LEEUW ABSTRACT. In 1998 the UCLA Department of Statistics, which had been one of the major users of LISP-STAT, and one of the main producers of LISP-STAT code, decided to
More informationMarketing Guide to Increase Sales
A STEP BY STEP Email Marketing Guide to Increase Sales Reach your target prospects and convert them into customers Email Marketing and Importance of Data Quality Email marketing is a type of direct marketing
More informationThe Google SDN WAN An Open Networking Foundation Interview
The Google SDN WAN An Open Networking Foundation Interview How has this pioneering OpenFlow deployment shaped up over two years? Jim Wanderer, Director of Engineering, Platforms Networking, Google, gives
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationIntroduction to Programming
CHAPTER 1 Introduction to Programming Begin at the beginning, and go on till you come to the end: then stop. This method of telling a story is as good today as it was when the King of Hearts prescribed
More informationInternet Security: Firewall
Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationNewbie s Guide to AVR Interrupts
Newbie s Guide to AVR Interrupts Dean Camera March 15, 2015 ********** Text Dean Camera, 2013. All rights reserved. This document may be freely distributed without payment to the author, provided that
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff and Shun Tak Leung Google* Shivesh Kumar Sharma fl4164@wayne.edu Fall 2015 004395771 Overview Google file system is a scalable distributed file system
More informationSEMANTIC NETWORK AND SEARCH IN VEHICLE ENGINEERING
Martin Sturm, Sylke Rosenplaenter SEMANTIC NETWORK AND SEARCH IN VEHICLE ENGINEERING From Concept to Deployment Vehicle Design Operations & System Development GM Europe Engineering Adam Opel AG www.opel.com
More informationW is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation
W is a Firewall firewall = wall to protect against fire propagation Internet Security: Firewall More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits
More informationLoad Balancing 101: Nuts and Bolts
Load Balancing 101: Nuts and Bolts Load balancing technology is the basis on which today s Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it
More informationUse this section to help you quickly locate a command.
iii iv v Use this section to help you quickly locate a command. vi Use this list to help you locate examples you d like to try or look at. vii viii This document describes the various deployment, installation,
More informationTANDBERG Management Suite - Redundancy Configuration and Overview
Management Suite - Redundancy Configuration and Overview TMS Software version 11.7 TANDBERG D50396 Rev 2.1.1 This document is not to be reproduced in whole or in part without the permission in writing
More informationRethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.
Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now
More informationComprehensive Guide to Evaluating Event Stream Processing Engines
Comprehensive Guide to Evaluating Event Stream Processing Engines i Copyright 2006 Coral8, Inc. All rights reserved worldwide. Worldwide Headquarters: Coral8, Inc. 82 Pioneer Way, Suite 106 Mountain View,
More informationTimber Products Inspection, Inc.
Timber Products Inspection, Inc. Product Certification Public Document Timber Products Inspection, Inc. P.O. Box 919 Conyers, GA 30012 Phone: (770) 922-8000 Fax: (770) 922-1290 TP Product Certification
More informationCPU offloading using SoC fabric Avnet Silica & Enclustra Seminar Getting started with Xilinx Zynq SoC Fribourg, April 26, 2017
1 2 3 Introduction The next few slides give a short introduction of what CPU offloading is and how it can help improving system performance. 4 What is Offloading? Offloading means taking load from one
More informationWhere Did My Data Go?
Where Did My Data Go? ODS / BANNER DATA LOCATIONS A Guide to locating data for those preparing reports whose data now resides in Banner data tables. Revised 12/17/08 Contents Page ii Contents Overview...3
More informationFile Size Distribution on UNIX Systems Then and Now
File Size Distribution on UNIX Systems Then and Now Andrew S. Tanenbaum, Jorrit N. Herder*, Herbert Bos Dept. of Computer Science Vrije Universiteit Amsterdam, The Netherlands {ast@cs.vu.nl, jnherder@cs.vu.nl,
More informationKing Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 IP Addressing and Subnetting: Establishing Elementary Networks using Hubs, Switches and Routers. Objectives:
More informationSoftware Interface Analysis Tool (SIAT) Architecture Definition Document (NASA Center Initiative)
Software Interface Analysis Tool (SIAT) Architecture Definition Document (NASA Center Initiative) DID 06 Contract NAS2-96024 December 30, 1997 Prepared for: NASA Ames Research Center Moffett Field, CA
More informationUsability Report Cover Sheet
Usability Report Cover Sheet Project Overall Project: MLibrary Website Project Title: Search/Browse Card Sort Committee & Members Usability Group: Suzanne Chapman (chair), Shevon Desai, Kat Hagedorn, Julie
More informationLast, with this edition, you can view and download the complete source for all examples at
PREFACE hat could be more exciting than learning the cool subfile concepts and techniques provided in the first edition of this book? Learning more in this new edition, of course! Actually, subfile concepts
More information3 ITS Standards Deployment and Testing Strategies
3 ITS Standards Deployment and Testing Strategies In chapter 2, this report reviewed some of the ITS deployments shaping the application of ITS Standards in New York State. These projects, and others,
More informationNetBeans IDE Field Guide
NetBeans IDE Field Guide Copyright 2004 Sun Microsystems, Inc. All rights reserved. Debugging Java Applications Table of Contents Starting a Debugging Session...2 Debugger Windows...3 Attaching the Debugger
More informationCabrillo College. Route Optimization Part II
Cabrillo College CCNP Advanced Routing Ch. 7 Route Optimization Part II Rick Graziani, Instructor Originally created by Mark McGregor with modifications and additions by Rick Graziani November 1, 2001
More informationDecentralised Social Filtering based on Trust
Decentralised Social Filtering based on Trust From: AAAI Technical Report WS-98-08. Compilation copyright 1998, AAAI (www.aaai.org). All rights reserved. Tomas Olsson Swedish Institute of Computer Science
More informationDatabase Optimization
Database Optimization June 9 2009 A brief overview of database optimization techniques for the database developer. Database optimization techniques include RDBMS query execution strategies, cost estimation,
More informationSearch Engine Optimisation Basics for Government Agencies
Search Engine Optimisation Basics for Government Agencies Prepared for State Services Commission by Catalyst IT Neil Bertram May 11, 2007 Abstract This document is intended as a guide for New Zealand government
More informationCLOUND COMPUTING II STUDY NOTES. Unit 1. Introduction to Cloud Computing
CLOUND COMPUTING II STUDY NOTES Introduction to Cloud Computing Unit 1 Cloud computing will change the way you use your computer and the Internet. Instead of running programs and data on an individual
More informationSummer Student Project Report
Summer Student Project Report Steffen Pade September 6, 2013 Abstract During my summer project here at CERN I was able to work with a - to me - completely new database technology: Oracle s 12c. My task
More informationData Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security
T rusted Application Trusted System Trusted Network Physical Security System T echnology Data Warehouse P roject Filetransfer Access right just on the data transfer directories Mailbox L oadprocess Data
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More informationBuild Your Zero Trust Security Strategy With Microsegmentation
Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver
More informationHow the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications
White Paper Reflection Desktop for X How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications White Paper How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications
More informationPerformance and Sizing Guide
Performance and Sizing Guide Trend Micro PortalProtect for Microsoft SharePoint 2010 Trend Micro Internal Use Only ENTERPRISE TECHNICAL SALES SERVICES Trend Micro Sizing Guide PortalProtect 2.1 Table of
More informationChapter 5: Networking and the Internet
Chapter 5: Networking and the Internet (Completion Time: 3 weeks) Topics: Internet Basics An overview of how the internet works and how we as users interact with it. This topic can also be used as sort
More informationLearn to develop.net applications and master related technologies.
Courses Software Development Learn to develop.net applications and master related technologies. Software Development with Design These courses offer a great combination of both.net programming using Visual
More informationData Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi.
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 18 Tries Today we are going to be talking about another data
More informationIBM. OA VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) z/os Communications Server
z/os Communications Server IBM OA49911 - VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) Version 2 Release 2 Note: Links to related publications are from
More informationELEVATESEO. INTERNET TRAFFIC SALES TEAM PRODUCT INFOSHEETS. JUNE V1.0 WEBSITE RANKING STATS. Internet Traffic
SALES TEAM PRODUCT INFOSHEETS. JUNE 2017. V1.0 1 INTERNET TRAFFIC Internet Traffic Most of your internet traffic will be provided from the major search engines. Social Media services and other referring
More informationRecording end-users security events: A step towards increasing usability
Section 1 Network Systems Engineering Recording end-users security events: A step towards increasing usability Abstract D.Chatziapostolou and S.M.Furnell Network Research Group, University of Plymouth,
More information