1 Mobile Agents. 2 What is a Mobile Agent? 2.1 Mobile agent = code + state

Size: px
Start display at page:

Download "1 Mobile Agents. 2 What is a Mobile Agent? 2.1 Mobile agent = code + state"

Transcription

1 1 Mobile Agents And now for something completely different. To date, we have concentrated on programming the network with what can be termed traditional techniques. Specifically, the use of the client/server model is so common that one could be forgiven for assuming it is the only usable network application development model. Today, the vast majority of Internet-based applications conform to the client/server model. And for good reason: it works well, is well understood and is easy to work with. However, there are other models. Of them all, one of the most interesting is the mobile-agent model. 2 What is a Mobile Agent? The cute answer is: it depends on who is asked. Due to the relative immaturity of this field, the study of mobile-agent technologies has produced a number of often conflicting definitions. Rather than discuss the various definitions and risk confusing the reader, a simple working definition is presented here (with the keywords emphasized). A mobile agent is a network-aware software application that can, under certain circumstances, suspend its execution on one network device, transport to another network device and resume execution there. The mobile designation is due to the software application s ability to relocate from one network device to another. The agent designation is due to the software application doing something on behalf of a user, that is, it acts as an agent for the user. This model is very different to the client/server model. Instead of a standard, formatted message being sent from one software application to another over a network, the entire software application is sent. In the course of its execution, a mobile agent may relocate to multiple network devices, that is, it can roam. 2.1 Mobile agent = code + state A mobile agent has two main components: code and state. Obviously, in order for a software application to relocate from one network device to another, its code has to travel. It will depend on the mobileagent environment whether or not the code is in source code form, compiled form or in some intermediate form (such as bytecode). The software application s state also has to travel. This refers to the resources the software application is currently using. Do any variables exist, 1

2 and what are their values? Are any disk-files open? Does the software application hold any other resources? Again, depending on the mobile-agent environment, none, some or all of the software application s resources may travel. The entire set of resources are referred to as the software application s state. 2.2 What is a mobile-agent environment? A mobile-agent environment (MAE) is a set of technologies that provides a working space for mobile agents. The MAE has to exist on each network device that the mobile agent can execute on (and relocate to), and this includes the device that starts the mobile agent. Throughout this document, the device that starts the mobile agent is referred to as the initiating network device. The technologies used to provide an MAE vary widely. Some are network servers that operate on any compatible network device, while others are entire operating systems built from scratch to support mobile agents. Within the literature, MAEs are referred to by a number of names, with site, location and place the most popular monikers. 3 Mobile-Agent Examples In light of an understanding of what a mobile agent is, let us revisit two traditional applications and consider their re-implementation as mobile agents. 3.1 Revisiting multiwho Chapter 4 of Programming the Network with Perl includes the multiwho program, which uses the TELNET protocol to automate the production of the list of logged-in users on a collection of network devices. The TELNET protocol is classically client/server, whereby the server on a remote network device provides a terminal emulation service to a local client program. The multiwho program, built to exploit TELNET, contacts a list of network devices (each of which runs a TELNET server) and interacts with them in order to determine the list of logged-in users. It is the responsibility of the multiwho program to monitor the entire execution process, as well as process the results of each interaction and produce the concatenated list of logged-in users (the master list). The multiwho program exhibits two identifiable characteristics as follows. It is client-centric the client-side of the interaction does all the real work. In comparison, the server-side of the interaction provides a fixed 2

3 set of services which cannot be easily changed or expanded. If additional processing of the results generated by the service request is required, then this processing must occur on the client (as is the case with multiwho). It is bandwidth-intensive the network traffic generated by multiwho in relation to the results produced is disproportionate. A small amount of output results from a large amount of network traffic. This is worsened by the fact that TELNET is a very chatty protocol. A mobile-agent implementation of multiwho would begin by relocating to the first network device on the list. Once there 1, multiwho would determine the list of logged-in users and concatenate them with the master list (which would have started out empty). The multiwho mobile agent then relocates to the next network device on the list and iterates. This procedure repeats until each network device on the list is visited and the master list of logged-in users is complete. The multiwho mobile agent then returns to the initiating network device and displays the entire list of logged-in users. The mobile-agent-based multiwho is no longer client-centric, nor is it bandwidth-intensive. Network traffic is generated when a relocation from one network device to another occurs. Thankfully, the chatty TELNET protocol is nowhere to be seen. 3.2 Revisiting ipdetermine Chapter 5 of Programming the Network with Perl includes the ipdetermine program, which uses SNMP to determine a list of routers contactable from a specified routing device. The technique employed requests the contents of the routing table from a Managed Device, then processes the table to extract the required information. Typically, the routing table has tens (and sometimes hundreds) of entries, which are transferred from the SNMP server (the Managed Device) to the SNMP client (the Management Station) for processing. Like TELNET, the SNMP technologies are client/server. The ipdetermine program is both client-centric and bandwidth-intensive. Returning to the example invocation of ipdetermine from the end of Chapter 5, when executed against the router, it produced a list of just four contactable routers from the entire routing table (which had considerably more entries, 312 in all). Now, imagine a mobile-agent-capable router exists 2. An ipdetermine mobile agent transfers itself to the router, processes the routing table to 1 Note that the mobile agent is no longer executing on the initiating network device. 2 That s a big if. 3

4 determine the list of contactable routers, then returns to the initiating network device with the list. The entire contents of the routing table are no longer transferred across the network, and the reliance on SNMP is greatly reduced. An improved implementation of the ipdetermine mobile agent would involve ipdetermine cloning itself prior to its transfer to the router. The original ipdetermine mobile agent would then wait (on the initiating network device) to receive the results produced by its clone and sent to it from the router. The clone never returns to the initiating host, only the results of its execution on the router are transmitted. In this way, the network traffic generated by the clone is kept to a minimum. 4 Mobile-Agent Advantages/Disadvantages Before discussing the advantages of the mobile-agent model over others (notable the client/server model), it is important to point out that it is possible to use any development model to solve a problem. The client/server and mobile-agent versions of both multiwho and ipdetermine solve the problems they set out to. The methods used are very different, but the results are the same. The trick is to identify when it is appropriate and advantageous to use one model over the other. It might seem obvious, but the fact that mobile agents have the ability to relocate is a huge advantage. For example, if a mobile agent cannot find what it needs on one network device, it relocates to another and continues looking. As such, the mobility advantage removes some of the limitations of traditional techniques. The mobile agent can, therefore, make the most of its autonomy. Related to the mobility advantage is the ability of a mobile agent to adapt to the job at hand, providing a potentially powerful problem-solving technology. Granted, this typically involves combining mobile-agent techniques with those of the Artificial Intelligence community 3. The adaptability advantage provides a level of customization which is superior to other models. When mobile agents collaborate at locations, this advantage can enable unique and elegant solutions to problems. Efficiency is another advantage, especially as it relates to network bandwidth utilization. As the complexity of the mobile agent increases, the bandwidth requirements do not necessarily. As an example of the efficiency advantage, consider a website indexing program. When developed using traditional client/server techniques, one possible strategy employed by the client would be to request every document accessible on the website. Each document is retrieved from the HTTP server (with its own individual HTTP Request) and then stored on the 3 A topic very much beyond the scope of this document. 4

5 client s local storage. Only then can indexing occur. Even when HTTP/1.1 (with its persistent connections) is employed, the network traffic produced by this strategy is large, and gets larger as more documents are added to the website. The resulting index might be small, but, as this is produced on the client, its size has no bearing on the network bandwidth used. When a mobile-agent strategy is employed, the mobile agent relocates from the initiating network device to the website and performs the indexing in situ. When the index is created, it is transferred back to the initiating network device. The index is small and the bandwidth that it consumes pales in comparison with that generated by the client/server approach. Granted, the processing burden (that is, the creation of the index) has been shifted from the initiating network device to the website. But, bear in mind that the website no longer has to process all those HTTP Request messages, as it is assumed the mobile agent has access to the website s documents in a manner which is independent of the HTTP access mechanisms. The web-indexing example also serves to highlight the major disadvantage of using mobile agents: security concerns. For the mobile-agent model to work well, all of the participating network devices must trust each other to a high degree, or to a level of trust that is deemed acceptable by some local administrative policy. For instance, it would be foolish to widely advertise the existence of an MAE on any network device, as not all users of the network are trustworthy. The problem worsens when one considers that an MAE provides a facility to execute arbitrary blocks of code as received from another remote network device. A malicious mobile agent could wreak havoc on the network device hosting the MAE if given free rein to execute any code on the MAE. Another concern is the existence of malicious MAEs which await the arrival of non-malicious mobile agents. When they arrive, these mobile agents find themselves operating in a hostile environment. Any further discussion of the solutions to the security disadvantage are beyond the scope of this document, as the intent here is to introduce the mobile-agent model and demonstrate examples of its use. Security in mobile agents is generating considerable ongoing research among academics and commercial interests. 5 Perl Agents The application of Perl to the development of mobile-agent technologies has, unfortunately, not produced a great wealth of activity (as compared with the other networking technologies studied). Despite this fact, the area does have its pioneers. One such pioneer is Steve Purkis, who, as an undergraduate at Carleton University in Canada, developed the Agent.pm module. An unfinished, proof-of-concept technology, Agent.pm can nevertheless be used 5

6 to develop working mobile agents in Perl. Another technology is Scooby 4. Refer to the Scooby website for more information at scooby/. 4 Just why it is called Scooby is a bit of a mystery... groan. (Or maybe that should ve been woof!).g 6

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

DRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS).

DRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS). Harvard University Library Office for Information Systems DRS Policy Guide This Guide defines the policies associated with the Harvard Library Digital Repository Service (DRS) and is intended for Harvard

More information

FIPA Agent Management Support for Mobility Specification

FIPA Agent Management Support for Mobility Specification 1 2 3 4 5 6 FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS FIPA Management Support for Mobility Specification 7 8 Document title FIPA Management Support for Mobility Specification Document number PC000087B

More information

This paper was presented at DVCon-Europe in November It received the conference Best Paper award based on audience voting.

This paper was presented at DVCon-Europe in November It received the conference Best Paper award based on audience voting. This paper was presented at DVCon-Europe in November 2015. It received the conference Best Paper award based on audience voting. It is a very slightly updated version of a paper that was presented at SNUG

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Categorizing Migrations

Categorizing Migrations What to Migrate? Categorizing Migrations A version control repository contains two distinct types of data. The first type of data is the actual content of the directories and files themselves which are

More information

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections UNIT V Introduction to Application Layer: Introduction, Client Server Programming, WWW and HTTP,FTP, e-mail, TELNET, Secure Shell, Domain Name System, SNMP. HTTP The Hyper Text Transfer Protocol (HTTP)

More information

What Is Service-Oriented Architecture

What Is Service-Oriented Architecture What Is Service-Oriented Architecture by Hao He September 30, 2003 "Things should be made as simple as possible, but no simpler." -- Albert Einstein Introduction Einstein made that famous statement many

More information

Topics in Object-Oriented Design Patterns

Topics in Object-Oriented Design Patterns Software design Topics in Object-Oriented Design Patterns Material mainly from the book Design Patterns by Erich Gamma, Richard Helm, Ralph Johnson and John Vlissides; slides originally by Spiros Mancoridis;

More information

Chapter 5 INTRODUCTION TO MOBILE AGENT

Chapter 5 INTRODUCTION TO MOBILE AGENT Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action

More information

Do these criteria apply to work in this course?

Do these criteria apply to work in this course? Bonus topic fo COMP 170 Program Quality Part 2: Review of Program readability Commentary Choosing data names Code layout Commentary Pitfalls Reading a program A program is not only something to be run

More information

10 TESTED LANDING PAGE ELEMENTS GUARANTEED TO IMPROVE CONVERSIONS

10 TESTED LANDING PAGE ELEMENTS GUARANTEED TO IMPROVE CONVERSIONS 10 TESTED LANDING PAGE ELEMENTS GUARANTEED TO IMPROVE CONVERSIONS CONTENTS 1. INTRODUCTION 2. WHAT IS A LANDING PAGE? 3. WHY IS A LANDING PAGE IMPORTANT? 5. THE 10 ESSENTIAL PAGE ELEMENTS 12. PUTTING IT

More information

MODELS OF DISTRIBUTED SYSTEMS

MODELS OF DISTRIBUTED SYSTEMS Distributed Systems Fö 2/3-1 Distributed Systems Fö 2/3-2 MODELS OF DISTRIBUTED SYSTEMS Basic Elements 1. Architectural Models 2. Interaction Models Resources in a distributed system are shared between

More information

FAQ: Database System Development Life Cycle

FAQ: Database System Development Life Cycle Question 1: Why study database management system (DBMS) designs? Answer 1: Understanding and designing databases is truly an evolutionary learning process. There is not a right way or a wrong way to develop

More information

Privacy & Cookie Statement

Privacy & Cookie Statement Privacy & Cookie Statement Version: 8 May 2018 Since day 1, WeTransfer has cared a great deal about privacy and respecting our users. We have always had a lean data policy: no sign up, no install, no retargeting.

More information

CIP Security Pull Model from the Implementation Standpoint

CIP Security Pull Model from the Implementation Standpoint CIP Security Pull Model from the Implementation Standpoint Jack Visoky Security Architect and Sr. Project Engineer Rockwell Automation Joakim Wiberg Team Manager Technology and Platforms HMS Industrial

More information

Lift Internal Revitalizing B2E Communication. LiftInternal.com

Lift Internal Revitalizing B2E Communication. LiftInternal.com Lift Internal Revitalizing B2E Communication LiftInternal.com Use this document to help you plan and execute B2E communication. Even if the topic seems simple, taking the time to think through the fundamentals

More information

Mobile Agent Paradigm in Computer Networks

Mobile Agent Paradigm in Computer Networks Mobile Agent Paradigm in Computer Networks Nguyen Hong Van DSV, Stockholm University, Forum 100, SE-164 40 Kista, Sweden Email: si-hvan@dsv.su.se ABSTRACT : Mobile agent technology has recently emerged

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo

Emergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

LEARN READ ON TO MORE ABOUT:

LEARN READ ON TO MORE ABOUT: For a complete picture of what s going on in your network, look beyond the network itself to correlate events in applications, databases, and middleware. READ ON TO LEARN MORE ABOUT: The larger and more

More information

Condor Local File System Sandbox Requirements Document

Condor Local File System Sandbox Requirements Document Condor Local File System Sandbox Requirements Document Requirements Document 1 1 Table of Contents 1 Table of Contents 2 2 Introduction 3 3 Describing the problem space 3 4 Defining the project's scope

More information

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy Que: -Proxy server Introduction: Proxy simply means acting on someone other s behalf. A Proxy acts on behalf of the client or user to provide access to a network service, and it shields each side from

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2)

JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2) JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2) Functional requirements and design specification for an ONIX-PL license expression drafting system 1. Introduction This document specifies a

More information

INTELLIGENT SYSTEMS OVER THE INTERNET

INTELLIGENT SYSTEMS OVER THE INTERNET INTELLIGENT SYSTEMS OVER THE INTERNET Web-Based Intelligent Systems Intelligent systems use a Web-based architecture and friendly user interface Web-based intelligent systems: Use the Web as a platform

More information

Best Practice for Creation and Maintenance of a SAS Infrastructure

Best Practice for Creation and Maintenance of a SAS Infrastructure Paper 2501-2015 Best Practice for Creation and Maintenance of a SAS Infrastructure Paul Thomas, ASUP Ltd. ABSTRACT The advantage of using metadata to control and maintain data and access to data on databases,

More information

CorreLog. Ping Monitor Adapter Software Users Manual

CorreLog. Ping Monitor Adapter Software Users Manual CorreLog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No part

More information

CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I

CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I CHAPTER CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I The basic topic of internal control was introduced in 3. These next two chapters discuss the implications of automating the accounting information

More information

Instance generation from meta-models (for model transformation testing)

Instance generation from meta-models (for model transformation testing) Instance generation from meta-models (for model transformation testing) Robbe De Jongh University of Antwerp Abstract Testing model transformations is a tedious job. One needs to make a representative

More information

CS5412: TRANSACTIONS (I)

CS5412: TRANSACTIONS (I) 1 CS5412: TRANSACTIONS (I) Lecture XVII Ken Birman Transactions 2 A widely used reliability technology, despite the BASE methodology we use in the first tier Goal for this week: in-depth examination of

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

Reference Requirements for Records and Documents Management

Reference Requirements for Records and Documents Management Reference Requirements for Records and Documents Management Ricardo Jorge Seno Martins ricardosenomartins@gmail.com Instituto Superior Técnico, Lisboa, Portugal May 2015 Abstract When information systems

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Design and Implementation of Cost Effective MIS for Universities

Design and Implementation of Cost Effective MIS for Universities Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Introduction Building and Using Databases for historical research December 2012

Introduction Building and Using Databases for historical research December 2012 1. Introduction This is a non-tutor led course that can be completed at your own pace and at a time of your own choosing. We strongly recommend that you complete each module and its component sections

More information

By default, the 9i instance will follow this sequence to determine its initialization parameters on most operating systems:

By default, the 9i instance will follow this sequence to determine its initialization parameters on most operating systems: ORACLE9I: KISS YOUR INIT.ORA GOODBYE! Dan Norris, norris@celeritas.com, Celeritas Technologies, LLC INTRODUCTION AND OVERVIEW Oracle9i has certainly changed the RDBMS world with all of its new features

More information

1: Introduction to Object (1)

1: Introduction to Object (1) 1: Introduction to Object (1) 김동원 2003.01.20 Overview (1) The progress of abstraction Smalltalk Class & Object Interface The hidden implementation Reusing the implementation Inheritance: Reusing the interface

More information

Measuring Broadband New Zealand

Measuring Broadband New Zealand Measuring Broadband New Zealand Initial findings report, 2018 In 2018, the Commerce Commission appointed SamKnows to measure New Zealand s internet performance. The programme, called Measuring Broadband

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems : Intermediate Course in Computer Systems Lecture 23: March 12, 2003 Challenges of Mobility Mobility is a huge topic Breaks existing applications Anything bandwidth intensive or synchronous Opportunities

More information

Prototyping the campus network

Prototyping the campus network Prototyping the campus network Designing and Supporting Computer Networks Chapter 7 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo

More information

SALVO-a fourth-generation language for personal computers

SALVO-a fourth-generation language for personal computers SALVO-a fourth-generation language for personal computers by MARVIN ELDER Software Automation, Inc. Dallas, Texas ABSTRACT Personal computer users are generally nontechnical people. Fourth-generation products

More information

White paper. Keys to Oracle application acceleration: advances in delivery systems.

White paper. Keys to Oracle application acceleration: advances in delivery systems. White paper Keys to Oracle application acceleration: advances in delivery systems. Table of contents The challenges of fast Oracle application delivery...3 Solving the acceleration challenge: why traditional

More information

Chapter 13. Architecture Overview

Chapter 13. Architecture Overview Chapter 13 Architecture Overview 199 200 Storage Networks: The Complete Reference In 1993, the largest data warehouse application supported only 50GB of aggregate data. Although this appears trivial by

More information

Distributed Systems COMP 212. Lecture 10 Othon Michail

Distributed Systems COMP 212. Lecture 10 Othon Michail Distributed Systems COMP 212 Lecture 10 Othon Michail RMI: Remote Method Invocation Allows an object running in one Java virtual machine to invoke methods on an object running in another Java virtual machine.

More information

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple APPGATE TECHNOLOGY UNIFIED TECHNOLOGY Introduction The AppGate solution truly delivers holistic security and access control where other approaches fall short. It is designed to address the security and

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

A tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents.

A tutorial report for SENG Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far. Mobile Agents. A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far Mobile Agents Samuel Lee Department of Electrical Engineering University of Calgary Abstract With

More information

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

shortcut Tap into learning NOW! Visit  for a complete list of Short Cuts. Your Short Cut to Knowledge shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically

More information

ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective

ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective Part II: Data Center Software Architecture: Topic 3: Programming Models Piccolo: Building Fast, Distributed Programs

More information

Web Hosting. Important features to consider

Web Hosting. Important features to consider Web Hosting Important features to consider Amount of Storage When choosing your web hosting, one of your primary concerns will obviously be How much data can I store? For most small and medium web sites,

More information

stir-certs-02 IETF 93 (Prague) STIR WG Jon

stir-certs-02 IETF 93 (Prague) STIR WG Jon stir-certs-02 IETF 93 (Prague) STIR WG Jon What we did since -01 Basic specification of the cert extension (TNAuthList) didn t change much here Cert scope may include one or more or many TNs Fleshed out

More information

Introduction to Domain Testing

Introduction to Domain Testing Introduction to Domain Testing Cem Kaner January, 2018 Copyright (c) 2018 Cem Kaner Domain Testing 1 What Is Domain Testing? The most widely taught technique for designing software tests Copyright (c)

More information

Introducing Collaboration to Single User Applications

Introducing Collaboration to Single User Applications Introducing Collaboration to Single User Applications Abstract Brian Cornell UNC Chapel Hill brian@cs.unc.edu Most research in collaborative systems has been based on designing an ideal system from ground

More information

ON ABANDONING XLISP-STAT 1. INTRODUCTION

ON ABANDONING XLISP-STAT 1. INTRODUCTION ON ABANDONING XLISP-STAT JAN DE LEEUW ABSTRACT. In 1998 the UCLA Department of Statistics, which had been one of the major users of LISP-STAT, and one of the main producers of LISP-STAT code, decided to

More information

Marketing Guide to Increase Sales

Marketing Guide to Increase Sales A STEP BY STEP Email Marketing Guide to Increase Sales Reach your target prospects and convert them into customers Email Marketing and Importance of Data Quality Email marketing is a type of direct marketing

More information

The Google SDN WAN An Open Networking Foundation Interview

The Google SDN WAN An Open Networking Foundation Interview The Google SDN WAN An Open Networking Foundation Interview How has this pioneering OpenFlow deployment shaped up over two years? Jim Wanderer, Director of Engineering, Platforms Networking, Google, gives

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

Introduction to Programming

Introduction to Programming CHAPTER 1 Introduction to Programming Begin at the beginning, and go on till you come to the end: then stop. This method of telling a story is as good today as it was when the King of Hearts prescribed

More information

Internet Security: Firewall

Internet Security: Firewall Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Newbie s Guide to AVR Interrupts

Newbie s Guide to AVR Interrupts Newbie s Guide to AVR Interrupts Dean Camera March 15, 2015 ********** Text Dean Camera, 2013. All rights reserved. This document may be freely distributed without payment to the author, provided that

More information

The Google File System

The Google File System The Google File System Sanjay Ghemawat, Howard Gobioff and Shun Tak Leung Google* Shivesh Kumar Sharma fl4164@wayne.edu Fall 2015 004395771 Overview Google file system is a scalable distributed file system

More information

SEMANTIC NETWORK AND SEARCH IN VEHICLE ENGINEERING

SEMANTIC NETWORK AND SEARCH IN VEHICLE ENGINEERING Martin Sturm, Sylke Rosenplaenter SEMANTIC NETWORK AND SEARCH IN VEHICLE ENGINEERING From Concept to Deployment Vehicle Design Operations & System Development GM Europe Engineering Adam Opel AG www.opel.com

More information

W is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation

W is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation W is a Firewall firewall = wall to protect against fire propagation Internet Security: Firewall More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits

More information

Load Balancing 101: Nuts and Bolts

Load Balancing 101: Nuts and Bolts Load Balancing 101: Nuts and Bolts Load balancing technology is the basis on which today s Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it

More information

Use this section to help you quickly locate a command.

Use this section to help you quickly locate a command. iii iv v Use this section to help you quickly locate a command. vi Use this list to help you locate examples you d like to try or look at. vii viii This document describes the various deployment, installation,

More information

TANDBERG Management Suite - Redundancy Configuration and Overview

TANDBERG Management Suite - Redundancy Configuration and Overview Management Suite - Redundancy Configuration and Overview TMS Software version 11.7 TANDBERG D50396 Rev 2.1.1 This document is not to be reproduced in whole or in part without the permission in writing

More information

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved. Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now

More information

Comprehensive Guide to Evaluating Event Stream Processing Engines

Comprehensive Guide to Evaluating Event Stream Processing Engines Comprehensive Guide to Evaluating Event Stream Processing Engines i Copyright 2006 Coral8, Inc. All rights reserved worldwide. Worldwide Headquarters: Coral8, Inc. 82 Pioneer Way, Suite 106 Mountain View,

More information

Timber Products Inspection, Inc.

Timber Products Inspection, Inc. Timber Products Inspection, Inc. Product Certification Public Document Timber Products Inspection, Inc. P.O. Box 919 Conyers, GA 30012 Phone: (770) 922-8000 Fax: (770) 922-1290 TP Product Certification

More information

CPU offloading using SoC fabric Avnet Silica & Enclustra Seminar Getting started with Xilinx Zynq SoC Fribourg, April 26, 2017

CPU offloading using SoC fabric Avnet Silica & Enclustra Seminar Getting started with Xilinx Zynq SoC Fribourg, April 26, 2017 1 2 3 Introduction The next few slides give a short introduction of what CPU offloading is and how it can help improving system performance. 4 What is Offloading? Offloading means taking load from one

More information

Where Did My Data Go?

Where Did My Data Go? Where Did My Data Go? ODS / BANNER DATA LOCATIONS A Guide to locating data for those preparing reports whose data now resides in Banner data tables. Revised 12/17/08 Contents Page ii Contents Overview...3

More information

File Size Distribution on UNIX Systems Then and Now

File Size Distribution on UNIX Systems Then and Now File Size Distribution on UNIX Systems Then and Now Andrew S. Tanenbaum, Jorrit N. Herder*, Herbert Bos Dept. of Computer Science Vrije Universiteit Amsterdam, The Netherlands {ast@cs.vu.nl, jnherder@cs.vu.nl,

More information

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 IP Addressing and Subnetting: Establishing Elementary Networks using Hubs, Switches and Routers. Objectives:

More information

Software Interface Analysis Tool (SIAT) Architecture Definition Document (NASA Center Initiative)

Software Interface Analysis Tool (SIAT) Architecture Definition Document (NASA Center Initiative) Software Interface Analysis Tool (SIAT) Architecture Definition Document (NASA Center Initiative) DID 06 Contract NAS2-96024 December 30, 1997 Prepared for: NASA Ames Research Center Moffett Field, CA

More information

Usability Report Cover Sheet

Usability Report Cover Sheet Usability Report Cover Sheet Project Overall Project: MLibrary Website Project Title: Search/Browse Card Sort Committee & Members Usability Group: Suzanne Chapman (chair), Shevon Desai, Kat Hagedorn, Julie

More information

Last, with this edition, you can view and download the complete source for all examples at

Last, with this edition, you can view and download the complete source for all examples at PREFACE hat could be more exciting than learning the cool subfile concepts and techniques provided in the first edition of this book? Learning more in this new edition, of course! Actually, subfile concepts

More information

3 ITS Standards Deployment and Testing Strategies

3 ITS Standards Deployment and Testing Strategies 3 ITS Standards Deployment and Testing Strategies In chapter 2, this report reviewed some of the ITS deployments shaping the application of ITS Standards in New York State. These projects, and others,

More information

NetBeans IDE Field Guide

NetBeans IDE Field Guide NetBeans IDE Field Guide Copyright 2004 Sun Microsystems, Inc. All rights reserved. Debugging Java Applications Table of Contents Starting a Debugging Session...2 Debugger Windows...3 Attaching the Debugger

More information

Cabrillo College. Route Optimization Part II

Cabrillo College. Route Optimization Part II Cabrillo College CCNP Advanced Routing Ch. 7 Route Optimization Part II Rick Graziani, Instructor Originally created by Mark McGregor with modifications and additions by Rick Graziani November 1, 2001

More information

Decentralised Social Filtering based on Trust

Decentralised Social Filtering based on Trust Decentralised Social Filtering based on Trust From: AAAI Technical Report WS-98-08. Compilation copyright 1998, AAAI (www.aaai.org). All rights reserved. Tomas Olsson Swedish Institute of Computer Science

More information

Database Optimization

Database Optimization Database Optimization June 9 2009 A brief overview of database optimization techniques for the database developer. Database optimization techniques include RDBMS query execution strategies, cost estimation,

More information

Search Engine Optimisation Basics for Government Agencies

Search Engine Optimisation Basics for Government Agencies Search Engine Optimisation Basics for Government Agencies Prepared for State Services Commission by Catalyst IT Neil Bertram May 11, 2007 Abstract This document is intended as a guide for New Zealand government

More information

CLOUND COMPUTING II STUDY NOTES. Unit 1. Introduction to Cloud Computing

CLOUND COMPUTING II STUDY NOTES. Unit 1. Introduction to Cloud Computing CLOUND COMPUTING II STUDY NOTES Introduction to Cloud Computing Unit 1 Cloud computing will change the way you use your computer and the Internet. Instead of running programs and data on an individual

More information

Summer Student Project Report

Summer Student Project Report Summer Student Project Report Steffen Pade September 6, 2013 Abstract During my summer project here at CERN I was able to work with a - to me - completely new database technology: Oracle s 12c. My task

More information

Data Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security

Data Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security T rusted Application Trusted System Trusted Network Physical Security System T echnology Data Warehouse P roject Filetransfer Access right just on the data transfer directories Mailbox L oadprocess Data

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

Build Your Zero Trust Security Strategy With Microsegmentation

Build Your Zero Trust Security Strategy With Microsegmentation Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver

More information

How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications

How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications White Paper Reflection Desktop for X How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications White Paper How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications

More information

Performance and Sizing Guide

Performance and Sizing Guide Performance and Sizing Guide Trend Micro PortalProtect for Microsoft SharePoint 2010 Trend Micro Internal Use Only ENTERPRISE TECHNICAL SALES SERVICES Trend Micro Sizing Guide PortalProtect 2.1 Table of

More information

Chapter 5: Networking and the Internet

Chapter 5: Networking and the Internet Chapter 5: Networking and the Internet (Completion Time: 3 weeks) Topics: Internet Basics An overview of how the internet works and how we as users interact with it. This topic can also be used as sort

More information

Learn to develop.net applications and master related technologies.

Learn to develop.net applications and master related technologies. Courses Software Development Learn to develop.net applications and master related technologies. Software Development with Design These courses offer a great combination of both.net programming using Visual

More information

Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi.

Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi. Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 18 Tries Today we are going to be talking about another data

More information

IBM. OA VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) z/os Communications Server

IBM. OA VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) z/os Communications Server z/os Communications Server IBM OA49911 - VTAM 3270 Intrusion Detection Services - Overview, Considerations, and Assessment (Prerequisite) Version 2 Release 2 Note: Links to related publications are from

More information

ELEVATESEO. INTERNET TRAFFIC SALES TEAM PRODUCT INFOSHEETS. JUNE V1.0 WEBSITE RANKING STATS. Internet Traffic

ELEVATESEO. INTERNET TRAFFIC SALES TEAM PRODUCT INFOSHEETS. JUNE V1.0 WEBSITE RANKING STATS. Internet Traffic SALES TEAM PRODUCT INFOSHEETS. JUNE 2017. V1.0 1 INTERNET TRAFFIC Internet Traffic Most of your internet traffic will be provided from the major search engines. Social Media services and other referring

More information

Recording end-users security events: A step towards increasing usability

Recording end-users security events: A step towards increasing usability Section 1 Network Systems Engineering Recording end-users security events: A step towards increasing usability Abstract D.Chatziapostolou and S.M.Furnell Network Research Group, University of Plymouth,

More information