Mobile Application Support

Size: px
Start display at page:

Download "Mobile Application Support"

Transcription

1 Mobile Application Support 1

2 Problems and Requirements Problem fields: dynamic system and network configuration dynamic change of Quality-of-Service-properties decoupling/re-connection transparency of resource access security aspects Requirements: connection monitoring and selection treatment of decoupling and migration; emulation of services configuration update localization of mobile servers and clients advanced security and transaction services 2

3 Message Queuing: MQ Series example dynamic coupling between applications and local Queues via logon/logoff; therefore suited for mobile scenarios Basis: Messages, Queues with Queue Manager use of Queues for transmission or receiving; also mixed use is possible coupling of distributed Queue Managers via Message Channels Internet Gateway, C++- and Java-Support support of essential operating system platforms 3

4 Example scenario Computer A Computer B MQGET Queue Manager Queue Manager MQPUT Application 1 MQPUT Queue Manager Message Channel Queue Manager MQGET Application 2 decoupling of application by Queue Manager: Message forwarding is possible even if application is not running 4

5 N:M - communication Access to Server via multiple Clients Load balancing (selective delivery) or Parallel processing (replicated delivery) C A D B Queue, with optional support of message priorities E 5

6 Message Queuing: Assessment Advantages + simple manageability + robust message delivery + flexible application fields (for instance load balancing, parallelization, batch-transmission of branch data etc.) + relevant for loose coupling of programs, for instance via Internet, or for Mobile Computing Disadvantages limited communication semantics interaction model is different than with procedures/method invocations limited accessibility of higher services mainly proprietary solutions up to now, only step-by-step standardization 6

7 Mobile Application Architectures Ethernet Ethernet Distributed Database DB Firm E-Fax-Order E-Fax-Order Branch office xdsl Application Resource GSM Cache Management Management DB-Access DB-Access Ethernet Mobile Station Communication path Distributed Database Client X 7

8 Domain-concept 8

9 Main functionality: Domain and Station Manager Domain Manager: management of all global objects (users, global available resources, stations, network topology) Station Manager: management of all local objects of a station (network access, current applications etc.) 9

10 Architecture of Station Manager Application Subsystem (Application Programming Interface) Subsystem (System Calls) Location Service Registry Service Active Database Resource Broker Bandwidth and Cost Management Service Application Data Mobilizer and Manager Authentication and Encryption Service Disconnected Operation Handling Service 10

11 Mobile Multimedia message User Agent transfer protocol Subsystem Queuing Service protocol Queuing Service protocol Proxy Message Store message transfer Mobile Enhanced Message Handling System 11

12 Mobile Multimedia selection of quality parameters 12

13 Mobile end-devices / players / products receiving of s via mobile phones and PDAs account maintenance synchronization with desktop office applications approaches: mobile - software on the mobile phones and PDAs Mail Services (Mail access via proxies) handwritten s on the PDAs multiple end-devices and providers of mobile Palm One (USA) PDA with Palm OS (handhelds) / different Clients (Snapper Mail, Versa Mail, Eudora etc.) Nokia (Finland) Nokia One / Nokia Access Mobilizer / Mobile Business Devices Nextel (USA) mobile BlackBerry PDAs / Client T-Mobile mobile with various kinds of configuration software 13

14 Mobile phone, configured for mobile mobile phone must be equipped with an Client: Client controls data exchange of the mobile phone with an server features: en-route fetching of important s use of account on the mobile phone configuration software supports for different models of mobile phones for different providers (WEB.de, GMX.de, yahoo.com ) device- and provider-specific personalization 14

15 PDAs: end-devices for mobile and office applications Palm: Handhelds Palm, Zire, Tungsten Smartphones Treo BlackBerry: Nextel: Handhelds BlackBerry 15

16 PDA-Functionality PDA combines the convenience of constant access to , a cell phone, and a personal organizer consists of wireless capabilities data-enabled phone modem Office applications, available via PDA: Calendar Address Book Memo Pad Task List Calculator USB-Interface: simple loading of desktop software under Windows onto a PC and vice versa synchronization with a PC via the following programs: MS Outlook ASCII Text File Importer/Exporter MS Schedule IBM Lotus Notes IBM Notes Organizer etc. PDA market leaders in areas such as m-business, -healthcare, - education and -government PalmOne BlackBerry Nokia 16

17 PDA-products for Mobile consist of: PDA , e.g. for palm computing platform PDA Web Browser PDA Mail Conduit (synchronization software for desktop applications) features: support of POP3, APOP, SMTP-AUTH, SSL, HTML rendering with URLs and Phone Number Linking PDA and PDA Web Browser support SSL (Secure Socket Layer) and TLS (Transport Layer Security): end-to-end security synchronization of Bookmarks/ Addresses between PC Web Browser and PDA Web Browser via PDA Web Conduit synchronization with PC- applications multiple accounts are possible (IMAP) below: some examples of products (for instance, Snapper Mail, VersaMail, Eudora etc.) with screen dumps 17

18 Mobile SnapperMail popular solution for smartphone/pda supports POP3, APOP, SMTP- AUTH, SSL, HTML rendering with URL and phone number linking unlimited accounts and message size, automatic mail fetching with alerts attachment support via full memory card file browsers handling applications (ZIP, JPEG) for attachments handwritten note-taking software 18

19 Mobile VersaMail based on MultiMailPro (by Palm Inc.) supports POP3, APOP, IMAP4, SMTP-AUTH filters and attachments possible synchronization with Windows or Mac desktops automatic mail fetching with alerts HTML rendering access to SSL mail servers under Palm OS 19

20 Mobile Eudora attachment support integration with a browser Conduit Software for synchronization of with desktop core POP3 client supports SSL, HTML rendering filtering capabilities synchronisation 20

21 Handwritten Mail Messages Viewing and writing of handwritten and typed [via keyboard] messages on PDA Products: BugMe Messenger: relaying of handwritten, text or graphic notes to desktop and web-based mail applications Rit vector based writing engine aided sketching, automatic shaping for handwritten character/ geometrical symbols relaying of handwritten messages to desktop 21

22 PDA: mobile VPN-Clients PDA can also communicate via secure VPN-tunnel secure connection to a private network via different protocols vendors of VPN-software for PDAs: Certicom, SafeNet, Mergic Requirements to PDAs: Palm OS available memory: approx KByte used protocols PPTP: Point-to-Point Tunneling Protocol (MS proprietary, Windows) L2TP: Layer 2 Tunneling Protocol powered with IPSec IPSec: Secure Internet Protocol Products: major players: 3Com, Alcatel, Cisco Intel, Lucent, NortelNetworks FreeBSD, Linux, Windows 22

23 Mobile Agents Agent is an independent program; it consists of data, code and execution state, and works in the interest and on the order of a third party (e.g. user, application). An agent-system consists of the agents themselves and an execution engine that offers basic services to the agents. place 5 place 4 Place 1 Operating System Hardware Network Place 3 Operating system Hardware OS Hardware 23

24 Agent model Client create Agent code, data, state migration Serverinterface Client result Agent code, data, state Serverinterface migration: transfer of code, data, state local interactions with server transfer of the result 24

25 Properties of mobile agents Advantages: + reduction of network load + autonomy and asynchronity + dynamic adaptation according to environment + heterogeneity + robustness and fault tolerance + scalability + personalization and individualization + dynamic code installation + encapsulation of protocols Disadvantages: special execution engine required (Middleware) high security requirements transfer of code, data, state Decision: migration vs. remote communication 25

26 Application Areas and Systems Mobile computing E-commerce (e.g. search for appropriate offers) Database requests and Web search Office applications/workflow; load balancing Traffic telematics However, in general not suited towards security-critical business transactions, but rather for read-only queries Platforms and standards (examples): JADE (Java Agent Development Framework) open source platform FIPA (Foundation for Intelligent Physical Agents) 26

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction

More information

DS 2009: middleware. David Evans

DS 2009: middleware. David Evans DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between

More information

3C05 - Advanced Software Engineering Thursday, April 29, 2004

3C05 - Advanced Software Engineering Thursday, April 29, 2004 Distributed Software Architecture Using Middleware Avtar Raikmo Overview Middleware What is middleware? Why do we need middleware? Types of middleware Distributed Software Architecture Business Object

More information

Virtual Private Networks.

Virtual Private Networks. Virtual Private Networks thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Virtual Private Networks VPN Basics Protocols (IPSec, PPTP, L2TP) Objectives of VPNs Earlier Companies

More information

RoadSync Java MIDP 2.0 Manual

RoadSync Java MIDP 2.0 Manual RoadSync Java MIDP 2.0 Manual Table of Contents General Product Information What is RoadSync (Exchange ActiveSync )... 4 Advantages for Companies and IT Administrators... 4 Key Product Features... 5 System

More information

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version: Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

Chapter 4 Communication

Chapter 4 Communication DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

The Collaboration Cornerstone

The Collaboration Cornerstone E-Mail: The Collaboration Cornerstone On Demand Insurance Business Problems 1. We lose customers because we process new policy applications too slowly. 2. Our claims processing is time-consuming and inefficient.

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University http://alainmaterials.webs.com/

More information

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive

Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive security suite of firewall, VPN, URL content filtering

More information

Clientless SSL VPN End User Set-up

Clientless SSL VPN End User Set-up 71 CHAPTER This section is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also

More information

Introduction to 9.0. White Paper. Sync and Surf FirstClass Support for Mobile Users. November Powering collaborative online communities.

Introduction to 9.0. White Paper. Sync and Surf FirstClass Support for Mobile Users. November Powering collaborative online communities. Introduction to 9.0 White Paper Sync and Surf FirstClass Support for Mobile Users November 2007 Powering collaborative online communities. FirstClass Support for Mobile Users The widespread availability

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

TABLE OF CONTENTS 1. INTRODUCTION DEFINITIONS Error! Bookmark not defined REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4.

TABLE OF CONTENTS 1. INTRODUCTION DEFINITIONS Error! Bookmark not defined REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4. TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 DEFINITIONS Error! Bookmark not defined. - 2 2. REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4. OVERVIEW 2-3 5. HARDWARE ARCHITECTURE 3 6. SUPPORTED CONFIGURATIONS

More information

End User Device Strategy: Interoperability Standards

End User Device Strategy: Interoperability Standards End User Device Strategy: Interoperability Standards This document defines the target architecture for cross government interoperability standards and interfaces between a government End User Device and

More information

Communication. Overview

Communication. Overview Communication Chapter 2 1 Overview Layered protocols Remote procedure call Remote object invocation Message-oriented communication Stream-oriented communication 2 Layered protocols Low-level layers Transport

More information

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

Using Mobile Computers Lesson 12

Using Mobile Computers Lesson 12 Using Mobile Computers Lesson 12 Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data Use BitLocker Drive Encryption Use remote network connections

More information

Network. Arcstar Universal One

Network. Arcstar Universal One Network Universal One ARCSTAR UNIVERSAL ONE Universal One Enterprise Network NTT Communications' Universal One is a highly reliable, premium-quality network service, delivered and operated in more than

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is

More information

Chapter 2 System Models

Chapter 2 System Models CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical

More information

WAP/ WML : Wireless Protocol wireless protocol

WAP/ WML : Wireless Protocol wireless protocol Device Connectivity Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity

More information

ThinAir Server Platform White Paper June 2000

ThinAir Server Platform White Paper June 2000 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part

More information

May Gerd Liefländer System Architecture Group Universität Karlsruhe (TH), System Architecture Group

May Gerd Liefländer System Architecture Group Universität Karlsruhe (TH), System Architecture Group Distributed Systems 6 RMI/MP IPC May-18-2009 Gerd Liefländer System Architecture Group 1 Intended Schedule of Today RMI (only rough overview) Message Passing Motivation Bridge Principle Message Passing

More information

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.

More information

BlackBerry 101: An Introduction to the BlackBerry Wireless Solution

BlackBerry 101: An Introduction to the BlackBerry Wireless Solution BlackBerry 101: An Introduction to the BlackBerry Wireless Solution BlackBerry 101 Agenda What is the BlackBerry Enterprise Solution? Tracing a Message Security, Security, Security Enabling the User Extensibility:

More information

CHAPTER 2. Introduction to Middleware Technologies

CHAPTER 2. Introduction to Middleware Technologies CHAPTER 2. Introduction to Middleware Technologies What is Middleware? General Middleware Service Specific Middleware Client/Server Building blocks RPC Messaging Peer to Peer Java RMI. BHUSHAN JADHAV 1

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

Network+ Guide to Networks 6 th Edition

Network+ Guide to Networks 6 th Edition Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

SSL VPN Virtual Private Networks based on Secure Socket Layer

SSL VPN Virtual Private Networks based on Secure Socket Layer SSL VPN Virtual Private Networks based on Secure Socket Layer Mario Baldi Politecnico di Torino (Technical Univesity of Turin) http://staff.polito.it/mario.baldi SSL VPN: What is that? SSL as the central

More information

MOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)

MOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology) Code No: R41054 R10 Set No. 1 1 a) Explain functional architecture of GSM. [8] b) Write and explain novel applications of Mobile Computing. [7] 2 a) Explain in detail about IEEE 802.11 MAC Data frames.

More information

Clientless SSL VPN Overview

Clientless SSL VPN Overview Introduction to Clientless SSL VPN, page 1 Prerequisites for Clientless SSL VPN, page 2 Guidelines and Limitations for Clientless SSL VPN, page 2 Licensing for Clientless SSL VPN, page 3 Introduction to

More information

IBM Lotus Expeditor 6.2 Server MQ Everyplace Overview

IBM Lotus Expeditor 6.2 Server MQ Everyplace Overview IBM Lotus Expeditor 6.2 Server MQ Everyplace Overview WebSphere MQ Messaging Assured message delivery Level of assuredness may be lowered to improve performance Non-duplication of messages Application

More information

Chapter 18 Distributed Systems and Web Services

Chapter 18 Distributed Systems and Web Services Chapter 18 Distributed Systems and Web Services Outline 18.1 Introduction 18.2 Distributed File Systems 18.2.1 Distributed File System Concepts 18.2.2 Network File System (NFS) 18.2.3 Andrew File System

More information

Clientless SSL VPN Remote Users

Clientless SSL VPN Remote Users This chapter summarizes configuration requirements and tasks for the user remote system. It also helps users get started with Clientless SSL VPN. It includes the following sections: Make sure that the

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

E3-E4 CM TECHNICAL IT INFRASTRUCTURE

E3-E4 CM TECHNICAL IT INFRASTRUCTURE E3-E4 CM TECHNICAL IT INFRASTRUCTURE WELCOME This is a presentation for the E3-E4 CM Technical Module for the Topic: IT Infrastructure. Eligibility: Those who have got the Up-gradation from E3 to E4. This

More information

Client Server & Distributed System. A Basic Introduction

Client Server & Distributed System. A Basic Introduction Client Server & Distributed System A Basic Introduction 1 Client Server Architecture A network architecture in which each computer or process on the network is either a client or a server. Source: http://webopedia.lycos.com

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is

More information

A Technical Overview of the Lucent Managed Firewall

A Technical Overview of the Lucent Managed Firewall Lucent Managed Version 2.0 A Technical Overview of the Lucent Managed This document provides a technical overview of the Lucent Managed architecture. Key technical features and potential application scenarios

More information

Personal Digital Assistant (PDA) Market Opportunities, Strategies, and Forecasts, 2004 to Personal Digital Assistant (PDA)

Personal Digital Assistant (PDA) Market Opportunities, Strategies, and Forecasts, 2004 to Personal Digital Assistant (PDA) Personal Digital Assistant (PDA) Market Opportunities, Strategies, and Forecasts, 2004 to 2009 Personal Digital Assistant (PDA) Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY WinterGreen Research, Inc.

More information

Double-clicking an entry opens a new window with detailed information about the selected VPN tunnel.

Double-clicking an entry opens a new window with detailed information about the selected VPN tunnel. The Barracuda NextGen Admin VPN tab provides information on all VPN connections that are configured on the Barracuda NextGen Firewall F-Series. Selecting the icons in the ribbon bar under the VPN tab takes

More information

Concepts of Distributed Systems 2006/2007

Concepts of Distributed Systems 2006/2007 Concepts of Distributed Systems 2006/2007 Introduction & overview Johan Lukkien 1 Introduction & overview Communication Distributed OS & Processes Synchronization Security Consistency & replication Programme

More information

Communication. Distributed Systems Santa Clara University 2016

Communication. Distributed Systems Santa Clara University 2016 Communication Distributed Systems Santa Clara University 2016 Protocol Stack Each layer has its own protocol Can make changes at one layer without changing layers above or below Use well defined interfaces

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Distributed Information Processing

Distributed Information Processing Distributed Information Processing 1 st Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2017 Eom, Hyeonsang All Rights Reserved Outline

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]

More information

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web. CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web

More information

UiB 1. april 04. Sun Microsystems

UiB 1. april 04. Sun Microsystems UiB 1. april 04 hans.bue@sun.com Sun Microsystems Agenda Java Desktop System (JDS) StarOffice / OpenOffice Videre utvikling Java Enterprise System (JES) Konsept for fremtidens desktop 2 JDS Java Desktop

More information

CHAPTER 03: MULTIMEDIA & OPERATING SYSTEM. :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~

CHAPTER 03: MULTIMEDIA & OPERATING SYSTEM. :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~ CHAPTER 03: MULTIMEDIA & OPERATING SYSTEM :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~ 1 Operating System and Software Computer Operating System An operating

More information

VPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities

VPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities Product Highlights Comprehensive Management Solution Advanced features such as WAN failover, load balancing, and integrated firewall help make this a reliable, secure, and flexible way to manage your network.

More information

User Guide. for the VersaMail. application

User Guide. for the VersaMail. application User Guide for the VersaMail application Copyright and Trademark 2004-2007 Palm, Inc. All rights reserved. Palm, HotSync, the HotSync logo, Palm OS, the Palm logo, and VersaMail are among the trademarks

More information

Introduction. Distributed Systems IT332

Introduction. Distributed Systems IT332 Introduction Distributed Systems IT332 2 Outline Definition of A Distributed System Goals of Distributed Systems Types of Distributed Systems 3 Definition of A Distributed System A distributed systems

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls

More information

COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied, photocopied, reproduced, translated, or reduced to any

COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied, photocopied, reproduced, translated, or reduced to any COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form, in whole

More information

TECHNICAL HELP: PRESS * 0

TECHNICAL HELP: PRESS * 0 28-NOV- 2001 1 Oracle Corporation 9i Series iseminar: Presenters: Taesang Choi Eun Heo YunSeok Choi Fukiat Julnual Wednesday, November 28, 2001 28-NOV- 2001 2 think fast. think simple. think smart. 28-NOV-

More information

User s Manual for 3JTech s Infrared Modem with palmone PDAs

User s Manual for 3JTech s Infrared Modem with palmone PDAs User s Manual for 3JTech s Infrared Modem with palmone PDAs Users Manual User's Manual for 3JTech's Infrared Modem with palmone PDAs Users Manual: 1.1 Date: May 21, 2004 3JTech Co., Ltd. 342 Fu-Hsing N.

More information

Top Reasons to Upgrade

Top Reasons to Upgrade version 5.0 Top Reasons to Upgrade With the latest release of the BlackBerry Enterprise Server software, your organization gains new administrative features, built-in high availability to maximize system

More information

Why MCL-Client. Visualize multimodal mobile worker applications. Realize MCL-Client. Visualize Mobilize Realize MCL-Collection

Why MCL-Client. Visualize multimodal mobile worker applications. Realize MCL-Client.   Visualize Mobilize Realize MCL-Collection Visualize Mobilize Realize MCL-Collection Why MCL-Client Visualize multimodal mobile worker applications Realize MCL-Client Why MCL-Client Organizations throughout the world choose MCL-Collection for its

More information

1. Introduction Firewall contains SPI technique against intrusions, attacks and DOS

1. Introduction Firewall contains SPI technique against intrusions, attacks and DOS Trouble Shooting Guide of Vigor2900 series Broadband Security Router 1. Introduction Firewall contains SPI technique against intrusions, attacks and DOS VPN encryption enhances transmission privacy and

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Today CSCI Remote Method Invocation (RMI) Distributed Objects

Today CSCI Remote Method Invocation (RMI) Distributed Objects Today CSCI 5105 Remote Method Invocation (RMI) Message-oriented communication Stream-oriented communication Instructor: Abhishek Chandra 2 Remote Method Invocation (RMI) RPCs applied to distributed objects

More information

Cisco Vpn Client User Guide For Windows Chapter 2

Cisco Vpn Client User Guide For Windows Chapter 2 Cisco Vpn Client User Guide For Windows Chapter 2 Port Used by AnyConnect and the Legacy VPN Client 32. CHAPTER 2 Step 7 Click Edit and choose User Configuration _ Windows Settings _ Internet. Downloads:

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

PeopleSoft Internet Architecture

PeopleSoft Internet Architecture PeopleSoft Internet Architecture AN OPEN ARCHITECTURE FOR INTERNET ACCESS AND INTEGRATION 3 ( 2 3 / (6 2 ) 7 Ã3 2 6, 7, 2 1 Ã3 $ 3 ( 5 - $ 1 8 $ 5 < Ã 3 (23/(6 2)7Ã, 17(51(7Ã$ 5&+,7(&785( - $18$5

More information

_guide.book Page 1 Thursday, September 7, :58 PM Setting Up on Your Sprint International Smart Device IP-830w by Samsung

_guide.book Page 1 Thursday, September 7, :58 PM Setting Up  on Your Sprint International Smart Device IP-830w by Samsung email_guide.book Page 1 Thursday, September 7, 2006 2:58 PM Setting Up Email on Your Sprint International Smart Device IP-830w by Samsung www.sprint.com 2006 Sprint Nextel. All rights reserved. SPRINT,

More information

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet

More information

MDaemon Vs. IceWarp Unified Communications Server

MDaemon Vs. IceWarp Unified Communications Server Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS

More information

Distribution and Integration Technologies

Distribution and Integration Technologies Distribution and Integration Technologies Distributed Architectures Patterns and Styles 1 Distributed applications infrastructure ISP intranet wireless backbone desktop computer: server: laptops: tablets:

More information

Introducing Cisco Unified MeetingPlace Web Conferencing

Introducing Cisco Unified MeetingPlace Web Conferencing CHAPTER 1 Introducing Cisco Unified MeetingPlace Web Conferencing This chapter contains the following sections: About Cisco Unified MeetingPlace, page 1-1 About Cisco Unified MeetingPlace Web Conferencing,

More information

Busting the top 5 myths of cloud-based authentication

Busting the top 5 myths of cloud-based authentication Busting the top 5 myths of cloud-based authentication Insert Your Name Jason Hart CISSP CISM Vice President, Cloud Solutions SafeNet, Inc. Insert Your Title Insert Date Overview Cloud benefits Agility

More information

Mobile Platforms and Middleware

Mobile Platforms and Middleware Department of Computer Science Institute for System Architecture, Chair for Computer Networks Mobile Platforms and Middleware Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de

More information

Mobile Internet Devices and the Cloud

Mobile Internet Devices and the Cloud Mobile Internet Devices and the Cloud What Is a Smartphone? Mobile Operating Systems for Smartphones 1. iphone 2. Google (Android) 3. Blackberry 4. Windows Mobile 5. Ubuntu Mobile Internet Device (MID)

More information

Internet. Class-In charge: S.Sasirekha

Internet. Class-In charge: S.Sasirekha Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems

More information

Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan.

Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan. Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan Reading List Remote Object Invocation -- Tanenbaum Chapter 2.3 CORBA

More information

Setting Up Your Handheld and Your Computer

Setting Up Your Handheld and Your Computer Setting Up Your Handheld and Your Computer In this chapter What s in the box? System requirements Step 1: Charging your handheld Step 2: Turning on your handheld for the first time Step 3: Installing your

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any

More information

MDaemon Vs. Microsoft Exchange Server 2016 Standard

MDaemon Vs. Microsoft Exchange Server 2016 Standard Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS

More information

Review for Internet Introduction

Review for Internet Introduction Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of

More information

Set Up with Microsoft Outlook 2013 using POP3

Set Up  with Microsoft Outlook 2013 using POP3 Page 1 of 14 Help Center Set Up E-mail with Microsoft Outlook 2013 using POP3 Learn how to configure Microsoft Outlook 2013 for use with your 1&1 e-mail account using the POP3 Protocol. Before you begin,

More information

Blackberry Technology

Blackberry Technology A Seminar report on Blackberry Technology Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED

More information

Cisco Group Encrypted Transport VPN

Cisco Group Encrypted Transport VPN Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that

More information

The Applications and Gaming Tab - Port Range Forward

The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized

More information

Distributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that:

Distributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that: Distributed Systems Overview Distributed Systems September 2002 1 Distributed System: Definition A distributed system is a piece of software that ensures that: A collection of independent computers that

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

FirstClass Core Features

FirstClass Core Features FirstClass Core Features Cross Platform 6 7 7.1 8.0 Linux (Client) Windows 2003 Server (Server) Mac OS X (Client) Macintosh OS X (Server) Mac OS (Client) Windows 95/98/2000/XP (Client) Windows 2000 (Server)

More information