Mobile Application Support
|
|
- Myra Lambert
- 6 years ago
- Views:
Transcription
1 Mobile Application Support 1
2 Problems and Requirements Problem fields: dynamic system and network configuration dynamic change of Quality-of-Service-properties decoupling/re-connection transparency of resource access security aspects Requirements: connection monitoring and selection treatment of decoupling and migration; emulation of services configuration update localization of mobile servers and clients advanced security and transaction services 2
3 Message Queuing: MQ Series example dynamic coupling between applications and local Queues via logon/logoff; therefore suited for mobile scenarios Basis: Messages, Queues with Queue Manager use of Queues for transmission or receiving; also mixed use is possible coupling of distributed Queue Managers via Message Channels Internet Gateway, C++- and Java-Support support of essential operating system platforms 3
4 Example scenario Computer A Computer B MQGET Queue Manager Queue Manager MQPUT Application 1 MQPUT Queue Manager Message Channel Queue Manager MQGET Application 2 decoupling of application by Queue Manager: Message forwarding is possible even if application is not running 4
5 N:M - communication Access to Server via multiple Clients Load balancing (selective delivery) or Parallel processing (replicated delivery) C A D B Queue, with optional support of message priorities E 5
6 Message Queuing: Assessment Advantages + simple manageability + robust message delivery + flexible application fields (for instance load balancing, parallelization, batch-transmission of branch data etc.) + relevant for loose coupling of programs, for instance via Internet, or for Mobile Computing Disadvantages limited communication semantics interaction model is different than with procedures/method invocations limited accessibility of higher services mainly proprietary solutions up to now, only step-by-step standardization 6
7 Mobile Application Architectures Ethernet Ethernet Distributed Database DB Firm E-Fax-Order E-Fax-Order Branch office xdsl Application Resource GSM Cache Management Management DB-Access DB-Access Ethernet Mobile Station Communication path Distributed Database Client X 7
8 Domain-concept 8
9 Main functionality: Domain and Station Manager Domain Manager: management of all global objects (users, global available resources, stations, network topology) Station Manager: management of all local objects of a station (network access, current applications etc.) 9
10 Architecture of Station Manager Application Subsystem (Application Programming Interface) Subsystem (System Calls) Location Service Registry Service Active Database Resource Broker Bandwidth and Cost Management Service Application Data Mobilizer and Manager Authentication and Encryption Service Disconnected Operation Handling Service 10
11 Mobile Multimedia message User Agent transfer protocol Subsystem Queuing Service protocol Queuing Service protocol Proxy Message Store message transfer Mobile Enhanced Message Handling System 11
12 Mobile Multimedia selection of quality parameters 12
13 Mobile end-devices / players / products receiving of s via mobile phones and PDAs account maintenance synchronization with desktop office applications approaches: mobile - software on the mobile phones and PDAs Mail Services (Mail access via proxies) handwritten s on the PDAs multiple end-devices and providers of mobile Palm One (USA) PDA with Palm OS (handhelds) / different Clients (Snapper Mail, Versa Mail, Eudora etc.) Nokia (Finland) Nokia One / Nokia Access Mobilizer / Mobile Business Devices Nextel (USA) mobile BlackBerry PDAs / Client T-Mobile mobile with various kinds of configuration software 13
14 Mobile phone, configured for mobile mobile phone must be equipped with an Client: Client controls data exchange of the mobile phone with an server features: en-route fetching of important s use of account on the mobile phone configuration software supports for different models of mobile phones for different providers (WEB.de, GMX.de, yahoo.com ) device- and provider-specific personalization 14
15 PDAs: end-devices for mobile and office applications Palm: Handhelds Palm, Zire, Tungsten Smartphones Treo BlackBerry: Nextel: Handhelds BlackBerry 15
16 PDA-Functionality PDA combines the convenience of constant access to , a cell phone, and a personal organizer consists of wireless capabilities data-enabled phone modem Office applications, available via PDA: Calendar Address Book Memo Pad Task List Calculator USB-Interface: simple loading of desktop software under Windows onto a PC and vice versa synchronization with a PC via the following programs: MS Outlook ASCII Text File Importer/Exporter MS Schedule IBM Lotus Notes IBM Notes Organizer etc. PDA market leaders in areas such as m-business, -healthcare, - education and -government PalmOne BlackBerry Nokia 16
17 PDA-products for Mobile consist of: PDA , e.g. for palm computing platform PDA Web Browser PDA Mail Conduit (synchronization software for desktop applications) features: support of POP3, APOP, SMTP-AUTH, SSL, HTML rendering with URLs and Phone Number Linking PDA and PDA Web Browser support SSL (Secure Socket Layer) and TLS (Transport Layer Security): end-to-end security synchronization of Bookmarks/ Addresses between PC Web Browser and PDA Web Browser via PDA Web Conduit synchronization with PC- applications multiple accounts are possible (IMAP) below: some examples of products (for instance, Snapper Mail, VersaMail, Eudora etc.) with screen dumps 17
18 Mobile SnapperMail popular solution for smartphone/pda supports POP3, APOP, SMTP- AUTH, SSL, HTML rendering with URL and phone number linking unlimited accounts and message size, automatic mail fetching with alerts attachment support via full memory card file browsers handling applications (ZIP, JPEG) for attachments handwritten note-taking software 18
19 Mobile VersaMail based on MultiMailPro (by Palm Inc.) supports POP3, APOP, IMAP4, SMTP-AUTH filters and attachments possible synchronization with Windows or Mac desktops automatic mail fetching with alerts HTML rendering access to SSL mail servers under Palm OS 19
20 Mobile Eudora attachment support integration with a browser Conduit Software for synchronization of with desktop core POP3 client supports SSL, HTML rendering filtering capabilities synchronisation 20
21 Handwritten Mail Messages Viewing and writing of handwritten and typed [via keyboard] messages on PDA Products: BugMe Messenger: relaying of handwritten, text or graphic notes to desktop and web-based mail applications Rit vector based writing engine aided sketching, automatic shaping for handwritten character/ geometrical symbols relaying of handwritten messages to desktop 21
22 PDA: mobile VPN-Clients PDA can also communicate via secure VPN-tunnel secure connection to a private network via different protocols vendors of VPN-software for PDAs: Certicom, SafeNet, Mergic Requirements to PDAs: Palm OS available memory: approx KByte used protocols PPTP: Point-to-Point Tunneling Protocol (MS proprietary, Windows) L2TP: Layer 2 Tunneling Protocol powered with IPSec IPSec: Secure Internet Protocol Products: major players: 3Com, Alcatel, Cisco Intel, Lucent, NortelNetworks FreeBSD, Linux, Windows 22
23 Mobile Agents Agent is an independent program; it consists of data, code and execution state, and works in the interest and on the order of a third party (e.g. user, application). An agent-system consists of the agents themselves and an execution engine that offers basic services to the agents. place 5 place 4 Place 1 Operating System Hardware Network Place 3 Operating system Hardware OS Hardware 23
24 Agent model Client create Agent code, data, state migration Serverinterface Client result Agent code, data, state Serverinterface migration: transfer of code, data, state local interactions with server transfer of the result 24
25 Properties of mobile agents Advantages: + reduction of network load + autonomy and asynchronity + dynamic adaptation according to environment + heterogeneity + robustness and fault tolerance + scalability + personalization and individualization + dynamic code installation + encapsulation of protocols Disadvantages: special execution engine required (Middleware) high security requirements transfer of code, data, state Decision: migration vs. remote communication 25
26 Application Areas and Systems Mobile computing E-commerce (e.g. search for appropriate offers) Database requests and Web search Office applications/workflow; load balancing Traffic telematics However, in general not suited towards security-critical business transactions, but rather for read-only queries Platforms and standards (examples): JADE (Java Agent Development Framework) open source platform FIPA (Foundation for Intelligent Physical Agents) 26
MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware
MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction
More informationDS 2009: middleware. David Evans
DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between
More information3C05 - Advanced Software Engineering Thursday, April 29, 2004
Distributed Software Architecture Using Middleware Avtar Raikmo Overview Middleware What is middleware? Why do we need middleware? Types of middleware Distributed Software Architecture Business Object
More informationVirtual Private Networks.
Virtual Private Networks thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Virtual Private Networks VPN Basics Protocols (IPSec, PPTP, L2TP) Objectives of VPNs Earlier Companies
More informationRoadSync Java MIDP 2.0 Manual
RoadSync Java MIDP 2.0 Manual Table of Contents General Product Information What is RoadSync (Exchange ActiveSync )... 4 Advantages for Companies and IT Administrators... 4 Key Product Features... 5 System
More informationMicrosoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:
Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry
More informationChapter 4 Communication
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 4 Communication Layered Protocols (1) Figure 4-1. Layers, interfaces, and protocols in the OSI
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationThe Collaboration Cornerstone
E-Mail: The Collaboration Cornerstone On Demand Insurance Business Problems 1. We lose customers because we process new policy applications too slowly. 2. Our claims processing is time-consuming and inefficient.
More informationBusiness Data Communications and Networking
Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Dwayne Whitten, D.B.A Mays Business School Texas A&M University http://alainmaterials.webs.com/
More informationFundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy
System Models and Networking Chapter 2,3 Bina Ramamurthy Fundamental Issues There is no global time. All communications are by means of messages. Message communication may be affected by network delays
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect
More informationVigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive
Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive security suite of firewall, VPN, URL content filtering
More informationClientless SSL VPN End User Set-up
71 CHAPTER This section is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also
More informationIntroduction to 9.0. White Paper. Sync and Surf FirstClass Support for Mobile Users. November Powering collaborative online communities.
Introduction to 9.0 White Paper Sync and Surf FirstClass Support for Mobile Users November 2007 Powering collaborative online communities. FirstClass Support for Mobile Users The widespread availability
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationTABLE OF CONTENTS 1. INTRODUCTION DEFINITIONS Error! Bookmark not defined REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4.
TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 DEFINITIONS Error! Bookmark not defined. - 2 2. REASON FOR ISSUE 2 3. RELATED DOCUMENTS 2 4. OVERVIEW 2-3 5. HARDWARE ARCHITECTURE 3 6. SUPPORTED CONFIGURATIONS
More informationEnd User Device Strategy: Interoperability Standards
End User Device Strategy: Interoperability Standards This document defines the target architecture for cross government interoperability standards and interfaces between a government End User Device and
More informationCommunication. Overview
Communication Chapter 2 1 Overview Layered protocols Remote procedure call Remote object invocation Message-oriented communication Stream-oriented communication 2 Layered protocols Low-level layers Transport
More informationHUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date
HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or
More informationProtocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical
More informationUsing Mobile Computers Lesson 12
Using Mobile Computers Lesson 12 Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data Use BitLocker Drive Encryption Use remote network connections
More informationNetwork. Arcstar Universal One
Network Universal One ARCSTAR UNIVERSAL ONE Universal One Enterprise Network NTT Communications' Universal One is a highly reliable, premium-quality network service, delivered and operated in more than
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is
More informationChapter 2 System Models
CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical
More informationWAP/ WML : Wireless Protocol wireless protocol
Device Connectivity Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity
More informationThinAir Server Platform White Paper June 2000
ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part
More informationMay Gerd Liefländer System Architecture Group Universität Karlsruhe (TH), System Architecture Group
Distributed Systems 6 RMI/MP IPC May-18-2009 Gerd Liefländer System Architecture Group 1 Intended Schedule of Today RMI (only rough overview) Message Passing Motivation Bridge Principle Message Passing
More information1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks
Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.
More informationBlackBerry 101: An Introduction to the BlackBerry Wireless Solution
BlackBerry 101: An Introduction to the BlackBerry Wireless Solution BlackBerry 101 Agenda What is the BlackBerry Enterprise Solution? Tracing a Message Security, Security, Security Enabling the User Extensibility:
More informationCHAPTER 2. Introduction to Middleware Technologies
CHAPTER 2. Introduction to Middleware Technologies What is Middleware? General Middleware Service Specific Middleware Client/Server Building blocks RPC Messaging Peer to Peer Java RMI. BHUSHAN JADHAV 1
More informationSecure VPNs for Enterprise Networks
Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using
More informationNetwork+ Guide to Networks 6 th Edition
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More informationSSL VPN Virtual Private Networks based on Secure Socket Layer
SSL VPN Virtual Private Networks based on Secure Socket Layer Mario Baldi Politecnico di Torino (Technical Univesity of Turin) http://staff.polito.it/mario.baldi SSL VPN: What is that? SSL as the central
More informationMOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)
Code No: R41054 R10 Set No. 1 1 a) Explain functional architecture of GSM. [8] b) Write and explain novel applications of Mobile Computing. [7] 2 a) Explain in detail about IEEE 802.11 MAC Data frames.
More informationClientless SSL VPN Overview
Introduction to Clientless SSL VPN, page 1 Prerequisites for Clientless SSL VPN, page 2 Guidelines and Limitations for Clientless SSL VPN, page 2 Licensing for Clientless SSL VPN, page 3 Introduction to
More informationIBM Lotus Expeditor 6.2 Server MQ Everyplace Overview
IBM Lotus Expeditor 6.2 Server MQ Everyplace Overview WebSphere MQ Messaging Assured message delivery Level of assuredness may be lowered to improve performance Non-duplication of messages Application
More informationChapter 18 Distributed Systems and Web Services
Chapter 18 Distributed Systems and Web Services Outline 18.1 Introduction 18.2 Distributed File Systems 18.2.1 Distributed File System Concepts 18.2.2 Network File System (NFS) 18.2.3 Andrew File System
More informationClientless SSL VPN Remote Users
This chapter summarizes configuration requirements and tasks for the user remote system. It also helps users get started with Clientless SSL VPN. It includes the following sections: Make sure that the
More informationVirtual private networks
Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible
More informationE3-E4 CM TECHNICAL IT INFRASTRUCTURE
E3-E4 CM TECHNICAL IT INFRASTRUCTURE WELCOME This is a presentation for the E3-E4 CM Technical Module for the Topic: IT Infrastructure. Eligibility: Those who have got the Up-gradation from E3 to E4. This
More informationClient Server & Distributed System. A Basic Introduction
Client Server & Distributed System A Basic Introduction 1 Client Server Architecture A network architecture in which each computer or process on the network is either a client or a server. Source: http://webopedia.lycos.com
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is
More informationA Technical Overview of the Lucent Managed Firewall
Lucent Managed Version 2.0 A Technical Overview of the Lucent Managed This document provides a technical overview of the Lucent Managed architecture. Key technical features and potential application scenarios
More informationPersonal Digital Assistant (PDA) Market Opportunities, Strategies, and Forecasts, 2004 to Personal Digital Assistant (PDA)
Personal Digital Assistant (PDA) Market Opportunities, Strategies, and Forecasts, 2004 to 2009 Personal Digital Assistant (PDA) Picture by Susie Eustis MOUNTAINS OF OPPORTUNITY WinterGreen Research, Inc.
More informationDouble-clicking an entry opens a new window with detailed information about the selected VPN tunnel.
The Barracuda NextGen Admin VPN tab provides information on all VPN connections that are configured on the Barracuda NextGen Firewall F-Series. Selecting the icons in the ribbon bar under the VPN tab takes
More informationConcepts of Distributed Systems 2006/2007
Concepts of Distributed Systems 2006/2007 Introduction & overview Johan Lukkien 1 Introduction & overview Communication Distributed OS & Processes Synchronization Security Consistency & replication Programme
More informationCommunication. Distributed Systems Santa Clara University 2016
Communication Distributed Systems Santa Clara University 2016 Protocol Stack Each layer has its own protocol Can make changes at one layer without changing layers above or below Use well defined interfaces
More informationDPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0
DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,
More informationCS 356 Internet Security Protocols. Fall 2013
CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5
More informationDistributed Information Processing
Distributed Information Processing 1 st Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science & Engineering Seoul National University Copyrights 2017 Eom, Hyeonsang All Rights Reserved Outline
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More informationOutline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web
More informationUiB 1. april 04. Sun Microsystems
UiB 1. april 04 hans.bue@sun.com Sun Microsystems Agenda Java Desktop System (JDS) StarOffice / OpenOffice Videre utvikling Java Enterprise System (JES) Konsept for fremtidens desktop 2 JDS Java Desktop
More informationCHAPTER 03: MULTIMEDIA & OPERATING SYSTEM. :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~
CHAPTER 03: MULTIMEDIA & OPERATING SYSTEM :: Operating System :: ~ What is OS?~ ~ OS Functions~ ~ OS Characteristics ~ ~ Type of OS~ 1 Operating System and Software Computer Operating System An operating
More informationVPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities
Product Highlights Comprehensive Management Solution Advanced features such as WAN failover, load balancing, and integrated firewall help make this a reliable, secure, and flexible way to manage your network.
More informationUser Guide. for the VersaMail. application
User Guide for the VersaMail application Copyright and Trademark 2004-2007 Palm, Inc. All rights reserved. Palm, HotSync, the HotSync logo, Palm OS, the Palm logo, and VersaMail are among the trademarks
More informationIntroduction. Distributed Systems IT332
Introduction Distributed Systems IT332 2 Outline Definition of A Distributed System Goals of Distributed Systems Types of Distributed Systems 3 Definition of A Distributed System A distributed systems
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls
More informationCOPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied, photocopied, reproduced, translated, or reduced to any
COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form, in whole
More informationTECHNICAL HELP: PRESS * 0
28-NOV- 2001 1 Oracle Corporation 9i Series iseminar: Presenters: Taesang Choi Eun Heo YunSeok Choi Fukiat Julnual Wednesday, November 28, 2001 28-NOV- 2001 2 think fast. think simple. think smart. 28-NOV-
More informationUser s Manual for 3JTech s Infrared Modem with palmone PDAs
User s Manual for 3JTech s Infrared Modem with palmone PDAs Users Manual User's Manual for 3JTech's Infrared Modem with palmone PDAs Users Manual: 1.1 Date: May 21, 2004 3JTech Co., Ltd. 342 Fu-Hsing N.
More informationTop Reasons to Upgrade
version 5.0 Top Reasons to Upgrade With the latest release of the BlackBerry Enterprise Server software, your organization gains new administrative features, built-in high availability to maximize system
More informationWhy MCL-Client. Visualize multimodal mobile worker applications. Realize MCL-Client. Visualize Mobilize Realize MCL-Collection
Visualize Mobilize Realize MCL-Collection Why MCL-Client Visualize multimodal mobile worker applications Realize MCL-Client Why MCL-Client Organizations throughout the world choose MCL-Collection for its
More information1. Introduction Firewall contains SPI technique against intrusions, attacks and DOS
Trouble Shooting Guide of Vigor2900 series Broadband Security Router 1. Introduction Firewall contains SPI technique against intrusions, attacks and DOS VPN encryption enhances transmission privacy and
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationToday CSCI Remote Method Invocation (RMI) Distributed Objects
Today CSCI 5105 Remote Method Invocation (RMI) Message-oriented communication Stream-oriented communication Instructor: Abhishek Chandra 2 Remote Method Invocation (RMI) RPCs applied to distributed objects
More informationCisco Vpn Client User Guide For Windows Chapter 2
Cisco Vpn Client User Guide For Windows Chapter 2 Port Used by AnyConnect and the Legacy VPN Client 32. CHAPTER 2 Step 7 Click Edit and choose User Configuration _ Windows Settings _ Internet. Downloads:
More informationDeployment Scenarios for Standalone Content Engines
CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This
More informationPeopleSoft Internet Architecture
PeopleSoft Internet Architecture AN OPEN ARCHITECTURE FOR INTERNET ACCESS AND INTEGRATION 3 ( 2 3 / (6 2 ) 7 Ã3 2 6, 7, 2 1 Ã3 $ 3 ( 5 - $ 1 8 $ 5 < Ã 3 (23/(6 2)7Ã, 17(51(7Ã$ 5&+,7(&785( - $18$5
More information_guide.book Page 1 Thursday, September 7, :58 PM Setting Up on Your Sprint International Smart Device IP-830w by Samsung
email_guide.book Page 1 Thursday, September 7, 2006 2:58 PM Setting Up Email on Your Sprint International Smart Device IP-830w by Samsung www.sprint.com 2006 Sprint Nextel. All rights reserved. SPRINT,
More informationVPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist
VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet
More informationMDaemon Vs. IceWarp Unified Communications Server
Comparison Guide Vs. The following chart is a side-by-side feature comparison of Email Server and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP SSL / TLS / StartTLS
More informationDistribution and Integration Technologies
Distribution and Integration Technologies Distributed Architectures Patterns and Styles 1 Distributed applications infrastructure ISP intranet wireless backbone desktop computer: server: laptops: tablets:
More informationIntroducing Cisco Unified MeetingPlace Web Conferencing
CHAPTER 1 Introducing Cisco Unified MeetingPlace Web Conferencing This chapter contains the following sections: About Cisco Unified MeetingPlace, page 1-1 About Cisco Unified MeetingPlace Web Conferencing,
More informationBusting the top 5 myths of cloud-based authentication
Busting the top 5 myths of cloud-based authentication Insert Your Name Jason Hart CISSP CISM Vice President, Cloud Solutions SafeNet, Inc. Insert Your Title Insert Date Overview Cloud benefits Agility
More informationMobile Platforms and Middleware
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Mobile Platforms and Middleware Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de
More informationMobile Internet Devices and the Cloud
Mobile Internet Devices and the Cloud What Is a Smartphone? Mobile Operating Systems for Smartphones 1. iphone 2. Google (Android) 3. Blackberry 4. Windows Mobile 5. Ubuntu Mobile Internet Device (MID)
More informationInternet. Class-In charge: S.Sasirekha
Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems
More informationDistributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan.
Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan Reading List Remote Object Invocation -- Tanenbaum Chapter 2.3 CORBA
More informationSetting Up Your Handheld and Your Computer
Setting Up Your Handheld and Your Computer In this chapter What s in the box? System requirements Step 1: Charging your handheld Step 2: Turning on your handheld for the first time Step 3: Installing your
More informationChapter 9. Firewalls
Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however
More informationDPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0
DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any
More informationMDaemon Vs. Microsoft Exchange Server 2016 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
More informationReview for Internet Introduction
Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of
More informationSet Up with Microsoft Outlook 2013 using POP3
Page 1 of 14 Help Center Set Up E-mail with Microsoft Outlook 2013 using POP3 Learn how to configure Microsoft Outlook 2013 for use with your 1&1 e-mail account using the POP3 Protocol. Before you begin,
More informationBlackberry Technology
A Seminar report on Blackberry Technology Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org SUBMITTED
More informationCisco Group Encrypted Transport VPN
Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that
More informationThe Applications and Gaming Tab - Port Range Forward
The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized
More informationDistributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that:
Distributed Systems Overview Distributed Systems September 2002 1 Distributed System: Definition A distributed system is a piece of software that ensures that: A collection of independent computers that
More informationTECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
More informationFirstClass Core Features
FirstClass Core Features Cross Platform 6 7 7.1 8.0 Linux (Client) Windows 2003 Server (Server) Mac OS X (Client) Macintosh OS X (Server) Mac OS (Client) Windows 95/98/2000/XP (Client) Windows 2000 (Server)
More information