Optimizing reasonably secure Long Distance Data Transfer. How to transfer Data while being poor
|
|
- Lorin Jones
- 5 years ago
- Views:
Transcription
1 Manfred Stolle Zuse Institute Berlin Optimizing reasonably secure Long Distance Data Transfer Or How to transfer Data while being poor 1
2 The situation A scientific team gains on a daily basis 250 GB of observation data. In order to be processed and stored the data has to be transmitted over a long distance. Transmission with ftp performance is not faster than 160 GB per day. No influence on the network no root permission no privileges at all! 2
3 Keep it small if you are poor! BIG solutions (probably) exist. Big solutions require big ressources (manpower,hardware, $). I mproposing a small (inexpensive) solution 3
4 Steps Separate the (session and task) control flow from the data flow Secure the control flow Optimize the data flow Keep it simple 4
5 dmscp(2) control and data flow This was done in dmscp(1) See San Diego MSS Conf Client Access by a (dynamic) passphrase Server dmscp2 Data transfer (send or receive) (unprivileged) data port dmscp2 ssh Session control Access passphrase Negotiating transfer parameters Success check sshd port sshd This runs with ftp performance too slow! 5
6 Optimizing the data flow and data objects network streams via 1+ subnets *) Client network buffer Server Switch buffer Switch buffer File Pipe to (from) process HSM disk buffer *) more than 1 subnet not (yet) released HSM File File fragments Pipe to (from) process 6
7 Tuning parameters Number of network streams (-streams s) Sizeof network buffer (-maxbuf m) The total buffer is 2*m*s TCP-Windowsize (-wsz w) 7
8 HSM related features of dmscp2 (user exits = perl or sh scripts ) at certain events e.g. disk full error Examples (in perl) come with the source 8
9 More goodies Optional reading/writing from/to pipes at client and server instead of files, Recursive Copy of a file tree (Metadata via the secure line) Network tuning option (copy from core to core) 9
10 Success check Amount of data on server/client is compared Optional checksumming 10
11 Performance Comparing dmscp2 with dmscp(1)/ftp (1.9 MB/s) and scp (0.6 MB/s) Distance 200 Miles Latency 5.7 ms The line contains 100 Mbit components. 3.5 x faster than dmscp(1)/ftp 11.3 x faster than scp streams MB/sec
12 Performance (HPC involved) Local network (1 Gbit/s): Latency < 1ms hpscp 31 MByte/sec (hpscp is a tuned scp *) ) ~340 km (200 Miles) Bandwidth 1 Gbit/s Latency 3 ms hpscp: 28 MByte/sec streams MByte/sec in 2 subnets 201 **) 226 **) streams MByte/sec (101.1 **) *) **) core to core **) feature going to be released next week 12
13 dmscp2 needs No root permission for the installation Install it simply in your ~/bin directory! No daemon under root (except sshd) At least one unprivileged IP port on the server that is accessible to the client By default a free port is searched on the server in the range The user can define a specific port. 13
14 dmscp2 is free and easy to install! contains This presentation (long version) a dmscp2 users guide The sources 14
15 dmscp2 is meant to bea back end to solve routine big data transfer problems, build user front ends for typical data transfer tasks. It is not really easy to use (too many features), an all purpose user front end for anybody (scp/sftp has its advantages!) 15
16 Don t you mess with my data! 16
17 Manfred Stolle Zuse Institute Berlin How to transfer Data while beeing poor Reasonably secure fast data transfer via the Internet
18 Do you know the latest Computer virus? It s called Caperucita Roja It sawfull! 2
19 Actually it doesn t exist, but I can sell you a very performant toolbox against it 3
20 This is Caperucita Roja And this is the remedy 4
21 The most effective (profitable) computer virus is the human fear. 5
22 It s not funny! The bad guys really exist, but it is not sensible that we stop working just out of fear. Security measures have to leave us a chance to get our data over the Internet. 6
23 Scientific data is very valuable. It must not be damaged. But in most cases it is not very secret. We need effective means to transfer big amounts of scientific data over The Net without compromizing our computers. 7
24 The situation A scientific team gains on a daily basis 250 GB of observation data. In order to be processed and stored the data has to be transmitted over a long distance. Sometimes the destination (HSM) file system runs out of space 8
25 The situation (2) No network is totally reliable! The transmitted data can be changed in the network (very unlikely but not impossible) More catastrophes New day new data 9
26 Keep it small if you are poor! BIG solutions (probably) exist. Big solutions require big ressources (manpower,hardware, $). I m going to propose a small solution (although there is no fame in it). 10
27 Steps Separate the (session and task) control flow from the data flow Secure the control flow Optimize the data flow Keep it simple 11
28 dmscp(2) control and data flow This was done in dmscp(1) Client Access by a (dynamic) passphrase Server dmscp2 Data transfer (send or receive) (unprivileged) data port dmscp2 ssh Session control Access passphrase Negotiating transfer parameters Success check sshd port sshd 12
29 The Trick When using networks with high bandwidth (good) and high latency (poor) or very busy networks splitting the network transfer into parallel streams gets you a remarkable speedup. This is done by other solutions too. (I m not the inventor of the method but it is very good!) 13
30 Optimizing the data flow and data objects Client network streams via 1 or more subnets network buffer Server Switch buffer Switch buffer File Pipe to (from) process HSM disk buffer HSM File File fragments Pipe to (from) process 14
31 Tuning parameters Number of network streams (-streams s) Number of network connections (-srvaddrs <addr1> <addr2>..) Sizeof network buffer (-maxbuf m) The total buffer size is 2*m*s TCP-Windowsize (-wsz w) 15
32 HSM related features of dmscp2 (user exits = perl/sh/ scripts ) Called in case of the following events: disk full error Open fragment (premigration of next fragment) Close file/fragment (trigger migration) Successfull completion (postprocessing on the server) Examples (in perl) come with the source 16
33 More goodies Optional reading/writing from/to pipes at client and server instead of files, Recursive Copy of a file tree (Metadata via the secure line) Network tuning option (copy from core to core) 17
34 Success check Amount of data on server/client is compared Optional checksumming 18
35 Performance Comparing dmscp2 with dmscp(1)/ftp (1.9 MB/s) and scp (0.6 MB/s) Distance 200 Miles Latency 5.7 ms The line contains 100 Mbit components. 3.5 x faster than dmscp(1)/ftp 11.3 x faster than scp streams MB/sec
36 Performance (HPC involved) Local network (1 Gbit/s): Latency < 1ms hpscp 31 MByte/sec (hpscp is a tuned scp *) streams MByte/sec in 2 subnets 232 *) 20
37 Performance (HPC involved) - 2 ~340 km (200 Miles) Bandwidth 1 Gbit/s Latency 3 ms hpscp: 28 MByte/sec streams MByte/sec (101.1 **) **) core to core 21
38 Performance very long distance Comparing Transfer between Berlin and San Diego (ZIB and SDSC) 2 IBM Regattas Distance 4200 Miles Latency 177ms scp: 0.2 MByte/sec streams MByte/sec 1 (like ftp/dmscp1) speedup=40 dmscp2 ist 60 times faster than scp 22
39 dmscp2 needs No root permission for the installation Install it simply in your ~/bin directory! No daemon under root (except sshd) At least one unprivileged IP port on the server that is accessible to the client By default a free port is searched on the server in the range The user can define a specific port. 23
40 Problem Sometimes a network I/O process on the server exits (before or during the data transmission I guess before) This causes (like it should) a panic of dmscp2 In this case the dmscp2 run has to be repeated Searching the reason in the shared memory management 24
41 Work in progress The latest version of dmscp2 has an interface to a GUI When using the xmode parameter dmscp2 creates 2 named pipes One to read commands from the GUI One to write the receipts to the GUI dmscp2 calls xdmscp or the binary defined byte xdmscp parameter. 25
42 The GUI protocol (examples) Task Command Receipt Set local directory LCHDIR <path> LWDIR <current localdirectory> List current remote directory (in ls l format) Delete remote file LISTRDIR RERASE <filename> RDIRLIST <entry> RDIRLIST <entry> END_OF_LIST ERASE_DONE Upload file PUT <filename> ACCEPTING_NEW_COMMAND Download directory GETDIR <dirname> dmscp2: ESTIMATED_SIZE <size> xdmscp: CANCEL DOIT dmscp2:accepting_new_command 26
43 My GUI looks like this called by: dmscp2 -xmode -xdmscp -s dslogin.sdsc.edu -u bzbstoll -streams 25 27
44 Total security. 28
45 comes with a price 29
46 dmscp2 is free and easy to install! contains This presentation a dmscp2 users guide The sources Client and server are the same code (~ 8,100 lines C code) gunzip,tar,configure, make, make install that sall Usually it takes not much more than a minute. A quickinstall script is provided 30
47 dmscp2 is meant to bea back end to solve routine big data transfer problems, build user front ends for typical data transfer tasks. It is not really easy to use (too many features), an all purpose user front end for anybody (scp/sftp has its advantages!) 31
48 Examples (HPC involved!) reading a file from the server bemstoll@berni1-en0 (~/dmscp ):./dmscp2 -r -s bdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g -l /fastfs/work/bemstoll/destfile \ -rdmscp dmscp /dmscp2 Using command: ssh -p 22 bdata.hlrn.de 'true;dmscp /dmscp2 - server' > /tmp/dmscp.pipe bemstoll@bdata.hlrn.de's password: Using the port 1031 Number of network data streams=4 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time secs --> KB/sec MB/sec State: Success bemstoll@berni1-en0 (~/dmscp ): 32
49 writing 1 stream - local network bemstoll@berni1-en0 (~/dmscp ):./dmscp2 -w -s bdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g \ -l /fastfs/work/bemstoll/destfile -streams 1 Using command: ssh -p 22 bdata.hlrn.de 'true;dmscp2 -server' > /tmp/dmscp.pipe bemstoll@bdata.hlrn.de's password: Using the port 1031 Number of network data streams=1 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time secs --> KB/sec MB/sec State: Success 33
50 writing 6 streams - local network bemstoll@berni1-en0 (~/dmscp ):./dmscp2 w s bdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g -l /fastfs/work/bemstoll/destfile -streams 4 Using command: ssh -p 22 bdata.hlrn.de 'true;dmscp2 -server' > /tmp/dmscp.pipe bemstoll@bdata.hlrn.de's password: Using the port 1031 Number of network data streams=4 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time 92.2 secs --> KB/sec MB/sec State: Success 34
51 writing 40 streams distance 300 km (HLRN link) 1 Gbit/sec - latency 3 ms bemstoll@berni1-en0 (~/dmscp ):./dmscp2 -w -s hdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g -l /fastfs/work/bemstoll/destfile\ -rdmscp dmscp /dmscp2 -streams 16 Using command: ssh -p 22 hdata.hlrn.de 'true;dmscp /dmscp2 - server' > /tmp/dmscp.pipe bemstoll@hdata.hlrn.de's password: Using the port 1030 Number of network data streams=6 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time secs --> KB/sec MB/sec State: Success 35
52 writing 1 stream (ftp performance) distance 300 km latency 3 ms bemstoll@berni1-en0 (~/dmscp ):./dmscp2 -w -s hdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g -l /fastfs/work/bemstoll/destfile\ -rdmscp dmscp /dmscp2 -streams 1 Using command: ssh -p 22 hdata.hlrn.de 'true;dmscp /dmscp2 - server' > /tmp/dmscp.pipe bemstoll@hdata.hlrn.de's password: Using the port 1030 Number of network data streams=1 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time secs --> KB/sec MB/sec State: Success 36
53 Recursive copy 4 streams - local bemstoll@berni1-en0 (~): dmscp2 -w -s bdata.hlrn.de \ -recursive -src. -dest /fastfs/work/bemstoll/destdir Using command: ssh -p 22 bdata.hlrn.de 'true;dmscp2 -server' > /tmp/dmscp.pipe bemstoll@bdata.hlrn.de's password: Using the port 1031 Number of network data streams=4 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time 12.5 secs --> KB/sec MB/sec State: Success 37
54 Don t you mess with my data! 38
VREDPro HPC Raytracing Cluster
1 HPC Raytracing Cluster... 1 1.1 Introduction... 1 1.2 Configuration... 2 1.2.1 Cluster Options... 4 1.2.2 Network Options... 5 1.2.3 Render Node Options... 6 1.2.4 Preferences... 6 1.2.5 Starting the
More informationData Staging: Moving large amounts of data around, and moving it close to compute resources
Data Staging: Moving large amounts of data around, and moving it close to compute resources PRACE advanced training course on Data Staging and Data Movement Helsinki, September 10 th 2013 Claudio Cacciari
More informationData Staging: Moving large amounts of data around, and moving it close to compute resources
Data Staging: Moving large amounts of data around, and moving it close to compute resources Digital Preserva-on Advanced Prac--oner Course Glasgow, July 19 th 2013 c.cacciari@cineca.it Definition Starting
More informationCS 326: Operating Systems. Networking. Lecture 17
CS 326: Operating Systems Networking Lecture 17 Today s Schedule Project 3 Overview, Q&A Networking Basics Messaging 4/23/18 CS 326: Operating Systems 2 Today s Schedule Project 3 Overview, Q&A Networking
More informationCS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)
CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to
More informationIT 341: Introduction to System Administration. Notes for Project #8: Backing Up Files with rsync
IT 341: Introduction to System Administration Notes for Project #8: Backing Up Files with rsync These notes explain some of the concepts you will encounter in Project #08: Backing Up Files with rsync Topics
More informationFilesystem. Disclaimer: some slides are adopted from book authors slides with permission 1
Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Storage Subsystem in Linux OS Inode cache User Applications System call Interface Virtual File System (VFS) Filesystem
More informationFilesystem. Disclaimer: some slides are adopted from book authors slides with permission
Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Recap Directory A special file contains (inode, filename) mappings Caching Directory cache Accelerate to find inode
More informationOpen Network Laboratory
Open Network Laboratory Raj Jain Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/
More informationName: 1. CS372H: Spring 2009 Final Exam
Name: 1 Instructions CS372H: Spring 2009 Final Exam This exam is closed book and notes with one exception: you may bring and refer to a 1-sided 8.5x11- inch piece of paper printed with a 10-point or larger
More informationUNICORE UFTP server UNICORE UFTP SERVER. UNICORE Team
UNICORE UFTP server UNICORE UFTP SERVER UNICORE Team Document Version: 1.0.0 Component Version: 2.0.0 Date: 10 12 2013 UNICORE UFTP server Contents 1 UNICORE UFTP 1 2 Installation and use 2 2.1 Prerequisites....................................
More informationFile Transfers. Contents
A File Transfers Contents Overview.................................................... A-3................................ A-3 General Software Download Rules............................ A-4 Using TFTP
More informationTELE301 Lab16 - The Secure Shell
TELE301 Lab16 - The Secure Shell Department of Telecommunications May 7, 2002 Contents 1 Introduction 2 2 OpenSSH 2 3 Replacing Telnet 2 4 Logging in without a password 2 5 SSH Agent 3 5.1 SSH Add..............................
More informationInternet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!
cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices
More informationUploaded files are stored for 6 months, after which time we remove them. Please note the SIFT Server is for the transfer of Chorus information only.
SIFT User guide Our secure internet file transfer (SIFT) server is a secure mechanism that allows you to receive e-bills, invoices, CDRs, price books, NGA schedule availability and other sensitive information
More informationNET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17
CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationLab - Using Wireshark to Examine TCP and UDP Captures
Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.
More informationInternet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.
Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:
More information[537] Fast File System. Tyler Harter
[537] Fast File System Tyler Harter File-System Case Studies Local - FFS: Fast File System - LFS: Log-Structured File System Network - NFS: Network File System - AFS: Andrew File System File-System Case
More informationProduct Overview. Technical Summary, Samples, and Specifications
Product Overview Technical Summary, Samples, and Specifications Introduction IRI FACT (Fast Extract) is a high-performance unload utility for very large database (VLDB) systems. It s primarily for data
More informationThe Berkeley File System. The Original File System. Background. Why is the bandwidth low?
The Berkeley File System The Original File System Background The original UNIX file system was implemented on a PDP-11. All data transports used 512 byte blocks. File system I/O was buffered by the kernel.
More informationCisco WAAS Software Command Summary
2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are
More informationCache introduction. April 16, Howard Huang 1
Cache introduction We ve already seen how to make a fast processor. How can we supply the CPU with enough data to keep it busy? The rest of CS232 focuses on memory and input/output issues, which are frequently
More informationLECTURE WK4 NETWORKING
LECTURE WK4 NETWORKING Workbook and Quiz Workbook o Due in WK5 o Must hand in a hard copy to the tutor as well as an online submission Quiz o In the practical class o 30mins to complete the quiz o Short,
More informationMain Points. File systems. Storage hardware characteristics. File system usage patterns. Useful abstractions on top of physical devices
Storage Systems Main Points File systems Useful abstractions on top of physical devices Storage hardware characteristics Disks and flash memory File system usage patterns File Systems Abstraction on top
More informationMobile Communications Chapter 9: Mobile Transport Layer
Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect
More informationInsiders View: Network Security Devices. Dennis Cox BreakingPoint Systems
Insiders View: Network Security Devices Dennis Cox CTO @ BreakingPoint Systems Who am I? Chief Technology Officer - BreakingPoint Systems Director of Engineering - TippingPoint Engineering - Cisco Systems
More informationLayer 4 TCP Performance in carrier transport networks Throughput is not always equal to bandwidth
Layer 4 TCP Performance in carrier transport networks Throughput is not always equal to bandwidth Roland Stooss JDSU Deutschland GmbH Senior Consultant Data/IP Analysis Solutions Mühleweg 5, D-72800 Eningen
More informationCreating Core Dumps. Contents. Prerequisites. Document ID: Requirements. Components Used
Creating Core Dumps Document ID: 12687 Contents Introduction Prerequisites Requirements Components Used Conventions How to Create Core Dumps Basic Setup Use File Transfer Protocol Use Remote Copy Protocol
More informationProgram Structure. Steven M. Bellovin April 3,
Program Structure We ve seen that program bugs are a major contributor to security problems We can t build bug-free software Can we build bug-resistant software? Let s look at a few examples, good and
More informationFtp Command Line Commands Linux Example Windows Put
Ftp Command Line Commands Linux Example Windows Put Examples of typical uses of the command ftp. This lists the commands that you can use to show the directory contents, transfer files, and delete files.
More informationFILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23
FILE SYSTEMS CS124 Operating Systems Winter 2015-2016, Lecture 23 2 Persistent Storage All programs require some form of persistent storage that lasts beyond the lifetime of an individual process Most
More informationCHAPTER 2. Troubleshooting CGI Scripts
CHAPTER 2 Troubleshooting CGI Scripts OVERVIEW Web servers and their CGI environment can be set up in a variety of ways. Chapter 1 covered the basics of the installation and configuration of scripts. However,
More informationConfiguring IP Logging
CHAPTER 8 This chapter describes how to configure IP logging on the sensor. It contains the following sections: Understanding IP Logging, page 8-1 Configuring Automatic IP Logging, page 8-2 Configuring
More informationStorage and File System
COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File
More informationCS162 Operating Systems and Systems Programming Lecture 21. Networking. Page 1
CS162 Operating Systems and Systems Programming Lecture 21 Networking April 21, 2008 Prof. Anthony D. Joseph http://inst.eecs.berkeley.edu/~cs162 Review: The Internet Protocol: IP The Internet is a large
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationCOS 318: Operating Systems. NSF, Snapshot, Dedup and Review
COS 318: Operating Systems NSF, Snapshot, Dedup and Review Topics! NFS! Case Study: NetApp File System! Deduplication storage system! Course review 2 Network File System! Sun introduced NFS v2 in early
More informationch02 True/False Indicate whether the statement is true or false.
ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be
More informationTCP so far Computer Networking Outline. How Was TCP Able to Evolve
TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments
More informationCS519: Computer Networks. Lecture 5, Part 1: Mar 3, 2004 Transport: UDP/TCP demux and flow control / sequencing
: Computer Networks Lecture 5, Part 1: Mar 3, 2004 Transport: UDP/TCP demux and flow control / sequencing Recall our protocol layers... ... and our protocol graph IP gets the packet to the host Really
More informationProgram Structure I. Steven M. Bellovin November 14,
Program Structure I Steven M. Bellovin November 14, 2010 1 Program Structure We ve seen that program bugs are a major contributor to security problems We can t build bug-free software Can we build bug-resistant
More informationLecture 16. Today: Start looking into memory hierarchy Cache$! Yay!
Lecture 16 Today: Start looking into memory hierarchy Cache$! Yay! Note: There are no slides labeled Lecture 15. Nothing omitted, just that the numbering got out of sequence somewhere along the way. 1
More informationComputer Networks Principles
Computer Networks Principles Introduction Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Contents Introduction protocols and layered architecture encapsulation interconnection structures performance
More informationECE 598 Advanced Operating Systems Lecture 22
ECE 598 Advanced Operating Systems Lecture 22 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 19 April 2016 Announcements Project update HW#9 posted, a bit late Midterm next Thursday
More informationIntroduction to the shell Part II
Introduction to the shell Part II Graham Markall http://www.doc.ic.ac.uk/~grm08 grm08@doc.ic.ac.uk Civil Engineering Tech Talks 16 th November, 1pm Last week Covered applications and Windows compatibility
More informationContents. Configuring SSH 1
Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list
More informationEVO checklist Minimum PC hardware requirements Ensuring sufficient network bandwidth Important note:
EVO checklist Before participating in an EVO session, we strongly urge you to complete this checklist to set up EVO on your system and environment. Following this checklist will eliminate the most common
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet
More informationIntroduction to TCP/IP networking
Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set
More informationFilesystem. Disclaimer: some slides are adopted from book authors slides with permission 1
Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Recap Blocking, non-blocking, asynchronous I/O Data transfer methods Programmed I/O: CPU is doing the IO Pros Cons
More informationChapter 1 - Introduction. September 8, 2016
Chapter 1 - Introduction September 8, 2016 Introduction Overview of Linux/Unix Shells Commands: built-in, aliases, program invocations, alternation and iteration Finding more information: man, info Help
More informationFile Organization Sheet
File Organization Sheet 1. What are File Structures? A File Structure is a combination of representations for data in files and of operations for accessing the data. A File Structure allows applications
More informationBusinessObjects Enterprise / Crystal Reports Server XI R1 and R2
BusinessObjects Enterprise / Crystal Reports Server XI R1 and R2 Overview Contents BusinessObjects Enterprise and Crystal Reports Server XI R1 and R2 do not currently have the capability to send objects
More informationWhat is a file system
COSC 6397 Big Data Analytics Distributed File Systems Edgar Gabriel Spring 2017 What is a file system A clearly defined method that the OS uses to store, catalog and retrieve files Manage the bits that
More informationPlot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0;
How will execution time grow with SIZE? int array[size]; int A = ; for (int i = ; i < ; i++) { for (int j = ; j < SIZE ; j++) { A += array[j]; } TIME } Plot SIZE Actual Data 45 4 5 5 Series 5 5 4 6 8 Memory
More informationSSH Product Overview
SSH Product Overview SSH Product Overview Understanding SSH SSH Discovery and Remediation Agentless SSH Agent Based SSH 2018 Venafi. All Rights Reserved. 2 Where is SSH used? File Transfer & Remote Script
More informationUoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011)
UoW HPC Quick Start Information Technology Services University of Wollongong ( Last updated on October 10, 2011) 1 Contents 1 Logging into the HPC Cluster 3 1.1 From within the UoW campus.......................
More informationInfrastructure Underpinnings of the GFDL Workflow
Infrastructure Underpinnings of the GFDL Workflow A Trio Of Lightning Talks For ISENES2 Chandin Wilson, Engility Amy Langenhorst, NOAA Karen Paffendorf, Princeton University Erik Mason, Engility Jeffrey
More informationCSCI-GA Operating Systems. Networking. Hubertus Franke
CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute
More informationCOS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy
Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationTriton file systems - an introduction. slide 1 of 28
Triton file systems - an introduction slide 1 of 28 File systems Motivation & basic concepts Storage locations Basic flow of IO Do's and Don'ts Exercises slide 2 of 28 File systems: Motivation Case #1:
More informationCS457 Transport Protocols. CS 457 Fall 2014
CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram
More informationHost Solutions Group Technical Bulletin August 30, 2007
Summary ISCSI PERFORMANCE CONSIDERATIONS Host Solutions Group Technical Bulletin August 30, 2007 Meeting throughput and response time requirements in iscsi SANs requires considering both component and
More informationAppendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc.
Appendix A GLOSSARY SYS-ED/ Computer Education Techniques, Inc. $# Number of arguments passed to a script. $@ Holds the arguments; unlike $* it has the capability for separating the arguments. $* Holds
More informationCS 318 Principles of Operating Systems
CS 318 Principles of Operating Systems Fall 2017 Lecture 16: File Systems Examples Ryan Huang File Systems Examples BSD Fast File System (FFS) - What were the problems with the original Unix FS? - How
More informationSecure Shell Commands
This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure
More informationSUREedge MIGRATOR INSTALLATION GUIDE FOR VMWARE
SUREedge MIGRATOR INSTALLATION GUIDE 5.0.1 FOR VMWARE 2025 Gateway Place, Suite #480, San Jose, CA, 95110 Important Notice This document is provided "as is" without any representations or warranties, express
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationIBM Virtual Machine Manager 2.0
IBM Virtual Machine Manager 2.0 Release Notes Note Before using this information and the product it supports, read the general information in Notices on page 13. First Edition (July 2005) Copyright International
More informationOutline 9.2. TCP for 2.5G/3G wireless
Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,
More informationViewtier Parabuild 4.3. Installation Guide
Viewtier Parabuild 4.3 Installation Guide Viewtier Parabuild 4.3: Installation Guide Copyright 2004-2016 Viewtier Systems Table of Contents Preface... vi About This Manual... vi Audience... vi Technical
More informationConfiguring IP Logging
CHAPTER 12 This chapter describes how to configure IP logging on the sensor. It contains the following sections: Understanding IP Logging, page 12-1 Configuring Automatic IP Logging, page 12-2 Configuring
More informationIntroduction. SSH Secure Shell Client 1
SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,
More informationIT341 Introduction to System Administration. Project 4 - Backup Strategies with rsync and crontab
IT341 Introduction to System Administration Project 4 - Backup Strategies with rsync and crontab Backup is one of the most important things a system administrator does. It is important to decide what data
More informationProgram Structure I. Steven M. Bellovin November 8,
Program Structure I Steven M. Bellovin November 8, 2016 1 Program Structure We ve seen that program bugs are a major contributor to security problems We can t build bug-free software Can we build bug-resistant
More informationMain Memory and the CPU Cache
Main Memory and the CPU Cache CPU cache Unrolled linked lists B Trees Our model of main memory and the cost of CPU operations has been intentionally simplistic The major focus has been on determining
More informationBeyond Petascale. Roger Haskin Manager, Parallel File Systems IBM Almaden Research Center
Beyond Petascale Roger Haskin Manager, Parallel File Systems IBM Almaden Research Center GPFS Research and Development! GPFS product originated at IBM Almaden Research Laboratory! Research continues to
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationSecure Shell Commands
Secure Shell Commands This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see
More informationRH033 Red Hat Linux Essentials
RH033 Red Hat Linux Essentials Version 3.5 QUESTION NO: 1 You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to
More informationCS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang
CS155b: E-Commerce Lecture 3: Jan 16, 2001 How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang Internet Protocols Design Philosophy ordered set of goals 1. multiplexed utilization of existing
More informationIP : Internet Protocol
1/20 IP : Internet Protocol Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: July 30, 1999 Agenda 2/20 IP functions IP header format Routing architecture IP layer 3/20 defines
More informationComputer Communication Networks Midterm Review
Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your
More informationSyncBreeze FILE SYNCHRONIZATION. User Manual. Version Dec Flexense Ltd.
SyncBreeze FILE SYNCHRONIZATION User Manual Version 10.3 Dec 2017 www.syncbreeze.com info@flexense.com 1 1 SyncBreeze Overview...3 2 SyncBreeze Product Versions...5 3 Product Installation Procedure...6
More informationScalability, Performance & Caching
COMP 150-IDS: Internet Scale Distributed Systems (Spring 2015) Scalability, Performance & Caching Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah Copyright
More informationUMSSIA INTRUSION DETECTION
UMSSIA INTRUSION DETECTION INTRUSION DETECTION Sensor1 Event1, Event2 Monitor No intrusion M SensorN Event1, Event2 Alarm! IDS CHARACTERISTICS Characteristics an IDS can be classified/evaluated by: Type
More informationUsing the Backup module
Using the Backup module THIS WIKI HAS BEEN UPDATED FOR VERSION 13 OF YOUR PBX GUI. Overview Logging In Menu Items Backups Restores Servers Templates Backup Settings Backup Name Description Status Email
More informationIntroduction to High Performance Parallel I/O
Introduction to High Performance Parallel I/O Richard Gerber Deputy Group Lead NERSC User Services August 30, 2013-1- Some slides from Katie Antypas I/O Needs Getting Bigger All the Time I/O needs growing
More informationManaging Caching Performance and Differentiated Services
CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service
More informationPractical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February
Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends
More informationUsers and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.
cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and
More informationInternet Protocol and Transmission Control Protocol
Internet Protocol and Transmission Control Protocol CMSC 414 November 13, 2017 Internet Protcol Recall: 4-bit version 4-bit hdr len 8-bit type of service 16-bit total length (bytes) 8-bit TTL 16-bit identification
More informationTopics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput
Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows
More informationFtp Get Command Line Windows 7 Boot Into >>>CLICK HERE<<<
Ftp Get Command Line Windows 7 Boot Into ftp_ put FileToUpload.zip 200 PORT command successful. 150 Opening BINARY mode data connection for FileToUpload.zip 226 Transfer complete. ftp: 106. In DOS or command
More informationTCP/IP Transport Layer Protocols, TCP and UDP
TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark
More informationFile Systems. Before We Begin. So Far, We Have Considered. Motivation for File Systems. CSE 120: Principles of Operating Systems.
CSE : Principles of Operating Systems Lecture File Systems February, 6 Before We Begin Read Chapters and (File Systems) Prof. Joe Pasquale Department of Computer Science and Engineering University of California,
More informationLECTURE 7. Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH. Marco Spaziani Brunella, Manuel Campo
LECTURE 7 Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH Remote Managing In real life, physical access to network nodes is not always an option. Often, we need
More information