JXTA Overview and Demo. M. Ranganathan ITG/ANTD/NIST

Size: px
Start display at page:

Download "JXTA Overview and Demo. M. Ranganathan ITG/ANTD/NIST"

Transcription

1 JXTA Overview and Demo M. Ranganathan ITG/ANTD/NIST

2 Peer-peer networking Focus at the application level Create an overlay network : Separation between physical and logical structure using one layer of indirection.

3 P2P Applications Application Characteristics: Centralization not possible or desired. Massive Scalability Relationships are transient or ad hoc Resources are distributed Resilience is desired Examples File sharing. Collaborative Applications Distributed/Grid Computing. Distributed Storage. Distributed Caches.

4 P2P Applications Search the entire web and all its connected devices (not just servers) for needed information Save files and information to distributed locations on the network Connect game systems so that multiple people in multiple locations Participate in auctions among selected groups of individuals Collaborate on projects from anywhere using any connected device Share compute services, such as processor cycles or storage systems, regardless of where the systems or the users are located Wireless tic-tac-toe / picture sharing.

5 JXTA Overview JXTA is a set of open XML-based protocols to build Peer to Peer Applications. API bindings for the protocols are defined for J2SE, J2ME, C++ etc. Project JXTA is sponsored by SUN. JXTA open source community hosted at

6 Goal/Purpose Enable a wide range of distributed computing applications by developing a common set of general purpose P2P protocols Platform independence - any language, any OS, any hardware. JXTA is a set of protocols. Minimal Hardware assumptions: enable new applications to run on any device that has a digital heartbeat (desktop computers, servers, PDAs, cell phones, and other connected devices) Security / monitoring features to enable commercial deployment.

7 JXTA is based on Protocols Defines XML message formats or protocols for communication between peers. Protocols are used to discover peers, advertise or discover resources communicate, route messages and provide monitoring. Protocols can be implemented in any language.

8 JXTA Protocol Abstractions Peer - A JXTA speaking process. Peer Service A Fragment of code specific to a peer Peer Groups - Peers providing a common service Peer Group Service A fragment of code that is common to the peer group. Advertisements XML Document that publishes existence of resources Pipes uni-directional, asynchronous, virtual channels for point-point and point-multi-point communication. Messages XML envelopes

9 JXTA Abstractions Each JXTA resource is identified by a UUID. Six types of JXTA entities with unique IDs: Peers, Peer groups, pipes, message contents, module classes and module specifications.

10 Structure JXTA Applications JXTA Community Applications Sun Applications JXTA Shell JXTA Services JXTA Community Services Sun Peer JXTA Services Commands Peer Groups Peer Pipes Peer Monitoring JXTA Core Security Any Peer on the Web

11 The Layers Platform Layer, also known as the JXTA core, encapsulates the minimal and essential primitives that are common to all P2P environments. These include the creation of peers, peer groups and security primitives. Service Layer. The Service layer includes the services that are not completely necessary for P2P networking, but are often used to make some tasks easier. Application Layer. Implementations of integrated applications: i P2P instant messaging, document and resource sharing and P2P systems.

12 Peers Peer is any networked device that implements one or more of the JXTA protocols. Each peer operates independently and asynchronously from all other peers. Uniquely identified with a Peer ID. Peers publish one or more network interfaces for use with the JXTA protocols. Intermediate peers may be used to route messages.

13 Peer Groups Collection of Peers that have agreed upon a common set of services. Each Peer group is identified using a unique peer group ID. Peers may belong to more than one peer group simultaneously. All peers belong to the NetPeerGroup.

14 Motivations for Peer Groups To Create a Secure Environment: Local domain of control in which a specific security policy can be enforced. Peer group boundaries permit members to access/publish protected contents. To Create a Scoping Environment: Allow the establishment of a local domain of specialization.

15 Peer Group Services A set of services that are replicated through the whole peer group. Root peer group has the following services: Discovery Service: search for peer group resources. Membership Service: Accept/deny new members. Access Service: Validate requests Pipe Service: Create / Manage pipe connections Resolver Service: Send generic queries to other peers. Monitoring Service: Allow one peer to monitor the other members of the same peer group.

16 Network Services Peer Service: Accessible only on the peer that is publishing the service: Multiple instances of the service can be run on different peers. Peer Group Service: A collection of instances of the service (potentially collaborating with each other). Peer group services are published as part of the peer group advertisement.

17 Modules Modules: Abstraction to represent a piece of Code. Can be java class, DLL a set of XML messages or a script. Generic Abstraction to allow a peer to instantiate new behavior. JXTA platform uses module advertisements to describe itself.

18 Modules Module Class : identified by unique class id. Module Spec: Contains all the information necessary to access a module. Module Spec implies network compatibility: For a service module spec may contain pipe advertisement. Module Implementation can be multiple module implementations for a given module spec.

19 Pipes Virtual communication channel that may connect peers that do not have a direct physical link. JXTA peers use PIPES to send messages to each other. Pipes are an asynchronous and unidirectional message transfer mechanism used for service communication. Pipes support transfer of binary/text. JXTA pipes may have endpoints that are connected to different peers at different times or not connected at all.

20 Pipes Hide Plumbing Details

21 Pipes Point-to-point Pipes: Connect exactly two endpoints together Propagate Pipes: Connect one output pipe to multiple input pipes. All propagation is done in the scope of a peer group. That is, the output pipe and all input pipes must belong to the same peer group. Secure Unicast Pipe: Point-to-point secure communication channel.

22 Advertisements All network resources are represented by advertisements. JXTA protocols use advertisements to describe and publish the existence of peer resources. Peers discover resources by searching for corresponding advertisements. Advertisement is published with a lifetime that specifies the availability of associated resources.

23 JXTA Advertisement <?xml version="1.0"?> <!DOCTYPE jxta:pipeadvertisement> <jxta:pipeadvertisement xmlns:jxta=" <Id> urn:jxta:uuid e cfdf904 </Id> <Type> JxtaUnicast </Type> <Name> foo </Name> </jxta:pipeadvertisement>

24 Advertisements Peer Advertisement: Describes Peer Resources Peer Group Advertisement: Describes Peer group specific resources. Pipe Advertisement: Describes a Pipe Communication channel. Module Class Advertisement: Describes a Module Class. Formally documents the existence of a module class.

25 Advertisements Module Spec Advertisement Defines a Module Specification Provides references to the documentation needed to create a conforming implementations of that specification. Module Impl Advertisement Defines an implementation of a module spec. Includes name, module spec Id, code, package and parameter fields which enable the peer to retrieve the data necessary to execute the advertisement.

26 Advertisements Rendezvous Advertisement Describes a peer that acts as a rendezvous. Peer Info Advertisement Describes peer info resources. Holds information about the current state of a peer.

27 Quick JXTA Demo Demo will do the following: Make advertisements. Publish the Advertisements. Discover the advertisement. Use the advertised pipe to send a file from peer to peer.

28 Demo Start 3 jxta shells on the same machine. Make one jxta shell the rendezvous peer. Make the other two use the rdv peer. Test peer discovery. Examine the peer advertisement. Make a Pipe advertisement (from sh2) p = mkadv p pipename publish d p inpipe = mkpipe i p

29 Demo From shell 3 discover the pipe search r #send out discovery request search #see what arrived in cache cat advxx #Examine the pipe advertisement outpipe = mkpipe o advxx # make outpipe Make a message to send importfile f data mydata #Create data object put mymsg mytag mydata #assign data tag cat mymsg #examine the message

30 Demo Send message through pipe (sh3): send outpipe mymsg Read from other end of pipe (sh2): newmsg = recv inpipe #blocking read cat newmsg #see what you got newdata = get newmsg mytag #extract data cat newdata #see what you got

31 Note Asynchronous programming model Results are cached and cache is queried. Mailbox like message delivery Advertisements are persistent. Some amount of configuration necessary. You can extend the shell and add new commands to it. Conversely, you can imbed jxta into another shell (tcl/tk).

32 JXTA Protocols Allow Peers to dynamically route messages to any other peer in the network, potentially traversing firewalls. Allow Peers advertise their resources and discover resources. Peers can co-operate to form self-organized and self configured peer-groups independent of their positions in the network ( edges, firewalls, NATS, Public vs. Private Addresses), without the need for a centralized management infrastructure.

33 Protocols Peer Discovery Protocol - find peers, groups, advertisements Peer Information Protocol - learn peers status/properties Peer Membership Protocol - sign in, sign out, authentication Pipe Binding Protocol - pipe advertisement to pipe endpoint Peer Resolver Protocol - send/receive search queries Endpoint Routing Protocol - available routes to destination

34 JXTA Protocol Stack Peer Disc Peer Info Via Peer Rslv Via Peer Rslv Peer Disc Peer Info Pipe Bind Via Peer Rslv Pipe Bind Peer Rslv Via Peer Rslv Peer Rslv Rendezvous Via Endpt. Routing Rendezvous Peer Endpt Routing Via Network Transport Peer Endpt Routing Network Transport Network Transport

35 Animation of Scenarios Advertisement Animation Connection Scenarios

36 Peer Discovery Protocol (PDP) Peers publish advertisements and discover about resources using advertisements. Every peer resource is described and published using an advertisement. Advertisements are XML meta data that describe resources.

37 Peer Information Protocol Once a peer is located, its capabilities and status may be queried. PIP ping sent to a peer to check if the peer is alive and to get info about the peer. Peer Info message used to respond to a ping

38 Peer Resolver Protocol (PRP) Enables Peer to send generic query requests to other peers and identify matching responses. Query requests can be sent to specific peer or can be propagated via rendezvous service within the scope of a peer group. PIP and PDP built using PRP.

39 Pipe Binding Protocol (PBP) Used by peer group members to bind a pipe advertisement to a pipe endpoint. Pipe is an abstract named message queue supporting open/resolve (bind), close (unbind), delete, send and receive. Pipe IDs are unique. PBP message sent to find a pipe endpoint bound to the same pipe advertisement.

40 Endpoint Routing Protocol A protocol that allows an endpoint to discover a route (sequence of hops) used to send a message to another peer. If there is no direct route then the peer If there is no direct route then the peer needs to find an intermediate peer or set of peers to route the message.

41 Rendezvous Protocol (RVP) A mechanism by which peers can subscribe to a propagation service. Within a peer group peers can be Rendezvous peers or listening to RDV peers. RVP is used by PRP and PBP in order to propagate messages.

42 Network Architecture JXTA Peers have different capabilities: Micro Peer, Standard Peer, Super Peer, Rendezvous peer. Minimal Edge Peer: Device with minimal capability. Must implement the Peer Resolver Protocol and Endpoint Routing Protocol. Full Featured Edge Peer Will Cache advertisements.

43 Network Architecture Rendezvous Peer: RDV peer forwards advertisements. Peers seek RDV peers in their peer groups. Discovery requests are forwarded through RDV peers Relay Peer: Maintains information about routes to other peers and routes messages to them. Forward messages on behalf of peers that cannot directly access another peer.

44 Discovery Service Retrieve Remote / Local Advertisements Application can dispatch queries using getlocal/remote Advertisements to fetch advertisements. Publish Advertisements Locally Publish Advertisements remotely Flush local advertisements. Informs the application through an asynchronous Listener Interface. Delivers discovery event when a query is processed.

45 Resolver Service Encapsulates the Resolver Protocol and hides its complexity. Discovery Service uses the resolver service. Resolver Service needs two types of messages: Resolver query message and Response message. Developer can create a Resolver Query message at any time and send query to a specific Resolver handler on a remote peer. Developer can register a query handler for a resolver query for a given handler name.

46 Shared Distributed Index (SRDI) Optimization to reduce the number of messages for search. When edge peers publish new advertisements, they use the SRDI service to push advertisement indexes to the Rendezvous peer. Queries are only propagated to RDV peers.

47 Firewalls and NATs Firewalls offend and defend the nation s IT infrastructure. Firewall traversal depends upon the existence of a RDV peer that both communicating parties can contact. Assumption Firewall allows HTTP through. Use polling to pipeline the message through the firewall. Ugly but effective solution.

48 Security Requirements Confidentiality contents of a message are not divulged. Authentication guarantees a sender is who he claims to be Authorization Sender is authorized to send the message. Integrity- Message was not modified in transit. Refutability guard against replay attack.

49 JXTA Security Peer group is a web of trust Group can have an authentication method for allowing peers to join the group. Authentication method using X.509v3 certificates: Peer must have X509 root cert of any peer with which it wishes to communicate securely When peer joins the PG, it receives PG creator s Root cert under TLS Certificate Service Request is used to acquire group membership cert. Peers can authenticate each other using the group membership certificate.

50 Virtual TLS JXTA pipe might span multiple relays. When a JXTA secure pipe is created and the associated endpoints are resolved, an end to end TLS channel is created. Independent of the relays and underlying physical transport. Peer certificates are exchanged and verified during initialization of the secure pipe. Peer certificates are digitally signed by the JXTA platform. JXTA creates a self signed root certificate and issues a peer certificate based on that root certificate.

51 Security XML meta data in advertisements provide Credentials, Certificates, Digests and Public Keys. Credential token that can be used to identify the sender. Credentials are used for authorization and authentication. Message can be encrypted/decrypted using private/public key pairs. Certificates are distributed using TLS.

52 JXTA Security API API are based on the JAVA Smart Card API. JXTA API does not provide support for key distribution. Provides support for cypher / decypher, hash computation and digital signature.

53 JXTA based Grid Broker Service Broker matches jobs to available resources broker Res. Avail Adv Job Adv Resource or User Registration Peer Advertisements User wants to submit the job to broker Job Advertisement Broker matches jobs and resource Pipe Message sent back to User Job Submission Using Pipe to send the job to resource Resource Adv User Adv JOB Resource Discover Pipe Publish

54 JXTA XML RPC and JXTA SOAP SOAP Simple Object Access Protocol. Tunnel XML RPC (lightweight SOAP) or SOAP on JXTA Pipes. Allow users to build and publish web services in a firewall-controlled environment. Free the web from the tyranny of system administrators. Everybody can run a web server like in the good old days!

55 Voice Over P2P Try to stream voice over JXTA pipes. Why? Firewalls. Advantages Instant deployment No need for complex protocol (RADIUS/DIAMETER whatnot). Disadvantages: Voice quality will likely be bad. People will tolerate bad quality for convenience.

56 Project Ideas (discussion) Measurements of peer to peer protocol performance. A simulation of JXTA vs other P2P protocols: Decentralization and timeouts means inconsistencies in application state are possible. How to tune cache advertisement timeouts. The variation of responsiveness and peer discovery with group size (what is the latency of finding a pipe or advertisement as a function of network parameters).

57 Project Ideas (discussion) Firewalls are here to stay: Firewalls are a huge barrier for IP Telephony. Effective FW solution is a huge win (see over downloads of the beta client in a single day).

58 Project Ideas (discussion) JXTA allows P2P interaction through firewalls: What bandwidth/delay characteristics can we expect. How can we bridge between SIP/SDP (which specifies RTP parameters) and JXTA? Can we build a gateway which will allow you to do voice calls through a SIP phone using JXTA as a transport for everything (signaling and voice)? If so you can use your MSN messenger or SIP phone through a FW and deployment would be easy (could be an applet). What performance can you expect?

59 JXTA vs. JINI Language dependence JXTA is XML based. JINI relies on java object serialization. JXTA protocols are language independent. Centralization JXTA assumes no centralization (well, except for the RDV peers??). JINI uses a centralized service location broker.

60 Material for this talk JXTA Protocol Specification JXTA Programmers Reference JXTA in a Nutshell by Scott Oaks, Bernard Travesat and Li Gong O Reilly publishing JXTA by Brendon Wilson New Riders Publishing ( Free PDF available from )

JXTA TM Technology for XML Messaging

JXTA TM Technology for XML Messaging JXTA TM Technology for XML Messaging OASIS Symposium New Orleans, LA 27-April-2004 Richard Manning Senior Software Architect Advanced Technology & Edge Computing Center Sun Microsystems Inc. www.jxta.org

More information

Presented By: Niharjyoti Sarangi

Presented By: Niharjyoti Sarangi Presented By: Niharjyoti Sarangi 1. 2. 3. 4. 5. 6. 7. 8. INTRODUCTION WHAT & WHY KEY FEATURES JXTA ARCHITECTURE JXTA LAYERS JXTA JARGONS JXTA PROTOCOLS JXTA SHELLS JXTA ADVANTAGES 2 AN OPEN P2P PROTOCOL

More information

1 JXTA v2.3.x: Java Programmer s Guide

1 JXTA v2.3.x: Java Programmer s Guide JXTA v2.3.x: Java Programmer s Guide 1 JXTA v2.3.x: Java Programmer s Guide Apr 7, 2005 2005 Sun Microsystems, Inc. All rights reserved. Sun, Sun Microsystems, the Sun Logo, and Java are trademarks, registered

More information

Project JXTA Technology Overview.

Project JXTA Technology Overview. Project JXTA Technology Overview www.jxta.org The Time Is Right for P2P and Project JXTA Peer-to-Peer (P2P) is not new. However, the time is now right for the broad P2P applications deployment. The Project

More information

JXTA: A Self-Adaptive Framework for Building P2P Systems

JXTA: A Self-Adaptive Framework for Building P2P Systems JXTA: A Self-Adaptive Framework for Building P2P Systems Bemnet Tesfaye Merha and Benoit Landrieu {merha, landrieu}@stud.ntnu.no Technical Essay in TTM3 Design of Self-Adaptive Systems Norwegian University

More information

Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma. Distributed and Agent Systems

Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma. Distributed and Agent Systems Agent and Object Technology Lab Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma Distributed and Agent Systems Peer-to-Peer Systems & JXTA Prof. Agostino Poggi What is Peer-to-Peer

More information

The time is right for P2P and Project JXTA

The time is right for P2P and Project JXTA Introduction 1-1 The time is right for P2P and Project JXTA Peer to Peer (P2P) is not new. However, the time is now right for the broad P2P applications deployment. The Project JXTA technology lets developers

More information

JXTA Java Standard Edition v2.5: Programmers Guide. September 10th, JXSE 2.5 Programmers Guide :

JXTA Java Standard Edition v2.5: Programmers Guide. September 10th, JXSE 2.5 Programmers Guide : JXTA Java Standard Edition v2.5: Programmers Guide September 10th, 2007 JXSE 2.5 Programmers Guide : 1 2002-2007 Sun Microsystems, Inc. All rights reserved. Sun, Sun Microsystems, the Sun Logo, and Java

More information

Project JXTA Technology Overview

Project JXTA Technology Overview Project JXTA Technology Overview Dr Simon See Technical Director Asia Pacific Science & Technology Center Sun Microsystems Inc. www.jxta.org The Time Is Right for P2P and Project JXTA Peer-to-Peer (P2P)

More information

JXTA v2.0 Protocols Specification i. JXTA v2.0 Protocols Specification

JXTA v2.0 Protocols Specification i. JXTA v2.0 Protocols Specification i JXTA v2.0 Protocols Specification ii Copyright 2001, 2002, 2005, 2006, 2007 Sun Microsystems Inc. Copyright 2002, 2003, 2004 The Internet Society. All Rights Reserved. This document and translations

More information

Project JXTA: Getting Started

Project JXTA: Getting Started Project JXTA: Getting Started Getting started with JXTA is simple. If you're reading this, you probably have already been to the Project JXTA website at http://www.jxta.org. If not, check it out first,

More information

Project JXTA Guide to a peer-to-peer framework (Part 2)

Project JXTA Guide to a peer-to-peer framework (Part 2) Project JXTA Guide to a peer-to-peer framework (Part 2) Ekaterina Chtcherbina Siemens AG, Corporate Technology Munich Thomas Wieland Siemens AG, Munich University of Applied Sciences, Coburg Agenda (part

More information

JXTA technology for P2P : Project JXTA and its implications

JXTA technology for P2P : Project JXTA and its implications JXTA technology for P2P : Project JXTA and its implications Sudhindra Rao 11/03/03 Abstract Peer-to-peer(P2P) systems are emerging as the latest alternative to perform distributed computing which includes

More information

JXTA for J2ME Extending the Reach of Wireless With JXTA Technology

JXTA for J2ME Extending the Reach of Wireless With JXTA Technology JXTA for J2ME Extending the Reach of Wireless With JXTA Technology Akhil Arora Carl Haywood Kuldip Singh Pabla Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA 650 960-1300 The Wireless

More information

AGENT EXTENSIONS FOR PEER-TO-PEER NETWORKS. Kalyan Valiveti, B.E. Thesis prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS

AGENT EXTENSIONS FOR PEER-TO-PEER NETWORKS. Kalyan Valiveti, B.E. Thesis prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS AGENT EXTENSIONS FOR PEER-TO-PEER NETWORKS Kalyan Valiveti, B.E. Thesis prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS December 2003 APPROVED: Paul Tarau, Major Professor Robert

More information

Exploiting peer group concept for adaptive and highly available services

Exploiting peer group concept for adaptive and highly available services Computing in High Energy and Nuclear Physics, 24-28 March 2003 La Jolla California 1 Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear

More information

Last Class: RPCs and RMI. Today: Communication Issues

Last Class: RPCs and RMI. Today: Communication Issues Last Class: RPCs and RMI Case Study: Sun RPC Lightweight RPCs Remote Method Invocation (RMI) Design issues Lecture 9, page 1 Today: Communication Issues Message-oriented communication Persistence and synchronicity

More information

A PROPOSAL OF USER AUTHENTICATION AND A CONTENT DISTRIBUTION MECHANISM USING P2P CONNECTION OVER A MOBILE AD HOC NETWORK

A PROPOSAL OF USER AUTHENTICATION AND A CONTENT DISTRIBUTION MECHANISM USING P2P CONNECTION OVER A MOBILE AD HOC NETWORK A PROPOSAL OF USER AUTHENTICATION AND A CONTENT DISTRIBUTION MECHANISM USING P2P CONNECTION OVER A MOBILE AD HOC NETWORK Masato Oguchi, Yoshiko Nakatsuka y, and Chiho Tomizawa z Department of Information

More information

Distributed Systems TD6 : Introduction to JXTA. The JXTA Shell

Distributed Systems TD6 : Introduction to JXTA. The JXTA Shell Distributed Systems TD6 : Introduction to JXTA Bogdan.Pasca @ens-lyon.fr 30 October 2009 The JXTA shell is a command-line interface to Sun s JXTA peer-to-peer framework. It is used to prove the concepts

More information

A Survey of P2P Middlewares

A Survey of P2P Middlewares A Survey of P2P Middlewares Atul Singh and Mads Haahr Distributed Systems Group, Department of Computer Science. Trinity College, Dublin Atul.Singh@cs.tcd.ie, Mads.Haahr@cs.tcd.ie, WWW home page: http://www.dsg.cs.tcd.ie

More information

On the Creation & Discovery of Topics in Distributed Publish/Subscribe systems

On the Creation & Discovery of Topics in Distributed Publish/Subscribe systems On the Creation & Discovery of Topics in Distributed Publish/Subscribe systems Shrideep Pallickara, Geoffrey Fox & Harshawardhan Gadgil Community Grids Lab, Indiana University 1 Messaging Systems Messaging

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

P2PSIP, ICE, and RTCWeb

P2PSIP, ICE, and RTCWeb P2PSIP, ICE, and RTCWeb T-110.5150 Applications and Services in Internet October 11 th, 2011 Jouni Mäenpää NomadicLab, Ericsson Research AGENDA Peer-to-Peer SIP (P2PSIP) Interactive Connectivity Establishment

More information

WWW, REST, and Web Services

WWW, REST, and Web Services WWW, REST, and Web Services Instructor: Yongjie Zheng Aprile 18, 2017 CS 5553: Software Architecture and Design World Wide Web (WWW) What is the Web? What challenges does the Web have to address? 2 What

More information

Realtime Multimedia in Presence of Firewalls and Network Address Translation

Realtime Multimedia in Presence of Firewalls and Network Address Translation Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Oct, 2017 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or

More information

Realtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015

Realtime Multimedia in Presence of Firewalls and Network Address Translation. Knut Omang Ifi/Oracle 9 Nov, 2015 Realtime Multimedia in Presence of Firewalls and Network Address Translation Knut Omang Ifi/Oracle 9 Nov, 2015 1 Overview Real-time multimedia and connectivity Mobile users (roaming between devices) or

More information

Parameter Tuning of JXTA-based P2P Platforms

Parameter Tuning of JXTA-based P2P Platforms 2009 International Conference on Network-Based Information Systems Parameter Tuning of JXTA-based P2P Platforms Fatos Xhafa Dept. of Languages and Informatics Systems Technical University of Catalonia

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

JXTA. Master 2 IFI: Peer to Peer. Julian Monteiro. Project Mascotte CNRS/INRIA/Univ. of Nice-Sophia

JXTA. Master 2 IFI: Peer to Peer. Julian Monteiro. Project Mascotte CNRS/INRIA/Univ. of Nice-Sophia JXTA Master 2 IFI: to Julian Monteiro Project Mascotte CNRS/INRIA/Univ. of Nice-Sophia Acknowledgements Bernard Traversat, Project JXTA, Sun Microsystems Gabriel Antoniu, IRISA/INRIA Rennes SébasEen Monnet,

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

CA464 Distributed Programming

CA464 Distributed Programming 1 / 25 CA464 Distributed Programming Lecturer: Martin Crane Office: L2.51 Phone: 8974 Email: martin.crane@computing.dcu.ie WWW: http://www.computing.dcu.ie/ mcrane Course Page: "/CA464NewUpdate Textbook

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition. Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction

Distributed Systems Principles and Paradigms. Chapter 01: Introduction Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter

More information

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson HIP Host Identity Protocol October 2007 Patrik Salmela Ericsson Agenda What is the Host Identity Protocol (HIP) What does HIP try to solve HIP basics Architecture The HIP base exchange HIP basic features

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

GLOBUS TOOLKIT SECURITY

GLOBUS TOOLKIT SECURITY GLOBUS TOOLKIT SECURITY Plamen Alexandrov, ISI Masters Student Softwarepark Hagenberg, January 24, 2009 TABLE OF CONTENTS Introduction (3-5) Grid Security Infrastructure (6-15) Transport & Message-level

More information

An infrastructure-less peer-to-peer framework for mobile handheld devices

An infrastructure-less peer-to-peer framework for mobile handheld devices An infrastructure-less peer-to-peer framework for mobile handheld devices Mario Bisignano, Giuseppe Di Modica, Orazio Tomarchio Dipartimento di Ingegneria Informatica e delle Telecomunicazioni Università

More information

Peer-to-Peer XML. Presented By: Vasu Sathu 11/11/02

Peer-to-Peer XML. Presented By: Vasu Sathu 11/11/02 Peer-to-Peer XML Presented By: Vasu Sathu 11/11/02 1 Overview Introduction to P2P Applications of P2P Security Issues in P2P Future Aspects Conclusion 2 1 Introduction to P2P Definition: P2P is about unifying

More information

Elizabeth G. Idhaw, Lucas M. Lam, Dylan Pecelli, and Steven V. Pizzi. The MITRE Corporation 202 Burlington Road Bedford, MA 01730

Elizabeth G. Idhaw, Lucas M. Lam, Dylan Pecelli, and Steven V. Pizzi. The MITRE Corporation 202 Burlington Road Bedford, MA 01730 Version 14, 12 April 2006 POLICY-BASED MANAGEMENT OF THE FUTURE AIRBORNE NETWORK VIA PEER-TO-PEER NETWORKING Elizabeth G. Idhaw, Lucas M. Lam, Dylan Pecelli, and Steven V. Pizzi The MITRE Corporation 202

More information

Chapter 18 Distributed Systems and Web Services

Chapter 18 Distributed Systems and Web Services Chapter 18 Distributed Systems and Web Services Outline 18.1 Introduction 18.2 Distributed File Systems 18.2.1 Distributed File System Concepts 18.2.2 Network File System (NFS) 18.2.3 Andrew File System

More information

CS603: Distributed Systems

CS603: Distributed Systems CS603: Distributed Systems Lecture 2: Client-Server Architecture, RPC, Corba Cristina Nita-Rotaru Lecture 2/ Spring 2006 1 ATC Architecture NETWORK INFRASTRUCTURE DATABASE HOW WOULD YOU START BUILDING

More information

THE JXTA SERVICE IS MANAGED WITHIN SNMP AGENTX

THE JXTA SERVICE IS MANAGED WITHIN SNMP AGENTX 95.495 Final Report THE JXTA SERVICE IS MANAGED WITHIN SNMP AGENTX Qiang Luo 277918 Supervisor: Tony White August 12th, 2004 1 Acknowledgements I would like to thank Dr. Tony White, of the School of Computer

More information

Cisco TelePresence Conductor with Cisco Unified Communications Manager

Cisco TelePresence Conductor with Cisco Unified Communications Manager Cisco TelePresence Conductor with Cisco Unified Communications Manager Deployment Guide XC2.2 Unified CM 8.6.2 and 9.x D14998.09 Revised March 2014 Contents Introduction 4 About this document 4 Further

More information

Communication Paradigms

Communication Paradigms Communication Paradigms Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Interprocess Communication Direct Communication: Sockets Indirect Communication: IP Multicast 2. High Level Communication

More information

Communication. Overview

Communication. Overview Communication Chapter 2 1 Overview Layered protocols Remote procedure call Remote object invocation Message-oriented communication Stream-oriented communication 2 Layered protocols Low-level layers Transport

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

Advanced Resource Connector Information System

Advanced Resource Connector Information System TARTU UNIVERSITY FACULTY OF MATHEMATICS AND INFORMATICS Institute of Computer Science Chair of Distributed Systems Aleksei Nazarov Advanced Resource Connector Information System Master thesis (40 AP) Supervisors:

More information

Chapter 5.6 Network and Multiplayer

Chapter 5.6 Network and Multiplayer Chapter 5.6 Network and Multiplayer Multiplayer Modes: Event Timing Turn-Based Easy to implement Any connection type Real-Time Difficult to implement Latency sensitive 2 Multiplayer Modes: Shared I/O Input

More information

Self-organized, Fault Tolerant, Peer-to-Peer Management of SNMP Devices. By: Michael Da Silva

Self-organized, Fault Tolerant, Peer-to-Peer Management of SNMP Devices. By: Michael Da Silva Self-organized, Fault Tolerant, Peer-to-Peer Management of SNMP Devices By: Michael Da Silva 100286974 Carleton University COMP 4905 Honour s Project Supervisor: Dr. Tony White, School of Computer Science

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

GT-OGSA Grid Service Infrastructure

GT-OGSA Grid Service Infrastructure Introduction to GT3 Background The Grid Problem The Globus Approach OGSA & OGSI Globus Toolkit GT3 Architecture and Functionality: The Latest Refinement of the Globus Toolkit Core Base s User-Defined s

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.

More information

Communication. Distributed Systems Santa Clara University 2016

Communication. Distributed Systems Santa Clara University 2016 Communication Distributed Systems Santa Clara University 2016 Protocol Stack Each layer has its own protocol Can make changes at one layer without changing layers above or below Use well defined interfaces

More information

Time and Space. Indirect communication. Time and space uncoupling. indirect communication

Time and Space. Indirect communication. Time and space uncoupling. indirect communication Time and Space Indirect communication Johan Montelius In direct communication sender and receivers exist in the same time and know of each other. KTH In indirect communication we relax these requirements.

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

describe the functions of Windows Communication Foundation describe the features of the Windows Workflow Foundation solution

describe the functions of Windows Communication Foundation describe the features of the Windows Workflow Foundation solution 1 of 9 10/9/2013 1:38 AM WCF and WF Learning Objectives After completing this topic, you should be able to describe the functions of Windows Communication Foundation describe the features of the Windows

More information

Using peer to peer. Marco Danelutto Dept. Computer Science University of Pisa

Using peer to peer. Marco Danelutto Dept. Computer Science University of Pisa Using peer to peer Marco Danelutto Dept. Computer Science University of Pisa Master Degree (Laurea Magistrale) in Computer Science and Networking Academic Year 2009-2010 Rationale Two common paradigms

More information

05 Indirect Communication

05 Indirect Communication 05 Indirect Communication Group Communication Publish-Subscribe Coulouris 6 Message Queus Point-to-point communication Participants need to exist at the same time Establish communication Participants need

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Support Infrastructure Support infrastructure for application layer Why? Re-usability across application layer protocols Modularity (i.e. separation between application layer protocol specification /

More information

DS 2009: middleware. David Evans

DS 2009: middleware. David Evans DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between

More information

Exam : Composite Exam. Title : Version : Demo

Exam : Composite Exam. Title : Version : Demo Exam : 642-892 Title : Composite Exam Version : Demo 1. If no metric is specified for the routes being redistributed into IS-IS, what metric value is assigned to the routes? A. 0 B. 1 C. 10 D. 20 Answer:A

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Internet Technology 3/2/2016

Internet Technology 3/2/2016 Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology

More information

Middleware. Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004

Middleware. Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004 Middleware Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004 Outline Web Services Goals Where do they come from? Understanding middleware Middleware as infrastructure Communication

More information

On the Internet, nobody knows you re a dog.

On the Internet, nobody knows you re a dog. On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing

More information

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Fred Detienne, Cisco Systems Manish Kumar, Cisco Systems Mike Sullenberger, Cisco Systems What is Dynamic Mesh VPN? DMVPN is a solution for building VPNs

More information

VoIP Security Threat Analysis

VoIP Security Threat Analysis 2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service

More information

Web Services & Axis2. Architecture & Tutorial. Ing. Buda Claudio 2nd Engineering Faculty University of Bologna

Web Services & Axis2. Architecture & Tutorial. Ing. Buda Claudio 2nd Engineering Faculty University of Bologna Web Services & Axis2 Architecture & Tutorial Ing. Buda Claudio claudio.buda@unibo.it 2nd Engineering Faculty University of Bologna June 2007 Axis from SOAP Apache Axis is an implementation of the SOAP

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

Thebes, WS SAML, and Federation

Thebes, WS SAML, and Federation Thebes, WS SAML, and Federation Internet2 Fall Member Meeting November 3, 2010 Thebes Consortium Georgetown University Arnie Miles adm35@georgetown.edu http://code.google.com/p/thebes/ Back story I haven't

More information

Chapter 13: Architecture Patterns

Chapter 13: Architecture Patterns Chapter 13: Architecture Patterns SAiP Chapter 13 J. Scott Hawker/R. Kuehl p. 1 Len Bass, Paul Clements, Rick Kazman, Topics What is a Pattern? Pattern Catalog Module patterns Component and Connector Patterns

More information

COLLABORATIVE FILE SHARING SYSTEM USING JXTA P2P NETWORKING INFRASTRUCTURE AN APPLICATION DEVELOPMENT

COLLABORATIVE FILE SHARING SYSTEM USING JXTA P2P NETWORKING INFRASTRUCTURE AN APPLICATION DEVELOPMENT Journal of Environmental Engineering & Sustainable Technology JEEST http://jeest.ub.ac.id COLLABORATIVE FILE SHARING SYSTEM USING JXTA P2P NETWORKING INFRASTRUCTURE AN APPLICATION DEVELOPMENT Kasyful Amron

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

Indirect Communication

Indirect Communication Indirect Communication Vladimir Vlassov and Johan Montelius KTH ROYAL INSTITUTE OF TECHNOLOGY Time and Space In direct communication sender and receivers exist in the same time and know of each other.

More information

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00

F O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00 F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...

More information

F5 DDoS Hybrid Defender : Setup. Version

F5 DDoS Hybrid Defender : Setup. Version F5 DDoS Hybrid Defender : Setup Version 13.1.0.3 Table of Contents Table of Contents Introducing DDoS Hybrid Defender... 5 Introduction to DDoS Hybrid Defender...5 DDoS deployments... 5 Example DDoS Hybrid

More information

Configure Centralized Deployment

Configure Centralized Deployment Centralized Deployment Overview, on page 1 Centralized Deployment Prerequisites, on page 4 Centralized Deployment Configuration Task Flow, on page 6 Centralized Deployment Field Descriptions, on page 16

More information

Grid Computing: SGE,Jxta and Jini

Grid Computing: SGE,Jxta and Jini Grid Computing: SGE,Jxta and Jini Dr Simon See Director High Performance Computing Technology Adjunct Associate Professor, Nanyang Technological University 1 2 3 4 Department Grid Campus Grid Research

More information

COMMUNICATION PROTOCOLS

COMMUNICATION PROTOCOLS COMMUNICATION PROTOCOLS Index Chapter 1. Introduction Chapter 2. Software components message exchange JMS and Tibco Rendezvous Chapter 3. Communication over the Internet Simple Object Access Protocol (SOAP)

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is

More information

Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents

Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Introduction... 2 High-Level Platform Architecture Diagram... 3 Zbi Production Environment... 4 Zbi Publishing Engine...

More information

PEER-TO-PEER SUPPORT FOR MATLAB-STYLE COMPUTING. A Thesis RAJEEV AGRAWAL

PEER-TO-PEER SUPPORT FOR MATLAB-STYLE COMPUTING. A Thesis RAJEEV AGRAWAL PEER-TO-PEER SUPPORT FOR MATLAB-STYLE COMPUTING A Thesis by RAJEEV AGRAWAL Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree

More information

(9A05803) WEB SERVICES (ELECTIVE - III)

(9A05803) WEB SERVICES (ELECTIVE - III) 1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

Request for Comments: 3989 Category: Informational T. Taylor Nortel February Middlebox Communications (MIDCOM) Protocol Semantics

Request for Comments: 3989 Category: Informational T. Taylor Nortel February Middlebox Communications (MIDCOM) Protocol Semantics Network Working Group Request for Comments: 3989 Category: Informational M. Stiemerling J. Quittek NEC T. Taylor Nortel February 2005 Status of This Memo Middlebox Communications (MIDCOM) Protocol Semantics

More information

Sample excerpt. Virtual Private Networks. Contents

Sample excerpt. Virtual Private Networks. Contents Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................

More information

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. NCP Secure Enterprise Mac Client Service Release 2.05 Build 14711 Date: December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this

More information

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO

Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some

More information

Communication. Distributed Systems IT332

Communication. Distributed Systems IT332 Communication Distributed Systems IT332 2 Outline Fundamentals Layered network communication protocols Types of communication Remote Procedure Call Message Oriented Communication Multicast Communication

More information

Vlad Vinogradsky

Vlad Vinogradsky Vlad Vinogradsky vladvino@microsoft.com http://twitter.com/vladvino Commercially available cloud platform offering Billing starts on 02/01/2010 A set of cloud computing services Services can be used together

More information

This chapter describes how to configure the Cisco ASA to use the multicast routing protocol.

This chapter describes how to configure the Cisco ASA to use the multicast routing protocol. This chapter describes how to configure the Cisco ASA to use the multicast routing protocol. About, page 1 Guidelines for, page 4 Enable, page 4 Customize, page 5 Monitoring for PIM, page 16 Example for,

More information