CALIFORNIA SOFTWARE LABS

Size: px
Start display at page:

Download "CALIFORNIA SOFTWARE LABS"

Transcription

1 UPnP,Jini and Salutation - A look at some popular coordination frameworks for future networked CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) Fax (925) info@cswl.com

2 UPnP,Jini and Salutation - A look at some popular coordination frameworks for future networked Technical Expertise Level : Intermediate Shelf Life : 6 months A Technical Report INDEX INTRODUCTION... 3 JINI... 4 JINI LOOKUP SERVICES... 5 EXPOSING INTERFACES... 5 JINI COORDINATION IN A NUTSHELL... 6 UNIVERSAL PLUG AND PLAY... 7 SERVICE DISCOVERY... 8 CONFIGURATION... 9 UPNP COORDINATION IN A NUTSHELL SALUTATION SERVICE DISCOVERY COMMUNICATION SALUTATION COORDINATION IN A NUTSHELL CONCLUSION CSWL Inc, Pleasanton, California - 2

3 INTRODUCTION With the world of specialized information appliances poised to take over the technology landscape in the coming years, coordination between devices has become a serious research issue. A number of architectures addressing mobile and specialized devices have emerged recently. These architectures are essentially coordination frameworks that propose certain ways and means of device interaction with the ultimate aim of simple, seamless and scaleable device inter-operability. Among the well known contenders, Universal Plug and Play ( Jini ( and Salutation ( architectures are prominent, coming primarily from the industry. There is also a great amount of active research happening "silently" in the academic world. Whichever gets to become standard(s), it will be useful to understand what these frameworks are all about. Device coordination essentially means providing a subset of the following capabilities to a device: Ability to announce its presence to the network. Automatic discovery of devices in the neighborhood and even those located remotely. Ability to describe its capabilities as well as query/understand the capabilities of other Self configuration without administrative intervention Seamless inter-operability with other devices wherever meaningful It is not easy for coordination frameworks to have much of a say on data communication protocols between This is because devices can be very specialized, following umpteen different data protocols. It will be tough for a CSWL Inc, Pleasanton, California - 3

4 framework to adapt them all into a standard. However, a coordination framework can make devices become aware of one another in sufficient detail. The intelligence within a device can decide whether it can or should talk to another device and also what protocol(s) to use. The framework can also provide protocol definitions in an attempt of standardization. It should be borne in mind that for any coordination framework to work, it MUST introduce some standards into the operations of the Otherwise the devices simply cannot coordinate. The essential problem here is maintaining a balance between standardization requirements and device autonomy. By device autonomy we mean the use of proprietary protocols and techniques and the need (marketbased or otherwise) to continue using them. As can be seen later in this article, Jini takes standardization to one extreme while UPnP takes autonomy to another extreme. Jini Jini from Sun Microsystems, underneath all the hype, is but a coordination framework evolved and adapted from academic research and tailored specifically to Java. The original inspiration comes from the works of David Gelernter (Yale University) and Nick Carriero who built the Linda coordination model using Tuple Spaces, about a decade ago. An inspired result was the JavaSpaces technology with its later evolution into Jini. Jini uses the term federation to imply coordination between A federation is a collection of autonomous devices which can become aware of one another and cooperate if need be. To facilitate this, a Jini subsystem constains a set of lookup services that maintain dynamic information about available These services are key to the proper functioning of the Jini subsystem. CSWL Inc, Pleasanton, California - 4

5 Jini Lookup Services Jini Lookup services must be running on a network for the concept to really work. Using well-defined protocols, devices can discover these key services and enter into a dialogue with them. Every device must discover one or more such lookup services before it can enter a federation. The location of these services could be known before hand, or they may be discovered using a multicast. (Note: multicast is a feature that allows controlled broadcast to a group of devices within a selected range. This range can potentially be the whole Internet or just the local LAN). It is possible to assign group names to lookup services so that a device may look for a specific group in its vacinity. For e.g. in a company, administrative decisions may force certain hardcopy devices to belong to some special group, with restricted access. Once a device has located a lookup service of interest it can now tell the service about itself (register), or query the service for information on other devices in the federation. When registering itself, it can associate a set of properties (name/value pairs) with this information which can be matched against queries from other Exposing Interfaces Now here comes an interesting part of Jini. During the registration process it is possible for a device to upload some Java code to the lookup service. This code is essentially a "proxy" that can be used to contact an interface on the device and invoke methods of that interface. So a querying device can automatically download this proxy and call methods inside our device. This is accomplished using Remote Method Invocation (RMI) in Java that allows a Java program to call a method in a remotely running Java program through some exposed interface. The main issue here is that both the devices must have Java embedded for this to work. However, it is possible to avoid the use of RMI and use the Jini lookup services simply to extract information about a device in question. A proprietary protocol can then be CSWL Inc, Pleasanton, California - 5

6 used to contact the device. In this case the lookup service is reduced to a directory service. The Jini lookup services can form an ensemble, passing on queries up a hierarchy for resolution. These services also try to make sure that they have an accurate snapshot of the current set of active This is done by providing registration leases with expiry. Devices should renew their leases periodically for the lookup services to maintain their registration information. Any information on devices which simply vanish without explicit de-registration will automatically be purged from the databases after the lease time expires. Jini Coordination in a Nutshell Announcing Presence: Unicast/Multicast to Jini lookup services and subsequent registration. Lease expiry also helps provide a more or less up-to-date status of the devices available. Discovering other devices: Querying lookup services with properties of devices of interest. Optionally download an RMI proxy to access the remote device Describing capabilities: Registration information can have attribute/value pairs that are amenable to querying. Device manufacturers can also come to agreement on the network interface methods to be supported via RMI so that after recognizing a device, the methods to invoke will be known. This needs some standardization. There are two phases here. Standardization of the registration information and then of the exposed RMI interfaces. Self configuration: Jini does not directly address this area. An IP device when plugged onto a network will have to be configured with an IP address, subnet mask and optionally a gateway and DNS server. From then on, the lookup services can be used. But the use of the Java platform means that it cannot directly interfere with the native operating system and its configuration. The AutoIP and Multicast DNS protocols used by UPnP can actually fit snugly into this void!! CSWL Inc, Pleasanton, California - 6

7 Invoking services: Java's no-need-for-drivers scenario is not as simple as it sounds. The methods in RMI interfaces to devices have to be well defined (a standard) for this to work. If all manufacturers of a certain device type agreed on a standard, then one piece of code that follows that standard would work for all (the proxy code in Java). Thus the driver will hopefully be reduced to one or more pieces of universal code in Java. This is essentially a trading of proprietary drivers for universal standards - not very easy to arrive at. There can be many reasons a device manufacturer would not like to switch to Java, performance being but one side issue. Even a java "bridge" to a proprietary protocol may not be acceptable. Security: Native to Java & RMI. Jini does not seem to define anything more. Transports: TCP/IP and proxies to other transports There are ways by which non-java devices can participate in a federation. This is essentially through the use of gateways/bridges/proxies (all meaning the same here) that do protocol translations. However, these are not attractive solutions, and would also introduce single point of failures on the network. More information on Jini can be found from online documents at Sun Microsystems ( Universal Plug and Play UPnP, pushed primarily by Microsoft, is a framework defined at a much lower level than Jini. Though it is considered at some levels to be a natural extension of Microsoft Plug and Play to the networking scenario, its implementation framework is so different from Microsoft Plug and Play, that the so-called "extension" becomes nothing other than an imagined concept. UPnP is a different beast altogether. If you do not have a "run-anywhere" solution like Java, then you must look towards leveraging code that is implemented almost anywhere. What better choice exists than the TCP/IP protocol suite? UPnP works primarily with these lower layer CSWL Inc, Pleasanton, California - 7

8 network protocols suite, implementing standards at this level instead of at the application level. This primarily involves additions to the suite, certain optional protocols which can be implemented natively by The keyword here is "natively". UPnP attempts to make sure that all device manufacturers can quickly adhere to the proposed standard without major hassles. It also makes sure that it will be able to ride the next generation Internet Protocol (IPv6) wave when it hits. By providing a set of defined network protocols, UPnP allows devices to build their own APIs that implement these protocols - in whatever language or platform they choose. As of this writing, the particulars of these protocols are still in a flux. Prototypes do exist. Draft versions are available on the Internet, primarily through pointers at and Microsoft. But we will take a look at the key ingredients that form the recipe of UPnP. Service Discovery UPnP uses a special protocol known as SSDP (Simple Service Discovery Protocol) that enables devices to announce their presence to the network as well as discover available This can work with or without a lookup (directory) service in between. If there is such a directory service (called a proxy) available on the network, then devices will use it, otherwise they will follow a proxy-less operation. This discovery protocol (SSDP) will use HTTP over both unicast and multicast UDP. This may sound surprising, since we are familiar with HTTP as a TCP protocol. However, the same data format can be followed in UDP as well, even in multicast. These protocols can be referred to as HTTPU (unicast UDP) and HTTPMU (Multicast UDP) respectively. The registration/query process will send and receive data in HTTP format, but having special semantics. An announcement message called ANNOUNCE and a query message called OPTIONS are embedded in HTML to facilitate this. CSWL Inc, Pleasanton, California - 8

9 A device joining the network can then send out a multicast ANNOUNCE - telling the world about itself. A directory service, if present can record it, or other devices may directly see this as well. The multicast is sent out on a reserved multicast channel (address) to which all devices must listen. The ANNOUNCE message must also contain a URI that identifies the resource (e.g. "dmtf:printer") and a URL to an XML file that provides a description of the announcing device. The latter essentially uses a style sheet tailored to various types of A query for device discovery can also be multicast (an OPTIONS message) - to which devices may respond directly, or it may be directed towards a directory service if present. Queries however do not seem to be very powerful. They do not seem to be targeted at the XML descriptions, but must use URIs like "/ietf/ipp/printer". The XML description is looked at only after discovery takes place. Configuration UPnP also addresses the problem of automatic assignment of IP addresses and DNS names to a device being plugged in. For these, a few more protocols are introduced. One way to assign an IP address is to look for a DHCP server on the network. If not present, then the device can choose an IP from a reserved IP address range known as the LINKLOCAL net (address range x.x?). It must use the ARP protocol to find an unused address in this range locally and assign to itself. This is known as AutoIP. Note that this is not a routable IP address and therefore packets will not cross gateways. If a DHCP server comes up anytime, the devices will attempt to switch their IP address (Easier said than done). To address issues in naming, a multicast DNS proposal has been drafted. This would allow plugged-in devices to a) discover DNS servers via multicast and also b) resolve DNS queries about itself via multicast. So when plugged into a network having no DNS servers locally, a device can send out a multicast packet and CSWL Inc, Pleasanton, California - 9

10 discover a remote DNS server and then use it for Internet name resolution (like resolving URLs). The device itself can optionally listen on the multicast channel and respond to queries for its own name! However no security issues seem to have been addressed by UPnP yet. Once the discovery process is through and the XML description of a device is received, proprietary protocols can take over in communicating with the UPnP Coordination in a NutShell Announcing presence: Use SSDP and Directory service proxies (optional) Discovering other devices: Listen to SSDP multicast channel directly or contact a directory service proxy. Describing capabilities: XML description of the device is made available at a specified URL. However, these are not amenable to queries during the discovery process. Simple URIs are used instead. Self configuration: This is primarily DHCP or AutoIP, and multicast DNS. Auto configuration seems to be the strongest feature of UPnP as yet. Invoking Services: UPnP does not address this area. Even though style sheets can describe device capabilities, it would still be difficult to talk to ANY device of the same class. E.g. sending a page to an HP printer or a Fujitsu printer would still need drivers even though both would fit in the same class (unless both support a protocol like the HP JetSend protocol or some other standard). By concentrating on base level discovery and device capability querying only, UPnP leaves a void in this area for future additions. Security: In progress. Transports: TCP/IP and proxies to other transports As in Jini, devices using other transport protocols may use UPnP through the use of proxies. Essentially, proxies sitting on the TCP/IP network can perform registration and discovery on behalf of such CSWL Inc, Pleasanton, California - 10

11 Salutation The Salutation coordination framework seems to be a more rigorous and useful framework from a coordination perspective than either Jini or UPnP. It seems to have drawn more from research on intelligent agents than other frameworks mentioned here. Salutation trods a middle way between device autonomy and standardization. This would allow many vendors to adapt many of their products more or less easily to the specification and inter-operate with one another. Service Discovery In Salutation, a device almost always talks directly to a Salutation Manager, which may be in the same device or located remotely. What we see is an ensemble of Salutation Managers (SLMs) that coordinate with one another. They act like agents that do everything on behalf of their clients. Even data transfer between devices, including those across different media and transports, is mediated through them. The framework provides call-backs into the devices to notify of events like data arriving or devices becoming unavailable. All registration is done with the local or nearest available SLM. SLMs discover other nearby SLMs and exchange registration information, even with those on different transport media. The latter is done using appropriate transport-dependent modules called Transport Managers which may use broadcast internally. Broadcast RPC is optionally used for this. The concept of a 'service' is broken down into a collection of Functional Units, each unit representing some essential feature (e.g., Fax, Print, Scan or even subfeatures like Rasterize). A service description is then a collection of functional unit CSWL Inc, Pleasanton, California - 11

12 descriptions, each having a collection of attribute records (name, value). These records can be queried and matched against during the service discovery process. Certain well defined comparison functions can be associated with a query that searches for a service. The discovery request is sent to the local SLM which in turn will be directed to other SLMs. SLMs talk to one another using Sun's ONC RPC (Remote Procedure Call). Salutation defines APIs for clients to invoke these operations and gather the results. Communication One of the key features that Salutation tries to provide is transport protocol independence. The communication between clients and functional units (services) can be in a number of ways. In the native mode these may use native protocols and talk to one another directly without the SLMs getting involved in data transfer. In the emulated mode, the SLMs will manage the session and act as a conduit for the data, delivering them as messages to either party. This provides something very important - transport protocol independence. In the salutation mode, SLMs not only carry the data, but also define the data formats to be used in the transmission. In this mode well-defined standards of interoperation with functional units are to be followed, allowing generic inter-operability. All communication in the latter two modes involve APIs and events which are well defined. Data descriptions follow a popular notation/encoding called ASN.1 (Abstract Syntax Notation One) from OSI. Instead of lease management, SLMs can be asked to periodically check the availability of functional units and report the status. This allows a client or functional unit (service) to become aware when either have left the scene. Salutation has already defined a number of Functional Units for various purposes like faxing and voice mail. These also allow the use of vendor specific features. The consortium seems to have taken great pains in defining acceptable (?) and general functional unit specifications. CSWL Inc, Pleasanton, California - 12

13 Salutation Coordination in a Nutshell Announcing Presence: Through cooperation between Salutation Managers (SLMs). Simply register with a known, probably local SLM. Discovering other devices: Send queries to the local SLM. SLMs coordinate and returns results Describing capabilities: Structured descriptions of services as functional units which in turn contain attribute records. Functional units identify "type" or "features" of a service. Attributes provide much more detail. All amenable to powerful queries. Standard functional unit definitions allow easier interoperability. Self configuration: Salutation does not address this issue. Being a transport independent framework, it would not be easy to provide a generic solution to this. In the area of IP networks, AutoIP and multicast DNS as used by UPnP is a possible candidate. Invoking Services: Flexible. Provides for vendor specific protocols, SLM managed sessions providing transport independence, as well as defined (standard) data and protocols for selected functional units. The defined APIs can be implemented on most platforms. Security: Salutation allows user authentication using a user-id and password scheme. It can also optionally provide any registered information about a caller to the callee. Transports: Transport independent architecture The need for proxying hardly exists in Salutation. SLMs are transport independent, this work being handled by Transport Managers that plug into the architecture. CSWL Inc, Pleasanton, California - 13

14 Conclusion This article attempts to take a close look at some popular emerging coordination frameworks of today. It tries to present some essential information to the reader for assessment. Though we feel that none among these is a real winner compared to the others in terms of features and functionality, the reader may have specific reasons in favoring one over the other. To us, it seems that the features of UPnP related to self-configuration are key ingredients that should be allowed into other frameworks as well. But it should also be mentioned that these features of UPnP are indeed addressed (if not fully) in the next generation Internet protocol (IPv6) and hence should be available to the other frameworks in the future. Again to us, as they stand today, Salutation seems to be a better defined and more viable architecture than the other contenders. But none of them are yet ready for popular consumption since the evolution to stabilization based on industry feedback will take time. And architectural ingenuity is not the sole recipe for success in the market. That said, we can expect many more changes and additions to these and other architectures in the near future, as they race towards creating a niche in the technology landscape Copyright Notice: 2002 California Software Labs. All rights Reserved. The contents on the document are not to be reproduced or duplicated in any form or kind, either in part or full, without the written permission of California Software labs. Product and company names mentioned here in are the trademarks of their respective companies. CSWL Inc, Pleasanton, California - 14

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS Wrapping Jini Services in ActiveX CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) 249 3000 Fax

More information

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS Using the JetSend SDK CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite 100 Pleasanton CA 94566, USA. Phone (925) 249 3000 Fax (925) 426

More information

Jini and Universal Plug and Play (UPnP) Notes

Jini and Universal Plug and Play (UPnP) Notes Jini and Universal Plug and Play () Notes Abstract Jini and are overlapping technologies. They both address the area of device connectivity and the ability to dynamically make use of new devices on the

More information

CptS 464/564 Lecture 18

CptS 464/564 Lecture 18 CptS 464/564 Lecture 18 2nd November 2004 Checkpoint What have we covered so far? Paradigms and Models: frameworks for the discussion of DS What is the plan ahead? Next: examples of distributed systems

More information

Service Discovery in the Future Electronic Market

Service Discovery in the Future Electronic Market From: AAAI Technical Report WS-00-04. Compilation copyright 2000, AAAI (www.aaai.org). All rights reserved. Service Discovery in the Future Electronic Market Harry Chen, Dipanjan Chakraborty, Liang Xu,

More information

The Jini architecture. Johan Petrini and Henning Sundvall

The Jini architecture. Johan Petrini and Henning Sundvall The Jini architecture Johan Petrini and Henning Sundvall Distributed Systems Fall 2002 Abstract A technology has been developed that exemplifies a new approach to the architecture of computing systems.

More information

A Tutorial on The Jini Technology

A Tutorial on The Jini Technology A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on The Jini Technology Lian Chen Introduction Jini network technology provides a simple

More information

Interoperability / Distribution. Fall 2005

Interoperability / Distribution. Fall 2005 Interoperability / Distribution 1 Interoperability - Introduction This section introduces some concepts and issues about interoperability, commonly used client server architectures, etc... Although not

More information

Middleware. Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004

Middleware. Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004 Middleware Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004 Outline Web Services Goals Where do they come from? Understanding middleware Middleware as infrastructure Communication

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

The Jini Architecture Bruno Souza Java Technologist, Sun Microsystems

The Jini Architecture Bruno Souza Java Technologist, Sun Microsystems The Jini Architecture Bruno Souza Java Technologist, Sun Microsystems J1-717, Jim Waldo 1 Why Jini Technology Network plug and work Enables a service-based architecture Spontaneous networking Erase the

More information

Jini Technology Overview

Jini Technology Overview Jini Technology Overview Bob Scheifler Senior Staff Engineer Sun Microsystems, Inc Talk outline very brief Jini overview Jini lookup service in some depth service types and type matching attributes and

More information

Standards,Tools, & Best Practices Editor: Sumi Helal University of Florida

Standards,Tools, & Best Practices Editor: Sumi Helal University of Florida Standards,Tools, & Best Practices Editor: Sumi Helal University of Florida helal@cise.ufl.edu Standards for Discovery and Delivery Sumi Helal, University of Florida For the past five years, competing industries

More information

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS Before you start Objectives: Familiarize yourself with the services such as File and Print, WWW, FTP, E- mail, Faxing, Remote Access, DHCP, DNS and WINS.

More information

Advanced Network Approaches for Wireless Environment

Advanced Network Approaches for Wireless Environment Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk

More information

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Distributed Systems 26. Mobile Ad Hoc Mesh Networks Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers

More information

Comparative Study of Service Discovery Protocols for ad-hoc Networks

Comparative Study of Service Discovery Protocols for ad-hoc Networks Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 156 Comparative Study of Service Discovery Protocols for

More information

Keywords: Service Discovery, SLP, Salutation, Bluetooth, UPnP, Jini, SLP-Jini, Salutation- Bluetooth, SLP-Salutation.

Keywords: Service Discovery, SLP, Salutation, Bluetooth, UPnP, Jini, SLP-Jini, Salutation- Bluetooth, SLP-Salutation. SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Ritesh Mehta Department of Computer Science and Engineering The University of Texas at Arlington mehta@cse.uta.edu Abstract Advent of mobile and wireless computing

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

SERVICE DISCOVERY IN MOBILE ENVIRONMENTS

SERVICE DISCOVERY IN MOBILE ENVIRONMENTS SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Nandini Ravi Department of Computer Science and Engineering University of Texas, Arlington nravi@cse.uta.edu Abstract Mobile computing and mobile devices such as

More information

A Load Balancing technique through Jini in Distributed Processing

A Load Balancing technique through Jini in Distributed Processing International Conference of Advance Research and Innovation (-2015) A Load Balancing technique through Jini in Distributed Processing Rajeev Sharma *, Rupak Sharma Department of Computer ScienceEngineering,

More information

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions

More information

Chapter 3: Naming Page 38. Clients in most cases find the Jini lookup services in their scope by IP

Chapter 3: Naming Page 38. Clients in most cases find the Jini lookup services in their scope by IP Discovery Services - Jini Discovery services require more than search facilities: Discovery Clients in most cases find the Jini lookup services in their scope by IP multicast/broadcast Multicast UDP for

More information

UPnP Services and Jini Clients

UPnP Services and Jini Clients UPnP Services and Jini Clients Jan Newmarch School of Network Computing Monash University jan.newmarch@infotech.monash.edu.au Abstract UPnP is middleware designed for network plug and play. It is designed

More information

Unit 28 Website Production ASSIGNMENT 1

Unit 28 Website Production ASSIGNMENT 1 Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web

More information

CSc Outline. Basics. What is DHCP? Why DHCP? How does DHCP work? DHCP

CSc Outline. Basics. What is DHCP? Why DHCP? How does DHCP work? DHCP CSc72010 DHCP Outline Basics Comer: Chapter 22 (Chapter 23 in the the 4 th edition) Peterson: Section 4.1.6 RFC 2131 What is DHCP? Dynamic Host Configuration Protocol: provides for configuring hosts that

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

A Custom Lookup Service for UPnP Services and Jini Clients

A Custom Lookup Service for UPnP Services and Jini Clients A Custom Lookup Service for UPnP Services and Jini Clients Jan Newmarch School of Network Computing Monash University jan.newmarch@infotech.monash.edu.au Abstract UPnP is middleware designed for network

More information

ICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington

ICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington ICENI: An Open Grid Service Architecture Implemented with Jini Nathalie Furmento, William Lee, Anthony Mayer, Steven Newhouse, and John Darlington ( Presentation by Li Zao, 01-02-2005, Univercité Claude

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols Network+ Guide to Networks 6 th Edition Chapter 4 Introduction to TCP/IP Protocols Objectives Identify and explain the functions of the core TCP/IP protocols Explain the TCP/IP model and how it corresponds

More information

LXI Developers Track - Implementing the LAN & Web Specification

LXI Developers Track - Implementing the LAN & Web Specification LXI Developers Track - Implementing the LAN & Web Specification Author: John Ryland Date: Oct 10 th 2007 Agenda Overview of the LAN & Web Working Group LXI specification overview with implementation highlights/details

More information

Overview of the Session Initiation Protocol

Overview of the Session Initiation Protocol CHAPTER 1 This chapter provides an overview of SIP. It includes the following sections: Introduction to SIP, page 1-1 Components of SIP, page 1-2 How SIP Works, page 1-3 SIP Versus H.323, page 1-8 Introduction

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

CMPE 151: Network Administration. Servers

CMPE 151: Network Administration. Servers CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response

More information

Service Discovery in Pervasive Computing Environments

Service Discovery in Pervasive Computing Environments Service Discovery in Pervasive Computing Environments Presented by Jamal Lewis and Shruti Pathak CS 570 Computer Networks Instructor Dr. Feng Zhu Introduction What is it? Pervasive Computing Environments

More information

5. Providing a narrower address space is the primary design goal for IPv6.

5. Providing a narrower address space is the primary design goal for IPv6. Chapter 2: IP Addressing and Related Topics TRUE/FALSE 1. IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network. T PTS: 1 REF: 59 2.

More information

Internet Technology 4/29/2013

Internet Technology 4/29/2013 Session Initiation Protocol (SIP) Internet Technology 14. VoIP and Traversal Paul Krzyzanowski Rutgers University Spring 2013 Dominant protocol for Voice over IP (VoIP) RFC 3261 llows a call to be established

More information

Distributed Systems/Middleware JavaSpaces

Distributed Systems/Middleware JavaSpaces Distributed Systems/Middleware JavaSpaces Alessandro Sivieri Dipartimento di Elettronica e Informazione Politecnico, Italy sivieri@elet.polimi.it http://corsi.dei.polimi.it/distsys Slides based on previous

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Dolby Conference Phone. Configuration guide for BT MeetMe with Dolby Voice

Dolby Conference Phone. Configuration guide for BT MeetMe with Dolby Voice Dolby Conference Phone Configuration guide for BT MeetMe with Dolby Voice Version 3.2 17 May 2017 Copyright 2017 Dolby Laboratories. All rights reserved. Dolby Laboratories, Inc. 1275 Market Street San

More information

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application

More information

Objectives. Connecting with Computer Science 2

Objectives. Connecting with Computer Science 2 Objectives Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar with Internet-related protocols Understand how the TCP/IP protocols relate to the Internet

More information

Dolby Conference Phone 3.1 configuration guide for West

Dolby Conference Phone 3.1 configuration guide for West Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San

More information

Design and Implementation of a Service Discovery Architecture in Pervasive Systems

Design and Implementation of a Service Discovery Architecture in Pervasive Systems Design and Implementation of a Service Discovery Architecture in Pervasive Systems Vincenzo Suraci 1, Tiziano Inzerilli 2, Silvano Mignanti 3, University of Rome La Sapienza, D.I.S. 1 vincenzo.suraci@dis.uniroma1.it

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

Distributed Technologies - overview & GIPSY Communication Procedure

Distributed Technologies - overview & GIPSY Communication Procedure DEPARTMENT OF COMPUTER SCIENCE CONCORDIA UNIVERSITY Distributed Technologies - overview & GIPSY Communication Procedure by Emil Vassev June 09, 2003 Index 1. Distributed Applications 2. Distributed Component

More information

WAP/ WML : Wireless Protocol wireless protocol

WAP/ WML : Wireless Protocol wireless protocol Device Connectivity Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity

More information

Wendy Lee CHAPTER 1 INTRODUCTION. Jini which is based on Java platform is a network technology from Sun

Wendy Lee CHAPTER 1 INTRODUCTION. Jini which is based on Java platform is a network technology from Sun An Introduction to the Madison Framework for Connecting JINI with Mobile Devices By Wendy Lee CHAPTER 1 INTRODUCTION 1.1 Background Jini which is based on Java platform is a network technology from Sun

More information

Service Provision in Ad Hoc Networks

Service Provision in Ad Hoc Networks Service Provision in Ad Hoc Networks Radu Handorean and Gruia-Catalin Roman Department of Computer Science Washington University Saint Louis, MO, 63130 {raduh, roman}@cs.wustl.edu Abstract. The client-server

More information

Page 1. Extreme Java G Session 8 - Sub-Topic 2 OMA Trading Services

Page 1. Extreme Java G Session 8 - Sub-Topic 2 OMA Trading Services Extreme Java G22.3033-007 Session 8 - Sub-Topic 2 OMA Trading Services Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Trading Services

More information

Jini Architecture Specification

Jini Architecture Specification Jini Architecture Specification A Jini system is a Java technology-centered, distributed system designed for simplicity, flexibility, and federation. The Jini architecture provides mechanisms for machines

More information

UPnP Device Architecture 1.0

UPnP Device Architecture 1.0 UPnP Device Architecture 1.0 Version 1.0.1, 06 May 2003 1999-2003 Contributing Members of the UPnP Forum. All rights reserved. UPnP is a certification mark of the UPnP Implementers Corporation. Table of

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide CCNET v6 1 Chapter 3: Network Protocols and Communications CCENT Routing

More information

UPnP Design by Example

UPnP Design by Example UPnP Design by Example A Software Developer's Guide to Universal Plug and Play Michael Jeronimo Jack Weast Intel PRESS Contents Foreword Preface xix xv Acknowledgments xxvii Part I Introduction to the

More information

Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer. White Paper

Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer. White Paper Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer White Paper Contents 3 Background 3 AirPrint Basics Step 1: Device Discovery Apple Bonjour 3 Step 2: Device Information and Status

More information

CS 161 Computer Security

CS 161 Computer Security Raluca Ada Popa Spring 2018 CS 161 Computer Security Discussion 7 Week of March 5, 2018 Question 1 DHCP (5 min) Professor Raluca gets home after a tiring day writing papers and singing karaoke. She opens

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

JESA Service Discovery Protocol

JESA Service Discovery Protocol JESA Service Discovery Protocol Efficient Service Discovery in Ad-Hoc Networks Stephan Preuß University of Rostock; Dept. of Computer Science; Chair for Information and Communication Services mailto:spr@informatik.uni-rostock.de

More information

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols Unit 8: Chapter 8 The Internet Protocol (IP) IT220 Network Standards & Protocols REMINDER Student Evaluations 4 Objectives Identify the major needs and stakeholders

More information

Philadelphia Area Java Users' Group December 12, 2001

Philadelphia Area Java Users' Group December 12, 2001 Jini: What it is, how we use it, and where it's going Philadelphia Area Java Users' Group December 12, 2001 Michael Ogg CTO, Valaran Corporation http://www.valaran.com ogg@valaran.com Jini Overview v1.0

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Figure 1-1. When we finish Part 2, our server will be ready to have workstations join the domain and start sharing files. Now here we go!

Figure 1-1. When we finish Part 2, our server will be ready to have workstations join the domain and start sharing files. Now here we go! 1 of 18 9/6/2008 4:05 AM Configuring Windows Server 2003 for a Small Business Network, Part 2 Written by Cortex Wednesday, 16 August 2006 Welcome to Part 2 of the "Configuring Windows Server 2003 for a

More information

Research on UPnP Protocol Stack for Applications on a Home Network

Research on UPnP Protocol Stack for Applications on a Home Network Research on UPnP Protocol Stack for Applications on a Home Network Kalaiselvi Arunachalam #1, Gopinath Ganapathy #2 # School of Computer Science, Engineering and Applications, Bharathidasan University,

More information

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used

More information

Trading Services for Distributed Enterprise Communications. Dr. Jean-Claude Franchitti. Presentation Agenda

Trading Services for Distributed Enterprise Communications. Dr. Jean-Claude Franchitti. Presentation Agenda Page 1 Trading Services for Distributed Enterprise Communications Dr. Jean-Claude Franchitti Presentation Agenda Enterprise Systems Technology Classifications Naming, Directory, and Trading Services in

More information

Electronic Payment Systems (1) E-cash

Electronic Payment Systems (1) E-cash Electronic Payment Systems (1) Payment systems based on direct payment between customer and merchant. a) Paying in cash. b) Using a check. c) Using a credit card. Lecture 24, page 1 E-cash The principle

More information

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure Course Number: 6420A Length: 5 Day(s) Certification Exam This course is associated with Exam 70-642 TS: Windows Server

More information

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions [MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

DS 2009: middleware. David Evans

DS 2009: middleware. David Evans DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between

More information

VoIP / RoIP for Technicians

VoIP / RoIP for Technicians Phase 4 Design, Inc VoIP / RoIP for Technicians Presented by Dave Grant Phase 4 Design, Inc dave@phase4.org 2017 Phase 4 Design, Inc Notes 2 2017, Phase 4 Design, Inc. Table of Contents What are we going

More information

Integration of Wireless Sensor Network Services into other Home and Industrial networks

Integration of Wireless Sensor Network Services into other Home and Industrial networks Integration of Wireless Sensor Network Services into other Home and Industrial networks using Device Profile for Web Services (DPWS) Ayman Sleman Automation and Process Control Engineering, University

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Distributed Objects and Remote Invocation. Programming Models for Distributed Applications

Distributed Objects and Remote Invocation. Programming Models for Distributed Applications Distributed Objects and Remote Invocation Programming Models for Distributed Applications Extending Conventional Techniques The remote procedure call model is an extension of the conventional procedure

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

Teiid Designer User Guide 7.5.0

Teiid Designer User Guide 7.5.0 Teiid Designer User Guide 1 7.5.0 1. Introduction... 1 1.1. What is Teiid Designer?... 1 1.2. Why Use Teiid Designer?... 2 1.3. Metadata Overview... 2 1.3.1. What is Metadata... 2 1.3.2. Editing Metadata

More information

Outline. EEC-681/781 Distributed Computing Systems. The OSI Network Architecture. Inter-Process Communications (IPC) Lecture 4

Outline. EEC-681/781 Distributed Computing Systems. The OSI Network Architecture. Inter-Process Communications (IPC) Lecture 4 EEC-681/781 Distributed Computing Systems Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Inter-process communications Computer networks

More information

The Data Link Layer. 32 PART I Networking Basics

The Data Link Layer. 32 PART I Networking Basics 32 PART I Networking Basics weather station. More realistic devices use duplex mode, where all systems can send or receive with equal facility. This is often further distinguished as half-duplex (the system

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-16.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information

SERVICE DISCOVERY A SURVEY AND COMPARISON

SERVICE DISCOVERY A SURVEY AND COMPARISON SERVICE DISCOVERY A SURVEY AND COMPARISON Bendaoud Karim Talal 1 and Merzougui Rachid 2 1 STIC Laboratory, Department of Telecommunication, University of Tlemcen, Algeria bendaoud.talal@gmail.com 2 STIC

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the

More information

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1

Mobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1 Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address

More information

Chapter 5 Advanced Configuration

Chapter 5 Advanced Configuration Chapter 5 Advanced Configuration This chapter describes how to configure the advanced features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. Configuring Advanced Security The modem router

More information

Chapter 1. Introduction. 1.1 Understanding Bluetooth as a Software Developer

Chapter 1. Introduction. 1.1 Understanding Bluetooth as a Software Developer Chapter 1 Introduction Bluetooth is a way for devices to wirelessly communicate over short distances. Wireless communication has been around since the late nineteenth century, and has taken form in radio,

More information

CISCO SYSTEM ADMINISTRATION (41)

CISCO SYSTEM ADMINISTRATION (41) CISCO SYSTEM ADMININSTRATION PAGE 1 OF 11 CONTESTANT ID# Time Rank CISCO SYSTEM ADMINISTRATION (41) Regional 2012 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification:

More information

Dolby Conference Phone. Configuration guide for Unify OpenScape Enterprise Express 8.0.x

Dolby Conference Phone. Configuration guide for Unify OpenScape Enterprise Express 8.0.x Dolby Conference Phone Configuration guide for Unify OpenScape Enterprise Express 8.0.x Version 3.2 28 June 2017 Copyright 2017 Dolby Laboratories. All rights reserved. Dolby Laboratories, Inc. 1275 Market

More information

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding

More information

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

Linda, JavaSpaces & Jini

Linda, JavaSpaces & Jini ECE 451/566 - Introduction to Parallel and Distributed Computing Linda, JavaSpaces & Jini Manish Parashar parashar@ece.rutgers.edu Department of Electrical & Computer Engineering Rutgers University Linda

More information

Service Location Protocol: A Java Prototype

Service Location Protocol: A Java Prototype Service Location Protocol: A Java Prototype Jack Caldwell Columbia University April 28, 1998 ABSTRACT The Internet continues to grow at exponential rates, offering a significant number of services to clients;

More information

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/20/>

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/20/> 2003-03-09 IEEE C802.20-03/26 Project Title Date Submitted IEEE 802.20 Working Group on Mobile Broadband Wireless Access Architectural Attributes of an IP-based

More information

Name Resolution and Service Discovery on the Internet and in Ad Hoc Networks

Name Resolution and Service Discovery on the Internet and in Ad Hoc Networks Chapter 8 Name Resolution and Service Discovery on the Internet and in Ad Hoc Networks Paal E. Engelstad and Geir Egeland CONTENTS Name Resolution... 172 An Architecture for Naming Services... 173 A Generic

More information

Call Control Discovery

Call Control Discovery CHAPTER 3 The call control discovery feature leverages the Service Advertisement Framework (SAF) network service, a proprietary Cisco service, to facilitate dynamic provisioning of inter-call agent information.

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information