534,530 research outputs found

    Deceit: A flexible distributed file system

    Get PDF
    Deceit, a distributed file system (DFS) being developed at Cornell, focuses on flexible file semantics in relation to efficiency, scalability, and reliability. Deceit servers are interchangeable and collectively provide the illusion of a single, large server machine to any clients of the Deceit service. Non-volatile replicas of each file are stored on a subset of the file servers. The user is able to set parameters on a file to achieve different levels of availability, performance, and one-copy serializability. Deceit also supports a file version control mechanism. In contrast with many recent DFS efforts, Deceit can behave like a plain Sun Network File System (NFS) server and can be used by any NFS client without modifying any client software. The current Deceit prototype uses the ISIS Distributed Programming Environment for all communication and process group management, an approach that reduces system complexity and increases system robustness

    Dynamic Context Awareness of Universal Middleware based for IoT SNMP Service Platform

    Get PDF
    This study focused on the Universal Middleware design for the IoT (Internet of Things) service gateway for the implementation module of the convergence platform. Recently, IoT service gateway including convergence platform could be supported on dynamic module system that is required mounting and recognized intelligent status with the remote network protocol. These awareness concepts support the dynamic environment of the cross-platform distributed computing technology is supported by these idea as a Universal Middleware for network substitution. Distribution system commonly used in recent embedded systems include CORBA (Common Object Request Broker Architecture), RMI (Remote Method Invocation), DCE (Distributed Computing Environment) for dynamic service interface, and suggested implementations of a device object context. However, the aforementioned technologies do not support each standardization of application services, communication protocols, and data, but are also limited in supporting inter-system scalability. In particular, in order to configure an IoT service module, the system can be simplified, and an independent service module can be configured as long as it can support the standardization of modules based on hardware and software components. This paper proposed a design method for Universal Middleware that, by providing IoT modules and service gateways with scalability for configuring operating system configuration, may be utilized as an alternative. This design could be a standardized interface provisioning way for hardware and software components as convergence services, and providing a framework for system construction. Universal Middleware Framework could be presented and dynamic environment standardization module of network protocols, various application service modules such as JINI (Apache River), UPnP (Universal Plug & Play), SLP (Service Location Protocol) bundles that provide communication facilities, and persistence data module. In this IoT gateway, management for based Universal Middleware framework support and available for each management operation, application service component could be cross-executed over SNMP (Simple Network Management Protocol) version 1, version 2, and version 3. The way of SNMP extension service modules are conducted cross-support each module and independent system meta-information that could be built life cycle management component through the MIB (Management Information Base) information unit analysis. Therefore, the MIB role of relation with the Dispatcher applied to support multiple concurrent SNMP messages by receiving incoming messages and managing the transfer of PDU (Protocol Data Unit) between the RFC 1906 network in this study. Results of the study revealed utilizing Universal Middleware that dynamic situations of context objects with mechanisms and tools to publish information could be consisted of IoT to standardize module interfaces to external service clients as a convergence between hardware and software platforms

    Design and Implementation of S-MARKS: A Secure Middleware for Pervasive Computing Applications

    Get PDF
    As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People engage with not a single device for a specific purpose but many devices interacting with each other in the course of ordinary activity. With such prevalence of pervasive technology, the interaction between portable devices needs to be continuous and imperceptible to device users. Pervasive computing requires a small, scalable and robust network which relies heavily on the middleware to resolve communication and security issues. In this paper, we present the design and implementation of S-MARKS which incorporates device validation, resource discovery and a privacy module

    Religious Motivation for Mitigating Human-forced Climate Change: Scientifically Informed, Politically Astute, and Collaborative

    Get PDF
    Purpose – Religious organizations are among the non-government groups in the USA that are addressing climate change phenomena from their various faith perspectives and, despite the differences in their traditions and practices, are collaborating with one another to achieve their mutual goal – the establishment of policies that will mitigate the real and anticipated perils scientists are forecasting. If sufficiently motivated by their faith, informed by climate science, and politically astute, these groups may be reliable allies for climate change decision-makers to tap as they strive to achieve their mutual goal. The paper aims to discuss these issues. Design/methodology/approach – Focusing on the Coalition on Environment and Jewish Life, the Catholic Coalition on Climate Change, and Interfaith Power and Light, the author explores the diverse religious faith-based motivations underpinning their efforts, the extent to which they remain cognizant of the latest climate science, the structures through which they share their particular faith perspectives and collaborate with one another, and their efforts to reach decision makers at various levels of governance. Findings – Motivated by their religious faiths, these three organizations demonstrate that they are scientifically informed, politically astute, and collaborative with others in striving to achieve their mutual goal of mitigating the adverse effects of climate change locally to globally. Research limitations/implications – The three groups on which the author focuses are based in the USA and collaborate with one another. In an earlier presentation prepared for an international conference, the author included two other groups outside the USA, but manuscript length precluded their inclusion in this submission. Perhaps the author\u27s limited study will stimulate scholars to explore other groups in various parts of the world. Practical implications – To assure and strengthen the momentum already underway, scholars of religions need to probe their foundations for responding to climate change, leaders of religious communities must heighten their efforts to educate their followers accordingly, adherents of religions must be open to embracing their motivating traditions, and religiously based groups must seek to collaborate with one another at various bioregional and political levels to demand actions that will advance a life-sustaining climate. Originality/value – The author is unaware of studies exploring these three groups using the methodology the author employs for the purposes of describing and assessing the effectiveness of religious groups in addressing human-forced climate change

    Peer-to-Peer Secure Updates for Heterogeneous Edge Devices

    Get PDF
    We consider the problem of securely distributing software updates to large scale clusters of heterogeneous edge compute nodes. Such nodes are needed to support the Internet of Things and low-latency edge compute scenarios, but are difficult to manage and update because they exist at the edge of the network behind NATs and firewalls that limit connectivity, or because they are mobile and have intermittent network access. We present a prototype secure update architecture for these devices that uses the combination of peer-to-peer protocols and automated NAT traversal techniques. This demonstrates that edge devices can be managed in an environment subject to partial or intermittent network connectivity, where there is not necessarily direct access from a management node to the devices being updated
    • …
    corecore