MMOs and Socket Servers Diego O. Scarpa 10 y 11 de Diciembre – Hotel Panamericano - Buenos Aires.

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

Overview Environment for Internet database connectivity
Microsoft Confidential. An incubation effort to: Support client -> server communication in native code with a modern C++ API design Support writing Azure-based.
Members: Twinkle Agarwal Anjana Bhirde Ravi Madaiah David Hodgson Instructor: Dr. Perez Davila Mentor: Mr. Todd Guillory.
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
JavaScript FaaDoOEngineers.com FaaDoOEngineers.com.
Introduction to AppWarpS2 -Dhruv Chopra. What is this AppWarpS2? Complete platform for developing real-time multiplayer games of any genre. Supports multiple.
SOAP.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Snejina Lazarova Senior QA Engineer, Team Lead CRMTeam Dimo Mitev Senior QA Engineer, Team Lead SystemIntegrationTeam Telerik QA Academy SOAP-based Web.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Goals Develop a simple text chat protocol which will provide: public messaging, deliver to all on the server; private messaging, deliver to the specified.
Module 5: Configuring Access to Internal Resources.
Firewalls : usage Data encryption Access control : usage restriction on some protocols/ports/services Authentication : only authorized users and hosts.
TAC Vista Security. Target  TAC Vista & Security Integration  Key customer groups –Existing TAC Vista users Provide features and hardware for security.
Scale Up Access to your 4GL Application using Web Services
Microsoft Office System UK Developers Conference Radisson Edwardian, Heathrow 29 th & 30 th June 2005.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
Networking Within MMOs Scott Seeley. Differences in game networking Peer-to-peer Client/Server Distributed Server.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
IST346:  Web Services. Today’s Agenda  Learn the basics of how the Web works  Understand various web service architectures  Address scaling, security,
1 Enabling Secure Internet Access with ISA Server.
Module 1: Installing Internet Information Services 5.0.
Barracuda Load Balancer Server Availability and Scalability.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Introduction to AJAX AJAX Keywords: JavaScript and XML
AJAX Chat Analysis and Design Rui Zhao CS SPG UCCS.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Session 10 Windows Platform Eng. Dina Alkhoudari.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
CS 493/693: Distributed Systems Programming V. “Juggy” Jagannathan CSEE, West Virginia University March 21, 2005.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Confidential Configuring Attendant Console.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
Orbited Scaling Bi-directional web applications A presentation by Michael Carter
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
© 2010 – MAD Security, LLC All rights reserved Team Operations Collaborate with Armitage and Metasploit.
1 MMORPG Servers. 2 MMORPGs Features Avatar Avatar Levels Levels RPG Elements RPG Elements Mission Mission Chatting Chatting Society & Community Society.
S imple O bject A ccess P rotocol Karthikeyan Chandrasekaran & Nandakumar Padmanabhan.
Security fundamentals Topic 10 Securing the network perimeter.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
CMS 2: Advanced Web Editing - Content Presented By: Katie Pagano, Special Projects Manager Steve Pont, Product Architect.
FlowLevel Client, server & elements monitoring and controlling system Message Include End Dial Start.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Integrating and Extending Workflow 8 AA301 Carl Sykes Ed Heaney.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
CLIENT (Browser) socket accept C1 C2 recv C2 recv send C2 send end_thread recv C3 send bind connect Web Server Proxy recv close C3 close C2 end_thread.
Open source IP Address Management Software Review
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Contents Software components All users in one location:
Configuring Attendant Console
Module Overview Installing and Configuring a Network Policy Server
Server Concepts Dr. Charles W. Kann.
Emitter: Scalable, fast and secure pub/sub in Go
Outline Overview Development Tools
Running C# in the browser
Presentation transcript:

MMOs and Socket Servers Diego O. Scarpa 10 y 11 de Diciembre – Hotel Panamericano - Buenos Aires

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires MMO and Socket Servers MMO = Massively Multiplayer Online Game What is the main concept? – Handle interaction between multiple users How we can do that? – Socket Server

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Basic Design Diagram Socket Server Client 1Client 2 Services Client n

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Socket Server Who it works? – Simple, it uses sockets Client Server Socket 1. bind() 2. listen() 3. accept() 4. send – receive 5. close() 1. bind() 2. connect() 3. send – receive 4. close()

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Socket Server (II) Where is the complexity? – Communication – APIs – Security – Scalability – Performance – Tools

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Communication Control Content Format – Join user, join room, leave room, custom message Data Content Format – text, object, etc Serialization Options – XML – JSON – Binary – Custom Message Control Content Data Content

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Communication (II) Compression – Is it required? – Check your requirements – Do performance benchmarks

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Tunneling – It should work behind a firewall or a proxy, Is this necessary? – Check your audience DMZ Communication (IV) Client Socket Server

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Security Authentication/Authorization – Users – Permission – Do it always

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Security (II) Encryption – Example, AES-128 – Check performance

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Security (III) Anti Cheat – Unique Message Numbering Message injection Message modification – Anti-flood filters Chat issues – IP filter that prevents too many connections from a single IP address

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Client Side/Server Side API Object Model – Users, Rooms, Variables Extensibility Interaction with external services Interoperability between extensions Threads

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Client Side/Server Side API (II) Deploy server Cross platform – Client and Server sides Tools Creation Bots creation Variables: User, Room, Server Documentation

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Scalability Clustering Load balancer Socket Server Socket Server Socket Server Socket Server Socket Server Socket Server

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Scalability (II) Split the message handling – Rooms – Realms – Servers Server Realm Room Realm Room

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Tools Tracking users Network traffic Performance

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Tools (II) Logging Moderator: – kick, ban, etc.

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Performance Communication Big O Benchmarks Bots

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Deploy Review deploy process Auto reload

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Socket Server Samples Commercial Socket Servers: Licenses Add-ons – Chat – Chat Filters – Ban user – Friends

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Socket Server Samples (II) Electro Server 5PhotonSmartFox CoreJavaWindows C/C++Java Server Side APIJava, Javascript and AS.Net/C#AS, Javascript, Phyton and Java Client Side APIJava, C#, Obj-C, AS2, AS3.Net, Unity 3D, C/C++, Obj-C, AS3, Java AS2, AS3, Java,.Net, Obj-C, Ajax

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Socket Server Samples (III) Electro Server 5PhotonSmartFox HTTP TunnelingNativeNoBlue box Anti cheatUnique message numbering Anti Flood NoAnti Flood Ip filter AuthorizationUser permissionsNo

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Socket Server Samples (IV) Electro Server 5PhotonSmartFox StructureRooms, Extensions, Zones, Messages Applications, Rooms, Operations, Events Rooms, Extensions, Zones, Messages EncryptionyesNo Licenses25 CU - Free 1000 CU - $999 Unlimited - $4, CU – Free 500 CU - $ CU - $2250 Unlimited - $ CU - Free 500 CU € 2000 CU € 5000 CU € Unlimited – 2000€

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Conclusions Planning Review requirements before build a custom socket server Check that server don’t have unnecessary features Create tools to control the server Create bots to control the performance Be aware of the messages size and serialization

10 y 11 de Diciembre – Hotel Panamericano – Buenos Aires Questions ?