System Design for Home Automaton. Design Goals Performance Criteria – Server prioritizes client requests to provide quick response time to critical requests.

Slides:



Advertisements
Similar presentations
X Window JianJing Cao (ID #98284). Content Introduction X Window System Function Window Principle How X Window Works Security.
Advertisements

COURSE: COMPUTER PLATFORMS
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Multilingual Chat Client-Server-Client. Main Features : Its a GUI based Chat Server The multilingual chat currently features two languages English & Hindi.
Remote Access Network Management Kelly Given Allison Traina.
Slide 1 Client / Server Paradigm. Slide 2 Outline: Client / Server Paradigm Client / Server Model of Interaction Server Design Issues C/ S Points of Interaction.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Latest version of Protocol.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
© Lethbridge/Laganière 2001 Chap. 3: Basing Development on Reusable Technology 1 Let’s get started. Let’s start by selecting an architecture from among.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Operating Systems.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Brian Dwyer – CITA370. Introduction  Network Device Security  Identity Management AAA Process Model ○ Authentication ○ Authorization ○ Accounting (Sometimes.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Smart Mail lets you send and receive s from your mobile phone in a quick and easy way using your favorite mail account.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Chapter 31 File Transfer & Remote File Access (NFS)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
TCP/IP protocols Communication over Internet is mostly TCP/IP (Transmission Control Protocol over Internet Protocol) TCP/IP "stack" is software which allows.
Customized cloud platform for computing on your terms !
Oracle8 JDBC Drivers Section 2. Common Features of Oracle JDBC Drivers The server-side and client-side Oracle JDBC drivers provide the same basic functionality.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
UNIX SVR4 COSC513 Zhaohui Chen Jiefei Huang. UNIX SVR4 UNIX system V release 4 is a major new release of the UNIX operating system, developed by AT&T.
ProCol~ A jEdit Plugin for Remote Project Collaboration Justin Dieters Spring 2004 CS470 Final Presentation.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
COMP 410 & Sky.NET May 2 nd, What is COMP 410? Forming an independent company The customer The planning Learning teamwork.
Chapter Nine The Session Layer. Objectives We’ll see how a new session is created, maintained, and dismantled. The process of logon authentication will.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
© McLean HIGHER COMPUTER NETWORKING Lesson 1 – Protocols and OSI What is a network protocol Description of the OSI model.
Outline Overview Video Format Conversion Connection with An authentication Streaming media Transferring media.
BLU-ICE and the Distributed Control System Constraints for Software Development Strategies Timothy M. McPhillips Stanford Synchrotron Radiation Laboratory.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
IBM OS/2 Warp Mike Storck Matt Kerster Mike Roe Patrick Caldwell.
Section 4.2 AQA Computing A2 © Nelson Thornes 2009 Types of Operating System Unit 3 Section 4.1.
A Brief Documentation.  Provides basic information about connection, server, and client.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Designing Applications for Performance Appropriate I/O for Specific Task Minimize all Initiation and Termination Design Everything to be “Interactive”
Data Communications and Networks
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
OSI Reference Model. Open Systems Interconnection (OSI) Model International standard organization (ISO) established a committee in 1977 to develop an.
Tbox is a monitoring solution for all your computer systems Unifies and simplifies management of system surveillance Notifies you in the event of.
CSI 3125, Preliminaries, page 1 SERVLET. CSI 3125, Preliminaries, page 2 SERVLET A servlet is a server-side software program, written in Java code, that.
CSI 3125, Preliminaries, page 1 Networking. CSI 3125, Preliminaries, page 2 Networking A network represents interconnection of computers that is capable.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
Java Networking I IS Outline  Quiz #3  Network architecture  Protocols  Sockets  Server Sockets  Multi-threaded Servers.
1 K. Salah Application Layer Module K. Salah Network layer duties.
Two New UML Diagram Types Component Diagram Deployment Diagram.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
OSI Model OSI MODEL.
Virtual Network Computing
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
FTP - File Transfer Protocol
File Transfer and access
What is an Operating System?
Telnet/SSH Connecting to Hosts Internet Technology.
File Transfer Protocol
Time Gathering Systems Secure Data Collection for IBM System i Server
Presentation transcript:

System Design for Home Automaton

Design Goals Performance Criteria – Server prioritizes client requests to provide quick response time to critical requests. E.g. Device state changes supersede image transfers. –Client is multi-threaded to allow simultaneous server communication and user interaction. Server is a single-threaded state machine. –One zone will be held in memory at any given time to limit memory consumption.

Design Goals Dependability Criteria –Errors in server connection will be reported to the user. –Requests are given an encrypted identifier. Server reports success or failure to client with identifier. –Out-of-order transmissions generate errors and the connection is terminated to handle packet spoofing.

Design Goals Cost Criteria –Open-source; free for all. Yee-Ha! Maintenance/Extendability Criteria –Extendable to multiple device types. –Server will be able to communicate with a client on any platform. End User Criteria –Easy point-and-click user interface.

System Decomposition

Hardware/Software Mapping Client –C#, Open GL Server –C++ Protocol –TCP/IP Sockets

Persistent Data Management Zones will be stored in data files managed by data structures. Users will be stored in a data file on the server Server configuration will also be stored in a data file

Access Control There are two types of users: Administrator and Occupant. Administrator has full access to all features of the client and server. Occupant has access only to change device states. Both user types are authenticated with a username and password.

Software Control The server will operate on a procedure- driven state machine with a single- threaded loop handling all input/output and device control operations. The client will operate on an event-driven model with multiple threads (GUI & Network)

Boundary Conditions Establish Server Connection –User is authenticated. All devices (real and virtual) and the image file for the root zone are downloaded to the client Disconnect From Server –Server request queue is flushed and executed, while errors are reported to the client.

Boundary Conditions Connection Unexpectedly Terminated –Server processes all requests in its queue and stores errors in a log file. –Client reports an error to the user and offers to reconnect. Upon reconnection, Client will be updated with the current devices states.