Moby Dick Application Framework Specification

Total Page:16

File Type:pdf, Size:1020Kb

Moby Dick Application Framework Specification IST-2000-25394 Project Moby Dick D0102 Moby Dick Application Framework Specification Contractual Date of Delivery to the CEC: 31 August 2002 Actual Date of Delivery to the CEC: 31 August 2002 Author(s): partners in WP1 (cf. page 3) Participant(s): partners in WP1 Workpackage: WP1 Security: Public Nature: Report Version: 1.0 Total number of pages: 43 Abstract: This document provides a description of the applications and coordination software to be used during tests and trial phase of Moby Dick architecture. Keyword list: Field trial, Test-bed, Moby Dick platform, Application, Traffic Pattern. Moby Dick WP1 1 / 43 WP1-D0102_final.doc Version 1.0 30.8.2002 Executive Summary This deliverable describes the applications to be used during trial phase of Moby Dick project, with the tests properly defined in D0501 Annex. The software was chosen according to the following main reasons: - Only IPv6 software is taken into account. - Applications should be representative in their field (conversational, streaming or network gaming software) - A proper trade off between simplicity and functionality should be made - Not only free software should be used, but also –when possible- open source applications are preferable - Public available applications has been selected and minimal effort mainly to port application to IPv6 will be provided by Moby Dick Project. - Results from previous projects have been consider. We reuse results from 6WinIt (IST- 2000-25153) and LONG (IST-1999-20393) Projects. In particular we will use MGEN6 application developed inside LONG project (Laboratories over Next Generation Networks) for network performance measurements as well as audio and video tools (vic, vat, rat) ported to IPv6 from 6WinIt (IPv6 Wireless Internet Initiative). Applications selected have been divided in areas: S VoIP applications. We mainly describe SIP environment available in IPv6 protocol stack. This software will be used to perform telephone conversation tests. S Streaming. Due to the restrictions on bandwidth in the access network, audio streaming based on MP3 has been considered to perform tests and deploy trials. These applications could be consider of interest mainly among young people who, through the Socrates-Erasmus program will be our testers. Video streaming applications may also be considered, especially in the Ethernet access. S Games. We consider different applications, based on collaborative and individual games. Applications like Quake, Chess and Tetris are considered of high demand in the future System beyond 3G and therefore we will try to use in our testbed. S Interactive or Web Browsing. The increasing growth of the Internet and Web based services justifies these applications that will continue playing an important role in the future. Web browsing, email, chat and messenger applications are among these. S System Coordination and Expert Evaluation. These applications are useful for management of the test and trial performs. Also, through these applications Moby Dick operators will be in contact to solve configuration parameters and exchange experience and feedback. Most of the applications have been tested and installed at Moby Dick Trial Sites in Madrid and Stuttgart and servers are installed and ready for the tests and trials. For these applications we have include an analysis of the traffic pattern injected to the network. Moby Dick WP1 2 / 43 WP1-D0102_final.doc Version 1.0 30.8.2002 Authors Partner Name Phone / Fax / E-mail UC3M Jose Ignacio Moreno Phone: +34-916249183 Fax: +34-916248749 E-mail: [email protected] Ignacio Soto Phone: +34-916245974 Fax: +34-916248749 E-mail: [email protected] Carlos J. Bernardos Phone: +34-916249959 Fax: +34-916248749 E-mail: [email protected] Raquel Panadero Phone: +34-916248756 Fax: +34-916248749 E-mail: [email protected] Pablo Serrano Phone: +34-916248756 Fax: +34-916248749 E-mail: [email protected] USTUTT Jürgen Jähnert Phone: +49-711-685-4273 Fax: +49-711-678-8363 E-mail: [email protected] Paul Christ Phone: +49-711-685-2515 Fax: +49-711-678-8363 E-mail: [email protected] PTIn Victor Marques Phone: +351-243-403-654 Fax: +351-243-420-722 E-mail: [email protected] ICR Tan Seng Kee Phone: + 65-68709335 Fax: + 65-67795441 E-mail: [email protected] T-Nova Hans J. Einsiedler Phone: + 49-30-34 97 35 18 Fax: + 49-30-34 97 35 19 E-mail: [email protected] Moby Dick WP1 3 / 43 WP1-D0102_final.doc Version 1.0 30.8.2002 Table of Contents ABBREVIATIONS.............................................................................................. 7 1. INTRODUCTION.......................................................................................... 8 2. MULTIMEDIA APPLICATIONS ................................................................... 9 2.1 Audio streaming: Mpg123 .........................................................................................................9 2.1.1 Description ...........................................................................................................................9 2.1.2 Installation and configuration...............................................................................................9 2.1.3 Network protocol information ..............................................................................................9 2.2 Audio streaming: Mpg321 .........................................................................................................9 2.2.1 Description ...........................................................................................................................9 2.2.2 Installation ............................................................................................................................9 2.2.3 Network protocol information ............................................................................................10 2.3 Audio streaming GUI: Gqmpeg ..............................................................................................10 2.3.1 Description .........................................................................................................................10 2.3.2 Installation ..........................................................................................................................10 2.3.3 Network protocol information ............................................................................................10 2.4 MP3 Streaming Server: Icecast-1.3.11....................................................................................10 2.4.1 Description .........................................................................................................................10 2.4.2 Description .........................................................................................................................10 2.4.3 Installation and configuration.............................................................................................10 2.5 Interactive browsing: Gabber-0.8.7 (Jabber Client) .............................................................11 2.5.1 Description .........................................................................................................................11 2.5.2 Installation and configuration.............................................................................................11 2.6 Interactive Browsing: Jabber-1.4.2 server .............................................................................11 2.6.1 Description .........................................................................................................................11 2.6.2 Installation and configuration.............................................................................................11 2.7 VoIP: Introduction to SIP........................................................................................................11 2.8 VoIP: Non-Java SIP environment...........................................................................................13 2.8.1 Description .........................................................................................................................13 2.8.2 Installation and configuration.............................................................................................15 2.8.2.1 Sipc Installation ..............................................................................................................15 2.8.2.2 RAT (Robust Audio Tool) Installation...........................................................................16 2.8.2.3 Sipd Installation..............................................................................................................17 2.8.2.4 MySQL Installation and Usage.......................................................................................17 2.8.3 Network protocol information ............................................................................................17 2.9 VoIP: Java SIP environment ...................................................................................................19 2.9.1 Java SIP User Agent (JUA) ................................................................................................19 2.9.2 Java SIP Proxy Server (JPS)...............................................................................................21 2.9.3 Installation and configuration.............................................................................................22 2.9.3.1 Java JDK Installation......................................................................................................22
Recommended publications
  • Tetrinetclient – Build a Tetrinet Client 2-LINER Description
    TetrinetClient – Build a tetrinet client 2-LINER description: Design and develop a Tetrinet Client that is compatible with the current ToThePoint Tetrinet Server and additionally add more/new game-aspects to it [Description of the assignment] • A lot of our Pointers are fans of Tetrinet (a multiplayer Tetris variant). One of us was so obsessed that he started developing his own Tetrinet Server. • What once started as a fun-project has now grown to a veritable server with features such as single-player challenges, many game types, badges, … and this is all compatible with old clients from 1997. • Now that we have this server, we’re only lacking our own client implementation. • Your assignment will be the design and development of a new modern client that meets the needs of the current Tetrinet protocol. Afterwards, both the server as the client can be expanded with new game-aspects. [Goals] • Functional analysis and design of a Tetrinet Client • Technical implementation of a Tetrinet Client according to the existing protocol • Adding new game-aspects in both client and server [What will you gain?] • You’ll gain experience and knowledge in Javascript frameworks such as Phaser.io and Pix.js • You’ll learn to build a UI on an existing backend application • You’ll experience working on an existing codebase [What do you need?] • Basic knowledge of Javascript. Knowledge of Phaser.io and/or pixjs is a plus • Basic knowledge of Java • Of course you have experience in playing Tetris [Location of the assignment] • Veldkant 33B, 2550 Kontich [Your Mentor] • Lars Van Herk – OneDot Business Unit Manager / Tech Lead • Johan Siebens - OnTheSpot Business Unit Manager / Tech Lead vd Tetrinet Server [Technologies you’ll be using] • Javascript • Phaser.io • Pixijs • Java • Spring Boot • Akka .
    [Show full text]
  • List of TCP and UDP Port Numbers 1 List of TCP and UDP Port Numbers
    List of TCP and UDP port numbers 1 List of TCP and UDP port numbers This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host communications. Originally, these ports number were used by the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but are also used for the Stream Control Transmission Protocol (SCTP), and the Datagram Congestion Control Protocol (DCCP). SCTP and DCCP services usually use a port number that matches the service of the corresponding TCP or UDP implementation if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Table legend Use Description Color Official Port is registered with IANA for the application white Unofficial Port is not registered with IANA for the application blue Multiple use Multiple applications are known to use this port. yellow Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports. They are used by system processes that provide widely used types of network services. On Unix-like operating systems, a process must execute with superuser privileges to be able to bind a network socket to an IP address using one of the well-known ports. Port TCP UDP Description Status 0 UDP Reserved Official 1 TCP UDP TCP Port Service Multiplexer (TCPMUX) Official [2] [3]
    [Show full text]
  • Project Multitris Group 23 Marcus Dicander Måns Olson Tomas Alaeus Daniel Boström Oscar Olsson
    Project Multitris Group 23 Marcus Dicander Måns Olson Tomas Alaeus Daniel Boström Oscar Olsson 1 Requirements Document (RD) Table of Contents 1. Preface..............................................................................................................................................3 1.1. Expected readership..............................................................................................................................3 1.2. Version history.....................................................................................................................................3 2. Introduction......................................................................................................................................3 2.1. User base and project goal....................................................................................................................3 2.2. Main system uses..................................................................................................................................3 2.3. System environment and context..........................................................................................................4 2.4. The scope of the system........................................................................................................................5 2.5. Main factors..........................................................................................................................................5 2.6. Technologies and risks.........................................................................................................................5
    [Show full text]
  • List of TCP and UDP Port Numbers - Wikipedia, the Free Encyclopedia List of TCP and UDP Port Numbers from Wikipedia, the Free Encyclopedia
    8/21/2014 List of TCP and UDP port numbers - Wikipedia, the free encyclopedia List of TCP and UDP port numbers From Wikipedia, the free encyclopedia This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) which needed two ports for half duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for bidirectional traffic. The even numbered ports were not used, and this resulted in some even numbers in the well-known port number range being unassigned. The Stream Control Transmission Protocol (SCTP) and the Datagram Congestion Control Protocol (DCCP) also use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports 3 Registered ports 4 Dynamic, private or ephemeral ports 5 See also 6 References 7 External links Table legend Use Description Color Official Port is registered with IANA for the application[1] White Unofficial Port is not registered with IANA for the application Blue Multiple use Multiple applications are known to use this port. Yellow Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports or system ports.[2] They are used by system processes that provide widely used types of network services.
    [Show full text]
  • Ludocapital: the Political Economy of Digital Play
    UC Irvine UC Irvine Electronic Theses and Dissertations Title Ludocapital: The Political Economy of Digital Play Permalink https://escholarship.org/uc/item/0985k4rw Author Jordan, Will Gregory Publication Date 2014 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, IRVINE Ludocapital: The Political Economy of Digital Play DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Comparative Literature by Will Gregory Jordan Dissertation Committee: Associate Professor Eyal Amiran, Chair Professor James Steintrager Professor David Theo Goldberg 2014 © 2014 Will Gregory Jordan DEDICATION To my parents, who kept us playing and thinking ii TABLE OF CONTENTS Page ACKNOWLEDGMENTS iv CURRICULUM VITAE vi ABSTRACT OF THE DISSERTATION vii Introduction 1 1 Play and Freedom 25 1.1 Play and Procedurality ............................. 29 1.2 Aesthetics of game-playing ........................... 38 1.3 Digital play and the Ludic Posthuman .................... 45 1.4 Case Studies ................................... 52 1.5 Conclusions ................................... 64 2 Specters of Play: Hauntology of Tetris® 67 2.1 Tetris as Symbolic Game Object ........................ 72 2.2 Tetris as Cultural Commodity ......................... 84 2.3 The Idealization of Property in the Digital Age . 96 2.4 Conclusions ...................................115 3 Procedural Literacy: Toward a Programming Public 124 3.1 Procedural
    [Show full text]
  • Network Tetris an Interactive Peer to Peer Approach
    Michael Kotovsky Operating Systems Project Comp512, Spring 2008 Penn State Harrisburg Network Tetris An interactive peer to peer approach Table of Contents Introduction & History of Tetris..................................................................................................... 3 Project Goals................................................................................................................................... 4 Design Decisions ............................................................................................................................ 5 Implementation ............................................................................................................................... 6 An Event Driven Game................................................................................................................... 8 The flow of Logic ....................................................................................................................... 8 Description of an Event ............................................................................................................ 10 Lifecycle of an Event................................................................................................................ 10 Rollbacks....................................................................................................................................... 12 Lag & Screen Synchronization ..................................................................................................... 13
    [Show full text]
  • Puzzle Spill Liste : Stem P㥠Dine Favoritter
    Puzzle Spill Liste InkBall https://no.listvote.com/lists/games/inkball-1340777 gbrainy https://no.listvote.com/lists/games/gbrainy-307397 KAtomic https://no.listvote.com/lists/games/katomic-6325571 Bit Generations https://no.listvote.com/lists/games/bit-generations-3266978 Ribbon Hero 2 https://no.listvote.com/lists/games/ribbon-hero-2-7322259 Ribbon Hero https://no.listvote.com/lists/games/ribbon-hero-7322258 KidÅ ​ Gekidan Haro Ichiza: Haro no Puyo https://no.listvote.com/lists/games/kid%C5%8D-gekidan-haro-ichiza%3A-haro- Puyo no-puyo-puyo-3196415 Rocky and Bullwinkle https://no.listvote.com/lists/games/rocky-and-bullwinkle-7356048 Perestroika https://no.listvote.com/lists/games/perestroika-1989723 Mr. Driller https://no.listvote.com/lists/games/mr.-driller-3276305 Clubhouse Games https://no.listvote.com/lists/games/clubhouse-games-233753 Action Force https://no.listvote.com/lists/games/action-force-4677096 Tower of Babel https://no.listvote.com/lists/games/tower-of-babel-2877818 Picross 2 https://no.listvote.com/lists/games/picross-2-3382548 Lights, Camera, Curses https://no.listvote.com/lists/games/lights%2C-camera%2C-curses-4042889 Hitori https://no.listvote.com/lists/games/hitori-971467 https://no.listvote.com/lists/games/dr.-seuss%27-fix-up-the-mix-up-puzzler- Dr. Seuss' Fix-Up the Mix-Up Puzzler 5304376 Dr. Mario: Miracle Cure https://no.listvote.com/lists/games/dr.-mario%3A-miracle-cure-20031702 Magical Tetris Challenge https://no.listvote.com/lists/games/magical-tetris-challenge-3043129 Puzzle Bobble 3 https://no.listvote.com/lists/games/puzzle-bobble-3-784447
    [Show full text]
  • Internships Overview 2018-2019
    INTERNSHIPS OVERVIEW 2018-2019 TITLE INTERNSHIP: CentralPoint 2-LINER description: Build a lightweight single-sign-on-application that can support both username + password as social media log ins (Facebook, LinkedIn, GitHub, Google, …). This central SSO application will centrally authenticate the microservices-based intranet landscape of ToThePoint. EXTRA INFO: • Description of the task • Within ToThePoint we use a whole array of applications (self-contained systems) that are all integrated with the frontend and are supported within our ToThePoint intranet • These applications will all use their own authentication procedure with standard username and password. We want those applications to handle the authentication through a single-sign-on platform so we can enhance the user experience and also differentiate between users within our multiple applications. • Your main assignment during this internship will be the creation of a lightweight authentication-platform (both design and development), from which both log in methods are supported. • This platform should also be self-contained. • Goals • Functional analysis • Design of a responsive UI • Development of both backend and frontend following the self-contained systems architecture (Take note of Stefan Tilkov’s talk about SCS on http://scs- architecture.org) • The creation of a continuous deployment pipeline. • Deployment with Docker on a Google cloud-hosted Kubernetes cluster • What will you learn? • You will experience how to design, develop and put in production an end-to-end enterprise-grade
    [Show full text]
  • Toward Online Verification of Client Behavior in Distributed Applications
    Toward Online Verification of Client Behavior in Distributed Applications Robert A. Cochran Michael K. Reiter Department of Computer Science Department of Computer Science University of North Carolina University of North Carolina Chapel Hill, NC, USA Chapel Hill, NC, USA [email protected] [email protected] Abstract models (but that may still manipulate application state) can escape detection, in a manner analogous to mimicry attacks Existing techniques for a server to verify the correctness on intrusion-detection systems [28, 22]. Greater precision of client behavior in a distributed application suffer from has been achieved, but with greater expense. For example, imprecision, increased bandwidth consumption, or signifi- the Ripley system [25] replays each client on the server in cant computational expense. We present a novel method for order to validate the client’s requests, but this incurs the a server to efficiently search for a code path through the bandwidth overhead of transmitting all client-side inputs client that “explains” each client message, even though the (user inputs, timer values, etc.) to the server to permit re- server does not know local inputs to the client that might play and the computational overhead of replaying the client have caused the message. This method gives rise to a pre- on the server side. An approach by Bethea et al. [2] omits cise client verification technique that consumes no addi- transmitting client-side inputs, thus not incurring bandwidth tional bandwidth and that validates most legitimate client overheads, but then must search for whether there exist in- messages much faster than previous such techniques.
    [Show full text]
  • Makes People Talk Johan Larsson Johan Skårman Göteborg, Sweden 2002
    Master thesis in Mobile Informatics Collaborative Games – Makes People Talk Johan Larsson Johan Skårman Göteborg, Sweden 2002 Collaborative Games – Makes People Talk Teenagers’ use of mobile face-to-face collaborative computer games JOHAN LARSSON JOHAN SKÅRMAN © JOJOSOFT, 2002. The report is available at: www.scoreman.com/jojosoft Report no xxxx:xx Department of Applied Information Technology IT University of Göteborg Göteborg University and Chalmers University of Technology P O Box 8718 SE – 402 75 Göteborg Sweden Telephone + 46 (0)31-772 4895 [Tryckeriets namn] Göteborg, Sweden 2002 REPORT NO. xxxx/xxxx Collaborative Games – Makes People Talk Teenagers’ use of mobile face-to-face collaborative computer games JOHAN LARSSON JOHAN SKÅRMAN www.scoreman.com/jojosoft Department of Applied Information Technology IT UNIVERSITY OF GÖTEBORG GÖTEBORG UNIVERSITY AND CHALMERS UNIVERSITY OF TECHNOLOGY Göteborg, Sweden 2002 Collaborative Games – Makes People Talk Teenagers’ use of mobile face-to-face collaborative computer games JOHAN LARSSON JOHAN SKÅRMAN Department of Applied Information Technology Göteborg University and Chalmers University of Technology Abstract Our main purpose was to explore how teenagers used mobile face-to-face collaborative computer games. In this report we therefore describe the development and use of what we call mobile face-to-face collaborative computer games. These games are played among co-located people on a handheld devices connected in an ad hoc network. The research was conducted in three phases: the workshop phase, the development phase and finally the evaluation phase. In the first phase we studied three traditional games, both on a theoretical level and empirically. The aim was to identify the design patterns that made people collaborate and interact face-to-face.
    [Show full text]
  • Pure Tetris Strategy Guide by Spindizzy
    http://www.tetridome.com/filemgmt/filemgmt_data/files/pure.htm Pure Tetris strategy guide by spindizzy I have never seen a guide written specifically for pure TetriNET, and since this is our clan's speciality, I considered it my obligation. This guide is not written for total beginners. I assume you already know your way around the blocks. Maybe it isn't very helpful for experienced players either. At least I had fun writing it. Starting out Starting out is not as critical in pure setting as in 1:1 setting. In specials 1v1, it is in the first ten seconds of the game that the outcome of at least 50% of the games are decided. This is not the case in classic Tetris. However, the start is the easiest part to learn in pure, and without a good opening a poor player will always lose. We will discuss this first. Handling the Z's Any good 1:1 player know not to slide blocks under each other, especially not in the start since you have a long way to move the block. In my opinion, this is also true for pure Tetris. Sliding blocks is a dangerous thing to do and it slows you down. If caught by a line-add from an opponent, slides in the start can ruin your first tetris. The more opponents, the more dangerous the slide, because the risk for a line-add increases with the number of opponents. A great number of players do slides in 1v1 pure in the startup, even very skilled players.
    [Show full text]
  • Toward Online Verification of Client Behavior in Distributed Applications Robby Cochran Mike Reiter
    Toward Online Verification of Client Behavior in Distributed Applications Robby Cochran Mike Reiter University of North Carolina at Chapel Hill NDSS 2013 CLIENT SERVER Is this message from an unmodified client? VERIFIER 2 Goals . Detect if client messages are consistent with the sanctioned client software … • Adversary might modify binary/memory • or rewrite message on the wire . … Much more quickly than previous work . Ideally we would do so online… 3 CLIENT SERVER CONTROL FLOW MODEL OF CLIENT [Giffin et al. 2002] [Guha et al. 2009] 4 CLIENT SERVER USER CLIENT INPUT REPLICA [Vikram et al. 2009] 5 CLIENT SERVER OFFLINE MESSAGE LOG VERIFIER [Bethea et al. 2010] 6 CLIENT SERVER ONLINE MESSAGE QUEUE VERIFIER 7 Introduction . Existing techniques to verify client behavior • Imprecise • Increase bandwidth usage • Computationally expensive . Our method • Precise: no false negatives and no false positives • No additional bandwidth required • Validates most legitimate behavior faster than previous techniques 8 Overview . Introduction . Symbolic Execution . Key Insight #1: Common Case Optimization . Key Insight #2: Guided Search with History . Case Studies . Conclusion 9 Symbolic Execution [Boyer 1975] . A way of deriving X the effects of a given program on a X <= 0 X > 0 given system X > 10 0 < X < 10 • Constraints on input are constructed based on each execution path . Built on top of KLEE [Cadar et al. 2008] 10 Symbolic Environment How can we use symbolic execution to verify a message? 1 loc = 0 2 while true do 3 key = symbolicReadKeyreadKey()
    [Show full text]