Virtualization Techniques to Enable Transparent Access to Peripheral Devices Across Networks

Total Page:16

File Type:pdf, Size:1020Kb

Virtualization Techniques to Enable Transparent Access to Peripheral Devices Across Networks VIRTUALIZATION TECHNIQUES TO ENABLE TRANSPARENT ACCESS TO PERIPHERAL DEVICES ACROSS NETWORKS By NINAD HARI GHODKE A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE UNIVERSITY OF FLORIDA 2004 Copyright 2004 by Ninad Hari Ghodke ACKNOWLEDGMENTS I would like to acknowledge Dr Renato Figueiredo for his direction and advice in this work and his patience in helping me write this thesis. I thank Dr Richard Newman and Dr Jose Fortes for serving on my committee and reviewing my work. I am grateful to all my friends and colleagues in the ACIS lab for their encouragement and help. Finally I would thank my family, for where and what I am now. This effort was sponsored by the National Science Foundation under grants EIA-0224442, ACI-0219925 and NSF Middleware Initiative (NMI) collaborative grant ANI-0301108. I also acknowledge a gift from VMware Corporation and a SUR grant from IBM. Any opinions, findings and conclusions or recommenda- tions expressed in this material are those of the author and do not necessarily reflect the views of NSF, IBM, or VMware. I would like to thank Peter Dinda at Northwestern University for providing access to resources. iii TABLE OF CONTENTS page ACKNOWLEDGMENTS ............................. iii LIST OF TABLES ................................. vi LIST OF FIGURES ................................ vii ABSTRACT .................................... viii CHAPTER 1 INTRODUCTION .............................. 1 2 APPLICATIONS ............................... 4 2.1 Network Computing in Grid and Utility Computing Environments 5 2.2 Pervasive Computing ......................... 7 3 SYSTEM CALL MODIFICATION ..................... 9 3.1 Introduction .............................. 9 3.2 Implementation ............................ 9 3.2.1 Architecture .......................... 9 3.2.2 Tracing Thread ........................ 10 3.2.3 Remote Device Server ..................... 11 3.3 Handling of System Calls ....................... 11 3.3.1 The open() System Call .................... 12 3.3.2 The close() System Call .................... 13 3.3.3 The read() and write() System Calls ............. 13 3.3.4 The ioctl() System Call .................... 14 3.3.5 The getpid() System Call ................... 14 3.4 Related Work ............................. 14 3.4.1 Ufo Global File System .................... 15 3.4.2 Janus .............................. 15 3.4.3 User Mode Linux ....................... 15 3.5 Conclusions .............................. 16 4 INTERCEPTION OF ACCESSES TO ISO9660 IMAGE ......... 17 4.1 Introduction .............................. 17 4.2 Implementation and Architecture .................. 19 4.2.1 Architecture .......................... 19 iv 4.2.2 Implementation ........................ 22 4.2.3 Handling Media Changes ................... 23 4.2.4 Integration with Middleware ................. 24 4.3 Performance Measurements ...................... 24 4.3.1 Experimental Setup ...................... 25 4.3.2 Benchmarks .......................... 26 4.3.3 Results and Analysis ..................... 27 4.4 Related Work ............................. 30 4.5 Conclusion ............................... 31 5 KERNEL DEVICE DRIVER ........................ 32 5.1 Introduction .............................. 32 5.2 Implementation ............................ 33 5.2.1 Architecture .......................... 33 5.2.2 Device Driver ......................... 35 5.2.3 Sound Server .......................... 36 5.2.4 Quality of Audio output ................... 36 5.3 Applications of Remote Sound Transfer ............... 38 5.3.1 Interactive Applications in Network Computing ...... 38 5.3.2 Fair Use of DRM-Enabled Media ............... 39 5.4 Prevention of Illegal Copying ..................... 39 5.4.1 Inspection of Hardware .................... 40 5.4.2 Detection Through the Use of Special Instructions ..... 40 5.4.3 Detection Through Timing Analysis ............. 40 5.5 Discussion: Impact of Future Technologies ............. 41 5.6 Related Work ............................. 43 5.7 Conclusions .............................. 44 6 CONCLUSIONS AND FUTURE WORK .................. 46 6.1 Conclusion ............................... 46 6.2 Future Work .............................. 46 6.2.1 Virtualization Using Interposition of Libc .......... 47 6.2.2 Filtering Mechanisms for Remote Sound System ...... 47 6.2.3 Virtualization of Block Devices as USB Memory ...... 48 6.2.4 Sound Capture Mechanism for Remote Sound ....... 48 6.2.5 Applications Using Virtual Devices ............. 48 REFERENCES ................................... 49 BIOGRAPHICAL SKETCH ............................ 52 v LIST OF TABLES Table page 4–1 Configuration of test machines used for LAN and WAN testing .... 25 4–2 Overheard time in seconds for creating ISO images and their transfer . 27 4–3 Measured total execution times for LAN experiments .......... 28 4–4 Speedup of VIRT versus other configurations in LAN environment .. 28 4–5 Measured total execution times for WAN experiments ......... 29 4–6 Speedup of VIRT versus other configurations in WAN environment .. 29 4–7 Sensitivity analysis: Effects of buffer caching for LAN tests ...... 30 vi LIST OF FIGURES Figure page 1–1 Scenario using virtual devices ...................... 2 2–1 Setup of a VM-based network computing environment ......... 6 2–2 Setup of a VM-based pervasive computing environment ........ 7 3–1 Architecture and the control flow of system call tracing technique .. 10 4–1 Implementation of a Virtual Remote CD-ROM ............. 21 5–1 Implementation of the remote sound system .............. 34 5–2 Output resulting from playing a 130s sound sample .......... 37 vii Abstract of Thesis Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Master of Science VIRTUALIZATION TECHNIQUES TO ENABLE TRANSPARENT ACCESS TO PERIPHERAL DEVICES ACROSS NETWORKS By Ninad Hari Ghodke August 2004 Chair: Renato J Figueiredo Major Department: Computer and Information Science and Engineering We virtualized peripheral devices to allow them to be accessed over a network in a manner that is transparent to applications. The peripherals virtualized work in conjunction with middleware to achieve access, location, and migration transparencies. Such functionality is useful for virtual-machine based network- computing systems that support interactive applications, and for virtual-machine based solutions for ubiquitous computing. We tested three techniques for device virtualization. The first technique used system call interception and modification to perform remote operations on the device. This enables virtualization completely at the user-level, without the need for super-user access. The second technique consists of transparent interception of accesses from a guest operating system, to a virtualized device image file; and mapping of requests to device-specific actions by a user-level server. This solution relies on native host mechanisms Network File System (NFS) client for interception of accesses to an ISO-9660 image file, and a server that reads from the physical device using a generic SCSI interface for CD-ROM access. This solution can potentially be used viii to access devices other than CD-ROMs (e.g., USB memory or tape drives). A prototype based on the NFS protocol and the CD-burning package “cdrecord” has been implemented and tested on GNU/Linux and can be ported to other systems. The third technique is virtualization at the device driver layer. It has been implemented for the remote transfer of audio streams generated by a virtualized audio device for an Operating System running in a Virtual Machine. The audio stream when played in the guest O/S is intercepted by the VMM, which then writes to the host sound device driver in WAV/PCM format. The host sound driver in this case is the remote sound device driver, which transfers this stream to a remote sound server across the network, where it can then be played on the user’s workstation. This technique was developed for transfer of audio streams over the network in a transparent fashion for arbitrary, unmodified applications using a virtual sound card. Because the virtual device intercepts raw WAV/PCM audio packets produced by a guest’s device driver, it cannot distinguish DRM-enabled media from unprotected media; thus the remote sound system is unable to enforce DRM protection schemes. ix CHAPTER 1 INTRODUCTION Classic virtual machines (VMs) [1] create a number of different execution environments on a single computer, each of which exactly emulates the physical hardware of a computer. This gives the user the illusion of running on physical hardware, isolated from other VMs, all on a single physical machine. Virtual devices (in a similar vein) create an illusion of a device for an application, which may map to a physical device. This physical device may be located across a network, and may be a different type of device than the device presented to the application. The primary aim of virtual devices is to make devices attached to a server machine accessible across the network to another client machine in a transparent fashion. Applications using this device do not require any modifications, and are not aware that they are accessing a device attached to a different machine. The machine on which the application runs is the client, and the machine to which the device is attached is the server. The operating systems need not be the
Recommended publications
  • THINC: a Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
    THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2011 c 2011 Ricardo A. Baratto This work may be used in accordance with Creative Commons, Attribution-NonCommercial-NoDerivs License. For more information about that license, see http://creativecommons.org/licenses/by-nc-nd/3.0/. For other uses, please contact the author. ABSTRACT THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto THINC is a new virtual and remote display architecture for desktop computing. It has been designed to address the limitations and performance shortcomings of existing remote display technology, and to provide a building block around which novel desktop architectures can be built. THINC is architected around the notion of a virtual display device driver, a software-only component that behaves like a traditional device driver, but instead of managing specific hardware, enables desktop input and output to be intercepted, manipulated, and redirected at will. On top of this architecture, THINC introduces a simple, low-level, device-independent representation of display changes, and a number of novel optimizations and techniques to perform efficient interception and redirection of display output. This dissertation presents the design and implementation of THINC. It also intro- duces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services. The contributions of this dissertation are as follows: • A high performance remote display system for LAN and WAN environments.
    [Show full text]
  • Accessing Windows Applications from Unix and Vice Versa
    50-20-42 DATA COMMUNICATIONS MANAGEMENT ACCESSING WINDOWS APPLICATIONS FROM UNIX AND VICE VERSA Raj Rajagopal INSIDE Accessing Windows Applications from an X-Station, Coexistence Options, Windows in an X-Station, Accessing Windows Applications, Accessing UNIX Applications from Windows Desktops, Emulators Migrating from one environment to another takes planning, resources and, most importantly, time (except in very trivial cases). This implies that even if eventually migrating to another environment, one still has to deal with coexistence among environments in the interim. In many com- panies it would make good business sense not to migrate legacy systems at all. Instead, it may be better to develop new systems in the desired en- vironment and phase out the legacy applications. The data created by the legacy applications is important and one must ensure that data can be ac- cessed from a new environment. Coexistence considerations are very im- portant in this case. Coexistence between Windows PAYOFF IDEA NT, UNIX, and NetWare deals with a Some users want applications they develop in number of related issues. One may one environment to execute in other environ- need to access Windows applications ments with very little change. With this approach, they can continue to develop applications with from a UNIX machine or need to ac- the confidence that they will execute in another cess UNIX applications from Win- environment even if the environments change in dows desktops. One may prefer to the future. In applications that can run in both have the same type of desktop (Òan Windows NT and UNIX, this can be accomplished enterprise desktopÓ) for all users and in several ways: be able to access different environ- •use APIs — there are three flavors of this ap- ments.
    [Show full text]
  • Universidade Federal De Campina Grande
    UNIVERSIDADE FEDERAL DE CAMPINA GRANDE CENTRO DE CIÊNCIAS E TECNOLOGIA COORDENAÇÃO DE PÓS-GRADUAÇÃO EM INFORMÁTICA DISSERTAÇÃO DE MESTRADO PROPOSTA DE SUPORTE COMPUTACIONAL AO MCI DANIEL SCHERER CAMPINA GRANDE FEVEREIRO - 2004 ii UNIVERSIDADE FEDERAL DE CAMPINA GRANDE CENTRO DE CIÊNCIAS E TECNOLOGIA COORDENAÇÃO DE PÓS-GRADUAÇÃO EM INFORMÁTICA PROPOSTA DE SUPORTE COMPUTACIONAL AO MCI Dissertação submetida à Coordenação de Pós- Graduação em Informática do Centro de Ciências e Tecnologia da Universidade Federal de Campina Grande como requisito parcial para obtenção do grau de mestre em informática (MSc). DANIEL SCHERER PROFA MARIA DE FÁTIMA QUEIROZ VIEIRA TURNELL, PHD. PROFA FRANCILENE PROCÓPIO GARCIA, DSC. (ORIENTADORAS) ÁREA DE CONCENTRAÇÃO: CIÊNCIA DA COMPUTAÇÃO LINHA DE PESQUISA: ENGENHARIA DE SOFTWARE CAMPINA GRANDE - PARAÍBA FEVEREIRO DE 2004 iii SCHERER, Daniel S326P Proposta de Suporte Computacional ao MCI Dissertação (mestrado), Universidade Federal de Campina Grande, Centro de Ciências e Tecnologia, Coordenação de Pós-Graduação em Informática, Campina Grande - Paraíba, março de 2004. 176 p. Il. Orientadoras: Maria de Fátima Queiroz Vieira Turnell, PhD Francilene Procópio Garcia, DSc Palavras-Chave 1 - Interface Homem-Máquina 2 - Métodos de Concepção de Interfaces 3 - Método para Concepção de Interfaces (MCI) 4 - Formalismos 5 - Ferramentas CDU - 519.683B "PROPOSTA DE SUPORTE COMPUTACIONAL AO METODO MCI" DANIEL SCHERER DISSERTAÇÃO APROVADA EM 26.02.2004 PROF" MARIA DE FÁTIMA Q. V. TURNELL, Ph.D Orientadora PROF" FRANCILENE PROCÓPIO GARCIA , D.Sc Orientadora PROF. JO JIO\RANGEL QUEmOZ, D.Sc \( Examinador PROF. FERNANDO DA FONSECA DE SOUZA, Ph.D Examinador CAMPINA GRANDE - PB v Ao meu pai e minha mãe. vi Agradecimentos Aos meus pais Rudi e Tecla Scherer pelo incentivo e apoio durante todo este período.
    [Show full text]
  • Building an out of the Box Raspberry Pi Modular Synthesizer J¨Urgenreuter
    Case Study: Building an Out Of The Box Raspberry Pi Modular Synthesizer J¨urgenReuter Karlsruhe, Germany, reuter [email protected] Abstract Headless Synth Modules The idea is simple and obvious: Take some Rasp- berry Pi computing units, each as a reusable syn- VCO VCA thesizer module. Connect them via a network. Con- nect a notebook or PC to control and monitor them. Start playing on your virtual analog modular syn- thesizer. However, is existing Linux audio software sufficiently mature to implement this vision out of Network the box? We investigate how far we get in building such a synthesizer, what existing software to choose with focus on networking, analyse what limits we Control Host hit and what features still need to be implemented (Synth GUI & to make our vision become reality. Configuration) Keywords Raspberry Pi, Virtual Anolog Modular Synthesizer, Figure 1: The Vision Distributed Networked Audio proach of a network of RPis reveals several ad- 1 The Vision vantages: The popular Raspberry Pi (or, shortly, RPi )[Raspberry Pi Foundation, 2014b] is a • Dedicated System. The RPis are solely small, cheap, yet powerful, computing unit with used for synthesis. The OS, residing on many I/O jacks with Linux/ARMv6 available an SD card, can be tailored to this pur- as operating system (OS). It is predestinated pose. Many services are irrelevant for head- for building networks of collaborative modules, less mode or use in a synthesizer and thus with each RPi taking over the role of a synthe- need not be installed, thus saving space sizer module with dedicated function as e.g.
    [Show full text]
  • German Standardization Roadmap Aal (Ambient Assisted Living)
    VDE ROADMAP Version 2 GERMAN STANDARDIZATION ROADMAP AAL (AMBIENT ASSISTED LIVING) Status, Trends and Prospects for Standardization in the AAL Environment Publisher VDE ASSOCIATION FOR ELECTRICAL, ELECTRONIC & INFORMATION TECHNOLOGIES responsible for the daily operations of the DKE German Commission for Electrical Electronic & Information Technologies of DIN and VDE Stresemannallee 15 60596 Frankfurt Phone: +49 69 6308-0 Fax: +49 69 6308-9863 E-Mail: [email protected] Internet: www.dke.de As of January 2014 2 STANDARDIZATION ROADMAP CONTENTS Contents. 3 1 Preliminary remarks . 7 2 Abstract . 8 2.1 Framework conditions . 8 2.2 Specifications and standards for AAL . 8 2.3 Recommendations from the first German Standardization Roadmap AAL . 9 2.4 Recommendations from the second German Standardization Roadmap AAL. 11 3 Introduction and background . 12 3.1 Framework conditions . 12 3.1.1 Social framework conditions - population projections . 12 3.2 Legal requirements . 13 3.2.1 Data protection and informational self-determination . 13 3.2.2 Medical Devices Law (MPG. 15 3.3 Standardization . 17 3.3.1 Structure of the standardization landscape . 17 3.3.2 DIN, CEN and ISO. 17 3.3.3 DKE, CENELEC and IEC. 18 3.3.4 IEC/SMB/SG 5 „Ambient Assisted Living“. 19 3.3.5 Producing standards . 20 3.3.6 Preconceived ideas about standardization . 21 3.3.7 Using innovative AAL technology and corresponding standardization . 21 3.3.7.1 Standardization and specification create markets . 22 3.3.7.2 Developing the AAL standardization landscape . 22 4 Specifications and standards for AAL . 25 4.1 Sensors/actuators and electrical installation buses .
    [Show full text]
  • Mai Mult a Minha Cultural Mini
    MAIMULT A MINHA US010063202B2CULTURAL MINI (12 ) United States Patent ( 10 ) Patent No. : US 10 ,063 , 202 B2 Kallai et al. (45 ) Date of Patent: Aug. 28 , 2018 ( 54 ) INTELLIGENTLY MODIFYING THE GAIN ( 56 ) References Cited PARAMETER OF A PLAYBACK DEVICE U . S . PATENT DOCUMENTS (71 ) Applicant : Sonos, Inc ., Santa Barbara , CA (US ) 3 ,956 ,591 A 5 / 1976 Gates , Jr. 4 , 105 ,974 A 8 / 1978 Rogers (72 ) Inventors : Christopher Kallai, Santa Barbara , CA D260 , 764 S 9 / 1981 Castagna et al . (US ) ; Mike Chamness , Gloucester, MA 4 ,296 ,278 A 10 / 1981 Cullison et al . (US ) ; Michael Darrell Andrew 4 , 306 , 114 A 12 / 1981 Callahan 4 , 382 , 158 A 5 / 1983 Ohshita et al . Ericson , Santa Barbara , CA (US ) 4 , 509 , 211 A 4 / 1985 Robbins D279 ,779 S 7 / 1985 Taylor ( 73 ) Assignee : SONOS, INC . , Santa Barbara , CA (US ) 4 ,530 ,091 A 7 / 1985 Crockett ( * ) Notice : Subject to any disclaimer , the term of this ( Continued ) patent is extended or adjusted under 35 U . S . C . 154 (b ) by 0 days . FOREIGN PATENT DOCUMENTS CA 2320451 A1 3 / 2001 ( 21) Appl. No. : 15 /670 , 769 CN 1598767 A 3 /2005 (22 ) Filed : Aug . 7 , 2017 ( Continued ) (65 ) ) Prior Publication Data OTHER PUBLICATIONS US 2017 /0346459 A1 Nov . 30 , 2017 “ 884 + Automatic Matrix Mixer Control System ,” Ivie Technolo gies, Inc. , 2000 , pp . 1 - 4 . Related U . S . Application Data (Continued ) (63 ) Continuation of application No . 13 /458 ,558 , filed on Apr. 27 , 2012 , now Pat. No . 9 ,729 , 115 . Primary Examiner — James Mooney (51 ) Int. Cl. HOZG 3 / 00 ( 2006 .
    [Show full text]
  • Real-Time Audio Servers on BSD Unix Derivatives
    Juha Erkkilä Real-Time Audio Servers on BSD Unix Derivatives Master's Thesis in Information Technology June 17, 2005 University of Jyväskylä Department of Mathematical Information Technology Jyväskylä Author: Juha Erkkilä Contact information: [email protected].fi Title: Real-Time Audio Servers on BSD Unix Derivatives Työn nimi: Reaaliaikaiset äänipalvelinsovellukset BSD Unix -johdannaisjärjestelmissä Project: Master's Thesis in Information Technology Page count: 146 Abstract: This paper covers real-time and interprocess communication features of 4.4BSD Unix derived operating systems, and especially their applicability for real- time audio servers. The research ground of bringing real-time properties to tradi- tional Unix operating systems (such as 4.4BSD) is covered. Included are some design ideas used in BSD-variants, such as using multithreaded kernels, and schedulers that can provide real-time guarantees to processes. Factors affecting the design of real- time audio servers are considered, especially the suitability of various interprocess communication facilities as mechanisms to pass audio data between applications. To test these mechanisms on a real operating system, an audio server and a client utilizing these techniques is written and tested on an OpenBSD operating system. The performance of the audio server and OpenBSD is analyzed, with attempts to identify some bottlenecks of real-time operation in the OpenBSD system. Suomenkielinen tiivistelmä: Tämä tutkielma kattaa reaaliaikaisuus- ja prosessien väliset kommunikaatio-ominaisuudet, keskittyen 4.4BSD Unix -johdannaisiin käyt- töjärjestelmiin, ja erityisesti siihen kuinka hyvin nämä soveltuvat reaaliaikaisille äänipalvelinsovelluksille. Tutkimusalueeseen sisältyy reaaliaikaisuusominaisuuk- sien tuominen perinteisiin Unix-käyttöjärjestelmiin (kuten 4.4BSD:hen). Mukana on suunnitteluideoita, joita on käytetty joissakin BSD-varianteissa, kuten säikeis- tetyt kernelit, ja skedulerit, jotka voivat tarjota reaaliaikaisuustakeita prosesseille.
    [Show full text]
  • Nagios Core Version 3.X Documentation
    Nagios Core Version 3.x Documentation http://www.nagios.org Copyright © 2009 Nagios Core Development Team and Community Contributors. Copyright © 1999-2009 Ethan Galstad. Portions copyright by Nagios Community members. See the THANKS file for more information. Last Updated: 06-16-2009 [ Table of Contents ] Nagios, Nagios Core, NRPE, NSCA, and the Nagios logo are trademarks, servicemarks, registered servicemarks or registered trademarks of Nagios Enterprises. All other trademarks, servicemarks, registered trademarks, and registered servicemarks mentioned herein may be the property of their respective owner(s). The information contained herein is provided AS IS with NO WARRANTY OF ANY KIND, INCLUDING THE WARRANTY OF DESIGN, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. 1 Nagios Core 3.x Documentation Table of Contents About What is Nagios? System requirements Licensing Downloading the latest version Release Notes What’s new in this version Known issues Support Nagios Support Portal Nagios Community Wiki Getting Started Advice for beginners Quickstart installation guide Upgrading from previous versions How to monitor a Windows machine How to monitor a Linux/Unix machine How to monitor a Netware server How to monitor a network printer How to monitor a router/switch How to monitor a publicly available service (HTTP, FTP, SSH, etc.) Configuring Nagios Configuration overview Main configuration file options Object configuration overview Object definitions CGI configuration file options Configuring authorization for the CGIs Running Nagios
    [Show full text]
  • D9.4 - Standardization and Concertation Activities Report | Year 1
    D9.4 - STANDARDIZATION AND CONCERTATION ACTIVITIES REPORT | YEAR 1 Smart Age-friendly Living and DOCUMENT ID - TYPE: D9.4 (REPORT) PROJECT TITLE: Working Environment DELIVERABLE LEADER: Caritas Coimbra (CDC) GRANT AGREEMENT Nº: 826343 (H2020-SC1-DTH-2018-1) DUE DATE: 31/12/2019 CONTRACT START DATE: 1 January 2019 DELIVERY DATE: 07/01/2020 CONTRACT DURATION: 36 Months DISSEMINATION LEVEL: Public (PU) PROJECT COORDINATOR: BYTE S.A. STATUS - VERSION: Final – v1.0 (Page intentionally blanked) D9.4 – STANDARDIZATION AND CONCERTATION ACTIVITIES REPORT | Page 2 AUTHORS - CONTRIBUTORS Name Organization Carina Dantas CDC Sofia Ortet CDC Charalampos Vassiliou BYTE Ignacio Peinado RtF-I Sonja Hansen CAT Dimitrios Amaxilatis SPARKS Paula Dougan ECHAlliance PEER REVIEWERS Name Organization Charalampos Vassiliou BYTE Rita Kovordanyi COIN REVISION HISTORY Version Date Author/Organisation Modifications 0.1 19.09.2019 Carina Dantas (CDC) ToC 1st draft ToC´s modifications based on 0.2 03.10.2019 Sofia Ortet / Carina Dantas (CDC) partners feedback 1st draft modifications based 0.3 24.10.2019 Sofia Ortet / Carina Dantas (CDC) on partners feedback 0.4 08.11.2019 ALL 2nd draft of all sections Technical partners input 0.5 15.11.2019 Sofia Ortet / Carina Dantas (CDC) revision 0.6 22.11.2019 Charalampos Vassiliou (BYTE) Standardisation section D9.4 – STANDARDIZATION AND CONCERTATION ACTIVITIES REPORT | Page 3 Overall contributions and 0.7 27.11.2019 Carina Dantas (CDC) revision 0.8 02.12.2019 Ignacio Peinado (RtF) Contributions to standards 0.9 04.12.2019 Sofia Ortet / Carina Dantas (CDC) Final version to peer-review Peer review comments and 0.10 12.12.2019 Charalampos Vassiliou (BYTE) suggestions Updated version based on 0.11 17.12.2019 Sofia Ortet / Carina Dantas (CDC) peer review comments Additional contributions and 1.0 07.01.2020 Charalampos Vassiliou (BYTE) final adjustments.
    [Show full text]
  • End-User Service Composition in Ubiquitous Computing Environments
    End-User Service Composition in Ubiquitous Computing Environments Mark Webster Newman Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2007-138 http://www.eecs.berkeley.edu/Pubs/TechRpts/2007/EECS-2007-138.html November 27, 2007 Copyright © 2007, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. End-User Service Composition in Ubiquitous Computing Environments by Mark Webster Newman B.A. (Macalester College) 1992 M.S. (University of California, Berkeley) 2000 A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the GRADUATE DIVISION of the UNIVERSITY OF CALIFORNIA, BERKELEY Committee in charge: Professor James Anthony Landay, Co-chair Professor John Canny, Co-chair Professor Athony D. Joseph Professor Peter Lyman Fall 2007 The dissertation of Mark Webster Newman is approved: ___________________________________________________________________ Co-chair Date ___________________________________________________________________ Co-chair Date ___________________________________________________________________ Date ___________________________________________________________________ Date University of California, Berkeley Fall 2007 End-User Service Composition in Ubiquitous Computing Environments Copyright Fall 2007 by Mark Webster Newman 1 ABSTRACT End-User Service Composition in Ubiquitous Computing Environments by Mark Webster Newman Doctor of Philosophy in Computer Science University of California, Berkeley Professor James A.
    [Show full text]
  • Documents Currently Open for Public Review and Comment
    Documents Currently Open for Public Review and Comment The InterNational Committee for Information Technology Standards (INCITS) announces that the subject-referenced document(s) is being circulated for a 45-day public review and comment period. Comments received during this period will be considered and answered. Commenters who have objections/suggestions should so indicate and include their reasons and send them to [email protected]. When submitting comments, we encourage use of the Comments Template This public review also serves as a call for patents and any other pertinent issues (copyrights, trademarks). Correspondence regarding intellectual property rights may be emailed to the INCITS Secretariat at [email protected]. List of all public reviews this year Public Review Period: 6/20/2014 - 8/4/2014 Withdrawal of: INCITS/ISO/IEC 18033-3:2005/COR 1:2006[2009] Title: Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers - CORRIGENDUM 1 Call for Patents Committee: INCITS/ CS1 Comments on this document should be submitted to: [email protected] To obtain copies, click here Public Review Period: 6/20/2014 - 8/4/2014 Withdrawal of: INCITS/ISO/IEC 18033-3:2005/COR 2:2007[2009] Title: Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers CORRIGENDUM 2 Call for Patents Committee: INCITS/ CS1 Comments on this document should be submitted to: [email protected] To obtain copies, click here Public Review Period: 6/20/2014 - 8/4/2014 Withdrawal of: INCITS/ISO/IEC 18033-3:2005/COR
    [Show full text]
  • Status=Not/Inst/Cfg-Files/Unpacked
    Desired=Unknown/Install/Remove/Purge/Hold |Status=Not/Inst/Cfgfiles/Unpacked/Failedcfg/Halfinst/trigaWait/Trigpend |/Err?=(none)/Reinstrequired(Status,Err:uppercase=bad) ||/NameVersion Description +++=========================================================================== =============================================================================== ================================================================================ ===== ii0trace1.0bt4 0traceisatraceroutetoolthatcanberunwithinanexisting,open TCPconnectionthereforebypassingsometypesofstatefulpacketfilterswith ease. ii3proxy0.6.1bt2 3APA3A3proxytinyproxyserver iiace1.10bt2 ACE(AutomatedCorporateEnumerator)isasimpleyetpowerfulVoIPCo rporateDirectoryenumerationtoolthatmimicsthebehaviorofanIPPhoneinor dert iiadduser3.112ubuntu1 addandremoveusersandgroups iiadmsnmp0.1bt3 SNMPauditscanner. iiafflib3.6.10bt1 AnopensourceimplementationofAFFwritteninC. iiair2.0.0bt2 AIRisaGUIfrontendtodd/dc3dddesignedforeasilycreatingforen sicimages. iiaircrackng1.1bt9 Aircrackngwirelessexploitationandenumerationsuite iialacarte0.13.10ubuntu1 easyGNOMEmenueditingtool iialsabase1.0.22.1+dfsg0ubuntu3 ALSAdriverconfigurationfiles iialsatools1.0.220ubuntu1 ConsolebasedALSAutilitiesforspecifichardware iialsautils1.0.220ubuntu5 ALSAutilities iiamap5.2bt4 Amapisanextgenerationtoolforassistingnetworkpenetrationtesti ng.Itperformsfastandreliableapplicationprotocoldetection,independanton the iiapache22.2.145ubuntu8.4 ApacheHTTPServermetapackage iiapache2mpmprefork2.2.145ubuntu8.4 ApacheHTTPServertraditionalnonthreadedmodel
    [Show full text]