The A4L Community Plays SIF

Slides:



Advertisements
Similar presentations
DISTRIBUTED COMPUTING PARADIGMS
Advertisements

Synchronous Links/Networks Modems are asynchronous - penalized by start bits and stop bits on each character (and dead time) Synchronous Networks recover.
Message Queues COMP3017 Advanced Databases Dr Nicholas Gibbins –
Version 2a: February 9, 2007Page 1/10 WIPO Working Group on the Digital Access Service for Priority Documents Possible system features Notes of discussions.
Mobile Communications in a Mobile Agent Based Overlay System Ching-Feng Li.
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
Networking Solutions Chapter 2 – The OSI Model. The Layered Approach Similar to a company like ◦ Advantages ◦Divides the network into ◦Multiple vendors.
Color Aware Switch algorithm implementation The Computer Communication Lab (236340) Spring 2008.
SNMP & MIME Rizwan Rehman, CCS, DU. Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems.
1 CHEETAH software OCS/AAA module Routing decision module Signaling module VLSR module Include TL1 proxy for Cisco MSPP Router disconnect module.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
Rhys McBreen (How the internet works) X. Contents The Layers and what they do IP Addressing X.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Storage Manager Overview L3 Review of SM Software, 28 Oct Storage Manager Functions Event data Filter Farm StorageManager DQM data Event data DQM.
Presented by: SIF3: Providers Joerg Huber SIF3 Providers: Source of Truth.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Data Link Control and Protocols.
MODULE I NETWORKING CONCEPTS.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Data Objects and Message Types 49 th IETF AAAarch Research Group David Spence Interlink Networks.
 First: Data Link Layer  1. Retransmission Policy: It deals with how fast a sender times out and what it transmit upon timeout. A jumpy sender that times.
CSEN 404 Introduction to Networks Amr El Mougy Lamia AlBadrawy.
Antony Edwin Keane Inc Ltd
Architecting Multi- Zone SIF Solutions Utilizing the new infrastructure options with existing Zone design patterns Ron Kleinman SIF 2011 Annual Meeting.
PART1 Data collection methodology and NM paradigms 1.
Interoperability at last! Jeremy Meades, Director for ICT Strategy and e-Learning.
Ch23 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Fast Retransmit For sliding windows flow control we waited for a timer to expire before beginning retransmission of a packet TCP uses an additional mechanism.
SCALE: The Safe Community Awareness and Alerting Network
PROTOCOLS PROTOCOLS.
Slides taken from: Computer Networking by Kurose and Ross
International Activities
Chap. 2 Network Models.
Transport layer.
Internet Hardware.
PART 5 Transport Layer Computer Networks.
Computer Networks - Introduction - Dr. Hussein al-Bahadili
Say Hello to my Little Friend - Fedora Messaging Infrastructure
Chapter 6: Transport Layer (Part I)
Networking for Home and Small Businesses – Chapter 6
HTTP: the hypertext transfer protocol
CIS 321 Data Communications & Networking
Networking for Home and Small Businesses – Chapter 6
18-WAN Technologies and Dynamic routing
Replication Middleware for Cloud Based Storage Service
Chapter 10 Data Link Control
Introduction to the Transport Layer
Java Messaging Service (JMS)
Use Case: Password Management Password Change Requests
Multimedia and Networks
SIF 3.x Concepts & Terms, xPress & RicOne API
Process-to-Process Delivery:
Java Messaging Service (JMS)
Chapter 5 TCP Control Flow
Lec 5: SNMP Network Management
Use Case Modeling Example
Starting TCP Connection – A High Level View
CSE 313 Data Communication
Congestion Control Reasons:
Home Tab – Task List Now please remember that in order to utilize this functionality trade users will need “Full Access” to “Forms” and the mode of communication.
Networking for Home and Small Businesses – Chapter 6
EMPLOYEE ACTION MANUAL FOR MANAGERS
Chapter 24 Mobile IP.
Kyle Broussard, Alexandra Mikolai,
Go to the page Set here the address for receiving the s sent to the mailing lists to which you are subscribing.
Presentation transcript:

The A4L Community Plays SIF Data Exchange Workout The A4L Community Plays SIF © Access 4 Learning (A4L) Community

SIF 2 | Data Request | Pull Mode Transport Network Account HR & Finance Data Analysis & Reporting Library SIS / MIS Assessment Catering SIF 2 | Data Request | Pull Mode One Packet of Data Retrieved © Access 4 Learning (A4L) Community

SIF 2 | Data Request | Pull Mode The request going from the primary agent to the ZIS. The ZIS acknowledging the request of the primary agent. The ZIS placing the request on the other agent’s queue. The agent retrieving the request message off of its queue and later removing it from the queue (don’t forget to acknowledge the removing acknowledgment). Response messages flowing from the other agent to the ZIS (and acknowledged). Final the response messages arriving at the primary agent similar to step four. © Access 4 Learning (A4L) Community

SIF 2 | Data Request | Push Mode Transport Network Account HR & Finance Data Analysis & Reporting Library SIS / MIS Assessment Catering SIF 2 | Data Request | Push Mode One Packet of Data Retrieved © Access 4 Learning (A4L) Community

SIF 2 | Data Request | Push Mode The request going from the primary agent to the ZIS. The ZIS acknowledging the request of the primary agent. The ZIS placing the request on the other agent’s queue. The request being sent to the other agent (and acknowledged). Response messages flowing from the other agent to the ZIS (and acknowledged). Final the response messages arriving at the primary agent similar to number four. © Access 4 Learning (A4L) Community

SIF 3 | Data Request | Immediate | Brokered Transport Network Account HR & Finance Data Analysis & Reporting Library SIS / MIS Assessment Catering SIF 3 | Data Request | Immediate | Brokered One Page of Data Retrieved © Access 4 Learning (A4L) Community

SIF 3 | Data Request | Immediate | Brokered The consuming adaptor sends the request to the broker. The broker routes the request on to providing adaptor. The providing adaptor responds to the request. The broker forwards the response to the consuming adaptor. © Access 4 Learning (A4L) Community

SIF 2 | Event 3 Objects | Pull Mode Transport Network Account HR & Finance Data Analysis & Reporting Library SIS / MIS Assessment Catering SIF 2 | Event 3 Objects | Pull Mode Now do it two more times! © Access 4 Learning (A4L) Community

SIF 2 | Event 3 Objects | Pull Mode The primary agent sends an event to the ZIS. The ZIS acknowledges the event. The ZIS places the event on the other agent’s queue. The other agent retrieves the event from the ZIS removing it from the queue (don’t forget to acknowledge the removing acknowledgment). Go back to the top and repeat two times. © Access 4 Learning (A4L) Community

SIF 2 | Event 3 Objects | Push Mode Transport Network Account HR & Finance Data Analysis & Reporting Library SIS / MIS Assessment Catering SIF 2 | Event 3 Objects | Push Mode Now do it two more times! © Access 4 Learning (A4L) Community

SIF 2 | Event 3 Objects | Push Mode The primary agent sends an event to the ZIS. The ZIS acknowledges the event. The ZIS places the event on the other agent’s queue. The event being sent to the other agent (and acknowledged). Go back to the top and repeat two times. © Access 4 Learning (A4L) Community

3 Objects of the same type Evented Transport Network Account HR & Finance Data Analysis & Reporting Library SIS / MIS Assessment Catering SIF 3 | Event 3 Objects 3 Objects of the same type Evented © Access 4 Learning (A4L) Community

SIF 2 | Event 3 Objects | Pull Mode The primary adaptor sends an event to the broker. The broker acknowledges the event. The broker places the event on one of the other adaptor’s queues. The other adaptor retrieves the event from the broker removing it from the queue. © Access 4 Learning (A4L) Community

John W. Lovell jlovell@a4l.org Coach: © Access 4 Learning (A4L) Community