Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

A Multi-Agent Framework For Testing Distributed Systems, Hany Elyamany, Miriam Capretz, Luiz Fernando Capretz Sep 2006

A Multi-Agent Framework For Testing Distributed Systems, Hany Elyamany, Miriam Capretz, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

Software testing is a very expensive and time consuming process. It can account for up to 50% of the total cost of the software development. Distributed systems make software testing a daunting task. The research described in this paper investigates a novel multi-agent framework for testing 3-tier distributed systems. This paper describes the framework architecture as well as the communication mechanism among agents in the architecture. Web-based application is examined as a case study to validate the proposed framework. The framework is considered as a step forward to automate testing for distributed systems in order to enhance their reliability within …


Allocating Non-Real-Time And Soft Real-Time Jobs In Multiclusters, Ligang He, Stephen A. Jarvis, Daniel P. Spooner, Hong Jiang, Donna N. Dillenberger, Graham R. Nudd Feb 2006

Allocating Non-Real-Time And Soft Real-Time Jobs In Multiclusters, Ligang He, Stephen A. Jarvis, Daniel P. Spooner, Hong Jiang, Donna N. Dillenberger, Graham R. Nudd

School of Computing: Faculty Publications

This paper addresses workload allocation techniques for two types of sequential jobs that might be found in multicluster systems, namely, non-real-time jobs and soft real-time jobs. Two workload allocation strategies, the Optimized mean Response Time (ORT) and the Optimized mean Miss Rate (OMR), are developed by establishing and numerically solving two optimization equation sets. The ORT strategy achieves an optimized mean response time for non-real-time jobs, while the OMR strategy obtains an optimized mean miss rate for soft real-time jobs over multiple clusters. Both strategies take into account average system behaviors (such as the mean arrival rate of jobs) in …


A System For Rapid Configuration Of Distributed Workflows Over Web Services And Their Handheld-Based Coordination, Jaimini Joshi Jan 2006

A System For Rapid Configuration Of Distributed Workflows Over Web Services And Their Handheld-Based Coordination, Jaimini Joshi

Computer Science Theses

Web services technology has lately stirred tremendous interest in industry as well as the academia. Web services are self-contained, platform independent functionality which is available over the internet. Web services are defined, discovered & accessed using a standard protocols like WSDL, UDDI & SOAP. With the advent of Service-Oriented Architecture and need for more complex application, it became eminent to have a way in which these independent entities could collaborate in a coherent manner to provide a high level functionality. But the problem of service composition is not an easy one. One reason being the self-contained and loosely coupled interaction …


Mfs: M2mi File System, Ravi Bhatia Jan 2006

Mfs: M2mi File System, Ravi Bhatia

Theses

The M2MI File System is a Virtual File System designed for ad hoc networks. It uses M2MI/M2MP to perform ad hoc communication. The file system comprises of several file system instances spread across the network. Each file system instance furnishes a partial state, contributing to the complete structure of the file system. Hence MFS is a union of several file system instances collaborating with each other. The file system facilitates four file operations: ADD, REMOVE, LIST, and READ. The operation ADD allows a user to import a file from the local file system into MFS. It also permits the creation …


M2mimud, Robert Whitcomb Jan 2006

M2mimud, Robert Whitcomb

Theses

M2MIMud is a simple MUD (multi-user dungeon) type game that is designed to run on an ad hoc network of devices without the presence of any central server. It runs over Many-to-Many Invocation (M2MI), a distributed object system API that uses broadcasts and handles, rather than IP addresses, to communicate. Most existing multi-user computer games rely on a client-server architecture with a central server storing and maintaining the state of the game. In contrast, M2MIMud runs on an ad hoc network of devices with no central server. This paper describes M2MI and its use for serverless multi-user applications, discusses the …


Ad Hoc Collaborative Photo Sharing With A Tuple Board, Yutao Cheng Jan 2006

Ad Hoc Collaborative Photo Sharing With A Tuple Board, Yutao Cheng

Theses

The tuple board is a new distributed computing paradigm based on the tuple space concept invented by Gelernter in 1985. Designed for ad hoc mobile wireless networks, tuple board is a serverless architecture that differs from the original client-server paradigm proposed in tuple space. In this project, Tuple Board, a tuple board implementation has been developed based on the M2MP protocol. Comparing to the previous implementation in Bondada's work, the following improvements have been made: (1) M2MP, instead of M2MI, is used as the underlying network protocol for data communication, (2) notification is available in the tuple board implementation for …


Security In An Ad Hoc Network Using Many-To-Many Invocation, Jefferson Tuttle Jan 2006

Security In An Ad Hoc Network Using Many-To-Many Invocation, Jefferson Tuttle

Theses

There is an increasing need to secure electronic communication. This need is being met on workstations and servers, which have large amounts of memory, and a dedicated network connection. Securing communication in mobile devices is a relatively new research area, and has different requirements than workstations and servers. This project attempts to address these new requirements by incorporating security into the Many-to-Many Invocation (M2MI) library developed at the Rochester Institute of Technology (RIT). Specifically, this project addresses adding encryption and decryption of M2MI method invocations using session keys. It also addresses the methods of establishing and maintaining session keys based …