Explore chapters and articles related to this topic
Uniprocessor Computers
Published in Vivek Kale, Parallel Computing Architectures and APIs, 2019
A network OS controls the computer network in terms of the flow of data, maintaining security, and keeping track of user accounts. Commonly used OSs such as UNIX, Windows XP, and Windows Vista already include network OS capability. There are also software packages such as Novell Netware that are designed exclusively for use as a network OS. A network OS usually has two components: The server software is installed in the server workstation and has features to control file access from the server hard drive, manage the print queue, and track network user data such as userids and passwords.The client software, which is installed on the local hard drive of each client workstation, is essentially a device driver for the NIC. When the client workstation boots up, the network client software is activated and establishes the connection between the client and the other devices on the network.
Customer Premises Equipment (CPEs) for WiMAX
Published in Amitabh Kumar, Mobile Broadcasting with WiMAX: Principles, Technology, and Applications, 2014
As the WiMAX rollouts are in early stages and many networks are based on pre-WiMAX standards, it is useful to carefully check the features of the card to determine if whether it will meet all the requirements. Some of the features to check for would be: Form factor of the card and the laptop or PDA slot: The cards are available in physical form factors of a PCMCIA card (12.5 cm × 5.8 cm) and an Express form factor card (10 cm × 3.3 cm).The operating system supported by the PCMCIA card client: Most WiMAX cards available today are for Windows XP and Windows Vista.Support of frequency bands: The cards may support some or all of the certification profiles. For ease of use in various WiMAX networks, support of all the bands, i.e., 2.5, 3.3, and 3.5 GHz, is desirable.WiMAX certification and regulatory approvals: The device should preferably have passed the WiMAX certification tests and have regulatory approvals (such as from FCC for use in the United States).Support of mobility: Most devices will support mobility, but it is an important item to check, specifically for pre-WiMAX devices or proprietary devices. Some of the cards available in the market may be network-specific because of country-based policies on spectrum allocation.
Web Services for Embedded Devices
Published in Richard Zurawski, Industrial Communication Technology Handbook, 2017
Vlado Altmann, Hendrik Bohn, Frank Golatowski
Web Services on devices API (WSDAPI) is an implementation of the DPWS 1.0 in Microsoft Windows since Windows Vista. The API supports discovery, metadata, control, eventing, and binary attachments to messages. In addition to that, it supports XML schema extensibility. As part of WSDAPI, a code generation tool WSDCodeGen converts WSDLs to COM objects (Figure 26.14) [36].
Big Data Framework for Zero-Day Malware Detection
Published in Cybernetics and Systems, 2018
An automated malware analysis system has been set up using distributed Cuckoo Sandbox (www.cuckoosandbox.org), an open source framework for automated malware analysis, which performs static and dynamic analysis of malware binaries. The Cuckoo Sandbox provides a series of Python scripts to examine the behavior of malicious binaries during their execution. It is configured on a machine with Ubuntu as the host machine and a set of windows guest machines (Windows XP, Windows Vista, Windows 7, etc.) using Oracle VM VirtualBox (www.virtualbox.org)—a hypervisor for x86 machines. Each binary file is made to run in the virtual environment having a timeout of 90 s and the critical timeout value is set as 180 s. The automated malware analysis system is configured to produce the malware analysis reports in the JavaScript Object Notation (JSON) format. We have opted for JSON format as it is completely language independent and uses simple conventions familiar to most of programming languages including Python. This format is commonly used and is easy to read as well as parse. The set of JSON reports so produced form a raw dataset to our big data platform for further analysis. The generated JSON reports contain the various static and dynamic attributes of malware binary. The size of JSON reports is 1.97 TB.
Performance evaluation of windows virtual machines on a Linux host
Published in Automatika, 2020
Josip Balen, Krešimir Vdovjak, Goran Martinović
In our previous work, we have studied several different aspects of an operating systems performance on personal computers. This paper, to some extent, continues our work described in [3] where we studied an influence of three different host operating systems, namely Windows XP, Windows Vista and Windows 7 on performance of virtual machine run by Windows Vista. Performance measurement was conducted with five different benchmark applications and by performing two resources demanding operations: video encoding and data compression. Based on the performance evaluation results, it can be concluded that using Windows 7 host operating system provides the best performance for virtual operating system. In [4], we continued our work in the area of an operating systems performance evaluation. We preformed a performance evaluation in two different environments (low-end and high-end computer systems) of a three different versions of Windows operating systems, namely Windows XP, Windows Vista and Windows 7. Evaluation was conducted with a set of benchmark applications in five different areas: CPU scheduling, memory, graphics subsystem, disk drive management and network performance. Performance measurement results showed better performance of Windows XP in the majority of tests on the low-end computer system when compared to Windows Vista and Windows 7. Furthermore, on the high-end computer system, newer operating systems showed improved performance in areas of memory management and graphics display, but other areas showed equal or lower performance than achieved in Windows XP. Furthermore, a performance measurement process and a performance evaluation model for Windows operating systems was developed and the similar will be used in this work.