“10 Protokol Aplikasi”
HP Data Protector software is automated backup and
recovery software for single-server to enterprise environments, supportingdisk storage or tape
storage targets.
It provides cross-platform, online backup of data for Microsoft Windows, Unix, and Linuxoperating systems.
For
business- and mission-critical applications, HP Data Protector Zero Downtime
Backup leverages array-based solutions to offload processing from the server
and perform backup operations on a copy of the production data. HP Data Protector
Instant Recovery retrieves data from the replicated images on disk for recovery
to specific points in time.
HP Data Protector originated as
OmniBack. The last version to use the OmniBack name was version 4.1, which was
retired in 2004.
47808 : BACnet Building
Automation and Control Networks (4780810 = BAC016), commonly spills to
47809–47816 (UDP)
BACnet
BACnet,
the ASHRAE building automation and control networking protocol, has been
designed specifically to meet the communication needs of building automation
and control systems for applications such as heating, ventilating, and
air-conditioning control, lighting control, access control, and fire detection
systems. The BACnet protocol provides mechanisms by which computerized
equipment of arbitrary function may exchange information, regardless of the
particular building service it performs. As a result, the BACnet protocol may
be used by head-end computers, general-purpose direct digital controllers, and
application specific or unitary controllers with equal effect.
The
BACnet protocol specifies transport over a number of datalink layers including
ARCNET, MS/TP (RS-485), PTP (RS-232), LonTalk, and
Ethernet. BACnet also specifies communication over UDP/IP which is known as
BACnet/IP. Other datalink layers are proposed.
Gearman provides a generic application framework to farm out work to other
machines or processes that are better suited to do the work. It allows you to
do work in parallel, to load balance processing, and to call functions between languages.
It can be used in a variety of applications, from high-availability web sites
to the transport of database replication events. In other words, it is the
nervous system for how distributed processing communicates. A few strong points
about Gearman:
·
Open Source It’s free! (in both meanings of the
word) Gearman has an active open source community that is easy to get involved
with if you need help or want to contribute. Worried about licensing? Gearman
is BSD.
·
Multi-language - There are interfaces for a number
of languages, and this list is growing. You also have the option to write
heterogeneous applications with clients submitting work in one language and
workers performing that work in another.
·
Flexible - You are not tied to any specific
design pattern. You can quickly put together distributed applications using any
model you choose, one of those options being Map/Reduce.
·
Fast - Gearman has a simple protocol and
interface with an optimized, and threaded, server written in C/C++ to minimize
your application overhead.
·
Embeddable - Since Gearman is fast and
lightweight, it is great for applications of all sizes. It is also easy to
introduce into existing applications with minimal overhead.
·
No single point of failure - Gearman can not
only help scale systems, but can do it in a fault tolerant way.
·
No limits on message size - Gearman supports
single messages up to 4gig in size. Need to do something bigger? No problem
Gearman can chunk messages.
·
Worried about scaling? - Don’t worry
about it with Gearman. Craig’s List, Tumblr, Yelp, Etsy,… discover what others
have known for years.
Pichat software was first
published in 2002 by Mark Seuffert, it was influenced by chat programs such as
IRC, ICQ and by peer-to-peer technologies. A web interface was added in 2004
based on an earlier prototype from 1998. The chat is written in the C++
programming language. New functionality is developed together with David
Fehrmann since 2010. Pichat is mainly used in Europe. Main purpose of pichat
Server is to chat with others.
5002 : Drobo Dashboard ( UDP )
The Drobo is the latest generation of the award-winning platform
that started it all. It holds true to the unique design and simplicity that has
made Drobo the best desktop storage solution for storing and protecting all
your data. No storage expertise is required to ensure your data is always safe
and protected.
Inside every Drobo is the revolutionary BeyondRAID storage
technology that protects data against a hard disk crash, yet is simple enough
for anyone to use. As long as you have more than a single disk in Drobo, all
data on Drobo is safe no matter which hard disk fails. There’s no need to worry
about anything else.
H2 is a relational database management system written in Java. It can be embedded in Java applications or run in the client-server mode. The disk footprint (size of the jar file) is about 1.5 MB.
The software is
available as open source software under modified versions of
the Mozilla Public License or the original Eclipse Public License. The modification of the MPL is a
shorter file header and the license name.
Main features
A subset of the SQL (Structured Query Language) standard
is supported. The main programming APIs are SQL and JDBC, however the database also supports using the Postgre SQL ODBC driver by acting like a Postgre SQL server.
It is possible to create
both in-memory tables, as well as disk-based tables. Tables can be persistent
or temporary. Index types are hash table and tree for in-memory tables, and b-tree for disk-based tables. All data
manipulation operations are transactional. Table level locking and multi-version concurrency control are implemented. The 2-phase commit protocol
is supported as well, but no standard API for distributed transactions is
implemented. The security features of the database are: role based access rights, encryption of the
password using SHA-256 and data using the AES or the Tiny Encryption Algorithm, XTEA. The cryptographic features are available as functions inside the database
as well.SSL / TLS connections are supported in the
client-server mode, as well as when using the console application.
A simple form of high
availability is implemented: when used in the client-server mode, the database
engine supports hot failover (this is commonly known as clustering). However,
the clustering mode must be enabled manually after a failure.
The database supports
protection against SQL injection by enforcing the use of
parameterized statements. In H2, this feature is called 'disabling literals'.
Application of
the Protocol
Historically, Fidonet traffic was
transferred mainly over serial (RS-232) modem connections
which might not have an error correction layer. These dial-up-oriented protocols
for transferring Fidonet traffic like EMSI or Zmodem had to
implement error-recovery. When the members of Fidonet started to use TCP/IP to transfer
Fidonet traffic, this error-recovery overhead became unnecessary. Assuming that
the connection is reliable makes it possible to eliminate error-checking and
unnecessary synchronization steps, achieving both ease of implementation and
improved performance. The major advantage of binkp vs EMSI and Zmodem is
achieved over connections with large delays and low bandwidth.
IANA (Internet
Assigned Numbers Authority) has registered the
port number 24554 for binkp when used over TCP/IP connections
In computing,
traceroute
is a computer network diagnostic tool for displaying the route
(path) and measuring transit delays of packets across an Internet Protocol (IP) network.
Most
implementations include at least options to specify the number of queries to
send per hop, time to wait for a response, the hop limit and port to use. Invoking
traceroute
with no specified options displays the list of available
options, while man
traceroute
presents
more details, including the displayed error flags. Simple example on Linux:$ traceroute -w 3 -q 1 -m 16 example.com
In the
example above, selected options are to wait for three seconds (instead of
five), send out only one query to each hop (instead of three), limit the
maximum number of hops to 16 before giving up (instead of 30), with
example.com
as
the final host.
This can
help identify incorrect routing table definitions or firewalls that may be
blocking ICMP traffic, or high port UDP in Unix ping, to a site. Note that a
firewall may permit ICMP packets but not permit packets of other protocols.
Traceroute
is also used by penetration testers to gather information about network
infrastructure and IP ranges around a given host.
It can also
be used when downloading data, and if there are multiple mirrors available for
the same piece of data, one can trace each mirror to get a good idea of
which mirror would be the fastest to use.
9191 : Sierra Wireless
Airlink (TCP)
Sierra
Wireless is the global leader in machine-to-machine (M2M) devices and cloud
services, delivering intelligent wireless solutions that simplify the connected
world. We offer the industry’s most comprehensive portfolio of 2G, 3G and 4G
embedded modules and gateways, seamlessly integrated with our secure M2M cloud
services. Customers worldwide, including OEMs, enterprises, and mobile network
operators, trust our innovative solutions to get their connected products and s
No comments:
Post a Comment