server message block

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 138 Experts worldwide ranked by ideXlab platform

Danpo Zhang - One of the best experts on this subject based on the ideXlab platform.

  • QSIC - Model-Based Quality Assurance of the SMB2 Protocol Documentation
    2008 The Eighth International Conference on Quality Software, 2008
    Co-Authors: Wolfgang Grieskamp, Nicolas Kicillof, Dave Macdonald, Alok Nandan, Keith Stobie, Fred Wurden, Danpo Zhang
    Abstract:

    Microsoft is producing technical documentation for Windows client-server and server-server protocols to enable licensees to produce interoperable server products. This paper describes certain aspects of a new quality assurance process for technical documents as it is in place at Microsoft. We are applying various test methods including, when appropriate, a model-based approach. The paper uses the server message block Protocol Version 2 (SMB2) as a running example to illustrate the process.

  • Model-Based Quality Assurance of the SMB2 Protocol Documentation
    2008 The Eighth International Conference on Quality Software, 2008
    Co-Authors: Wolfgang Grieskamp, Nicolas Kicillof, Dave Macdonald, Alok Nandan, Keith Stobie, Fred Wurden, Danpo Zhang
    Abstract:

    Microsoft is producing technical documentation for Windows client-server and server-server protocols to enable licensees to produce interoperable server products. This paper describes certain aspects of a new quality assurance process for technical documents as it is in place at Microsoft. We are applying various test methods including, when appropriate, a model-based approach. The paper uses the server message block Protocol Version 2 (SMB2) as a running example to illustrate the process.

Weimin Zheng - One of the best experts on this subject based on the ideXlab platform.

  • Seamless Peripherals Integration for Network Computers based on the Reversed server message block Protocol
    International conference on Networking and Services (ICNS'06), 2006
    Co-Authors: Youhui Zhang, Peng Li, Dongsheng Wang, Weimin Zheng
    Abstract:

    This paper presents a convenient and safe way for using the peripherals of thin clients under the server-based computing model seamlessly. In this way, a client user can access his/her local peripherals as they are residing in the server directly. In contrast with the common use case of server-based computing, the server is configured as the 'consumer' to access the local resources of network computers through server message block (SMB) protocol and the latter act as the 'provider'. Besides convenience, it makes the access safe because the server's access-control mechanism can be employed directly to implement a centralized security management for these devices. Compared with remote desk protocol (RDP) that implements a similar solution for Windows OS, ours is independent on any existing OS and can be ported to different platforms. Moreover, the performance of this solution is much higher

  • ICNS - Seamless Peripherals Integration for Network Computers based on the Reversed server message block Protocol
    International conference on Networking and Services (ICNS'06), 2006
    Co-Authors: Youhui Zhang, Peng Li, Dongsheng Wang, Weimin Zheng
    Abstract:

    This paper presents a convenient and safe way for using the peripherals of thin clients under the serverbased computing model seamlessly. In this way, a client user can access his/her local peripherals as they are residing in the server directly. In contrast with the common use case of server-based computing, the server is configured as the ‘consumer’ to access the local resources of network computers through server message block (SMB) protocol and the latter act as the ‘provider’. Besides convenience, it makes the access safe because the server’s access-control mechanism can be employed directly to implement a centralized security management for these devices. Compared with Remote Desk Protocol (RDP) that implements a similar solution for Windows OS, ours is independent on any existing OS and can be ported to different platforms. Moreover, the performance of this solution is much higher.

Mikel Izal - One of the best experts on this subject based on the ideXlab platform.

  • High-Speed Analysis of SMB2 File Sharing Traffic without TCP Stream Reconstruction
    2019 IEEE International Symposium on Measurements & Networking (M&N), 2019
    Co-Authors: Eduardo Berrueta, Daniel Morato, Eduardo Magana, Mikel Izal
    Abstract:

    This paper presents a file sharing traffic analysis methodology for server message block (SMB), a common protocol in the corporate environment. The design is focused on improving the traffic analysis rate that can be obtained per CPU core in the analysis machine. SMB is most commonly transported over Transmission Control Protocol (TCP) and therefore its analysis requires TCP stream reconstruction. We evaluate a traffic analysis design which does not require stream reconstruction. We compare the results obtained to a reference full reconstruction analysis, both in accuracy of the measurements and maximum rate per CPU core. We achieve an increment of 30% in the traffic processing rate, at the expense of a small loss in accuracy computing the probability distribution function for the protocol response times.

  • M&N - High-Speed Analysis of SMB2 File Sharing Traffic without TCP Stream Reconstruction
    2019 IEEE International Symposium on Measurements & Networking (M&N), 2019
    Co-Authors: Eduardo Berrueta, Daniel Morato, Eduardo Magana, Mikel Izal
    Abstract:

    This paper presents a file sharing traffic analysis methodology for server message block (SMB), a common protocol in the corporate environment. The design is focused on improving the traffic analysis rate that can be obtained per CPU core in the analysis machine. SMB is most commonly transported over Transmission Control Protocol (TCP) and therefore its analysis requires TCP stream reconstruction. We evaluate a traffic analysis design which does not require stream reconstruction. We compare the results obtained to a reference full reconstruction analysis, both in accuracy of the measurements and maximum rate per CPU core. We achieve an increment of 30% in the traffic processing rate, at the expense of a small loss in accuracy computing the probability distribution function for the protocol response times.

Wolfgang Grieskamp - One of the best experts on this subject based on the ideXlab platform.

  • QSIC - Model-Based Quality Assurance of the SMB2 Protocol Documentation
    2008 The Eighth International Conference on Quality Software, 2008
    Co-Authors: Wolfgang Grieskamp, Nicolas Kicillof, Dave Macdonald, Alok Nandan, Keith Stobie, Fred Wurden, Danpo Zhang
    Abstract:

    Microsoft is producing technical documentation for Windows client-server and server-server protocols to enable licensees to produce interoperable server products. This paper describes certain aspects of a new quality assurance process for technical documents as it is in place at Microsoft. We are applying various test methods including, when appropriate, a model-based approach. The paper uses the server message block Protocol Version 2 (SMB2) as a running example to illustrate the process.

  • Model-Based Quality Assurance of the SMB2 Protocol Documentation
    2008 The Eighth International Conference on Quality Software, 2008
    Co-Authors: Wolfgang Grieskamp, Nicolas Kicillof, Dave Macdonald, Alok Nandan, Keith Stobie, Fred Wurden, Danpo Zhang
    Abstract:

    Microsoft is producing technical documentation for Windows client-server and server-server protocols to enable licensees to produce interoperable server products. This paper describes certain aspects of a new quality assurance process for technical documents as it is in place at Microsoft. We are applying various test methods including, when appropriate, a model-based approach. The paper uses the server message block Protocol Version 2 (SMB2) as a running example to illustrate the process.

Youhui Zhang - One of the best experts on this subject based on the ideXlab platform.

  • Seamless Peripherals Integration for Network Computers based on the Reversed server message block Protocol
    International conference on Networking and Services (ICNS'06), 2006
    Co-Authors: Youhui Zhang, Peng Li, Dongsheng Wang, Weimin Zheng
    Abstract:

    This paper presents a convenient and safe way for using the peripherals of thin clients under the server-based computing model seamlessly. In this way, a client user can access his/her local peripherals as they are residing in the server directly. In contrast with the common use case of server-based computing, the server is configured as the 'consumer' to access the local resources of network computers through server message block (SMB) protocol and the latter act as the 'provider'. Besides convenience, it makes the access safe because the server's access-control mechanism can be employed directly to implement a centralized security management for these devices. Compared with remote desk protocol (RDP) that implements a similar solution for Windows OS, ours is independent on any existing OS and can be ported to different platforms. Moreover, the performance of this solution is much higher

  • ICNS - Seamless Peripherals Integration for Network Computers based on the Reversed server message block Protocol
    International conference on Networking and Services (ICNS'06), 2006
    Co-Authors: Youhui Zhang, Peng Li, Dongsheng Wang, Weimin Zheng
    Abstract:

    This paper presents a convenient and safe way for using the peripherals of thin clients under the serverbased computing model seamlessly. In this way, a client user can access his/her local peripherals as they are residing in the server directly. In contrast with the common use case of server-based computing, the server is configured as the ‘consumer’ to access the local resources of network computers through server message block (SMB) protocol and the latter act as the ‘provider’. Besides convenience, it makes the access safe because the server’s access-control mechanism can be employed directly to implement a centralized security management for these devices. Compared with Remote Desk Protocol (RDP) that implements a similar solution for Windows OS, ours is independent on any existing OS and can be ported to different platforms. Moreover, the performance of this solution is much higher.