The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Under service oriented architecture (SOA), a system- such as an enterprise-consists of multiple heterogeneous servers (service providers), which may be distributed over a wide area of network, and may be managed under different administrative domains. One of the goals of this work is to enable the system as a whole (i.e., the enterprise) to impose global constraints on the interactive behavior of...
Radius is a standard authentication and accounting protocol. RADIUS servers and Radius accounting servers are configured with particular attributes. But these attributes above may not provide enough servers in different facilities. The essay describes how to realize the function of G-8000 vendor specific attributes (VSAs) on the Radius server. Radius attribute 26 is for vendor-specific information...
Virtual desktop environment (VDE) provides a real virtual working environment in which users could personally customize and update the application list from application template libraries. The heterogeneous applications actually running in the remote application servers could cooperatively communicate with each other. It is a thin client approach to mobility in which the perfect combination of VM...
IPv6 is the network layer protocol for the next-generation Internet. As its addresses are 128 bits long,, there has been a more urgent need to realize domain name automatic update supported by DNS (domain name system) to reduce the complexity of network communications. With a view to resolving this problem, the paper makes a study on the schemes of DDNS (dynamic domain name server) at home and abroad,...
SMS-based queries and responses are exchanged between mobile stations and central database servers in many contemporary client-server applications through point-to-point short message service (SMS-PP). Control plane signalling between different nodes of public land mobile network (PLMN) is much larger than message sizes in SMS-PP. Congestion in mobile network is caused by upsurge in signalling bandwidth...
This paper presents a preemption control based bandwidth preserving server approach to improve the quality of service in terms of better responsiveness to the aperiodic task and reduce their rejection ratio while ensuring the feasibility of periodic task at the same time. Feasibility analysis is done at offline by assigning the priority of periodic tasks as well as server to service the aperiodic...
The cache-and-forward (CNF) architecture has recently been proposed as a "clean-slate" solution for efficient content delivery in the future Internet. The CNF architecture is based on the concept of hop-by-hop transport and in-network storage of content. In this paper, we investigate a gateway centric method for efficient content caching and routing in the CNF network. In this method, a...
Access to the internet and WWW is growing extensively, which results in heavy network traffic. To reduce the network traffic proxy server is used. Proxy server reduces the load of server. If the cache replacement algorithm of proxy server's cache is efficient then proxy server will be helpful to reduce the network traffic in more efficient manner. In this paper we are considering proxy server cache...
This paper addresses to the issues (e.g. firewall, network congestion, access control, voice function) to be solved when the services like second life or OpenSim are accessed from the enterprise network environment and proposes the solutions for these issues. Especially this paper describes the cache server (e.g. design, evaluation result), the white list filtering system (e.g. design, scheme) based...
Optical grids are widely deployed to solve complex problems we are facing today. An important aspect of the supporting network is resiliency i.e. the ability to overcome network failures. In contrast to classical network protection schemes, we will not necessarily provide a back-up path between the source and the original destination. Instead, we will try to relocate the job to another server location...
The paper is concerned with the optimal control with respect to N-policy of the M/M/1 queue with constant retrial rate and non-reliable removable server. According to the N-policy, the server can start service only when the number of customers in the system reaches level N (N ?? 1). We perform a steady-state analysis of the corresponding continuous-time Markov chain and calculate optimal threshold...
The IP multimedia subsystem (IMS) is a next-generation service delivery platform that enables operators to deliver services such as multimedia and IP content to both fixed and mobile users. One of the important services for early adopters in the IMS is presence, an application well-known on platforms such as the Internet, which can be integrated into other applications as an enhancement. A major constraint...
Recently, there has been an increased reliance on computing systems supported by a multi-tier architecture. In multi-tier computing systems, it is important to appropriately manage resource allocation to ensure fairness of a QoS (quality of service) level avoiding overload conditions in tiers. This paper proposes an adaptive resource management algorithm for multi-tier computing systems in order that...
Full-scale IT introduction in the near future is expected to increase information flows vastly and this information explosion will also increase the number of IT devices in use, positioning the energy consumption of IT devices themselves as a key issue. Most of conventional measures to treat energy consumption handle servers and network devices separately. This paper first identifies that the network...
In this paper, we propose a location-release signature scheme based on bilinear pairings for vehicular ad hoc networks (VANETs). Location-release signature is a capsule signature signed by a source location server that becomes valid after the signature arrives at a specific destination location, where a location server publishes some trapdoor information associated with such a destination location...
We introduce variable-bandwidth servers (VBS) for scheduling and executing processes under programmable temporal isolation. A VBS is an extension of a constant-bandwidth server where throughput and latency of process execution can not only be controlled to remain constant across different competing workloads but also to vary in time as long as the resulting bandwidth stays below a given bandwidth...
Users' confidential data in transit on the WWW are protected by the HTTP's authentication scheme or the SSL protocol. However, the former has several weak points in terms of security, while the latter has a few problems against its wide deplotmemt. To alleviate the problems, we propose a scheme for user-initiated server authentication and two schemes for protecting against the cross-site-scripting...
In peer to peer (P2P) systems agent based load balancing is one of the most important problem. P2P systems are characterized by decentralization, scalability and dynamicity, such that they can been seen as instances of complex adaptive systems (CAS). In this paper we present ant-based load balancing algorithm, which effectively balances loads of peers distributed among P2P systems with the help of...
Research in the area of peer-to-peer systems is mainly focused on structuring the overlay network. Little attention is paid to the process of setting up and joining a peer-to-peer overlay network, i.e. the bootstrapping of peer-to-peer networks. The major challenge is to get hold of one peer that is already in the overlay. Otherwise, the first peer must be able to detect that the overlay is currently...
Based on the Internet self-organized dynamic process, an Internet structure model is presented. When servers are being selected in the Internet, not only the fluid and the bandwidth, but also the distance is needed to be considered. In the self-organized evolution model, the capability of servers is applied to decide the choice of the bandwidth, and the lattice distance of the Kleinberg network model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.