Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
DNS is one of the important names in web-based information technology that allows users to be able to browse the desired information. DNS service has some similarities with a list of phone book that stores telephone numbers and addresses. To perform the function, the DNS service configured on a special machine that serves the request is a DNS Server. The reliability and accuracy of a DNS server in...
The WTFast's Gamers Private Network (GPN®) is a client/server solution that makes online games faster. GPN® connects online video-game players with a common game service across a wide-area network. Online games are interactive competitions by individual players who compete in a virtual environment. Response time, latency and its predictability are keys to GPn® success and runs against the vast complexity...
Early detection of any exceptional behavior coupled with comprehensive analysis of related data can significantly reduce performance bottlenecks and outages in any system. Collating the relevant data points and establishing correlation between them to provide an abstract view of potential hotspots has been a challenge in any large multi-tier systems. This paper describes a framework that shall enable...
Reverse proxies are key performance elements of a content distribution network (CDN) and operate as intermediaries between client and upstream (or origin) server traffic. A typical reverse proxy server aims to distribute user workload, more or less equally, among multiple upstream servers. To keep the pace with the growing demand for content, CDNs regularly expand their capacity by adding extra upstream...
In spite of the improvement brought by recent research on load balancing in video on demand (VOD) system, it still as an actuality problem. In this paper we propose a payoff-based dynamic segment replication policy called P-DSR which instead of replicating the entire video file, it divides it into several segments then selects the segments with the highest payoff which can rebalance load faster and...
TCP and UDP are two important protocols in the network transport layer. In this paper, we study the effects of TCP and UDP on the performance of the application. Based on OPNET simulation software, a simple FTP application simulation model was created and the experiment was carried out. In order to test the influences of different transport protocols on the performance of application in different...
Modern websites consist of many rich objects dynamically produced by servers and client terminals at diverse locations. To deliver dynamic objects efficiently, edge computing in which objects are dynamically generated and delivered to client terminals on edge servers located at edge nodes will be effective. It is anticipated that the effectiveness of edge computing depends on the geographical pattern...
The paper focuses on the video publishing on the rented server. When the publisher publishes pre- recorded videos, he has to select a server from many server services in the Internet. In order to allow publishers themselves to select the optimal rented server (with the fastest response) in the Internet to publish the pre-recorded video, some indicators for selection are required. This study first...
Moving target defense is an area of network security research in which machines are moved logically around a network in order to avoid detection. This is done by leveraging the immense size of the IPv6 address space and the statistical improbability of two machines selecting the same IPv6 address. This defensive technique forces a malicious actor to focus on the reconnaissance phase of their attack...
Modern Internet applications are subject to significant variations in workload demand and this may affect the applications performance. Such kind of applications are usually hosted on multi-tiered, cluster based web hosting environments. Dynamic resource allocation play a curial role in handling sudden events where servers are moved from another (quieter) pool to meet such demand. In this work two...
The paper presents creating web system models. The aim of the work was to develop models of the distributed Internet system that allow the performance evaluation. From many possible methods we have selected Queueing Petri Nets consisted of two classes of formal models (Queuing Nets and Petri Nets). In the paper web systems are modeled by Queueing Petri Nets tool. The paper includes the selected results...
Information-Centric Networking (ICN) is a new emerging concept, in which the principal paradigm shifts from the traditional end-to-end connection to the information-centric communication model. In ICN, information unit, such as content or service, is distributed in different sites or data centers to provide large-scale services. A common supporting approach for scalable service provisioning is deploying...
This paper presents a critical review of load balancing policies of network traffic loads composed of TCP/IP application protocols and applications and discusses the performance improvements sustained by such policies. The review introduces principles of network design of cost efficient networking infrastructures in an economy of scale suitable for global internet network traffic loads. Discrete event...
Current Internet performs traffic engineering (TE) by estimating traffic matrices on a regular schedule, and allocating flows based upon weights computed from these matrices. This means the allocation is based upon a guess of the traffic in the network based on its history. Information-Centric Networks on the other hand provide a finer-grained description of the traffic: a content between a client...
Sensor technology is becoming pervasive in our everyday lives, measuring the real world around us. The Internet of Things enables sensor devices to become active citizens of the Internet, while the Web of Things envisions interoperability between these devices and their services. An important problem remains the need for discovering these devices and services globally, ad hoc in real-time, within...
Information centric networking is proposed to deal with the inefficiency of content distributions in traditional networks. It replaces the current host-centric communication paradigm with the content-centric one, so all the network devices can identify and cache the contents passed by.
Many modern Internet applications require fast client-server interaction to maximise user interactivity. This need has caused new work to be proposed to working groups of the Internet Engineering Task Force (IETF), which seek to remove bottlenecks when starting sessions. RFC 6298 improves Transmission Control Protocol (TCP) responsiveness by retransmitting lost SYNs, or first data segments sent after...
Large scale consolidation of distributed systems introduces data sharing between consumers which are not centrally managed, but may be physically adjacent. For example, shared global data sets can be jointly used by different services of the same organization, possibly running on different virtual machines in the same data center. Similarly, neighboring CDNs provide fast access to the same content...
The Internet's tremendous success as well as our maturing realization of its architectural shortcomings have attracted significant research attention towards clean-slate re-designs in recent times. A number of these shortcomings can be traced back to naming. The current Internet uses IP addresses to conflate identity and network location, which results in poor support for mobility and multihoming;...
Secure socket layer (SSL) is the most popular protocol used in the Internet for facilitating secure communications. In this retrospective, we summarize our original paper which analyzed the performance and architectural impact of SSL on the servers and provided insights into the functioning and acceleration of SSL. In addition, we describe advancements in the area that have occurred on this topic...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.