Increasingly, distributed systems are being constructed by composing a number of discrete components. this practice, termed composition, is particularly prevalent within the Web service domain. Here, enterprise system...
详细信息
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired networks such as the Internet often c...
详细信息
ISBN:
(纸本)0769524664
Due to the nature of radio transmissions, communications in wireless networks are easy to capture and analyze. Next to this, privacy enhancing techniques (PETs) proposed for wired networks such as the Internet often cannot be applied to mobile ad hoc networks (MANETs). In this paper we present a novel anonymous on demand routing scheme for MANETs. We identify a number of problems of previously proposed works and propose an efficient solution that provides anonymity in a stronger adversary model.
Withthe rapid development and wide application of distributed collaborative technology, people now are able to easily collaborate with each other in a relatively small scale and location. But there are still numerous...
详细信息
IEEE Std 1471 defines architectural views as addressing related stakeholder concerns, but gives no guidance as to what architectural concerns are or how they should be found. In this paper we present an inquiry tool t...
Enterprise software development is a very knowledge-intensive process. Modern component-based application development organizations often require collaboration of several stakeholders distributed between different sit...
详细信息
Switching between protocols based on environment is an elegant idea of enabling adaptation in distributed systems. In this paper, we give one approach of switching between two connected dominating set (CDS) constructi...
详细信息
ISBN:
(纸本)9783540681397
Switching between protocols based on environment is an elegant idea of enabling adaptation in distributed systems. In this paper, we give one approach of switching between two connected dominating set (CDS) construction protocols, one suitable for low load and the other suitable for higher load. In this method, the two connected dominating sets are computed in advance and switching is done between the two precomputed outputs. In addition, some CDS of the network is always maintained when switching is in progress.
Enterprise computing faces major challenges such as ever-increasing size and complexity and escalating costs of administering mission-critical IT systems, numerous human-caused failures and outages of IT systems, lack...
详细信息
the success of web services has influenced the way in which Grid applications are being written. Web services are increasingly used as a means to realise service-oriented distributedcomputing. Grid users often submit...
详细信息
Virtual Network computing (VNC) has emerged as a promising technology in distributedcomputing environment since its invention in the late nineties. Successful application of VNC requires rapid data transfer from one ...
详细信息
ISBN:
(纸本)9789806560680
Virtual Network computing (VNC) has emerged as a promising technology in distributedcomputing environment since its invention in the late nineties. Successful application of VNC requires rapid data transfer from one machine to another over a TCP/IP network connection. However transfer of screen data consumes much network bandwidth and current data encoding schemes for VNC are far from being ideal. this paper seeks to improve screen data compression techniques to enable VNC over slow connections and present a reasonable speed and image quality. In this paper, a hybrid technique is proposed for improving coding efficiency. the algorithm first divides a screen image into pre-defined regions and applies encoding schemes to each area according to the region characteristics. Second, correlation of screen data in consecutive frames is exploited where multiple occurrences of similar image contents are detected. the improved results are demonstrated in a dynamic environment with various screen image types and desktop manipulation.
Fibre channel storage area networks (SAN) are widely implemented in production data center environments. Recently the storage industry has moved towards deployment of distributed SANs (DSAN), geographically dispersed ...
详细信息
ISBN:
(纸本)9789806560673
Fibre channel storage area networks (SAN) are widely implemented in production data center environments. Recently the storage industry has moved towards deployment of distributed SANs (DSAN), geographically dispersed across large physical distances. In a distributed SAN, specialized gateway devices interconnect the individual Fibre Channel fabrics over IP networks using TCP/IP based protocols (iFCP, FCIP) or over metro to long distance optical networks such as DWDM using native Fibre Channel ports supporting large numbers of link credits. When using TCP/IP based storage networking protocols to interconnect local FC fabrics in a distributed SAN, the sustained throughput achievable depends upon the link characteristics and TCP/IP stack implementation. Sustaining maximum possible storage traffic throughput across the wide area network enables practical distributed SAN deployments by maintaining the required site to site service level agreements. this study explores the effects of several TCP/IP modifications known as storage friendly on sustained traffic throughput for a distributed SAN interconnected via iFCP gateways across an impaired network. the TCP/IP stack modifications include changes to the window scaling, congestion avoidance, and fast recovery algorithms. the theoretical background and experimental results are presented to explain and illustrate these modifications.
暂无评论