Servers (Computer Science) Research Papers (original) (raw)
Step by step Windows 2008 R2 server tutorial with illustration.
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and... more
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and the underlying efficiency of such facilities or evaluate the costs of alternatives, such as off-site computing. Well understanding of the cost drivers of TCO models can provide more opportunities to business owners to control costs .In addition, they also introduce an analytical structure in which anecdotal information can be cross-checked for consistency with other well-known parameters driving data center costs. This work focuses on comparing between number of proposed tools and spreadsheets which are publicly available to calculate datacenter total cost of ownership (TCO) ,The comparison is based on many aspects such as what are the parameters included and not included in such tools and whether the tools are documented or not. Such an approach presents a solid ground for designing more and better tools and spreadsheets in the future.
Rspberry Pi 4 B, Raspbian OS et SAMBA server
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and... more
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and the underlying efficiency of such facilities or evaluate the costs of alternatives, such as off-site computing. Well understanding of the cost drivers of TCO models can provide more opportunities to business owners to control costs .In addition, they also introduce an analytical structure in which anecdotal information can be cross-checked for consistency with other well-known parameters driving data center costs. This work focuses on comparing between number of proposed tools and spreadsheets which are publicly available to calculate datacenter total cost of ownership (TCO) ,The comparison is based on many aspects such as what are the parameters included and not included in such tools and whether the tools are documented or not. Such an approach p...
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and... more
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and the underlying efficiency of such facilities or evaluate the costs of alternatives, such as off-site computing. Well understanding of the cost drivers of TCO models can provide more opportunities to business owners to control costs .In addition, they also introduce an analytical structure in which anecdotal information can be cross-checked for consistency with other well-known parameters driving data center costs. This work focuses on comparing between number of proposed tools and spreadsheets which are publicly available to calculate datacenter total cost of ownership (TCO) ,The comparison is based on many aspects such as what are the parameters included and not included in such tools and whether the tools are documented or not. Such an approach presents a solid ground for designing more and better tools and spreadsheets in the future.
With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening.
Modul Panduan Installasi dan Konfigurasi Debian 8 dengan paket aplikasi Apache2, PHP5, Open-SSH, Bind9, ProFTPD, MySQL, Squid3.
Untuk Layanan Server Jaringan WEB Server, FTP Server, Mail Server, DNS Server, Gateway, Proxy Server.
Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease and low costs of launching such attacks, supplemented by the... more
Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease and low costs of launching such attacks, supplemented by the current inadequate sate of any viable defence mechanism, have made them one of the top threats to the Internet community today. Since the increasing popularity of web-based applications has led to several critical services being provided over the Internet, it is imperative to monitor the network traffic so as to prevent malicious attackers from depleting the resources of the network and denying services to legitimate users. This paper first presents a brief discussion on some of the important types of DDoS attacks that currently exist and some existing mechanisms to combat these attacks. It then points out the major drawbacks of the currently existing defense mechanisms and proposes a new mechanism for protecting a web-server against a DDoS attack. In the proposed mechanism, incoming traffic to the server is continuously monitored and any abnormal rise in the inbound traffic is immediately detected. The detection algorithm is based on a statistical analysis of the inbound traffic on the server and a robust hypothesis testing framework. While the detection process is on, the sessions from the legitimate sources are not disrupted and the load on the server is restored to the normal level by blocking the traffic from the attacking sources. To cater to different scenarios, the detection algorithm has various modules with varying level of computational and memory overheads for their execution. While the approximate modules are fast in detection and involve less overhead, they provide lower level of detection accuracy. The accurate modules employ complex detection logic and hence involve more overhead for their execution. However, they have very high detection accuracy. Simulations carried out on the proposed mechanism have produced results that demonstrate effectiveness of the proposed defence mechanism against DDoS attacks.
Ration distribution and food supplies to the public are one of the most fundamental government services. It has to be in the right manner especially for under people under povertyline. Its miles must important to well distribute... more
Ration distribution and food supplies to the public
are one of the most fundamental government services. It has to be
in the right manner especially for under people under povertyline. Its miles must important to well distribute ration cards.
The card is also used to recognize people of the town or city like
a voter card additionally it is very important for individuals who
do not have a voter card to have a minimum ration card to
determine his identity. Waiting in line is a critical problem
inside the context of services because of its huge effect on
operating skills and the pleasure of clients of the system. The
way queues are arranged and the way lengthy clients need to
anticipate products or services have laid the bottom for figuring
out the maximum most desirable solution in the queue which
can provide swap to reduce operating fee incurred during
optimization queues, in addition to reducing the time spent
through the means of ready-to-serve customers. Like the
cutting-edge move from platform established to oriented
carriers, that It grow to be unimportant to very well draw close
the way to successfully manipulate ready strains and in flip
enhance at the patron pleasure in an organization. The goal of
this project is to save the group in ration stores the usage of the
android application. First, the details like ration card numbers
should be given in the android application, which is then
connected to the corresponding ration shop. Then, the product
details such as product names with quantity will be displayed in
the mobile application. This app can call To the respective
servers to access the data that will surely help customers to book
Their tokens are online without waiting in the queue. This
project tested the shortcomings of conventional and cuttingedge approached to queuing control, studying the sorts and
programs of diverse queue control things, and eventually coined
a generic Technique and method for planning and expanding
the digital queue control system.
Uzaktan öğrenme gereksinimlerinin artması ve teknolojideki gelişmeler nedeniyle e-Öğrenme içeriğinin yapımı ve sunumunda giderek karmaşıklaşan iş süreçleri ortaya çıkmaktadır. E-Öğrenme içeriğinin yapımında ve sunumda etkin olan süreçler... more
Uzaktan öğrenme gereksinimlerinin artması ve teknolojideki gelişmeler nedeniyle e-Öğrenme içeriğinin yapımı ve sunumunda giderek karmaşıklaşan iş süreçleri ortaya çıkmaktadır. E-Öğrenme içeriğinin yapımında ve sunumda etkin olan süreçler ve iş akışı tasarlanırken insan gücü, donanım ve yazılım bileşenleri önem kazanmaktadır. Bu çalışmada Anadolu Üniversitesi Açıköğretim sisteminde üretilen ve uzaktan öğretim gören öğrencilere sunulan e-Öğrenme içeriğinin yapım süreci ve sunum altyapısı örneği incelenerek e-öğrenme içeriğinin yapım ve sunum süreçlerindeki güncel gelişmeler değerlendirilmiştir.
I use this configuration for the outgoing mail server and it works on iPhones Blackberry and Samsung phones. SMPT Server: SMTP.Gmail.Com Security Type: SSL, port 465 Require sign-in: yes Username: youremail@gmail.com Password: your... more
I use this configuration for the outgoing mail server and it works on iPhones Blackberry and Samsung phones.
SMPT Server: SMTP.Gmail.Com
Security Type: SSL, port 465
Require sign-in: yes
Username: youremail@gmail.com
Password: your password of the g-mail account.
The mobile phones are becoming now an irreplaceable utility of every household. It serves as wall clock, alarm clock, calculator, calendar, timer and many more, but have this multi-functionality overloaded the interface of the new... more
The mobile phones are becoming now an irreplaceable utility of every household. It serves as wall clock, alarm clock, calculator, calendar, timer and many more, but have this multi-functionality overloaded the interface of the new generation of the mobile phones. The youth have adapted well to these multiple functionalities graphical user interface, but the interface has now haunting effects for usage by the two age groups i.e. elderly and kids. The interface may end up leading the new generation mobiles in the market useless or of very little use to the elderly and kids. This leads towards the need of age based user interface in the mobile operating system which will consist of interface selection home screen which further directs to age oriented interfaces.
This chapter describes a conceptual framework that aims to augment existing eLearning systems with a 3D virtual classroom environment to provide geographically dispersed online learners with a sense of being together and part of a natural... more
This chapter describes a conceptual framework that aims to augment existing eLearning systems with a 3D virtual classroom environment to provide geographically dispersed online learners with a sense of being together and part of a natural class. The virtual classroom model the authors present is based on a combination a ‘massively multi-user’ games technology system from Sun Microsystems Research Labs, a distance learning platform based at Shanghai Jiaotong University and a mixed reality environment developed at Essex University. Learning is, to some extent, a social activity as it involves relationships between people (between students, between students and teachers). Networked technology has a global reach bringing not just new opportunities but also complex multi-cultural and pedagogical issues. Thus, in this chapter the authors discuss both the technology and the socio-educational aspects of designing online Mixed Reality Hybrid Learning systems
The increasing need for traffic detection system has become a vital area in both developing and developed countries. However, it is more important to get the accurate and valuable data to give the better result about traffic condition.... more
The increasing need for traffic detection system has become a vital area in both developing and developed countries. However, it is more important to get the accurate and valuable data to give the better result about traffic condition. For this reason, this paper proposes an approach of tracking traffic data as cheap as possible in terms of communication, computation and energy efficient ways by using mobile phone network. This system gives the information of which vehicles are running on which location and how much speed for the Traffic Detection System. The GPS sensor of mobile device will be mainly utilized to guess a user's transportation mode, then it integrates cloud environment to enhance the limitation of mobile device, such as storage, energy and computing power. This system includes three main components: Client Interface, Server process and Cloud Storage. Some tasks are carried out on the Client. Therefore, it greatly reduces the bottleneck situation on Server side in efficient way. Most of tasks are executed on the Server and history data are stored on the Cloud Storage. Moreover, the paper mainly uses the distance based clustering algorithm in grouping mobile devices on the same bus to get the accurate data.
Setting Debian Server Paket 1 Ujian Kompetensi Nasional
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and... more
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and the underlying efficiency of such facilities or evaluate the costs of alternatives, such as off-site computing. Well understanding of the cost drivers of TCO models can provide more opportunities to business owners to control costs .In addition, they also introduce an analytical structure in which anecdotal information can be cross-checked for consistency with other well-known parameters driving data center costs. This work focuses on comparing between number of proposed tools and spreadsheets which are publicly available to calculate datacenter total cost of ownership (TCO) ,The comparison is based on many aspects such as what are the parameters included and not included in such tools and whether the tools are documented or not. Such an approach presents a solid ground for designing more and better tools and spreadsheets in the future.
8th International Conference on Computer Science and Information Technology (CoSIT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science,... more
8th International Conference on Computer Science and Information Technology (CoSIT 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information Technology. The Conference looks for significant contributions to all major fields of the Computer Science and Information Technology in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Los servidores dedicados son los más solicitados para cuando tienes sitios con altas visitas o consumos de recursos, ya que cuentan con un mejor rendimiento para aplicaciones o páginas web, algunas personas buscan un servidor no dedicado,... more
Los servidores dedicados son los más solicitados para cuando tienes sitios con altas visitas o consumos de recursos, ya que cuentan con un mejor rendimiento para aplicaciones o páginas web, algunas personas buscan un servidor no dedicado, a estos se los conoce como hosting o servidores compartidos. Ventajas: • Estos servidores permiten tener múltiples dominios. • Pueden ser administrados por el cliente. • Pueden ser administrados por el proveedor. • No tendrás limitaciones de ancho de banda ni de espacio en disco • Puedes optimizar mucho el rendimiento de tu página web o app, si vas a trabajar con bases de datos grandes o tener buena cantidad de visitas simultaneas, notarás la diferencia de rendimiento en comparación a otros hosting compartidos • Todos los recursos y potencia del hardware solo para ti, olvídate de que te ande mal tu web por vecinos con mucho trafico. • Los servidores dedicados son administrados (en la mayoría de los casos) por el proveedor, por lo tanto, no tienes que preocuparte por tener los conocimientos para hacerlo. • Tienes una seguridad mayor, ya que sabes que es lo que pasa con tu servidor dedicado en todo momento • Tendrás una mayor seguridad y un mejor uso de los recursos ofrecidos Desventajas: • Su alto precio: Debido a la gran cantidad de recursos que posee, cuesta mucho más que un servidor compartido. ¿En que momento decidirse por un servidor dedicado? • Cuando tienes picos de visitas muy altas • Cuando tu sitio web se cae • Cuando tu base de datos se ha vuelto muy grande • Cuando estas llegando al limite de ancho de banda. Ing. José Torres CEO and Developer WebMaster
Worldwide Interoperability for Microwave Access (WiMAX) networks were expected to be the main Broadband Wireless Access (BWA) technology that provided several services such as data, voice, and video services including different classes of... more
Worldwide Interoperability for Microwave Access (WiMAX) networks were expected to be the main Broadband Wireless Access (BWA) technology that provided several services such as data, voice, and video services including different classes of Quality of Services (QoS), which in turn were defined by IEEE 802.16 standard. Scheduling in WiMAX became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users; this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, we presenedt a simulation study to measure the performance of several scheduling algorithms in WiMAX, which were Strict Priority algorithm, Round-Robin (RR), Weighted Round Robin (WRR), Weighted Fair Queuing (WFQ), Self-Clocked Fair (SCF), and Diff-Serv Algorithm.
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and... more
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and the underlying efficiency of such facilities or evaluate the costs of alternatives, such as off-site computing. Well understanding of the cost drivers of TCO models can provide more opportunities to business owners to control costs .In addition, they also introduce an analytical structure in which anecdotal information can be cross-checked for consistency with other well-known parameters driving data center costs. This work focuses on comparing between number of proposed tools and spreadsheets which are publicly available to calculate datacenter total cost of ownership (TCO) ,The comparison is based on many aspects such as what are the parameters included and not included in such tools and whether the tools are documented or not. Such an approach presents a solid ground for designing more and better tools and spreadsheets in the future.
Setting Debian sesuai dengan Paket Soal Uji Kompetensi Nasional
Recently I purchased a virtual ubuntu server on rackspace. However I have to manage it myself, and this includes first of all taking care for its security. Securing it is very important and is the first thing to be done, since all the... more
Recently I purchased a virtual ubuntu server on rackspace. However I have to manage it myself, and this includes first of all taking care for its security. Securing it is very important and is the first thing to be done, since all the rackspace servers have public IP-s and so are open to all the possible attacks from the Internet. Here I will describe some of the steps that can be done to secure the server.
Mobile phones are a widely-available class of device with supporting communications infrastructure which can be appropriated and exploited to support ubicomp experiences. However, mobile phones vary hugely in their capabilities,... more
Mobile phones are a widely-available class of device with supporting communications infrastructure which can be appropriated and exploited to support ubicomp experiences. However, mobile phones vary hugely in their capabilities, especially with regard to communication, context sensing and application hosting. This report explains how a single dimension of ‘phone application type’ embodies the critical trade-off between capability and availability, i.e. between what can be done and the fraction of potential participants’ phones that can do this. The report describes four different mobile phone ubicomp experiences that illustrate different points along this continuum (SMS, WAP/Web, and J2ME, Python and native applications). It then introduces a common software platform that has been co-developed to support these experiences. From this, and supported by a survey of the core experience developers, it then identifes four strategies for addressing mobile phone diversity: prioritise support for server development (including web integration), migrate functionality between server(s) and handset(s), support flexible communication options, and use a loosely coupled (data-driven and component-based) software approach.
Data obfuscation is the process of converting a constant or a variable into computational results of several constants to make it hard for the files to be detected or analyzed by anti-malware engines. In recent years, malicious based... more
Data obfuscation is the process of converting a constant or a variable into computational results of several constants to make it hard for the files to be detected or analyzed by anti-malware engines. In recent years, malicious based attacks are considered as one of the highest internet threats; as the majority of internet users depend on antivirus software as a protection tool, attackers use obfuscation techniques to achieve high evasion rates against different anti-viruses. In this paper, we introduce multiple techniques consists of four stages that aid a malware; to avoid anti-malware tools, these techniques were mainly developed to provide a high evasion rate against anti-malware systems via dynamic analysis techniques. The evasion rate success of our samples were tested through (Kaspersky, Virustotal and Virusscan), then the result of our experiment were compared with other obfuscation techniques to stand on the success level of the experiment as well as extracting the strength and weakness points for any possible future works.
Two-level logic minimization is a central problem in logic synthesis, and has applications in reliability analysis and automated reasoning. This paper represents a method of minimizing Boolean sum of products function with binary decision... more
Two-level logic minimization is a central problem in logic synthesis, and has applications in reliability analysis and automated reasoning. This paper represents a method of minimizing Boolean sum of products function with binary decision diagram and with disjoint sum of product minimization. Due to the symbolic representation of cubes for large problem instances, the method is orders of magnitude faster than previous enumerative techniques. But the quality of the approach largely depends on the variable ordering of the underlying BDD. The application of Binary Decision Diagrams (BDDs) as an efficient approach for the minimization of Disjoint Sums-of-Products (DSOPs). DSOPs are a starting point for several applications. The use of BDDs has the advantage of an implicit representation of terms. Due to this scheme the algorithm is faster than techniques working on explicit representations and the application to large circuits that could not be handled so far becomes possible. Theoretical studies on the influence of the BDDs to the search space are carried out. In experiments the proposed technique is compared to others. The results with respect to the size of the resulting DSOP are as good or better as those of the other techniques.
E-Mail tracking is that the process of following the trail and performance performed by the receiver on the received mail. It basically allows the sender to bear in mind of where, when and the way his mail reaches the client and what the... more
E-Mail tracking is that the process of following the trail and performance performed by the receiver on the received mail. It basically allows the sender to bear in mind of where, when and the way his mail reaches the client and what the receiver does with the mail. Many existing mail clients provide very fundamental features like Reading, Forwarding, Moving, Deleting, etc. But most of them don't provide a signal for having read the mail, security measures like Block Forwarding, Retracting, Block Printing and saving, etc. The aforementioned issues are resolved by this Multi-Functional Email tracking system. the event of this technique serves the aim of incorporating these features into the mail client to supply a versatile, customized and secured way of mailing. The Tracking and Notification feature is geared toward providing a proof-of-reading a mail which hardly any communicating provides. The Notification messages may be sent to either the sender's mail id. The Retractable Mails is geared toward providing a way by which a sender can delete a specific mail even after sending it. this is often used when an individual sends a mail to a wrong mail id. The Block-backup feature provides a way of preventing printing, saving and copying the mail contents. this could be used for secured mails that aren't intended for manipulation. The Self-Destructible mail is additionally an identical security add-on, but during a different context. Encryption is especially done to forestall access from undesired users. within the same way this feature prevents unintended users from viewing the mail.
From building eco-friendly data centers to buy RECs, they are working to make the world a better and healthier place to live in, without compromising on the service. Below are the top hosts picked by us that are providing green web... more
From building eco-friendly data centers to buy RECs, they are working to make the world a better and healthier place to live in, without compromising on the service. Below are the top hosts picked by us that are providing green web hosting services
Već dugi niz godina svedoci smo važnosti procesa digitalizacije AV sadržaja i tranzicije sa konvencionalnih medija za pohranu i čuvanje na moderne medije i sisteme za dugovječno čuvanje kulturnih i drugih sadržaja. Polako, ali sigurnim... more
Već dugi niz godina svedoci smo važnosti procesa digitalizacije AV sadržaja i tranzicije sa konvencionalnih medija za pohranu i čuvanje na moderne medije i sisteme za dugovječno čuvanje kulturnih i drugih sadržaja. Polako, ali sigurnim koracima, TV studijska produkcija, produkcija muzičkih sadržaja, umjetničke fotografije i drugo, napuštaju analogni svijet i polako postaju dio digitalne svakodnevnice, prateći na taj način modene tehničke i tehnološke trendove, a oslanjajući se na sve prednosti navedenih tehnoloških rješenja. Aktuelnost ovog problema, glavna je ideja ovog rada, gdje će biti predstavljen optimalni pristup za dizajniranje servera za pohranu i dugovječno čuvanje AV sadržaja, vodeći pri tome računa o tehničkim i finansijskim ograničenjima, koja se u praktičnim realizacijama neosporno nameću.
This paper presents practical protocols for authenticating the parameters that characterise a principal's context. Context features in what are known as mobile, ubiquitous, pervasive and nomadic computing systems. Location, in particular,... more
This paper presents practical protocols for authenticating the parameters that characterise a principal's context. Context features in what are known as mobile, ubiquitous, pervasive and nomadic computing systems. Location, in particular, is a highly significant contextual parameter. We present a model of context authentication based on the characteristics of communication channels. Then we present protocols for location authentication that are based on physical channel characteristics, including a protocol that we have implemented over HTTP for use from any Web browser. We conclude with a summary and discussion of the work.
There has been a significant shift in paradigm as more and more organizations are transferring their valuable data and information to cloud. Cloud service providers have emerged in the market and now the customer has plenty of options to... more
There has been a significant shift in paradigm as more and more organizations are transferring their valuable data and information to cloud. Cloud service providers have emerged in the market and now the customer has plenty of options to consider before choosing the right provider.
Increasing energy costs of large scale server systems has led to a demand for innovative methods for optimizing resource utilization in these systems. These methods aim to reduce server energy consumption, cooling requirements, carbon... more
Increasing energy costs of large scale server systems has led to a
demand for innovative methods for optimizing resource utilization in
these systems. These methods aim to reduce server energy consumption, cooling requirements, carbon footprint, and so forth, thereby leading to improved sustainability of the holistic server infrastructure. At the core of many of these methods lie reliable workload prediction techniques that guide in identifying servers, time intervals and other parameters that are needed for building sustainability solutions based on techniques like virtualization and server consolidation for server systems. Many workload prediction methods have been proposed in the recent literature, but unfortunately they do not deal adequately with the issues that arise specifically in large scale server systems, i.e., extensive non-stationarity of server workloads and massive online streaming data. In this paper, we fill this gap by proposing two online ensemble learning methods for workload prediction which address these issues in large-scale server systems. The proposed algorithms are motivated from the Weighted Majority and Simulatable Experts approaches, which we extend and adapt to the large-scale workload prediction problem. We demonstrate the effectiveness of our algorithms using real and synthetic data sets, and show that using the proposed algorithms, the workloads of approximately 91% of servers in a real data center can be predicted with accuracy greater than 89%, whereas using baseline approachess, the workloads of only 13--24% of the servers can be predicted with similar accuracy.
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and... more
Datacenter total cost of ownerships (TCO) tools and spreadsheets can be used to estimate the capital and operational costs required for running datacenters. These tools are helpful for business owners to improve and evaluate the costs and the underlying efficiency of such facilities or evaluate the costs of alternatives, such as off-site computing. Well understanding of the cost drivers of TCO models can provide more opportunities to business owners to control costs .In addition, they also introduce an analytical structure in which anecdotal information can be cross-checked for consistency with other well-known parameters driving data center costs. This work focuses on comparing between number of proposed tools and spreadsheets which are publicly available to calculate datacenter total cost of ownership (TCO) ,The comparison is based on many aspects such as what are the parameters included and not included in such tools and whether the tools are documented or not. Such an approach presents a solid ground for designing more and better tools and spreadsheets in the future.
– Multiprotocol Label Switching (MPLS) fasten the speed of packet forwarding by forwarding the packets based on labels and reduces the use of routing table look up from all routers to label edge routers(LER) , where as the label switch... more
– Multiprotocol Label Switching (MPLS) fasten the speed of packet forwarding by forwarding the packets based on labels and reduces the use of routing table look up from all routers to label edge routers(LER) , where as the label switch routers (LSRs) uses Label Distribution Protocol (LDP) or RSVP (Resource reservation Protocol) for label allocation and Label table for packet forwarding. Dynamic protocol is implemented which carries a Updates packets for the details of Label Switch Paths, along with this feedback mechanism is also introduced which find the shortest path among MPLS network and also feedback is provided which also help to overcome congestion, this feedback mechanism is on a hop by hop basis rather than end to end thus providing a more reliable and much faster and congestion free path for the packets .
The use of Deep Packet Inspection (DPI) equipment in a network could simplify the conventional workload for system management and accelerate the control action. The authors proposed a congestion control method that uses DPI equipment... more
The use of Deep Packet Inspection (DPI) equipment in a network could simplify the conventional workload for system management and accelerate the control action. The authors proposed a congestion control method that uses DPI equipment installed in a network to estimate overload conditions of servers or network lines and, upon detecting an overload condition, resolves congestion by moving some virtual machines to other servers or rerouting some communication flows to other routes. However, since the previous paper was focused on confirming the effectiveness of using DPI technology, it assumed some restrictive control conditions. This paper proposes to enhance the existing DPI-based congestion control, in order to dynamically select an optimal solution for cases where there are multiple candidates available for: virtual machines to be moved, physical servers to which virtual machines are to be moved, communication flows to be diverted, and routes to which communication flows are to be diverted. This paper also considers server congestion for cases where computing power congestion and bandwidth congestion occur simultaneously in a server, and line congestion for cases where the maximum allowable network delay of each communication flow is taken into consideration. Finally, the feasibility of the proposed methods is demonstrated by an evaluation system with real DPI equipment.
In this document, we look at various time domain channel estimation methods with this constraint of null carriers at spectrumborders.We showin detail howto gauge the importance of the " border effect " depending on the number of null... more
In this document, we look at various time domain channel estimation methods with this constraint of null carriers at spectrumborders.We showin detail howto gauge the importance of the " border effect " depending on the number of null carriers, which may vary from one system to another. Thereby we assess the limit of the technique discussed when the number of null carriers is large. Finally the DFT with the truncated singular value decomposition (SVD) technique is proposed to completely eliminate the impact of the null subcarriers whatever their number. A technique for the determination of the truncation threshold for any MIMO-OFDM system is also proposed.
There are many software reliability models that are based on the times of occurrences of errors in the debugging of software. It is shown that it is possible to do asymptotic likelihood inference for software reliability models based on... more
There are many software reliability models that are based on the times of occurrences of errors in the debugging of software. It is shown that it is possible to do asymptotic likelihood inference for software reliability models based on order statistics or Non-Homogeneous Poisson Processes (NHPP), with asymptotic confidence levels for interval estimates of parameters. In particular, interval estimates from these models are obtained for the conditional failure rate of the software, given the data from the debugging process. The data can be grouped or ungrouped. For someone making a decision about when to market software, the conditional failure rate is an important parameter. Order statistics are used in a wide variety of practical situations. Their use in characterization problems, detection of outliers, linear estimation, study of system reliability, life-testing, survival analysis, data compression and many other fields can be seen from the many books. Statistical Process Control (SPC) can monitor the forecasting of software failure and thereby contribute significantly to the improvement of software reliability. Control charts are widely used for software process control in the software industry. In this paper we proposed a control mechanism based on order statistics of cumulative quantity between observations of time domain failure data using mean value function of Half Logistics Distribution (HLD) based on NHPP.
Već dugi niz godina svedoci smo važnosti procesa digitalizacije AV sadržaja i tranzicije sa konvencionalnih medija za pohranu i čuvanje na moderne medije i sisteme za dugovječno čuvanje kulturnih i drugih sadržaja. Polako, ali sigurnim... more
Već dugi niz godina svedoci smo važnosti procesa digitalizacije AV sadržaja i tranzicije sa konvencionalnih medija za pohranu i čuvanje na moderne medije i sisteme za dugovječno čuvanje kulturnih i drugih sadržaja. Polako, ali sigurnim koracima, TV studijska produkcija, produkcija muzičkih sadržaja, umjetničke fotografije i drugo, napuštaju analogni svijet i polako postaju dio digitalne svakodnevnice, prateći na taj način modene tehničke i tehnološke trendove, a oslanjajući se na sve prednosti navedenih tehnoloških rješenja. Aktuelnost ovog problema, glavna je ideja ovog rada, gdje će biti predstavljen optimalni pristup za dizajniranje servera za pohranu i dugovječno čuvanje AV sadržaja, vodeći pri tome računa o tehničkim i finansijskim ograničenjima, koja se u praktičnim realizacijama neosporno nameću.
Već dugi niz godina svedoci smo važnosti procesa digitalizacije AV sadržaja i tranzicije sa konvencionalnih medija za pohranu i čuvanje na moderne medije i sisteme za dugovječno čuvanje kulturnih i drugih sadržaja. Polako, ali sigurnim... more
Već dugi niz godina svedoci smo važnosti procesa digitalizacije AV sadržaja i tranzicije sa konvencionalnih medija za pohranu i čuvanje na moderne medije i sisteme za dugovječno čuvanje kulturnih i drugih sadržaja. Polako, ali sigurnim koracima, TV studijska produkcija, produkcija muzičkih sadržaja, umjetničke fotografije i drugo, napuštaju analogni svijet i polako postaju dio digitalne svakodnevnice, prateći na taj način modene tehničke i tehnološke trendove, a oslanjajući se na sve prednosti navedenih tehnoloških rješenja. Aktuelnost ovog problema, glavna je ideja ovog rada, gdje će biti predstavljen optimalni pristup za dizajniranje servera za pohranu i dugovječno čuvanje AV sadržaja, vodeći pri tome računa o tehničkim i finansijskim ograničenjima, koja se u praktičnim realizacijama neosporno nameću.