Xu | Scalable and Secure Internet Services and Architecture | E-Book | www2.sack.de
E-Book

Xu Scalable and Secure Internet Services and Architecture


Erscheinungsjahr 2005
ISBN: 978-1-4200-3520-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 416 Seiten

Reihe: Chapman & Hall/CRC Computer & Information Science Series

ISBN: 978-1-4200-3520-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid computing.

The author discusses each topic by first defining a problem, then reviewing current representative approaches for solving it. He then describes in detail the underlying principles of the technologies and the application of these principles, along with balanced coverage of concepts and engineering trade-offs. The book demonstrates the effectiveness of the technologies via rigorous mathematical modeling and analysis, simulation, and practical implementations. It blends technologies in a unified framework for scalable and secure Internet services, delivering a systematic treatment based upon the author's cutting-edge research experience.

This volume describes in breadth and depth advanced scaling technologies that support media streaming, e-commerce, grid computing, personalized content delivery, distributed file sharing, network management, and other Internet applications.

Xu Scalable and Secure Internet Services and Architecture jetzt bestellen!

Zielgruppe


Computer scientists, electrical engineers, electrical engineering and computer science students, and Internet computing professionals


Autoren/Hrsg.


Weitere Infos & Material


Internet Services

Introduction

Requirements and Key Challenges

Examples of Scalable Internet Services

Road Map to the Book

Network Load Balancing

The Load Balancing Problem

Server Load Balancing
Load Balancing in Service Overlay Networks

A Unified W5 Load Balancing Model

Load Balancing on Streaming Server Clusters

Introduction

The Video Replication and Placement Problem

Replication and Placement Algorithms

Service Availability Evaluation

Concluding Remarks

QoS-Aware Resource Management on Internet

Servers
Introduction

Service Differentiation Architecture

QoS-Aware Admission Control

QoS-Aware Resource Management

Content Adaptation

Service Differentiation on Streaming Servers

Introduction

Bandwidth Allocation for Differentiated Streaming Services

Harmonic Proportional-Share Allocation Scheme

Implementation Issues

Service Availability Evaluation

Concluding Remarks

Service Differentiation on E-Commerce Servers

Introduction

2D Service Differentiation Model

An Optimal Processing Rate Allocation Scheme

Effectiveness of 2D Service Differentiation

Concluding Remarks

Feedback Control for QoS Guarantees
Introduction

Slowdown in an M/GP /1 Queueing System

Processing Rate Allocation with Feedback Control

Robustness of the Integrated Approach

QoS-Aware Apache Server with Feedback Control
Concluding Remarks

Decay Function Model for Server Capacity Planning

Introduction

The Decay Function Model

Resource Configuration and Allocation

Performance Evaluation

Concluding Remarks

Scalable Constant-Degree Peer-to-Peer Overlay Networks

Introduction

Topological Model of DHT-Based P2P

Cycloid: A Constant-Degree DHT

Cycloid Performance Evaluation

Concluding Remarks

Semantic Prefetching of Web

Introduction

Personalized Semantic Prefetching

NewsAgent: A News Prefetching System

Experimental Methodology

Experimental Results

Related Work

Concluding Remarks

Mobile Code Security

Introduction

Design Issues in Mobile Agent Systems

Agent Host Protections

Mobile Agent Protections

A Survey of Mobile Agent Systems

Naplet: A Mobile Agent Approach

Introduction

Design Goals and Naplet Architecture

Structured Itinerary Mechanism

Naplet Tracking and Location Finding

Reliable Agent Communication

Security and Resource Management

Programming for Network Management in Naplet

Itinerary Safety Reasoning and Assurance

Introduction

MAIL: A Mobile Agent Itinerary Language

Regular-Completeness of MAIL

Itinerary Safety Reasoning and Assurance

Concluding Remarks

Security Measures for Server Protection

Introduction

Agent-Oriented Access Control

Coordinated Spatio-Temporal Access Control

Concluding Remarks

Connection Migration in Mobile Agents

Introduction

NapletSocket: A Connection Migration Mechanism

Design Issues in NapletSocket

Experimental Results of NapletSocket

Performance Model of Agent Mobility

Concluding Remarks

Mobility Support for Adaptive Grid Computing

Introduction

An Agent-Oriented Programming Framework

Distributed Shared Arrays for Virtual Machines

Experimental Results

Concluding Remarks

Service Migration in Reconfigurable Distributed Virtual

Machines
Introduction

M-DSA: DSA with Service Mobility Support

Service Migration in M-DSA

Interface to Globus Service

Experiment Results

Related Work

Concluding Remarks

Migration Decision in Reconfigurable Distributed Virtual Machines
Introduction

Reconfigurable Virtual Machine Model

Service Migration Decision

Hybrid Migration Decision

Simulation Results

Concluding Remarks



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.