INSTANCE: The Intermediate Storage Node Concept
نویسندگان
چکیده
The objective of the INSTANCE (Intermediate Storage Node Concept) project is to support asynchronous communication in server-based systems, like World-Wide Web and Video-on-Demand, more efficiently by a new structure for server-based systems. The proposed approach will lead to a structure that is capable to support concurrently a higher number of clients with lower costs (compared to traditional approaches). Servers, which are called intermediate storage nodes in INSTANCE, are seen as a vehicle to transfer information in asynchronous mode from provider to consumer. The protocol stack is drastically reduced at the server in analogy to intermediate network nodes. The Integrated Layer Processing principle is applied to the handling of data management system, application, and the remaining communication protocol.
منابع مشابه
Constraints on Tree Structure in Concept Formation
We describe ARACHNE, a concept formation system that, uses explicit constraints on tree structure and local restructuring operators to produce well-formed probabilistic concept trees. We also present a quantitative measure of tree quality and compare the system's performance in artificial and natural domains to that of COBWEB, a well-known concept formation algorithm. The results suggest that A...
متن کاملAPPLICATION OF THE BELLMAN AND ZADEH'S PRINCIPLE FOR IDENTIFYING THE FUZZY DECISION IN A NETWORK WITH INTERMEDIATE STORAGE
In most of the real-life applications we deal with the problem of transporting some special fruits, as banana, which has particular production and distribution processes. In this paper we restrict our attention to formulating and solving a new bi-criterion problem on a network in which in addition to minimizing the traversing costs, admissibility of the quality level of fruits is a main objecti...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملNetwork Level Framing in INSTANCE
Internet services like the world-wide web and applications like News-on-Demand have become very popular over the last years. The number of users, as well as the amount of multimedia data downloaded by each user from servers in the Internet, is rapidly increasing. In this context, the potentially (very) high number of concurrent users that retrieve data from servers represents a generic problem....
متن کاملA Non-MDS Erasure Code Scheme for Storage Applications
This paper investigates the use of redundancy and self repairing against node failures indistributed storage systems using a novel non-MDS erasure code. In replication method, accessto one replication node is adequate to reconstruct a lost node, while in MDS erasure codedsystems which are optimal in terms of redundancy-reliability tradeoff, a single node failure isrepaired after recovering the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997