Big Data Load Balancing Based on Network Architecture

Author(s):  
Yu Bin
2019 ◽  
Vol 12 (1) ◽  
pp. 42 ◽  
Author(s):  
Andrey I. Vlasov ◽  
Konstantin A. Muraviev ◽  
Alexandra A. Prudius ◽  
Demid A. Uzenkov

2020 ◽  
Vol 22 (5) ◽  
pp. 51-55
Author(s):  
OLEG N. KORCHAGIN ◽  
◽  
ANASTASIA V. LYADSKAYA ◽  

The article is devoted to the current state of digitalization aimed at solving urgent problems of combating corruption in the field of public administration and private business sector. The work considers the experience of foreign countries and the influence of digital technologies on the fight against corruption. It is noted that the digitalization of public administration is becoming one of the decisive factors for increasing the efficiency of the anti-corruption system and improving management mechanisms. Big Data, if integrated and structured according to the given parameters, allows the implementation of legislative, law enforcement, control and supervisory and law enforcement activities reliably and transparently. Big Data tools allow us to analyze processes, identify dependencies and predict corruption risks. The author describes the most significant problems that complicate the transfer of offline technologies into the online environment. The paper analyzes promising directions for the development of digital technologies that would lead to solving the arising problems, as well as to implement tasks that previously seemed unreachable. The article also describes current developments in the field of collecting and managing large amounts of data, the “Internet of Things”, modern network architecture, and other advances in the field of IT; the work provides applied examples of their potential use in the field of combating corruption. The study gives reasons that, in the context of combating corruption, digitalization should be allocated in a separate area of activity that is controlled and regulated by the state.


2021 ◽  
Author(s):  
Amir Javadpour ◽  
Ali Majed Hossein Abadi ◽  
Samira Rezaei ◽  
Mozhdeh Zomorodian ◽  
Ali Shokouhi Rostami

2015 ◽  
Vol 28 (8) ◽  
pp. 2440-2456 ◽  
Author(s):  
Maeva Antoine ◽  
Laurent Pellegrino ◽  
Fabrice Huet ◽  
Françoise Baude

Author(s):  
Tariq Emad Ali ◽  
Ameer Hussein Morad ◽  
Mohammed A. Abdala

<span>In the last two decades, networks had been changed according to the rapid changing in its requirements.  The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations.  The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs.  Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and forwarding planes. So, due to the rapid increase in the number of applications, websites, storage space, and some of the network resources are being underutilized due to static routing mechanisms. To overcome these limitations, a Software Defined Network based Openflow Data Center network architecture is used to obtain better performance parameters and implementing traffic load balancing function. The load balancing distributes the traffic requests over the connected servers, to diminish network congestions, and reduce underutilization problem of servers. As a result, SDN is developed to afford more effective configuration, enhanced performance, and more flexibility to deal with huge network designs</span>


2021 ◽  
Vol 336 ◽  
pp. 08001
Author(s):  
Ruicai Huo ◽  
Songqiu Liu ◽  
Shiwei He

The paper takes the authentication gateway system for internal office network as the research object, for the performance bottleneck and single point of failure problem of the single authentication gateway deployed in the existing primary and standby modes, chooses an authentication gateway integration method based on CA certificate. The practical results show that: through implementing the authentication gateway cluster design and introducing load balancing mechanism, this method solves the performance, stability and single point of failure of the authentication gateway, and improves the resource utilization of the authentication gateway device. This method introduced in this paper can be used for reference for the network architecture optimization based on the server load balancing technology.


Sign in / Sign up

Export Citation Format

Share Document