A proxy server by-passing scheme for the chained HTTP proxy networks

Author(s):  
Gijeong Kim ◽  
Sungwon Lee
Keyword(s):  
2014 ◽  
Vol 134 (8) ◽  
pp. 1104-1113
Author(s):  
Shinji Kitagami ◽  
Yosuke Kaneko ◽  
Hidetoshi Kambe ◽  
Shigeki Nankaku ◽  
Takuo Suganuma
Keyword(s):  

2013 ◽  
Vol 284-287 ◽  
pp. 2855-2859
Author(s):  
Li Te Shen ◽  
Shaw Hwa Hwang ◽  
Chi Jung Huang ◽  
Cheng Yu Yeh

The performance improvement on SIP-based VoIP server is given in this paper. The signaling server “SIP Proxy Server” and media streaming server “Media Relay Server” are applied. Firstly, the performance of VoIP server is analyzed and evaluated in detail. Then the effective method is applied to improve the performance of VoIP server. In the analysis results of SIP Proxy Server, the CPU time for the registration and call-setup sessions need 3.241 ms and 7.985 ms respectively. Moreover, in the Media Relay Server system, when the packet size from 1 to 32 bytes, the maximum throughput of packet is about 82,000 and 16,000 per second for UDP and TCP respectively. The large the packet, the less throughput is tenable. There are three methods applied to improve the performance. The capacity by 31 times is achieved. The capacity with 3,524 calls for each Media Relay Server is achieved. The improved method proposed in this paper is reasonable.


2010 ◽  
Vol 15 (10) ◽  
pp. 113-120 ◽  
Author(s):  
Jun-Pyo Lee ◽  
Chul-Young Cho ◽  
Cheol-Hee Kwon ◽  
Jong-Soon Lee ◽  
Tae-Yeong Kim

2013 ◽  
Author(s):  
Sureshkumar V. Subramanian ◽  
Rudra Dutta
Keyword(s):  

Author(s):  
Seongho Park ◽  
Seungwon Lee ◽  
Yongwoon Park ◽  
Hwasei Lee ◽  
Yongju Kim ◽  
...  

Author(s):  
Dalila Boughaci ◽  
Brahim Oubeka ◽  
Abdelkader Aissioui ◽  
Habiba Drias ◽  
Belaïd Benhamou

This chapter presents the design and the implementation of a decentralized firewall. The latter uses autonomous agents to coordinately control the traffic on the network. The proposed framework includes a set of controllers’ agents that ensure the packets filtering services, a proxy agent that plays a role of a proxy server and an identifier agent which is responsible for user authentication. The decentralization of the different agents’ activities is managed by an administrator agent which is a core point for launching the most important operations of the access control. A prototype has been designed and implemented. Furthermore, the authors hope that the underlying framework will inform researchers of a possible way to implement a decentralized firewall to improve the current solution, and will help readers understand the need for techniques and tools such as firewalls that are useful to protect their network traffic.


Author(s):  
Z. Abdul-Mehdi ◽  
A. Mamat ◽  
H. Ibrahim ◽  
M. Dirs

In this article, we consider the distributed database that can make up mobile nodes and the peer-to-peer concept. These nodes are peers and may be replicated both for fault-tolerance, dependability, and to compensate for nodes that are currently disconnected. Thus we have a distributed replicated database where several sites must participate in the synchronization of transactions. The capabilities of the distributed replicated database are extended to allow mobile nodes to plan disconnection, with the capability of updating the database on behalf of the mobile node by using a fixed proxy server to make these updates during the mobile disconnection, once a mobile reconnects automatically, synchronously, and integrates into the database.


Sign in / Sign up

Export Citation Format

Share Document