363 research outputs found
A programmable client-server model: Robust extensibility via DSLs
International audienceThe client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature makes it insensitive to fast changing client characteristics like terminal capabilities, network features, user preferences and evolving needs. To overcome this key limitation, we present an approach to enabling a server to adapt to different clients by making it programmable. A service-description language is used to program server adaptations. This language is designed as a domain-specific language to offer expressiveness and conciseness without compromising safety and security. We show that our approach makes servers adaptable without requiring the deployment of new protocols or server implementations. We illustrate our approach with the Internet Message Access Protocol (IMAP). An IMAP server is made programmable and a language, named Pems, is introduced to program robust variations of e-mail services. Our approach is uniformly used to develop a platform for multimedia communication services. This platform is composed of programmable servers for telephony services, e-mail processing, remote-document processing and stream adapters
Recommended from our members
Parallel remote interactive management model
This thesis discusses PRIMM which stands for Parallel Remote Interactive Management Model. PRIMM is a framework for object oriented applications that relies on grid computing. It works as an interface between the remote applications and the parallel computing system. The thesis shows the capabilities that could be achieved from PRIMM architecture
Survey and Analysis of Production Distributed Computing Infrastructures
This report has two objectives. First, we describe a set of the production
distributed infrastructures currently available, so that the reader has a basic
understanding of them. This includes explaining why each infrastructure was
created and made available and how it has succeeded and failed. The set is not
complete, but we believe it is representative.
Second, we describe the infrastructures in terms of their use, which is a
combination of how they were designed to be used and how users have found ways
to use them. Applications are often designed and created with specific
infrastructures in mind, with both an appreciation of the existing capabilities
provided by those infrastructures and an anticipation of their future
capabilities. Here, the infrastructures we discuss were often designed and
created with specific applications in mind, or at least specific types of
applications. The reader should understand how the interplay between the
infrastructure providers and the users leads to such usages, which we call
usage modalities. These usage modalities are really abstractions that exist
between the infrastructures and the applications; they influence the
infrastructures by representing the applications, and they influence the ap-
plications by representing the infrastructures
Blockchain's adoption in IoT: The challenges, and a way forward
© 2018 Elsevier Ltd The underlying technology of Bitcoin is blockchain, which was initially designed for financial value transfer only. Nonetheless, due to its decentralized architecture, fault tolerance and cryptographic security benefits such as pseudonymous identities, data integrity and authentication, researchers and security analysts around the world are focusing on the blockchain to resolve security and privacy issues of IoT. However, presently, not much work has been done to assess blockchain's viability for IoT and the associated challenges. Hence, to arrive at intelligible conclusions, this paper carries out a systematic study of the peculiarities of the IoT environment including its security and performance requirements and progression in blockchain technologies. We have identified the gaps by mapping the security and performance benefits inferred by the blockchain technologies and some of the blockchain-based IoT applications against the IoT requirements. We also discovered some practical issues involved in the integration of IoT devices with the blockchain. In the end, we propose a way forward to resolve some of the significant challenges to the blockchain's adoption in IoT
Virtualization Components of the Modern Hypervisor
Virtualization is the foundation on which cloud services build their business. It supports the infrastructure for the largest companies around the globe and is a key component for scaling software for the ever-growing technology industry. If companies decide to use virtualization as part of their infrastructure it is important for them to quickly and reliably have a way to choose a virtualization technology and tweak the performance of that technology to fit their intended usage. Unfortunately, while many papers exist discussing and testing the performance of various virtualization systems, most of these performance tests do not take into account components that can be configured to improve performance for certain scenarios. This study provides a comparison of how three hypervisors (VMWare vSphere, Citrix XenServer, and KVM) perform under different sets of configurations at this point and which system workloads would be ideal for these configurations. This study also provides a means in which to compare different configurations with each other so that implementers of these technologies have a way in which to make informed decisions on which components should be enabled for their current or future systems
Methods for the Study of Marine Biodiversity
Recognition of the threats to biodiversity and its importance to society has led to calls for globally coordinated sampling of trends in marine ecosystems. As a step to defining such efforts, we review current methods of collecting and managing marine biodiversity data. A fundamental component of marine biodiversity is knowing what, where, and when species are present. However, monitoring methods are invariably biased in what taxa, ecological guilds, and body sizes they collect. In addition, the data need to be placed, and/or mapped, into an environmental context. Thus a suite of methods will be needed to encompass representative components of biodiversity in an ecosystem. Some sampling methods can damage habitat and kill species, including unnecessary bycatch. Less destructive alternatives are preferable, especially in conservation areas, such as photography, hydrophones, tagging, acoustics, artificial substrata, light-traps, hook and line, and live-traps. Here we highlight examples of operational international sampling programmes and data management infrastructures, notably the Continuous Plankton Recorder, Reef Life Survey, and detection of Harmful Algal Blooms and MarineGEO. Data management infrastructures include the World Register of Marine Species for species nomenclature and attributes, the Ocean Biogeographic Information System for distribution data, Marine Regions for maps, and Global Marine Environmental Datasets for global environmental data. Existing national sampling programmes, such as fishery trawl surveys and intertidal surveys, may provide a global perspective if their data can be integrated to provide useful information. Less utilised and emerging sampling methods, such as artificial substrata, light-traps, microfossils and eDNA also hold promise for sampling the less studied components of biodiversity. All of these initiatives need to develop international standards and protocols, and long-term plans for their governance and support.published_or_final_versio
- …