2,276 research outputs found
Performance of Bursty World Wide Web (WWW) Sources over ABR
We model World Wide Web (WWW) servers and clients running over an ATM network
using the ABR (available bit rate) service. The WWW servers are modeled using a
variant of the SPECweb96 benchmark, while the WWW clients are based on a model
by Mah. The traffic generated by this application is typically bursty, i.e., it
has active and idle periods in transmission. A timeout occurs after given
amount of idle period. During idle period the underlying TCP congestion windows
remain open until a timeout expires. These open windows may be used to send
data in a burst when the application becomes active again. This raises the
possibility of large switch queues if the source rates are not controlled by
ABR. We study this problem and show that ABR scales well with a large number of
bursty TCP sources in the system.Comment: Submitted to WebNet `97, Toronto, November 9
HTTP-Request-Based Identification
Táto bakalářska práce sa zabýva identifikací pomocí požadavků HTTP v siťovém provoze. Je zde vysvětlen pricip komunikace HTTP a identifikace v daném protokole. Taktéž je vytvořen návrh aplikace, která identifikuje webový porhlížeč a následně je tato aplikace implementována. Aplikace je navržena jako samostatný modul, který je možné zařadit do projektů Moderní prostředky pro boj s kybernetickou kriminalitou na Internetu nové generace. Poté jsou provedeny experimenty s daným nástrojem pro ověření funkčnosti a užitečnosti nastroje.This bachelor thesis deals with the identification using HTTP requests in network traffic. It explains principles of HTTP communications and identification. Additionally the application design is created, which identifies web browser and then this application is implemented. The application is designed as a separate module which can be integrated into projects Moderní prostředky pro boj s kybernetickou kriminalitou na Internetu nové generace. Then are executed experiments with that tool to verify the functionality and utility of this tool.
Web Vulnerability Study of Online Pharmacy Sites
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems
Impact of URI Canonicalization on Memento Count
Quantifying the captures of a URI over time is useful for researchers to
identify the extent to which a Web page has been archived. Memento TimeMaps
provide a format to list mementos (URI-Ms) for captures along with brief
metadata, like Memento-Datetime, for each URI-M. However, when some URI-Ms are
dereferenced, they simply provide a redirect to a different URI-M (instead of a
unique representation at the datetime), often also present in the TimeMap. This
infers that confidently obtaining an accurate count quantifying the number of
non-forwarding captures for a URI-R is not possible using a TimeMap alone and
that the magnitude of a TimeMap is not equivalent to the number of
representations it identifies. In this work we discuss this particular
phenomena in depth. We also perform a breakdown of the dynamics of counting
mementos for a particular URI-R (google.com) and quantify the prevalence of the
various canonicalization patterns that exacerbate attempts at counting using
only a TimeMap. For google.com we found that 84.9% of the URI-Ms result in an
HTTP redirect when dereferenced. We expand on and apply this metric to TimeMaps
for seven other URI-Rs of large Web sites and thirteen academic institutions.
Using a ratio metric DI for the number of URI-Ms without redirects to those
requiring a redirect when dereferenced, five of the eight large web sites' and
two of the thirteen academic institutions' TimeMaps had a ratio of ratio less
than one, indicating that more than half of the URI-Ms in these TimeMaps result
in redirects when dereferenced.Comment: 43 pages, 8 figure
Development of a Web-based land evaluation system and its application to population carrying capacity assessment using .Net technology
The multi-disciplinary approach used in this study combines the state-of-the-art IT technology with an elaborated land evaluation methodology and results in a Web-based land evaluation system (WLES). The WLES is designed in such a way that the system operates both as a Web Application and as a Web Service. Implemented on top of the .NET platform, the WLES has a loosely coupled multi-layer structure which seamlessly integrates the domain knowledge of land evaluation and the soil database. The Web Service feature makes the WLES suitable to act as a building block of a larger system such as that of the population carrying capacity (PCC) assessment. As a reference application, a framework is made to assess the PCC on the basis of the production potential calculations which are available through the WLES Web Service interface
Helping out by helping in : approaches to electronic submission of coursework
In this paper, we seek to address a range of issues that affect the use and applicability of electronic coursework submission. Key among these issues is the need to characterise the available mechanisms for supporting such submission. Allied to this, we require an appraisal of the strengths and weaknesses that would enable us to distinguish and choose wisely among the alternatives
- …