Stochastic Design of Enhanced Network Management Architecture and Algorithmic Implementations

Abstract

The paper is focused on available server management in Internet connected network environments. The local backup servers are hooked up by LAN and replace broken main server immediately and several different types of backup servers are also considered. The remote backup servers are hooked up by VPN (Virtual Private Network) with high-speed optical network. A Virtual Private Network (VPN) is a way to use a public network infrastructure and hooks up long-distance servers within a single network infrastructure. The remote backup servers also replace broken main severs immediately under the different conditions with local backups. When the system performs a mandatory routine maintenance of main and local backup servers, auxiliary servers from other location are being used for backups during idle periods. Analytically tractable results are obtained by using several mathematical techniques and the results are demonstrated in the framework of optimized networked server allocation problems. The operational workflow give the guidelines for the actual implementations.

Share and Cite:

S. Kim, "Stochastic Design of Enhanced Network Management Architecture and Algorithmic Implementations," American Journal of Operations Research, Vol. 3 No. 1A, 2013, pp. 87-93. doi: 10.4236/ajor.2013.31A008.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] D. Russell and G. T. Ganemi Sr., “Computer Security Basics,” O’ Reilly and Asso. Inc., Sebastopol, 2006.
[2] S.-K. Kim, “Enhanced Networked Server mgt. with Random Remote Backups,” Proceedings of SPIE 5244, Orlando, 7 September 2003, pp. 106-114. doi:10.1117/12.511412
[3] S.-K. Kim, “Enhanced Management Method of Storage Area Network (SAN) Server with Random Remote Backups,” Mathematical and Computer Modelling, Vol. 42, No. 9-10, 2005, pp. 947-958. doi:10.1016/j.mcm.2005.06.006
[4] S.-K. Kim, “Enhanced Stochastic Methodology for Combined Architecture of e-Commerce and Security Networks,” Mathematical Problems in Engineering, 2009, Vol. 2009, 2009, Article ID: 691680.
[5] J. H. Dshalalow, “On a Duality Principle in Processes of Servicing Machines with Double Control,” Journal of Applied Mathematics, Vo. 1, No. 3, 1988, pp. 245-251.
[6] J. H. Dshalalow, “Queueing Systems with State Dependent Parameters,” In: J. H. Dshalalow, Ed., Frontiers in Queueing, CRC Press, Boca Raton, 1997, pp. 61-116.
[7] L. Takacs, “Some Probability Questions in the Theory of Telephone Traffic,” Magyar Tudomanyos Akademia. Matematikai es Fizikai Osztaly Kozleményei, Vol. 8, 1958, pp. 155-175.
[8] S.-K. Kim, “Design of Stochastic Hitless-Prediction Router by Using the First Exceed Level Theory,” Mathematical Methods in the Applied Sciences, Vol. 28, No. 12, 2005, pp. 1481-1490. doi:10.1002/mma.626
[9] J. H. Dshalalow, “On the Multiserver Queue with Finite Waiting Room and Controlled Input,” Advanced Applied Probability, Vol. 17, No. 2, 1985, pp. 408-423. doi:10.2307/1427148
[10] E. Cinlar, “Introduction to Stochastic Processes,” Prentice Hall, Englewood Cliffs, 1975.
[11] S.-K. Kim, “Design of Enhanced Software Protection Architecutre by Using Theory of Inventive Problem Solving,” IEEE Proceedings of IEEM, Hong Kong, 8-11 December 2009, pp. 978-982.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.