Improving Performance Among Client-Server For Continuous Distributed Interactive Applications
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 9
Abstract
In today’s situation consumers mainly use the network as an interactive medium for multimedia entertainment and communication purpose. In the entertainment arena, new applications involve multiple users participating in a single interactive session, for example, online gaming. In distributed server architecture, the interactivity performance depends on not only client-to-server network latencies but also interserver network latencies. All of these factors are directly affected by how the clients are assigned to the servers. We propose a Latency EQualization (LEQ) service, which equalizes the perceived latency for all clients participating in an interactive network application. We achieve equalized-latency paths by using a few routers in the network as hubs, and interactive application packets from different clients are redirected through these hubs to the servers. We formulate the hub placement problem, and provide the greedy algorithm and the optimal algorithm to solve this problem. Through extensive simulations, we show that our LEQ hub routing architecture significantly reduces delay difference in large network topologies. The LEQ architecture is incrementally deployable in today’s networks, requiring only a few nodes to be modified to perform the LEQ service.
Authors and Affiliations
Ms Shahenaz, Syed Shabana
A Performance Evaluation of Different Parameter in Wireless LAN Standards using Qualnet
In recent year, wireless local area network have been developed and deployed in many wireless applications. The need for these devices is to communicate with each other effectively when the use of mobile call is incr...
A Mixture Cloud Approach For Safe Official Deduplications
Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machin...
An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User Participation
The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and...
Dos Attack Detection System Using Anomaly Based Technique In Interconnected Systems
Denial-of-service (dos) attacks are one kind of violent and threatening invasive behaviour to online servers. Dos attacks harshly humiliate the ease of use of a victim, which can be a host, a router, or an entire net...
A Novel Symmetric Key Cryptography Algorithm for Improving Privacy of Data in Cloud Servers
In this paper, a cryptography technique, Novel Symmetric Key Cryptography algorithm is used to improve the data security and access control in the environment of Cloud Computing. The users upload the personal data ov...