The State of the Art in Locally Distributed Web-Server Systems
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2013, Vol 3, Issue 1
Abstract
The paper describes a novel algorithms for a load balancer, allocates the work to the clusters of SIP server. The several load balancing algorithms for distributing Session Initiation Protocol (SIP) request to a cluster of SIP servers. This algorithm also supports the following three techniques such as CJSQ, TJSQ and TLWL. It is combine knowledge of the SIP, recognizing variability in call length, dynamic estimates of back-end server load for different SIP transactions. In this paper load balancer improves both throughput and response time. The SIP is a protocol of growing importance, with uses for VOIP, IPTV, audio conferencing, instant messaging. We present a detailed analysis of occupancy to show how our algorithms significantly reduce response time.
Authors and Affiliations
M. Ezhilvendan| P. G. Scholar, Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, India, J. Gunasekaran| P. G. Scholar, Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, India, P. Vijayanand| Assistant Professor, Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, India, B. Sivakumar| Assistant Professor, Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, India, J. Nagaraj| Assistant Professor, Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, India
Analysis and Comparison of TAPSK with Multilevel Coding and Non-Coherent Detection for Different Channel Conditions
Error is one of the most important fields in digital communication system. Since error is unavoidable during communication the error correcting codes are used to overcome this problem. Generally the error correcting code...
A Principal Component Analysis Method for Recognition of Human Faces: Eigenfaces Approach
Facial recognition is a biometric method of identifying a person based on a picture of their face. Facial recognition system is very much important for security, surveillance and in forensics. In this paper, a face recog...
A Web Usage Mining Framework for Business Intelligence
In this paper, we introduce a web mining solution to business intelligence to discover hidden patterns and business strategies from their customer and web data. We propose a new framework based on web mining technology....
A Study on Human Eye Detection in a Color Image Based on Harris Corner Detector and Sobel Edge Operator
A study is made to detect human eye from a color face image (in RGB space) using Harris corner detector and Sobel edge operator. Morphological operation like dilation and erosion are also applied to make the edge of the...
Audio Steganography in a Nutshell
Information hiding technique is a new kind of secret communication technology. Steganography has been proposed as a new alternative technique to enforce data security. A perfect audio Steganographic technique aim at embe...