Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
676
result(s) for
"Computer networks Scalability."
Sort by:
Implementing AWS
2019
AWS is at the forefront of cloud computing. Many businesses are moving away from traditional data centers and toward AWS because of its reliability, vast service offerings, low costs, and high rate of innovation. With this Learning Path, you will learn the skills you need to design, deploy, and manage your applications on the AWS cloud platform.
Web scalability for startup engineers : tips & techniques for scaling your Web application
\"Design and build scalable web applications quickly.This is an invaluable roadmap for meeting the rapid demand to deliver scalable applications in a startup environment. With a focus on core concepts and best practices rather than on individual languages, platforms, or technologies, Web Scalability for Startup Engineers describes how infrastructure and software architecture work together to support a scalable environment.You'll learn, step by step, how scalable systems work and how to solve common challenges. Helpful diagrams are included throughout, and real-world examples illustrate the concepts presented. Even if you have limited time and resources, you can successfully develop and deliver robust, scalable web applications with help from this practical guide. Learn the key principles of good software design required for scalable systems. Build the front-end layer to sustain the highest levels of concurrency and request rates. Design and develop web services, including REST-ful APIs. Enable a horizontally scalable data layer. Implement caching best practices. Leverage asynchronous processing, messaging, and event-driven architecture. Structure, index, and store data for optimized search. Explore other aspects of scalability, such as automation, project management, and agile teams\"-- Provided by publisher.
Designing and Developing Scalable IP Networks
2004
Designing and Developing Scalable IP Networks takes a \"real world\" approach to the issues that it covers. The discussions within this book are rooted in actual designs and real development, not theory or pure engineering papers. It recognises and demonstrates the importance of taking a multi-vendor approach, as existing network infrastructure is rarely homogenous and its focus is upon developing existing IP networks rather than creating them from scratch.
This global book based on the author's many years' experience of designing real scalable systems, is an essential reference tool that demonstrates how to build a scalable network, what pitfalls to avoid and what mechanisms are the most successful in real life for engineers building and operating IP networks. It will be ideal for network designers and architects, network engineers and managers as well as project managers and will be of particular relevance to those studying for both JNCIE and CCIE exams.
Implementing Aws: Design, Build, and Manage Your Infrastructure: Leverage Aws Features to Build Highly Secure, Fault-tolerant, and Scalable Cloud Environments
2019
Work through exciting recipes to administer your AWS cloudKey FeaturesBuild secure environments using AWS components and servicesExplore core AWS features with real-world applications and best practicesDesign and build Lambda functions using real-world examplesBook DescriptionWith this Learning Path, you'll explore techniques to easily manage applications on the AWS cloud. You'll begin with an introduction to serverless computing, its advantages, and the fundamentals of AWS. The following chapters will guide you on how to manage multiple accounts by setting up consolidated billing, enhancing your application delivery skills, with the latest AWS services such as CodeCommit, CodeDeploy, and CodePipeline to provide continuous delivery and deployment, while also securing and monitoring your environment's workflow. It'll also add to your understanding of the services AWS Lambda provides to developers. To refine your skills further, it demonstrates how to design, write, test, monitor, and troubleshoot Lambda functions. By the end of this Learning Path, you'll be able to create a highly secure, fault-tolerant, and scalable environment for your applications.This Learning Path includes content from the following Packt products:AWS Administration: The Definitive Guide, Second Edition by Yohan WadiaAWS Administration Cookbook by Rowan Udell, Lucas ChanMastering AWS Lambda by Yohan Wadia, Udita GuptaWhat you will learnExplore the benefits of serverless computing and applicationsDeploy apps with AWS Elastic Beanstalk and Amazon Elastic File SystemSecure environments with AWS CloudTrail, AWSConfig, and AWS ShieldRun big data analytics with Amazon EMR and Amazon RedshiftBack up and safeguard data using AWS Data PipelineCreate monitoring and alerting dashboards using CloudWatchEffectively monitor and troubleshoot serverless applications with AWSDesign serverless apps via AWS Lambda, DynamoDB, and API GatewayWho this book is forThis Learning Path is specifically designed for IT system and network administrators, AWS architects, and DevOps engineers who want to effectively implement AWS in their organization and easily manage daily activities. Familiarity with Linux, web services, cloud computing platforms, virtualization, networking, and other administration-related tasks will assist in understanding the concepts in the book. Prior hands-on experience with AWS core services such as EC2, IAM, S3, and programming languages, such as Node.Js, Java, and C#, will also prove beneficial.
The practice of network security monitoring : understanding incident detection and response
by
Bejtlich, Richard
in
Computer networks
,
Computer networks -- Security measures
,
Electronic countermeasures
2013
Network Security Monitoring (NSM) is the the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. The Practice of Network Security Monitoring teaches IT and security staff how to leverage powerful NSM tools and concepts to identify threats quickly and effectively. Author Richard Bejtlich is a recognized expert in NSM and shares his 15 years of incident handling experience with the reader. In addition to teaching you how to use key monitoring tools, Bejtlich demonstrates a holistic way of thinking about detecting, responding to, and containing intruders. The Practice of Network Security Monitoring assumes no prior experience with network security monitoring, and covers designing, deploying, building, and running an NSM operation. The book focuses on open source software and vendor-neutral tools, avoiding costly and inflexible solutions.
IBM Web Infrastructure Orchestration
2003
This IBM Redbooks publication provides the foundation for
establishing an automatic provisioning environment of Web server
solutions. The material discussed in this book provides detailed
information on using the IBM BladeCenter platform as a building
block for hosting a highly available, multi-tier application. The
book also shows how the IBM Director and Remote Deployment Manager
software products can be used to automate the deployment of
WebSphere software, and demonstrates how these products can be
scripted to provide hot-standby and hot-addition of blade servers
to running WebSphere clusters..The additional software components of IBM Web Infrastructure
Orchestration are designed to respond dynamically to Web capacity
needs and utilization issues. This product bundle, based on the IBM
eServer BladeCenter, consists of pre-integrated versions of
WebSphere Application Server, DB2, Tivoli Storage Manager, Tivoli
Monitoring, and TotalStorage hardware, coordinated by defined
business policies and managed by IBM Tivoli Intelligent
ThinkDynamic Orchestrator.This book is intended for an audience of experienced developers,
designers, planners, network specialists, and testers of the
software and hardware components listed above.
Scalability of blockchain: a comprehensive review and future research direction
by
Kiah, M. L. Mat
,
Hameed, M. Muzaffar
,
Memon, Zain Anwer
in
Algorithms
,
Blockchain
,
Computer Communication Networks
2024
This comprehensive review paper examines the challenges faced by blockchain technology in terms of scalability and proposes potential solutions and future research directions. Scalability poses a significant hurdle for Bitcoin and Ethereum, manifesting as low throughput, extended transaction delays, and excessive energy consumption, thereby compromising efficiency. The current state of blockchain scalability is analyzed, encompassing the limitations of existing solutions such as Sharding and off-chain scaling. Various proposed remedies, including layer 2 scaling solutions, consensus mechanisms, and alternative approaches, are investigated. The paper also explores the impact of scalability on diverse blockchain applications and identifies potential future research directions by integrating data science techniques with blockchain technology. Notably, nearly 110 primary research papers from reputable scientific databases like Scopus, IEEE Explore, Science Direct, and Web of Science were reviewed, demonstrating scalability in blockchain comprising several elements. Transaction throughput and network latency emerge as the most prominent concerns. Consequently, this review offers future research avenues to address scalability challenges by leveraging data science techniques like distributed computing and parallel processing to divide and process vast datasets across multiple machines. The synergy between data science and blockchain holds promise as an optimal solution. Overall, this up-to-date understanding of blockchain scalability is invaluable to researchers, practitioners, and policy makers engaged in this domain.
Journal Article
A multi-tier based clustering framework for scalable and energy efficient WSN-assisted IoT network
2020
The effectiveness of wireless sensor network (WSN) in Internet of Thing (IoT) based large scale application depends on the deployment method along with the routing protocol. The sensor nodes are an important component of WSN-assisted IoT network running on limited and non-rechargeable energy resource. The performance of WSN-assisted IoT is decreased, when network is deployed at large area. So, developing robust and energy-efficient routing protocol is a challenging task to prolong the network lifetime. In contrast to the state-of-the-art techniques this paper introduces Scalable and energy efficient routing protocol (SEEP). SEEP leverages the multi-hop hierarchical routing scheme to minimize the energy consumption. To achieve scalable and energy efficient network, SEEP employs a multi-tier based clustering framework. The network area in SEEP is divided into various zones with the help of proposed subarea division algorithm. The number of zones in the network are increased as the network size increases to avoid long-distance communication. Every zone is divided into certain number of clusters (sub-zones) and the number of clusters are increased towards the base station, whereas the zone width is decreased. In every cluster, some of the optimal nodes are promoted as a Relay Node (RN) and Cluster Head (CH). Normal nodes send their sensed data to the base station via local RN and CH in a multi-hop way. Furthermore, propose protocol provides a trade-off between distance and energy to prolong the network lifetime. In the proposed framework, static and mobile scenarios have been considered by applying Random walk and Random waypoint model for node mobility in simulation to make it more realistic as the various application of WSN-assisted IoT. The effectiveness of SEEP is examined against LEACH, M-LEACH, EA-CRP, TDEEC, DEEC, SEP, and MIEEPB, and result indicates that SEEP performs better for different network metrics: network lifetime, scalability, and energy efficiency.
Journal Article
Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT)
by
Hussain, Farookh Khadeer
,
Mohammad Dahman Alshehri
,
Hussain, Omar Khadeer
in
Clustering
,
Computer memory
,
Computer networks
2018
The growth and adoption of the Internet of Things (IoT) is increasing day by day. The large number of IoT devices increases the risk of security threats such as (but not limited to) viruses or cyber-attacks. One possible approach to achieve IoT security is to enable a trustworthy IoT environment in IoT wherein the interactions are based on the trust value of the communicating nodes. Trust management and trust assessment has been extensively studied in distributed networks in general and the IoT in particular, but there are still outstanding pressing issues such as bad-mouthing of trust values which prevent them from being used in practical IoT applications. Furthermore, there is no research in ensuring that the developed IoT trust solutions are scalable across billions of IoT nodes. To address the above-mentioned issues, we propose a methodology for scalable trust management solution in the IoT. The methodology addresses practical and pressing issues related to IoT trust management such as trust-based IoT clustering, intelligent methods for countering bad-mouthing attacks on trust systems, issues of memory-efficient trust computation and trust-based migration of IoT nodes from one cluster to another. Experimental results demonstrate the effectiveness of the proposed approaches.
Journal Article