Refine your search
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Banerjee, P. S.
- Machine Learning Based Architecture for Rule Establishment of Web Proxy Server
Abstract Views :1696 |
PDF Views:6
Authors
Affiliations
1 Department of Computer Science & Engineering, Jaypee University of Engineering & Technology, Guna, Madhya Pradesh., IN
2 Department of Information Technology & MCA, B.I.T. Mesra, Ranchi, Jharkhand., IN
3 Department of Computer Science and Engineering, B.I.T. Extension Centre, Lalpur, Ranchi, Jharkhand., IN
1 Department of Computer Science & Engineering, Jaypee University of Engineering & Technology, Guna, Madhya Pradesh., IN
2 Department of Information Technology & MCA, B.I.T. Mesra, Ranchi, Jharkhand., IN
3 Department of Computer Science and Engineering, B.I.T. Extension Centre, Lalpur, Ranchi, Jharkhand., IN
Source
Journal of Applied Information Science, Vol 1, No 1 (2013), Pagination: 14-22Abstract
In present scenario Internet has become an integral part of every ones life, as many services like mail, news, chat are available and huge amounts of information on almost any subject is available. However, in most cases the bandwidth to connect to the Internet is limited. It needs to be used efficiently and more importantly productively. Generally, bandwidth is distributed among groups of users based on some policy constraints. However, it turns out that the users do not always use the entire allocated bandwidth at all times. Also, some times they need more bandwidth than the bandwidth allocated to them. Ideally, productive usage should be preferred over unproductive usage when bandwidth is scarce. But when it is abundant then any kind of use can be permitted provided it is in consonance with policy. The bandwidth usage patterns of users vary with time of the day, time of the year and requirements. So there is a need for dynamic allocation of bandwidth that satisfies the requirements of the users, manages variable usage and is consistent with administrative usage policy. Internet usage is varied and in the context of an institution or organization an administrator would like to maximize productive usage. There is, therefore, a need to implement control access policies, which prevents unproductive use but at the same time does not, to the extent possible, impose censorship. Squid proxy server is a full-featured web proxy, which increases the efficiency of the Internet link by providing caching and proxy services. Squid provides many mechanisms to set access control policies. However, deciding which policies to implement requires experimentation and usage statistics that must be processed to obtain useful data. The proposed architecture elaborated in this paper is based on machine learning to determine policies depending on the content of current URLs being visited. The main component in this architecture is the Squid traffic Analyzer, which classifies the traffic and generates URL lists. These URL lists are used in formulating access policies. The concept of delay priority will also be introduced which gives more options to system administrators in setting policies for bandwidth management. As Squid allows HTTP tunneling, it forms a loophole for strict policy management. In this paper the proxy tunneling in Squid has also been considered and some possible solutions to this problem will also be suggested.Keywords
Web Proxy, Machine-learning, Network Traffic, Meta DataReferences
- Mitchell, T. M. (1997). Machine Learning, McGraw-Hill.
- Tanenbaum, S. (1999). Computer Networks. (3rded.) Delhi: Prentice-Hall of India Pvt. Ltd.
- Luotonen, A. (1999). Tunneling TCP Based Protocols through Web Proxy Servers. Retrieved from www. webcache.Com/Writings/lnternet-Drafts/draft-luotonen-web-proxy-tunneling-01.txt
- Squid Proxy Server. Retrieved from www.squidcache.org
- Squid Frequently asked Questions. Retrieved from www.squid-cache.org/Doc/FAQj*
- Squid Configuration File: Squid Configuration. Retrieved from http://www.squid-cache.org/Doc/config/
- Squid configuration Manual. Retrieved from www. visolve.comjsquid24s1/contents.html
- david@luyer.net
- Upgrading to TLS within HTTP/1.1. (1997). Retrieved from www.ietf.org/rfc2817.txt
- HTTP-Tunnel Corporation-Networking Products for Corporate Communications. Retrieved from www.http-tunnel.com
- Cutting Edge Web Applications. Retrieved from www.totalrc.com
- Squid Cache Logfile Analysis Scripts. Retrieved from www.squid-cache.org/Scripts
- Calamaris: Log Analyzer. Retrieved from http:// cord.de/tools/calamaris/
- Webalizer: Log Analyzer. Retrieved from http:// mrunix.netjwebalizr
- Cache Digest Specification-Version 5. Retrieved from www.sequid-cache.org/CacheDigest/cachedigest-v5.Txt
- Hyper Text Transfer Protocol - HTTP/1.1. Retrieved from www.ietf org/rfc/rfc2616.txt
- Rousskov, A. & Soloviev, V. (1999). A Performance Study of the Squid Proxy on HTTP/l.0. World Wide Web, June, 2(1-2), 47-67.
- Chamara Gunaratne, Gihan Dias (University of Moratuwa) Using DynamicDelay Pools for Bandwidth Management URL: www.2002.iwcw.org/
- Squid Programmers Guide. Retrieved from www. squid-cache.org/Prog-Guide/prog-guide.html
- Lang, K. (1995). NewsWeeder: Learning to Filter Netnews. In Priedits & Russel (eds.), Proceedings of 12th International conference on machine learning (pp. 331-339). San Francisco: Morgann Kaufmann Publishers.
- Rish, I. (2001). An Empirical Study of the Naive Bayes Classifier. IJCAI-01 workshop on Empirical Methods in AI.
- Rish, I., Hellerstein, J. & Jayram, T. S. (2001). An Analysis of Data Characteristics that Affect Naive Bayes Performance. IBM Technical Report RC21993, 2001.
- Rish, I. (2000). Advances in Bayesian Learning. A short tutorial presented at ICAI'2000. Las Vegas.
- Probabilistic Approach to the Determination of Communication Path in Wireless Network
Abstract Views :365 |
PDF Views:127
Authors
P. S. Banerjee
1,
B. Maiti
2
Affiliations
1 Department of Information Technology, Kalyani Government Engineering College, Kalyani, Nadia-741235, IN
2 Department of Physics, Darjeeling Government College, Darjeeling-734101, IN
1 Department of Information Technology, Kalyani Government Engineering College, Kalyani, Nadia-741235, IN
2 Department of Physics, Darjeeling Government College, Darjeeling-734101, IN
Source
Reason-A Technical Journal (Formerly Reason-A Technical Magazine), Vol 14 (2015), Pagination: 83-90Abstract
In MANET or such kind of dynamic wireless networks communication paths between a source and a destination that are moving at random in the sense that forwarding nodes between them go on changing is tried to be estimated using discrete percolation theory in a dense network. Very dynamic nature of the network requires quick adaptation and self reconfiguration so to ensure no breaking of path in a session. A percolation based probabilistic approach is used to give an estimation of the path finding probability and its limit of applicability is verified in a simulation platform replicating a real dynamic network.Keywords
MANET, Node Density, Transmission Range, Correlation Factor, Node Disjoint Path, Multipath Routing, Discrete Percolation Model, Multi-Hop Technique.References
- Sharma, V., Singh, H., Kaur, M. and Banga, V., Performance Evaluation of Reactive Routing Protocols in MANET Networks Using GSM Based Voice Traffic Applications, Optik-International Journal for Light and Electron Optics, Vol. 124, pp.2013-2016, 2013.
- Walia, H., Singh J. and Singh, M., Evaluation of AODV Routing Protocol under MANETS with Various Density Nodes, International Journal of Advanced Computer Research, Vol. 5, No.20, pp.316, 2015.
- Mueller, S., Rose, P.T. and Ghosal, D., Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges, Performance Tools and Applications to Networked Systems, Springer, Berlin, Heidelberg, pp.209-234. 2004.
- Wu, K. and Harms, J., Performance Study of a Multipath Routing Method for Wireless Mobile ad hoc Networks, Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Proceedings of the Ninth International Symposium on IEEE, 2001.
- Zhang, Z., Mao, G. and Anderson, B., On the Information Propagation in Mobile AdHoc Networks Using Epidemic Routing, Proceedings of the Global Telecommunications Conference, IEEE, 2011.
- Sasson, Y., Cavin, D. and Schiper, A., Probabilistic Broadcast for Flooding in Wireless Mobile Ad Hoc Networks, Wireless Communications and Networking, Proceedings of the WCNC2003, IEEE, Vol. 2, 2003.
- Lu, J., An, J., Li, X., Yang J. and Yang, L., A Percolation Based M2M Networking Architecture for Data Transmission and Routing, arXiv preprint arXiv:1403.8123, 2014.
- Braga, G.A., Sanchis, R. and Schieber, T.A., Critical Percolation on a Bethe Lattice Revisited, SIAM Review, Vol. 47, No.2, pp.349-365, 2005.
- Shklovskii, B.I. and Efros, A.L., Electronic Properties of Doped Semiconductors, Springer Verlag, Heidelberg, 1984.
- Dousse, O., Franceschetti M., and Thiran, P., The Costly Path from Percolation to Full Connectivity. Allerton Conference, Proceedings of the LCA-CONF-2004-024, 2004.
- Spectrophotometric Estimation of Valsartan in Tablet Dosage Form
Abstract Views :134 |
PDF Views:0
Authors
Affiliations
1 Shri Ram Institute of Technology, Near ITI, Madhotal, Jabalpur-482002 (M.P.), IN
1 Shri Ram Institute of Technology, Near ITI, Madhotal, Jabalpur-482002 (M.P.), IN