Fig 3 - uploaded by Bo Shen
Content may be subject to copyright.
SRB memory reclamation: different situations of session termination.  

SRB memory reclamation: different situations of session termination.  

Source publication
Article
Full-text available
With the falling price of memory, an increasing number of multimedia servers and proxies are now equipped with a large memory space. Caching media objects in the memory of a proxy helps to reduce the network traffic, the disk I/O bandwidth requirement, and the data delivery latency. The running buffer approach and its alternatives are representativ...

Contexts in source publication

Context 1
... If is served from the middle of its resident buffer, that is, there are preceding and succeeding requests served from the same running buffer, the resident buffer maintain its current state and is deleted from all its associated running buffers. Fig. 3(a) and (a') show the buffer situa- tion before and after is terminated, ...
Context 2
... If is served from the head of its resident buffer as shown in Fig. 3(b), the request is deleted from all of its associated running buffers. The resident buffer enters the Idle State for a time period of . During this time period, the content within the buffer is moved from to the head. At the end of the time period , the buffer space from the tail to the last served request is released and the buffer ...
Context 3
... all of its associated running buffers. The resident buffer enters the Idle State for a time period of . During this time period, the content within the buffer is moved from to the head. At the end of the time period , the buffer space from the tail to the last served request is released and the buffer enters the Running State again as shown in Fig. ...
Context 4
... the request list is not empty, then do nothing. Al- ternatively, the algorithm can choose to shrink the buffer to the extent that is served from the buffer assuming is a resident request of the same buffer. In this case, the End-Time of the succeeding running buffers needs to be adjusted. -If is at the tail of the last running buffer as shown in Fig. 3(c), the buffer is shrunk to the extent that is the last request served from the ...
Context 5
... deleted from the request list. Subsequently, the buffers run as shown in Fig. ...

Similar publications

Article
Full-text available
Motivated by the high variation in transmission rates for document transfer in the Internet and file down loads from web servers, we study the buffer content in a queue with a fluctuating service rate. The fluctuations are assumed to be driven by an independent stochastic process. We allow the queue to be overloaded in some of the server states. In...
Article
Full-text available
The objective of Sans Signature buffer overflow blocker mainly is to intercept communications between a server and client, analyse the contents for the presence of executable code and prevent the code reaching the server. In this project, Sans Signature is a signature free approach, which can identify and block new and unknown buffer overflow attac...
Article
Full-text available
Saat ini sebagian besar orang merupakan pengguna jaringan komputer yang digunakan untuk berkomunikasi maupun bertukar data antar komputer satu sama lain. Dengan banyaknya para pengguna jaringan mengakibatkan server yang menyediakan layanan pada jaringan lokal maupun jaringan internet harus mampu mengatasi permintaan pengguna yang banyak dan beban k...
Conference Paper
Full-text available
The era of "multiple devices per user" brings a new requirement of cross-device task migration. Web browsing is one of the most frequent activities in daily life, however it still lacks an effective mechanism to support user-friendly migration of web browsing across multiple devices. In this paper, we develop the TaskShadow-W, an NFC-triggered web...
Conference Paper
Full-text available
This paper proposes novel concepts of meta-caching and meta-transcoding which indicate that intermediate results (metadata) of service (e.g., video transcoding) sessions are cached and subsequent identical service requests are served through transcoding from the cached metadata. The proposed methods provide a foundation to achieving superior storag...

Citations

Conference Paper
Full-text available
The Internet has experienced a considerable increase in the use of audio and video applications, which provoke a large consumption of the resources available in the network and servers. Therefore, the monitoring and analysis of those resources has become an essential task in order to enhance the service delivered to users. This work depicts a monitoring module implemented in a video server architecture, which is used to track the transmission of some popular video formats. Our experiments have demonstrated that one of the formats delivers a performance considerably better than the other, regarding the bandwidth allocated to each user session, what reassures the importance of having such a monitoring module available in a server’s architecture.