Options
Schiller, Eryk
Nom
Schiller, Eryk
Affiliation principale
Identifiants
Résultat de la recherche
3 Résultats
Voici les éléments 1 - 3 sur 3
- PublicationMétadonnées seulementNetwork Performance of the JBoss Application Server(: IEEE, 2013-10-22)
;Benothman, Nabil ;Clere, Jean-Frederic; ; Maucherat, RemyJBoss Application Server (AS) uses java.io and the Apache Portable Runtime (APR) project to provide its HTTP connectors. Due to new features of upcoming specifications of the Java Enterprise Edition (Java EE), the existing connectors shall be replaced by modern non blocking Input/Outputs (I/Os). In this study, we review some modern I/O frameworks such as NIO.2 introduced by Java SE 7 and XNIO3 developed by JBoss. We compare their network performance by running a series of stress tests on client-server applications of limited functionality. As a result, we select NIO.2 as the most appropriate framework to specify and implement a new JBoss connector. Finally, we compare our newly implemented Java connector against the existing APR-based one by means of network performance measures. - PublicationMétadonnées seulementA4mesh : Connecting remote sites(2012-3-1)
;Jamakovic-Kapic, A. ;Awander, M. ;Braun, T.; ; ;Schwanebeck, J.Staub, T.Developments in A4-Mesh have turned wireless mesh networks into a valuable technology for Swiss institutions of higher education. Large numbers of research projects in different areas, like climate research and geology, will profit from an easily deployable outdoor wireless network that also supports mechanisms for authentication, authorization, accounting and auditing (A4) functionalities. - PublicationMétadonnées seulementShibboleth based Authentication, Authorization, Accounting and Auditing in Wireless Mesh NetworksWe present the basic architectural elements of the Captive Portal integrating Shibboleth based Authentication, Authorization, Accounting and Auditing into Wireless Mesh Networks. The Captive Portal is built upon the SWITCHaai/Shibboleth architecture especially designed to protect web based services. The architecture is secure, eavesdropping protected and does not require any specialized software installation on the client side.