Voici les éléments 1 - 3 sur 3
  • Publication
    Métadonnées seulement
    Network Performance of the JBoss Application Server
    (: IEEE, 2013-10-22)
    Benothman, Nabil
    ;
    Clere, Jean-Frederic
    ;
    ; ;
    Maucherat, Remy
    JBoss Application Server (AS) uses java.io and the Apache Portable Runtime (APR) project to provide its HTTP connectors. Due to new features of upcoming specifications of the Java Enterprise Edition (Java EE), the existing connectors shall be replaced by modern non blocking Input/Outputs (I/Os). In this study, we review some modern I/O frameworks such as NIO.2 introduced by Java SE 7 and XNIO3 developed by JBoss. We compare their network performance by running a series of stress tests on client-server applications of limited functionality. As a result, we select NIO.2 as the most appropriate framework to specify and implement a new JBoss connector. Finally, we compare our newly implemented Java connector against the existing APR-based one by means of network performance measures.
  • Publication
    Métadonnées seulement
    A4mesh : Connecting remote sites
    (2012-3-1)
    Jamakovic-Kapic, A.
    ;
    Awander, M.
    ;
    Braun, T.
    ;
    ; ;
    Schwanebeck, J.
    ;
    Staub, T.
    Developments in A4-Mesh have turned wireless mesh networks into a valuable technology for Swiss institutions of higher education. Large numbers of research projects in different areas, like climate research and geology, will profit from an easily deployable outdoor wireless network that also supports mechanisms for authentication, authorization, accounting and auditing (A4) functionalities.
  • Publication
    Métadonnées seulement
    Shibboleth based Authentication, Authorization, Accounting and Auditing in Wireless Mesh Networks
    We present the basic architectural elements of the Captive Portal integrating Shibboleth based Authentication, Authorization, Accounting and Auditing into Wireless Mesh Networks. The Captive Portal is built upon the SWITCHaai/Shibboleth architecture especially designed to protect web based services. The architecture is secure, eavesdropping protected and does not require any specialized software installation on the client side.