{"title":"高级网络服务器管理和操作实现","authors":"S. Kim","doi":"10.1109/ICCNT.2010.20","DOIUrl":null,"url":null,"abstract":"The model is focused on available server management in network environments. The remote backup servers are hooked up by Virtual Private Network (VPN) and replace broken main severs immediately. A VPN is a way to use a public network infrastructure and hooks up long-distance servers within a single secure network infrastructure. The remote backup servers are managed by third party company that is responsible for continuous upgrade of backup servers. Unlike other existing models, the availability of auxiliary machines is changed for each activation in this enhanced model. Analytically tractable results are obtained by using several mathematical techniques the practical workflow gives the guideline for the actual implementation for network operations.","PeriodicalId":135847,"journal":{"name":"2010 Second International Conference on Computer and Network Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Advanced Networked Server Management and Operational Implementations\",\"authors\":\"S. Kim\",\"doi\":\"10.1109/ICCNT.2010.20\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The model is focused on available server management in network environments. The remote backup servers are hooked up by Virtual Private Network (VPN) and replace broken main severs immediately. A VPN is a way to use a public network infrastructure and hooks up long-distance servers within a single secure network infrastructure. The remote backup servers are managed by third party company that is responsible for continuous upgrade of backup servers. Unlike other existing models, the availability of auxiliary machines is changed for each activation in this enhanced model. Analytically tractable results are obtained by using several mathematical techniques the practical workflow gives the guideline for the actual implementation for network operations.\",\"PeriodicalId\":135847,\"journal\":{\"name\":\"2010 Second International Conference on Computer and Network Technology\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Computer and Network Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCNT.2010.20\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Computer and Network Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCNT.2010.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Advanced Networked Server Management and Operational Implementations
The model is focused on available server management in network environments. The remote backup servers are hooked up by Virtual Private Network (VPN) and replace broken main severs immediately. A VPN is a way to use a public network infrastructure and hooks up long-distance servers within a single secure network infrastructure. The remote backup servers are managed by third party company that is responsible for continuous upgrade of backup servers. Unlike other existing models, the availability of auxiliary machines is changed for each activation in this enhanced model. Analytically tractable results are obtained by using several mathematical techniques the practical workflow gives the guideline for the actual implementation for network operations.