CIS3008-N: Enterprise Server Management - IT Infrastructure Report

Verified

Added on  2023/01/17

|18
|5172
|1
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ENTERPRISE SERVER MANAGEMENT
ENTERPRISE SERVER MANAGEMENT
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ENTERPRISE SERVER MANAGEMENT
Table of Contents
Introduction................................................................................................................................2
Key Infrastructure Services........................................................................................................3
Dynamic Host Configuration Protocol (DHCP)....................................................................3
Domain Name Server (DNS).................................................................................................4
Active Directory.....................................................................................................................5
File Shares..................................................................................................................................6
SQL Databases...........................................................................................................................9
Load Balanced Web Applications............................................................................................10
Microsoft Exchange.................................................................................................................11
Conclusion................................................................................................................................13
References................................................................................................................................14
Document Page
2ENTERPRISE SERVER MANAGEMENT
Introduction
An organization has suffered serious outage within IT system as for failure of
hardware. The business of the organization over last few years have undergone huge shift
from the sales to new system of e-commerce which brought it from a single number
percentage with respect to sales to representation of third of half of their sales. However,
increase in usage and the e-commerce system’s popularity did not have same interest and
investment in IT teams who manage, run and develop the e-commerce systems that is forced
in continuing with less staff members and quite less budgets. After detecting the cause of the
outage, it is determined by the IT team that the outage caused due to failure of single device,
however one that is really a crucial equipment of the system. It took several services down,
which included prevention of online sales, costing their business even after one whole
weekend of their sale. Senior management realized that IT is needed and asked IT department
for creating proposal for overhaul and modernization of existing services of IT for building
better scalability and resilience for services that are needed for their business.
The major aim for the changes in IT area is in attempting for minimizing risks of
repeat event’s risks. Team of senior management is eager for reacting quickly in correcting
the faults within their system, hence speed of implementation must be considered as of high
priority where significant downsides are not brought by it in ongoing maintenance and
operations. There are two sites for the business, main HQ having 350 users having leased
connection of line and the secondary site having 100 users on basic service of ADSL. Every
service, which includes those that are accessible externally are hosted in secondary site and
main HQ, accesses internal only by services through VPN. Secondary sites has issues
constantly in accessing both internet and internal services of IT that the modernization must
address also.
Document Page
3ENTERPRISE SERVER MANAGEMENT
Key Infrastructure Services
Dynamic Host Configuration Protocol (DHCP)
It is protocol of network management that is used on networks of UDP/IP where
server of DHCP assigns the IP address dynamically and all other parameters of network
configuration for every device within network, so these could communicate with IP’s all
other networks. DHCP server enables the systems in requesting networking parameters and
IP addresses from Internet Service Provider (ISP) automatically, by reducing need of user or
network administrator for assigning IP addresses manually into every network device (Bilge
et al. 2014). Without a server of DHCP, a system or device within the network should be
assigned manually IP address or by assigning itself with APIPA address that would be
enabling it in communicating outside of the local subnet.
DHCP could be implemented within networks having different range of size. A
residential gateway or router could be enabled for acting as server of DHCP. Maximum
network routers get different IP address in ISP network. In local network, server of DHCP
assigns the local IP address for every device that is connected with the network (Issac 2014).
DHCP could be implemented within the system of the organization for providing bettor
networking system. Cost of implementation of DHCP is around 600 dollars.
DHCP needs routine maintenance and would unlikely have various problems. One of
these problems would likely be a sign that everything is not right with DHCP. A warning
message is received “Client of DHCP cannot renew IP address lease” (Tripathi and Hubballi
2015). User would find that the web cannot be accessed or the program would work. When
attempt is made in using DHCP manager, warning message would be received. When there is
attempt of starting service of DHCP, warning message would be received that service is
unable to start. In each of the cases, the start of DHCP service should be verified (Dinu and
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ENTERPRISE SERVER MANAGEMENT
Togan 2014). If any of the services is not working, attempt should be made for staring the
service. After starting of service, these problems would be resolved.
Domain Name Server (DNS)
It is the naming system of the services, systems or all other resources that are
connected with the internet or the private network. It associates several information of
domain names that are assigned with every participating entities. It interprets domain names
that are readily memorized to integral IP addresses that are required to locate and identify
systems and services with network protocols. DNS delegates responsibility to assign domain
names and map those names with internet resources through designation of authoritative
servers of every domain (Cheshire and Krochmal 2013). Administrators of network might
delegate authority on allocated namespace’s sub domains with name servers. Such
mechanism provide distributed service and should avoid single huge central database.
Cost of implementation of DNS is around 125 dollars. DNS is Internet’s equivalent to
phone book. Domain names’ directory is maintained by DNS and translates the domain
names into IP address. It is necessary as people can remember the domain names, however
systems access websites depending on the IP addresses. Data from servers of domain name
over internet are collected together (Anagnostopoulos et. al. 2013). When a URL is typed into
web address, ISP sees the associated DNS along with domain name and interprets in IP
address which is machine friendly and directs internet connection towards correct website.
Nameservers point the domain towards whoever has control of DNS settings.
Maximum providers of DNS assign minimum two servers of DNS for each domain. Once
domain is pointed towards nameservers, website would be live in few hours. DNS are
essential for the online businesses as they affect security, speed and redundancy
(Vinayakumar, Poornachandran and Soman 2018). Degree of security, speed and redundancy
Document Page
5ENTERPRISE SERVER MANAGEMENT
which is guaranteed by nameserver depend on Service Level Agreement (SLA) that is
offered.
Active Directory
It is directory service which is used for domain networks of Windows Operating
System. It is also termed as domain controller. This authorizes and authenticates every user
and system within domain network of Windows OS, such as enforcing and assigning security
policies to every system and updating and installing software. It checks password that is
submitted and determines if user is a normal user or a system administrator (Santos 2013). It
allows storage and management of information, gives mechanisms of authorization and
authentication and establishes framework for deploying other connected services.
Lightweight Directory Access Protocol (LDAP) is used by Active Directory.
Services of Active Directory consist of several directory services, best being Active
Directory Domain Services (AD DS). It is cornerstone of each domain network of Windows
OS. Information about the members of domain is stored in it, which includes users and
devices, their credentials are verified and access grants of theirs are defined (Simpkins 2016).
The server that is running on the service is termed as domain controller. Contact is made with
domain controller when user logs in into device, accessing other device over the network.
Active Directory Certificate Services (AD CS) creates on-premises public key
infrastructure (PKI). It could validate, revoke and create public key certificates for the
organization’s internal uses. Such certificate could be used for encrypting files, network
traffic and emails. Active Directory Lightweight Directory Services (AD LDS) runs on sever
of Windows OS. The code base is shared by AD LDS with AD DS and gives similar
functionality, which includes identical API, however do not need creation of the domain
controllers or domain. Data Store is provided by it for storing directory data.
Document Page
6ENTERPRISE SERVER MANAGEMENT
Instance of Active Directory includes database and its executable code that are
responsible to service requests and maintain the database. Structures of Active Directory are
information’s arrangements about the objects. Two categories are there for the objects:
security principals and resources (ALEKSIEVA and SLAVOV 2018). A single entity is
represented by each object, whether a system, user, group and their attributes. Specific
objects could contain the other objects. Object is identified uniquely by name and has
attribute set, information and characteristics that is represented by the object is termed as
schema. The objects of schema let administrators in modifying or extending the schema
whenever needed.
Active directory would approximately cost around 600 dollars per month. Along with
surface, real cost is costs of Client Access License (CLA). Range of price is variant widely
and depends on the organization. There are additional costs of Active Directory such as
infrastructure, software of Windows Server, Linux and MAC binding, security,
administration and maintenance and identity federation.
File Shares
File shares are public or private sharing of data of system within network with access
privilege’s various levels. It is practice for providing or distributing access to the digital
media, like multimedia, electronic books, documents or computer programs. It shares access
to the digital resources or information. It is data resources’ distribution within a network
having sharing privileges’ different levels. Sharing of files might be achieved by a couple of
methods. Most common ways of transmission, dispersion and storage consist of centralised
servers over networks of computer, hyperlinked documents of World Wide Web-based, use
of shared peer-to-peer networking and manual sharing which utilises removable media
(Benson-Allott 2013). While the files could be shared outside the network easily, sharing of
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7ENTERPRISE SERVER MANAGEMENT
file means sharing of files in network. Several users are allowed by file sharing to use similar
file or the file with a combination in viewing or reading it, modify or write it, print it or copy
it. Typically, system of this has single or multiple administrators. Users might have similar or
might have separate levels for access privilege.
Sharing of file could mean also having personal life storage’s allocated amount in file
system. Sharing of file is a feature or multi-user and mainframe computer systems for several
years. With arrival of internet, system for file transfer, also termed as File Transfer Protocol
(FTP), is used widely. FTP could be used for accessing files that are shared between specific
users set with password for gaining access to the files that are shared from server site of FTP.
Several FTP sites give public sharing of file or ability for viewing or copying files through
downloading them, by using public password (Ali et. al. 2015). FTP is used by website
developers for uploading revised or new web files into web server. World Wide Web is
thought as huge file sharing through which the requested files or pages are downloaded
constantly or copied into web server.
Servers of FTP are most useful way for managing and sharing files within the
systems. IT pros control is given by them over access of user, data and system. The cost of
server of FTP depends on various factors, which includes software, hardware, setup time,
bandwidth and ongoing upgrades, security, support and electricity. There are many processes
to configure a server of FTP within the system. The tasks required by the system would need
the server to be performing along with number of the users it is expected to be serving would
determine the costs of hardware of the FTP server (Marasco, Picucci and Romano 2016). As
servers are always almost more expensive when compared to the counterparts of desktop,
those having tight budget could find options of low-cost server which handle several tasks of
the system that is expected from the server.
Document Page
8ENTERPRISE SERVER MANAGEMENT
High end server of FTP would be used for performing the tasks within the system
such as database serving and data intensive Web, video sharing and storage and the
enterprise-grade conferencing and messaging. Such servers would typically consist of
multiple processors, RAM of 16 GB or more with several redundancies and operating system
of high-end server. The server of FTP could cost thousands or ten thousands of dollars. The
high-end servers might be deployed also in several server configurations termed as clustering.
Server of FTP might not have operating system for server. When it is about selection of
operating system for server, high-end server OSes such as Windows server 2008 R2’s starting
range is about 1000 dollars for five users and 4000 dollars for enterprise edition that consists
of 25 CALs. Also budget for software application that would be required by the server is to
be calculated. Server of FTP could be lifeline for this system and it is essential in investing in
the ongoing operation of the server of FTP.
As result, while budgeting for FTP server, it is necessary in creating good plan for
costs related to administration and configuration of the server. Hardware of FTP server would
cost around 2500 dollars. Price differs on speed of processor and the space of hard drive. For
software of FTP server, around 500 dollars would be the cost price. There are several
software programs of FTP server to select from, and these would impact the costs of FTP
server. They differ on price depending on features of the product and the number of users
accessing the system. Hosting server of FTP would eat certainly eat the bandwidth when the
users start downloading and uploading files (Wang et. al. 2014). This could cause ripple
effect over other employees who try to perform essential functions like web browsing,
emailing and video conferencing. This cost of hidden server could hurt the productivity. Few
of the following procedures or software should be installed within server of FTP: Windows
configuration, purchase of SSL, configuration of software of FTP, configuration of backups
Document Page
9ENTERPRISE SERVER MANAGEMENT
and should have technical staff for managing, troubleshooting problems, applying patches
within server, upgrading and managing.
SQL Databases
SQL is domain related language that is used for programming and is designed in
managing data that is stored within relational database management system (RDBMS), or for
processing of stream within RDBMs. SQL database is useful to handle structured data. SQL
database is systematic data collection. SQL database support manipulation and storage of
data. SQL database helps users for accessing database, manipulating data and reporting
presentation of data. SQL database also helps in controlling access to database of the system.
Maintenance plan of SQL database could be found within management section. It produces
scheduled jobs that are run by server agents of SQL and could perform these specific tasks:
reorganizing index pages, rebuilding indexes, updating statistics of the indexes, shrinking log
files and data by removal of empty pages, backing up transaction log and database,
performing check of internal consistency and cleaning up tasks (Li and Manoharan 2013).
Applications could be deployed within SQL database for storage of data.
With enterprise-wide, software applications that are data-driven, it is essential in
establishing procedures for assuring proper maintenance of database and activities of backup
are performed. Such activities are responsibility of organization which implements this
system. Minimum database maintenance and backup activities needs to be performed within
SQL database for protecting the data of organizations and in keeping the system to run
smoothly. SQL database would consist of features such as machine learning, reporting,
analysis, search of full text and intelligence studio for business. Two licensing models are
there for SQL Server 2016. This could either be licensed as for per server along with licence
needed for each device which connects to server of the database, or it could be licensed as for
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10ENTERPRISE SERVER MANAGEMENT
database server’s per core, having minimum of 4 core license that is needed (Shute et. al.
2013). Cost of licence of SQL database server 2016 is around 14256 dollars, almost 7128
dollars for each core.
Maintenance of SQL database is quite essential part of daily tasks of database
administrator. However, the aspect is underestimated frequently that could lead in problems
of performance. Several maintenance operations is required in SQL database for optimizing
them and taking maximum out from each (Zhang, Katz and Papamanthou 2015). One of
possibilities for keeping the indexes defragmented is operation of index recognition. Such
operation is online always and uses minimum resources of system. Operation of index rebuild
is approach that should be used when there is high fragmentation. Such operation could be
performed both offline and online. Statistics are essential objects within SQL databases as
these are used for producing plans of query execution.
Load Balanced Web Applications
Load balancing is primary component of infrastructures that are highly available,
commonly used for improving reliability and performance of applications, databases, web
sites and all other services within the system through distribution of workload among several
servers. If the server goes down, user would no longer have the ability in accessing the
website. Additionally, if several users try in accessing the server and if the server is unable in
handling the load, they might experiences that are really slow or might be unable in
connecting with it at all (Toosi et. al. 2017). The single point for failure could be mitigated by
introduction of load balancer and one extra web server for the back end.
Every back end server would supply same content so that the users could get
consistent content in spite of which server makes respond. Load balancing is referred to
efficiently distribution of network traffic that are incoming across group of servers of back
Document Page
11ENTERPRISE SERVER MANAGEMENT
end, also termed as server pool or server farm. Modern websites having high traffic should
serve several thousands, requests from the users and should return the right images,
application data, video or text, in reliable and fast manner. For cost-effectively scaling to
meet such high volumes, the modern computing needs addition of more servers generally.
Administrators of load balancing generate forwarding rules of four main kinds of
traffic: HTTP, HTTPS, TCP and UDP. Requests that are based on HTTP mechanisms are
directed by HTTP balancing. HTTPS balancing is similar as HTTP balancing, having
additional technique of encryption. For applications having HTTPS or HHPT, traffic of TCP
could be balanced also (Long et. al. 2013). Few load balancers possess added support of load
balancing internet protocols which use UDP. Server is chosen by load balancers for
forwarding request based upon combination of the two factors. It is ensured first that server
which is chosen is responding accurately to the requests and pre-configured rule is used then
for selecting among the healthy pool. Load balancing web applications would cost around 23-
25 dollars per month.
Microsoft Exchange
Microsoft Exchange is a calendaring server and mail server. This runs on operating
systems of Windows. Microsoft Exchange 4.0 used directory service of X.400 initially,
however changed in Active Directory. Till version 5.0, this came having email client termed
as Microsoft Exchange Client. Proprietary protocol termed as MAPI is used by Exchange
server for talking to the email clients, however added support of EAS, IMAP and POP3.
Standard protocol of SMTP is used for communicating with other mail servers (Andersson
2013). Exchange server has licenses of both software as a service (SaaS) and on-premises
software. In form of on-premises, CALs are purchased by clients. In SaaS, monthly fee for
service is charged by Microsoft. One of main features of Microsoft Exchange is it could be
Document Page
12ENTERPRISE SERVER MANAGEMENT
deployed into Server Core of Windows for first time. Microsoft Exchange supports running
of server of Exchange with RAM of 256 GB and almost 48 processor cores.
Cost of implementation of Microsoft Exchange server is approximately 700 dollars.
For running Microsoft Exchange smoothly, regular maintenance is required. Several
maintenance tasks is executed by Exchange server per day. These tasks could be scheduled at
peak time and verification could be made that tasks are properly executed and free space’
percentage and integrity of databases should be checked (Redmond 2013). Microsoft
Exchange Best Practices Analyser would help in confirming that the server is correctly
configured and the errors are flagged. ExBPA is run by administrators after deployment of
Microsoft Exchange, then tool for fine-tuning the organization is sued. It helps in checking
everything is properly configured and optimized.
Each time EXBPA is run, it checks centralised database that is kept updated for
configuration by Microsoft. Regular running of EXBPA is recommended for improving
overall exchange deployment of efficiency and security within the organization. Tasks of
automated maintenance are carried out. When the process begins, Microsoft Exchange begins
from first task and then move down in that list. If every task is not completed in allotted time,
exchange keeps record of the tasks which are finished and the tasks which are to be processes
yet (Bosu, Greiler and Bird 2015). In next process, cycle of maintenance starts with first task
that is incomplete from the previous cycle. Major exception to rule is the online
defragmentation. Maintenance cycle’s last 15 minutes is set for defragmenting if at least one
task of maintenance should be completed. Importance is given to defragmentation by
exchange server even if few tasks did not have time for completion.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13ENTERPRISE SERVER MANAGEMENT
Conclusion
These services such as key infrastructures services, SQL databases, file shares,
Microsoft exchange and web applications of load balancing which are identified for meeting
new requirements of “modernization” should be implemented within the organization.
Implementing these services would solve the issues of failure of components as well as
improve the total performance of system. By implementing these services within the system
would help in correcting the faults quickly within the system. Implementation of these
services would also resolve the issues of both secondary site and main HQ. Not only the
faults within the system would be resolved, also the performance of their e-commerce system
would improve as well for modernization and existing services of IT’s overhaul for building
better scalability and resilience for services that are needed for business. Implementing these
services would resolve every issue or fault and improve overall performance of the system.
Document Page
14ENTERPRISE SERVER MANAGEMENT
References
ALEKSIEVA, V. and SLAVOV, S., 2018. MANAGED ACTIVE DIRECTORY IN
DIRECTORY-AS-A-SERVICE. FUNDAMENTAL SCIENCES AND APPLICATIONS,
p.117.
Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K. and Zomaya, A.Y.,
2015. SeDaSC: secure data sharing in clouds. IEEE Systems Journal, 11(2), pp.395-404.
Anagnostopoulos, M., Kambourakis, G., Kopanos, P., Louloudakis, G. and Gritzalis, S.,
2013. DNS amplification attack revisited. Computers & Security, 39, pp.475-485.
Andersson, J., 2013. Microsoft Exchange Server 2013 PowerShell Cookbook. Packt
Publishing Ltd.
Benson-Allott, C., 2013. Killer tapes and shattered screens: Video spectatorship from VHS
to file sharing. Univ of California Press.
Bilge, L., Sen, S., Balzarotti, D., Kirda, E. and Kruegel, C., 2014. Exposure: A passive dns
analysis service to detect and report malicious domains. ACM Transactions on Information
and System Security (TISSEC), 16(4), p.14.
Bosu, A., Greiler, M. and Bird, C., 2015, May. Characteristics of useful code reviews: An
empirical study at microsoft. In 2015 IEEE/ACM 12th Working Conference on Mining
Software Repositories (pp. 146-156). IEEE.
Cheshire, S. and Krochmal, M., 2013. DNS-based service discovery. RFC 6763, February.
Cukier, D., 2013, October. DevOps patterns to scale web applications using cloud services. In
Proceedings of the 2013 companion publication for conference on Systems, programming, &
applications: software for humanity (pp. 143-152). ACM.
Document Page
15ENTERPRISE SERVER MANAGEMENT
Dinu, D.D. and Togan, M., 2014, May. DHCP server authentication using digital certificates.
In 2014 10th International Conference on Communications (COMM) (pp. 1-6). IEEE.
Elfassy, D., 2013. Mastering Microsoft Exchange Server 2013. John Wiley & Sons.
Fernandez, H., Pierre, G. and Kielmann, T., 2014, March. Autoscaling web applications in
heterogeneous cloud infrastructures. In 2014 IEEE International Conference on Cloud
Engineering (pp. 195-204). IEEE.
Hoffer, J.A., Ramesh, V. and Topi, H., 2013. Modern database management. Boston:
Pearson,.
Issac, B., 2014. Secure ARP and secure DHCP protocols to mitigate security attacks. arXiv
preprint arXiv:1410.4398.
Li, Y. and Manoharan, S., 2013, August. A performance comparison of SQL and NoSQL
databases. In 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal
Processing (PACRIM) (pp. 15-19). IEEE.
Long, H., Shen, Y., Guo, M. and Tang, F., 2013, March. LABERIO: Dynamic load-balanced
routing in OpenFlow-enabled networks. In 2013 IEEE 27th International Conference on
Advanced Information Networking and Applications (AINA) (pp. 290-297). IEEE.
Marasco, A., Picucci, A. and Romano, A., 2016. Determining firms׳ utility functions and
competitive roles from data on market shares using Lotka–Volterra models. Data in brief, 7,
pp.709-713.
Redmond, T., 2013. Microsoft Exchange Server 2013 Inside Out Mailbox and High
Availability: Micr Exch Serv 2013 Ins _p1. Pearson Education.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16ENTERPRISE SERVER MANAGEMENT
Rodriguez-Muro, M., Kontchakov, R. and Zakharyaschev, M., 2013, October. Ontology-
based data access: Ontop of databases. In International Semantic Web Conference (pp. 558-
573). Springer, Berlin, Heidelberg.
Santos, M.D., 2013. Uso de LDAP implementado em software livre para integrar a
autenticação dos controladores de domínio MS-Active Directory e Samba/Linux (Bachelor's
thesis, Universidade Tecnológica Federal do Paraná).
Shute, J., Vingralek, R., Samwel, B., Handy, B., Whipkey, C., Rollins, E., Oancea, M.,
Littlefield, K., Menestrina, D., Ellner, S. and Cieslewicz, J., 2013. F1: A distributed SQL
database that scales. Proceedings of the VLDB Endowment, 6(11), pp.1068-1079.
Simpkins, S., 2016. Active Directory. In Building a SharePoint 2016 Home Lab (pp. 97-116).
Apress, Berkeley, CA.
Toosi, A.N., Qu, C., de Assunção, M.D. and Buyya, R., 2017. Renewable-aware geographical
load balancing of web applications for sustainable data centers. Journal of Network and
Computer Applications, 83, pp.155-168.
Tripathi, N. and Hubballi, N., 2015, December. Exploiting dhcp server-side ip address
conflict detection: A dhcp starvation attack. In 2015 IEEE International Conference on
Advanced Networks and Telecommuncations Systems (ANTS) (pp. 1-3). IEEE.
Villamizar, M., Garcés, O., Castro, H., Verano, M., Salamanca, L., Casallas, R. and Gil, S.,
2015, September. Evaluating the monolithic and the microservice architecture pattern to
deploy web applications in the cloud. In 2015 10th Computing Colombian Conference
(10CCC) (pp. 583-590). IEEE.
Document Page
17ENTERPRISE SERVER MANAGEMENT
Vinayakumar, R., Poornachandran, P. and Soman, K.P., 2018. Scalable framework for cyber
threat situational awareness based on domain name systems data analysis. In Big Data in
Engineering Applications (pp. 113-142). Springer, Singapore.
Wang, X., Chen, M., Han, Z., Wu, D.O. and Kwon, T.T., 2014, April. TOSS: Traffic
offloading by social network service-based opportunistic sharing in mobile social networks.
In IEEE INFOCOM 2014-IEEE Conference on Computer Communications (pp. 2346-2354).
IEEE.
Zhang, Y., Katz, J. and Papamanthou, C., 2015, October. IntegriDB: Verifiable SQL for
outsourced databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer
and Communications Security (pp. 1480-1491). ACM.
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]