An extensible architecture for network-attached device management

Michael J. McMahon, Sergiu M. Dascalu, Frederick C. Harris, Juan Quiroz

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

The development of network-attached devices has ushered in an era of autonomous, multi-function equipment demanding minimal human interaction: the only requirements are data and electricity. Despite these advances, these machines continue underutilized in network environments due to operating system limitations regarding the management of these devices. These limitations force the use of these devices via other network hardware, such as a server, that manage the device access and data. While effective, this results in increased resource consumption and ignores the capabilities presented by network-attached devices. In order to facilitate optimal utilization of these devices, we have designed a new, extensible management architecture for all network-attached devices. This architecture, presented here, supports the central management of network-attached devices while allowing client machines access to the device without intermediate server hardware. Implementation of this paradigm on test networks has decreased resource consumption - especially bandwidth - considerably.

Original languageEnglish
Title of host publication2nd International Conference on Software Engineering Advances - ICSEA 2007
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages6
ISBN (Print)0769529372, 9780769529370
DOIs
Publication statusPublished - 1 Dec 2007
Externally publishedYes
Event2nd International Conference on Software Engineering Advances - ICSEA 2007 - Cap Esterel, France
Duration: 25 Aug 200731 Aug 2007

Conference

Conference2nd International Conference on Software Engineering Advances - ICSEA 2007
Country/TerritoryFrance
CityCap Esterel
Period25/08/0731/08/07

Fingerprint

Dive into the research topics of 'An extensible architecture for network-attached device management'. Together they form a unique fingerprint.

Cite this