INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 03, MARCH 2020 ISSN 2277-8616 Dynamic Allocation Of Server Resources Among Users

Basti M.Aliyeva

Index:The article was dedicated to the solution of the problem on the dynamic allocation of mail server resources among users. It was noted that recently the electronic mail system had undergone serious changes and new features have been added to this system. The article examines the working principles of and defines possible operating modes for subscribers. It was noted that mail server memory should be dynamically allocated among users so that the email can successfully perform its functions. In the article,the linear programming is applied to the problem of dynamic allocation of mail server memory. Known methods at every operation can resolve this issue.Proximity measure has been defined based on the Levenstein Distance (LD) for the determination of the renewal of documents on the server to improve the use of the server resources. This tool can be used to determine whether the documents have changed on the server.In the result, similar documents can be identified, and their number can be reduced up to one.

Key Words: email server, dynamic allocation of the memory, operating modes of subscribes, Levenstein Distance (LD), Measures of document proximity. ————————————————————

1. INTRODUCTİON information networks. In this case, it is essential to pay It is known that e-mail is one of the most important special attention to data transmission issues.Numerous information resources of the Internet, as well as it is the ways to transmit data and many software tools have been most massive communication tool. In recent years, e-mail developed accordingly in this field. One of the most system has undergone serious changes. Internet e-mail widespread means of data transmission is the transmission service had gone a long way from the time the users used of data via e-mail. Email, being one of the vital exchange the information exchange in the form of small, short text tools on the Internet does not reduce the relevance of the until the recent years when friends used pictures, music work done in this area. After a few seconds, the letter sent sharing, etc. Multiple protocols and software tools have over the Internet reaches the addressee at another point of been created and implemented to make email services to the planet – this indicates the advantage of the email over perform its new features. As a result, it was possible to the usual post. Besides, the costs of sending such exchange information not only in the form text but also information are minimal.Thus, e-mail is an indispensable binary files. The rapid growth of the Internet Network was tool for correspondence between users in many the major driving force for the establishment and organizations [3, 4]. Of course, it is difficult to find any development of these protocols and program tools. In the organization in the current period that employees do not past, the e-mail system consisted of smaller, secondary use or less use exchange advantages created by e- subsystems and it had to give priority to the corporate mail.The technology of electronic mail sending is that the networks [1,2]. Email system has already been exploited sender sends the data to the addressee he/she knows by quite a long time. Internet providers allocate separate downloading a particular program, and the addressee also independent systems to serve their clients’ email boxes. If downloads a special software to verify and receive the data we take into account that it is possible to send and receive in its . At this time, a local mailbox is created for information to and from dozens of international computer each user that stores all the user's data in that box. There networks even some of them doesn’t have online service, it are special programs for working with mailboxes, which are becomes clear that wide ranges of opportunities open up called mail user agents. In short, such applications are for the email users in a certain sense other than the called the MUA (Mail User Agent). Mail user agents do not information service of the Internet. It is known that in recent receive data from other remote computers;they show the years, information has become a crucial factor in world content of the user's mailbox. Electronic mail works with politics, economy (trade, industry);it emerges as a product email departments – mail servers as an ordinary post. In its of outstanding scientific and research activities. The turn, these servers also send and receive letters over the demand for structuring, collecting, storing, searching, and global network. They communicate with each other via mail transmitting data is steadily increasing. Fulfilling these protocols that provide data transmission and recognition – demands becomes the goal of creation and development of authentication on the web. Client computers of mail servers serve to email users. Each user must have a login and ______password to use the e-mail box. The user undergoes authentication procedure in mail server: on selected SMTP

 Basti M.Aliyeva, Faculty of Turkish World of Business (Simple Mail Transfer Protocol) to send the information via Administration, Economy and Business Administration, mail clients such as Outlook Expressor while receiving Azerbaijan State University of Economics (UNEC) ), Baku, email on selected POP () or IMAP Azerbaijan. e-mail: [email protected] (Internet Message Access Protocol). If the authentication ,bastiyusifova@.com, https://orcid.org/0000-0002-3274- procedure is successful, prepared mail information is sent 5301 to the server (Figure 1).

3326 IJSTR©2020 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 03, MARCH 2020 ISSN 2277-8616

selection of equipment and proper memory allocation among corporate mail users. At this point, it is necessary to choose the equipment so that the flow of current into the organization is ensured.This equipment should also have specific production resources other than providing the current flow so that to enhance the work of e-mail when the number of correspondence increases. One of the main problems of selection of equipment is that the technical specifications of selected servers are not compatible with their productivity. Thus, the mail administrator has to refer to the previous operation experience of corporate mail systems or the recommendations of the mail software manufacturers. In many cases, such information is insufficient for the installation and operation of corporate mail systems and generally any system requirements.Therefore, solving the problem of dynamic allocation of server memory among users is topical to ensure that email server is used effectively.The article Figure 1. Working principle of email. considers a solution to this issue.

Once the mail is sent to the server, the server creates communication with mail recipients for DNS addresses and transmits the data there.Then, the recipient's Client 2. PROBLEM STATEMENT program reads its inbox folder. In this case, for the default The following parameters can be taken as a measure of the port #25 is used as SMTP port, port #110 is used as a POP unit of the productivity of mail servers: email processing and IMAP port. Examples of allocated email servers are intensity or email packages’ processing intensity. In most HMailserver, CommuniGate Pro, , , , cases, email processing intensity is indicated as the unit of MDaemon, Microsoft Exchange Server. From mail servers productivity of the mail servers. It should be taken into mentioned before MDaemon and Microsoft Exchange consideration that emails of various volumes have Server only work under Windows Operation System, others itsprocessing productivity.Thus, as another productivity unit operate both with Unix and Windows Operation System. for the mail server is email packages’ processing intensity. Message-information written in a particular format can be This unit of productivity of the email server does not depend sent via email. MIME can be as an example of a common on the length of the electronic mail.The other main technical format. Any information in this format consists of the header specifications of the mail server include the frequency of the and body. The headerhas four essential parts: central processor (MP), the size of the processor's memory, the size of the hard disk, and so on. In some cases, • sender’s address (From:); numerous e-mails may be collected on the server. If many • recipient’s address (То:); users in the enterprise store a large number of emails in • Subject of information (Subject:); their mailboxes, a large memory is required for storing them • sending date, time (Date). on the server. According to some researchs, in 2019, it was expected that e-mail users will send approximately 250 Here, the sender fills second and third sections. The first billion emails [5]. This may be an example of the relevance and fourth sections are filled by mail program automatically. of the problem.The following operation modes are set up to A body contains the content of the information. Simple text improve the reliability and efficiency of corporate e-mail as can be put in the body. Moreover, one or more files ( for well as to prevent traffics that may occur here: example, graphics, sound, text files, etc.) can be attached to the text.The content of the email may affect only the 1. A limited mailbox memory is allocated for the amount of data sent but does not change the sending subscribers, for example. 20MB. The system process of email. Any user must register with the corporate administrator decides on the more memory allocation in mail server to work with email. A registered user in the mail specificcases. server receives an email address, and the mailbox is 2. Subscribers should check and monitor their mailboxes created for the user where the received messages everyday. collected. The e-mail address is generally set as follows: 3. The data must be transferred to the hard disk after Username@mail server address. For example, being viewed or sent (after being processed), and thus [email protected]; the mailbox must be freed. Username is the name created by the user while registering 4. Sending and receiving time and date of each data must in the mail server. Thus, email communication consists of be verified by notices; each subscriber's computer must two interconnected processes:Receiving incoming mail and be set up to request mail software receipts to achieve sending outgoing information.During these processes, the this goal. mail program performs data exchange functions with the 5. Betty Liu. The 11 Worst Email Mistakes Everyone mail server on both sides. As it is known, one of the critical Makes issues in the design of the corporate mail system is the

3327 IJSTR©2020 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 03, MARCH 2020 ISSN 2277-8616

6. The period of storage of any data in the mail server Let's mark the ith mailbox usagecoefficientat the jth time in memory must be at least five days. Subscriber must set j 1, j  j this mode himself/herself. If the subscriber does not   with i : use the computer for a long time and does not look at j j Vi the mailbox, the storage period can be prolonged no  i  more than 30 days. Q 7. There should be a limit on the amount of data sent at a But let's point out the dynamics of change in memory usage time.Large files should be archived and compressed j j1 j Vi Vi through the WinRAR program or other means before k i  sending. At this time, if the file size exceeds the coefficientin with Q . required volume, the file should be transmitted in parts. Apparently, for the random j the following conditions must An excessive volume of mailboxes can cause be met: unpredictable problems which can affect the system's n reliability and other features. Therefore, it is necessary  j  1 to control the users' mailboxes to avoid problems such 0  i ki  0 i1 as full memory failure. The article solves the problem of , . dynamic allocation of the email server memory among Let’s suppose that the user receives an email in volume j1 users. Q i atthe j 1 time. At this time, it is necessary to find

 j1 In the article used optimization and linear programming such a new i value so that the following issues will be methods, measurement theory, and specifically solved under the conditions set out below: Levenshtain metric between the two texts. Experimental 2 n j software An experimental software tool was developed  j1 1 j  using the DELPHI programming system.  i   i   min i1  j k 0  3. SOLUTİON OF THE PROBLEM. j 1 k j1 1 k j j1 The problem of dynamic allocation of mail server  i   i   i  ki Vi memoryamong corporate network users should be j k 0 j k 0 addressed to avoid the need to increase the memory of the n mail server. The linear programming model is formulated for j1  i  1 the solution of the problem [6-8]. In this case, the first  i1 approximation allocates the equal amount of memory to This problem is solved at every j discrete time. each electronic mail user: One of the crucial issues for improving the use of server Q / n  Q 0 ,i  1,....,n resources is the determination of the updated information i . on the server. It is known that documents containing written Here, n is a number of users; i is the current user, Q is total texts are updated more frequently.Therefore, Levenstein Distance-based measure was proposed as a criterion for memory volume. updating text documents [9-13]. 0 Qi is an initial memory volume per i user. Under these When the proximity of documents is determined with the circumstances Levenstein Distance (measure)the number of basic editing Q 0  Q 0  ....Q 0  Q operations required to obtain one string from another is 1 2 n calculated. Basic operations mean deletion, substitution, The size of the memory used by the mailbox varies insertion for a single symbol [14, 15]. Each word should be depending on the user's intensity (α) of requests to the imagined as a sum of symbols to define Levenstein server's memory. Distance. j q Thus, the distance betweenthe two and Let’s assume that, i is the volume of the email received a  (a1 ,...,aN ) by the ith user at the jth time. b  (b1 ,...,bM ) is calculated by the following formula: V j i is the volume of email kept in the mailbox by the ithuser till the jth time. Then, the mailbox of the ith user at the jth time occupies the memory of Q j  V j  q j i i i . The user removes a portion of the e-mail received and Q j keeps i volume of the received email. Thus, there would j j j V  V  Q th be information in the volume of i i i at the j th time in i user memory. Here (x, y) is the negation of Kronecker symbol:

3328 IJSTR©2020 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 03, MARCH 2020 ISSN 2277-8616

0; x  y  (x, y)   1; x  y

Short Lij is used for each L((a1 ,...,ai ),(b1 ,...,b j )) , i  1,..., N , j  1,...,M distance. All , i  0,1,..., N , j  0,1,..., M , (i, j)  (N, M ) distances should be reckoned to calculate L(a,b)  LNM . LNM in the particular case. It should be noted that it is convenient to calculate the distances by the iterative method. In this case, first of all,

Li0  i , and L0 j  j , j  1,...,M distances are initialized.Then , , Figure 2. Levenshtein distance proqramm screen. distances are calculated for L , L and L (i1) j i( j1) (i1)( j1) procedure TForm1.LevenshteynClick(Sender: values. TObject); Only deletion and insertion are used to ensure the label lab1; adequacy of Levenstein Distance. Thus the substitution begin operation is not regarded as a serious modification by the s1:= edit3.Text; human in most cases. s2:= edit4.Text; If L(D, D*) value is the number of basic operations n:=length (s2); required to convert a document to another document, then m:=length(s1); proximity distance between D and D * is for i:=0 to 99 do begin L(D, D*) for j:=0 to 99 do 8. dist(D, D*)  . d[i,j]:=0;    * end; Here  and  * are the lengths of similar for i:=1 to m do // first documents.Calculated distance meets d[i,0]:=i; for j:=1 to n do //second 0  dist(D, D*)  1and is zero for similar documents. d[0,j]:=j; Zero distance between two documents can ensure the if n=0 then deletion of one of the documents, and it can improve the begin operation of email servers. d11:=m; Goto lab1; There are various algorithms for determining the Levenstein end distance between the two lines [16, 17]. else The Levenshtein distance between the two lines can be if if m=0 then calculated as in the DELPHI fragment given in the form of begin the following TForm1.Levenstein. The s1 and s2 rows that d11:=n; are compared in this subprogram include the edit3 (first Goto lab1; row) and edit4 (second row) windows. As you can see from end; the fragment, the length of the lines is written to the d11:=0; variables n and m respectively. The result of the fragment for i:=1 to m do begin operation is indicated in the edit5 window. This fragment for j:=1 to n do begin (the software was written and tested as a computer elave:=1; experiment) if s1[i-1]=s2[j-1] then The main and auxiliary variables used in the fragment are elave:=0; defined as follows: e1:= d[i-1,j]+1; s1,s2:string; e2:= d[i,j-1]+1; d :array [0..100, 0..100] of integer; e3:=d[i-1,j-1]+elave; m,n,d11,elave,e1,e2,e3, i,j: integer; if e2

3329 IJSTR©2020 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 03, MARCH 2020 ISSN 2277-8616

end; [9] Levenshteyn, V. I. (1991). On the perfect codes in the From the definition of Levenshtein distance and the metric of deletions and insertions//Discrete program shown, the distance L (s1, s2) between the lines Mathematics ,3:1, 3–20. s1 and s2 pays the following properties: [10] Aliyev, A., Huseynova, A. (2008, September 10-12) On the approaches of increasing the productivity of the ; corporal net and a criterion of data updating in cash- ; servers / The second international conference ; “Problems of cybernetics and informatics”, Baku, ; Azerbaijan. Vol. 1, 78-80. From the definition of Levenshtein distance and the [11] Wagner, R. A., Fischer, M. J. (1974) The string-to- program shown, the distance L (s1, s2) between the lines string correction problem. J. ACM 21 1., 168—173. s1 and s2 regulated the following properties: [12] Siva R., Myrthy C., Manaj B. AD Hok Wireless Networks architectures and Protocols. Prentice Hell, 4. SUMMARY 2004, 380 p. The problem of dynamic allocation of mail server memory [13] Kulgin M.V. Technologies of corporate networks // among corporate network users should be addressed to Encyclopedia of St. Petersburg :, 1999, p. 704. avoid the need to increase the memory of the mail server. [14] Yongpeng Dai , Hanhua Zhang, Yongping Song , Hao Linear programming is applied to the problem stated to Du, Tian Jin. Signal Comparing Normalized achieve the goal in the article. Real memory can be defined Generalized Levenshtein Distance-Based Searching to be used by considering each user's memory usage Method for Modulation Period of Micro-Doppler Signal. coefficient at random time and the quality of memory usage // IEEE Sensors Journal > Volume: 18 Issue: 15, 2018, increases. The Levenstein metric-based measure was pp. 6254-6262. proposed to update the documentation on the servers. The [15] Krishna N. S. Behara, Ashish Bhaskar, Edward Chung. zero distance between the two documents can cause the Levenshtein distance for the structural comparison of deletion one of the documents and can improve the OD matrices. / Australasian Transport Research Forum performance of e-mail servers as well. 2018 Proceedings 30 October – 1 November, Darwin, The conclusions achieved in the article can be used to Australia. solve the analogical problems. [16] Computing the Levenshtein (edit) distance of two strings using c#. REFERENCES https://www.eximiaco.tech/en/2019/11/17/computing- the-levenshtein-edit-distance-of-two-strings-using-c/. [1] Haider M. Al-Mashhadi, Mohammed H. Alabiech. A [17] Brubach, Brian ; Ghurye, Jay. A Succinct Four Survey of Email Service; Attacks, Security Methods Russians Speedup for Edit Distance Computation and and Protocols. International Journal of Computer One-against-many Banded Alignment. Applications (0975 – 8887) Volume 162 – No 11, March https://drops.dagstuhl.de/opus/volltexte/2018/8696/ 2017, pp. 31-40. [2] Gurpal Singh Chhabra, Dilpreet Singh Bajwa. Review of E-mail System, Security Protocols and Email Forensics. International Journal of Computer Science & Communication Networks, January 2015, Vol 5(3), 201- 211. [3] Sharifov, M.G. (2006). Minimization of cost of delivery in content delivery networks with multi-level hierarchical architecture// Automation and Computer Engineering. Vol. 40. No. 6, 75-80. [4] Ashmanov, S. А. (1981). Linear programming. M: Nauka Publishing House, 340. [5] Betty Liy. The 11 Worst Email Mistakes Everyone Makes. FEB 6, 2018, https://www.inc.com/betty-liu/11- worst-email-mistakes-everyone-makes.html [6] Borovikov, V. STATISTICA. (2003). The art of analyzing data on a computer. St.Petersburg, ‘Piter’. 688 p. [7] V Holy Angel Jenitha, R.Veeramani. Dynamic memory Allocation using ballooning and virtualization in cloud computing. // IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727 Volume 16, Issue 2, Ver. IV, 2014, pp. 19-23. [8] Rashid Alakbarov, Fahrad Pashayev, Mammad Hashimov. A Model of Computational Resources Distribution Among Data Center Users. // International Journal of Advanced Computer Technology (IJACT): , Vol. 7, No. 2, pp. 01 - 06, 2015. 3330 IJSTR©2020 www.ijstr.org