• Title/Summary/Keyword: Centralized system

Search Result 697, Processing Time 0.03 seconds

Hypergraph Game Theoretic Solutions for Load Aware Dynamic Access of Ultra-dense Small Cell Networks

  • Zhu, Xucheng;Xu, Yuhua;Liu, Xin;Zhang, Yuli;Sun, Youming;Du, Zhiyong;Liu, Dianxiong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.494-513
    • /
    • 2019
  • A multi-channel access problem based on hypergraph model in ultra-dense small cell networks is studied in this paper. Due to the hyper-dense deployment of samll cells and the low-powered equipment, cumulative interference becomes an important problem besides the direct interference. The traditional binary interference model cannot capture the complicated interference relationship. In order to overcome this shortcoming, we use the hypergraph model to describe the cumulative interference relation among small cells. We formulate the multi-channel access problem based on hypergraph as two local altruistic games. The first game aims at minimizing the protocol MAC layer interference, which requires less information exchange and can converge faster. The second game aims at minimizing the physical layer interference. It needs more information interaction and converges slower, obtaining better performance. The two modeled games are both proved to be exact potential games, which admit at least one pure Nash Equilibrium (NE). To provide information exchange and reduce convergecne time, a cloud-based centralized-distributed algorithm is designed. Simulation results show that the proposed hypergraph models are both superior to the existing binary models and show the pros and cons of the two methods in different aspects.

Blockchain for the Trustworthy Decentralized Web Architecture

  • Kim, Geun-Hyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.26-36
    • /
    • 2021
  • The Internet was created as a decentralized and autonomous system of interconnected computer networks used for data exchange across mutually trusted participants. The element technologies on the Internet, such as inter-domain and intra-domain routing and DNS, operated in a distributed manner. With the development of the Web, the Web has become indispensable in daily life. The existing web applications allow us to form online communities, generate private information, access big data, shop online, pay bills, post photos or videos, and even order groceries. This is what has led to centralization of the Web. This centralization is now controlled by the giant social media platforms that provide it as a service, but the original Internet was not like this. These giant companies realized that the decentralized network's huge value involves gathering, organizing, and monetizing information through centralized web applications. The centralized Web applications have heralded some major issues, which will likely worsen shortly. This study focuses on these problems and investigates blockchain's potentials for decentralized web architecture capable of improving conventional web services' critical features, including autonomous, robust, and secure decentralized processing and traceable trustworthiness in tamper-proof transactions. Finally, we review the decentralized web architecture that circumvents the main Internet gatekeepers and controls our data back from the giant social media companies.

Approach towards qualification of TCP/IP network components of PFBR

  • Aditya Gour;Tom Mathews;R.P. Behera
    • Nuclear Engineering and Technology
    • /
    • v.54 no.11
    • /
    • pp.3975-3984
    • /
    • 2022
  • Distributed control system architecture is adopted for I&C systems of Prototype Fast Breeder Reactor, where the geographically distributed control systems are connected to centralized servers & display stations via switched Ethernet networks. TCP/IP communication plays a significant role in the successful operations of this architecture. The communication tasks at control nodes are taken care by TCP/IP offload modules; local area switched network is realized using layer-2/3 switches, which are finally connected to network interfaces of centralized servers & display stations. Safety, security, reliability, and fault tolerance of control systems used for safety-related applications of nuclear power plants is ensured by indigenous design and qualification as per guidelines laid down by regulatory authorities. In the case of commercially available components, appropriate suitability analysis is required for getting the operation clearances from regulatory authorities. This paper details the proposed approach for the suitability analysis of TCP/IP communication nodes, including control systems at the field, network switches, and servers/display stations. Development of test platform using commercially available tools and diagnostics software engineered for control nodes/display stations are described. Each TCP link behavior with impaired packets and multiple traffic loads is described, followed by benchmarking of the network switch's routing characteristics and security features.

Purchasing and Inventory Policy in a Supply Chain under the Periodic Review: A Single Manufacturer and Multiple Retailers’ Case

  • Prasertwattana, K.;Chiadamrong, N.
    • Industrial Engineering and Management Systems
    • /
    • v.3 no.1
    • /
    • pp.38-51
    • /
    • 2004
  • Over the years, most or many companies have focused their attention to the effectiveness and efficiency of their business units. As a new way of doing business, these companies have begun to realize the strategic importance of planning, controlling, and designing their own supply chain system. This paper analyzes the coordination issues in supply chains that consist of one manufacturer and multiple retailers operating under uncertain end customer demand and delivery lead-time. We use the Genetic Algorithm (GA) to determine the appropriate ordering and inventory level at which the manufacturer and multiple retailers can maximize the profit of the chain. This is performed under three controlling policies: the traditionally centralized controlling policy under the manufacturer's perspective, the entire chain’s perspective, and lastly the coordinating controlling policy with an incentive scheme. The outcome from the study reveals that the coordinating controlling policy with an incentive scheme can outperform the traditional centralized controlling policies by creating a win-win situation in which all members of the chain benefit from higher profit, thus resulting in more willingness from all members to join the chain.

Resilience Evaluation of Vehicle Driving System Depending on System Architecture (차량 구동 시스템의 구조에 따른 resilience 분석)

  • Byun, Sungil;Lee, Dongik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.5
    • /
    • pp.273-279
    • /
    • 2015
  • The vehicle has lots of embedded systems. Each of systems has its own role. In case of the vehicle, simple failure of system can be critical to driver. Therefore all of embedded system should be managed based on importance factors to be effective. In this paper, we consider the resilience as the importance factor for the driving system with ACC(Adaptive Cruise Control). We propose metrics to calculate the resilience of the embedded system. To get the resilience of system, we calculate the reliability and the resilience of nodes in the system using its failure rate. The resilience of whole system can be presented by the resilience of nodes and its weight. We calculate the resilience and compare the centralized structure and the distributed structure.

Design of Security Management System

  • Kim Seok-Soo;Soh Woo-Young
    • International Journal of Contents
    • /
    • v.1 no.2
    • /
    • pp.22-25
    • /
    • 2005
  • Enterprise security management system: Enterprise Security Management (EMS) is centralized integrated management of other kind of security solutions such as intrusion cutoff system, intrusion detection system and virtual private network. With the system, it is possible to establish security policies for entire IT system through interlocking of solutions. A security system of company network is progressing as a ESM(Enterprise Security Management) in existing security solution foundation. The establishment of the security policy is occupying very important area in ESM of the security system. We tried to analyze existing ESM system for this and designed security solution structure for enhancing the inside security. We applied implementing directly IDS system and tested. This test set the focus about inside security

  • PDF

Multiple Path-Finding Algorithm in the Centralized Traffic Information System (중앙집중형 도로교통정보시스템에서 다중경로탐색 알고리즘)

  • 김태진;한민흥
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.6
    • /
    • pp.183-194
    • /
    • 2001
  • The centralized traffic information system is to gather and analyze real-time traffic information, to receive traffic information request from user, and to send user processed traffic information such as a path finding. Position information, result of destination search, and other information. In the centralized traffic information system, a server received path-finding requests from many clients and must process clients requests in time. The algorithm of multiple path-finding is needed for a server to process clients request, effectively in time. For this reason, this paper presents a heuristic algorithm that decreases time to compute path-finding requests. This heuristic algorithm uses results of the neighbor nodes shortest path-finding that are computed periodically. Path-finding results of this multiple path finding algorithm to use results of neighbor nodes shortest path-finding are the same as a real optimal path in many cases, and are a little different from results of a real optimal path in non-optimal path. This algorithm is efficiently applied to the general topology and the hierarchical topology such as traffic network. The computation time of a path-finding request that uses results of a neighbor nodes shortest path-finding is 50 times faster than other algorithms such as one-to-one label-setting and label-correcting algorithms. Especially in non-optimal path, the average error rate is under 0.1 percent.

  • PDF

A Study on the design of operations system for managing the mobile communication network (이동통신망 관리용 운용시스템 설계에 관한 연구)

  • 하기종
    • Journal of the Korea Society for Simulation
    • /
    • v.6 no.2
    • /
    • pp.71-79
    • /
    • 1997
  • In this paper, operations system was designed for the centralization of data processing of various state information from the facilities of mobile communication network. And the system performance experimental system module was measured and analyzed from the designed experimental system module. The configuration of system design was presented with the centralized type to monite and control the facilities of mobile communication network in the central office. The communication process design of the internal system was implemented with the resource of message queue having a excellent transmission ability for processing of a great quantity of information in the inter-process communication among communication resources of UNIX system. The process with a server function from the internal communication processes was constructed with a single server or a double server according to the quantity of operations and implemented with the policy of the presented server. And then, we have measured performance elements in accordance with the change of input parameters from the designed experimental module : response time, waiting time, buffer length, the maximum quantity existing in message queue. And from these results, we have compared and analyzed the system state each server algorithm according to performance variations.

  • PDF

A Study on the Implementation of Automatic Device for CATV Network (CATV망을 위한 자동화 장치구현 사례 연구)

  • 곽윤식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.623-629
    • /
    • 2003
  • This study is about the development of a system related to the CATV network. It intends to develop an automatically centralized Headend system and a distributive system to remove the ineffectiveness of the established manual system. To achieve this goal, we took a pan of bandwidth, which is not used for the transmission of video signals in the established frequency bandwidth, and used it for the transmission and receiver of controlling signals. By this way we could design a system of transmission and receiver and a automatic distributive system. We developed an information management system for the 9600bps CATV using RS-232 of forward/backward communication and backward communication.

A study of the railway system development using Autonomous decentralized theory (자율분산 이론을 적용한 철도시스템 개발에 관한 연구)

  • Jung Tae-Un;Ahn Jin;Pack Sung-Kyu;Kim Yoo-Ho;Hong Sun-Hum;Kim Young-Hun
    • Proceedings of the KSR Conference
    • /
    • 2004.06a
    • /
    • pp.1355-1359
    • /
    • 2004
  • In this paper, We elicit the necessity of the Autonomous Decentralized Traffic Control System by analyzing problems of the Centralized Traffic Control System and present operation system. The automatic traffic control system using in large and high-density railway stations is designed and implemented on the basis of the elicited necessity in this paper. It is proposed to use broadcasting protocol for interface of stations in order to ensure autonomy. The result is that advantages of the Autonomous Decentralized Traffic Control System makes on-line expansion and maintenance available. step-by-step construction available. and reduce the area of the influences of system fault when any system fault happens.

  • PDF