• Title/Summary/Keyword: Centralized system

Search Result 698, Processing Time 0.028 seconds

A Study on Performance Evaluation Factors of Permissioned Blockchain Consensus Algorithm (허가형 블록체인 합의알고리즘의 성능평가항목 연구)

  • Min, Youn A
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.3-8
    • /
    • 2020
  • Blockchain can enhance data transparency and security through decentralized data management that is out of the centralized system. permissioned blockchain of the blockchain platform, only trust-based authorized nodes can participate in the distributed network. Considering the characteristics of the permissioned blockchain, it is necessary to consider the network communication speed, transaction finality agreement, and stability as a condition for selecting the consensus algorithm. The consensus algorithms of the permissioned blockchain environment are diverse such as PoA, PBFT, Raft, etc., but there are no various evaluation factors for selecting consensus algorithms. In this paper, various performance evaluation factors are proposed to analyze the characteristics of each consensus algorithm of the permissioned blockchain and to select an efficient consensus algorithm considering the characteristics of the user environment that composes the network. The proposed performance evaluation factor can consider the network speed, stability, and consensus of the finality agreement between nodes under the premise of trust. Through this, a more efficient blockchain network environment can be constructed.

An Efficient Network Management Architecture Usign Mobile Agents on DPE (분산처리환경에서 이동에이전트를 이용한 효율적인 망 관리 구조)

  • 이정환;홍충선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6C
    • /
    • pp.535-543
    • /
    • 2002
  • In order to overcome disadvantages of existing centralized network management systems that use simple objects, dynamic object platforms are proposed as alternative systems. So the distributed network management systems are implemented using various distributed platform such as CORBA and Java-RMI. Subsequently mobile agent-based platforms are proposed. The mobile agent-based platform can additionally provide flexibility and scalability to network management system that CORBA or Java-RMI based platforms do not support. In this paper, we address an architecture to solve the problem of the occurrence of additional traffic by using mobile agent and to save resources of network element. Our proposal in this paper is an efficient network management architecture using motile agents. And we make use of mobile agents for minimizing of traffic that can happen when mobile agents moves. Also we design agents using information architecture of TMN for efficient resource management of network element and improvement of operation performance.

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

A Vertical Partitioning Algorithm based on Fuzzy Graph (퍼지 그래프 기반의 수직 분할 알고리즘)

  • Son, Jin-Hyun;Choi, Kyung-Hoon;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.315-323
    • /
    • 2001
  • The concept of vertical partitioning has been discussed so far in an objective of improving the performance of query execution and system throughput. It can be applied to the areas where the match between data and queries affects performance, which includes partitioning of individual files in centralized environments, data distribution in distributed databases, dividing data among different levels of memory hierarchies, and so on. In general, a vertical partitioning algorithm should support n-ary partitioning as well as a globally optimal solution for the generation of all meaningful fragments. Most previous methods, however, have some limitations to support both of them efficiently. Because the vertical partitioning problem basically includes the fuzziness property, the proper management is required for the fuzziness problem. In this paper we propose an efficient vertical $\alpha$-partitioning algorithm which is based on the fuzzy theory. The method can not only generate all meaningful fragments but also support n-ary partitioning without any complex mathematical computations.

  • PDF

A Multi-hop Relaying Transmission Scheme in Cognitive Radio System (Cognitive Radio 시스템 환경에서의 다중 홉 릴레이 전송 기법)

  • Lee, Dong-Kyu;Shin, Jung-Chae;Lim, Eun-Taek;Lee, Hyun-Woo;Cho, Ho-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9A
    • /
    • pp.853-866
    • /
    • 2008
  • In this paper, a multi-hop relaying transmission scheme is analyzed regarding its feasibility and potentiality in the IEEE 802.22-based cognitive radio (CR) environment. Shortly, basic design issues are addressed such as relay station (RS) deployment and a frame structure of physical channel to escape inter-hop interference. This paper mainly develops a radio resource management scheme based on spectrum sensing results aggregated from CR secondary nodes and improves the opportunistic spectrum sharing efficiency. In particular, a decision rule about a channel availability is made using a distributed sensing method. Subsequently, spectrum allocation and routing path decision procedures are proposed to establish a link from source to destination with a hop-by-hop manner. Simulation results show that the proposed multi-hop relaying scheme is substantially profitable in CR environments if the number of hops and RS deployment are designed in such a way that the spectrum sharing gain is larger than spectrum division loss which is inherently induced in multi-hop relaying systems.

Change Impact Analysis for Object-Oriented softwares in the distributed environment (분산 객체지향 소프트웨어를 위한 수정 영향 분석)

  • Kim, Kyung-Hee;Park, Jai-Nyun;Yoon, Yong-Ik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1280-1290
    • /
    • 1999
  • Applying the change impact analysis to the distributed environment is not straightforward since it is based on the centralized system environment. In this paper, we investigate the change impact analysis of object-oriented shoftwares in the distributed environment. We first, categories the types of changes common in object-oriented software into three sets: data, method, and class level changes. We, then, analyze the impact of each set of changes and represent it in the form of a DPDG. A DPDG is a graph showing relationship of object oriented softwares - with data elements. classes, design documents, servers - in the distributed environment. DPDG searches element of software to retest when the software is changed. Thus, DPDG saves effort of software to retest. In this paper, We propose the table of firewall for retest elements that be discovered by DPDG and implement the table of firewall. The table of firewall is used VIST that we design a software testing tool. The VIST utilizes the minimized firewall, then saves efforts and costs of retesting for distributed object-oriented software.

  • PDF

Design of Power Supply for Green PC using Low Voltage High Current LLC Resonant Converter (저전압 대전류 LLC 공진형 컨버터를 이용한 그린 PC용 전원공급장치 설계)

  • Yoo, Young-Do;Kim, In-Dong;Nho, Eui-Cheol;Ryu, Myung-Hyo;Baek, Ju-Won
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.19 no.3
    • /
    • pp.211-219
    • /
    • 2014
  • This paper proposes a low voltage high current LLC resonant converter for Green PC. Green PC is composed of a lot of blade PCs, and it is a centralized system to manage them in computer center. Green PC should require that its power supplies have several characteristics such as low output voltage, high output current, and high power conversion efficiency. Conventional PSFB (Phase Shift Full Bridge) converter is usually used as DC/DC converter for computer power supply because it has high power conversion efficiency thanks to ZVS (Zero Voltage Switching) operation under middle and high load conditions. However, this converter has some problems such as large switching noise and limitation of ZVS operation under light load condition. In order to improve the performance of power supply for Green PC, a new power supply using popular high efficiency LLC resonant converter for low voltage and high current application is proposed in this paper. The proposed power supply has ZVS capability over the entire load range, thus resulting in good efficiency and high switching frequency. Experimental results verify the performance of the proposed power supply for Green PC using 2[kW] (19[V], 105[A]) rated prototype converter.

Analysis of Decentralized Energy using WADE Economic Model (WADE Economic Model에 의한 분산형전원 분석)

  • Kim, Yong-Ha;Woo, Sung-Min;Lee, Kwang-Sung
    • Journal of Energy Engineering
    • /
    • v.17 no.2
    • /
    • pp.88-99
    • /
    • 2008
  • This paper analyzed quantitative effect on sorts of scenario for DE (Decentralized Energy) in the Korean Power System using WADE Economic Model. WADE Economic Model calculated shortage of power sales from the existing technologies above all. and it construct a new type of technologies according to sorts of scenario for DE. generating capacity and electricity generation is computed from this process. From now on can assess the side of environment meant $CO_2$, $NO_x$, $SO_x$, PM10 and cost meant electric retail cost that composed of construction, T&D, fuel, maintenance and environment.

Hydraulic Evaluation and Performance of On-Site Sanitation Systems in Central Thailand

  • Koottatep, Thammarat;Eamrat, Rawintra;Pussayanavin, Tatchai;Polprasert, Chongrak
    • Environmental Engineering Research
    • /
    • v.19 no.3
    • /
    • pp.269-274
    • /
    • 2014
  • On-site sanitation systems are typically installed to treat grey and toilet wastewaters in areas without sewer and centralized treatment systems. It is well known that, due to inappropriate design and operation, treatment performance of these systems in developing countries is not satisfactory in the removal of pathogens and organic matters. This research aimed to investigate the hydraulic conditions occurring in some on-site sanitation systems and the effects of hydraulic retention times (HRTs) on the system performance. The experiments were conducted with a laboratory-scale septic tank (40L in size) and an actual septic tank (600L in size), to test the hydraulic conditions by using tracer study with HRTs varying at 12, 24 and 48 hr. The experimental results showed the dispersion numbers to be in the range of 0.017-0.320 and the short-circuit ratios in the range of 0.014-0.031, indicating the reactors having a high level of sort-circuiting and approaching complete-mix conditions. The removal efficiency of $BOD_5$ was found to be 67% and the $k_{30}$ values for $BOD_5$ was $2.04day^{-1}$. A modified complete-mix model based on the relationship between $BOD_5$ removal efficiencies and HRTs was developed and validated with actual-scale septic tank data having a correlation coefficient ($R^2$) of 0.90. Therefore, to better protect our environment and minimizing health risks, new generation toilets should be developed that could minimize short-circuiting and improving treatment performance.

Analysis of Automatic Neighbor Relation Technology in Self Organization Networks of LTE (LTE 네트워크에서 SON ANR 기술 분석)

  • Ahn, Ho-Jun;Yang, Mo-Chan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.893-900
    • /
    • 2019
  • This paper deals with the analysis of SON (Self Organization Network) technology in LTE networks. SON is a unique LTE feature compared to previous cellular systems UMTS and GSM, and is a cost-effective tool for achieving the best performance in a changing environment. In addition, SON has the function of automating the settings of the network, enabling centralized planning and reducing the need for manual tasks. SON is largely divided into three categories: Self-Configuration, Self-Optimization, and Self-Healing. Each large category has a detailed description, and all the technologies in each category come together to complete the technology called SON. In this paper, we analyzed intensively about ANR among the techniques of Self-Configuration in each of the three categories.