• Title/Summary/Keyword: Computing Resource

Search Result 852, Processing Time 0.025 seconds

Construction of Open Resource Description Archive in PC Grid Computing Environments (PC 그리드 컴퓨팅 환경에서 오픈 자원 명세 아카이브 구축)

  • Yoon, Jun-Weon;Choi, Jang-Won;Park, Chan-Yeol;Lee, Pill-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.477-481
    • /
    • 2007
  • PC 그리드 컴퓨팅 환경은 수많은 사용자들이 인터넷을 통해 사용하고 있는 데스크톱 PC의 유휴 자원을 제공함으로써, 고성능 컴퓨팅 파워를 창출하고자 하는 분산 컴퓨팅 패러다임이다. 이렇게 창출된 고성능 자원을 이용하여 대용량 응용 계산을 수행함으로서 고가의 슈퍼컴퓨터에서 수행하던 응용을 대체할 수 있는 새로운 수단으로 연구되어지고 있다. 본 논문에서는 인터넷을 통해 PC의 유휴 자원을 제공하는 기판, 단체, 팀과 같은 자원제공자 그룹들이 제공할 수 있는 자원에 대한 명세를 오픈 아카이브에 저장함으로써 응용수행자가 쉽게 수행하고자 하는 응용에 맞는 자원을 선택할 수 있는 오픈 자원 명세 아카이브(ORDA:Open Resource Description Archive)를 제안한다. 이는 응용수행자로 하여금 응용수행자가 수행하고자 하는 응용에 맞는 자원을 능동적인 선택할 수 있는 PC 그리드 컴퓨팅 환경을 제공한다.

  • PDF

Magic Square : Resource lookup protocol considering computing power of node (Magic Square : 노드의 능력을 고려한 자원 탐색 프로토콜)

  • 박선미;정일동;손영성;김경석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.163-165
    • /
    • 2003
  • P2P 시스템의 주요 이슈는 자원 (resource) 을 효율적으로 저장하고 찾는 것이다. 자원 탐색 프로토콜은 초기의 Napster, Gnutella와 같은 형태에서 발전하여, 현재는 분산 해시 테이블 (Distributed Hash Table을 사용한 형태로 발전하고 있다. 본 논문에서는 분산 해시 테이블을 사용한 P2P 프로토콜인 Magic Square를 제안한다. Magic Square에 참여하는 칵 노드는 양방향 스킬리스트로 구성된 지역 라우팅 테이블과 임의의 노드로 구성된 전역 라우팅 테이블을 가진다. 지역 라우팅 테이블은 각 노드의 능력을 고려하여 구성된다. 스킵리스트를 사용하였기 때문에 탐색과 노드의 추가라 삭제 과정이 간단하며. P2P 네트워크가 자주 바뀌어도 큰 영향을 받지 않는다.

  • PDF

SLA-Aware Resource Management for Cloud based Multimedia Service

  • Hasan, Md. Sabbir;Islam, Md. Motaharul;Park, Jun Young;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.171-174
    • /
    • 2013
  • Virtualization technology opened a new era in the field of Data intensive, Grid and Cloud Computing. Today's Data centers are smarter than ever leveraging the Virtualization technology. In response to that, Dynamic consolidations of Virtual Machines (VMs) allow efficient resource management by live migration of VMs in the hosts. Moreover, each client typically has a service level agreement (SLA), leads to stipulation in dealing with energy-performance trade-off as aggressive consolidation may lead to performance degradation beyond the negotiation. In this paper we propose a Cloud Based CDN approach for allocation of VM that aims to maximize the client-level SLA. Our experiment result demonstrates significant enhancement of SLA at certain level.

Reserved Virtual Resource Management for Cloud Computing (클라우드 컴퓨팅을 위한 예약 기반 가상 자원 관리 기법)

  • Kang, Dong-Ki;Kim, Seong-Hwan;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.125-126
    • /
    • 2013
  • 클라우드 컴퓨팅 환경에서, 모든 IT 자원은 가상화된 자원(Virtualized Resource)의 형태로 클라우드 서비스 사용자에게 제공되고 사용자는 자신이 점유한 시간만큼만 자원 사용 비용을 클라우드 서비스 제공자에게 지불하면 된다. 서비스 제공자는 서비스 사용자가 처리하고자 하는 어플리케이션의 특성을 고려하여 온디맨드(On-demand) 및 예약형(Reserved) 가상 자원 가격 정책을 제공한다. 따라서 서비스 사용자는 서비스 제공자의 제안 가격 정책을 기반으로 어플리케이션의 처리 예상 시간 및 지불 비용을 고려하여 효율적인 자원 요청 계획을 수립해야 한다. 본 논문에서는 클라우드 브로커링 시스템(Cloud Brokering System)을 통해 자원 할당 정책을 수행하여 연동된 다중 사용자에게 비용 효율적인 자원을 제공하는 구조 및 프로세스를 소개한다.

A Light-weight, Adaptive, Reliable Processing Integrity Audit for e-Science Grid (e-Science 그리드를 위한 가볍고, 적응성있고, 신뢰성있는 처리 무결성 감사)

  • Jung, Im-Young;Jung, Eun-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.181-188
    • /
    • 2008
  • E-Science Grid is designed to cope with computation-intensive tasks and to manage a huge volume of science data efficiently. However, certain tasks may involve more than one grid can offer in computation capability or incur a long wait time on other tasks. Resource sharing among Grids can solve this problem with proper processing-integrity check via audit. Due to their computing-intensive nature, the processing time of e-Science tasks tends to be long. This potential long wait before an audit failure encourages earlier audit mechanism during execution in order both to prevent resource waste and to detect any problem fast. In this paper, we propose a Light-weight, Adaptive and Reliable Audit, LARA, of processing Integrity for e-Science applications. With the LARA scheme. researchers can verify their processing earlier and fast.

Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks

  • Aldabbagh, Ghadah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.152-161
    • /
    • 2021
  • The paper focuses on Device-to-device (D2D) Architectures evaluation frameworks. D2D communication and discovery can improve spectrum usage efficiency and optimize the tradeoffs between throughput and energy consumption. The target operation modes involve both indirect communication between two nodes via a base station or the direct communication among proximal nodes, enabling use cases that can support communications out of cellular coverage, as well as low end-end delay requirements. The paper will present the architectural evolution of D2D networks within 3GPP standardization and will highlight key network functionalities and signaling protocols. It will also identify key analytical and simulation models that can be used to assess the performance and energy efficiency of resource allocation strategies, and it will present a suitable cross-layer integrated framework.

A Development of Novel Attack Detection Methods using Virtual Honeynet (Virtual Honeynet을 이용한 신종공격 탐지기술 개발)

  • Kang, Dae-Kwon;Euom, Ieck-Chae;Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.406-411
    • /
    • 2010
  • A honeynet is a closely monitored computing resource that we want to be probed, attacked or compromised. More precisely, a honeypot is "an information system resource whose value lies in unauthorized or illicit use of that resource The value of honeynet is weighed by the information that can be obtained from it. but It's very difficult to deploy Honeynet in Real World, So I focused on Virtual Honeynet. The strength of virtual honeynet is scalability and ease of maintenance. It is inexpensive to deploy and accessible to almost everyone. Compared with physical honeypots, this approach is more lightweight. Instead of deploying a physical computer system that acts as a honeypot, we can also deploy one physical computer that hosts several virtual machines that act as honeypots.

Advances in Cyber-Physical Systems Research

  • Wan, Jiafu;Yan, Hehua;Suo, Hui;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1891-1908
    • /
    • 2011
  • Cyber-physical systems (CPSs) are an emerging discipline that involves engineered computing and communicating systems interfacing the physical world. The widespread applications of CPSs still face enormous challenges because of the lack of theoretical foundations. In this technical survey, we review state-of-the-art design techniques from various angles. The aim of this work is to provide a better understanding of this emerging multidisciplinary methodology. The features of CPSs are described, and the research progress is analyzed using the following aspects: energy management, network security, data transmission and management, model-based design, control technique, and system resource allocation. We focus on CPS resource optimization, and propose a system performance optimization model with resource constraints. In addition, some classic applications (e.g., integrating intelligent road with unmanned vehicle) are provided to show that the prospects of CPSs are promising. Furthermore, research challenges and suggestions for future work are outlined in brief.

A Critique of Designing Resource Adequacy Markets to Meet Loss of Load Probability Criterion

  • Yoon, Yong T.;Felder, Frank A.
    • KIEE International Transactions on Power Engineering
    • /
    • v.3A no.1
    • /
    • pp.35-41
    • /
    • 2003
  • To ensure resource adequacy in restructured electricity markets, policymakers have adopted installed capacity (ICAP) markets in some regions of the United States. These markets ensure that adequate generation exists to satisfy regional Loss of Load Probability(LOLP) criterion. Since the incentives created through ICAP mechanisms directly impact new generation and transmission investment decisions we examine one important factor that links ICAP markets with LOLP calculations;, determining the amount of ICAP credit assigned to particular generation units. First, we review and critique the literature on electric power systems' market failure resulting from demand exceeding supply. We then summarize the method of computing (the LOLP) as a means of assessing reliability and relate this method to ICAP markets. We find that only the expected value of available generation is used In current ICAP markets while ignoring the second and higher order moments, which tends to mis-state the ICAP value of a specific resource. We then consider a proposal whose purpose is to avoid this ICAP assignment issue by switching from ICAP obligations to options. We find that such a proposal may fail to not provide the benefits claimed and suffers from several practical difficulties. Finally, we conclude with some policy recommendations and areas for future research.

Multipath-Based Congestion Control Scheme in Wireless Sensor Networks (무선 센서 네트워크에서의 멀티패스 기반 혼잡 제어 기법)

  • Lee, Dong-Ho;Chung, Kwang-Sue
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.452-456
    • /
    • 2010
  • In wireless sensor networks, due to the many-to-one convergence of upstream traffic, congestion more probably appears. Network congestion can be alleviated by controlling incoming traffic, but using traffic control can violate fidelity level required by applications. In this paper, we propose multipath-based congestion control scheme alleviating congestion by resource control for wireless sensor networks. When congestion occurs, the multipath-based congestion control scheme distributes network traffic through multiple alternate paths, and consequently, the scheme enables to detour in the congested spot and increase resource utilization. Our results show that our multipath-based congestion control scheme can satisfy fidelity level required by applications and alleviate congestion effectively.