• Title/Summary/Keyword: Computing Resource

Search Result 856, Processing Time 0.025 seconds

Small-cell Resource Partitioning Allocation for Machine-Type Communications in 5G HetNets (5G 이기종 네트워크 환경에서 머신타입통신을 위한 스몰셀 자원 분리 할당 방법)

  • Ilhak Ban;Se-Jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.1-7
    • /
    • 2023
  • This paper proposes a small cell resource partitioning allocation method to solve interference to machine type communication devices (MTCD) and improve performance in 5G heterogeneous networks (HetNet) where macro base station (MBS) and many small cell base stations (SBS) are overlaid. In the 5G HetNet, since various types of MTCDs generate data traffic, the load on the MBS increases. Therefore, in order to reduce the MBS load, a cell range expansion (CRE) method is applied in which a bias value is added to the received signal strength from the SBS and MTCDs satisfying the condition is connected to the SBS. More MTCDs connecting to the SBS through the CRE will reduce the load on the MBS, but performance of MTCDs will degrade due to interference, so a method to solve this problem is needed. The proposed small cell resource partitioning allocation method allocates resources with less interference from the MBS to mitigate interference of MTCDs newly added in the SBS with CRE, and improve the overall MTCD performace using separating resources according to the performance of existing MTCDs in the SBS. Through simulation results, the proposed small cell resource partitioning allocation method shows performance improvement of 21% and 126% in MTCDs capacity connected to MBS and SBS respectively, compared to the existing resource allocation methods.

Performance Analysis of Fractional Frequency Reuse Scheme for Enterprise Femtocell Networks (기업형 펨토셀 네트워크에서 부분 주파수 재사용 방법의 성능분석)

  • Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.11-17
    • /
    • 2018
  • In this paper, we propose a novel frequency reuse method using the fractional frequency reuse (FFR) for enterprise femtocell networks (EFNs) in which a lot of femtocell base stations (fBSs) are deployed in a buinding, e.g., business companies, department stores, etc, and evaluate the system performance for the downlink of EFNs. First, we introduce the concept of the split reuse method to allocate the frequency bandwidth with considering the interference between the macrocell and femtocell. Then, we propose the resource allocation with the FFR for fBSs of EFNs to reduce the interference and increase the system capacity. Through simulations, we show that the proposed FFR method outperforms a traditional resource allocation method with frequency reuse factor 4 in terms of the mean fUE capacity, total EFN capacity, and outage probability.

A computation model for Resource-based Lifting loads of the lift-cars for super high-rise buildings (초고층 건축물 리프트카 양중계획수립을 위한 자원기반의 양중부하 산정 모형)

  • Han, Choong-Hee;Lee, Jun-Bok;Won, Seo-Kyung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.5
    • /
    • pp.135-143
    • /
    • 2012
  • Constructing super-tall buildings is significantly different from constructing general ones in every technological and managerial aspects. Especially lift-car operations planning and management is one of core parts among various management techniques required during the course of the whole construction process of the super-tall buildings because vertical movements of physical resources enormously affect the efficiency of the construction processes. However, discrepancy between lifting plans and actual lifting operations causes serious efficiency problems. As an effort to solve the problem, this research suggests an improved method of estimating resource-based lifting load. The computing model developed as a result of this research facilitates more accurate computation of the total operation time and the maximum lifting capacity of the lift-cars. Further, this research can be developed as a decision support system for the total lift-car operations management.

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

Ontology based reasoning for resource sharing in ubiquitous smart space (유비쿼터스 지능 공간에서 자원 공유를 위한 온톨로지기반 추론)

  • Kang, Sun-Hee;Park, Jong-Hyun;Kim, Young-Kuk;Kang, Ji-Hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.489-493
    • /
    • 2008
  • One of the main goals of ubiquitous computing is to share a variety of resources existing to smart space and compose an efficient services by reasoning the most user-suitable resources, However, each applications describe the resources and services in different expression ways and these heterogeneous expression ways make it difficult for sharing and reasoning of the resources. Therefore, it is necessary to unify the information for resources sharing and ontology is one of the solution for the unification. In this paper, we define the possible services in the ubiquitous smart space and its ontology. Also, we propose a resource ontology to represent the usable resources in the space. our ontologies are used to reason resource set for composing user-suitable service in the ubiquitous smart space.

  • PDF

Analysis of the Impact of Host Resource Exhaustion Attacks in a Container Environment (컨테이너 환경에서의 호스트 자원 고갈 공격 영향 분석)

  • Jun-hee Lee;Jae-hyun Nam;Jin-woo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.87-97
    • /
    • 2023
  • Containers are an emerging virtualization technology that can build an isolated environment more lightweight and faster than existing virtual machines. For that reason, many organizations have recently adopted them for their services. Yet, the container architecture has also exposed many security problems since all containers share the same OS kernel. In this work, we focus on the fact that an attacker can abuse host resources to make them unavailable to benign containers-also known as host resource exhaustion attacks. Then, we analyze the impact of host resource exhaustion attacks through real attack scenarios exhausting critical host resources, such as CPU, memory, disk space, process ID, and sockets in Docker, the most popular container platform. We propose five attack scenarios performed in several different host environments and container images. The result shows that three of them put other containers in denial of service.

A Study on the Clustering method for Analysis of Zeus Botnet Attack Types in the Cloud Environment (클라우드 환경에서 제우스 Botnet 공격 유형 분석을 위한 클러스터링 방안 연구)

  • Bae, Won-il;Choi, Suk-June;Kim, Seong-Jin;Kim, Hyeong-Cheon;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.11-20
    • /
    • 2017
  • Recently, developments in the various fields of cloud computing technology has been utilized. Whereas the demand for cloud computing services is increasing, security threats are also increasing in the cloud computing environments. Especially, in case when the hosts interconnected in the cloud environments are infected and propagated through the attacks by malware. It can have an effect on the resource of other hosts and other security threats such as personal information can be spreaded and data deletion. Therefore, the study of malware analysis to respond these security threats has been proceeded actively. This paper proposes a type of attack clustering method of Zeus botnet using the k-means clustering algorithm for malware analysis that occurs in the cloud environments. By clustering the malicious activity by a type of the Zeus botnet occurred in the cloud environments. it is possible to determine whether it is a malware or not. In the future, it sets a goal of responding to an attack of the new type of Zeus botnet that may occur in the cloud environments.

A Digital Twin Software Development Framework based on Computing Load Estimation DNN Model (컴퓨팅 부하 예측 DNN 모델 기반 디지털 트윈 소프트웨어 개발 프레임워크)

  • Kim, Dongyeon;Yun, Seongjin;Kim, Won-Tae
    • Journal of Broadcast Engineering
    • /
    • v.26 no.4
    • /
    • pp.368-376
    • /
    • 2021
  • Artificial intelligence clouds help to efficiently develop the autonomous things integrating artificial intelligence technologies and control technologies by sharing the learned models and providing the execution environments. The existing autonomous things development technologies only take into account for the accuracy of artificial intelligence models at the cost of the increment of the complexity of the models including the raise up of the number of the hidden layers and the kernels, and they consequently require a large amount of computation. Since resource-constrained computing environments, could not provide sufficient computing resources for the complex models, they make the autonomous things violate time criticality. In this paper, we propose a digital twin software development framework that selects artificial intelligence models optimized for the computing environments. The proposed framework uses a load estimation DNN model to select the optimal model for the specific computing environments by predicting the load of the artificial intelligence models with digital twin data so that the proposed framework develops the control software. The proposed load estimation DNN model shows up to 20% of error rate compared to the formula-based load estimation scheme by means of the representative CNN models based experiments.

Security-Enhanced Local Process Execution Scheme in Cloud Computing Environments (클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행 기술)

  • Kim, Tae-Hyoung;Kim, In-Hyuk;Kim, Jung-Han;Min, Chang-Woo;Kim, Jee-Hong;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.69-79
    • /
    • 2010
  • In the current cloud environments, the applications are executed on the remote cloud server, and they also utilize computing resources of the remote cloud server such as physical memory and CPU. Therefore, if remote server is exposed to security threat, every applications in remote server can be victim by several security-attacks. Especially, despite many advantages, both individuals and businesses often have trouble to start the cloud services according to the malicious administrator of the cloud server. We propose a security-enhanced local process executing scheme resolving vulnerability of current cloud computing environments. Since secret data is stored in the local, we can protect secret data from security threats of the cloud server. By utilizing computing resource of local computer instead of remote server, high-secure processes can be set free from vulnerability of remote server.

The SAR Chart Viewer design and Implementation in mobile web (모바일 웹에서의 SAR Chart Viewer 설계 및 구현)

  • Lim, Il-Kwon;Kim, Young-Hyuk;Lee, Jae-Gwang;Lee, Jae-Pil;Jang, Haeng-Jin;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2097-2104
    • /
    • 2013
  • Scientific and technological research data is increasing exponentially and, Kisti(Korea Institute of Science and Technology Information) built and supported GSDC(Global Science experimental Data hub Center) depending on the needs processing large data computing and storage devices. Mobile web standards-based the MUPS was built for global community and services of gsdc to spreading mobile devices rapidly. And for analyze Operational status and system resources of GSDC at n this paper researched and implemented system resource monitor method of gsdc to mobile web environment, in this paper researched and implemented system resource monitor method of gsdc to mobile web environment. Research support system of GSDC operated by scientific linux. Sysstat resource monitoring tools create a daily report through sar(system analysis report), after sadc(system activity data collector) collected system resource utilization information. In this paper, sar reports designed and implemented in mobile web to can visualize in a mobile environment. We do not depend specific OS by implementation of the mobile web. So we are available in variety mobile OS. And through provided visual graph, this system can monitor easily and more conveniently then the existing system.