• Title/Summary/Keyword: Dynamic Work Manager

Search Result 9, Processing Time 0.024 seconds

A Dynamic Work Manager for Heterogeneous Cluster Systems (DWM: 이기종 클러스터 시스템의 동적 자원 관리자)

  • Park, Jong-Hyun;Kim, Jun-Seong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.56-62
    • /
    • 2009
  • Inexpensive high performance computer systems combined with high speed networks and machine independent communication libraries have made cluster computing a viable option for parallel applications. In a heterogeneous cluster environment, efficient resource management is critically important since the computing power of the individual computer system is a significant performance factor when executing applications in parallel. This paper presents a dynamic task manager, called DWM (dynamic work manager). It makes a heterogeneous cluster system fully utilize the different computing power of its individual computer system. We measure the performance of DWM in a heterogeneous cluster environment with several kernel-level benchmark programs and their programming complexity quantitatively. From the experiments, we found that DWM provides competitive performance with a notable reduction in programming effort.

A Study On Management Protocol For Distributed Systems Management (분산시스템관리를 위한 관리 프로토콜에 관한연구)

  • 박승섭
    • Journal of Korean Port Research
    • /
    • v.13 no.2
    • /
    • pp.289-302
    • /
    • 1999
  • As the size and complexity of network increase Distributed System Management (DSM) will be significant issue within information network in order to increase the high reliability and to improve the flexibility of network management. The OSI management model has several problems. The key problems are that it does not fully address the problem of how to develop communication protocol in support of DSM and how to classify the management connection criteria. In this paper to solve first problem described above this paper propose the connectionless CMIP to accomplish for effectively managing the distributed management managing systems to handle the dynamic informations. To work out second problem we introduce the connection criteria in the hierarchy of management system and finally evaluate the efficiency of a suggested protocol during cooperative negotiation among the managing system.

  • PDF

A Study On Management Porgocol For Distributed Systems Management (분산시스템관리를 위한 관리 프로토콜에 관한 연구)

  • 박승섭
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 1999.10a
    • /
    • pp.163-175
    • /
    • 1999
  • As the size and complexity of network increase, Distributed Systems Management (DSM) will be significant issue within information network in order to increase the high reliability and to improve the flexibility of network management. The OSI management model has several problems. The key problems are that it does not fully address the problems of how to develop communication protocol in support of DSM, and how to classify the management connection criteria. In this paper, to solve first problem described above, this paper propose the connectionless CMIP(Common Management Information Protocol) to accomplish for effectively managing the distributed management system, and indicate its efficiency; this protocol is available to negotiate among the managing systems, handle the dynamic information. To work out second problem, we introduce the connection criteria in the hierarchy of management systems, and finally evaluate the efficiency of a suggested protocol during cooperative negotiation among the managing systems.

A Dynamic Error Manager for A Multimedia Collaboration Work based on IP-USN (IP-USN 기반 멀티미디어 공동 작업을 위한 동적 오류 관리기)

  • Ko, Eung-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.155-156
    • /
    • 2009
  • 본 논문에서는 오류 상호 인지 및 제어 기능이 있는 IP-USN 기반의 멀티미디어 공동 작업 환경에 대하여 기술한다. 동적 오류 관리를 위해서 상호 인지가 필요하다. 상호 인지란 상호 작업 이해, 참여자 관계 설정 등 결합이라는 구현 기술을 말한다. 인지의 구현 방법에는 파일 공유, 윈도우 복사, 윈도우 오버레이, 또는 윈도우 공유 등이 있다. 윈도우 오버레이 기능에 세션 제어, 발언권 제어 등을 추가한 윈도우 공유 방법을 기술한다.

Development of Production Information System for Real-time Operation Brass-Pipe Production Machine (동파이프 생산 설비가동의 실시간 생산정보시스템 개발)

  • 정영득;김영균;박주식;강경식
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.27 no.1
    • /
    • pp.1-8
    • /
    • 2004
  • This study intend to make easy modification, even if there is a new job or structure change, by modularizing program and computerize and automation of production control management used in CIM. under the condition where manager control production on the job-site, for increasing connection with other operation and management on the computer by monitoring center computer, recognizing information by computer is needed, it is possible by converting transaction. So this study goal is to make delivery control and order control fast and accurate by finding dynamic history of machine and production information in enterprise without input production and quality information by themselves with quality information system. So production increase and quality improvement are possible by diminishing manager's and producer's work with the result of the study combining POP and CIM, after that, in e-business and m-business period that every enterprise must pass, customer satisfaction and sales promotion are possible with employee's computerizing minds. these study result also can knowledge process condition with theoretical class and have a power in finding a solution with foundation of theoretical knowledge.

A Study on the Dynamic Encryption Manager for Improved Timeliness in Secure Real-Time Database Systems (보안 실시간 데이터베이스 시스템에서 시간성 향상을 위한 동적 암호화 관리자에 관한 연구)

  • Lee, Soon-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.210-216
    • /
    • 2005
  • In many real-time applications, security is another important requirement, since the secure real time database system maintains sensitive information to be shared by multiple users with different levels of security clearance or to be attacked by hackers with ill will. Encryption policies are necessary for the security of secure real-time database systems in addition to the existing security methods, too. However, there has not been much work for the encryption policies in secure real-time database systems, although sensitive information must be safeguarded in real-time systems as well. In this paper, we propose a encryption manager for the purpose of solving the encryption policies of the secure real-time database systems. What is important in the encryption policies of secure real-time database systems is security and timeliness. A significant feature of the proposed encryption manager is the ability to dynamically adapt a encryption algorithm that consider transaction deadline and security level.

Design and Implementation of Road Construction Risk Management System based on LPWA and Bluetooth Beacon

  • Lee, Seung-Soo;Kim, Yun-cheol;Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.145-151
    • /
    • 2018
  • While commercialization of IoT technologies in the safety management sector is being promoted in terms of industrial safety of large indoor businesses, implementing a system for risk management of small outdoor work sites with frequent site movements is not actively implemented. In this paper, we propose an efficient dynamic workload balancing strategy which combined low-power, wide-bandwidth (LPWA) communication and low-power Bluetooth (BLE) communication technologies to support customized risk management alarm systems for each individual (driver/operator/manager). This study was designed to enable long-term low-power collection and transmission of traffic information in outdoor environment, as well as to implement an integrated real-time safety management system that notifies a whole field worker who does not carry a separate smart device in advance. Performance assessments of the system, including risk alerts to drivers and workers via Bluetooth communication, the speed at which critical text messages are received, and the operation of warning/lighting lamps are all well suited to field application.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

An open Scheduling Framework for QoS resource management in the Internet of Things

  • Jing, Weipeng;Miao, Qiucheng;Chen, Guangsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4103-4121
    • /
    • 2018
  • Quality of Service (QoS) awareness is recognized as a key point for the success of Internet of Things (IOT).Realizing the full potential of the Internet of Things requires, a real-time task scheduling algorithm must be designed to meet the QoS need. In order to schedule tasks with diverse QoS requirements in cloud environment efficiently, we propose a task scheduling strategy based on dynamic priority and load balancing (DPLB) in this paper. The dynamic priority consisted of task value density and the urgency of the task execution, the priority is increased over time to insure that each task can be implemented in time. The scheduling decision variable is composed of time attractiveness considered earliest completion time (ECT) and load brightness considered load status information which by obtain from each virtual machine by topic-based publish/subscribe mechanism. Then sorting tasks by priority and first schedule the task with highest priority to the virtual machine in feasible VMs group which satisfy the QoS requirements of task with maximal. Finally, after this patch tasks are scheduled over, the task migration manager will start work to reduce the load balancing degree.The experimental results show that, compared with the Min-Min, Max-Min, WRR, GAs, and HBB-LB algorithm, the DPLB is more effective, it reduces the Makespan, balances the load of VMs, augments the success completed ratio of tasks before deadline and raises the profit of cloud service per second.