• Title/Summary/Keyword: Network Overload

Search Result 238, Processing Time 0.024 seconds

Efficient Load Balancing Scheme using Resource Information in Web Server System (웹 서버 시스템에서의 자원 정보를 이용한 효율적인 부하분산 기법)

  • Chang Tae-Mu;Myung Won-Shig;Han Jun-Tak
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.151-160
    • /
    • 2005
  • The exponential growth of Web users requires the web serves with high expandability and reliability. It leads to the excessive transmission traffic and system overload problems. To solve these problems, cluster systems are widely studied. In conventional cluster systems, when the request size is large owing to such types as multimedia and CGI, the particular server load and response time tend to increase even if the overall loads are distributed evenly. In this paper, a cluster system is proposed where each Web server in the system has different contents and loads are distributed efficiently using the Web server resource information such as CPU, memory and disk utilization. Web servers having different contents are mutually connected and managed with a network file system to maintain information consistency required to support resource information updates, deletions, and additions. Load unbalance among contents group owing to distribution of contents can be alleviated by reassignment of Web servers. Using a simulation method, we showed that our method shows up to $50\%$ about average throughput and processing time improvement comparing to systems using each LC method and RR method.

Efficient Video Streaming Based on the TCP-Friendly Rate Control Scheme (TCP 친화적인 전송률 제어기법 기반의 효율적인 비디오 스트리밍)

  • Lee, Jungmin;Lee, Sunhun;Chung, Kwangsue
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.297-312
    • /
    • 2005
  • The multimedia traffic of continuous video and audio data via streaming service accounts for a significant and expanding portion of the Internet traffic. This streaming data delivery is mostly based on RTP with UDP. However, UDP does not support congestion control. For this reason, UDP causes the starvation of congestion controlled TCP traffic which reduces its bandwidth share during overload situation. In this paper, we propose a new TCP-friendly rate control scheme called 'TF-RTP(TCP-Friendly RTP)'. In the congested network state, the TF-RTP exactly estimates the competing TCP's throughput by using the modified parameters. Then, it controls the sending rate of the video streams. Therefore, the TF-RTP adjusts its sending rate to TCP-friendly and fair share with competing TCP traffics. Through the simulation, we prove that the TF-RTP correctly estimates the TCP's throughput and improves the TCP-friendliness and fairness.

P2P DICOM System using Multiagent Systems Communicating with XML Encoded ACL (XML 기반 ACL로 통신하는 멀티에이전트 시스템을 이용한 P2P DICOM 시스템)

  • Kwon, Gi-Beom;Kim, Il-Kon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.598-606
    • /
    • 2002
  • We suggest a distributed communication and management methodology using PC to PC Query multicasting strategy for efficient management of medical images produced by DICOM(Digital Imaging and Communications in Medicine) Modalities. It is absolutely necessary to reduce strict degradation of PACS system due to large sire of medical images and their very high transport rates. DICOM PC to PC Component is composed of a Service Manager to execute requested queries, a Communication Manager to take charge of file transmission, and a DICOM Manager to manage stored data and system behavior Each Manager itself is a component to search for requested file by interaction or to transmit the file to other PCs. Distributed management and transformation of medical information based on PC to PC Query multicasting methodology will enhance performance of central server and network capacity, reducing overload on both. We organize three major components for system operation. Each component is implemented as Agent. Communication between agents uses XML encoded Agent Communication Language.

A Scheduling Algorithm for Servicing (m,k)-firm-based Request Data from RSU Using in VANETs (VANET내 RSU에서 (m,k)-firm 기반 요청 데이터 처리를 위한 스케쥴링 알고리즘)

  • Nam, Jae-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2665-2670
    • /
    • 2015
  • VANET is ad-hoc network in which vehicles are treated as node and these nodes are communicating with each other as well as RSUs on the road. In VANET, scheduling is a very important issue as the request data are to be delivered to the recipient vehicle properly and accurately. It is also critical that any request data which is sent to the vehicle is received by it in the time period for which the vehicle will be in range of RSU. RSU picks the one with the highest priority to serve based on the scheduling scheme. In this paper, we propose a scheduling algorithm to select the one with the highest priority in RSU, in which an RSU can transfer the overload requests to other RSUs. We use the modified DBP scheme to calculate the priority of request data. Simulation results show that our scheme outperforms other scheduling schemes under various conditions.

A Study on Marine Application of Wireless Access in Vehicular Environment (WAVE) Communication Technology (차량용 무선통신기술(WAVE)의 해상적용에 관한 연구)

  • Kang, Won-Sik;Jeon, Soon-Bae;Kim, Young-Du
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.4
    • /
    • pp.445-450
    • /
    • 2018
  • AIS is the most important navigation equipment for the identification of other ships, etc. However, the AIS overload problem has been raised recently due to an increase in AIS equipped vessels. The government is planning to introduce the wireless LTE network at 100 km offshore as part of the SMART-Navigation project. Continuous development and dissemination of the services available through such platforms will be necessary to achieve major goals such as marine accident prevention and environmental protection. In this study, we applied a WAVE communication system, which could be the basis for the development of such services. As a result, reliable data transmission was confirmed for a range of communication of approx. 5 miles, although the service was limited to 1 km in road traffic. Therefore, it is expected that WAVE communication technology will be used to prevent marine accidents through such efforts as collision avoidance and the transfer of marine safety information between ships.

Different effects of prolonged β-adrenergic stimulation on heart and cerebral artery

  • Shin, Eunji;Ko, Kyung Soo;Rhee, Byoung Doo;Han, Jin;Kim, Nari
    • Integrative Medicine Research
    • /
    • v.3 no.4
    • /
    • pp.204-210
    • /
    • 2014
  • The aim of this review was to understand the effects of ${\beta}$-adrenergic stimulation on oxidative stress, structural remodeling, and functional alterations in the heart and cerebral artery. Diverse stimuli activate the sympathetic nervous system, leading to increased levels of catecholamines. Long-term overstimulation of the ${\beta}$-adrenergic receptor (${\beta}AR$) in response to catecholamines causes cardiovascular diseases, including cardiac hypertrophy, stroke, coronary artery disease, and heartfailure. Although catecholamines have identical sites of action in the heart and cerebral artery, the structural and functional modifications differentially activate intracellular signaling cascades. ${\beta}AR$-stimulation can increase oxidative stress in the heart and cerebral artery, but has also been shown to induce different cytoskeletal and functional modifications by modulating various components of the ${\beta}AR$ signal transduction pathways. Stimulation of ${\beta}AR$ leads to cardiac dysfunction due to an overload of intracellular $Ca^{2+}$ in cardiomyocytes. However, this stimulation induces vascular dysfunction through disruption of actin cytoskeleton in vascular smooth muscle cells. Many studies have shown that excessive concentrations of catecholamines during stressful conditions can produce coronary spasms or arrhythmias by inducing $Ca^{2+}$-handling abnormalities and impairing energy production in mitochondria, In this article, we highlight the different fates caused by excessive oxidative stress and disruptions in the cytoskeletal proteome network in the heart and the cerebral artery in responsed to prolonged ${\beta}AR$-stimulation.

Edge-Centric Metamorphic IoT Device Platform for Efficient On-Demand Hardware Replacement in Large-Scale IoT Applications (대규모 IoT 응용에 효과적인 주문형 하드웨어의 재구성을 위한 엣지 기반 변성적 IoT 디바이스 플랫폼)

  • Moon, Hyeongyun;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1688-1696
    • /
    • 2020
  • The paradigm of Internet-of-things(IoT) systems is changing from a cloud-based system to an edge-based system to solve delays caused by network congestion, server overload and security issues due to data transmission. However, edge-based IoT systems have fatal weaknesses such as lack of performance and flexibility due to various limitations. To improve performance, application-specific hardware can be implemented in the edge device, but performance cannot be improved except for specific applications due to a fixed function. This paper introduces a edge-centric metamorphic IoT(mIoT) platform that can use a variety of hardware through on-demand partial reconfiguration despite the limited hardware resources of the edge device, so we can increase the performance and flexibility of the edge device. According to the experimental results, the edge-centric mIoT platform that executes the reconfiguration algorithm at the edge was able to reduce the number of server accesses by up to 82.2% compared to previous studies in which the reconfiguration algorithm was executed on the server.

Energy-Aware Data-Preprocessing Scheme for Efficient Audio Deep Learning in Solar-Powered IoT Edge Computing Environments (태양 에너지 수집형 IoT 엣지 컴퓨팅 환경에서 효율적인 오디오 딥러닝을 위한 에너지 적응형 데이터 전처리 기법)

  • Yeontae Yoo;Dong Kun Noh
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.159-164
    • /
    • 2023
  • Solar energy harvesting IoT devices prioritize maximizing the utilization of collected energy due to the periodic recharging nature of solar energy, rather than minimizing energy consumption. Meanwhile, research on edge AI, which performs machine learning near the data source instead of the cloud, is actively conducted for reasons such as data confidentiality and privacy, response time, and cost. One such research area involves performing various audio AI applications using audio data collected from multiple IoT devices in an IoT edge computing environment. However, in most studies, IoT devices only perform sensing data transmission to the edge server, and all processes, including data preprocessing, are performed on the edge server. In this case, it not only leads to overload issues on the edge server but also causes network congestion by transmitting unnecessary data for learning. On the other way, if data preprocessing is delegated to each IoT device to address this issue, it leads to another problem of increased blackout time due to energy shortages in the devices. In this paper, we aim to alleviate the problem of increased blackout time in devices while mitigating issues in server-centric edge AI environments by determining where the data preprocessed based on the energy state of each IoT device. In the proposed method, IoT devices only perform the preprocessing process, which includes sound discrimination and noise removal, and transmit to the server if there is more energy available than the energy threshold required for the basic operation of the device.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

Efficient Access Management Scheme for Machine Type Communications in LTE-A Networks (LTE-A 네트워크 환경에서 MTC를 위한 효율적인 접근관리 기법)

  • Moon, Jihun;Lim, Yujin
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.1
    • /
    • pp.287-295
    • /
    • 2017
  • Recently, MTC (Machine Type Communication) is known as an important part to support IoT (Internet of Things) applications. MTC provides network connectivities between MTC devices without human intervention. In MTC, a large number of devices try to access over communication resource with a short period of time. Due to the limited communication resource, resource contention becomes severe and it brings about access failures of devices. To solve the problem, it needs to regulate device accesses. In this paper, we present an efficient access management scheme. We measure the number of devices which try to access in a certain time period and predict the change of the number of devices in the next time period. Using the predicted change, we control the number of devices which try to access. To verify our scheme, we conduct experiments in terms of success probability, failure probability, collision probability and access delay.