• Title/Summary/Keyword: Over-Provisioning

Search Result 47, Processing Time 0.02 seconds

Dry Season Evaporation From Pine Forest Stand In The Middle Mountains Of Nepal

  • Gnawali, Kapil;Jun, KyungSoo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.330-330
    • /
    • 2016
  • The quantification of dry season evaporation in regions, where the magnitude of dry season flows is key to the regional water supply, is essential for good water management. Also, tree transpiration has a significant role in the water balance of a catchment whenever it is tree populated, especially in water limited environments. Such is the case in the Middle Mountains of Nepal where dry season flows play a significant role in downstream water provisioning and their proper functioning is key to the welfare of millions of people. This research seeks to study the transpiration of a pine forest stand in the Jikhu Khola Watershed in the Middle Mountains of Nepal. To the author's knowledge, no single study has been made so far to estimate the dry season evaporation from the planted forest stand in the Middle Mountains of Nepal. The study was carried out in planted pine forest embedded within the Jikhu Khola Catchment. Field campaigns of sap flow measurements were carried out from September, 2010 to February, 2011 in the selected plot of 15*15m dimension, to characterize dry season evaporation. This was done by measuring sap fluxes and sapwood areas over the six trees of different Diameter at Breast Height (DBH) classes. The sap flux was assessed using Granier's thermal dissipation probe (TDP) technique while sapwood area was determined using several incremental core(s) taken with a Pressler borer and immediately dyeing with methyl orange for estimating the actual depth of sapwood area. Transpiration of the plot was estimated by considering the contribution of each tree class. For this purpose, sap flux density, sapwood area and the proportion of total canopy area were determined for each tree class of the selected plot. From these data, hourly and diurnal transpiration rates for the plot were calculated for experimental period. Finally, Cienciala model was parameterized using the data recorded by the ADAS and other terrain data collected in the field. The calibrated model allowed the extrapolation of Sap flux density (v) over a six month period, from September 2010 to February 2011. The model given sap flux density was validated with the measured sap flux density from Grainier method.

  • PDF

Semantic Cloud Resource Recommendation Using Cluster Analysis in Hybrid Cloud Computing Environment (군집분석을 이용한 하이브리드 클라우드 컴퓨팅 환경에서의 시맨틱 클라우드 자원 추천 서비스 기법)

  • Ahn, Younsun;Kim, Yoonhee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.283-288
    • /
    • 2015
  • Scientists gain benefits from on-demand scalable resource provisioning, and various computing environments by using cloud computing resources for their applications. However, many cloud computing service providers offer their cloud resources according to their own policies. The descriptions of resource specification are diverse among vendors. Subsequently, it becomes difficult to find suitable cloud resources according to the characteristics of an application. Due to limited understanding of resource availability, scientists tend to choose resources used in previous experiments or over-performed resources without considering the characteristics of their applications. The need for standardized notations on diverse cloud resources without the constraints of complicated specification given by providers leads to active studies on intercloud to support interoperability in hybrid cloud environments. However, projects related to intercloud studies are limited as they are short of expertise in application characteristics. We define an intercloud resource classification and propose semantic resource recommendation based on statistical analysis to provide semantic cloud resource services for an application in hybrid cloud computing environments. The scheme proves benefits on resource availability and cost-efficiency with choosing semantically similar cloud resources using cluster analysis while considering application characteristics.

An Efficient VM-Level Scaling Scheme in an IaaS Cloud Computing System: A Queueing Theory Approach

  • Lee, Doo Ho
    • International Journal of Contents
    • /
    • v.13 no.2
    • /
    • pp.29-34
    • /
    • 2017
  • Cloud computing is becoming an effective and efficient way of computing resources and computing service integration. Through centralized management of resources and services, cloud computing delivers hosted services over the internet, such that access to shared hardware, software, applications, information, and all resources is elastically provided to the consumer on-demand. The main enabling technology for cloud computing is virtualization. Virtualization software creates a temporarily simulated or extended version of computing and network resources. The objectives of virtualization are as follows: first, to fully utilize the shared resources by applying partitioning and time-sharing; second, to centralize resource management; third, to enhance cloud data center agility and provide the required scalability and elasticity for on-demand capabilities; fourth, to improve testing and running software diagnostics on different operating platforms; and fifth, to improve the portability of applications and workload migration capabilities. One of the key features of cloud computing is elasticity. It enables users to create and remove virtual computing resources dynamically according to the changing demand, but it is not easy to make a decision regarding the right amount of resources. Indeed, proper provisioning of the resources to applications is an important issue in IaaS cloud computing. Most web applications encounter large and fluctuating task requests. In predictable situations, the resources can be provisioned in advance through capacity planning techniques. But in case of unplanned and spike requests, it would be desirable to automatically scale the resources, called auto-scaling, which adjusts the resources allocated to applications based on its need at any given time. This would free the user from the burden of deciding how many resources are necessary each time. In this work, we propose an analytical and efficient VM-level scaling scheme by modeling each VM in a data center as an M/M/1 processor sharing queue. Our proposed VM-level scaling scheme is validated via a numerical experiment.

Efficient Virtual Machine Resource Management for Media Cloud Computing

  • Hassan, Mohammad Mehedi;Song, Biao;Almogren, Ahmad;Hossain, M. Shamim;Alamri, Atif;Alnuem, Mohammed;Monowar, Muhammad Mostafa;Hossain, M. Anwar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1567-1587
    • /
    • 2014
  • Virtual Machine (VM) resource management is crucial to satisfy the Quality of Service (QoS) demands of various multimedia services in a media cloud platform. To this end, this paper presents a VM resource allocation model that dynamically and optimally utilizes VM resources to satisfy QoS requirements of media-rich cloud services or applications. It additionally maintains high system utilization by avoiding the over-provisioning of VM resources to services or applications. The objective is to 1) minimize the number of physical machines for cost reduction and energy saving; 2) control the processing delay of media services to improve response time; and 3) achieve load balancing or overall utilization of physical resources. The proposed VM allocation is mapped into the multidimensional bin-packing problem, which is NP-complete. To solve this problem, we have designed a Mixed Integer Linear Programming (MILP) model, as well as heuristics for quantitatively optimizing the VM allocation. The simulation results show that our scheme outperforms the existing VM allocation schemes in a media cloud environment, in terms of cost reduction, response time reduction and QoS guarantee.

A MAC Enhancement Technique for Quality of Service Guarantee in Wireless Local Area Networks (무선 네트워크에서 QoS 보장을 위한 MAC 향상 기법)

  • Lee, Dong-Geon;Kim, Byoung-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1446-1459
    • /
    • 2008
  • In an infrastructure-based wireless network, an access point is used for all communications among mobile devices. However, when a mobile device moves into a dead Bone, a connectivity disruption between the mobile device and the access point occurs. Such connectivity disruption consequently leads to another connectivity disruption between the mobile device moving toward the dead zone and other wireless-enabled devices located within the area of the infrastructure-based wireless network. To cope with the connectivity disruption in the infrastructure-based wireless network the ad hoc network that dynamically forms a network without any preexisting communication infrastructure needs to be set up to provide seamless connections among mobile devices. In this paper, we propose the DNSQ-MAC (Dynamic Network State aware QoS-Medium Access Control) technique that meets the deadlines of MAC frames forwarded over hop-by-hop multipaths and guarantees the QoS performance of an ad hoc-based wireless network. Mobile devices incorporating the DNSQ-MAC technique are capable of adjusting to the new dynamic network status in order to enhance the QoS performance in the ad hoc-based wireless network. A case study which exploits the Qualnet simulator shows that the proposed DNSQ-MAC technique can guarantee the deadlines of MAC frames forwarded over hop-by-hop multipaths and enhance the QoS performance of various routing protocols and packet schedulers running on the network layer above the MAC layer.

  • PDF

Provisioning Anonymous Communication in Ad Hoc Networks (Ad Hoc 네트워크상에서 익명성을 보장하는 방법에 관한 연구)

  • Kang, Seung-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.77-85
    • /
    • 2006
  • The cost of downloading content from the Internet may be costly for mobile device users using its 3G connection, because the 3G connection cost to download data from the Internet is a function of the amount of data downloaded. This paper introduces an approach in which mobile devices, called peers, form an ad hoc network and share their downloaded content with others. As an example, spectators may want to collect/share information about players and game records in a stadium. In an art gallery, visitors may want to retrieve some background information about the displayed work from the nearby ad hoc network. In an outdoor class, a teacher may download today's topic files from the Internet, and all students may share the content with minimal or no cost paid. This is possible if mobile device has both a 3G interface and a wireless LAN interface. If the peers want to improve privacy md discourage traffic analysis when sharing content, this paper describes a low-delay anonymous connection between the sending peer and the receiving peer using two additional peers. Simulation results show that the transmission time overhead of the anonymous connection may increase 50% or less as the number of peers increase or the peers are scattered over the larger area.

  • PDF

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.