• Title/Summary/Keyword: Replication protocol

Search Result 31, Processing Time 0.027 seconds

Connection Frequency Buffer Aware Routing Protocol for Delay Tolerant Network

  • Ayub, Qaisar;Mohd Zahid, M. Soperi;Abdullah, Abdul Hanan;Rashid, Sulma
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.649-657
    • /
    • 2013
  • DTN flooding based routing protocol replicate the message copy to increase the delivery like hood that overloads the network resources. The probabilistic routing protocols reduce replication cost by forwarding the message to a node that holds high predictability value to meet its destination. However, the network traffic converges to high probable nodes and produce congestion that triggers the drop of previously stored messages. In this paper, we have proposed a routing protocol called as Connection frequency Buffer Aware Routing Protocol (CFBARP) that uses an adaptive method to maintain the information about the available buffer space at the receiver before message transmission. Furthermore, a frequency based method has been employed to determine the connection recurrence among nodes. The proposed strategy has performed well in terms of reducing message drop, message relay while increases the delivery probability.

Computer-based screening for novel inhibitors of human topoisomerase I with FlexiDock docking protocol

  • Choi, In-Hee;Kim, Choon-Mi
    • Proceedings of the PSK Conference
    • /
    • 2002.10a
    • /
    • pp.315.1-315.1
    • /
    • 2002
  • DNA topoisomerases I (topo I) and II are essential enzymes that relax DNA supercoiling and relieve torsional strain during DNA processing. including replication. transcription. and repair. Topo I relaxes DNA by cleaving one strand of DNA by attacking a backbone phosphale with a catalytic lyrosine (Tyr723. human topo I). This enzyme has recently been investigated as a new target for antineoplastic drugs. Inhibitors to the enzyme intercalate between the DNA base pairs. interfering religation of cleaved DNA, therefore inhibit the activity of topo I. (omitted)

  • PDF

A Dependability Analysis of the Group Management Protocol for Intrusion Tolerance of Essential Service (필수 서비스의 침입감내를 위한 그룹관리 프로토콜의 신뢰성 분석)

  • Kim, Hyung-Jong;Lee, Tai-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.1
    • /
    • pp.59-68
    • /
    • 2007
  • IT (Intrusion Tolerant) technology is for guaranteeing the availability of service for certain amount time against the attacks which couldn't be prevented by the currently deployed information security countermeasures. IT (Intrusion Tolerant) technology mainly makes use of the replication of service and system fur enhancing availability, and voting scheme and GMP (Croup Management Protocol) are used for the correctness of service. This paper presents a scheme to analyze dependability of IT (Intrusion Tolerant) technology through probabilistic and simulation method. Using suggested analysis scheme, we can analyze the robustness and make a sensible trade-offs in of IT (Intrusion Tolerant) technology.

  • PDF

PosCFS+: A Self-Managed File Service in Personal Area Network

  • Lee, Woo-Joong;Kim, Shi-Ne;Park, Chan-Ik
    • ETRI Journal
    • /
    • v.29 no.3
    • /
    • pp.281-291
    • /
    • 2007
  • Wearable computers consisting of various small devices such as smart phones, digital cameras, MP3 players and specialized I/O devices in personal area networks will play an important role in future ubiquitous computing. In this environment, accessing user data is quite complex due to the dynamic and heterogeneous characteristics of the underlying networks. Moreover, since the amount of user data increases rapidly, automatic data backup management is also critical. To overcome these challenges, several studies have been conducted including our previously proposed file service system, PosCFS, which could be adapted to the requirements with a virtualization technique allowing per-user global namespace for managing and accessing data stored on physical storage spaces detected in PAN. In this paper, we present a smart file service framework, PosCFS+ which is an improved and extended version of our previous work. Performance improvement is made possible by redesigning the metadata management scheme based on database and keywords rather than ontology. In addition, the automatic data replication management is newly designed based on the OSD protocol.

  • PDF

A Study on Polycarbonate Microfabrication Using a Pneumatic Hot Press (공압 핫프레스를 이용한 마이크로 폴리카보네이트 성형에 관한 연구)

  • Yeo, Changyeong;Park, Taehyun
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.20 no.4
    • /
    • pp.106-112
    • /
    • 2021
  • Thermoplastic microfluidic devices are used in BioMEMS for medical and biotechnology applications, such as gene extraction, DNA analysis, and virus detection. In this research, a simple fabrication protocol with a commercially available pneumatic hot press is proposed and demonstrated for polycarbonate microfluidic devices. Microfluidic channels with a width of 200 ㎛ and a height of 10 ㎛ were designed and machined onto a brass plate as a mold insert using a CNC milling machine. The resulting microfluidic channels on the mold insert were assessed and found to have an actual width of 198 ㎛ and a height of 10 ± 0.25 ㎛. The microfluidic channels were replicated on a polycarbonate sheet using the proposed replication technique at 146℃ for 20 minutes under a constant load of 2400 kgf. The devices were then naturally cooled to 100℃ while maintaining the same pressure. It was found that the microchannels were successfully replicated in the polycarbonate, with a width of 198 ㎛ and a height of 10.07 ㎛. The proposed replication technique thus offers the rapid mass production of high-quality microfluidic devices at a low cost with a process that, unlike conventional photolithography systems, does not require expensive equipment.

Multiple Alternating Immunizations with DNA Vaccine and Replication-incompetent Adenovirus Expressing gB of Pseudorabies Virus Protect Animals Against Lethal Virus Challenge

  • Kim, Seon-Ju;Kim, Hye-Kyung;Han, Young-Woo;Aleyas, Abi G.;George, Junu A.;Yoon, Hyun-A;Yoo, Dong-Jin;Kim, Koan-Hoi;Eo, Seong-Kug
    • Journal of Microbiology and Biotechnology
    • /
    • v.18 no.7
    • /
    • pp.1326-1334
    • /
    • 2008
  • The prime-boost vaccination with DNA vaccine and recombinant viral vector has emerged as an effective prophylactic strategy to control infectious diseases. Here, we compared the protective immunities induced by multiple alternating immunizations with DNA vaccine (pCIgB) and replication-incompetent adenovirus (Ad-gB) expressing glycoprotein gB of pseudorabies virus (PrV). The platform of pCIgB-prime and Ad-gB-boost induced the most effective immune responses and provided protection against virulent PrV infection. However, priming with pCIgB prior to vaccinating animals by the DNA vaccine-prime and Ad-boost protocol provided neither effective immune responses nor protection against PrV. Similarly, boosting with Ad-gB following immunization with DNA vaccine-prime and Ad-boost showed no significant responses. Moreover, whereas the administration of Ad-gB for primary immunization induced Th2-type-biased immunity, priming with pCIgB induced Th1-type-biased immunity, as judged by the production of PrV-specific IgG isotypes and cytokine IFN-$\gamma$. These results indicate that the order and injection frequency of vaccine vehicles used for heterologous prime-boost vaccination affect the magnitude and nature of the immunity. Therefore, our demonstration implies that the prime-boost protocol should be carefully considered and selected to induce the desired immune responses.

Mitigating the Impact of Mobility on H.264 Real-Time Video Streams Using Multiple Paths

  • Calafate, Carlos T.;Malumbres, Manuel P.;Manzoni, Pietro
    • Journal of Communications and Networks
    • /
    • v.6 no.4
    • /
    • pp.387-396
    • /
    • 2004
  • One of the main problems associated with MANETs is that mobility and the associated route discovery and maintenance procedures of reactive routing protocols cause severe interruptions on real-time video streams. Some of these interruptions are too large to be concealed using any sort of video technology, resulting in communications breaks unpleasant for the final end user. We present a solution for enhanced video transmission that increases route stability by using an improved route discovery process based on the DSR routing protocol, along with traffic splitting algorithms and a preventive route discovery mechanism. We also present some video adaptative mechanisms that improve the overall performance of multipath routing in terms of video data replication and video packet splitting strategies. Combining our proposals, we achieve up to 97% less interruptions on communication with high mobility and over 1.2 dB of improvements in terms of video distortion.

Update Propagation Protocol Using Tree of Replicated Data Items in Partially Replicated Databases

  • Bae, Misook;Hwang, Buhyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1859-1862
    • /
    • 2002
  • The replication of data is used to increase its availability, improve the performance of a system, and advance the fault-tolerance of a system. In this paper, it is required for the information about the location of a primary site of the replicas of each data item. The replicas of each data item are hierarchically organized to a tree based on the fact that the root is the primary replica in partially replicated databases. It eliminates useless propagation since the propagation can be done to only sites having replicas following the hierarchy of data. And our algorithm schedules transactions so that the execution order of updates at each primary site is identical at all sites by using timestamp. Using our algorithm, the consistent data are supplied and the performance of read-only transactions can be improved by using tree structure of replicas of each data item.

  • PDF

Test Sequence Generation Using Multiple Unique State Signature(MUSS)

  • Jung, Yoon-Hee;Hong, Beom-Kee
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.6
    • /
    • pp.43-47
    • /
    • 1997
  • A procedure presented in this paper generates test sequences to check the conformity of an implementation with a protocol specification, which is modeled as a deterministic finite state machine (FSM). Given a FSM, a common procedure of test sequence generation, first, constructs a directed graph which edges include the state check after each transition, and produces a symmetric graph G* from and, finally, finds a Euler tour of G*. We propose a technique to determine a minimum-cost tour of the transition graph of the FSM. The proposed technique using Multiple Unique State Signature (MUSS) solves an open issue that one MUIO sequence assignment may lead to two more edges of unit cost being replicated to from G* while an optimal assignment may lead to the replication of a single edge of high cost. In this paper, randomly generated FSMs have been studied as test cases. The result shows that the proposed technique saves the cost 4∼28% and 2∼21% over the previous approach using MUIO and MUSP, respectively.

  • PDF

An Enhanced Searching Algorithm over Unstructured Mobile P2P Overlay Networks

  • Shah, Babar;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.3
    • /
    • pp.173-178
    • /
    • 2013
  • To discover objects of interest in unstructured peer-to-peer networks, the peers rely on flooding query messages which create incredible network traffic. This article evaluates the performance of an unstructured Gnutella-like protocol over mobile ad-hoc networks and proposes modifications to improve its performance. This paper offers an enhanced mechanism for an unstructured Gnutella-like network with improved peer features to better meet the mobility requirement of ad-hoc networks. The proposed system introduces a novel caching optimization technique and enhanced ultrapeer selection scheme to make communication more efficient between peers and ultrapeers. The paper also describes an enhanced query mechanism for efficient searching by applying multiple walker random walks with a jump and replication technique. According to the simulation results, the proposed system yields better performance than Gnutella, XL-Gnutella, and random walk in terms of the query success rate, query response time, network load, and overhead.