• Title/Summary/Keyword: Resource management scheme

Search Result 313, Processing Time 0.023 seconds

Policy-based Resource Management for QoS Support in Cellular Networks (셀룰라 시스템에서 서비스품질(QoS)을 보장하기 위한 정책기반 자원관리 기법 연구)

  • Choi Sung-Gu;Jun Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.344-348
    • /
    • 2006
  • This paper proposes a QoS policy for cellular networks which support the policy based network management scheme. The policy exploits the existing underlying DiffServ mechanism and the priority-based packet scheduler in order to provide the packets with different handling priority depending on their belonging traffic classes. The simulation results reveals the effectiveness of the proposed policy under the network congestion; it shows that the goodput of the real-time traffic is not affected at all in spite of the surge of the non real-time traffic.

An Efficient Management Scheme of Hierarchical P2P System based on Network Distance (계층적 P2P 시스템의 효율적 관리를 위한 네트워크 거리 기반 운영 기법)

  • Hong, Chung-Pyo;Kim, Cheong-Ghil;Kim, Shin-Dug
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.10 no.4
    • /
    • pp.121-127
    • /
    • 2011
  • Many peer-to-peer (p2p) systems have been studied in distributed, ubiquitous computing environments. Distributed hash table (DHT)-based p2p systems can improve load-balancing even though locality utilization and user mobility are not guaranteed. We propose a mobile locality-based hierarchical p2p overlay network (MLH-Net) to address locality problems without any other services. MLH-Net utilizes mobility features in a mobile environment. MLH-Net is constructed as two layers, an upper layer formed with super-nodes and a lower layer formed with normal-nodes. Because super-nodes can share advertisements, we can guarantee physical locality utilization between a requestor and a target during any discovery process. To overcome a node failure, we propose a simple recovery mechanism. The simulation results demonstrate that MLH-Net can decrease discovery routing hops by 15% compared with JXTA and 66% compared with Chord.

  • PDF

The SWG Component Technology Classification Scheme Researchthrough the Technology Trend Analysis

  • Son, Hong Min;Hu, Jong Wan
    • Journal of Korea Water Resources Association
    • /
    • v.48 no.11
    • /
    • pp.945-955
    • /
    • 2015
  • The technology of the SWG (Smart Water Grid) as one of most important national projects results in significant assignment that is closely associated with systematic management and effective operation. The individual component technics are required to establish directory and classification for the purpose of effectively managing their information related to research and development (R&D). The national science technology (S&T) standard classification tree which results in the representative example has been established with an intention to manage R&D information, human resource, and budget. It has been also revised every five years and then used in the various fields related to the evaluation, administration, and prediction of the national R&D projects. In addition, the standard classification system for R&D projects has been widely used in the UNESCO (United Nations Educational, Scientific and Cultural Organization) and EU (European Union) since the Frascati Manual was established in the Organization for Economic Cooperation and Development (OECD). Therefore, it is necessary for SWG techniques to develop the standard S&T classification tree for research management and evaluation. For this, it is essential to draw the core techniques for the SWG, which are incorporated with IT (Information Technology), NT (Nano Technology), and BT (Biology Technology).

An Optimal Design Guide for Campus wireless LAN by Evaluating Performance Measurements in IEEE 802.11n-based Networks (IEEE 802.11n 기반에서 성능측정을 통한 최적의 캠퍼스 무선 랜 설계)

  • Kim, Bang Ryong;Lee, Kil Hung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.9-23
    • /
    • 2013
  • In recent days, there are many researches of wireless LAN services as the communication environment of wireless LAN are so improved that a lot of services are available in wireless environments. The frequency of the wireless LAN is a general resource that can be used to everyone without any permission. Many technologies using this ISM (Industry Science Medical) frequency band are developed fast and widely. But, as many devices use the same frequency band at th same time, the service quality is degraded and the speed of the service rate id degraded by the result of the interference. For overcome this problem, we must provide the new technology of the mobile devices and a new cell design scheme for obtaining maximum throughput that considering the wireless environments effectively. In this paper, we explain the main technology at the IEEE 802.11n environments and proposes the optimal cell design and reference model for gaining maximum performance to many mobile devices at the same time by investigating real environment testing results.

Exploration of Fit Reviews and its Impact on Ratings of Rental Dresses

  • Shin, Eonyou;McKinney, Ellen
    • Fashion, Industry and Education
    • /
    • v.15 no.2
    • /
    • pp.1-10
    • /
    • 2017
  • The purposes of this study were to explore (1) how fit reviews differ among height groups and (2) how overall numerical ratings differ depending on height groups and ifferent types of fit reviews. Content analysis was used to analyze systematically sampled online consumer reviews (OCRs) of formalwear dresses rented online. In part 1, 201 OCRs were analyzed to develop the coding scheme, which included three aspects of fit (physical, aesthetic, and functional), valence (negative, neutral, positive), and overall numerical rating. In part 2, 600 OCRs were coded and statistically analyzed. Differences in frequency were not found among height groups for any types of mentions (negative, neutral, and positive) in terms of the three aspects of fit in the OCRs. Differences in overall mean ratings were not found among height groups. Interestingly, valence of each aspect of fit reviews affected mean numeric ratings. This study is new in examining relationships among textual information (i.e., fit reviews), numerical information (i.e., numerical rating), and reviewer's characteristic (i.e., height). The results of this study offered practical implications for etailers and marketers that they should pay attention to the three aspects of fit reviews and monitor garments with negative fit evaluations for lower ratings. They may attempt to increase ratings by providing customers recommendations to get a better fit.

An Adaptive Batching Scheduling Policy for Efficient User Services (효율적인 사용자 서비스를 위한 적응적 배칭 스케줄링 정책)

  • Choe, Seong-Uk;Kim, Jong-Gyeong;Park, Seung-Gyu;Choe, Gyeong-Hui;Kim, Dong-Yun;Choe, Deok-Gyu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.2
    • /
    • pp.44-53
    • /
    • 2000
  • The waiting delays of users are inevitable in this policy since the services are not taken immediately upon requests but upon every scheduling points. An inefficient management of such delays makes an unfair service to users and increases the possibility of higher reneging rates. This paper proposes an adaptive batch scheduling scheme which improves the average waiting time of users requests and reduces the starvation problem of users requesting less popular movies. The proposed scheme selects dynamically multiple videos in given intervals based on the service patterns which reflect the popularity distribution(Zipf-distribution) and resource utilizations. Experimental results of simulations show that the proposed scheme improves about 20-30 percentage of average waiting time and reduces significantly the starving requesters comparing with those of conventional methods such as FCFS and MQL.

  • PDF

The Impact of Corporate's Attributes on Corporate Pension Insurance Products & Type Preference (한국 기업 속성에 따른 기업연금보험 상품 및 제도유형 선호도 분석)

  • Joo, Heon
    • The Journal of Industrial Distribution & Business
    • /
    • v.8 no.2
    • /
    • pp.21-31
    • /
    • 2017
  • Purpose - The total amount of advanced Corporate Pension Insurance products exceed 148 trillion Korean Won at the end of 2016. For a firm with over 300 employees, when a bill on compulsion of introduction of Corporate Pension Insurance products, currently pending in court, is passed, Corporate Pension shall be an essential. The findings of the paper will provide a guideline for understanding on firm's attributes and its effects towards introduction of Corporate Pension Insurance products. Research design, data, and methodology - The data were collected using statistics of employer panel survey from Korea Labour Institute in 2013. The study analyses a sample survey on 1,775 outstanding enterprises and their HR department among whole corporations in Korea. For analysis of data, empirical testing by Logistic Regression was utilized. Results - As an outcome of empirical testing, variables on share of regular employees and the aged employees in over 50's generates a significant statistical meaning. It eventually gives a great impact on purchase of Corporate Pension scheme. Moreover, variables on corporate financial statement, current sales, current net income, total amount of the debts, labor cost per person also has a vital influence on introduction of Corporate Pension Insurance products. Lastly, variables on firm's labor relationship have no effect except for the execution or non-execution of HR consulting. Meanwhile, Variables affecting a choice on pension schemes types among firm's attributes are a share of regular employees, current net income, execution or non-execution of HR consulting etc. These variables represents a statistical implication. According to their each features, they prefer DB or DC plan. Conclusions - Introduction of corporate pension scheme is apposite to contemporary Korea's situation entering a hyper-aging society and firms with a high share of regular employees, the weight of aging, current sales, current net income and labor cost per person are exceedingly active in purchasing Corporate Pension Insurance products. However, after the introduction of corporate pension scheme, firms which has an implementation of consultation on human resource management, flexible benefits plan, job security and welfare system prefer DC plan whereas from financial perspective firms with high net income prefer DB plan.

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

A Cooperative Energy-efficient Scheduling Scheme for Heterogeneous Wireless Networks (이기종 무선망에서 에너지 효율 개선을 위한 망간 협력 기반 스케쥴링 기법)

  • Kim, Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.3-8
    • /
    • 2016
  • Wireless networks have evolved to the appearance of heterogeneous wireless networks(HetNet), where various networks provide data services with various data rates and coverage. One of technical issues for HetNet is efficient utilization of radio resources for system performance enhancement. For the next generation wireless networks, energy saving has become one of key performance indices, so energy-efficient resource management schemes for HetNet need to be developed. This paper addresses an energy-efficient scheduling for HetNet in order to improve the energy efficiency while maintaining similar system throughput as existing scheme, for which an energy-efficient scheduling that energy efficiency factor is included. Simulation results show that the proposed scheme achieves the reduction of energy consumption while admitting limited ragne of throughput degradation in comparison with the conventional proportional fair scheduling.

Performance Analysis of the IEEE 802.11 Broadcast Scheme in a Wireless Data Network (무선 데이터 망에서 IEEE 802.11 브로드캐스트 기법의 성능 분석)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.56-63
    • /
    • 2009
  • The IEEE 802.11 standard has been used for wireless data networks such as wireless LAN, ad-hoc network, and vehicular ad-hoc network. Thus, the performance analysis of the IEEE 802.11 specification has been one of the hottest issues for network optimization and resource management. Most of the analysis studies were performed in a data plane of the IEEE 802.11 unicast. However, IEEE 802.11 broadcast is widely used for topology management, path management, and data dissemination. Thus, it is important to understand the performance of the broadcast scheme for the design of efficient wireless data network. In this contort, we analyze the IEEE 802.11 broadcast scheme in terms of the broadcast frame reception probability according to the distance from a sending node. Unlike the other works, our analysis framework includes not only the system parameters of the IEEE 802.11 specification such as transmission range, data rate, minimum contention window but also the networking environments such as the number of nodes, network load, and the radio propagation environments. Therefore, our analysis framework is expected to be used for the development of protocols and algorithms in a dynamic wireless data network.