• Title/Summary/Keyword: and Access Grid

Search Result 190, Processing Time 0.03 seconds

Minimizing the Risk of an Open Computing Environment Using the MAD Portfolio Optimization (최적포트폴리오 기법을 이용한 개방형 전산 환경의 안정성 확보에 관한 연구)

  • Kim, Hak-Jin;Park, Ji-Hyoun
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.15-31
    • /
    • 2009
  • The next generation IT environment is expected to be an open computing environment based on Grid computing technologies, which allow users to access to any type of computing resources through networks. The open computing environment has benefits in aspects of resource utilization, collaboration, flexibility and cost reduction. Due to the variation in performance of open computing resources, however, resource allocation simply based on users' budget and time constraints often fails to meet the Service Level Agreement(SLA). This paper proposes the Mean-Absolute Deviation(MAD) portfolio optimization approach, in which service brokers consider the uncertainty of performance of resources, and compose resource portfolios that minimize the uncertainty. In order to investigate the effect of this approach, we simulate an open computing environment with varying uncertainty levels, users' constraints, and brokers' optimization strategies. The simulation result concludes threefolds. First, the MAD portfolio optimization improves the success ratio of delivering the required performance to users. Second, the success ratio depends on the accuracy in predicting the variability of performance. Thirdly, the measured variability can also help service brokers expand their service to cost-critical users by discounting the access cost of open computing resources.

  • PDF

Sensor Data Abstraction and Utilization in Environmental Monitoring System based on Geosensor Network (지리 센서 네트워크 기반 환경 모니터링 시스템에서의 센서 데이터 추상화 및 활용)

  • Jung, Young-Jin
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.177-184
    • /
    • 2009
  • Environmental monitoring systems are widely developed for analyzing environment and understanding an ecosystem according to the advance of wireless communication and various sensing techniques. To extract useful information, it requires high cost for processing a query, because these systems have to handle huge volume of raw sensor data which is transmitted from a wide area in environmental monitoring applications. Besides, it is also hard to answer an user defined query which requests to check current and near future condition. In this paper, we propose the monitoring system structure for processing a user defined query for environmental monitoring. It also describes the utilization of sensor data filtering and abstraction model. The designed abstraction model which is based on the slope grid in GIS supports fast data access and update. To analyze condition, the extracted data from abstraction model of each sensor type is combined in a query processor. It is useful to provide meaningful information to users.

A Secure Routing Scheme for Wireless Sensor Network with a Mobile Sink (이동 싱크를 가진 무선 센서 네트워크의 안전한 라우팅 기법)

  • Kim Taekvun;Kim Sangjin;Lee Ik-Seob;Yoo Dongyoung;Oh Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.53-64
    • /
    • 2005
  • Previous secure routing protocols for wireless sensor networks assume that a sink is static. In many cases, however, a sink operated by man or vehicle is moving. A mobile sink creates a lot of technical problems such as reconfiguration of routing path exposure of sink location. and selection of secure access point node, which are not considered by many previous researches. In this paper, we propose a new secure routing scheme for solving such problems using hi-directional hash chain and delegation nodes of grid structure. This scheme provides a secure routing path and prevents attacker from recognizing the location of a mobile sink in sensor networks. This new method reduces the resource requirements compared to the cashed routing schemes. Simulation results also show that the system is secure and efficient enough.

Implementation and Performance Evaluation of Migration Agent for Seamless Virtual Environment System in Grid Computing Network (그리드 컴퓨팅 네트워크에서 Seamless 가상 환경 시스템 구축을 위한 마이그레이션 에이전트 구현 및 성능 평가)

  • Won, Dong Hyun;An, Dong-Un
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.11
    • /
    • pp.269-274
    • /
    • 2018
  • MMORPG is a role-playing game that tens of thousands of people access it online at the same time. Users connect to the server through the game client and play with their own characters. If the user moves to a management area of another server beyond the area managed by the server, the user information must be transmitted to the server to be moved. In an actual game, the user is required to synchronize the established and the transferred information. In this paper, we propose a migration agent server in the virtual systems. We implement a seamless virtual server using the grid method to experiment with seamless server architecture for virtual systems. We propose a method to minimize the delay and equalize the load when the user moves to another server region in the virtual environment. Migration Agent acts as a cache server to reduce response time, the response time was reduced by 50% in the case of 70,000 people.

A Specification for Restricted Delegation to suitable on Distributed Computing (분산 컴퓨팅에 적합한 제한적인 위임 명세)

  • Eun Seung-Hee;Kim Yong-Min;Noh Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1015-1024
    • /
    • 2005
  • A delegation of privileges is one of important processes that empower authority to relevant node to process job that user wants in large-stale distributed environment such as Grid Computing. However, existing delegation methods do not give suitable privilege about Job, and do not atomize range of delegation and exists delegation of access privilege for only resources itself that is not delegation about executing process of job itself. Also, they do not apply about process that needs delegation before and after. execution of job such as reservation of system resources or host access before and after execution. Therefore, this paper proposes a method and specification for restricted delegation in distributed environment. Proposed method separates delegation for job side and privilege side, and express specification and procedure of delegation using XML schema and UML and present restricted delegation scenario in distributed computing environment.

A Study of an Mobile Agent System Based on Hybrid P2P (변형 P2P 기반 시스템을 활용한 이동 에이전트 시스템에 관한 연구)

  • Lee, Seok-Hee;Yang, Il-Deung;Kim, Seong-Ryeol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.5
    • /
    • pp.19-28
    • /
    • 2012
  • Recently a grid and cloud computing collaboration have become a social issue. These collaborative network system, the P2P system based on this system. Distingui shed from the client/server systems, P2P systems in order to exchange information, its purpose and functions are divided according to the morphological Category. In accordance with the purposes and functions of information and data retrieval, remote program control and integration services for the offers. Most P2P systems client/server scalability, and management takes the form, but to overcome the disadvantages in terms of applying the mixed-mode system is increasing. And recently the distributed computing aspects of the service to users in order to provide suitable to accommodate the diverse needs of various types of mobile agent technology is needed. In this paper, as required by the mobile agent access to a remote resource access control and agent for the execution and management capabilities and improve the reliability of the mobile agent system designed to suggest.

Diffusion Analysis of the High Temperature and Salinity Water by the 3-D Baroclinic Flow Model (3-D 밀도류모델을 이용한 고온${\cdot}$고염수의 확산해석)

  • Kim, Jong-In;Kim, Hyeon-Ju
    • Journal of Ocean Engineering and Technology
    • /
    • v.13 no.3B
    • /
    • pp.3-13
    • /
    • 1999
  • The diffusion characteristics of the high temperature and salinity water discharged in Chinhae Bay under BMP(Barge-Mounted Plants) desalination processes were simulated to access environmental impact. The 3-D baroclinic flow model is formulated by integrating the basic equations with respect to each control volume and by transforming them into a finite difference form using the space-staggered grid system. With a 3-D baroclinic flow model, the tide-induced and density-induced current was computed and confirmed by comparing with observed data. From the results of numerical experiment, it is expected that the maximum diffusion lengths of the high temperature and salinity which increase $0.6^{circ}C$ and 0.2 after discharging are 1 km and 3.5km, respectively. It may be expected that the discharge has an effect on surrounding area of discharge, but not an effect on whole area of Chinhae Bay.

  • PDF

Adaptive Deadline-aware Scheme (ADAS) for Data Migration between Cloud and Fog Layers

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1002-1015
    • /
    • 2018
  • The advent of Internet of Things (IoT) and the evident inadequacy of Cloud networks concerning management of numerous end nodes have brought about a shift of paradigm giving birth to Fog computing. Fog computing is an extension of Cloud computing that extends Cloud resources at the edge of the network, closer to the user. Cloud computing has become one of the essential needs of people over the Internet but with the emerging concept of IoT, traditional Clouds seem inadequate. IoT entails extremely low latency and for that, the Cloud servers that are distant and unknown to the user appear to be unsuitable. With the help of Fog computing, the Fog devices installed would be closer to the user that will provide an immediate storage for the frequently needed data. This paper discusses data migration between different storage types especially between Cloud devices and then presents a mechanism to migrate data between Cloud and Fog Layer. We call this mechanism Adaptive Deadline-Aware Scheme (ADAS) for Data migration between Cloud and Fog. We will demonstrate that we can access and process latency sensitive "hot" data through the proposed ADAS more efficiently than with a traditional Cloud setup.

Implementation of Integrated Interface based on Wire and Wireless Dual Network for Ensuring the Reliability of Intelligent LED Lighting System (지능형 LED 조명 시스템의 신뢰성 확보를 위한 유무선 이중망 통합 인터페이스 구현)

  • Lee, Un-Seon;Park, Tae-Jin;Park, Man-Gon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.2
    • /
    • pp.306-312
    • /
    • 2014
  • The ZigBee communication method, which is the most frequently applied to the LED lighting control system, has drawbacks of low-speed and low-capacity, and the communication failure possibility due to environmental influences is on the rise. Therefore, it is important to secure the communication reliability by applying an integrated interface with a wire-wireless dual-network. This paper developed a communication module, which has a platform converging and combining the ZigBee of USN environments with the PLC of power line communication environments, to implement a dualized communication interface system supporting the wire-wireless integrated protocol, and implemented a wire-wireless networking device and a control system software technology. As a result, it was automatically switched into the PLC communication within 4.4 seconds on average when there was an access failure in the ZigBee communication network, so a reliable communication network was built.

Radial Reference Map-Based Location Fingerprinting Technique

  • Cho, Kyoung-Woo;Chang, Eun-Young;Oh, Chang-Heon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.4
    • /
    • pp.207-214
    • /
    • 2016
  • In this paper, we propose a radial reference map-based location fingerprinting technique with constant spacing from an access point (AP) to all reference points by considering the minimum dynamic range of the received signal strength indicator (RSSI) obtained through an experiment conducted in an indoor environment. Because the minimum dynamic range, 12 dBm, of the RSSI appeared every 20 cm during the training stage, a cell spacing of 80 cm was applied. Furthermore, by considering the minimum dynamic range of an RSSI in the location estimation stage, when an RSSI exceeding the cumulative average by ${\pm}6dBm$ was received, a previously estimated location was provided. We also compared the location estimation accuracy of the proposed method with that of a conventional fingerprinting technique that uses a grid reference map, and found that the average location estimation accuracy of the conventional method was 21.8%, whereas that of the proposed technique was 90.9%.