• 제목/요약/키워드: performance scalability

검색결과 649건 처리시간 0.034초

고확장성 SDN을 위한 랭킹 기반 플로우 교체 기법 (Ranking-based Flow Replacement Method for Highly Scalable SDN)

  • 뉘엔 트리 투안 힙;김경백
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.143-146
    • /
    • 2015
  • Software Defined Network (SDN) separates control plane and data plane to achieve benefits such as centralized management, centralized provisioning, lower device cost and more flexibility. In SDN, scalability is an important issue. Centralized controller can be a bottle neck and many research tried to solve this issue on the control plan. However, scalability issue does not only happen in the control plane, but also happen in the data plane. In the data plane, flow table is an important component and its size is limited. In a large network operated by SDN technology, the performance of the network can be highly degraded because of the size limitation of a flow table. In this paper, we propose a ranking-based flow replacement method, Flow Table Management (FTM), to overcome this problem.

A Comparative Analysis on Performance of Wireless Sensor Networks Routing Protocols

  • KRISHNA, KONDA. HARI;NAGPAL, TAPSI;BABU, Y. SURESH
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.240-244
    • /
    • 2022
  • The common goals of designing a routing algorithm are not only to reduce control packet overhead, maximize throughput and minimize the end-to-end delay, but also take into consideration the energy consumption. Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSN's). Three metrics (power consumption, time of transmission and packet loss rate) are used in order to compare three routing protocols which are AODV, DSDV and LEACH.

전이학습을 활용한 군집제어용 강화학습의 효율 향상 방안에 관한 연구 (Study on Enhancing Training Efficiency of MARL for Swarm Using Transfer Learning)

  • 이슬기;김권일;윤석민
    • 한국군사과학기술학회지
    • /
    • 제26권4호
    • /
    • pp.361-370
    • /
    • 2023
  • Swarm has recently become a critical component of offensive and defensive systems. Multi-agent reinforcement learning(MARL) empowers swarm systems to handle a wide range of scenarios. However, the main challenge lies in MARL's scalability issue - as the number of agents increases, the performance of the learning decreases. In this study, transfer learning is applied to advanced MARL algorithm to resolve the scalability issue. Validation results show that the training efficiency has significantly improved, reducing computational time by 31 %.

고속 IP 교환망에서 효율적인 레이블 관리 방식에 관한 연구 (A Study on the Efficient Label Management Methods in High-Speed IP Switching Networks)

  • 심재헌;장훈
    • 정보처리학회논문지C
    • /
    • 제11C권4호
    • /
    • pp.527-538
    • /
    • 2004
  • 본 논문에서는 MPLS에서 전체 플로우의 수를 줄이고 확장성(scalability) 문제를 해결할 수 있는 테이블 관리 방안으로서 플로우 집적화와 플로우 유지 시간 제어 알고리즘을 제안하였다. 목적지 주소 기반 플로우 집적화 방식은 인터넷에서 전체 플로우의 수를 감소시키고 레이블을 효율적으로 사용할 수 있도록 관리하여 전체 패킷의 스위칭 비율을 향상시킬 수 있는 방식이며, 플로우 유지 시간 제어 알고리즘은 불필요한 플로우에게 할당되어 있는 레이블을 가능한 빨리 해제함으로써 레이블의 과도한 낭비를 줄일 수 있는 방법이다. 본 논문에서는 실제 인터넷 트래픽 트레이스를 이용하여 시뮬레이션을 수행함으로써 제안한 두 가지 방식의 성능을 검증하였다. 성능검증에서는 레이블 사용 효율, 평균 fp이블 사용량, 그리고 스위칭 된 패킷수와 스위칭 된 비율을 이용하였다.

확장성을 갖는 웹 기반 분산 시뮬레이터의 구현 및 설계 (Design and Implementation for A Scalable Web-Based Distributed Simulator)

  • 김종은
    • 한국게임학회 논문지
    • /
    • 제2권1호
    • /
    • pp.42-48
    • /
    • 2002
  • 웹을 통하여 모델을 생성하고, 시뮬레이션을 수행하는 새로운 자바를 이용한 웹 기반 시뮬레이션 환경들이 제시되고 있다. 웹 기반 시뮬레이션은 인터넷에 연결된 많은 컴퓨터를 협동적으로 이용할 수 있다는 장점이 있지만, 웹 서버와 자바의 원격호출(RMI: Remote Method Invocation)이 이용되는 환경에서는 매우 많은 시뮬레이션 개체들간의 상호 동작과 정보 공유가 서버의 과다한 처리량과 통신 부하를 초래하여 시뮬레이션의 성능과 확장성을 저하시킬 수 있다. 본 논문에서는 확장성과 성능을 고려한 웹 기반 시뮬레이터를 설계하고, 객체 지향 언어인 자바를 사용하여 구현하였다. 또한, 제안된 시뮬레이터가 온라인게임에서 클라이언트와 서버 엔진의 모델을 생성하기 위해 활용될 수 있다. ATM 스위칭 모델의 시뮬레이션을 통해 구현된 시뮬레이션 환경의 활용을 제시한다.

  • PDF

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering

  • Jeong, Woon-Hae;Kim, Se-Jun;Park, Doo-Soon;Kwak, Jin
    • Journal of Information Processing Systems
    • /
    • 제9권1호
    • /
    • pp.157-172
    • /
    • 2013
  • There are many recommendation systems available to provide users with personalized services. Among them, the most frequently used in electronic commerce is 'collaborative filtering', which is a technique that provides a process of filtering customer information for the preparation of profiles and making recommendations of products that are expected to be preferred by other users, based on such information profiles. Collaborative filtering systems, however, have in their nature both technical issues such as sparsity, scalability, and transparency, as well as security issues in the collection of the information that becomes the basis for preparation of the profiles. In this paper, we suggest a movie recommendation system, based on the selection of optimal personal propensity variables and the utilization of a secure collaborating filtering system, in order to provide a solution to such sparsity and scalability issues. At the same time, we adopt 'push attack' principles to deal with the security vulnerability of collaborative filtering systems. Furthermore, we assess the system's applicability by using the open database MovieLens, and present a personal propensity framework for improvement in the performance of recommender systems. We successfully come up with a movie recommendation system through the selection of optimal personalization factors and the embodiment of a safe collaborative filtering system.

(t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증 (Public Key Authentication using(t, n) Threshold Scheme for WSN)

  • 김준엽;김완주;이수진
    • 한국군사과학기술학회지
    • /
    • 제11권5호
    • /
    • pp.58-70
    • /
    • 2008
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.

A Secure, Hierarchical and Clustered Multipath Routing Protocol for Homogenous Wireless Sensor Networks: Based on the Numerical Taxonomy Technique

  • Hossein Jadidoleslamy
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.121-136
    • /
    • 2023
  • Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. Some problems of WSNs are: severe resources' constraints, low reliability and fault tolerant, low throughput, low scalability, low Quality of Service (QoS) and insecure operational environments. One significant solution against mentioned problems is hierarchical and clustering-based multipath routing. But, existent algorithms have many weaknesses such as: high overhead, security vulnerabilities, address-centric, low-scalability, permanent usage of optimal paths and severe resources' consumption. As a result, this paper is proposed an energy-aware, congestion-aware, location-based, data-centric, scalable, hierarchical and clustering-based multipath routing algorithm based on Numerical Taxonomy technique for homogenous WSNs. Finally, performance of the proposed algorithm has been compared with performance of LEACH routing algorithm; results of simulations and statistical-mathematical analysis are showing the proposed algorithm has been improved in terms of parameters like balanced resources' consumption such as energy and bandwidth, throughput, reliability and fault tolerant, accuracy, QoS such as average rate of packet delivery and WSNs' lifetime.

유전자 알고리즘을 이용한 클러스터링 기반 협력필터링 (Clustering-based Collaborative Filtering Using Genetic Algorithms)

  • 이수정
    • 창의정보문화연구
    • /
    • 제4권3호
    • /
    • pp.221-230
    • /
    • 2018
  • 추천 시스템의 주요 방법인 협력 필터링 기술은 실제 상업용 온라인 시스템에서 성공적으로 구현되어 서비스가 제공되고 있다. 그러나, 이 기술은 본질적으로 여러 가지 단점을 내포하는데, 데이터 희소성, 콜드 스타트, 확장성 문제 등이 그 예이다. 확장성 문제를 해결하기 위하여 클러스터링 기법을 활용한 협력 필터링 방법이 연구되어 왔다. 본 연구에서 제안하는 협력 필터링 시스템에서는 가장 널리 활용되는 클러스터링 기법들 중 하나인 K-means 알고리즘의 단점을 개선하고자 유전자 알고리즘을 이용한다. 또한, 기존 연구에서 최적화된 클러스터링 결과를 추구하였던 것과는 달리, 제안 방법은 클러스터링 결과를 활용한 협력 필터링 시스템 성능의 최적화를 목표로 하므로, 실질적으로 시스템의 성능을 향상시킬 수 있다.

마이크로 커널을 기반으로 하는 Nucleus와 ${\mu}ITRON$ 특성 및 성능 비교 연구 (A study on Properties and Comparative Performance of Nucleus and ${\mu}ITRON$ based on microkernel)

  • 박상준;박정형
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.397-399
    • /
    • 2004
  • Generally microkernel has properties of Portability, reusability and scalability. In particular microkernel technique has been applied to development of real time kernel on embedded system because life cycle of micro processor is shortened. In this paper we study Properties of micro kernel and Comparative Performance of Nucleus and ${\mu}ITRON$ based on microkernel.

  • PDF