• Title/Summary/Keyword: server performance

Search Result 1,690, Processing Time 0.036 seconds

Characteristics of active optical ring network and performance evaluation in Bandwidth on Demand (능동형 광 링 네트워크의 특징 및 요구 대역폭에 따른 성능 분석)

  • Lee Sang-Wha;Song Hae-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.209-218
    • /
    • 2005
  • In this paper, we present an Active Optical Network(AON) . The AON uses the Dense Wavelength Division Multiplexing(DWDM) from optical communication access network of ring type, and will be able to provide the smoothly service in the Bandwidth on Demand by using DWDM. It supports the connection of the multiple wavelength and the Sub-Carrier from the optical gigabit ethernet switch. The Wavelength Add Drop Multiplexer(WADM) extracts a specific wavelength, and composes a node of the ring network. The specific wavelength becomes demultiplexing in the Sub-Carrier and it is distributed in the user The active connection of optical gigabit ethernet switch where the distribution of access network is started and access terminal connection equipment is possible. By the BoD from the AON it compares the buffer size which changes, and it analyzes. Also the Time delay of bit compares with the throughput of server The limit of amount of time is decided. Consequently it will be able to realize the dynamic use protocol and an efficient algorithm of the network.

  • PDF

A Study on the Two-Dimensional Scheduling for Minimization of Moving Distance on the Remote Controllable Web-Camera (원격조정 가능한 웹 카메라의 이동거리 최소화를 위한 이차원 스케줄링에 관한 연구)

  • Cho, Soo-Young;Song, Myung-Nam;Kim, Young-Sin;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • v.1 no.2
    • /
    • pp.61-67
    • /
    • 2000
  • In case of the remote controllable web-camera that was took notice especially in internet real-time broadcasting systems, a great many clients connect the server of web-camera to request the service. So, the scheduling methods are important. Web-camera systems have used to the traditional FIFO(First In First Out) or SDF(Shortest Distance First) scheduling method. But they does not satisfy both the minimization of moving distance on the web-camera and the fairness on the users. In this paper, We propose the 2D scheduling method, As a result, the moving distance of the web-camera decreases compared with FIFO scheduling method. And the starvation state on the user's request does not happen compared with SDF scheduling method. Thus, if the remote controllable web-camera systems use the 2D scheduling method, they are satisfied with the minimization of moving distance on the remote controllable web-camera and the fairness on the users simultaneously. Therefore the user's satisfaction and the performance of the systems are improved.

  • PDF

Provisioning QoS for WiFi-enabled Portable Devices in Home Networks

  • Park, Eun-Chan;Kwak, No-Jun;Lee, Suk-Kyu;Kim, Jong-Kook;Kim, Hwang-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.720-740
    • /
    • 2011
  • Wi-Fi-enabled portable devices have recently been introduced into the consumer electronics market. These devices download or upload content, from or to a host machine, such as a personal computer, a laptop, a home gateway, or a media server. This paper investigates the fairness among multiple Wi-Fi-enabled portable devices in a home network when they are simultaneously communicated with the host machine. First, we present that, a simple IEEE 802.11-based home network suffers from unfairness, and the fairness is exaggerated by the wireless link errors. This unfairness is due to the asymmetric response of the TCP to data-packet loss and to acknowledgment-packet loss, and the wireless link errors that occur in the proximity of any node; the errors affect other wireless devices through the interaction at the interface queue of the home gateway. We propose a QoS-provisioning framework in order to achieve per-device fairness and service differentiation. For this purpose, we introduce the medium access price, which denotes an aggregate value of network-wide traffic load, per-device link usage, and per-device link error rate. We implemented the proposed framework in the ns-2 simulator, and carried out a simulation study to evaluate its performance with respect to fairness, service differentiation, loss and delay. The simulation results indicate that the proposed method enforces the per-device fairness, regardless of the number of devices present and regardless of the level of wireless link errors; furthermore it achieves high link utilization with only a small amount of frame losses.

An Algorithm for generating Cloaking Region Using Grids for Privacy Protection in Location-Based Services (위치기반 서비스에서 개인 정보 보호를 위한 그리드를 이용한 Cloaking 영역 생성 알고리즘)

  • Um, Jung-Ho;Kim, Ji-Hee;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.151-161
    • /
    • 2009
  • In Location-Based Services (LBSs), users requesting a location-based query send their exact location to a database server and thus the location information of the users can be misused by adversaries. Therefore, a privacy protection method is required for using LBS in a safe way. In this paper, we propose a new cloaking region generation algorithm using grids for privacy protection in LBSs. The proposed algorithm creates a m inimum cloaking region by finding L buildings and then performs K-anonymity to search K users. For this, we make use of not only a grid-based index structure, but also an efficient pruning techniques. Finally, we show from a performance analysis that our cloaking region generation algorithm outperforms the existing algorithm in term of the size of cloaking region.

  • PDF

Comparison of Two Experimental Approaches to Test Temporal Storability of Reduced Sulfur Compounds in Whole Sampling Method (환원황화합물에 대한 용기채취법의 비교 연구)

  • Jo, Sang-Hee;Kim, Ki-Hyun
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.28 no.3
    • /
    • pp.306-315
    • /
    • 2012
  • In this study, storage stability of reduced sulfur compounds ($H_2S$, $CH_3SH$, DMS, $CS_2$, and DMDS) and $SO_2$ in sampling bags was investigated in terms of two contrasting storage approaches between forward (F) and reverse (R) direction. The samples for the F method were prepared at the same time and analyzed sequentially through time. In contrast, those of reverse (R) method were prepared sequentially in advance and analyzed all at once upon the preparation of the last sample. In addition, relative performance between two different bag materials (PVF and PEA) was also assessed by using 100 ppb standard. The response factors (RF) of gaseous RSC samples were determined by gas chromatography/pulsed flame photometric detector (GC/PFPD) combined with air server (AS)/thermal desorber (TD) system at storage intervals of 0, 1, and 3 days. There is no statistical difference in all RSCs between two storage methods. However, the results of relative recovery indicated 2.58~12.8% differences in compound type between the two storage methods. Moreover, loss rates and storage stability of $H_2S$ and $SO_2$ were considerably affected by bag materials than any other variables. Therefore, some considerations about storage methods (or bag material types) for sulfur compounds are needed if stored by sampling bag method.

A Study on Digital Banking Platform-based FinTech Case: Koscom (디지털뱅킹 플랫폼 기반 핀테크 사례 연구: 코스콤)

  • Chung, Yee Chul;Lee, Sang Gi;Kim, Hee-Woong
    • Knowledge Management Research
    • /
    • v.21 no.1
    • /
    • pp.61-78
    • /
    • 2020
  • Recently, in the global financial transaction field, global transactions using computer systems and server hubs between foreign exchanges beyond the one-dimensional offline transactions and two-dimensional online transactions have been actively conducted. In the previous research by Lee Hyung-wook and Lee Min-jae (2018), as the globalization has accelerated following the development of digital technology and the expansion of ubiquitous communication network, the role of companies, the attribute of economic value creation and economic structure are being reorganized. It is said that O2O (Online to Offline) transactions are increasing due to the development. As a result, a new financial transaction paradigm is emerging that solves the inconveniences of existing financial services and enhances speed and convenience. Considering the global network trend and the rapidly developing and evolving digital bank environment, the necessity of utilizing the business platform model is emerging. However, despite this necessity, there are very limited cases in which such an attempt has been applied in practice. Accordingly, this study seeks to explore the business platform of the new financial transaction system. Specifically, the case study systematically examines the actual implementation of a unique network connection model with Koscom's global investment bank, which is currently in charge of the domestic financial transaction system, and improves ICT innovation performance and process through this. I would like to suggest a solution. In particular, this study analyzed a variety of business model construction and use cases by pursuing a platform connection with digital banks, which has recently been increasingly in demand. Therefore, this study intends to pursue the original and long-term profitability of the company by utilizing ICT innovation and platform business model, and also analyzes the convenience and excellence of trading for institutional and individual investors using the platform of digital bank. The implications of this study are significant in that it explores and explores the actual cases of ICT innovation and additional digital bank platform-connected business models based on this, and suggests a unique and preemptive business strategy of the company in the future.

Playback Quantity-based Proxy Caching Scheme for Continuous Media Data (재생량에 기반한 연속미디어 데이터 프록시 캐슁 기법)

  • Hong, Hyeon-Ok;Im, Eun-Ji;Jeong, Gi-Dong
    • The KIPS Transactions:PartB
    • /
    • v.9B no.3
    • /
    • pp.303-310
    • /
    • 2002
  • In this paper, we propose a proxy caching scheme that stores a portion of a continuous media object or an entire object on the Internet. The proxy stores the initial fraction of a continuous media object and determines the optimal size of the initial fraction of the continuous media object to be cached based on the object popularity. Under the proposed scheme, the initial latency of most clients and the data transferred from a remote server can be reduced and limited cache storage space can be utilized efficiently. Considering the characteristics of continuous media, we also propose the novel popularity for the continuous media objects based on the amount of the data of each object played by the clients. Finally, we have performed trace-driven simulations to evaluate our caching scheme and the popularity for the continuous media objects. Through these simulations, we have verified that our caching scheme, PPC outperforms other well-known caching schemes in terms of BHR, DSR and replacement and that popularity for the continuous media objects based on the amount of the playback data can enhance the performance of caching scheme.

Authentication Processing Optimization Model for the EAP-MD5 AAAv6 Operation (EAP-MD5 AAAv6 운영을 위한 인증처리 최적화 모델)

  • Jeong, Yoon-Su;Woo, Sung-Hee;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.757-764
    • /
    • 2005
  • With the increasing service Qualify and security in the Mobile Internet Diameter technology based on the AAAv6 is being used in the user authentication. But there are some Problems on the authentication Procedures of the Diameter in which the security falls down from a loaming service or Internet transmission course. We combine it with the cipher algorithm like EAP-MD5 and accomplish a user authentication processing. If we want to supply the user authentication with the mobility among domains by AAAv6-based Diameter, we need the efficient capacity allocation among AAA attendent, AAAv, AhAb, AAAh, HA servers in the AAAv6. Therefore in this paper, we propose to make the authentication capacity index to carry out user authentication ability by analyzing an EAP-MD5S server capacity model of AAAv6 authentication models for users with mobility among domains, and to find the optimized condition for the AAAv6 capacity by the index.

A New process Structure for Constructing Efficient Information Retrieval Systems (효율적인 정보 검색 시스템 구축을 위한 새로운 프로세스 구조)

  • Go, Hyeong-Dae;Yu, Jae-Su;Kim, Byeong-Gi
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.76-86
    • /
    • 1997
  • Many information retrieval systems have a simple process structure that a client process for a user is mapped to a server process for information retrieval. That is, when using information retrieval systems, each user is allocated a big process that consists of user interfaces, retrieval automatic indexing systems and storage systems. Therefor when many users use the information retrieval systems, it might be difficult to use the information retrieval systems. This is because the system overhead is increased as enormously much as users cannot use them. In this paper, we propose a new process structure for constructing efficient information retrieval systems that solves the problem resulting from he process structure. The proposed process structure contributes to the whole operational performance improvement of information retrieval systems and the efficientnt use of computer system resources. It is constructed based on a multi-threading scheme and a transaction processing monitor.

  • PDF

Grid-based Cloaking Area Creation Scheme supporting Continuous Query Processing for Location-based Services of Peer-to-Peer Environment (P2P 환경의 위치 기반 서비스에서 연속적인 질의 처리를 지원하는 그리드 기반 Cloaking 영역 설정 기법)

  • Kim, Hyeong-Il;Lee, Ah-Reum;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.18 no.3
    • /
    • pp.53-62
    • /
    • 2010
  • Recent development in wireless communication technology, like GPS, and mobile equipments, like PDA and cellular phone, make location-based services (LBSs) popular. However, because, users continuously request a query to a server in the LBSs by using their exact locations, privacy information could be in danger. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, we, in this paper, propose a grid-based cloaking area creation scheme supporting continuous LBSs in peer-to-peer environment. The proposed scheme creates a cloaking area by using Chord protocol, so as to support the continuous LBSs in peer-to-peer environment. Finally, we show from a performance analysis that our cloaking scheme outperforms the existing cloaking schemes, in terms of service time.