• Title/Summary/Keyword: server performance

Search Result 1,690, Processing Time 0.033 seconds

An Efficient SIP Messages Control in Distributed Conference Model (분산형 컨퍼런스 모델에서의 효율적 SIP 메시지 제어)

  • Jang, Choon-Seo;Lee, Ky-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.10
    • /
    • pp.71-77
    • /
    • 2012
  • In this paper, We have proposed an efficient SIP(Session Initiation Protocol) messages control which can be used to reduce conference servers load in distributed conference model. Each conference participant can control the amount of event notification messages from the conference server in real time according to its processing capacity and network circumstances. And the amount of SIP messages needed to maintain session with the conference servers can also be controlled actively in our system. The amount of SIP messages which should be processed by the conference servers can be reduced largely by using our suggested method. Therefore the conference system can be more easily expandable and total network traffic can be reduced largely in SIP environment. We have suggested new conference event packages and conference information data model with some added elements that are necessary for efficient SIP messages control. The performance of the proposed system has been evaluated by experiments.

Efficient Method to Support Mobile Virtualization-based Cloud Resource Management (모바일 가상화기반 클라우드 자원관리를 지원하는 효율적 방법)

  • Kang, Yongho;Jang, Changbok;Lee, Wanjik;Heo, Seokyeol;Kim, Jooman
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.277-283
    • /
    • 2014
  • Recently, various cloud service has been being provided on mobile devices as well as desktop pc and server computer. Also, Smartphone users are very rapidly increasing, and they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). So, research to utilize resources on mobile device has been conducted. In this paper, We have suggested efficient method of cloud resource management by using information of available physical resources(CPU, memory, storage, etc.) between mobile devices, and information of physical resource in mobile device. Suggested technology is possible to guarantee real-time process and efficiently manage resources.

A Handover Management Scheme Based on User-Preferences and Network-Centric Approach

  • Khan, Murad;Park, Gisu;Cho, Wooseong;Seong, Gihyuk;Han, Kijun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.344-357
    • /
    • 2015
  • With the increase in a number of access technologies and data rates, a continuous connection among different networks is demand of the future wireless networks. In the last decade, user connectivity among different access networks remained a challenging job. Therefore, in this article, we proposed a user-centric and user-perspective based network selection mechanism for fast handover management in heterogeneous wireless networks. The proposed scheme selects the most appropriate network among available networks on the basis of resources i.e. cost, data rate, and link quality. Initially, we load the Media Independent Information Service (MIIS) with the information of cost and data rate provided by different network operators. Similarly, Mobile Node (MN) is also loaded with the user preferred cost and data rate for different applications. The MN obtains the information of cost and data rate from MIIS server upon a predefined threshold, and make a decision for handover according to its current cost and data rate. Furthermore, we employ an optimal threshold mechanism for initiation of the handover execution phase to minimize false handover indications. The proposed scheme is based on a survey for network selection and its implementation in C programming language to validate its performance and accuracy. The simulation result shows that the proposed scheme performs superior then the schemes present in the current literature.

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.

A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos (Kerberos 기반 하둡 분산 파일 시스템의 안전성 향상방안)

  • Park, So Hyeon;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.803-813
    • /
    • 2013
  • As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.

Pedigree Indexing of Imported American Brahman Breeder Cattle in the Philippines

  • Bondac, O.L.;Mercado, C.M.;Vera Cruz, N.C.;Palou, R.N.;Jr, J.S.Server
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.10 no.6
    • /
    • pp.614-620
    • /
    • 1997
  • Pedigree data were used to predict the performance of 1,166 imported Americas Brahman breeder cattle, composed of 104 bulls and 1,062 heifers with an average age of 24.4 months (range of 17 to 40 months). A total of 13 full sib, 10 maternal half sib, and 228 paternal half sib groups were identified, each with average group size of 2.08, 2.00, and 4.49, respectively. Only 758 (64.9% of total) imported cattle were found to have at least one ancestor with expected progeny differences (EPDs) reported in the Spring 1995 Brahman Sire Summary. Moderate average accuracy values of .71, .69, .52, and .52 for birth weight, weaning weight, yearling weight, and maternal milk, respectively, were noted for EPDs of the ancestors. Prediction equations were derived by multiple regression analysis of available EPDs of sire, paternal grand sire, and maternal grand sire. Based on pedigree indexes that involve various combinations of available ancestral information, the average predicted EPDs (lbs) for imported cattle were $1.76{\pm}0.54$, $14.93{\pm}4.86$, $25.10{\pm}9.50$, and $5.86{\pm}2.08$ for birth weight, weaning weight, yearling weight, and maternal milk, respectively. Significant correlations (p < .05) were also found between sire and son EPDs (+.27) for yearling weight; and between sire and paternal grand sire EPDs for birth weight (+.34), weaning weight (+.51), yearling weight (+.49), and maternal milk (+.55).

A Study on an Efficient e-business System based on .NET (.NET을 기반으로 한 효율적인 전자상거래 시스템에 관한 연구)

  • 나윤지
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.4
    • /
    • pp.51-58
    • /
    • 2002
  • A electronic business user is increased rapidly, and load of a electronic business system and network traffic are increased rapidly. Also, the data which included an audio and video is increasing in a electronic business system gradually, and According to this an Internet service businessman is paying for an enormous cost for management of a system and a maintenance of a line. It is brought a delay of a response speed about a service wish of a Web customer this system load and network traffic raise. Also, this decreases customer satisfaction and becomes an important factor to decrease competitive power of an e-business enterprise. In this study, we proposed the electronic business system that improved answer delay time about a Web customer in an e-business system based on the .net which was a the latest version of Microsoft company, and analyzed performance of a proposal system through an experiment. In the experiment result, the system that proposed it can have response time to have been improved and fast adaptability about various requests of a Web customer. Also, in a proposed system, a decrease gets a delay of a response speed to occur because of the multiple user done.

  • PDF

An Address Translation Technique Large NAND Flash Memory using Page Level Mapping (페이지 단위 매핑 기반 대용량 NAND플래시를 위한 주소변환기법)

  • Seo, Hyun-Min;Kwon, Oh-Hoon;Park, Jun-Seok;Koh, Kern
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.371-375
    • /
    • 2010
  • SSD is a storage medium based on NAND Flash memory. Because of its short latency, low power consumption, and resistance to shock, it's not only used in PC but also in server computers. Most SSDs use FTL to overcome the erase-before-overwrite characteristic of NAND flash. There are several types of FTL, but page mapped FTL shows better performance than others. But its usefulness is limited because of its large memory footprint for the mapping table. For example, 64MB memory space is required only for the mapping table for a 64GB MLC SSD. In this paper, we propose a novel caching scheme for the mapping table. By using the mapping-table-meta-data we construct a fully associative cache, and translate the address within O(1) time. The simulation results show more than 80 hit ratio with 32KB cache and 90% with 512KB cache. The overall memory footprint was only 1.9% of 64MB. The time overhead of cache miss was measured lower than 2% for most workload.

Connection Control and Network Management of OBS with GSMP Open Interface (GSMP 개방형 인터페이스 기반의 OBS 연결 제어 및 망 관리 메커니즘)

  • Choi In-Sang;Kim Choon-Hee;Cha Young-Wook;Kwon Tae-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.1
    • /
    • pp.89-100
    • /
    • 2006
  • The introduction of GSMP open interface to OBS network can materialize to separate the transport plane and the control plane in OBS network. This makes the implementation of OBS switches simple and provides various flexibility. However, the introduction of open interface will cause the connection setup delay because of the additional processing overhead of open interface protocol. Also, in GSMP based network, the location of network management functions are not defined explicitly and the research result about the OBS network management is almost nothing. This paper proposes a parallel connection setup mechanism using centralized connection control server to minimize connection setup delay in OBS network with GSMP open interface and defines managed objects to support connection, configuration, performance, and fault management for the management of OBS network with GSMP open interface. This paper also proposes a distributed network management model, in which the above managed objects are distributed in a controller and an OBS switch according to network management functions. We verify the possibility of OBS control and network management by implementing network management function using proposed parallel connection setup mechanism and distributed network management model.

  • PDF

Design and Analysis of a Transmission Rate Control Algorithm for Client's Buffer on VOD Systems (VOD 시스템에서 클라이언트 버퍼를 위한 전송율 제어 알고리즘의 설계 및 분석)

  • 김완규;박규석
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.1
    • /
    • pp.67-79
    • /
    • 1998
  • In this paper, we present the design and analyze the transmission rate of a control algorithm for the client buffer on the VOD systems. The design is based on the server's data transmission rate and clients' data consumption rate. The proposed algorithm stabilizes the client's buffer by reducing the oscillation phenomena of the buffer. And it uses the BCT (Buffer Check Time) to reduce the scheduling load of the client system. The client's data consumption rate and the buffer size are calculated on the basis of BCT. In case that the predicted buffer size operates in the overrun or starvation the buffer. As the load fluctuation of the network, the transmission rate control policy cannot stabilize the client's buffer alone. The media scaling policy, therefore, also performs its complementary part in stabilizing the client's buffer, and performance evaluation of the proposed algorithm is provided through simulation.

  • PDF