• Title/Summary/Keyword: server performance

Search Result 1,690, Processing Time 0.029 seconds

Analysis of Performance Interference in a KVM-virtualized Environment in the Aspect of CPU Scheduling (KVM 기반 가상화 환경에서 CPU 스케줄링 관점으로 본 Network I/O 성능간섭 현상 분석)

  • Kang, Donghwa;Lee, Kyungwoon;Park, Hyunchan;Yoo, Chuck
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.9
    • /
    • pp.473-478
    • /
    • 2016
  • Server virtualization provides abstraction of physical resources to users and thus accomplishes high resource utilization and flexibility. However, the characteristics of server virtualization, such as the limited number of physical resources shared by virtual machines, can cause problems, mainly performance interference. The performance interference is caused by the fact that the CPU scheduler running on the host operating system schedules virtual machines without considering the characteristics of the virtual machine's internal process. To address performance interference, a number of research activities to improve performance interference have been conducted, but do not deal with the fundamental analysis of performance interference. In this paper, in order to analyze the cause of performance interference, we carry out profiling in a variety of scenarios in a virtualized environment based on KVM. As a result, we analyze the phenomenon of the performance interference in terms of CPU scheduling and propose an efficient scheduling solution.

The Performance Evaluation of New Web Caching with Related Content using Colored Petri Net Simulation

  • Abdullaev, Sarvar;Ko, Franz I.S.
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.3
    • /
    • pp.67-83
    • /
    • 2008
  • Web caching server is one of the important components of any web site, as it makes the access of users to web content much faster while balancing the network and server load. There are many caching approaches proposed in order to solve this problem. Classically, we know several caching algorithms like FIFO, LRU, LRU-min and etc. Most of them have their advantages and disadvantages based on specific context. The purpose of this paper is to introduce the new concept of caching objects along with their related content and test the performance of the proposed caching method using CPN Tools simulator program. It is generally known that the use of Colored Petri Nets(CPNs) for modeling the simulation of new idea is one of the popular methods of system evaluation throughout software development projects. Moreover it could be very handy in describing the overall logic of the system. The CPN Tools is one of the most robust simulator programs which supports all necessary tools and functions to build and run the simulation model for CPN. Therefore in this paper, we will use CPN Tools software in order to build a simulator for our innovative caching approach named as web caching with related content. Then we will analyze the results derived from the simulation of our model and will make corresponding conclusions.

  • PDF

Performance of Caching Strategies using Clients' Request Information in Data Broadcast Systems (데이타 방송 시스템에서 클라이언트의 요구정보를 이용한 캐싱 전략들의 성능)

  • Shin, Dong-Cheon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.535-542
    • /
    • 2005
  • A data broadcast is an efficient technique to deliver data to a number of clients in wireless computing environments. In data broadcast systems, which generally have a narrow bandwidth, a caching is introduced to reduce contention for the bandwidth so that the response time can be decreased. In this paper, unlike previous works that use information maintained by clients, we propose several caching strategies using information on data requests of clients maintained by a server. Then, we evaluate the performance of proposed strategies by using simulation approach. According to the results, the strategy that considers both popularity and waiting time maintained by a server generally shows better performance than other strategies.

Performance Analysis of DDS for Distribution Network Management System Suitable for Satellite Communication (위성 통신 환경에 적합한 분산 망관리시스템을 위한 DDS의 성능 분석)

  • Song, Ye-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1179-1185
    • /
    • 2013
  • Trend of next generation satellite communication network is distribution and enlargement of network structure with increased network terminals, and traffic which use satellite communication is increasing and frequently occurring. Under specific satellite communication environment that various communication device dynamically forms a network domain and frequently exchanges the data, data-centric publish/subscribe data exchange is more suitable than server/client data exchange. So, this paper analyze DDS performance for application of DDS standard to distribution network management system which aims to efficiently manage limited satellite resource, and also this paper covers comparative study on DDS and SNMP(server/client data exchange). Study compares DDS and SNMP using OPNET, and result of study is analyzed from a network layer performance perspective.

The Design and Implementation of System for Blocking the Harmful Information on Client/server Environment (클라이언트/서버 환경에서 유해정보차단을 위한 시스템의 설계 및 구현)

  • 염태영
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.10
    • /
    • pp.571-580
    • /
    • 2003
  • A intercepting program of Black List Filtering System is widely used for blocking the harmful information in the internet. Hut The Black List Filtering System give rise to reduce the performance of Client PC. In this thesis the author proposes the good way to solve a problem of the Black List Filtering System. Keep to the point that is puting the black List into The Black List Serve on Client/server Environment and building Black List into Client PC in use of revisiting pattern of web-user. The best effect that tried to Solve the problem in the experiment concerning the thesis is presented not only to maintain the performance of Client PC, but also to improve the speed of performance of Client PC.

  • PDF

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster

  • Chaudhry, Junaid Ahsenali
    • Journal of Information Processing Systems
    • /
    • v.5 no.2
    • /
    • pp.69-76
    • /
    • 2009
  • Self healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self healing systems can be used for performance optimization, configuration management, access control management and bunch of other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for a while now. We show that if that exceptional complexity is converted into self-growing knowledge (policies in our case), can make up for initial development cost of building an intelligent system. In this paper, we report the application of AHSEN (Autonomic Healing-based Self management Engine) to in OKKAM Project infrastructure backbone cluster that mimics the web service based architecture of u-Zone gateway infrastructure. The 'blind' load division on per-request bases is not optimal for distributed and performance hungry infrastructure such as OKKAM. The approach adopted assesses the active threads on the virtual machine and does resource estimates for active processes. The availability of a certain server is represented through worker modules at load server. Our simulation results on the OKKAM infrastructure show that the self healing significantly improves the performance and clearly demarcates the logical ambiguities in contemporary designs of self healing infrastructures proposed for large scale computing infrastructures.

Reliable and Flexible Storage System for NAS Environments (NAS를 위한 신뢰성과 확장성이 있는 저장 장치 시스템)

  • Lee, Tae-Keun;Kang, Yong-Hyeog;Eom, Young-Ik
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1085-1092
    • /
    • 2003
  • The rapid growth of high speed multimedia services demands the large capacity of the server's storage that maintains the multimedia contents. Among the server's devices, the low I/O speed and physical or logical failure of storage device decrease the total performance of system. The continuous increase of multimedia contents require the flexibility of storage capacity. In order to solve the these problems, we propose the uses of software RAID and LVM techniques that provide the performance improvement and reliability of storage device and the flexibility of storage device respectively. In the LINUX 2.4 kernel, we implemented the reliable and flexible storage device and evaluated the performance of it.

An Access Code Key for Verification Service Model on the Blockchain in a Door Security (출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델)

  • Hong, Ki Hyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

A Performance Comparison of Parallel Programming Models on Edge Devices (엣지 디바이스에서의 병렬 프로그래밍 모델 성능 비교 연구)

  • Dukyun Nam
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.165-172
    • /
    • 2023
  • Heterogeneous computing is a technology that utilizes different types of processors to perform parallel processing. It maximizes task processing and energy efficiency by leveraging various computing resources such as CPUs, GPUs, and FPGAs. On the other hand, edge computing has developed with IoT and 5G technologies. It is a distributed computing that utilizes computing resources close to clients, thereby offloading the central server. It has evolved to intelligent edge computing combined with artificial intelligence. Intelligent edge computing enables total data processing, such as context awareness, prediction, control, and simple processing for the data collected on the edge. If heterogeneous computing can be successfully applied in the edge, it is expected to maximize job processing efficiency while minimizing dependence on the central server. In this paper, experiments were conducted to verify the feasibility of various parallel programming models on high-end and low-end edge devices by using benchmark applications. We analyzed the performance of five parallel programming models on the Raspberry Pi 4 and Jetson Orin Nano as low-end and high-end devices, respectively. In the experiment, OpenACC showed the best performance on the low-end edge device and OpenSYCL on the high-end device due to the stability and optimization of system libraries.

Clothing Management System Using the Smart Hanger Embedded RFID (RFID가 내장된 스마트 옷걸이를 이용한 의류 관리 시스템)

  • Chung, Sung Boo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.8
    • /
    • pp.185-194
    • /
    • 2014
  • In this paper, we proposed the clothing management system using the smart hanger. Proposed system consists of smart hanger, base module, and server, and the smart hanger consists of MCU, LED, RFID reader, RF chip, ring sensor, and battery. The smart hanger reads the RFID tag attached to the clothes and wirelessly transmitted to the server. The server associated base module communicates with the smart hanger and transmits information to the server. The server manages clothing through the DB, and can display various information through the web page and the smart phone. In order to verify the usefulness of the proposed system, we did experiment with the management system for clothing store and laundry where using a lot of hangers. Performance tests of the smart hanger are applied to check the current consumption and can be predicted the battery life with the proposed low power algorithm. The clothing store management system can be increased sales and convenience of the consumer. The laundry management system can be increased the efficiency of laundry category and convenience of the consumer.