• Title/Summary/Keyword: server performance

Search Result 1,690, Processing Time 0.033 seconds

Development of Optimal Control System for Air Separation Unit

  • Ji, Dae-Hyun;Lee, Sang-Moon;Kim, Sang-Un;Kim, Sun-Jang;Won, Sang-Chul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.524-529
    • /
    • 2004
  • In this paper, We described the method which developed the optimal control system for air separation unit to change production rates frequently and rapidly. Control models of the process were developed from actual plant data using subspace identification method which is developed by many researchers in resent years. The model consist of a series connection of linear dynamic block and static nonlinear block (Wiener model). The model is controlled by model based predictive controller. In MPC the input is calculated by on-line optimization of a performance index based on predictions by the model, subject to possible constraints. To calculate the optimal the performance index, conditions are expressed by LMI(Linear Matrix Inequalities).In order to access at the Bailey DCS system, we applied the OPC server and developed the Client program. The OPC sever is a device which can access Bailey DCS system.The Client program is developed based on the Matlab language for easy calculation,data simulation and data logging. Using this program, we can apply the optimal input to the DCS system at real time.

  • PDF

Evaluation of Aisle Partition System's Thermal Performance in Large Data Centers for Superior Cooling Efficiency (데이터센터의 공조효율 향상을 위한 공조파티션시스템 성능평가에 관한 연구)

  • Cho, Jin-Kyun;Jeong, Cha-Su;Kim, Byung-Seon
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.22 no.4
    • /
    • pp.205-212
    • /
    • 2010
  • In a typical data center, large numbers of IT sever racks are arranged multiple rows. IT environments, in which extensive electronic hardware is air-cooled, cooling system inefficiencies result when heated exhaust air from equipment prematurely mixes with chilled coolant air before it is used for cooling. Mixing of chilled air before its use with heated exhaust air results in significant cooling inefficiencies in many systems. Over temperatures may not only harm expensive electronic equipment but also interrupt critical and revenue generating services. Cool shield is a cost effective aisle partition system to contain the air in cold aisles and hot aisles of an IT server room. This paper focuses on the use of performance metrics for analyzing aisle partition system in data centers.

Performance Analysis of an Hybrid Switching System for Optical Networks (광 네트워크를 위한 Hybrid 스위칭 시스템의 성능 분석)

  • ;Bartek Wydrowski;Moshe Zukerman;;Chuan Heng Foh
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.16-23
    • /
    • 2003
  • In this paper, we propose a new optical hybrid switching system that takes advantage of both Optical Burst Switching (OBS) and Optical Circuit Switching (OCS) technologies. This system classifies incoming IP traffic flows into short-lived and long-lived flows for hybrid switching. For performance analysis, we model the system as a single server queue in a Markovian environment. The burst generation process is assumed to follow a two-state Markov Modulated Poisson Process (MMPP), and the service rate fluctuates based on the number of concurrent OCS sessions. Results of the mean delay and queue size for OBS bursts are derived.

Implementation of a P2P-based Data Sharing System using JXTA (JXTA를 이용한 P2P 기반 자료공유시스템(JDSS)의 구현)

  • 양광민;주형렬
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.1-22
    • /
    • 2003
  • P2P systems have been studied by many researchers in universities and commercial firms in recent years. In this study. we design and implement a system that makes UP for shortcomings of currently available P2P systems. Gnutella and Napster. The study also includes an efficiency analysis scheme conducted through a series of experimental data. The data sharing system of the study demonstrated duality of roles(client, service) of peers. But, their roles were separated from the existing client-server systems. Also, the study implements mechanism that shows the redundancy of data to communicate efficiently among peers for transferring data. The results of performance measure of the system shows that the amount of information shared by peers increases as the amount of peers increases but with no significant increase in response time. This constant response time is far more stable and faster than current file sharing systems. such as Gnutella and Napster. Business applications such as knowledge management, enterprise information portal management and transfer of data are done by use of supercomputers. They need to extend their systems to equip with more capacity and throughput as the number of clients increases. Moreover, they will face with more complicated problems if integration with new systems exists. If this JDSS is introduced to these business applications. it would easily augment scalability of the system with high performance at less expense.

  • PDF

Application of Principal Components Analysis Method to Wireless Sensor Network Based Structural Monitoring Systems

  • Congyi, Zhang;Mission, Jose Leo;Kim, Sung-Ho;Youk, Yui-Su;Kim, Hyeong-Joo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.1
    • /
    • pp.11-17
    • /
    • 2008
  • Typical wireless sensor networks used in structural monitoring are continuous types wherein data transmission is progressive at all time that may include irrelevant and insignificant data and information. Continuous types of wireless monitoring systems often pose problems of handling large-sized data that may deteriorate the performance of the system. The proposed method is to suggest an event-triggered monitoring system that captures and transmits relevant data only. An error signal generated by the Principal Components Analysis (PCA) is utilized as an index for event detection and selective data transmission. With this new monitoring scheme, the remote server is relieved of unwanted data by receiving only relevant information from the wireless sensor networks. The performance of the proposed scheme was verified with simulation studies.

Development of Mobile Dashboard System for Manufacturing Data Visualization (제조 데이터 가시화를 위한 모바일 대시보드 시스템 개발)

  • Jo, Hyunjei;Kim, Chul;Cho, Yongju
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.31 no.4
    • /
    • pp.311-317
    • /
    • 2014
  • As products have been more complex and customer's demands of personalized products are increasing, manufacturing system has been changed from mass production to mass customization production that makes small quantity but different kinds of product. In addition, it becomes important that manufacturers quickly respond to variable customer's demands and characteristic regulations in each country. Therefore, three prerequisites are essential for manufacturers to response agilely. First, manufacturing data should be monitored in real time, second, information is extracted from the data, and finally, the information is used to make manufacturing strategy. In this paper, the mobile dashboard system is presented. It visualizes manufacturing data on mobile devices, and measures performance of the shop floor through the information. The proposed system is composed of server and client, and is running on the R - the open source software for statistics. Four kinds of template are given for easy visualization through the system.

IDENTITY-BASED AAA AUTHENTICATION PROTOCOL

  • Kim Dong-myung;Cho Young-bok;Lee Dong-heui;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.678-682
    • /
    • 2005
  • IETF suggested AAA for safe and reliable user authentication on various network and protocol caused by development in internet and increase in users. Diameter standard authentication system does not provide mutual authentication and non-repudiation. AAA authentication system using public key was suggested to supplement such Diameter authentication but application in mobile service control nodes is difficult due to overhead of communication and arithmetic. ID based AAA authentication system was suggested to overcome such weak point but it still has the weak point against collusion attack or forgery attack. In this thesis, new ID based AAA authentication system is suggested which is safe against collusion attack and forgery attack and reduces arithmetic quantity of mobile nodes with insufficient arithmetic and power performance. In this thesis, cryptological safety and arithmetical efficiency is tested to test the suggested system through comparison and assessment of current systems. Suggested system uses two random numbers to provide stability at authentication of mobile nodes. Also, in terms of power, it provides the advantage of seamless service by reducing authentication executing time by the performance of server through improving efficiency with reduced arithmetic at nodes.

  • PDF

An ICN In-Network Caching Policy for Butterfly Network in DCN

  • Jeon, Hongseok;Lee, Byungjoon;Song, Hoyoung;Kang, Moonsoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1610-1623
    • /
    • 2013
  • In-network caching is a key component of information-centric networking (ICN) for reducing content download time, network traffic, and server workload. Data center network (DCN) is an ideal candidate for applying the ICN design principles. In this paper, we have evaluated the effectiveness of caching placement and replacement in DCN with butterfly-topology. We also suggest a new cache placement policy based on the number of routing nodes (i.e., hop counts) through which travels the content. With a probability inversely proportional to the hop counts, the caching placement policy makes each routing node to cache content chunks. Simulation results lead us to conclude (i) cache placement policy is more effective for cache performance than cache replacement, (ii) the suggested cache placement policy has better caching performance for butterfly-type DCNs than the traditional caching placement policies such as ALWASYS and FIX(P), and (iii) high cache hit ratio does not always imply low average hop counts.

Performance Analysis of Base Station Controller using Queueing Model for Mobile Communication Systems (이동통신 시스템에서 큐잉 모델을 이용한 제어국의 성능 분석)

  • Won, Jong-Kwon;Park, Woo-Goo;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.39-47
    • /
    • 2000
  • This paper is to propose an efficient and reliable control procedure of Base Station Controller of mobile communication system for bulk input messages which was delivered instantaneously. We divided the input messages that are processed by the base station controller of the mobile communication system into two things ; they are messages related to call connection and o&m(operation and maintenance). In addition, we analyzed the properties of the input messages and then performed computer simulation on each input message by using M/M/1/K queueing model in term of the following viewpoints : the loss probability of input messages, the average queue length, the utilization of process controller(server),the average waiting time in queue. And we compared the performance of the two input messages in the overload controlling which was caused by the congested input messages.

  • PDF

The Development of Terminal for Long Distance Data Transmission Using UHF RFID Module (UHF RFID 모듈을 이용한 원거리 데이터 전송 전용단말기 개발)

  • Hwang, Gi-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2465-2472
    • /
    • 2009
  • This research paper is to develop remote data transmission terminal which is adequate to RFID R/W by using UHF/RF RFID R/W module (WJR7090) and Bluetooth communication(FB755AC) with ARM chipset(AT91SAM7S256). The developed UHF RFID R/W terminal performs tagging of RPID value and transmit the value to server with Bluetooth communication, the transmitted RFID tag value is compared to the Database value and the result is transmitted to the terminal. Performance test was done in order to prove the performance of the terminal, and the test result of the terminal's excellency and transmitted/recevied packet is described.