• Title/Summary/Keyword: virtual network

Search Result 1,544, Processing Time 0.03 seconds

Active VM Consolidation for Cloud Data Centers under Energy Saving Approach

  • Saxena, Shailesh;Khan, Mohammad Zubair;Singh, Ravendra;Noorwali, Abdulfattah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.345-353
    • /
    • 2021
  • Cloud computing represent a new era of computing that's forms through the combination of service-oriented architecture (SOA), Internet and grid computing with virtualization technology. Virtualization is a concept through which every cloud is enable to provide on-demand services to the users. Most IT service provider adopt cloud based services for their users to meet the high demand of computation, as it is most flexible, reliable and scalable technology. Energy based performance tradeoff become the main challenge in cloud computing, as its acceptance and popularity increases day by day. Cloud data centers required a huge amount of power supply to the virtualization of servers for maintain on- demand high computing. High power demand increase the energy cost of service providers as well as it also harm the environment through the emission of CO2. An optimization of cloud computing based on energy-performance tradeoff is required to obtain the balance between energy saving and QoS (quality of services) policies of cloud. A study about power usage of resources in cloud data centers based on workload assign to them, says that an idle server consume near about 50% of its peak utilization power [1]. Therefore, more number of underutilized servers in any cloud data center is responsible to reduce the energy performance tradeoff. To handle this issue, a lots of research proposed as energy efficient algorithms for minimize the consumption of energy and also maintain the SLA (service level agreement) at a satisfactory level. VM (virtual machine) consolidation is one such technique that ensured about the balance of energy based SLA. In the scope of this paper, we explore reinforcement with fuzzy logic (RFL) for VM consolidation to achieve energy based SLA. In this proposed RFL based active VM consolidation, the primary objective is to manage physical server (PS) nodes in order to avoid over-utilized and under-utilized, and to optimize the placement of VMs. A dynamic threshold (based on RFL) is proposed for over-utilized PS detection. For over-utilized PS, a VM selection policy based on fuzzy logic is proposed, which selects VM for migration to maintain the balance of SLA. Additionally, it incorporate VM placement policy through categorization of non-overutilized servers as- balanced, under-utilized and critical. CloudSim toolkit is used to simulate the proposed work on real-world work load traces of CoMon Project define by PlanetLab. Simulation results shows that the proposed policies is most energy efficient compared to others in terms of reduction in both electricity usage and SLA violation.

Metaverse Augmented Reality Research Trends Using Topic Modeling Methodology (토픽 모델링 기법을 활용한 메타버스 증강현실 연구 동향 분석)

  • An, Jaeyoung;Shim, Soyun;Yun, Haejung
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.123-142
    • /
    • 2022
  • The non-face-to-face environment accelerated by COVID-19 has speeded up the dissemination of digital virtual ecosystems and metaverse. In order for the metaverse to be sustainable, digital twins that are compatible with the real world are key, and critical technology for that is AR (Augmented Reality). In this study, we examined research trends about AR, and will propose the directions for future AR research. We conducted LDA based topic modeling on 11,049 abstracts of published domestic and foreign AR related papers from 2009 to Mar 2022, and then looked into AR that was comprehensive research trends, comparison of domestic and foreign research trends, and research trends before and after the popularity of metaverse concepts. As a result, the topics of AR related research were deduced from 11 topics such as device, network communication, surgery, digital twin, education, serious game, camera/vision, color application, therapy, location accuracy, and interface design. After popularity of metaverse, 6 topics were deduced such as camera/vision, training, digital twin, surgical/surgical, interaction performance, and network communication. We will expect, through this study, to encourage active research on metaverse AR with convergent characteristics in multidisciplinary fields and contribute to giving useful implications to practitioners.

Antecedents of Trust and Effects on Committment in B2B e-Marketplace (B2B 마켓플레이스에서 신뢰의 선행요인과 몰입에 미치는 영향)

  • Oh, Sang-Hyun;Kim, Sang-Hyeon
    • Journal of Distribution Research
    • /
    • v.13 no.1
    • /
    • pp.1-33
    • /
    • 2008
  • As the interest in the business-to-business(B2B) electronic commerce is increasing, many companies are participating in the B2B e-Marketplaces. The e-Marketplace is defined as the virtual market that many players take part in to transact. The e-Marketplace has an influenced on the manner in which organizational buyers and sellers interact. As a result, it is important to develop an understanding of the behaviors of firms that use these electronic marketplaces. The purpose of this study is to develop a comprehensive model for trust and commitment of B2B e-Marketplace and empirically to examine their structural relationships. Drawing from trust and commitment theory in the interorganizational relationship and B2B electronic commerce context, this study identifies network externality, interactivity, justice, quality of information sharing, institutional assurance as the determinants of trust and commitment of e-Marketplace. The proposed model hypothesized that (1) trust is a function of network externality, interactivity, justice, quality of information sharing, institutional assurance, (2) attitudinal and behavioral commitment is a function of trust, (3) behavioral commitment is a function of attitudinal commitment. The proposed model is tested using organizational-level survey data from 187 buying organizations that conduct business in MRO e-Marketplaces. The data were tested by reliability test, correlation analysis, exploratory factor analysis, confirmatory factor analysis and covariance structure analysis. The results indicate that (1) trust is influenced by network externality, interactivity, justice, institutional assurance, (2) attitudinal commitment and behavioral commitment is influenced by trust (3) behavioral commitment is influenced by attitudinal commitment. Also, the empirical results confirmed that trust play a strong, central role in determinging e-Marketplace commitment. The key theoretical contribution of this research is that it begins to extend interorganizational information system literature in areas such as B2B Internet e-Marketplace. Managerially, this study contributes tn the understanding of the role of B2B e-Markeplace providers in Internet situation. And Limitations of this study and guidelines for future researches are also discussed.

  • PDF

Effects of Joining Coalition Loyalty Program : How the Brand affects Brand Loyalty Based on Brand Preference (브랜드 선호에 따라 제휴 로열티 프로그램 가입이 가맹점 브랜드 충성도에 미치는 영향)

  • Rhee, Jin-Hwa
    • Journal of Distribution Research
    • /
    • v.17 no.1
    • /
    • pp.87-115
    • /
    • 2012
  • Introduction: In these days, a loyalty program is one of the most common marketing mechanisms (Lacey & Sneath, 2006; Nues & Dreze, 2006; Uncles et al., 20003). In recent years, Coalition Loyalty Program is more noticeable as one of progressed forms. In the past, loyalty program was operating independently by single product brand or single retail channel brand. Now, companies using Coalition Loyalty Program share their programs as one single service and companies to participate to this program continue to have benefits from their existing program as well as positive spillover effect from the other participating network companies. Instead of consumers to earn or spend points from single retail channel or brand, consumers will have more opportunities to utilize their points and be able to purchase other participating companies products. Issues that are related to form of loyalty programs are essentially connected with consumers' perceived view on convenience of using its program. This can be a problem for distribution companies' strategic marketing plan. Although Coalition Loyalty Program is popular corporate marketing strategy to most companies, only few researches have been published. However, compared to independent loyalty program, coalition loyalty program operated by third parties of partnership has following conditions: Companies cannot autonomously modify structures of program for individual companies' benefits, and there is no guarantee to operate and to participate its program continuously by signing a contract. Thus, it is important to conduct the study on how coalition loyalty program affects companies' success and its process as much as conducting the study on effects of independent program. This study will complement the lack of coalition loyalty program study. The purpose of this study is to find out how consumer loyalty affects affiliated brands, its cause and mechanism. The past study about loyalty program only provided the variation of performance analysis, but this study will specifically focus on causes of results. In order to do these, this study is designed and to verify three primary objects as following; First, based on opinions of Switching Barriers (Fornell, 1992; Ping, 1993; Jones, et at., 2000) about causes of loyalty of coalition brand, 'brand attractiveness' and 'brand switching cost' are antecedents and causes of change in 'brand loyalty' will be investigated. Second, influence of consumers' perception and attitude prior to joining coalition loyalty program, influence of program in retail brands, brand attractiveness and spillover effect of switching cost after joining coalition program will be verified. Finally, the study will apply 'prior brand preference' as a variable and will provide a relationship between effects of coalition loyalty program and prior preference level. Hypothesis Hypothesis 1. After joining coalition loyalty program, more preferred brand (compared to less preferred brand) will increase influence on brand attractiveness to brand loyalty. Hypothesis 2. After joining coalition loyalty program, less preferred brand (compared to more preferred brand) will increase influence on brand switching cost to brand loyalty. Hypothesis 3. (1)Brand attractiveness and (2)brand switching cost of more preferred brand (before joining the coalition loyalty program) will influence more positive effects from (1)program attractiveness and (2)program switching cost of coalition loyalty program (after joining) than less preferred brand. Hypothesis 4. After joining coalition loyalty program, (1)brand attractiveness and (2)brand switching cost of more preferred brand will receive more positive impacts from (1)program attractiveness and (2)program switching cost of coalition loyalty program than less preferred brand. Hypothesis 5. After joining coalition loyalty program, (1)brand attractiveness and (2)brand switching cost of more preferred brand will receive less impacts from (1)brand attractiveness and (2)brand switching cost of different brands (having different preference level), which joined simultaneously, than less preferred brand. Method : In order to validate hypotheses, this study will apply experimental method throughout virtual scenario of coalition loyalty program if consumers have used or available for the actual brands. The experiment is conducted twice to participants. In a first experiment, the study will provide six coalition brands which are already selected based on prior research. The survey asked each brand attractiveness, switching cost, and loyalty after they choose high preference brand and low preference brand. One hour break was provided prior to the second experiment. In a second experiment, virtual coalition loyalty program "SaveBag" was introduced to participants. Participants were informed that "SaveBag" will be new alliance with six coalition brands from the first experiment. Brand attractiveness and switching cost about coalition program were measured and brand attractiveness and switching cost of high preference brand and low preference brand were measured as same method of first experiment. Limitation and future research This study shows limitations of effects of coalition loyalty program by using virtual scenario instead of actual research. Thus, future study should compare and analyze CLP panel data to provide more in-depth information. In addition, this study only proved the effectiveness of coalition loyalty program. However, there are two types of loyalty program, which are Single and Coalition, and success of coalition loyalty program will be dependent on market brand power and prior customer attitude. Therefore, it will be interesting to compare effects of two programs in the future.

  • PDF

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.

Edge to Edge Model and Delay Performance Evaluation for Autonomous Driving (자율 주행을 위한 Edge to Edge 모델 및 지연 성능 평가)

  • Cho, Moon Ki;Bae, Kyoung Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.191-207
    • /
    • 2021
  • Up to this day, mobile communications have evolved rapidly over the decades, mainly focusing on speed-up to meet the growing data demands of 2G to 5G. And with the start of the 5G era, efforts are being made to provide such various services to customers, as IoT, V2X, robots, artificial intelligence, augmented virtual reality, and smart cities, which are expected to change the environment of our lives and industries as a whole. In a bid to provide those services, on top of high speed data, reduced latency and reliability are critical for real-time services. Thus, 5G has paved the way for service delivery through maximum speed of 20Gbps, a delay of 1ms, and a connecting device of 106/㎢ In particular, in intelligent traffic control systems and services using various vehicle-based Vehicle to X (V2X), such as traffic control, in addition to high-speed data speed, reduction of delay and reliability for real-time services are very important. 5G communication uses high frequencies of 3.5Ghz and 28Ghz. These high-frequency waves can go with high-speed thanks to their straightness while their short wavelength and small diffraction angle limit their reach to distance and prevent them from penetrating walls, causing restrictions on their use indoors. Therefore, under existing networks it's difficult to overcome these constraints. The underlying centralized SDN also has a limited capability in offering delay-sensitive services because communication with many nodes creates overload in its processing. Basically, SDN, which means a structure that separates signals from the control plane from packets in the data plane, requires control of the delay-related tree structure available in the event of an emergency during autonomous driving. In these scenarios, the network architecture that handles in-vehicle information is a major variable of delay. Since SDNs in general centralized structures are difficult to meet the desired delay level, studies on the optimal size of SDNs for information processing should be conducted. Thus, SDNs need to be separated on a certain scale and construct a new type of network, which can efficiently respond to dynamically changing traffic and provide high-quality, flexible services. Moreover, the structure of these networks is closely related to ultra-low latency, high confidence, and hyper-connectivity and should be based on a new form of split SDN rather than an existing centralized SDN structure, even in the case of the worst condition. And in these SDN structural networks, where automobiles pass through small 5G cells very quickly, the information change cycle, round trip delay (RTD), and the data processing time of SDN are highly correlated with the delay. Of these, RDT is not a significant factor because it has sufficient speed and less than 1 ms of delay, but the information change cycle and data processing time of SDN are factors that greatly affect the delay. Especially, in an emergency of self-driving environment linked to an ITS(Intelligent Traffic System) that requires low latency and high reliability, information should be transmitted and processed very quickly. That is a case in point where delay plays a very sensitive role. In this paper, we study the SDN architecture in emergencies during autonomous driving and conduct analysis through simulation of the correlation with the cell layer in which the vehicle should request relevant information according to the information flow. For simulation: As the Data Rate of 5G is high enough, we can assume the information for neighbor vehicle support to the car without errors. Furthermore, we assumed 5G small cells within 50 ~ 250 m in cell radius, and the maximum speed of the vehicle was considered as a 30km ~ 200 km/hour in order to examine the network architecture to minimize the delay.

Synthetic Trajectory Generation Tool for Indoor Moving Objects (실내공간 이동객체 궤적 생성기)

  • Ryoo, Hyung Gyu;Kim, Soo Jin;Li, Ki Joune
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.24 no.4
    • /
    • pp.59-66
    • /
    • 2016
  • For the performance experiments of databases systems with moving object databases, we need moving object trajectory data sets. For example, benchmark data sets of moving object trajectories are required for experiments on query processing of moving object databases. For those reasons, several tools have been developed for generating moving objects in Euclidean spaces or road network spaces. Indoor space differs from outdoor spaces in many aspects and moving object generator for indoor space should reflect these differences. Even some tools were developed to produce virtual moving object trajectories in indoor space, the movements generated by them are not realistic. In this paper, we present a moving object generation tool for indoor space. First, this tool generates trajectories for pedestrians in an indoor space. And it provides a parametric generation of trajectories considering not only speed, number of pedestrians, minimum distance between pedestrians but also type of spaces, time constraints, and type of pedestrians. We try to reflect the patterns of pedestrians in indoor space as realistic as possible. For the reason of interoperability, several geospatial standards are used in the development of the tool.

A design of Optimized Vehicle Routing System(OVRS) based on RSU communication and deep learning (RSU 통신 및 딥러닝 기반 최적화 차량 라우팅 시스템 설계)

  • Son, Su-Rak;Lee, Byung-Kwan;Sim, Son-Kweon;Jeong, Yi-Na
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.2
    • /
    • pp.129-137
    • /
    • 2020
  • Currently, The autonomous vehicle market is researching and developing four-level autonomous vehicles beyond the commercialization of three-level autonomous vehicles. Because unlike the level 3, the level 4 autonomous vehicle has to deal with an emergency directly, the most important aspect of a four-level autonomous vehicle is its stability. In this paper, we propose an Optimized Vehicle Routing System (OVRS) that determines the route with the lowest probability of an accident at the destination of the vehicle rather than an immediate response in an emergency. The OVRS analyzes road and surrounding vehicle information collected by The RSU communication to predict road hazards, and sets the route for the safer and faster road. The OVRS can improve the stability of the vehicle by executing the route guidance according to the road situation through the RSU on the road like the network routing method. As a result, the RPNN of the ASICM, one of the OVRS modules, was about 17% better than the CNN and 40% better than the LSTM. However, because the study was conducted in a virtual environment using a PC, the possibility of accident of the VPDM was not actually verified. Therefore, in the future, experiments with high accuracy on VPDM due to the collection of accident data and actual roads should be conducted in real vehicles and RSUs.

Performance Evaluation of LTE-VPN based Disaster Investigation System for Sharing Disaster Field Information (재난사고 정보공유를 위한 LTE-VPN기반 현장조사시스템 성능평가)

  • Kim, Seong Sam;Shin, Dong Yoon;Nho, Hyun Ju
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.602-609
    • /
    • 2020
  • In the event of a large-scale disaster such as an earthquake, typhoon, landslide, and building collapse, the disaster situation awareness and timely disaster information sharing play a key role in the disaster response and decision-making stages for disaster management, such as disaster site control and evacuation of residents. In this paper, an exited field investigation system of NDMI (National Disaster Management Research Institute) was enhanced with an LTE-VPN- based wireless communication system to provide an effective on-site response in an urgent disaster situation and share observation data or analysis information acquired at the disaster fields in real-time. The required performance of wireless communication for the disaster field investigation system was then analyzed and evaluated. The experimental result for field data transmission performance of an advanced wireless communication investigation system showed that the UDP transmission performance of at least 4.1Mbps is required to ensure a seamless video conference system between disaster sites. In addition, a wireless communication bandwidth of approximately 10 Mbps should be guaranteed to smoothly share the communication and field data between the survey equipment currently mounted on the survey vehicle.

A Priority- based Minimum Interference Path Multicast Routing Algorithm in NGOI based DWDM (고밀도 파장 분할 다중화 방식 기반 차세대 광 인터넷망에서 우선순위 기반 최소간섭 경로 멀티캐스트 라우팅 알고리즘)

  • Jo, Chan-Hyo;Seo, Sang-Bo;Lee, Jun-Won;Kim, Sung-Un
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.286-296
    • /
    • 2009
  • A major challenge in next generation optical Internet (NGOI) networks based on dense-wavelength division multiplexing (DWDM) is the provision of guaranteed quality-of-service (QoS) for a wide variety of multimedia applications. One of the critical issues in NGOI is the routing and wavelength assignment problem that is embossed as very important and plays a key role in improving the global efficiency for capacity utilization. But the previous researches had the delay problem, and the path routed by higher priority nodes may be congested and interfere with potential future multicast session requests. To overcome these problems, in this research we suggest a Priority-based Minimum Interference Path Multicast Routing (PMIPMR) algorithm, a new routing algorithm which finds alternative routes based on node priorities and Virtual Source (VS) nodes that has both splitting and wavelength conversion, and then chooses a path that does not interfere with potential future multicast session requests when congestions occur in the network. The PMIPMR algorithm reduces blocking rate significantly and increases the wavelength utilization by avoiding congestion in future multicast session requests.