• Title/Summary/Keyword: 분산알고리즘

Search Result 1,789, Processing Time 0.032 seconds

Collaboration and Node Migration Method of Multi-Agent Using Metadata of Naming-Agent (네이밍 에이전트의 메타데이터를 이용한 멀티 에이전트의 협력 및 노드 이주 기법)

  • Kim, Kwang-Jong;Lee, Yon-Sik
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.105-114
    • /
    • 2004
  • In this paper, we propose a collaboration method of diverse agents each others in multi-agent model and describe a node migration algorithm of Mobile-Agent (MA) using by the metadata of Naming-Agent (NA). Collaboration work of multi-agent assures stability of agent system and provides reliability of information retrieval on the distributed environment. NA, an important part of multi-agent, identifies each agents and series the unique name of each agents, and each agent references the specified object using by its name. Also, NA integrates and manages naming service by agents classification such as Client-Push-Agent (CPA), Server-Push-Agent (SPA), and System-Monitoring-Agent (SMA) based on its characteristic. And, NA provides the location list of mobile nodes to specified MA. Therefore, when MA does move through the nodes, it is needed to improve the efficiency of node migration by specified priority according to hit_count, hit_ratio, node processing and network traffic time. Therefore, in this paper, for the integrated naming service, we design Naming Agent and show the structure of metadata which constructed with fields such as hit_count, hit_ratio, total_count of documents, and so on. And, this paper presents the flow of creation and updating of metadata and the method of node migration with hit_count through the collaboration of multi-agent.

Fault Localization for Self-Managing Based on Bayesian Network (베이지안 네트워크 기반에 자가관리를 위한 결함 지역화)

  • Piao, Shun-Shan;Park, Jeong-Min;Lee, Eun-Seok
    • The KIPS Transactions:PartB
    • /
    • v.15B no.2
    • /
    • pp.137-146
    • /
    • 2008
  • Fault localization plays a significant role in enormous distributed system because it can identify root cause of observed faults automatically, supporting self-managing which remains an open topic in managing and controlling complex distributed systems to improve system reliability. Although many Artificial Intelligent techniques have been introduced in support of fault localization in recent research especially in increasing complex ubiquitous environment, the provided functions such as diagnosis and prediction are limited. In this paper, we propose fault localization for self-managing in performance evaluation in order to improve system reliability via learning and analyzing real-time streams of system performance events. We use probabilistic reasoning functions based on the basic Bayes' rule to provide effective mechanism for managing and evaluating system performance parameters automatically, and hence the system reliability is improved. Moreover, due to large number of considered factors in diverse and complex fault reasoning domains, we develop an efficient method which extracts relevant parameters having high relationships with observing problems and ranks them orderly. The selected node ordering lists will be used in network modeling, and hence improving learning efficiency. Using the approach enables us to diagnose the most probable causal factor with responsibility for the underlying performance problems and predict system situation to avoid potential abnormities via posting treatments or pretreatments respectively. The experimental application of system performance analysis by using the proposed approach and various estimations on efficiency and accuracy show that the availability of the proposed approach in performance evaluation domain is optimistic.

Lazy Garbage Collection of Coordinated Checkpointing Protocol for Avoiding Sympathetic Rollback (동기적 검사점 기법에서 불필요한 복귀를 회피하기 위한 쓰레기 처리 기법)

  • Chung, Kwang-Sik;Yu, Heon-Chang;Lee, Won-Gyu;Lee, Seong-Hoon;Hwang, Chong-Sun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.6
    • /
    • pp.331-339
    • /
    • 2002
  • This paper presents a garbage collection protocol for checkpoints and message logs which are staved on the stable storage or volatile storage for fault tolerancy. The previous works of garbage collections in coordinated checkpointing protocol delete all the checkpoints except for the last checkpoints on earth processes. But implemented in top of reliable communication protocol like as TCP/IP, rollback recovery protocol based on only last checkpoints makes sympathetic rollback. We show that the old checkpoints or message logs except for the last checkpoints have to be preserved in order to replay the lost message. And we define the conditions for garbage collection of checkpoints and message logs for lost messages and present the garbage collection algorithm for checkpoints and message logs in coordinated checkpointing protocol. Since the proposed algorithm uses process information for lost message piggybacked with messages, the additional messages for garbage collection is not required The proposed garbage collection algorithm makes 'the lazy garbage collectioneffect', because relying on the piggybacked checked checkpoint information in send/receive message. But 'the lazy garbage collection effect'does not break the consistency of the whole systems.

Evaluation and Application of QUAL2E and QUAL2K Models in Anyang Stream (안양천에서 QUAL2E와 QUAL2K 모델의 적용 및 평가)

  • Jung, Sung-Soo;Kim, Kyung-Sub
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.30 no.5
    • /
    • pp.544-551
    • /
    • 2008
  • QUAL2K enhanced QUAL2E and applied in real fields efficiently incorporates denitrification process, sediment-water interaction process, bottom algae and detritus. Also, the CBOD of QUAL2K is divided into two real parts, one is slow CBOD(sCBOD) and another is fast CBOD(fCBOD). The simulation results of QUAL2E and QUAL2K models in Anyang Stream were compared and analyzed in water quality constituents of DO, BOD, Org-N, NH$_3$-N, NO$_3$-N, Org-P, Dis-P and Chl-a respectively. The similar results were shown in Org-N, NH$_3$-N, Org-P and Chl-a both QUAL2K and QUAL2E models. But the different results were revealed in DO, BOD, Dis-P and NO$_3$-N by the influence of new incorporating processes. DO was shown relatively low values in the effect of bottom algae. BOD which is influenced by particulate organic matter was revealed high values. NO$_3$-N was closed to the real values by the two processes of denitrification and sediment-water interaction. To evaluate the running results of QUAL2K and QUAL2E models, a simple statistical analysis was conducted. According to the statistical analysis, QUAL2K represented less relative error and coefficient of variation than QUAL2E in almost all of constituents. It was found that QUAL2K, which simulates the water quality more realistically, can be applied to control and manage the water problems of river or river-run reservoir effectively.

Relay Selection Algorithm for Two-way Multiple Relay Channels (양방향 다중 중계기 채널에서의 중계기 선택 기법)

  • Kang, Yoo-Keun;Lee, Jae-Hong
    • Journal of Broadcast Engineering
    • /
    • v.14 no.2
    • /
    • pp.134-143
    • /
    • 2009
  • In this paper, we propose a new relay selection algorithm for a two-way multiple relay channel. In the two-way multiple relay channel, two users exchange information with each other via multiple relays. The relays use a decode-and-forward or amplify-and-forward protocol, and exploit the combining process of the received packets to reduce the required channel resources. In the multiple relay network, diversity gain is achieved as the number of relays increases, and various schemes are proposed. In this paper, we propose a single best relay selection scheme based on instantaneous channel conditions. First of all, relays obtain the instantaneous channel state information in the handshaking process, and a single best relay is selected in a distributed methods prior to data transmissions. The relay selection metric is proposed so that the end-to-end channel condition is evaluated based on the intantaneous channel state informations. Simulation results show that the proposed relay selection algorithm achieve the increased throughput and diversity order when the number of potential relays is increased.

Design of CIC Interpolators with Improved Passband and Transition Region for Underwater Acousitc Communication (통과대역 및 전이영역 특성이 개선된 수중음파통신용 CIC 인터폴레이터 설계)

  • Kim, Sunhee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.660-665
    • /
    • 2018
  • Research into underwater wireless networks that enable the monitoring and controlling of the ocean environments has been continuing for disaster prevention and military proposes, as well as for the exploitation of ocean resources throughout the world. A research group led by Hoseo university has been studying a distributed underwater monitoring and controlling network. In this study, we developed an interpolator for acoustic communication between an underwater base station controller and underwater base station, which is included in this network. The underwater acoustic communication provided by this network defines four links whose sampling rates are different. Low power consumption is one of the most important requirements. Therefore, we adopted CIC interpolators, which are known to act as filters with a low power consumption, and some CIC interpolators with an appropriate changing rate were selected depending on the link. However, these interpolators have a large passband drop and wide transition region. To solve these problems, we added a compensator and half-band filter. After verifying the algorithm by using Matlab, we designed and verified it with Verilog-HDL in a ModelSim environment.

Handoff Improvement Method of an AP Choice for Guarantee of Mobile Node Network Performance according to Speed in Wireless LAN System (무선랜 시스템에서 속도에 따른 이동노드 네트워크 성능 보장을 위한 AP 선택 핸드오프 개선기법)

  • Kim, Dong-Geun;Park, Jae-Heung;Kim, Sang-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.64-71
    • /
    • 2010
  • When Handoff occurs at wireless network, existing AP search chooses one of various APs according to signal strength information. However, IEEE 802.11 uses Medium Access method with CSMA/CA that competes to obtain a channel by sharing medium. Therefore, network performance is heavily affected by the number of nodes and network congestion aside from signal strength. This scheme presented an additional AP selection indicator and a new handoff algorithm to realize handoff guaranteeing the network performance of mobile node in a process selecting new AP. This indicator is includes a handoff cost function reflecting the network information of mobile node, and the mobile node made handoff guaranteeing the network performance using network information possible by using this. also we classified the nodes into high-speed node and low-speed node. Then, when Handoff occurs, high-speed node was made itself choose AP by signal strength information. We also made the low-speed node choose its AP by using AP network information which is applied area. Hence, we demonstrate through simulation that gets an improvement in performance, even in the wireless network which many users concurrently access to, and it has considerable effects on aspects of resources and network management by distribution of users.

Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks (무선 메쉬 네트워크에서의 아이디 기반 프록시 암호화를 이용한 안전한 다대다 멀티캐스트 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.72-83
    • /
    • 2010
  • Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.

A Multicast Delivery Technique for VCR-like Interactions in Collaborative P2P Environment (협력 P2P 환경에서 VCR 기능을 위한 멀티캐스트 전송 기법)

  • Kim Jong-Gyung;Kim Jin-Hyuk;Park Seung-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7B
    • /
    • pp.679-689
    • /
    • 2006
  • Delivering multicast stream is one of the cost-saving approach in the large scale VOD environment. Because implementing VCR-like interactions for user's convenience in the multicast streaming system involves complex problems, we need the proper solutions for them. In this paper, we propose a hybrid scheme which uses the general P2P and the patching scheme with the Collaborative Interaction Streaming Scheme(CISS). CISS provides jumping functionability to the appropriate multicast session after VCR-like interaction in the environment in which multiple peers transmit VCR-like interaction streams to the VCR-like functionability request node to reduce the loads generated by frequent join or departure of peers at the multicast tree during providing VCR-like functionability. Therefore, with the proposed scheme we can distribute network traffic and reduce control overhead and latency. And to evaluate the performance of proposed scheme we compare it in the aspect of the performance of streaming delivery topology, control overhead and streaming quality with P2Cast[10] and DSL[11]. The simulation result shows that proposed P2Patching reduces about 30% of process overhead and enhances about $25{\sim}30%$ of streaming quality compared with DSL.

An Analysis Method of User Preference by using Web Usage Data in User Device (사용자 기기에서 이용한 웹 데이터 분석을 통한 사용자 취향 분석 방법)

  • Lee, Seung-Hwa;Choi, Hyoung-Kee;Lee, Eun-Seok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.189-199
    • /
    • 2009
  • The amount of information on the Web is explosively growing as the Internet gains in popularity. However, only a small portion of the information on the Web is truly relevant or useful to the user. Thus, offering suitable information according to user demand is an important subject in information retrieval. In e-commerce, the recommender system is essential to revitalize commercial transactions, raise user satisfaction and loyalty towards the information provider. The existing recommender systems are mostly based on user data collected at servers, so user data are dispersed over several servers. Therefore, web servers that lack sufficient user behavior data cannot easily infer user preferences. Also, if the user visits the server infrequently, it may be hard to reflect the dynamically changing user's interest. This paper proposes a novel personalization system analyzing the user preference based on web documents that are accessed by the user on a user device. The system also identifies non-content blocks appearing repeatedly in the dynamically generated web documents, and adds weight to the keywords extracted from the hyperlink sentence selected by the user. Therefore, the system establishes at an early stage recommendation strategies for the web server that has little user data. Also, user profiles are generated rapidly and more accurately by identifying the information blocks. In order to evaluate the proposed system, this study collected web data and purchase history from users who have current purchase activity. Then, we computed the similarity between purchase data and the user profile. We confirm the accuracy of the generated user profile since the web page containing the purchased item has higher correlation than other item pages.