• Title/Summary/Keyword: 정보통신 서비스

Search Result 10,433, Processing Time 0.038 seconds

GPGPU Task Management Technique to Mitigate Performance Degradation of Virtual Machines due to GPU Operation in Cloud Environments (클라우드 환경에서 GPU 연산으로 인한 가상머신의 성능 저하를 완화하는 GPGPU 작업 관리 기법)

  • Kang, Jihun;Gil, Joon-Min
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.9
    • /
    • pp.189-196
    • /
    • 2020
  • Recently, GPU cloud computing technology applying GPU(Graphics Processing Unit) devices to virtual machines is widely used in the cloud environment. In a cloud environment, GPU devices assigned to virtual machines can perform operations faster than CPUs through massively parallel processing, which can provide many benefits when operating high-performance computing services in a variety of fields in a cloud environment. In a cloud environment, a GPU device can help improve the performance of a virtual machine, but the virtual machine scheduler, which is based on the CPU usage time of a virtual machine, does not take into account GPU device usage time, affecting the performance of other virtual machines. In this paper, we test and analyze the performance degradation of other virtual machines due to the virtual machine that performs GPGPU(General-Purpose computing on Graphics Processing Units) task in the direct path based GPU virtualization environment, which is often used when assigning GPUs to virtual machines in cloud environments. Then to solve this problem, we propose a GPGPU task management method for a virtual machine.

PDO Packing Mechanism for Reducing CANopen Network Utilization (CANopen 네트워크 이용률 감소를 위한 PDO 패킹 메커니즘)

  • Kang, Min-Koo;Park, Kie-Jin;Kim, Jong-Cheol
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.2
    • /
    • pp.124-133
    • /
    • 2009
  • CANopen which is one of the in-vehicle network (IVN) protocols is adopted to solve the hardware dependency problem of the CAN-based application. CANopen makes different CAN devices interoperable each others. By the advantage of the device profiling concept, it can make the period of developing CAN-based application system shorten. The utilization of CANopen network must be reduced to improve the communication performance (e.g. worst-case response time). For reducing network utilization, messages need to be packed as many as possible so that message frame overhead can be decreased. In this paper, we suggested a PDO packing mechanism using object dictionary (OD) and process data object (PDO) communication service in CANopen. Through experiments, the performance of the mechanism is evaluated with SAE benchmark. As a result, network utilization is decreased about 10% compared to the result of the previous works.

A Study on the Variable Password Generation Method in Internet Authentication System (변동형 비밀번호 생성방법 및 이를 이용한 인터넷 인증 시스템에 관한 연구)

  • Kang, Jung-Ha;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1409-1415
    • /
    • 2013
  • With the development of Internet communication and the use of a variety of online services has been greatly expanded. Therefore, the importance of authentication techniques for users of online services has increased. The most commonly used methods for user authentication is a technique that utilizes a prearranged password. However, the existing password scheme for authentication must use the same password every time. Therefore, the password being leaked by attackers, it can be used maliciously. In this paper, we proposed the Variable Password Generation Method in Internet Authentication System that generates a new password using information such as the access date, time, and IP address when user logs in. The method proposed in this paper prevents disclosure of personal information due to password exposure and improves the reliability and competitiveness in the field of security systems.

Channel Scheduling Policies for Batching in VOD System (VOD 시스템에서 일괄전송을 위한 채널 스케줄링 기법)

  • Park, Ho-Gyun;Yu, Hwang-Bin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.385-395
    • /
    • 1999
  • Video-On-demand system provides electronic video rental services from remote video servers on a broadband communication networks. When we assume some situation that serve the same video stream by batching, each time single video stream became available at server-end side, we face the problem that what video stream to be scheduled at what time instant. Hence, in order to manage the resource bandwidth which is different at each stream, the policy of channel allocation became important factor. In this work, we proposed three type of scheduling policies with queueing, as are cumulative Waiting Time(CWT), Mean Waiting Time(MWT) and Predictable Popular Factor(PPF). While CWT policy is good for popular video, MWT policy was good for non-popular video. Also, we know that PPT policy has some fairness for average wait time and reneging rate of user requests.

  • PDF

Geographic and Energy Aware Geocasting in Ad-Hoc Networks (Ad-Hoc 네트워크에서 위치와 에너지를 고려한 지오캐스팅 알고리즘)

  • Lee Ju-Young
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.75-84
    • /
    • 2004
  • Geocasting, a variant of the conventional multicasting problem, is one of communication type in which the data packets are delivered to a group of all nodes within a specified geographical region (i.e., the geocasting region) and is called location-based multicasting(LBM)(l). An Ad-hoc network is a dynamically reconfigurable and temporary wireless network where all mobile devices using batteries as energy resources cooperatively maintain network connectivity without central administration or the assistance of base stations. Consequently, the technique to efficiently consume the limited amounts of energy resources is an important problem so that the system lifetime is maximized. In this paper, we propose a LBPA(Location-Based Power Aware) geocasting algorithm that selects energy-aware neighbor to route a packet towards the target region In Ad-hoc network environments. The method Is such that the energy consumption is balanced among the nodes in proportion to their energy reserves. Through the simulations, the proposed LBPA algorithm shows better results, that is, as good as 40% on the average over the conventional LBM algorithm in terms of the network lifetime.

  • PDF

AP-Initiated Flow Redirection Mechanism for AP Load Balancing in WLAN Environments (무선랜 환경에서 AP 로드 밸런싱을 위한 AP-개시 플로우 리다이렉션 메커니즘)

  • Kim, Mi-Hui;Chae, Ki-Joon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.65-73
    • /
    • 2009
  • IEEE802.11 Wireless LAN(WLAN) is being widely used in public space such as airport, and increases the networking boundary in campus and enterprise, and it has lastly attracted considerable attention for mesh network and converged network with other 3G mobile communication networks. In WLAN, load balancing among Access Points(AP) is an important issue for efficient resource management or supporting the Quality of Service(QoS) of traffic, but most researches focused on the AP selection in network entry or roaming of Stations(STA). In this paper, we propose an AP-Initiated Flow Redirection(FR) for AP load balancing by monitoring AP's availability in the true sense. When the AP's resource becomes almost saturated, that is used more than a specific threshold, the AP queries the roaming possible neighbor APs about their availability and calculates the distribution of traffic load with statistical methods such as entropy or chi-square. Finally, the AP decides flows and new APs for redirection and performs it. Our simulation results show that our FR mechanism increases the performance in the various views.

  • PDF

A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity (사용자 익명성을 제공하는 스마트카드 기반 원격 인증 프로토콜)

  • Baek, Yi-Roo;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.229-239
    • /
    • 2009
  • To solve user authentication problem, many remote user authentication schemes using password and smart card at the same time have been proposed. Due to the increasing of interest in personal privacy, there were some recent researches to provide user anonymity. In 2004, Das et al. firstly proposed an authentication scheme that guarantees user anonymity using a dynamic ID. In 2005, Chien et al. pointed out that Das et al.'s scheme has a vulnerability for guaranteing user anonymity and proposed an improved scheme. However their authentication scheme was found some weaknesses about insider attack, DoS attack, and restricted replay attack. In this paper, we propose an enhanced scheme which can remove vulnerabilities of Chien et al.'s scheme. The proposed authentication protocol prevented insider attack by using user's Nonce value and removed the restricted replay attack by replacing time stamp with random number. Furthermore, we improved computational efficiency by eliminating the exponentiation operation.

  • PDF

Design and Implementation of a Request and Response Process on Help-Requesting Mobile Application (모바일 도움요청 어플리케이션에서의 요청 및 상호 대응 프로세스 설계)

  • An, Sung-Eun;Lim, Soon-Bum;Kim, Min-Jeong;You, Soo-Yeon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.320-326
    • /
    • 2015
  • With the growing concern over frequent occurrences of criminal events, help-requesting mobile applications have drawn attention. However, existing applications solely focus on providing help-requesting services. Therefore, in this paper, we design and implement a help request and response process which allows users to request help by sending messages and locating their friends, acquaintances and even near-by application users, and to allow help be reached by forwarding messages. This application is composed of three parts: help-requesting, help-responding, and checking-status. This application is developed on the Android platform where we exchange users' longitude and latitude through web server communication. We conducted test to verify the effectiveness of the forwarding function, and it has been confirmed that 93.33% of subjects used the forwarding function to help users at risk.

A Study on Privacy Protect Scheme of RFID Provide Synchronization using Random Number (난수를 이용하여 동기화를 제공하는 RFID 프라이버시 보호 기법에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.623-630
    • /
    • 2007
  • With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because of individuals identification is important in ubiquitous environment, RFID, a technology used frequently. RFID, a technology that radio frequency identification, reader send signer, then tag provide user information. RFID has various strengths, such as high recognition rates, quick recognition speed, but Eavesdropping is possible and problem that user information is revealed happens. To solve this, study is proceeded with activity, but, because of low-cost passive tag is limited operation capability, usually used hash function and random number. Also updates value that is used to present session and uses in next session. Therefore, this scheme protects user privacy using random number. And this sheme can offer synchronization by creating variable value without updating value.

  • PDF

Proposal of Youngjong-do 112 Block Demo-Plant for Application of Smart Water Grid (SWG 적용성을 위한 영종도 112블록 데모플랜트 구축 방안)

  • Han, Kuk Heon;Park, Hyun Ki;Kim, Young Hwa
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.108-108
    • /
    • 2016
  • 스마트워터그리드(Smart Water Grid; 이하 SWG)란 현재 직면에 있는 물 부족, 물 안보, 물 복지 등 물에 대한 문제를 ICT 기술을 활용하여 물관리의 새로운 패러다임을 제시할 수 있는 융합 기술이다. 즉, SWG는 기존의 수자원 관리 시스템의 한계를 극복하기 위해 첨단 정보통신기술을 이용하는 고효율의 차세대 인프라 시스템으로 다양한 수원을 활용하고 물을 효율적으로 배분 관리 운송하여 수자원의 불균형을 해소하고, 첨단센서네트워크를 이용해 용수관리 전분야에 걸쳐 양방향 실시간으로 용수정보를 감시 대응하여 용수관리와 에너지 효율의 최적화된 메가시티(mega-city)에 적합한 지능형 물관리가 가능할 것으로 예상되는 시스템이다. 따라서 국토교통부 과제로 추진중인 SWG 연구단에서 개발한 스마트 워터 기술을 영종도 112 블록에 적용하여 지역주민의 물복지 향상 및 물 사용자에 대한 소비자 만족도를 높이는데 목적을 두고 데모플랜트를 구축 방안을 수립하였다. 영종도 112블록(인천 운서동 및 운북동 일원)은 인천 공촌정수장에서 해저관로를 지나 영종통합 가압장에서 가압 후 공항신도시배수지에서 물을 공급받고 있는 지역으로 면적은 $17.41km^2$, 인구는 약 17,000명, 물사용량 $8,000m^3$/일, 총관로연장 약 55km, 유수율이 겨우 73.2% 지역이다. SWG 적용성 평가를 위해 영종도 112 블록에 유수율 제고 및 운영비용 저감을 목적으로 데모플랜트를 구축하였다. 스마트 계측을 위해 스마트미터 469개(15~20mm), 디지털미터 172개(25~200mm), 누수유무센서 1개소, 다항목 수질측정기 1개소, 유량계 3개소, 수압계 5개소, AMI 시스템 641개 및 물효율 운영프로그램과 물정보 App서비스 기능으로 구성하였다. 물효율 운영프로그램은 실시간 수요량 예측, 배수지 운영에 따른 취수량, 송수량, 펌프 대수조합 및 운전스케줄링이 가능한 경제적 물공급 스케줄링, 관망상태 감시 및 제어(실시간 유량/수압 분석을 통한 누수분석) 기능이 탑재되어 통합운영센터에서 운영할 계획이다. 데모플랜트 운영을 통해 수자원의 효율적인 배분 및 공급, 유지관리 향상, 운영 비용 최소화 등의 결과를 바탕으로 신도시 및 기존도시의 물관리 정책수립에 활용할 수 있을 뿐만아니라 시간적 공간적 불균형 해소 및 물시장 발전에 크게 기여할 것으로 사료된다.

  • PDF