• Title/Summary/Keyword: 호스트 시스템

Search Result 678, Processing Time 0.021 seconds

Optimizing Performance and Energy Efficiency in Cloud Data Centers Through SLA-Aware Consolidation of Virtualized Resources (클라우드 데이터 센터에서 가상화된 자원의 SLA-Aware 조정을 통한 성능 및 에너지 효율의 최적화)

  • Elijorde, Frank I.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.1-10
    • /
    • 2014
  • The cloud computing paradigm introduced pay-per-use models in which IT services can be created and scaled on-demand. However, service providers are still concerned about the constraints imposed by their physical infrastructures. In order to keep the required QoS and achieve the goal of upholding the SLA, virtualized resources must be efficiently consolidated to maximize system throughput while keeping energy consumption at a minimum. Using ANN, we propose a predictive SLA-aware approach for consolidating virtualized resources in a cloud environment. To maintain the QoS and to establish an optimal trade-off between performance and energy efficiency, the server's utilization threshold dynamically adapts to the physical machine's resource consumption. Furthermore, resource-intensive VMs are prevented from getting underprovisioned by assigning them to hosts that are both capable and reputable. To verify the performance of our proposed approach, we compare it with non-optimized conventional approaches as well as with other previously proposed techniques in a heterogeneous cloud environment setup.

A Study on QoS Improvement for Overlay Multicast Using Modified Dijkstra Algorithm (변형된 Dijkstra 알고리즘을 활용한 오버레이 멀티캐스트 QoS 향상 기법 연구)

  • Lee, Hyung-Ok;Nam, Ji-Seung;Park, Jun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.7
    • /
    • pp.3468-3473
    • /
    • 2013
  • Conditions that overlay multicast tree must satisfy for the real-time application system of a video-conference, an internet broadcasting is two things. First, the degree of nodes in a tree must be proper value. Second, the diameter of the multicast tree, distance between longest two users should be short. If the path between two users in the tree is long, the delay time in data transmission between two users great. So, it is not suitable to the application system such as video-conferences. In this paper, the cost of the dijkstra algorithm calculate with proposed score-function through checking the extra bandwidth, the delay and the requested bandwidth. It is composed the tree through the dijkstra algorithm.

Design and Implementation of the Evaluation Framework for Decentralized Multimedia Streaming Services

  • Park, Sangsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.91-100
    • /
    • 2020
  • This paper presents an evaluation framework for prototyping multimedia streaming services including audio and video in a distributed and/or decentralized storage that can evaluate service quality and performance under various network conditions. The evaluation framework focuses on important indicators which measure and improve service quality by applying decentralized storage to multimedia streaming services that can mimic the scalability of the existing server-client software architecture and the issue of a single point of failure. The integrated framework not only measures performance indicators for evaluating the quality and performance of multimedia streaming on open source based multimedia content streaming services, but also adjusts network quality using network virtualization technology for comprehensive evaluations. The experimental results show that the integrated framework has low overhead in building and operating a decentralized storage with multimedia streaming services on a single host computer which validates the scalability of the developed framework.

Implementation of 24-Channel Capacitive Touch Sensing ASIC (24 채널 정전 용량형 터치 검출 ASIC의 구현)

  • Lee, Kyoung-Jae;Han, Pyo-Young;Lee, Hyun-Seok;Bae, Jin-Woong;Kim, Eung-Soo;Nam, Chul
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.5
    • /
    • pp.34-41
    • /
    • 2011
  • This paper presents a 24 channel capacitive touch sensing ASIC. This ASIC consists of analog circuit part and digital circuit part. Analog circuits convert user screen touch into electrical signal and digital circuits represent this signal change as digital data. Digital circuit also has an I2C interface for operation parameter reconfiguration from host machine. This interface guarantees the stable operation of the ASIC even against wide operation condition change. This chip is implemented with 0.18 um CMOS process. Its area is about 3 $mm^2$ and power consumption is 5.3mW. A number of EDA tools from Cadence and Synopsys are used for chip design.

Enhancing the Performance of Multiple Parallel Applications using Heterogeneous Memory on the Intel's Next-Generation Many-core Processor (인텔 차세대 매니코어 프로세서에서의 다중 병렬 프로그램 성능 향상기법 연구)

  • Rho, Seungwoo;Kim, Seoyoung;Nam, Dukyun;Park, Geunchul;Kim, Jik-Soo
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.878-886
    • /
    • 2017
  • This paper discusses performance bottlenecks that may occur when executing high-performance computing MPI applications in the Intel's next generation many-core processor called Knights Landing(KNL), as well as effective resource allocation techniques to solve this problem. KNL is composed of a host processor to enable self-booting in addition to an existing accelerator consisting of a many-core processor, and it was released with a new type of on-package memory with improved bandwidth on top of existing DDR4 based memory. We empirically verified an improvement of the execution performance of multiple MPI applications and the overall system utilization ratio by studying a resource allocation method optimized for such new many-core processor architectures.

이동형 의료영상 장치를 위한 JPEG2000 영상 뷰어 개발

  • 김새롬;김희중;정해조;강원석;이재훈;이상호;신성범;유선국
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2003.09a
    • /
    • pp.81-81
    • /
    • 2003
  • 목적 : 현재, 많은 병원이 방사선과 의료영상정보를 기존의 필름형태로 판독하고, 진료하는 방식에서 PACS 를 도입하여 디지털 형태로 영상을 전송, 저장, 검색, 판독하는 환경으로 변화하고 있다. 한편, PACS 가 가지는 가장 큰 제한점은 휴대성의 결핍이다. 본 연구는 이동형 장치가 가지는 호스트의 이동성 및 휴대성의 장점들을 살리면서, 무선 채널 용량의 한계, 무선 링크 사용이라는 제약점들을 감안하여 의료영상을 JPEG2000 영상압축 방식으로 부호화한 후 무선 환경을 고려한 전송 패킷의 크기를 결정하고자 하였으며, 무선 통신 중 발생되는 패킷 손실에 대응하기 위한 자동 오류 수정 기능도 함께 구현하고자하였다. 방법 : Window 2000 운영체계에서 의료영상을 로드하고, 데이터베이스화하며, 저장하고, 다른 네트워크와 접속, 제어가 가능한 PC급 서버를 구축하였다. 영상데이터는 무선망을 통해 전송하기 때문에 가장 높은 압축비율을 지원하면서 에너지 밀도가 높은 JPEG2000 알고리즘을 사용하여 영상을 압축하였다. 또한, 무선망 사용으로 인한 패킷 손실에 대비하여, 영상을 JPEG2000 방식으로 부호화한 후 각 블록단위로 전송하였다. 결과 : PDA에서 JPEG2000 영상을 복호화 하는데 걸리는 시간은 256$\times$256 크기의 MR 뇌영상의 경우 바로 확인할 수 있었지만, 800$\times$790 크기의 CR 흉부 영상의 경우 약 5 초 정도의 시간이 걸렸다. CDMA 1X(Code Division Multiple Access 1st Generation) 모듈을 사용하여 영상을 전송하는 경우, 256 byte/see 정도에서는 안정된 전송 결과를 보여주었고, 1 Kbyte/see 정도의 전송의 경우 중간 중간에 패킷이 손실되는 결과를 관찰할 수 있었다. 반면 무선 랜의 경우 이보다 더 큰 패킷을 전송하더라도 문제점은 발견되지 않았다. 결론 : 현재의 PACS는 유선과 무선사이의 인터페이스의 부재로 인해 유무선 연동이 되지 못하고 있다. 따라서 이동형 JPEG2000 영상 뷰어는 PACS가 가지는 문제점인 휴대성을 보완하기 위하여 개발되었다. 또한 무선망이 가지는 데이터 손실에 대하여서도 허용할 수 있는 범위에서 재전송을 가능하게 함으로서 약한 연결성을 보완하였다. 본 JPEG2000 영상 뷰어 시스템은 기존 유선상의 PACS와 이동형 장치간에 유기적인 인터페이스 역할을 하리라 기대된다.

  • PDF

Performance Evaluation and Analysis of NVMe SSD (Non-volatile Memory Express 인터페이스 기반 저장장치의 성능 평가 및 분석)

  • Son, Yongseok;Yeom, Heon Young;Han, Hyuck
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.7
    • /
    • pp.428-433
    • /
    • 2017
  • Recently, the demand for high performance non-volatile memory storage devices that can replace existing hard disks has been increasing in environments requiring high performance computing such as data-centers and social network services. The performance of such non-volatile memory can greatly depend on the interface between the host and the storage device. With the evolution of storage interfaces, the non-volatile memory express (NVMe) interface has emerged, which can replace serial attached SCSI and serial ATA (SAS/SATA) interfaces based on existing hard disks. The NVMe interface has a higher level of scalability and provides lower latency than traditional interfaces. In this paper, an evaluation and analysis are conducted of the performance of NVMe storage devices through various workloads. We also compare and evaluate the cost efficiency of NVMe SSD and SATA SSD.

Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agents in Pure P2P Network Environments (순수 P2P 네트워크 환경에서 에이전트 이주를 위한 자원 예약 기반 동적 부하 균형 기법)

  • Kim, Kyung-In;Kim, Young-jin;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.11A no.4
    • /
    • pp.257-266
    • /
    • 2004
  • Mobile agents are defined as processes which can be autonomously delegated or transferred among the hosts in a network in order to perform some computations on behalf of the user and co-operate with other agents. Currently, mobile agents are used in various fields, such as electronic commerce, mobile communication, parallel processing, search of information, recovery, and so on. In pure P2P network environment, if mobile agents that require computing resources rashly migrate to another peers without consideration on the peer's capacity of resources, the peer may have a problem that the performance of the peer is degraded due to lack of resources. To solve this problem, we propose resource reservation based load balancing scheme of using RMA(Resource Management Agent) that monitors workload information of the peers and that decides migrating agents and destination peers. In mobile agent migrating procedure, if the resource of specific peer is already reserved, our resource reservation scheme prevents other mobile agents from allocating the resource.

An Efficient Cluster Routing Protocol Based on 2-level Tree for Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 에너지 효율적인 2-level 트리 기반의 클러스터 라우팅 프로토콜)

  • Lee, Young Joon;Kim, Sung Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.155-162
    • /
    • 2014
  • We proposed a 2 level tree based cluster based routing protocol for mobile ad hoc networks. it is our crucial goal to establish improved clustering's structure in order to extend average node life-time and elevate the average packet delivery ratio. Because of insufficient wireless resources and energy, the method to form and manage clusters is useful for increasing network stability. but cluster-head fulfills roles as a host and a router in clustering protocol of Ad hoc networks environment. Therefore energy exhaustion of cluster-head causes communication interruption phenomenon. Effective management of cluster-head is key-point which determines the entire network performance. The scheme focuses on improving the performance the life time of the network and throughput through the management of cluster-heads and its neighbor nodes. In simulation, we demonstrated that it would obtain averagely better 17% performance than LS2RP.

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF