• Title/Summary/Keyword: Deployment Service

Search Result 349, Processing Time 0.026 seconds

On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks

  • Karimi, Hamid;Kargahi, Mehdi;Yazdani, Nasser
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.413-434
    • /
    • 2010
  • Wireless sensor networks are usually characterized by dense deployment of energy constrained nodes. Due to the usage of a large number of sensor nodes in uncontrolled hostile or harsh environments, node failure is a common event in these systems. Another common reason for node failure is the exhaustion of their energy resources and node inactivation. Such failures can have adverse effects on the quality of the real-time services in Wireless Sensor Networks (WSNs). To avoid such degradations, it is necessary that the failures be recovered in a proper manner to sustain network operation. In this paper we present a dynamic Energy efficient Real-Time Job Allocation (ERTJA) algorithm for handling node failures in a cluster of sensor nodes with the consideration of communication energy and time overheads besides the nodes' characteristics. ERTJA relies on the computation power of cluster members for handling a node failure. It also tries to minimize the energy consumption of the cluster by minimum activation of the sleeping nodes. The resulting system can then guarantee the Quality of Service (QoS) of the cluster application. Further, when the number of sleeping nodes is limited, the proposed algorithm uses the idle times of the active nodes to engage a graceful QoS degradation in the cluster. Simulation results show significant performance improvements of ERTJA in terms of the energy conservation and the probability of meeting deadlines compared with the other studied algorithms.

A New Approach to Evaluation of Industrial Informatization (차세대 기업 정보화수준 평가 시스템에 관한 연구)

  • Leem, Choon-Seong;Yu, Eun-Jung;Kim, Byeong-Wan;Shin, Seon-Do;Lee, Byeong-Ryul;Cha, Jeong-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.4
    • /
    • pp.125-144
    • /
    • 2008
  • Recently, the main concerns of enterprise management activities is how to strengthen the competitiveness to quickly respond to changes and sustain the growth in business environment. As IT(Information Technology) has become to be viewed as a key driver for the business competitiveness, new paradigms, such as business and IT alignment, IT-driven product/service innovation and so on, are regarded as the hot topic in many industries. However, previous studies related to IT evaluation, which is more critical than any other IT activities, have focused on quantitative IT deployment, utilization and its economical effects. Therefore, this study presents the newly-developed evaluation domains and items based on four pairs of relative concepts in industrial informatization, and their multi-dimensional analysis methodology which explains various types of IT characteristics of enterprises. And finally, pilot tests at 2 companies in financial service sector will be performed in order to verify the practicality of the evaluation system.

  • PDF

Database PasS web service system using Docker

  • Hur, Tai-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.51-58
    • /
    • 2020
  • Most of the students in computer-related departments work on projects, and it is essential to use a database for project execution. To use such a database, it is necessary to install a Database Management System. However, it takes several minutes (hours) to install a DBMS, and some DBMS require a difficult installation process. Therefore, in order to solve this problem, this study proposed a system that can easily install DBMS using Docker. Docker is an open source project that automates the deployment of Linux applications into software containers. Docker Container is wrapped in a complete file system that includes everything necessary for the execution of software, and includes code, runtime, system tools, system libraries, and anything that is installed on the server. This guarantees that they will always run the same regardless of the environment in which they are running. After creating a database using this proposed system, you can check the database access information on the web and check the server status in minutes. As a result of of implementing this proposed system and applying it to the projects of 10 teams, the installation time was reduced by 94.5% for Maria DBMS and 98.3% for Oracle DBMS than individual installation, confirming improved efficiency.

Effective Frequency Reuse Scheme for OFDMA Cellular Multihop Networks for Improving Cell Throughput with Low Outage Ratio (OFDMA 셀룰러 다중홉 네트워크에서 셀 용량을 증가시키는 효율적인 주파수 재활용 방법)

  • Lim, Sung-Gook;Jeon, Hahn-Earl;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1198-1206
    • /
    • 2010
  • Recently smart phone and tablet PC are regarded as the most valuable mobile devices, so the demand of customers for multimedia supporting has been greatly increased. The network operators are now considering the deployment of relay stations ensuring low installation costs for its service cell to improve the cell capacity. Enhancing the relay stations, however, increases intra-cell interference, which is affecting the quality of service and outage ratio. In this paper, we present MPFR(Multihop Partial Frequency reuse) as the new frequency reuse scheme to increase cell throughput while maintaining low outage ratio for the OFDMA cellular multihop networks. Dynamic power control is also introduced to improve cell capacity. Overall cell throughput and outage ratio are observed by the simulation, and comparison between MPFR and conventional multihop frequency reuse schemes is convincing the performance enhancement.

Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System (CCTV 대체용 네트워크 카메라의 보안 강화를 위한 다중 접근권한 프락시 서버 구현)

  • Bae, Kwang-Jin;Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2011
  • This paper introduces security problems on the video surveillance systems where the network cameras are equipped at remote places and isolated from the updated and secure environment and proposes a framework for a proxy server that is delegated to connect to network cameras by providing a secure connections from the clients. The server in the framework is deployed within a secure network, secretes the information for connection to cameras and authenticates the clients. Additionally, it provides a secure video service incorporating multi-level privileges for both images and clients through a encryption key distribution and management facility. Through an implementation of the server and a its deployment, it was proved that In this server implement to multi network camera and we confirm compare direct access to network camera equal video quality of service and it can be protection network camera. We expect that can be secure and integral management about traditional network camera through experimental result.

A Study of Logical Network Monitoring System Architecture for Research Group (응용연구 그룹별 논리 네트워크 모니터링 시스템 구조 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.75-83
    • /
    • 2012
  • Recent science technology research network moves to establish logical private network among specific research groups such as high energy physics and climate, requiring to implement private network by group for each purpose. Up to now, national research networks such as KREONET service high capacity logical private networks. Therefore standardized configuration and management scheme is essential for the deployment of logical private network. In this study, we propose the core service element and protocols for the logical networks over Layer 2 networks. We also propose system architecture that make monitoring and management easier. After that we design and implement monitoring map for logical network based on scheme. For this purpose, we also propose the description system for logical research network to provide data such as operation information, formation information, performance information and failure information of network infrastructure resource.

Energy-Aware Virtual Machine Deployment Method for Cloud Computing (클라우드 컴퓨팅 환경에서 사용패턴을 고려한 에너지 효율적인 가상머신 배치 기법)

  • Kim, Minhoe;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.61-69
    • /
    • 2015
  • Through Virtual Machine technology(VM), VMs can be packed into much fewer number of physical servers than that of VMs. Since even an idle physical server wastes more than 60% of max power consumption, it has been considered as one of energy saving technologies to minimize the number of physical servers by using the knapsack problem solution based on the computing resources. However, this paper shows that this tightly packed consolidation may not achieve the efficient energy saving. Instead, a service pattern-based VM consolidation algorithm is proposed. The proposed algorithm takes the service time of each VM into account, and consolidates VMs to physical servers in the way to minimize energy consumption. The comprehensive simulation results show that the proposed algorithm gains more than 30% power saving.

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

WOBR : A WebDAV-Based OSGi Bundle Repository Supporting Effective Group Access (WOBR : 효과적인 그룹별 접근을 지원하는 웹데브 기반의 OSGi 번들 저장소)

  • Park, Jong-Moon;Park, Yang-Soo;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.521-533
    • /
    • 2010
  • The OSGi framework is a java-based service platform that can be remotely managed, providing an application life cycle management model, a service registry and an execution environment. Based on the framework, various OSGi layers, APIs, and services have been defined. A bundle is an application that can be executed in the OSGi framework, deployed through a bundle repository. Usually, bundles in the repository are accessible via a designated web page. Unfortunately, the current bundle repositories do not provide any kind of group access services and dynamic bundle installation and deployment. In this paper, we describe a WebDAV-Based OSGi bundle repository named WOBR, which supports effective group-based accesses. WOBR is composed of a WOBR bundle repository, a management bundle and an access bundle that interact with the bundle repository. The management bundle is for configuration of the WOBR bundle repository, managing group access facility to the repository. The access bundle provides access to the repository and search mechanism for the bundles. Additionally, it provides the life cycle management of the installed bundles on the local environment.

Work smart development framework based service scenarios (중소기업 스마트워크 표준화 추진방향)

  • Min, J.H.;Park, J.Y.;Kang, S.G.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.811-814
    • /
    • 2014
  • There is increasing interest in the introduction of smart work as a flexible working form to perform a task without restrictions of time and place by using the information and communication technology as a creative innovative capacity has become an important element of enterprise competitiveness. However, because of the lack of understanding about smart work and concrete practices, most local SMEs are staying at the beginning of introducing the smart work. It is required to provide the standard of a smart work common structure and interface to quickly develop smart work services in a standardized way for SMEs and promote the deployment of the smart work in this environment. In this paper, we present standard development directions for the smart work service common structure and component interface to develop specialized services according to the size, the purpose and the needs of local SMEs.

  • PDF