• 제목/요약/키워드: Offload

Search Result 86, Processing Time 0.028 seconds

Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration

  • Nandhini, Uma;TamilSelvan, Latha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3916-3936
    • /
    • 2014
  • Smartphone applications like games, image processing, e-commerce and social networking are gaining exponential growth, with the ubiquity of cellular services. This demands increased computational power and storage from mobile devices with a sufficiently high bandwidth for mobile internet service. But mobile nodes are highly constrained in the processing and storage, along with the battery power, which further restrains their dependability. Adopting the unlimited storage and computing power offered by cloud servers, it is possible to overcome and turn these issues into a favorable opportunity for the growth of mobile cloud computing. As the mobile internet data traffic is predicted to grow at the rate of around 65 percent yearly, even advanced services like 3G and 4G for mobile communication will fail to accommodate such exponential growth of data. On the other hand, developers extend popular applications with high end graphics leading to smart phones, manufactured with multicore processors and graphics processing units making them unaffordable. Therefore, to address the need of resource constrained mobile nodes and bandwidth constrained cellular networks, the computations can be migrated to resourceful servers connected to cloud. The server now acts as a bridge that should enable the participating mobile nodes to offload their computations through Wi-Fi directly to the virtualized server. Our proposed model enables an on-demand service offloading with a decision support system that identifies the capabilities of the client's hardware and software resources in judging the requirements for offloading. Further, the node's location, context and security capabilities are estimated to facilitate adaptive migration.

Packet Off-Loading Scheme Using a Femto-Cell Local Gateway and D2D Communication at Remote Shipyards (원격 조선소의 펨토셀 로컬 게이트웨이와 D2D 통신 기술을 이용한 패킷 오프로드 방식)

  • Han, Kyeongil;Cho, Yongcheon;Lee, Seongro;Min, Sangwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1139-1145
    • /
    • 2014
  • In shipyard site, a ship is constructed by integrating lots of modules that are made in several sites with different capabilities and specifications. Recently, it needs to make a shipyard to be smart communicating various multimedia information with wired and wireless broadband networks between hierarchical shipyards. In this paper, we propose an additional function of an LTE femtocell local gateway at a remote shipyard, an information exchange method between hierarchical shipyards, and an offload method to separate the general traffic. To reduce traffic of duplicated requests in shipyard, we apply a D2D communication scheme for supporting communication between shipyard equipments without IP service network. Hence, it is expected to increase the productivity of shipyard industry with mobile communications, D2D and broadband Internet technologies.

Design and Simulation of a Flow Mobility Scheme Based on Proxy Mobile IPv6

  • Choi, Hyon-Young;Min, Sung-Gi;Han, Youn-Hee;Koodli, Rajeev
    • Journal of Information Processing Systems
    • /
    • v.8 no.4
    • /
    • pp.603-620
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) is a network-based mobility support protocol and it does not require Mobile Nodes (MNs) to be involved in the mobility support signaling. In the case when multiple interfaces are active in an MN simultaneously, each data flow can be dynamically allocated to and redirected between different access networks to adapt to the dynamically changing network status and to balance the workload. Such a flow redistribution control is called "flow mobility". In the existing PMIPv6-based flow mobility support, although the MN's logical interface can solve the well-known problems of flow mobility in a heterogeneous network, some missing procedures, such as an MN-derived flow handover, make PMIPv6-based flow mobility incomplete. In this paper, an enhanced flow mobility support is proposed for actualizing the flow mobility support in PMIPv6. The proposed scheme is also based on the MN's logical interface, which hides the physical interfaces from the network layer and above. As new functional modules, the flow interface manager is placed at the MN's logical interface and the flow binding manager in the Local Mobility Anchor (LMA) is paired with the MN's flow interface manager. They manage the flow bindings, and select the proper access technology to send packets. In this paper, we provide the complete flow mobility procedures which begin with the following three different triggering cases: the MN's new connection/disconnection, the LMA's decision, and the MN's request. Simulation using the ns-3 network simulator is performed to verify the proposed procedures and we show the network throughput variation caused by the network offload using the proposed procedures.

A Long-Term Friction Test of Bridge Bearings Considering Running Speed of Next Generation Train (차세대 고속철 주행속도를 대비한 교량받침의 장기마찰시험법)

  • Oh, Soon-Taek;Lee, Dong-Jun;Jun, Sung-Min;Jeong, Shin-Hyo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.2
    • /
    • pp.34-39
    • /
    • 2016
  • Structural behaviour of PSC box bridge, on which KTX train runs, is analysed up to 500 km/h speed considering 12 stages track irregularity and interaction between bridge and vehicle. To evaluate wheel forces and rotations of vehicle, lateral wheel forces, derail factor and offload factor calculated on the track combining the bridge and 170 m normal track are compared with existing allowed limits. Maximum longitudinal displacement and accumulated sliding distance of the brige bearings for simply supported and 2 span continuous PSC bridges are presented by each running speeds. Long-term friction tests based on EN-1337-2 are conducted between PTFE and DP-mate plates. Finally, the long-term friction tests are proposed to consider the increasing speed of next generation high-speed train.

Pratical Offloading Methods and Cost Models for Mobile Cloud Computing (모바일 클라우드 컴퓨팅을 위한 실용적인 오프로딩 기법 및 비용 모델)

  • Park, Min Gyun;Zhe, Piao Zhen;La, Hyun Jung;Kim, Soo Dong
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.73-85
    • /
    • 2013
  • As a way of augmenting constrained resources of mobile devices such as CPU and memory, many works on mobile cloud computing (MCC), where mobile devices utilize remote resources of cloud services or PCs, /have been proposed. A typical approach to resolving resource problems of mobile nodes in MCC is to offload functional components to other resource-rich nodes. However, most of the current woks do not consider a characteristic of dynamically changed MCC environment and propose offloading mechanisms in a conceptual level. In this paper, in order to ensure performance of highly complex mobile applications, we propose four different types of offloading mechanisms which can be applied to diverse situations of MCC. And, the proposed offloading mechanisms are practically designed so that they can be implemented with current technologies. Moreover, we define cost models to derive the most sutilable situation of applying each offloading mechanism and prove the performance enhancement through offloadings in a quantitative manner.

Outpatient Percutaneous Flexor Tenotomy for Diabetic Claw Toe Deformity with Ulcer (궤양을 동반한 당뇨성 갈퀴 족지에 대하여 외래에서 시행한 경피적 굴곡건 절단술)

  • Lee, Dong-Hun;Chung, Jin-Wha
    • Journal of Korean Foot and Ankle Society
    • /
    • v.22 no.4
    • /
    • pp.151-155
    • /
    • 2018
  • Purpose: Toe ulcers have been implicated as a causative factor in diabetic foot amputation. The aim of this study was to evaluate the outcomes of percutaneous needle flexor tenotomies of diabetic claw toes with ulcers or pending ulcers. Materials and Methods: The authors undertook a retrospective chart review between January 2014 and June 2016 to identify those patients who underwent a percutaneous needle flexor tenotomy for diabetic claw toe deformities. We evaluated 54 toes in 42 patients. Twenty-four patients were female and the mean age at the time of operation was 57 years. The mean follow-up time was 11 months. Thirty-four patients (46 toes) had tip toe ulcers or pending ulcers and 8 patients (8 toes) had dorsal pending ulcers. All patients had palpable pulses and good capillary refill. Results: Forty-three of 46 tip toe ulcers (93.5%) healed without significant complications and 8 dorsal ulcers showed no specific changes within 5 weeks. There were no recurrent ulcers at final follow-up. Four patients developed transfer lesion of the adjacent toe and needed subsequent tenotomy. Conclusion: Percutaneous needle tenotomy in an outpatient clinic was an effective and safe method for treating toe ulcers in neuropathic patients to offload the tip of the toe so that ulcer healing could occur.

Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card (TCP 플러딩 공격 방어를 위한 네트워크 인터페이스용 고성능 TCP 프락시 제어 로직 구현)

  • Kim, Byoung-Koo;Kim, Ik-Kyun;Kim, Dae-Won;Oh, Jin-Tae;Jang, Jong-Soo;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.119-129
    • /
    • 2011
  • TCP-related Flooding attacks still dominate Distributed Denial of Service Attack. It is a great challenge to accurately detect the TCP flood attack in hish speed network. In this paper, we propose the NIC_Cookie logic implementation, which is a kind of security offload engine against TCP-related DDoS attacks, on network interface card. NIC_Cookie has robustness against DDoS attack itself and it is independent on server OS and external network configuration. It supports not IP-based response method but packet-level response, therefore it can handle attacks of NAT-based user group. We evaluate that the latency time of NIC_Cookie logics is $7{\times}10^{-6}$ seconds and we show 2Gbps wire-speed performance through a benchmark test.

Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network

  • Li, Zhiwei;Lu, Yu;Wang, Zengguang;Qiao, Wenxin;Zhao, Donghao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4682-4705
    • /
    • 2020
  • The Unmanned Aerial Vehicles (UAV) networks consisting of low-cost UAVs are very vulnerable to smart jammers that can choose their jamming policies based on the ongoing communication policies accordingly. In this article, we propose a novel cloud and edge-aided mobile communication scheme for low-cost UAV network against smart jamming. The challenge of this problem is to design a communication scheme that not only meets the requirements of defending against smart jamming attack, but also can be deployed on low-cost UAV platforms. In addition, related studies neglect the problem of decision-making algorithm failure caused by intermittent ground-to-air communication. In this scheme, we use the policy network deployed on the cloud and edge servers to generate an emergency policy tables, and regularly update the generated policy table to the UAVs to solve the decision-making problem when communications are interrupted. In the operation of this communication scheme, UAVs need to offload massive computing tasks to the cloud or the edge servers. In order to prevent these computing tasks from being offloaded to a single computing resource, we deployed a lightweight game algorithm to ensure that the three types of computing resources, namely local, edge and cloud, can maximize their effectiveness. The simulation results show that our communication scheme has only a small decrease in the SINR of UAVs network in the case of momentary communication interruption, and the SINR performance of our algorithm is higher than that of the original Q-learning algorithm.

An Offloading Scheduling Strategy with Minimized Power Overhead for Internet of Vehicles Based on Mobile Edge Computing

  • He, Bo;Li, Tianzhang
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.489-504
    • /
    • 2021
  • By distributing computing tasks among devices at the edge of networks, edge computing uses virtualization, distributed computing and parallel computing technologies to enable users dynamically obtain computing power, storage space and other services as needed. Applying edge computing architectures to Internet of Vehicles can effectively alleviate the contradiction among the large amount of computing, low delayed vehicle applications, and the limited and uneven resource distribution of vehicles. In this paper, a predictive offloading strategy based on the MEC load state is proposed, which not only considers reducing the delay of calculation results by the RSU multi-hop backhaul, but also reduces the queuing time of tasks at MEC servers. Firstly, the delay factor and the energy consumption factor are introduced according to the characteristics of tasks, and the cost of local execution and offloading to MEC servers for execution are defined. Then, from the perspective of vehicles, the delay preference factor and the energy consumption preference factor are introduced to define the cost of executing a computing task for another computing task. Furthermore, a mathematical optimization model for minimizing the power overhead is constructed with the constraints of time delay and power consumption. Additionally, the simulated annealing algorithm is utilized to solve the optimization model. The simulation results show that this strategy can effectively reduce the system power consumption by shortening the task execution delay. Finally, we can choose whether to offload computing tasks to MEC server for execution according to the size of two costs. This strategy not only meets the requirements of time delay and energy consumption, but also ensures the lowest cost.

The Performance Analysis of Cognitive-based Overlay D2D Communication in 5G Networks

  • Abdullilah Alotaibi;Salman A. AlQahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.178-188
    • /
    • 2024
  • In the near future, it is expected that there will be billions of connected devices using fifth generation (5G) network services. The recently available base stations (BSs) need to mitigate their loads without changing and at the least monetary cost. The available spectrum resources are limited and need to be exploited in an efficient way to meet the ever-increasing demand for services. Device to Device communication (D2D) technology will likely help satisfy the rapidly increasing capacity and also effectively offload traffic from the BS by distributing the transmission between D2D users from one side and the cellular users and the BS from the other side. In this paper, we propose to apply D2D overlay communication with cognitive radio capability in 5G networks to exploit unused spectrum resources taking into account the dynamic spectrum access. The performance metrics; throughput and delay are formulated and analyzed for CSMA-based medium access control (MAC) protocol that utilizes a common control channel for device users to negotiate the data channel and address the contention between those users. Device users can exploit the cognitive radio to access the data channels concurrently in the common interference area. Estimating the achievable throughput and delay in D2D communication in 5G networks is not exploited in previous studies using cognitive radio with CSMA-based MAC protocol to address the contention. From performance analysis, applying cognitive radio capability in D2D communication and allocating a common control channel for device users effectively improve the total aggregated network throughput by more than 60% compared to the individual D2D throughput without adding harmful interference to cellular network users. This approach can also reduce the delay.