• Title/Summary/Keyword: application QoS

Search Result 299, Processing Time 0.03 seconds

Adaptive Resource Provisioning Method that provide Rapid Scalability and High Performance for Seamless I/O Intensive Application Service in Cloud Environment (클라우드 환경에서 Seamless한 서비스 제공을 위한 빠른 확장성과 성능을 제공하는 적응형 자원 프로비저닝 기법)

  • Yoo, Seung Hwan;Hong, Yo Hoon;Kim, Sung Chun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.41-44
    • /
    • 2014
  • 최근 클라우드 컴퓨팅에 관련된 기술이 각광을 받으면서, 기존에 인터넷을 통해 제공되던 다양한 서비스들이 클라우드 컴퓨팅 플랫폼 환경으로 이동하고 있다. 이를 통해 사용자들에게는 좀 더 편리하고 유연한 서비스를 제공하고 서비스 제공자들에게는 기존 관리 비용의 절감을 할 수 있게 되었다. 하지만 현재 폭발적인 수요의 증가로 인해, 기존의 자원 활용도의 극대화를 목적으로 고안된 자원 분배 기법들에 대한 여러 한계점이 나타나게 되었다. 본 논문에서는 이러한 문제점들을 해결하고자 클라우드 컴퓨팅 환경에서 Qos를 기반으로 사용자나 서비스 제공자의 비용적인 측면을 고려한 자원분배를 통해 서비스를 제공시 사용자 요구를 만족시키고 동시에 서비스 공급자에게는 비용 효율적인 프로비저닝(Provisioning)기법을 제안하고자 한다. 실험 결과 기존의 자원 활용도에 중점을 둔 기법보다 사용자 요청에 대한 응답 속도가 8.35% 향상되었으며, 컴퓨터 자원 유지 관련 비용면에서도 기존 대비 11.31% 절감 효과를 가져오는 것을 확인 할 수 있었다.

Efficient Resource Slicing Scheme for Optimizing Federated Learning Communications in Software-Defined IoT Networks

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.27-33
    • /
    • 2021
  • With the broad adoption of the Internet of Things (IoT) in a variety of scenarios and application services, management and orchestration entities require upgrading the traditional architecture and develop intelligent models with ultra-reliable methods. In a heterogeneous network environment, mission-critical IoT applications are significant to consider. With erroneous priorities and high failure rates, catastrophic losses in terms of human lives, great business assets, and privacy leakage will occur in emergent scenarios. In this paper, an efficient resource slicing scheme for optimizing federated learning in software-defined IoT (SDIoT) is proposed. The decentralized support vector regression (SVR) based controllers predict the IoT slices via packet inspection data during peak hour central congestion to achieve a time-sensitive condition. In off-peak hour intervals, a centralized deep neural networks (DNN) model is used within computation-intensive aspects on fine-grained slicing and remodified decentralized controller outputs. With known slice and prioritization, federated learning communications iteratively process through the adjusted resources by virtual network functions forwarding graph (VNFFG) descriptor set up in software-defined networking (SDN) and network functions virtualization (NFV) enabled architecture. To demonstrate the theoretical approach, Mininet emulator was conducted to evaluate between reference and proposed schemes by capturing the key Quality of Service (QoS) performance metrics.

Sensing Model for Reducing Power Consumption for Indoor/Outdoor Context Transition (실내/실외 컨텍스트 전이를 고려한 저전력 센싱 모델)

  • Kim, Deok-Ki;Park, Jae-Hyeon;Lee, Jung-Won
    • Journal of KIISE
    • /
    • v.43 no.7
    • /
    • pp.763-772
    • /
    • 2016
  • With the spread of smartphones containing multiple on-board sensors, the market for context aware applications have grown. However, due to the limited power capacity of a smartphone, users feel discontented QoS. Additionally, context aware applications require the utilization of many forms of context and sensing information. If context transition has occurred, types of needed sensors must be changed and each sensor modules need to turn on/off. In addition, excessive sensing has been found when the context decision is ambiguous. In this paper, we focus on power consumption associated with the context transition that occurs during indoor/outdoor detection, modeling the activities of the sensor associated with these contexts. And we suggest a freezing algorithm that reduces power consumption in context transition. We experiment with a commercial application that service is indoor/outdoor location tracking, measure power consumption in context transition with and without the utilization of the proposed method. We find that proposed method reduces power consumption about 20% during context transition.

Performance Analysis of IEEE 1394 High Speed Serial Bus for Massive Multimedia Transmission (대용량 멀티미디어 전송을 위한 IEEE 1394고속 직렬 버스의 성능 분석)

  • 이희진;민구봉;김종권
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.494-503
    • /
    • 2003
  • The IEEE 1394 High Speed Serial Bus is a versatile, high-performance, and low-cost method of promoting interoperability between all types of A/V and computing devices. IEEE 1394 provides two transfer modes: asynchronous mode for best effort service and isochronous mode for best effort service with bandwidth reservation. This paper shows the bus performance and compared the transfer odes first at the link level and then at the application level. For the application level performance, we analyze the bus systems with fixed and adaptive interfaces, applied between the upper layer and the 1394 layer, using polling systems. Also we verifies the analysis models with simulation studies. Based on our analysis, we conclude that the adaptive interface reduces the bus access time and so increases the bus utilization.

Performance Improvement of the Statistical Information based Traffic Identification System (통계 정보 기반 트래픽 분석 방법론의 성능 향상)

  • An, Hyun Min;Ham, Jae Hyun;Kim, Myung Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.335-342
    • /
    • 2013
  • Nowadays, the traffic type and behavior are extremely diverse due to the growth of network speed and the appearance of various services on Internet. For efficient network operation and management, the importance of application-level traffic identification is more and more increasing in the area of traffic analysis. In recent years traffic identification methodology using statistical features of traffic flow has been broadly studied. However, there are several problems to be considered in the identification methodology base on statistical features of flow to improve the analysis accuracy. In this paper, we recognize these problems by analyzing the ground-truth traffic and propose the solution of these problems. The four problems considered in this paper are the distance measurement of features, the selection of the representative value of features, the abnormal behavior of TCP sessions, and the weight assignment to the feature. The proposed solutions were verified by showing the performance improvement through experiments in campus network.

Implementation of Web Services Framework for Web Services on Universal Networks (유니버설 네트워크 상에서 웹서비스 프레임워크 구현)

  • Yim, Hyung-Jun;Oh, Il-Jin;Hwang, Yun-Young;Lee, Kyong-Ha;Lee, Kang-Chan;Lee, Seung-Yun;Lee, Kyu-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.143-157
    • /
    • 2008
  • Ubiquitous Web Services is able to be specified future Web Services technology for connecting with various application services in any device and network environments. The devices, in ubiquitous environment, have dynamic characteristic such as location and statuse. So, we must support methods of dynamic service discovery in ad-hoc network. There are many related works at transaction, security, QoS, semantic and Web Services composition with various fields. Recently, the studies are interested in the Ubiquitous by development of computing and network technology. However, they are an early stage. For this reason, in this paper, we propose a WSUN(Web Services on Universal Networks) for Ubiquitous Web Services. It is a SOA based framework. And this paper extracts necessity of WSUN environment from scenario. The framework is composed of US Broker(Universal Service Broker). It is designed for satisfying the conditions and supports dynamic service discovery using a US Registry (Universal Service Registry). Consequently. clients are able to discover and use Universal Service by protocol stack of the US Broker for Web Services. And it is a strong point which supports interoperability between heterogeneous networks.

Analysis and Modeling of Traffic at Ntopia Subscriber Network of Korea Telecom (KT의 Ntopia가입자 망 트래픽 분석 및 모델링)

  • 주성돈;이채우
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.5
    • /
    • pp.37-45
    • /
    • 2004
  • As Internet technologies are mature, many new applications that are different characteristics are emerging. Recently we see wide use of P2P(Peer to Peer) applications of which traffic shows different statistical characteristics compared with traditional application such as web(HTTP) and FTP(File Transfer Protocol). In this paper, we measured subscriber network of KT(Korea Telecom) to analyze P2P traffic characteristics. We show flow characteristics of measured traffic. We also estimate Hurst parameter of P2P traffic and compare self-similarity with web traffic. Analysis results indicate that P2P traffic is much bustier than web traffic and makes both upstream traffic and downstream traffic be symmetric. To predict parameters related QoS such as packet loss and delays we model P2P traffic using two self-similar traffic models and predict both loss probability and mm delay then compare their accuracies. With simulation we show that the self-similar traffic models we derive predict the performance of P2P traffic accurately and thus when we design a network or evaluate its performance, we can use the P2P traffic model as reference input traffic.

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).

A Management for IMS Network Using SDN and SNMP (SDN과 SNMP를 이용한 IMS 네트워크 관리)

  • Yang, Woo-Seok;Kim, Jung-Ho;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.694-699
    • /
    • 2017
  • In accordance with the development of information and communications technology, a network user has to be able to use quality of service (QoS)-based multimedia services easily. Thus, information and communications operators began to focus on a technique for providing multimedia services. The IP Multimedia Subsystem (IMS) is a platform based on Internet Protocol (IP) as a technology for providing multimedia services and application services. The emerging 5G networks are described as having massive capacity and connectivity, adaptability, seamless heterogeneity, and great flexibility. The explosive growth in network services and devices for 5G will cause excessive traffic loads. In this paper, software-defined networking (SDN) is applied as a kind of virtualization technology for the network in order to minimize the traffic load, and Simple Network Management Protocol (SNMP) is used to provide more efficient network management. To accomplish these purposes, we suggest the design of a dynamic routing algorithm to be utilized in the IMS network using SDN and an SNMP private management information base (MIB). The proposal in this paper gives information and communications operators the ability to supply more efficient network resources.

A Study on Performance Evaluation based on Packet Dropping in ATM Network . New Scheme Proposal

  • Park, Seung-Seob;Yuk, Dong-Cheol
    • Journal of Navigation and Port Research
    • /
    • v.27 no.3
    • /
    • pp.283-288
    • /
    • 2003
  • Recently, the growth of applications and services over high-speed Internet increases, ATM networks as wide area back-bone has been a major solution. As the conventional TCP/IP suite is still the standard protocol used to support upper application on current. Internet, the issues regarding whether TCP/IP will operate efficiently on top of an ATM infrastructure and how to control its QoS still remain for studies. TCP uses a window-based protocol for flow control in the transport layer. When TCP uses the UBR service in ATM layer, the control method is only buffer management. If a cell is discarded in ATM layer, one whole packet of TCP will be lost; this fact occur the most TCP performance degradation. Several dropping strategies, such as Tail Drop, EPD, PPD, SPD, FBA, have been proposed to improve the TCP performance over ATM. In this paper, to improve the TCP performance, we propose a packet dropping scheme that is based on comparison with EPD, SPD and FBA. Our proposed scheme is applied to schemes discussed in the previous technology. Our proposed scheme does not need to know each connection's mean packet size. When the buffer exceeds the given threshold, it is based on comparison between the number of dropped packet and the approved packet. Our results are reported and discussed for comparing these discarding schemes under similar conditions. Although the number of virtual channel (VC) is increased, the simulation results showed that the proposed scheme can allocate more fairly each VC than other scheme.