• Title/Summary/Keyword: caching

Search Result 528, Processing Time 0.024 seconds

6G in the sky: On-demand intelligence at the edge of 3D networks (Invited paper)

  • Strinati, Emilio Calvanese;Barbarossa, Sergio;Choi, Taesang;Pietrabissa, Antonio;Giuseppi, Alessandro;De Santis, Emanuele;Vidal, Josep;Becvar, Zdenek;Haustein, Thomas;Cassiau, Nicolas;Costanzo, Francesca;Kim, Junhyeong;Kim, Ilgyu
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.643-657
    • /
    • 2020
  • Sixth generation will exploit satellite, aerial, and terrestrial platforms jointly to improve radio access capability and unlock the support of on-demand edge cloud services in three-dimensional (3D) space, by incorporating mobile edge computing (MEC) functionalities on aerial platforms and low-orbit satellites. This will extend the MEC support to devices and network elements in the sky and forge a space-borne MEC, enabling intelligent, personalized, and distributed on-demand services. End users will experience the impression of being surrounded by a distributed computer, fulfilling their requests with apparently zero latency. In this paper, we consider an architecture that provides communication, computation, and caching (C3) services on demand, anytime, and everywhere in 3D space, integrating conventional ground (terrestrial) base stations and flying (non-terrestrial) nodes. Given the complexity of the overall network, the C3 resources and management of aerial devices need to be jointly orchestrated via artificial intelligence-based algorithms, exploiting virtualized network functions dynamically deployed in a distributed manner across terrestrial and non-terrestrial nodes.

A Blockchain-Based Content Authentication Scheme for CCN (블록체인 기반 CCN 콘텐츠 인증 기술)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.975-985
    • /
    • 2018
  • ICN architecture, one of future Internet technologies, proposes that content request packets toward a content source can be responded by several distributed nodes. So, ICN can solve network congestion which is happened around content sources and provide a seamless content distribution service regardless of the network and system statuses of content sources. Especially, CCN implements content caching functionality in network nodes so that such intermediated network nodes can themselves respond to content requests. However, when receiving content from distributed nodes, users receiving content cannot authenticate the nodes providing the content. So CCN is vulnerable to various attacks such as an impersonation attack, a data pollution attack, and so on. This paper first describes CCN content authentication and its weakness. Then it proposes an improved content authentication scheme based on a blockchain and evaluates the performance of the proposed scheme.

A Study on the Application for WIPI Terminal of ENC Image Information (전자해도 이미지 정보의 WIPI 단말기 적용 기법 연구)

  • Ahn, Sung-Hwan;Jung, Sung-Hun;Choi, Hong-Seok;Yim, Jae-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.67-70
    • /
    • 2005
  • As the demand of sea leisure increases recently, interest is converged sea safety and offer of quick and systematic information according to weather environment that change rapidly. Use of Electronic Navigational Chart(ENC) in the sea in offer of geography information through Mobile terminal was gone to level that run in PDA environment in domestic by bulky good physician data information and complicated processing way of island in the sea expression in sea, and is loaded in obligatory sailing equipment of ship yet and is used. In this paper, we develop server system that take charge index for offer of quick information through Restrictive resource management and Caching Technique, image conversion and database construction and fast search to service various marine leisure informations of Weather Data and so on and image information of ENC in the sea to Mobile portable phone terminal efficiently.

  • PDF

Modeling and Analysis of a Reordering-based Optimistic Cache Consistency Protocol (재배열 기반의 낙관적 캐쉬 일관성 유지 기법의 모델링과 분석)

  • Cho, Sung-Ho;Hwang, Jeong-Hyon
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.458-467
    • /
    • 2001
  • Optimistic Two-Phase Locking(O2PL) performs as well as or better than the other approaches because it exploits client caching well and also has relatively lower network bandwidth requirements. However, O2PL leads to unnecessary waits, because, it can not be commit a transaction until the transaction obtains all requested locks. In addition, Optimistic Concurrency Control(OCC) tends to make needless aborts. This paper suggests an efficient optimistic cache consistency protocol that overcomes such shortcomings. Our scheme decides whether to commit or abort a transaction without wait and it adopts transaction re-ordering in order to minimize the abort rate. Our scheme needs only one version for each data item in spite of the re-ordering mechanism used. Finally, this paper presents a simulation-based analysis that shows superiority in performance of out scheme to O2PL and OCC.

  • PDF

Ad-hoc Query Processing in a Wireless Sensor Network (무선 센서 네트워크에서 순간 질의 처리 방법)

  • Yun, Sang-Hun;Cho, Haeng-Rae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11B
    • /
    • pp.685-692
    • /
    • 2007
  • Recent advances in wireless communications and electronics have enabled the development of low-cost, low-power, multi-functional sensors. A typical wireless sensor network (WSN) consists of a large number of sensor nodes that can measure and process data while communicating through wireless channels. In this paper, we propose a hybrid query processing (HQP) algorithm for user queries submitted to the WSN. Unlike previous algorithms that consider continuous queries only, HQP supports both continuous queries and ad-hoc queries. Specially. HQP tries to reduce energy consumption of ad-hoc queries by using query results cached at each sensor node which are created during the execution of the previous continuous query. HQP can also exploit a trade-off between energy consumption and data accuracy. We evaluate the performance of HQP under a variety of WSN configurations.

Low-Power Data Cache Architecture and Microarchitecture-level Management Policy for Multimedia Application (멀티미디어 응용을 위한 저전력 데이터 캐쉬 구조 및 마이크로 아키텍쳐 수준 관리기법)

  • Yang Hoon-Mo;Kim Cheong-Gil;Park Gi-Ho;Kim Shin-Dug
    • The KIPS Transactions:PartA
    • /
    • v.13A no.3 s.100
    • /
    • pp.191-198
    • /
    • 2006
  • Today's portable electric consumer devices, which are operated by battery, tend to integrate more multimedia processing capabilities. In the multimedia processing devices, multimedia system-on-chips can handle specific algorithms which need intensive processing capabilities and significant power consumption. As a result, the power-efficiency of multimedia processing devices becomes important increasingly. In this paper, we propose a reconfigurable data caching architecture, in which data allocation is constrained by software support, and evaluate its performance and power efficiency. Comparing with conventional cache architectures, power consumption can be reduced significantly, while miss rate of the proposed architecture is very similar to that of the conventional caches. The reduction of power consumption for the reconfigurable data cache architecture shows 33.2%, 53.3%, and 70.4%, when compared with direct-mapped, 2-way, and 4-way caches respectively.

Pre-Processing of Query Logs in Web Usage Mining

  • Abdullah, Norhaiza Ya;Husin, Husna Sarirah;Ramadhani, Herny;Nadarajan, Shanmuga Vivekanada
    • Industrial Engineering and Management Systems
    • /
    • v.11 no.1
    • /
    • pp.82-86
    • /
    • 2012
  • In For the past few years, query log data has been collected to find user's behavior in using the site. Many researches have studied on the usage of query logs to extract user's preference, recommend personalization, improve caching and pre-fetching of Web objects, build better adaptive user interfaces, and also to improve Web search for a search engine application. A query log contain data such as the client's IP address, time and date of request, the resources or page requested, status of request HTTP method used and the type of browser and operating system. A query log can offer valuable insight into web site usage. A proper compilation and interpretation of query log can provide a baseline of statistics that indicate the usage levels of website and can be used as tool to assist decision making in management activities. In this paper we want to discuss on the tasks performed of query logs in pre-processing of web usage mining. We will use query logs from an online newspaper company. The query logs will undergo pre-processing stage, in which the clickstream data is cleaned and partitioned into a set of user interactions which will represent the activities of each user during their visits to the site. The query logs will undergo essential task in pre-processing which are data cleaning and user identification.

A RDF based Ontology Management System (RDF 기반의 온톨로지 처리시스템)

  • Jung Jun-Won;Jung Ho-Young;Kim Jong-Nam;Lim Dong-Hyuk;Kim Hyoung-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.4
    • /
    • pp.381-392
    • /
    • 2005
  • Computing has been making a lot of progress in the quantity of data, today. It's going to be more difficult to get appropriate information as the number of data increases dramatically. Therefore it's more important to get meaningful information than to focus on the speed of processing. Semantic web enables an intelligent processing by adding semantic information to data, and it is useful to make ontology system. In this Paper, we implemented ontology Processing system which support function for ontology and efficient processing for practical service. We proposed system design for independent from storage, storing technique for RDB, caching technique by schema information and useful user interface.

Characteristics of a Parallel Interworking Model for Open Interface of Optical Internet (광 인터넷의 개방형 인터페이스를 위한 병렬형 연동 모델의 특성)

  • Kim, Choon-Hee;Baek, Hyun-Gyu;Cha, Young-Wook;Choi, Jun-Kyun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.405-411
    • /
    • 2002
  • Open interfaces in the optica] Internet have been progressed by OIF's ISI, ITU-T ASTN's CCI and IETF's GSMP extensions with optical switching. These open interfaces enable the separation between the control plane and the optical transport plane. This separation allows flexibility in the network, but it suffers more setup delay than the traditional switch-by-switch connection setup. We propose the parallel interworking model, which will reduce the connection setup delay in the open interface of optical Internet. Based on the switch controller's caching capability about networks states, the parallel interworking procedures between signaling protocol and GSMP protocol are performed in the switch controller. We simulated and evaluated our proposed parallel interworking model and the existing sequential interworking model in terms of a connection setup delay and a completion ratio. We observed that the completion ratios of the two interworking models were quite close. However the connection setup delay of parallel interworking model is improved by about 30% compared with that of the sequential interworking model.

An Update Transaction Scheduling Method Using an Adaptive Request Message in Mobile Computing Environments (이동 컴퓨팅 환경에서 적응적 요청 메시지를 이용한 갱신 트랜잭션 스케줄링 기법)

  • Park, Jun;Chae, Duk-Jin;Hwang, Boo-Hyun;Kim, Joong-Bae;Jung, Seung-Wook
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.339-350
    • /
    • 2004
  • A broadcast method in mobile computing environments which have very large client populations solves the problem of low bandwidth. But most of previous proposed concurrency control protocols are restricted to read-only transactions from mobile client. In this paper, we propose the UTSM-ARM method which uses caching and broadcast method, and allows update transactions in mobile client. The UTSM-ARM decides the validation of cache data consistency with the dynamic update pattern ratio of accessed cached data. Also, the timestamps of accessed cached data and transaction in mobile client guarantee the serializable execution of mobile transactions. As a result, UTSM-ARM makes efficiently use of the asymmetric bandwidth of broadcast environment and can Increase the transaction throughput.