• Title/Summary/Keyword: computing environment

Search Result 3,264, Processing Time 0.033 seconds

A Hoarding Policy for collaborative computing in Mobile Environment : design and Implementation. (이동컴퓨터 상에서의 공동작업을 위한 자동저장 방식 설계 및 구현)

  • 이근영;김남광박승규
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.491-494
    • /
    • 1998
  • This paper describes the design and implementation of file system which allows the collaborative computing in mobile environment. The design goal is to make a logically one file system in the distributed computer systems. The characteristics of frequent, foreseeable and variable disconnections in a mobile environment wrer taken into consideration. We introduce an auto-hoarding system that provides the availability of large number of nodes which are weakly and intermittently connected. The data consistency problems in distributed or replicated mobile data are also discussed.

  • PDF

Global Manager - A Service Broker In An Integrated Cloud Computing, Edge Computing & IoT Environment

  • Selvaraj, Kailash;Mukherjee, Saswati
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1913-1934
    • /
    • 2022
  • The emergence of technologies like Big data analytics, Industrial Internet of Things, Internet of Things, and applicability of these technologies in various domains leads to increased demand in the underlying execution environment. The demand may be for compute, storage, and network resources. These demands cannot be effectively catered by the conventional cloud environment, which requires an integrated environment. The task of finding an appropriate service provider is tedious for a service consumer as the number of service providers drastically increases and the services provided are heterogeneous in the specification. A service broker is essential to find the service provider for varying service consumer requests. Also, the service broker should be smart enough to make the service providers best fit for consumer requests, ensuring that both service consumer and provider are mutually beneficial. A service broker in an integrated environment named Global Manager is proposed in the paper, which can find an appropriate service provider for every varying service consumer request. The proposed Global Manager is capable of identification of parameters for service negotiation with the service providers thereby making the providers the best fit to the maximum possible extent for every consumer request. The paper describes the architecture of the proposed Global Manager, workflow through the proposed algorithms followed by the pilot implementation with sample datasets retrieved from literature and synthetic data. The experimental results are presented with a few of the future work to be carried out to make the Manager more sustainable and serviceable.

Building the Educational Practice System based on Open Source Cloud Computing (오픈소스 클라우드 컴퓨팅 기반 교육 실습 시스템 구축)

  • Yoon, JunWeon;Park, ChanYeol;Song, Ui-Sung
    • Journal of Digital Contents Society
    • /
    • v.14 no.4
    • /
    • pp.505-511
    • /
    • 2013
  • Recently, cloud computing is being emerged paradigm that a support computing resource flexible and scalable to users as the want in distributed computing environment. Actually, cloud computing can be implemented and provided by virtualization technology. In this paper, we studied open source based cloud computing and built a educational practice system through cloud computing. Virtualization-based cloud computing provides optimized computing resources, as well as easy to manage practical resource and result. Therefore, we can save the time for configuration of practice environment. In the view of faculty, they can easily handle the practice result. Also, those practice condition reuse comfortably and apply to various configuration simply. And then we can increase capabilities and availabilities of limited resources.

Multi-cloud Technology Introduction and Research Trends (멀티 클라우드 기술 개요 및 연구 동향)

  • Kim, B.S.;Jung, Y.W.;Oh, B.T.;Kim, S.Y.;Son, S.;Seo, J.H.;Bae, S.J.;Lee, G.C.;Kang, D.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.3
    • /
    • pp.45-54
    • /
    • 2020
  • The cloud computing industry has focused on establishing a cloud-based business environment for enterprises with efforts to convert using their own on-premise computing infrastructures to using cloud services. With these efforts, using cloud services has become natural, especially for the IT industry. The cloud computing industry is moving toward proliferation of the cloud computing environment into various evolving industries. Along with industrial trends, new technical trends such as edge computing and multi-cloud are emerging. These trends are expected to create new business models and develop related service ecosystems, providing new opportunities for service providers and new experiences for users. A mong those emerging technologies, multi-cloud technology is expected to realize unlimited global cloud computing resources by unifying cloud resources from multiple public cloud service providers. In this paper, we introduce the concept and related trends of multi-cloud technology. Subsequently, we analyze the main functionalities and several use cases of multi-cloud technology. Finally, we summarize the effects and usefulness of multi-cloud technology in the domestic cloud industry.

Design of Context-Aware Middleware in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 상황인식 미들웨어 설계)

  • Kim Hyo-Nam;Park Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.115-122
    • /
    • 2005
  • W These days, Ubiquitous is coming a more popular tool in mass communications and in advanced countries ubiquitous computing is commercialized. In Korea, we have studied the business models of the ubiquitous computing generation as well. Ubiquitous computing is the environment in which humans and computers coexist and properly work together. I would like to present a service infrastructure for a more efficient context-awareness than computing home networking system in this monograph. In the mean time, they have focused the context-awareness system on identifying users in the designated space and recognition. But I would like to focus on the middleware system structure for more efficient recognition.

  • PDF

Adaptive Scheduling Technique Based on Reliability in Cloud Compuing Environment (클라우드 컴퓨팅 환경에서 신뢰성 기반 적응적 스케줄링 기법)

  • Cho, In-Seock;Yu, Heon-Chang
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.2
    • /
    • pp.75-82
    • /
    • 2011
  • Cloud computing is a computing paradigm that provides user's services anywhere, anytime in a virtualized form composed of large computing resources based on internet or intranet. In Cloud computing environments, reliability of system is impact factor because many applications handle large data. In this paper, we propose an adaptive scheduling technique based on reliability with fault tolerance that manages resource variable and resolves problems(change of user's requirement, failure occurrence) in Cloud computing environment. Futhermore, we verified the performance of the proposed scheduling through experiments in CloudSim Simulation.

  • PDF

Study of Danger-Theory-Based Intrusion Detection Technology in Virtual Machines of Cloud Computing Environment

  • Zhang, Ruirui;Xiao, Xin
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.239-251
    • /
    • 2018
  • In existing cloud services, information security and privacy concerns have been worried, and have become one of the major factors that hinder the popularization and promotion of cloud computing. As the cloud computing infrastructure, the security of virtual machine systems is very important. This paper presents an immune-inspired intrusion detection model in virtual machines of cloud computing environment, denoted I-VMIDS, to ensure the safety of user-level applications in client virtual machines. The model extracts system call sequences of programs, abstracts them into antigens, fuses environmental information of client virtual machines into danger signals, and implements intrusion detection by immune mechanisms. The model is capable of detecting attacks on processes which are statically tampered, and is able to detect attacks on processes which are dynamically running. Therefore, the model supports high real time. During the detection process, the model introduces information monitoring mechanism to supervise intrusion detection program, which ensures the authenticity of the test data. Experimental results show that the model does not bring much spending to the virtual machine system, and achieves good detection performance. It is feasible to apply I-VMIDS to the cloud computing platform.

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

Service ORiented Computing EnviRonment (SORCER) for deterministic global and stochastic aircraft design optimization: part 1

  • Raghunath, Chaitra;Watson, Layne T.;Jrad, Mohamed;Kapania, Rakesh K.;Kolonay, Raymond M.
    • Advances in aircraft and spacecraft science
    • /
    • v.4 no.3
    • /
    • pp.297-316
    • /
    • 2017
  • With rapid growth in the complexity of large scale engineering systems, the application of multidisciplinary analysis and design optimization (MDO) in the engineering design process has garnered much attention. MDO addresses the challenge of integrating several different disciplines into the design process. Primary challenges of MDO include computational expense and poor scalability. The introduction of a distributed, collaborative computational environment results in better utilization of available computational resources, reducing the time to solution, and enhancing scalability. SORCER, a Java-based network-centric computing platform, enables analyses and design studies in a distributed collaborative computing environment. Two different optimization algorithms widely used in multidisciplinary engineering design-VTDIRECT95 and QNSTOP-are implemented on a SORCER grid. VTDIRECT95, a Fortran 95 implementation of D. R. Jones' algorithm DIRECT, is a highly parallelizable derivative-free deterministic global optimization algorithm. QNSTOP is a parallel quasi-Newton algorithm for stochastic optimization problems. The purpose of integrating VTDIRECT95 and QNSTOP into the SORCER framework is to provide load balancing among computational resources, resulting in a dynamically scalable process. Further, the federated computing paradigm implemented by SORCER manages distributed services in real time, thereby significantly speeding up the design process. Part 1 covers SORCER and the algorithms, Part 2 presents results for aircraft panel design with curvilinear stiffeners.