• Title/Summary/Keyword: distributed resource management

Search Result 287, Processing Time 0.025 seconds

Semantic Service Composition Based on Semantic Broker (시맨틱 브로커 기반 시맨틱 서비스 조합)

  • Jung, Hanmin;Lee, Mi-Kyoung;You, Beom-Jong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.283-288
    • /
    • 2009
  • Semantic service can be defined as the service providing search API or reasoning API based on ontology and Web Services. It performs a pre-defined task by exploiting URI, classes, and properties. This study introduces a semantic service composition method based on a semantic broker referring ontology and management information of semantic services stored in a semantic service manager with requirements of the user. The requirements consist of input instances, an output class, a visualization type, semantic service names, and property names. This composition method provides dynamically generated semantic service pipelines including composit semantic services. The user can execute the pipelines provided by the semantic broker to find a meaningful semantic pipeline. After all, this study contributes to develop a system supporting human service planners who want to find composit semantic services among distributed semantic services.

  • PDF

A Multi-Service MAC Protocol in a Multi-Channel CSMA/CA for IEEE 802.11 Networks

  • Ben-Othman, Jalel;Castel, Hind;Mokdad, Lynda
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.287-296
    • /
    • 2008
  • The IEEE 802.11 wireless standard uses the carrier sense multiple access with collision avoidance (CSMA/CA) as its MAC protocol (during the distributed coordination function period). This protocol is an adaptation of the CSMA/CD of the wired networks. CSMA/CA mechanism cannot guarantee quality of service (QoS) required by the application because orits random access method. In this study, we propose a new MAC protocol that considers different types of traffic (e.g., voice and data) and for each traffic type different priority levels are assigned. To improve the QoS of IEEE 802.11 MAC protocols over a multi-channel CSMA/CA, we have developed a new admission policy for both voice and data traffics. This protocol can be performed in direct sequence spread spectrum (DSSS) or frequency hopping spread spectrum (FHSS). For voice traffic we reserve a channel, while for data traffic the access is random using a CSMA/CA mechanism, and in this case a selective reject and push-out mechanism is added to meet the quality of service required by data traffic. To study the performance of the proposed protocol and to show the benefits of our design, a mathematical model is built based on Markov chains. The system could be represented by a Markov chain which is difficult to solve as the state-space is too large. This is due to the resource management and user mobility. Thus, we propose to build an aggregated Markov chain with a smaller state-space that allows performance measures to be computed easily. We have used stochastic comparisons of Markov chains to prove that the proposed access protocol (with selective reject and push-out mechanisms) gives less loss rates of high priority connections (data and voices) than the traditional one (without admission policy and selective reject and push-out mechanisms). We give numerical results to confirm mathematical proofs.

A Study for an Optimal Load Balancing Algorithm based on the Real-Time Server Monitor of a Real Server (리얼 서버의 실시간 서버 모니터에 의한 최적 로드 밸런싱 알고리즘에 관한 연구)

  • Han, Il-Seok;Kim, Wan-Yong;Kim, Hag-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11a
    • /
    • pp.201-204
    • /
    • 2003
  • At a consequence of WWW large popularity, the internet has suffered from various performance problems, such as network congestion and overloaded servers. These days, it is not uncommon to find servers refusing connections because they are overloaded. Web server performance has always been a key issue in the design and operation of on-line systems. With regard to Internet, performance is also critical, because users want fast and easy access to all objects (e.g., documents, graphics, audio, and video) available on the net. To solve this problem, a number of companies are exploring the benefits of having multiple geographically or locally distributed Internet sites. This requires a comprehensive scheme for traffic management, which includes the principle of an optimal load balancing of client requests across multiple clusters of real servers. This paper focuses on the performance analysis of Web server and we apply these results to load balancing in clustering web server. It also discusses the mam steps needed to carry out a WWW performance analysis effort and shows relations between the workload characteristics and system resource usage. Also, we will introduce an optimal load balancing algorithm base on the RTSM (Real-Time Server Monitor) and Fuzzy Inference Engine for the local status of a real server, and the benefits is provided with of the suggested method.

  • PDF

Performance Analysis of Operation Strategy of Dual Virtual Cell-based System under The Overlay Convergent Networks of Cognitive Networking (인지 네트워킹 기반 중첩 융합 네트워크에서 이중 가상 셀 운영방안의 성능분석)

  • Choi, Yu-Mi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6B
    • /
    • pp.483-488
    • /
    • 2012
  • With the fast growing data traffic, the performance of the convergent overlay network environment under the cognitive networking environment is crucial for the implementation of the efficient network structure. In order to achieve high capacity and reliable link quality in wireless communication of the overlay convergent networks with the cognitive networking based on the advanced capability of the mobile terminal, a Distributed Wireless Communication System (DWCS) can provide the capability of ambient-aware dual cell system's operation. This paper has considered virtual cell: the Dual Virtual Cell (DVC), and also proposes DVC employment strategy based on DWCS network. One is the Active Virtual Cell which exists for user's actual data traffic and the other is the Candidate Virtual Cell which contains a set of candidate antennas to protect user's link quality from performance degradation or interruption. The considered system constructs DVC by using cognitive ability of finding useful virtual signals. Also, for multi-user high-rate data transmission, the DWCS system exploits Space-Time Trellis Codes. The effects of changing environments on the system performance has been investigated thereafter.

Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks

  • Abbas, Sohail;Merabti, Madjid;Kifayat, Kashif;Baker, Thar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6214-6242
    • /
    • 2019
  • Routing in mobile ad hoc networks is performed in a distributed fashion where each node acts as host and router, such that it forwards incoming packets for others without relying on a dedicated router. Nodes are mostly resource constraint and the users are usually inclined to conserve their resources and exhibit selfish behaviour by not contributing in the routing process. The trust and reputation models have been proposed to motivate selfish nodes for cooperation in the packet forwarding process. Nodes having bad trust or reputation are detected and secluded from the network, eventually. However, due to the lack of proper identity management and use of non-persistent identities in ad hoc networks, malicious nodes can pose various threats to these methods. For example, a malicious node can discard the bad reputed identity and enter into the system with another identity afresh, called whitewashing. Similarly, a malicious node may create more than one identity, called Sybil attack, for self-promotion, defame other nodes, and broadcast fake recommendations in the network. These identity-based attacks disrupt the overall detection of the reputation systems. In this paper, we propose a reputation-based scheme that detects selfish nodes and deters identity attacks. We address the issue in such a way that, for normal selfish nodes, it will become no longer advantageous to carry out a whitewash. Sybil attackers are also discouraged (i.e., on a single battery, they may create fewer identities). We design and analyse our rationale via game theory and evaluate our proposed reputation system using NS-2 simulator. The results obtained from the simulation demonstrate that our proposed technique considerably diminishes the throughput and utility of selfish nodes with a single identity and selfish nodes with multiple identities when compared to the benchmark scheme.

A Design of TNA(Traceback against Network Attacks) Based on Multihop Clustering using the depth of Tree structure on Ad-hoc Networks (애드혹 네트워크 상에 트리구조 깊이를 이용한 다중홉 클러스터링 기반 TNA(Traceback against Network Attacks) 설계)

  • Kim, Ju-Yung;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.9
    • /
    • pp.772-779
    • /
    • 2012
  • In the current MANET, DOS or DDOS attacks are increasing, but as MANET has limited bandwidth, computational resources and battery power, the existing traceback mechanisms can not be applied to it. Therefore, in case of traceback techniques being applied to MANET, the resource of each node must be used efficiently. However, in the traceback techniques applied to an existing ad hoc network, as a cluster head which represents all nodes in the cluster area manages the traceback, the overhead of the cluster head shortens each node's life. In addition, in case of multi-hop clustering, as one Cluster head manages more node than one, its problem is getting even worse. This paper proposes TNA(Traceback against Network Attacks) based on multihop clustering using the depth of tree structure in order to reduce the overhead of distributed information management.

A Self-Deployment Scheme Using Improved Potential Field in Mobile Sensor Networks (이동 센서 네트워크에서 개선된 포텐셜 필드를 사용한 자율 배치 방법)

  • Lee, Heon-Jong;Kim, Yong-Hwan;Han, Youn-Hee;Jeong, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.106-116
    • /
    • 2010
  • Sensor deployment makes an effect on not only covering of the interesting area but also reliable data acquisition and efficient resource management of sensor, so that sensors must be deployed at their better place. In traditional static wireless sensor networks, however, it is impossible to deploy the sensors manually when they are distributed in unexploited, hostile, or disaster areas. Therefore, if each sensor has locomotion capability, it can re-deploy itself using the location information of neighbor sensors. In our previous study, we showed that moving sensors to the centroids of their Voronoi polygon is efficient for extending the coverage area. In this paper, we present an improved potential-field-based sensor self-deployment scheme by combining the centroid of Voronoi polygon with the traditional potential-field scheme. Simulation results show that our scheme can achieve higher coverage in shorter time and less movement than the traditional potential-field scheme.

Study of Enneagram Character Types and Job Satisfaction of Workers Engaged in Korean Medical Clinics Located in ChangWon City (창원시 소재 한의원 종사자의 에니어그램 성격유형에 따른 직무만족도 연구)

  • Lee, Jeong Won
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.26 no.5
    • /
    • pp.753-759
    • /
    • 2012
  • The purpose of this study was to examine Enneagram personality types and job satisfaction of Korean medicine clinic staff, thereby providing basic materials for job training programs and human resource management programs for Korean medicine clinic staff with a lot of face-to-face relationship. The researcher visited 50 Korean medicine clinics randomly selected from 255 clinics in Changwon and explained the purpose of this study and the content of questionnaire. Questionnaires on Enneagram personality types and job satisfaction were distributed to and collected from those who consented to participate. Data analysis was done using SPSS WIN IBM 20.0 program. The results are as follows. General characteristics of the subjects were as follows. Female respondents comprised 97.6% of the total. The rate of those whose age was between 20 and 25, between 26 and 30, between 31 and 35, between 36 and 40, between 41 and 45, and 46 years old or older was 22.6%, 21.4%, 13.1%, 21.4%, 17.9%, and 3.6%, respectively. The rate of those who were unmarried was 46.4%. As for educational levels, those who graduated from high school or received lower level education, those who graduated from two-year college, and those who graduated from university accounted for 46.4%, 39.3%, and 14.3%, respectively. Regarding the distribution of the center of energy, 64.3% was in the instinctive center, 20.3% in the thinking center, and 15.5% in the emotional center. As for the personality type of Enneagram, 25.0% belonged to type 8, 22.6% to type 9, 15.5% to type 1, 9.5% to type 5, 8.3% to types 4 and 6, 6% to type 2, and 2.4% to types 3 and 7. Job satisfaction according to the center of energy and personality types was not statistically significantly different. Interpersonal relationship, autonomy, and overall job satisfaction according to the developmental stage of Enneagram were significantly different.

Active Distribution System Planning for Low-carbon Objective using Cuckoo Search Algorithm

  • Zeng, Bo;Zhang, Jianhua;Zhang, Yuying;Yang, Xu;Dong, Jun;Liu, Wenxia
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.433-440
    • /
    • 2014
  • In this study, a method for the low-carbon active distribution system (ADS) planning is proposed. It takes into account the impacts of both network capacity and demand correlation to the renewable energy accommodation, and incorporates demand response (DR) as an available resource in the ADS planning. The problem is formulated as a mixed integer nonlinear programming model, whereby the optimal allocation of renewable energy sources and the design of DR contract (i.e. payment incentives and default penalties) are determined simultaneously, in order to achieve the minimization of total cost and $CO_2$ emissions subjected to the system constraints. The uncertainties that involved are also considered by using the scenario synthesis method with the improved Taguchi's orthogonal array testing for reducing information redundancy. A novel cuckoo search (CS) is applied for the planning optimization. The case study results confirm the effectiveness and superiority of the proposed method.

Geographical Distribution and Physical Structure of Gudle-jang Paddy-field in Cheongsando (청산도 구들장논의 분포와 물리적 구조에 관한 연구)

  • Cho, Young-Jae;You, Hag-Yeol;Yoon, Won-Keun;Choi, Sik-In;Lee, Young-Ok
    • Journal of Korean Society of Rural Planning
    • /
    • v.18 no.3
    • /
    • pp.103-110
    • /
    • 2012
  • This study aims to find out the geographical distribution, the physical structure and characteristic of Gudle-jang Paddy-field in Cheongsando. On the basis of this study, the potential value and the assignment for the preservation of Gudle-jang Paddy-field were suggested. Gudle-jang Paddy-field is centrally distributed to Cheongsando and has various features as follows. First, it has the Ondol structure which is used Gudle-jang. Second, it has an irrigation canal which has functions of the tank and the prevention of cold-weather damage as well as the irrigation and drainage canal. The values of Gudle-jang Paddy-field are as follows; 1) It is the peculiar and inherent agricultural structure which is only found in Cheongsando. 2) It is the structure that the agricultural civil engineering and the agricultural water management technique of traditional methode are applied. 3) It has the worths of the traditional culture of Korea. 4) It is the important resource creating superb rural landscape of the region. In spite of these values of Gudle-jang Paddy-field, there were little efforts to preserve it. From now on, it is needed to form of sympathy about the value of Gudle-jang Paddy-field and to make efforts for preservation of it. Also the institutional and political strategy should be provided to preserve and manage Gudle-jang Paddy-field.