• Title/Summary/Keyword: dynamic resource reallocation

Search Result 10, Processing Time 0.022 seconds

Dynamic Available-Resource Reallocation based Job Scheduling Model in Grid Computing (그리드 컴퓨팅에서 유효자원 동적 재배치 기반 작업 스케줄링 모델)

  • Kim, Jae-Kwon;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.2
    • /
    • pp.59-67
    • /
    • 2012
  • A grid computing consists of the physical resources for processing one of the large-scale jobs. However, due to the recent trends of rapid growing data, the grid computing needs a parallel processing method to process the job. In general, each physical resource divides a requested large-scale task. And a processing time of the task varies with an efficiency and a distance of each resource. Even if some resource completes a job, the resource is standing by until every divided job is finished. When every resource finishes a processing, each resource starts a next job. Therefore, this paper proposes a dynamic resource reallocation scheduling model (DDRSM). DDRSM finds a waiting resource and reallocates an unfinished job with an efficiency and a distance of the resource. DDRSM is an efficient method for processing multiple large-scale jobs.

A Resource Reallocation Scheme Enhancing the Survivability of Essential Services (필수 서비스 생존성 향상을 위한 자원 재할당 기법)

  • Kim, Sung-Ki;Min, Byoung-Joon;Choi, Joong-Sup;Kim, Hong-Geun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.95-102
    • /
    • 2003
  • In order to guarantee the survivability of essential services against attacks based on new methodology, we need a solution to recognize important resources for the services and to adapt the urgent situation properly. In this paper, we present a dynamic resource reallocation scheme which is one of the core technologies for the construction of intrusion tolerant systems. By means of resource reallocation within a host, this scheme enables selected essential services to survive even after the occurrence if a system attack. Experimental result obtained on a test-bed reveals the validity of the proposed scheme for resource reallocation. This scheme may work together with IDS (Intrusion Detection System) to produce more effective responsive mechanisms against attacks.

Integration Architecture for Virtualized Naval Shipboard Computing Systems

  • Kim, Hongjae;Oh, Sangyoon
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.1
    • /
    • pp.1-11
    • /
    • 2013
  • Various computing systems are used in naval ships. Since each system has a single purpose and its applications are tightly coupled with the physical machine, applications cannot share physical resources with each other. It is hard to utilize resources efficiently in conventional naval shipboard computing environment. In this paper, we present an integration architecture for virtualized naval shipboard computing systems based on open architecture. Our proposed architecture integrates individual computing resources into one single integrated hardware pool so that the OS and applications are encapsulated as a VM. We consider the issue of varying needs of all applications in a naval ship that have different purposes, priorities and requirements. We also present parallel VM migration algorithm that improves the process time of resource reallocation of given architecture. The evaluation results with the prototype system show that our algorithm performs better than conventional resource reallocation algorithm in process time.

Resource Reallocation for the Protection of Essential Services (필수 서비스 보호를 위한 자원 재할당)

  • 민병준;김성기;최중섭;김홍근
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.714-723
    • /
    • 2003
  • In order to guarantee system survivability against attacks based on new methodology, we need a solution to recognize important resources for essential services and to adapt the urgent situation properly. In this paper, we present a dynamic resource reallocation scheme which is one of the core technologies for the implementation of intrusion tolerant systems. By means of resource reallocation within a node, this scheme enables the essential services to survive even after the occurrence of a system attack. If the settlement does not work within the node, resource reallocation among nodes takes places, thus the essential services are transferred to another prepared server node. Experimental result obtained on a testbed reveals the validity of the proposed scheme for resource reallocation. This scheme may work together with IDS(Intrusion Detection System) to produce effective responsive mechanism against attacks.

A Scheme of Resource Reallocation and Server Replication against DoS Attacks (서비스 거부 공격에 대비한 자원 재할당 및 서버 중복 방안)

  • Min, Byoung-Joon;Kim, Sung-Ki;Na, Yong-Hi;Lee, Ho-Jae;Choi, Joong-Sup;Kim, Hong-Geun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.1
    • /
    • pp.7-14
    • /
    • 2003
  • In order to cope with DoS (Denial of Service) attacks disturbing delivery of intended services by exhausting resources of computing nodes, we need a solution to recognize important resources for the essential services which have to be maintained under any circumstances and to adapt the system to the urgent situation and reconfigure itself properly. In this paper, we present a two-phase scheme to handle the problem. In the first phase, by means of dynamic resource reallocation within a computing node, we try to make the selected essential services survive even after the occurrence of an attack. For the second phase when it becomes impossible to continue the service in spite of the actions taken in the first phase, we apply server replication in order to continue the transparent provision of the essential services with the end users by utilizing redundant computing nodes previously arranged. Experimental result obtained on a testbed reveals the validity of the proposed scheme. A comparison with other proposed schemes has been conducted by analyzing the performance and the cost.

A Dynamic Resource Allocation Method in Tactical Network Environments Based on Graph Clustering (전술 네트워크 환경에서 그래프 클러스터링 방법을 이용한 동적 자원 할당 방법)

  • Kim, MinHyeop;Ko, In-Young;Lee, Choon-Woo
    • Journal of KIISE:Software and Applications
    • /
    • v.41 no.8
    • /
    • pp.569-579
    • /
    • 2014
  • In a tactical-edge environment, where multiple weapon resources are coordinated together via services, it is essential to make an efficient binding between an abstract service and a resource that are needed to execute composite services for accomplishing a given mission. However, the tactical network that is used in military operation has low bandwidth and a high rate of packet loss. Therefore, communication overhead between services must be minimized to execute composite services in a stable manner in the tactical network. In addition, a tactical-edge environment changes dynamically, and it affects the connectivity and bandwidth of the tactical network. To deal with these characteristics of the tactical network we propose two service-resource reallocation methods which minimize the communication overhead between service gateways and effectively manage neutralization of gateways during distributed service coordination. We compared the effectiveness of these two - methods in terms of total communication overhead between service gateways and resource-allocation similarity between the initial resource allocation and the reallocation result.

Dynamic Resource Reallocation using User Connection Pattern per Timeslot (시구간별 사용자 접속 패턴을 이용한 동적 자원 재분배)

  • 이진성;최창열;박기진;김성수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.572-574
    • /
    • 2003
  • 웹 서버 클러스터의 성능 개선을 위한 연구가 다양한 분야에서 이루어졌지만 로그 파일 분석과 같은 방식으로 접속 빈도를 통한 실시간 동적 자원 재분배에 관한 연구에만 대부분 초점을 맞추었다. 본 논문에서는 시구간별 접속 패턴 분석 결과를 기반으로 패턴을 예측하여 자원을 동적으로 재분배하는 메커니즘을 제안한다. 제안한 메커니즘은 불필요한 자원 낭비를 감소시켜 효율적인 자원 재분배를 통해 클러스터의 성능을 향상시킨다. 또한 시구간별 접속 패턴의 유사성을 증명한다.

  • PDF

Applying the Policy scheme to the IntServ

  • Song, Wang-Cheol
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.3
    • /
    • pp.109-114
    • /
    • 2003
  • There is an emergence of Internet applications that have real-time requirements. These applications require IP to support guaranteed capacity, higher priority and lower packet loss rate. To address this, the Internet Engineering Task Force (IETF) is developing a set of protocols and standards for Integrated Services on the Internet. Using RSVP and policies to manage the allocation of network resources in order to provide different levels of service is a topic of great interest to service providers. Currently, it is not possible to dynamically reallocate resources during an application's session. This paper discusses how policies in conjunction with new service class can provide a more enhanced network resource allocation by allowing for this dynamic reallocation.

Migration and Energy Aware Network Traffic Prediction Method Based on LSTM in NFV Environment

  • Ying Hu;Liang Zhu;Jianwei Zhang;Zengyu Cai;Jihui Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.896-915
    • /
    • 2023
  • The network function virtualization (NFV) uses virtualization technology to separate software from hardware. One of the most important challenges of NFV is the resource management of virtual network functions (VNFs). According to the dynamic nature of NFV, the resource allocation of VNFs must be changed to adapt to the variations of incoming network traffic. However, the significant delay may be happened because of the reallocation of resources. In order to balance the performance between delay and quality of service, this paper firstly made a compromise between VNF migration and energy consumption. Then, the long short-term memory (LSTM) was utilized to forecast network traffic. Also, the asymmetric loss function for LSTM (LO-LSTM) was proposed to increase the predicted value to a certain extent. Finally, an experiment was conducted to evaluate the performance of LO-LSTM. The results demonstrated that the proposed LO-LSTM can not only reduce migration times, but also make the energy consumption increment within an acceptable range.

Dynamic Resource Ranking and Grouping Algorithm for Grid Computing (그리드 컴퓨팅을 위한 동적 자원 랭킹 및 그룹핑 알고리즘)

  • Yi Jinsung;Park Kiejin;Choi Changyeol;Kim Sungsoo
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.471-482
    • /
    • 2005
  • The high-speed network permits Grid computing to handle large problem of management areas and share various computational resources. As there are many resources and changes of them in Grid computing, the resources should be detected effectively and matched correctly with tasks to provide high performance. In this paper, we propose a mechanism that maximizes the performance of Grid computing systems. According to a priority, grade and site of heterogeneous resources, we assign tasks to those resources. Initially, a volunteer's priority and ranking are determined by static information like as CPU speed, RAM size, storage size and network bandwidth. And then, the rank of resources is decided by considering dynamic information such as correctness, response time, and error rate. We find that overall Grid system performance is improved and high correctness using resource reallocation mechanism is achieved.