23 research outputs found

    Exact performance analysis of a single-wavelength optical buffer with correlated inter-arrival times

    Get PDF
    Providing a photonic alternative to the current electronic switching in the backbone, optical packet switching (OPS) and optical bursts witching (OBS) require optical buffering. Optical buffering exploits delays in long optical fibers; an optical buffer is implemented by routing packets through a set of fiber delay lines (FDLs). Previous studies pointed out that, in comparison with electronic buffers, optical buffering suffers from an additional performance degradation. This contribution builds on this observation by studying optical buffer performance under more general traffic assumptions. Features of the optical buffer model under consideration include a Markovian arrival process, general burst sizes and a finite set of fiber delay lines of arbitrary length. Our algorithmic approach yields instant analytic results for important performance measures such as the burst loss ratio and the mean delay

    A Process Migration Approach to Energy-efficient Computation in a cluster of Servers

    Get PDF
    Application processes have to be efficiently performed on servers in a cluster with respect to not only performance but also energy consumption. In this paper, we newly propose a process migration (MG) approach to energy-efficiently performing application processes on servers in a cluster. First, a client issues an application process to a server in a cluster. A process performed on a current server migrates to another server if the server is expected to consume smaller electric energy to perform the process than the current server and the deadline constraint on the process is satisfied on the server. In the evaluation, the total energy consumption of servers is shown to be smaller and the average execution time of each process to be shorter in the MG algorithm than the round robin and random algorithms

    IT Security Issues Within the Video Game Industry

    Full text link
    IT security issues are an important aspect for each and every organization within the video game industry. Within the video game industry alone, you might not normally think of security risks being an issue. But as we can and have seen in recent news, no company is immune to security risks no matter how big or how small. While each of these organizations will never be exactly the same as the next, there are common security issues that can and do affect each and every video game company. In order to properly address those security issues, one of the current leading video game companies was selected in order to perform an initial security assessment. This security assessment provided a starting point upon which specific goals and procedures were determined to help mitigate those risks. The information contained within was initially completed on the case study but has been generalized to allow the information to be easily applied to any video game company.Comment: 16 page

    A Simple Server Selection Algorithm to Reduce Electric Power for Storage and Computation Processes

    Get PDF
    In application processes like Web and databases, files and databases are manipulated on servers. Thus, both CPU and storage resources are used to perform application processes. In this paper, we propose a computation model to give the expected termination time of each application process. Then, we propose an SGEAG (Simple Globally-Energy-Aware for General processes) algorithm to select a server to perform a new process issued by a client, which is expected to consume the minimum electric energy to perform not only the new process but also every current process. In the evaluation, we show the electric energy consumed by servers and the average execution time of processes can be more reduced in the SGEAG algorithm than the other algorithms

    Object-based Information Flow Control in Peer-to-peer Publish/Subscribe Systems

    Get PDF
    Distributed systems are getting so scalable like IoT (Internet of Things) and P2P (Peer-to-Peer) systems that millions of devices are connected and support various types of applications. Here, distributed systems are required to be secure in addition to increasing the performance, reliability, and availability and reducing the energy consumption. In distributed systems, information in objects flows to other objects by transactions reading and writing data in the objects. Here, some information of an object may illegally flow to a subject which is not allowed to get the information of the object. Especially, a leakage of sensitive information is to be prevented from occurring. In order to keep information systems secure, illegal information flow among objects has to be prevented. Types of synchronization protocols are so far discussed based on read and write access rights in the RBAC (Role-Based Access Control) model to prevent illegal information flow.In this thesis, we newly propose a P2PPSO (P2P type of topic-based PS (Publish/Subscribe) with Object concept) model and discuss the models and protocols for information flow control. A P2PPSO model is composed of peer processes (peers) which communicate with one another by publishing and subscribing event messages. Each peer can both publish and receive event messages with no centralized coordinator compared with traditional centralized PS models. Each event message published by a source peer carries information to a target peer. The contents carried by an event message are considered to be composed of objects. An object is a unit of data resource. Objects are characterized by topics, and each event message is also characterized by topics named publication topics.In order to make a P2PPSO system secure, we first newly propose a TBAC (Topic-Based Access Control) model. Here, an access right is a pair ⟨t, op⟩ of a topic t and a publish or subscribe operation op. A peer is allowed to publish an event message with publication topics and subscribe interesting topics only if the publication and subscription access rights are granted to the peer, respectively. Suppose an event message e_j published by a peer p_j carries an object on some topics into a target peer p_i. Here, information in the peer p_j illegally flows to the peer p_i if the target peer p_i is not allowed to subscribe the topics. An illegal object is an object whose topics a target peer is not allowed to subscribe. Even if an event message is received by a target peer by checking topics, objects carried by the event message may be illegal at the target peer. Hence, first, we propose a TOBS (Topics-of-Objects-Based Synchronization) protocol to prevent target peers from being delivered illegal objects in the P2PPSO system. Here, even if an event message is received by a target peer, illegal objects in the event message are not delivered to the target peer.In the TOBS protocol, every event message is assumed to be causally delivered to every common target peer in the underlying network. Suppose an event message e_2 is delivered to a target peer p_i before another event message e_1 while the event message e_1 causally precedes the event message e_2 (e_1 →_c e_2). Here, the event message e_2 is premature at the peer p_i. Hence, secondly, we propose a TOBSCO (TOBS with Causally Ordering delivery) protocol where the function to causally deliver every pair of event messages is added to the TOBS protocol. Here, we assume the underlying network supports reliable communication among every pair of peers, i.e. no event message loss, no duplicate message, and the sending order delivery of messages. Every pair of event messages received by using topics are causally delivered to every common target peer by using the vector of sequence numbers.In the TOBS and TOBSCO protocols, objects delivered to target peers are held as replicas of the objects by the target peers. If a peer updates data of an object, the peer distributes event messages, i.e. update event messages, to update every replica of the object obtained by other peers. If a peer updates an object without changing topics, the object is referred to as altered. Here, an update event message for the altered object is meaningless since peers check only topics to exchange event messages. Hence, thirdly, we propose an ETOBSCO (Efficient TOBSCO) protocol where update event messages of objects are published only if topics of the objects are updated to reduce the network overhead.In the evaluation, first, we show how many numbers of event messages and objects are prevented from being delivered to target peers in the TOBS protocol. Next, we show every pair of event messages are causally delivered but it takes longer to deliver event messages in the TOBSCO protocol than the TOBS protocol. Finally, we show the fewer number of event messages are delivered while it takes longer to update replicas of altered objects in the ETOBSCO protocol than the TOBSCO protocol.博士(工学)法政大学 (Hosei University

    Towards optimized one-step clustering approach in wireless sensor networks

    Get PDF
    This paper introduces a nonlinear integer programming model for the clustering problem in wireless sensor networks, with a threefold contribution. First, all factors that may influence the energy consumption of clustering protocols, such as cluster-heads selection and distribution, are considered implicitly in the model. Second, an innovative fitness function that directly maximizes the WSN lifetime is proposed. Finally, a global optimum of the whole network lifespan clustering schemes is targeted. The proposed model is then solved by a particle swarm optimization meta-heuristic based algorithm. This algorithm follows a centralized one-step off-line approach, in which the clustering schemes of the whole network lifetime and their associated durations are computed at the initialization of the network operations. The one-step approach is enabled by an energy prediction mechanism that allows to reduce the costs of the periodic network re-clustering. Simulation results show clear enhancement in network lifespan and number of received data packets as compared to some state-of-the-art clustering approaches

    Green IT: Sustainability by aligning business requirements with IT resource utilization

    Get PDF
    The term “green IT” is defined as “Optimal use of Information and Communication Technology (ICT) for managing the environment sustainability of enterprise operations throughout their life cycles.” Its objective is to create a positive impact on environment through net lowered emissions. The heart of green IT (Information Technology) is the concept of “Environmental Sustainability,” its initiatives are multifaceted to support enterprises “business as usual model,” in low-carbon economy. Many green IT initiatives have provided short–term financial benefits, based on which organizations are now focusing on increased energy efficiency. Since many of these approaches provide less financials benefits’ which are harder to implement but provides improved environmental performance. So the financial benefits and environmental performance should be the multiple objectives in the green IT study.Master of Computing (by Research
    corecore