scholarly journals A Novel Parallel Transmission Strategy for Data Grid

Author(s):  
QU Ming-Cheng ◽  
WU Xiang-Hu ◽  
Yang Xiao-Zong

<p>Creation of multi-copies accelerates data transmission and reduces network traffic, but it causes overhead storage and additional network traffic. A variety of parallel transmission algorithms based on GridFTP and multi-copy can be used to accelerate data transmission further, but they can not adapt to a wide range of network, and they can not be used to solve the problems of storage space and network traffic waste. GridTorrent combined with BitTorrent and GridFTP has compatibility with grid and has flexible scalability, but the speed is very slow when there are few peers, to solve this problem multicopy is needed also. To achieve multiple optimization objectives of storage space saving, suitable for two kinds of application modes(i.e. parallel transfer based on GridFTP and BitTorrent), adaptability for wide range of network and higher performance when there are fewer peers, based on the idea of GridTorrent, a distributed storage model, parallel transfer algorithm and virtual peer strategy are proposed. In experiments the performance is compared among the verification system VPG-Torrent and original parallel transfer algorithm<br />(DCDA) only based on GridfTP &amp; multi-copy and GridTorrent. When the same amount of data is deployed VPG-Torrent has better performance than DCDA, and when there are fewer peers VPG-Torrent also exceed GridTorrent, which prove the effectiveness of VPG-Torrent.</p>

2020 ◽  
Vol 12 (12) ◽  
pp. 31-43
Author(s):  
Tatiana A. VASKOVSKAYA ◽  
◽  
Boris A. KLUS ◽  

The development of energy storage systems allows us to consider their usage for load profile leveling during operational planning on electricity markets. The paper proposes and analyses an application of an energy storage model to the electricity market in Russia with the focus on the day ahead market. We consider bidding, energy storage constraints for an optimal power flow problem, and locational marginal pricing. We show that the largest effect for the market and for the energy storage system would be gained by integration of the energy storage model into the market’s optimization models. The proposed theory has been tested on the optimal power flow model of the day ahead market in Russia of 10000-node Unified Energy System. It is shown that energy storage systems are in demand with a wide range of efficiencies and cycle costs.


2013 ◽  
Vol 373-375 ◽  
pp. 743-751
Author(s):  
Wen Li ◽  
Xiao Mei Wang ◽  
Xue Ke Luo

In order to solve data lack of underground water research and monitoring situation, a wide range underground water lever dynamic information monitoring network system was designed. Remote monitoring terminal based on the techniques of embedded and wireless transmission monitored the change of underground water level; Monitoring analysis center based on the JAVA technology of B/S architecture was designed to inquiry the real-time data,set parameter and analyze data, etc. An approximate water level point was obtained by adopting the modified small period prediction model and the weight distribution method. This enhances reliability of monitored data. By utilizing the technology of GPRS wireless data transmission and Ethernet technology, a remote and real-time data transmission channel was build. Large area application in Shanxi Province shows that the system has the stable performance and the reasonable structure. System can provide long-term reliable data for underground water research.


Author(s):  
Shuping Dang ◽  
Guoqing Ma ◽  
Basem Shihada ◽  
Mohamed-Slim Alouini

<pre>The smart building (SB), a promising solution to the fast-paced and continuous urbanization around the world, is an integration of a wide range of systems and services and involves a construction of multiple layers. The SB is capable of sensing, acquiring and processing a tremendous amount of data as well as performing proper action and adaptation accordingly. With rapid increases in the number of connected nodes and thereby the data transmission demand in SBs, conventional transmission and processing techniques are insufficient to provide satisfactory services. To enhance the intelligence of SBs and achieve efficient monitoring and control, both indoor visible light communications (VLC) and machine learning (ML) shall be applied jointly to construct a reliable data transmission network with powerful data processing and reasoning abilities. In this regard, we envision an SB framework enabled by indoor VLC and ML in this article.</pre>


Author(s):  
Abhishek Mungekar ◽  
Yashraj Solanki ◽  
R. Swarnalatha

An Industrial firewall is a system used to supervise and regulate traffic to and from a network for the purpose of securing appliances on a network. It analyzes the data passing through it to an already defined surveillance criteria or protocols, discarding data that does not meet the protocol’s requirements. In effect, it is a filter preventing undesirable network traffic and selectively limiting the type of transmission that occurs between a secured transmission line. In this research paper a SCADA based Firewall is implemented for protection of the data transmission to a PLC, against external hacking devices. This firewall is virtually exposed to several external hackers and the degree of vulnerability is carefully studied, in order to develop an ideal Firewall.


Author(s):  
Dimitar Radev ◽  
Izabella Lokshina ◽  
Svetla Radeva

The paper examines self-similar properties of real telecommunications network traffic data over a wide range of time scales. These self-similar properties are very different from the properties of traditional models based on Poisson and Markov-modulated Poisson processes. Simulation with stochastic and long range dependent traffic source models is performed, and the algorithms for buffer overflow simulation for finite buffer single server model under self-similar traffic load SSM/M/1/B are explained. The algorithms for modeling fixed-length sequence generators that are used to simulate self-similar behavior of wireless IP network traffic are developed and applied. Numerical examples are provided, and simulation results are analyzed.


Sign in / Sign up

Export Citation Format

Share Document