3 resultados para Proactive Security
em Greenwich Academic Literature Archive - UK
Resumo:
The factors that are driving the development and use of grids and grid computing, such as size, dynamic features, distribution and heterogeneity, are also pushing to the forefront service quality issues. These include performance, reliability and security. Although grid middleware can address some of these issues on a wider scale, it has also become imperative to ensure adequate service provision at local level. Load sharing in clusters can contribute to the provision of a high quality service, by exploiting both static and dynamic information. This paper is concerned with the presentation of a load sharing scheme, that can satisfy grid computing requirements. It follows a proactive, non preemptive and distributed approach. Load information is gathered continuously before it is needed, and a task is allocated to the most appropriate node for execution. Performance and reliability are enhanced by the decentralised nature of the scheme and the symmetric roles of the nodes. In addition, the scheme exhibits transparency characteristics that facilitate integration with the grid.
Resumo:
This paper presents a proactive approach to load sharing and describes the architecture of a scheme, Concert, based on this approach. A proactive approach is characterized by a shift of emphasis from reacting to load imbalance to avoiding its occurrence. In contrast, in a reactive load sharing scheme, activity is triggered when a processing node is either overloaded or underloaded. The main drawback of this approach is that a load imbalance is allowed to develop before costly corrective action is taken. Concert is a load sharing scheme for loosely-coupled distributed systems. Under this scheme, load and task behaviour information is collected and cached in advance of when it is needed. Concert uses Linux as a platform for development. Implemented partially in kernel space and partially in user space, it achieves transparency to users and applications whilst keeping the extent of kernel modifications to a minimum. Non-preemptive task transfers are used exclusively, motivated by lower complexity, lower overheads and faster transfers. The goal is to minimize the average response-time of tasks. Concert is compared with other schemes by considering the level of transparency it provides with respect to users, tasks and the underlying operating system.
Resumo:
We evaluated the impacts of wildlife on household food security and income in three semi-arid villages adjacent to Lake Manyara National Park (LMNP) and Mkomazi Game Reserve (MGR) in Northeastern Tanzania. Survey data were collected using both household interviews and human-wildlife conflict related archive information from the village government offices. Crop destruction by wildlife influenced both household food security and cash income. Crop damage to households was, on average, 0.08 ton/annum, equivalent to two months household loss of food and reduced household cash income by 1.3%. A combination of measures is proposed as incentives for conservation. These include provision of economic incentives, soft loans to initiate non-farm (e.g., ecotourism, business enterprises) projects to ease dependency on natural resources, increasing of reserves buffer zones and fencing of reserves.