SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 6 (June 2012), PP.01-09
www.ijerd.com

           Research Method to Optimize Logger for a Telecom
               Application Running on Embedded System
      M.Rajendra Prasad1, V.Sharath 2, G.Nagendra3, K.Damodara Reddy 4,
                                  V.Sridhar5
             1
               Associate Professor, ECE Department, Vidya Jyothi Institute of Technology, Hyderabad, India
             2
               Associate Professor, EEE Department, Vardhaman College of Engineering, Hyderabad, India
                         3
                           Associate Professor, ECE Department, VBIT, Proddatur, Kadapa, India
              4
                Assistant Professor, EEE Department, Vardhaman College of Engineering, Hyderabad, India
             5
               Assistant Professor, ECE Department, Vidya Jyothi Institute of Technology, Hyderabad, India


Abstract––Most of the embedded telecom applications running on customized processor boards are needed to record
their activities in the form of log messages. These messages help telecom application developers to troubleshoot virtually
all kinds of system and application problems. The logger also provides valuable early warning signs and also provides
with crucial forensic data .Hence Logger’s performance is to be investigated and optimization is required for logger. In
this project we are proposing a method to optimize logger for IPBTS application running on embedded system. This
paper describes the procedure to asses and analyse logger with the syslog for telecom application and also elaborates the
method to measure the logging time with a test application which contains two threads running on customized processor
board. These papers presents the procedure to measure logging time and compare it with optimized syslog package
logging time on linux operating file system. With this research experiment for logger, we minimized Layer 1 processing
time in IPBTS product development project from 1700 micro seconds to 160 micro seconds. Layer 1 processing time
includes channel activatation i.e. non combined CCCH channel, 3 TCHF, 1 SDCCH8 and mode of activation is by BTS
controller stub. This paper also presents the experimental results to optimize syslog package for IPBTS application
development on linux environment running on MPC 8548E processor board.

Keywords––IP BTS, layer1, embedded systems, MPC 85xx processor board, linux kernel.

                                            I.        INTRODUCTION
         This document describes, and is written to conform to, author guidelines for the journals of AIRCC series. It is
prepared in Microsoft Word as a .doc document. Although other means of preparation are acceptable, final, camera-
ready versions must conform to this layout. Microsoft Word terminology is used where appropriate in this document.
Although formatting instructions may often appear daunting, the simplest approach is to use this template and insert
headings and text into it as appropriate.

          BTS software is responsible for channel encoding/decoding, multiplexing/de-multiplexing, call establishment,
speech communication through full rate speech channel, transmission of speech through RTP on Abis interface [3],
support of short circuited call, and support of transmission of signalling over TCP/IP on Abis interface [10]. Audit
mechanism for UNIX operating system and telecom application messages [4] [5] [13] is defined as syslog. To
incorporate logging into their projects, and to provide system administrators with a single point of management for
collecting, distributing and processing audit data syslog has been designed. Its design makes it more facile for embedded
or telecom application developers and system analysts to perform the below functions. Mostly, the data will be
influenced by a lot of people, which finally ends up in a system log. Ball rolling will be started by the developer, by
determining
         Events which create a log entry
         Kinds of information in the log entry
         Significance of events
         How the information will be formatted


If the end user has control over the quantity or types of logs that are generated, application administrator or local system
should decide the actions that have to be applied to the log data, based on the telecom application or system component
that generated the log entry, and the significance assigned to the log entry by its developers. Because of a coars e-grained
system, it has lot of options for collecting and acting on syslog data logger [11] [12]. Application administrator or local
system can choose amongst the following alternatives:
         write the log entry to a local file(particular to that application )
         write the log entry to a remote system running syslog (loghost) throughout these configuration documents
         The log entry must be broadcasted to users logged into the host computer
         The log entry should be written upon the system console.

                                                             1
Research Method to Optimize Logger for a Telecom Application Running on Embedded System

   To maximize flexibility and facilitate-of-use, architecture has been designed. There are very few guidelines available
for system administrators or developers, which implies that implementing an enterprise logging system includes a lot of
trial and error.

BEHAVIOUR OF SYSLOG
          The file /etc/syslog.conf controls the storage or distribution of data from different applications and subsystems
on the host operating system, and of different levels of severity based on embedded system. This configuration file
consists of multiple lines. One of the main security log systems [5] [7] on a UNIX system [9], which is naturally
implemented on every Linux machine as well, is the log−keeping facility, which logs all user actions, processes, system
events etc. The configuration file of the so−called syslog [11] [12] daemon determines which and how long logged
information will be kept. The default location of all logs is /var/log, containing different files for access log, server logs,
system messages etc.

           The syslog function sends a logging message to the logging facility. Each message has a priority argument that
is a bitwise or of a severity level and a facility value. The severity level controls how the log message is acted upon and
the facility value records the originator of the message.

          Facility values (from syslog.h) include LOG_USER, used to indicate that the message has come from a user
application, (the default), and LOG_LOCAL0, LOG_LOCAL1, up to LOG_LOCAL7, which can be assigned meanings
by the local administrator. The severity levels in descending order of priority are described in table 1.

PRIORITY LEVEL DESCRIPTION

LOG_EMERG                            An emergency situation messages
LOG_ALERT                            High-priority problem, such as database corruption messages
LOG_CRIT                             Critical error, such as hardware failure messages
LOG_ERR                              Error messages
LOG_WARNING                          Warning messages
LOG_NOTICE                           Special conditions requiring attention messages
LOG_INFO                             Informational messages
LOG_DEBUG                            Debug messages


                                                           Table 1
The architecture model of IPBTS telecom application [6] controller is shown in Figure 1. It also represents the BTS
Controller block diagram, functionalities and its interfaces with other protocols like Layer 1, Link Access Protocol for the
Dm channel (LAPDm), LAPD Interface (LAPDIF), and Radio Resource Management at BTS (RRBTSM). This paper
describes the optimization method for logger which reduces Layer 1 processing time and all other logging functionalities.

                                            II.       RELATED WORKS
           Today due to the of economical leverage and overwhelming advancements in the development of the IP based
telecom applications running on embedded system researchers [2] are focussing on IP based telecom appositeness issues
and investigating new approaches. Musabekov S.B describes [10] the procedure with establishing GSM link over
Satellite Abis interface, which is defined between base transceiver station (BTS) and base station controller (BSC). An
augmented performance approach being explored by simulation. Rajendra Prasad M [2] proposes the procedure for
transplanting linux kernel on PowerPC based custom board which is considered as an embedded system targeted for
IPBTS application software. GU zhaojun wang chao presented a secured host based secure state model [1].Horn. B
discussed a web based logger for general purpose set of component interfaces for logging data in a heterogeneous
computing distributed environment[8]. Rajendra Prasad emphasizes the research method describing with elaborate
design of RTP module for IP-BTS. BTS provides the physical connection of an MS to the network in the form of Air-
interface. [3]. In this paper we are describing the research method to optimise Layer 1 log messages processing time in
IPBTS product development research project.




                                                              2
Research Method to Optimize Logger for a Telecom Application Running on Embedded System



                                                                              OAM




                                                                                       BTS Controller

              RRBTSM

                                                                     Initialization & Configuration
                                                                          Parameter Handling



              LAPDIF

                                                                     Status Monitoring and Control

             LAPDm                                               Controlling BTS_Control()


                                                                               Shutdown/Reset

     L1/RTP

                                                                                      Logger



                                                Figure 1: BTS Controller

                                        III.      EXPERIMENT SET UP
          For the above experiment a customized processor board is designed for a telecom IPBTS application logger
testing. The technical specifications are tabulated in Table 1. The PPC based target boards are based on free scale
MPC8548E PowerPC processor. The Processor board is designed as flexible board to accommodate MPC8548E and
MPC8543E processors. The top side view and bottom side view of customized board are depicted in Fig 3 Fig 4. The
detailed information about the processor (MPC 8548E) can be available in [16].Because of the open source, rich code
resource and for supporting many kinds of CPU architecture, linux is making steady progress in the embedded arena.

PROCESSOR BOARD SPECIFICATIONS
 CPU             Memory                             Ethernet                           Operating System
 Free      scale DDR2 - 256 MB                      Two 10/100 Ethernet ports          Embedded Linux (2.6.10)
 MPC8548E        Boot Flash – 32 MB                 (DP83848C Fast PHY Ethernet
 PowerPC         User Flash – 32 MB                 ICs)
 Processor       2 serial EEPROMS
                 (Boot           sequencer
                 EEPROM and Board ID
                 EEPROM of 8Kb)


                                                         Table 2
In the recent years linux as operating system has been attractive choice in many embedded telecom applications.
Optimization of syslog is tested on linux operating system and its version is 2.6.10.Porting of linux kernel to the custom
boards is described by M.Rajendra Prasad [2]. The images for this embedded system are shown in the figure 2. U-boot is
used as a boot loader and linux kernel image of 2.6.10 version running on customized processor boards along with
customized file system with optimized syslogd-1.4.1 package. The ram disk file system contains the BTSSW and
                                                            3
Research Method to Optimize Logger for a Telecom Application Running on Embedded System

syslogd-1.4.1 package, which is a vital portion of this research project. The source code files referenced above are taken
from open source repositories. There will be changes in these components to minimize Layer1 processing time and other
functionalities and these changes are beyond the scope of this paper. During the experiment presented in this paper,
execution time of two threads (Thread 1 and Thread 2) on Processor board with optimized code of syslogd package are
tabulated


                      Images on customized processor board for logger Testing



                                       Boot loader


                                       Kernel

                                 File system which contain the system logged
                                 package with IPBTS application software




                                  Figure 2 Processor board (IPBTS Controller) images




                           Figure .3 Top side view of custom based embedded system board

                                     IV.       RESULTS AND ANALYSIS
          In this section, optimization method for logger is proposed and results of a test application comprises with two
threads are analysed.




                                                            4
Research Method to Optimize Logger for a Telecom Application Running on Embedded System




                            Figure .4 Bottom side view of custom based embedded system board.

PROPOSED OPTIMIZATION METHOD
  1.  LOG_PERROR flag was removed from openlog() system call as it was printing the messages being logged on
      the console
  2.  Code relating to gethostbyname method is removed from openlog() system call
  3.  Code regarding UDP socket is removed as in our project we do not require remote logging option.
  4.  Select system call code is optimized as only UNIX domain sockets are being created.

A.         TESTING OF LOGGER BY APPLYING PARTIAL OPTIMIZATION METHOD (PO)
           A test application is designed to measure the logger performance. Test application comprises of two threads
that are created and calculated the logging time for syslog [12] as shown in the table 3 on the processor board on linux
2.6.10 version environment. Each time measurement above (except Avg. Time measurement) is calculated for an average
of 1000 readings. Avg. Time is the average of five set of readings as shown the Table III. The average logging time for
thread 1 is 241.1349 micro sec on processor board without any optimization technique.

          After applying of step 1 of optimization method partial optimization (PO) thread 1 processing time is reduced
to 175.6757 micro sec as shown in the Table III and same technique is analysed and assessed in graph as shown in the fig
5..Similarly thread 2 log processing times are analysed and depicted in Table 3 and fig 6 as a graph..


                                                 Processor Board
                                              LOGGER TIME MEASUREMENTS
                                              Time( microseconds )

              Thread 1 Thread 1(PO) Avg. Time (Thr 1)
                                               Avg. Time (Partial optimized- thr 1) PO
                                                          Thread 2       Thread 2        Avg. Time (Thr 2)Time PO thr 2
                                                                                                     Avg.
     syslog() 238.036    249.933         0          0      334.785         124.544            0              0
              335.704     247.77         0          0      247.801         179.106            0              0
              346.516    136.753         0          0      277.983         216.364            0              0
              175.044    124.739         0          0      317.634         123.477            0              0
              171.294    136.924         0          0      318.016         227.336            0              0
              170.468    130.692         0          0      324.471         138.409            0              0
              181.607    124.865         0          0      328.799         228.232            0              0
              334.658    131.444         0          0      241.081         244.083            0              0
               281.11    223.919         0          0       331.86         248.963            0              0
              176.912    249.718     241.1349 175.6757 317.841             124.296        304.0271        185.481
                                                          Table 3
                                                             5
Research Method to Optimize Logger for a Telecom Application Running on Embedded System


B.        TESTING OF LOGGER BY APPLYING OPTIMIZATION METHOD.
          After applying proposed optimized method discussed above to syslogd-1.4.1 package the same thread1
processing time with the optimized syslog is reduced to 61.005 micro sec and thread 2 is reduced to 102.8871 as shown
in the Table 4 and a graph is drawn and analysed in graph 3.



                                             Processor Board- Thread 1
                      400
                      350
                      300
      Time(ms)




                      250
                                                                                                       Thread 1
                      200
                      150                                                                              Thread 1(PO)
                      100                                                                              Avg. Time (Th 1)
                       50                                                                              Avg. Time (PO th 1)
                        0
                             1       2       3       4       5       6       7       8   9   10
                                                             Threads

                                 Figure.5 Performance of thread 2 on custom based embedded system board.




                                             Processor Board- Thread 2
                       400
                       350
                       300
           Time(ms)




                       250
                                                                                                         Thread 2
                       200
                       150                                                                               Thread 2 PO
                       100                                                                               Avg. Time (Thr 2)
                        50
                         0                                                                               Avg. Time PO th2
                                 1       2       3       4       5       6       7       8   9    10
                                                                 Threads


                                 Figure .6 Performance of thread 2 on custom based embedded system board




                                                                                 6
Research Method to Optimize Logger for a Telecom Application Running on Embedded System


                                         Optimized syslog
                       LOGGER TIME MEASUREMENTS
                              Time( microseconds )
             Thread 1 Thread 2 Avg. Time (Thread 1) Avg. Time (Thread 2)
    syslog() 52.925   106.104
              55.469  105.945
              53.469  105.182
              52.061  103.795
              61.251  112.082
               87.55   130.79
              71.563   76.347
              60.848    91.74
              58.123   98.318
              56.791   98.568
                                        61.005             102.8871

                                                         Table 4


                                            OPTIMIZED SYSLOG
                    140                 LOGGER TIME MEASUREMENTS
                    120

                    100
                 T                                                                                 Thread 1
                   80
                 i
                   60
                                                                                                   Thread 2
                 m
                   40
                 e                                                                                 Avg. Time
                      20
                 (




                                                                                                   (Thread 1)
                 m     0                                                                           Avg. Time
                 s           1     2    3     4     5    6       7   8    9    10    11            (Thread 2)
                                                   Threads
                  )




          Fig.7 Performance of thread 1 & 2 on custom based embedded system board with optimized syslog.

          IP BTS Controller application running on customized PowerPC based processor board will support default
logging and tracing for all the protocols and modules using the linux logging facilities. In this section we have optimized
logger to minimize logging time for our IPBTS research project. The log messages for IPBTS with optimized syslogd-
1.4.1 package in the linux file system are depicted in the figure 8.




                                                             7
Research Method to Optimize Logger for a Telecom Application Running on Embedded System




                                     Figure .8 Optimized log messages of IPBTS


                                           V.        CONCLUSIONS
          In this paper we proposed an optimized logger for telecom application (IPBTS) running on customized PPC
[15] based board which reduces 10 times of layer 1 processing time and also syslog performance is analyzed and assessed
for IPBTS application. The performance levels are very much superior than the existing open source syslog package. The
changes also discussed briefly this paper. This method can be applied to any syslog based log systems for any telecom
application running on any platforms for different operating systems.

                                     VI.        ACKNOWLEDGEMENTS
          Thanks to Wireless & Embedded System Group, Prof. G.Sri Ram Reddy and faculty members of ECE
Department, VJIT for their suggestions and encouragement in the process of this research paper. We would like to
dedicate this paper to Mr. M. Rajendra Prasad’s mother Late B.Suseelamma for her motivation towards this research
project.


                                                          8
Research Method to Optimize Logger for a Telecom Application Running on Embedded System

                                                         REFERENCES
 [1].      GU zhaojun wang chao,”Statistic and analysis for host-based syslog”, Education technology and computer science (ETCS),
           2010 second international workshop,vol: 2, pp.277-280, 6-7 march 2010.
 [2].      Rajendra Prasad.M, S. Ramasubba Reddy, V.Sridhar, “Framework to port linux kernel on powerpc based embedded system
           used for telecom application – ipbts”, International Journal of Software Engineering & Applications (IJSEA), Vol. 2, No.4,
           pp127-139, 2011
 [3].      Rajendra Prasad.M, G.Nagendra, Ravi Mathey , V.Sridhar “Research Method For Transmission Of Speech Through RTP
           Packets On Abis Interface For IPBTS”, International Journal of Computer Information Systems,Vol. 3, No. 6, 2011
 [4].      Slavicek, k. ledvinka, J.Javornik, M.Dostal,”Mathematical processing of syslog messages from routers and switches”, Inst.
           Of comput.sci, Masaryk univ., Bron, in Information and automation for sustainability, ICIAFS 4th international conference,
           pp.463-468, 12-14 dec 2008
 [5].      Tsunoda, H.maruyarna, T.ohta, K.waizurni, Y.keeni, G.M.Nernoto,”A prioritized retransmission mechanism for reliable and
           efficient delivery of syslog messages’’, Fac. Of eng., tohoku inst. Of technol., Sendai, in Communication networks and
           service research conference, CNSR’09 seventh annual, pp.:158-165, 11-13 may 2009.
 [6].      Chinghway lim singh, n.yajnik,”A log mining approach to failure analysis of enterprise telephony systems”, Dependable
           systems and Network with FTCS and DCC, 2008 IEEE international conference, pp: 398-403, 24-27 june 2008.
 [7].      Forte,D.V. maruti,C.vetturi,M.R.zambelli,”Secsyslog:an approach to secure logging based on covert channels”,Incident
           response Italy project,univ. of Milano,crema,Italy, in Systematic approaches to digital forensic engineering, first international
           workshop,pp:248-263,7-9 nov,2005.
 [8].      Horn,B. balakrishnan,H.Maniampadavathu,B.T.Warnes,J.elko,D.A,”A logger system based on web services”,IBM systems
           journal,Vol:43 issue:4,pp:723-733,2004.
 [9].      Simache,c.kaaniche,”Availability assessment of sunos/solaris unix systems based on syslogd and wtmpx log files:a case
           study,Laas-Cnrs,Toulouse,france,in dependable computing,11 th pacific rim international sysmposium,pp:8,12-14 dec 2005.
[10].      Musabekov S.B, Srinivasan, P.K., Durai, A.S. Ibroimov R.R, (2008) “Simulation analysis of abis interface over IP over
           DVB-S2-RCS in a GSM over satellite network”, ICI 4th IEEE/IFIP International Conference BC Transactions on ECE,
           Vol. 10, No. 5, pp120-122
[11].      Monteiro, S.D.S. erbacher,”Exemplifying attack identification and analysis in a novel forensically viable syslog model”,
           Systematic approaches to digital forensic engineering, SADFE’08 third international workshop, pp: 57-68, 22 may 2008.
[12].      Fukuda, K. presto jst,”On the use of weighted syslog time series for anomaly detection”, integrated network management,
           pp: 393-398, 23-27 may 2011.
[13].      K. Slavicek, J. Ledvinka, M. Javornik. "Mathematical Processing of Syslog Messages from Routers and Switches",
           2008IEEE.
[14].      J.Kelsey, J.Callas, and A.Clemm. Signed syslog Messages. Internet Draft, December 2008.
[15].      “The PowerPC Architecture: A Specification for a New Family of RISC Processors”, Second Edition, by International
           Business Machines, Inc.
[16].      MPC8548E PowerQUICC III™ Integrated Host Processor Family Reference Manual, MPC8548ERM Rev. 1, 2005.

                                                             AUTHORS
           M.Rajendra Prasad obtained his B.E and M.E Electronics and Communication Engineering from SK University and
           Osmania University, Hyderabad respectively. He has 12 years of experience in embedded and telecom application research
           and development. He is currently working as Associate Professor, ECE Department, VJIT, Hyderabad. He has authored
           several Technical papers in International magazines and had more papers in Internatinational Journals. His main research
           interests are embedded systems, wireless protocols and RTOS.


          V.Sharath Babu is working as Associate. Professor in EEE department in Vardhaman College of Engineering (Autonomous)
          Hyderabad, INDIA. He has 8 years of experience in electrical applicationdevelopment and control system engineering. His
          research interests includes embedded systems for electrical and electronic applications.


             G.NAGENDRA is working as Associate. Professor in Department of Electronics and communication Engineering for
             VBIT, Proddatur, Kadapa . He completed M.Tech (Communications and Signal Processing) from S.K University,
             Ananthapur. He completed B.Tech Degree in E.C.E from J.N.T.U.H. His area of research includes Digital Signal
             Processing, Digital Image Processing, Embedded Systems, Mobile communications and Artificial neural networks.


            K. Damodara Reddy is working as a senior Assistant professor in EEE department in Vardhaman College of Engineering
            (Autonomous) Hyderabad INDIA. He has 4 years of experience in research. His research interests includes embedded
            systems for Electrical & Electronics applications, power electronics and multi level inverters.

             V. Sridhar working as Assistant professor in ECE department at Vidya Jyothi Institute of Technology, Hyderabad from
            2009. He completed M. Tech with Specialization Wireless and mobile communication systems from vardhaman college of
            engineering (AUTONOMOUS) JNTUH in 2011.He has completed M.Sc (IT) from Nagarjuna University and completed
            Electronics and telecommunication engineering from VJIT, JNTUH in 2007. His areas of research interests include Wireless
            and Mobile communications, Digital signal processing, image processing, Telecommunications, communication systems,
            signal processing. He is Lifetime Member of ISTE and IETE.




                                                                    9

Más contenido relacionado

La actualidad más candente

Enterprise PL1 - Peter Elderon
Enterprise PL1 - Peter ElderonEnterprise PL1 - Peter Elderon
Enterprise PL1 - Peter ElderonNRB
 
Implementation of resource sharing strategy for power optimization in embedde...
Implementation of resource sharing strategy for power optimization in embedde...Implementation of resource sharing strategy for power optimization in embedde...
Implementation of resource sharing strategy for power optimization in embedde...Alexander Decker
 
Introduction to Embedded System I: Chapter 2 (5th portion)
Introduction to Embedded System I: Chapter 2 (5th portion)Introduction to Embedded System I: Chapter 2 (5th portion)
Introduction to Embedded System I: Chapter 2 (5th portion)Moe Moe Myint
 
Iisrt arshiya hesarur
Iisrt arshiya hesarurIisrt arshiya hesarur
Iisrt arshiya hesarurIISRT
 
A generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemA generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemConference Papers
 
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIESEFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIEScscpconf
 
Instruction Level Parallelism Compiler optimization Techniques Anna Universit...
Instruction Level Parallelism Compiler optimization Techniques Anna Universit...Instruction Level Parallelism Compiler optimization Techniques Anna Universit...
Instruction Level Parallelism Compiler optimization Techniques Anna Universit...Dr.K. Thirunadana Sikamani
 

La actualidad más candente (13)

Enterprise PL1 - Peter Elderon
Enterprise PL1 - Peter ElderonEnterprise PL1 - Peter Elderon
Enterprise PL1 - Peter Elderon
 
Implementation of resource sharing strategy for power optimization in embedde...
Implementation of resource sharing strategy for power optimization in embedde...Implementation of resource sharing strategy for power optimization in embedde...
Implementation of resource sharing strategy for power optimization in embedde...
 
Introduction to Embedded System I: Chapter 2 (5th portion)
Introduction to Embedded System I: Chapter 2 (5th portion)Introduction to Embedded System I: Chapter 2 (5th portion)
Introduction to Embedded System I: Chapter 2 (5th portion)
 
A044050107
A044050107A044050107
A044050107
 
Iisrt arshiya hesarur
Iisrt arshiya hesarurIisrt arshiya hesarur
Iisrt arshiya hesarur
 
Unit 2
Unit 2Unit 2
Unit 2
 
A generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemA generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration system
 
Task assignment and scheduling
Task assignment and schedulingTask assignment and scheduling
Task assignment and scheduling
 
CDR2(Sajjad Tarahomi)
CDR2(Sajjad Tarahomi)CDR2(Sajjad Tarahomi)
CDR2(Sajjad Tarahomi)
 
419 426
419 426419 426
419 426
 
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIESEFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
 
Ig3514391443
Ig3514391443Ig3514391443
Ig3514391443
 
Instruction Level Parallelism Compiler optimization Techniques Anna Universit...
Instruction Level Parallelism Compiler optimization Techniques Anna Universit...Instruction Level Parallelism Compiler optimization Techniques Anna Universit...
Instruction Level Parallelism Compiler optimization Techniques Anna Universit...
 

Destacado

2012 indonesia
2012 indonesia2012 indonesia
2012 indonesiaIra Tobing
 
Epaper Surya 16 Agustus 2013
Epaper Surya 16 Agustus 2013Epaper Surya 16 Agustus 2013
Epaper Surya 16 Agustus 2013Portal Surya
 
Suara Merdeka 26 Februari 2014
Suara Merdeka 26 Februari 2014Suara Merdeka 26 Februari 2014
Suara Merdeka 26 Februari 2014hastapurnama
 
Newspaper cutting - marine and aviation insurance mh370
Newspaper cutting - marine and aviation insurance mh370Newspaper cutting - marine and aviation insurance mh370
Newspaper cutting - marine and aviation insurance mh370hasyimah ismail
 
45 kasus korupsi kelas kakap indonesia
45 kasus korupsi kelas kakap indonesia45 kasus korupsi kelas kakap indonesia
45 kasus korupsi kelas kakap indonesiaFreddy Then
 
Media Indonesia 27 Februari 2014
Media Indonesia 27 Februari 2014Media Indonesia 27 Februari 2014
Media Indonesia 27 Februari 2014hastapurnama
 
Catatan nusantara
Catatan nusantaraCatatan nusantara
Catatan nusantaraGus Andy
 
Bank Century
Bank CenturyBank Century
Bank Centuryrossmcle
 
Sách Trẻ Thơ Trong Gia Đình - Maria Montessori
Sách Trẻ Thơ Trong Gia Đình - Maria MontessoriSách Trẻ Thơ Trong Gia Đình - Maria Montessori
Sách Trẻ Thơ Trong Gia Đình - Maria MontessoriNhân Nguyễn Sỹ
 
Reconstructing Third World Elite Rotation Events from Newspapers
Reconstructing Third World Elite Rotation Events from NewspapersReconstructing Third World Elite Rotation Events from Newspapers
Reconstructing Third World Elite Rotation Events from NewspapersVincent Traag
 
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede AudittaMencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede AudittaI Gede Auditta
 
Media Indonesia 5 Maret 2014
Media Indonesia 5 Maret 2014Media Indonesia 5 Maret 2014
Media Indonesia 5 Maret 2014hastapurnama
 
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...sailendrahendra
 
Sejarah Ikatan Alumni Statistika Universitas Diponegoro (IKALISTA)
Sejarah Ikatan Alumni Statistika Universitas Diponegoro (IKALISTA)Sejarah Ikatan Alumni Statistika Universitas Diponegoro (IKALISTA)
Sejarah Ikatan Alumni Statistika Universitas Diponegoro (IKALISTA)Arsyil Hendra Saputra
 
Leveraging Business Rules in TIBCO BusinessEvents
Leveraging Business Rules in TIBCO BusinessEventsLeveraging Business Rules in TIBCO BusinessEvents
Leveraging Business Rules in TIBCO BusinessEventsTim Bass
 
Makalah fix kasus hambalang
Makalah fix kasus hambalangMakalah fix kasus hambalang
Makalah fix kasus hambalangGerlan Hahanusa
 
Tripda Proposal for University Engagement
Tripda Proposal for University EngagementTripda Proposal for University Engagement
Tripda Proposal for University EngagementMax Lee
 

Destacado (20)

2012 indonesia
2012 indonesia2012 indonesia
2012 indonesia
 
2014_indonesia
2014_indonesia2014_indonesia
2014_indonesia
 
Epaper Surya 16 Agustus 2013
Epaper Surya 16 Agustus 2013Epaper Surya 16 Agustus 2013
Epaper Surya 16 Agustus 2013
 
Suara Merdeka 26 Februari 2014
Suara Merdeka 26 Februari 2014Suara Merdeka 26 Februari 2014
Suara Merdeka 26 Februari 2014
 
Newspaper cutting - marine and aviation insurance mh370
Newspaper cutting - marine and aviation insurance mh370Newspaper cutting - marine and aviation insurance mh370
Newspaper cutting - marine and aviation insurance mh370
 
45 kasus korupsi kelas kakap indonesia
45 kasus korupsi kelas kakap indonesia45 kasus korupsi kelas kakap indonesia
45 kasus korupsi kelas kakap indonesia
 
Media Indonesia 27 Februari 2014
Media Indonesia 27 Februari 2014Media Indonesia 27 Februari 2014
Media Indonesia 27 Februari 2014
 
Catatan nusantara
Catatan nusantaraCatatan nusantara
Catatan nusantara
 
Bank Century
Bank CenturyBank Century
Bank Century
 
Sách Trẻ Thơ Trong Gia Đình - Maria Montessori
Sách Trẻ Thơ Trong Gia Đình - Maria MontessoriSách Trẻ Thơ Trong Gia Đình - Maria Montessori
Sách Trẻ Thơ Trong Gia Đình - Maria Montessori
 
Reconstructing Third World Elite Rotation Events from Newspapers
Reconstructing Third World Elite Rotation Events from NewspapersReconstructing Third World Elite Rotation Events from Newspapers
Reconstructing Third World Elite Rotation Events from Newspapers
 
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede AudittaMencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
 
Media Indonesia 5 Maret 2014
Media Indonesia 5 Maret 2014Media Indonesia 5 Maret 2014
Media Indonesia 5 Maret 2014
 
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
 
Sejarah Ikatan Alumni Statistika Universitas Diponegoro (IKALISTA)
Sejarah Ikatan Alumni Statistika Universitas Diponegoro (IKALISTA)Sejarah Ikatan Alumni Statistika Universitas Diponegoro (IKALISTA)
Sejarah Ikatan Alumni Statistika Universitas Diponegoro (IKALISTA)
 
Bank century
Bank centuryBank century
Bank century
 
Leveraging Business Rules in TIBCO BusinessEvents
Leveraging Business Rules in TIBCO BusinessEventsLeveraging Business Rules in TIBCO BusinessEvents
Leveraging Business Rules in TIBCO BusinessEvents
 
Makalah fix kasus hambalang
Makalah fix kasus hambalangMakalah fix kasus hambalang
Makalah fix kasus hambalang
 
ISTISHAB
ISTISHABISTISHAB
ISTISHAB
 
Tripda Proposal for University Engagement
Tripda Proposal for University EngagementTripda Proposal for University Engagement
Tripda Proposal for University Engagement
 

Similar a Research Method to Optimize Logger for a Telecom Application Running on Embedded System

Ec8791 unit 5 processes and operating systems
Ec8791 unit 5 processes and operating systemsEc8791 unit 5 processes and operating systems
Ec8791 unit 5 processes and operating systemsRajalakshmiSermadurai
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
 
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfA NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfSaiReddy794166
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applicationsijsrd.com
 
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORSA REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORSIRJET Journal
 
Implementation of linux based uart device driver
Implementation of linux based uart device driverImplementation of linux based uart device driver
Implementation of linux based uart device drivereSAT Publishing House
 
Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3IOSR Journals
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET Journal
 
IRJET- Fault- Tolerant Fir Filter Implementation
IRJET-	 Fault- Tolerant Fir Filter ImplementationIRJET-	 Fault- Tolerant Fir Filter Implementation
IRJET- Fault- Tolerant Fir Filter ImplementationIRJET Journal
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...IRJET Journal
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsHannes Tschofenig
 
Instruction Set Extension of a Low-End Reconfigurable Microcontroller in Bit-...
Instruction Set Extension of a Low-End Reconfigurable Microcontroller in Bit-...Instruction Set Extension of a Low-End Reconfigurable Microcontroller in Bit-...
Instruction Set Extension of a Low-End Reconfigurable Microcontroller in Bit-...IJECEIAES
 

Similar a Research Method to Optimize Logger for a Telecom Application Running on Embedded System (20)

Ijetr042175
Ijetr042175Ijetr042175
Ijetr042175
 
Ec8791 unit 5 processes and operating systems
Ec8791 unit 5 processes and operating systemsEc8791 unit 5 processes and operating systems
Ec8791 unit 5 processes and operating systems
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdfA NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
A NETWORK-BASED DAC OPTIMIZATION PROTOTYPE SOFTWARE 2 (1).pdf
 
Data Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time ApplicationsData Acquisition and Control System for Real Time Applications
Data Acquisition and Control System for Real Time Applications
 
Beagle board
Beagle boardBeagle board
Beagle board
 
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORSA REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
A REVIEW ON ANALYSIS OF 32-BIT AND 64-BIT RISC PROCESSORS
 
Aw4201337340
Aw4201337340Aw4201337340
Aw4201337340
 
Implementation of linux based uart device driver
Implementation of linux based uart device driverImplementation of linux based uart device driver
Implementation of linux based uart device driver
 
D031201021027
D031201021027D031201021027
D031201021027
 
Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3Wireless Data Acquisition System Using ARM Cortex M-3
Wireless Data Acquisition System Using ARM Cortex M-3
 
E010113235
E010113235E010113235
E010113235
 
IRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing FrameworkIRJET- ALPYNE - A Grid Computing Framework
IRJET- ALPYNE - A Grid Computing Framework
 
IRJET- Fault- Tolerant Fir Filter Implementation
IRJET-	 Fault- Tolerant Fir Filter ImplementationIRJET-	 Fault- Tolerant Fir Filter Implementation
IRJET- Fault- Tolerant Fir Filter Implementation
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...
 
Dsa00170624
Dsa00170624Dsa00170624
Dsa00170624
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
 
Net Man
Net ManNet Man
Net Man
 
Instruction Set Extension of a Low-End Reconfigurable Microcontroller in Bit-...
Instruction Set Extension of a Low-End Reconfigurable Microcontroller in Bit-...Instruction Set Extension of a Low-End Reconfigurable Microcontroller in Bit-...
Instruction Set Extension of a Low-End Reconfigurable Microcontroller in Bit-...
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Último (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Research Method to Optimize Logger for a Telecom Application Running on Embedded System

  • 1. International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 6 (June 2012), PP.01-09 www.ijerd.com Research Method to Optimize Logger for a Telecom Application Running on Embedded System M.Rajendra Prasad1, V.Sharath 2, G.Nagendra3, K.Damodara Reddy 4, V.Sridhar5 1 Associate Professor, ECE Department, Vidya Jyothi Institute of Technology, Hyderabad, India 2 Associate Professor, EEE Department, Vardhaman College of Engineering, Hyderabad, India 3 Associate Professor, ECE Department, VBIT, Proddatur, Kadapa, India 4 Assistant Professor, EEE Department, Vardhaman College of Engineering, Hyderabad, India 5 Assistant Professor, ECE Department, Vidya Jyothi Institute of Technology, Hyderabad, India Abstract––Most of the embedded telecom applications running on customized processor boards are needed to record their activities in the form of log messages. These messages help telecom application developers to troubleshoot virtually all kinds of system and application problems. The logger also provides valuable early warning signs and also provides with crucial forensic data .Hence Logger’s performance is to be investigated and optimization is required for logger. In this project we are proposing a method to optimize logger for IPBTS application running on embedded system. This paper describes the procedure to asses and analyse logger with the syslog for telecom application and also elaborates the method to measure the logging time with a test application which contains two threads running on customized processor board. These papers presents the procedure to measure logging time and compare it with optimized syslog package logging time on linux operating file system. With this research experiment for logger, we minimized Layer 1 processing time in IPBTS product development project from 1700 micro seconds to 160 micro seconds. Layer 1 processing time includes channel activatation i.e. non combined CCCH channel, 3 TCHF, 1 SDCCH8 and mode of activation is by BTS controller stub. This paper also presents the experimental results to optimize syslog package for IPBTS application development on linux environment running on MPC 8548E processor board. Keywords––IP BTS, layer1, embedded systems, MPC 85xx processor board, linux kernel. I. INTRODUCTION This document describes, and is written to conform to, author guidelines for the journals of AIRCC series. It is prepared in Microsoft Word as a .doc document. Although other means of preparation are acceptable, final, camera- ready versions must conform to this layout. Microsoft Word terminology is used where appropriate in this document. Although formatting instructions may often appear daunting, the simplest approach is to use this template and insert headings and text into it as appropriate. BTS software is responsible for channel encoding/decoding, multiplexing/de-multiplexing, call establishment, speech communication through full rate speech channel, transmission of speech through RTP on Abis interface [3], support of short circuited call, and support of transmission of signalling over TCP/IP on Abis interface [10]. Audit mechanism for UNIX operating system and telecom application messages [4] [5] [13] is defined as syslog. To incorporate logging into their projects, and to provide system administrators with a single point of management for collecting, distributing and processing audit data syslog has been designed. Its design makes it more facile for embedded or telecom application developers and system analysts to perform the below functions. Mostly, the data will be influenced by a lot of people, which finally ends up in a system log. Ball rolling will be started by the developer, by determining  Events which create a log entry  Kinds of information in the log entry  Significance of events  How the information will be formatted If the end user has control over the quantity or types of logs that are generated, application administrator or local system should decide the actions that have to be applied to the log data, based on the telecom application or system component that generated the log entry, and the significance assigned to the log entry by its developers. Because of a coars e-grained system, it has lot of options for collecting and acting on syslog data logger [11] [12]. Application administrator or local system can choose amongst the following alternatives:  write the log entry to a local file(particular to that application )  write the log entry to a remote system running syslog (loghost) throughout these configuration documents  The log entry must be broadcasted to users logged into the host computer  The log entry should be written upon the system console. 1
  • 2. Research Method to Optimize Logger for a Telecom Application Running on Embedded System To maximize flexibility and facilitate-of-use, architecture has been designed. There are very few guidelines available for system administrators or developers, which implies that implementing an enterprise logging system includes a lot of trial and error. BEHAVIOUR OF SYSLOG The file /etc/syslog.conf controls the storage or distribution of data from different applications and subsystems on the host operating system, and of different levels of severity based on embedded system. This configuration file consists of multiple lines. One of the main security log systems [5] [7] on a UNIX system [9], which is naturally implemented on every Linux machine as well, is the log−keeping facility, which logs all user actions, processes, system events etc. The configuration file of the so−called syslog [11] [12] daemon determines which and how long logged information will be kept. The default location of all logs is /var/log, containing different files for access log, server logs, system messages etc. The syslog function sends a logging message to the logging facility. Each message has a priority argument that is a bitwise or of a severity level and a facility value. The severity level controls how the log message is acted upon and the facility value records the originator of the message. Facility values (from syslog.h) include LOG_USER, used to indicate that the message has come from a user application, (the default), and LOG_LOCAL0, LOG_LOCAL1, up to LOG_LOCAL7, which can be assigned meanings by the local administrator. The severity levels in descending order of priority are described in table 1. PRIORITY LEVEL DESCRIPTION LOG_EMERG An emergency situation messages LOG_ALERT High-priority problem, such as database corruption messages LOG_CRIT Critical error, such as hardware failure messages LOG_ERR Error messages LOG_WARNING Warning messages LOG_NOTICE Special conditions requiring attention messages LOG_INFO Informational messages LOG_DEBUG Debug messages Table 1 The architecture model of IPBTS telecom application [6] controller is shown in Figure 1. It also represents the BTS Controller block diagram, functionalities and its interfaces with other protocols like Layer 1, Link Access Protocol for the Dm channel (LAPDm), LAPD Interface (LAPDIF), and Radio Resource Management at BTS (RRBTSM). This paper describes the optimization method for logger which reduces Layer 1 processing time and all other logging functionalities. II. RELATED WORKS Today due to the of economical leverage and overwhelming advancements in the development of the IP based telecom applications running on embedded system researchers [2] are focussing on IP based telecom appositeness issues and investigating new approaches. Musabekov S.B describes [10] the procedure with establishing GSM link over Satellite Abis interface, which is defined between base transceiver station (BTS) and base station controller (BSC). An augmented performance approach being explored by simulation. Rajendra Prasad M [2] proposes the procedure for transplanting linux kernel on PowerPC based custom board which is considered as an embedded system targeted for IPBTS application software. GU zhaojun wang chao presented a secured host based secure state model [1].Horn. B discussed a web based logger for general purpose set of component interfaces for logging data in a heterogeneous computing distributed environment[8]. Rajendra Prasad emphasizes the research method describing with elaborate design of RTP module for IP-BTS. BTS provides the physical connection of an MS to the network in the form of Air- interface. [3]. In this paper we are describing the research method to optimise Layer 1 log messages processing time in IPBTS product development research project. 2
  • 3. Research Method to Optimize Logger for a Telecom Application Running on Embedded System OAM BTS Controller RRBTSM Initialization & Configuration Parameter Handling LAPDIF Status Monitoring and Control LAPDm Controlling BTS_Control() Shutdown/Reset L1/RTP Logger Figure 1: BTS Controller III. EXPERIMENT SET UP For the above experiment a customized processor board is designed for a telecom IPBTS application logger testing. The technical specifications are tabulated in Table 1. The PPC based target boards are based on free scale MPC8548E PowerPC processor. The Processor board is designed as flexible board to accommodate MPC8548E and MPC8543E processors. The top side view and bottom side view of customized board are depicted in Fig 3 Fig 4. The detailed information about the processor (MPC 8548E) can be available in [16].Because of the open source, rich code resource and for supporting many kinds of CPU architecture, linux is making steady progress in the embedded arena. PROCESSOR BOARD SPECIFICATIONS CPU Memory Ethernet Operating System Free scale DDR2 - 256 MB Two 10/100 Ethernet ports Embedded Linux (2.6.10) MPC8548E Boot Flash – 32 MB (DP83848C Fast PHY Ethernet PowerPC User Flash – 32 MB ICs) Processor 2 serial EEPROMS (Boot sequencer EEPROM and Board ID EEPROM of 8Kb) Table 2 In the recent years linux as operating system has been attractive choice in many embedded telecom applications. Optimization of syslog is tested on linux operating system and its version is 2.6.10.Porting of linux kernel to the custom boards is described by M.Rajendra Prasad [2]. The images for this embedded system are shown in the figure 2. U-boot is used as a boot loader and linux kernel image of 2.6.10 version running on customized processor boards along with customized file system with optimized syslogd-1.4.1 package. The ram disk file system contains the BTSSW and 3
  • 4. Research Method to Optimize Logger for a Telecom Application Running on Embedded System syslogd-1.4.1 package, which is a vital portion of this research project. The source code files referenced above are taken from open source repositories. There will be changes in these components to minimize Layer1 processing time and other functionalities and these changes are beyond the scope of this paper. During the experiment presented in this paper, execution time of two threads (Thread 1 and Thread 2) on Processor board with optimized code of syslogd package are tabulated Images on customized processor board for logger Testing Boot loader Kernel File system which contain the system logged package with IPBTS application software Figure 2 Processor board (IPBTS Controller) images Figure .3 Top side view of custom based embedded system board IV. RESULTS AND ANALYSIS In this section, optimization method for logger is proposed and results of a test application comprises with two threads are analysed. 4
  • 5. Research Method to Optimize Logger for a Telecom Application Running on Embedded System Figure .4 Bottom side view of custom based embedded system board. PROPOSED OPTIMIZATION METHOD 1. LOG_PERROR flag was removed from openlog() system call as it was printing the messages being logged on the console 2. Code relating to gethostbyname method is removed from openlog() system call 3. Code regarding UDP socket is removed as in our project we do not require remote logging option. 4. Select system call code is optimized as only UNIX domain sockets are being created. A. TESTING OF LOGGER BY APPLYING PARTIAL OPTIMIZATION METHOD (PO) A test application is designed to measure the logger performance. Test application comprises of two threads that are created and calculated the logging time for syslog [12] as shown in the table 3 on the processor board on linux 2.6.10 version environment. Each time measurement above (except Avg. Time measurement) is calculated for an average of 1000 readings. Avg. Time is the average of five set of readings as shown the Table III. The average logging time for thread 1 is 241.1349 micro sec on processor board without any optimization technique. After applying of step 1 of optimization method partial optimization (PO) thread 1 processing time is reduced to 175.6757 micro sec as shown in the Table III and same technique is analysed and assessed in graph as shown in the fig 5..Similarly thread 2 log processing times are analysed and depicted in Table 3 and fig 6 as a graph.. Processor Board LOGGER TIME MEASUREMENTS Time( microseconds ) Thread 1 Thread 1(PO) Avg. Time (Thr 1) Avg. Time (Partial optimized- thr 1) PO Thread 2 Thread 2 Avg. Time (Thr 2)Time PO thr 2 Avg. syslog() 238.036 249.933 0 0 334.785 124.544 0 0 335.704 247.77 0 0 247.801 179.106 0 0 346.516 136.753 0 0 277.983 216.364 0 0 175.044 124.739 0 0 317.634 123.477 0 0 171.294 136.924 0 0 318.016 227.336 0 0 170.468 130.692 0 0 324.471 138.409 0 0 181.607 124.865 0 0 328.799 228.232 0 0 334.658 131.444 0 0 241.081 244.083 0 0 281.11 223.919 0 0 331.86 248.963 0 0 176.912 249.718 241.1349 175.6757 317.841 124.296 304.0271 185.481 Table 3 5
  • 6. Research Method to Optimize Logger for a Telecom Application Running on Embedded System B. TESTING OF LOGGER BY APPLYING OPTIMIZATION METHOD. After applying proposed optimized method discussed above to syslogd-1.4.1 package the same thread1 processing time with the optimized syslog is reduced to 61.005 micro sec and thread 2 is reduced to 102.8871 as shown in the Table 4 and a graph is drawn and analysed in graph 3. Processor Board- Thread 1 400 350 300 Time(ms) 250 Thread 1 200 150 Thread 1(PO) 100 Avg. Time (Th 1) 50 Avg. Time (PO th 1) 0 1 2 3 4 5 6 7 8 9 10 Threads Figure.5 Performance of thread 2 on custom based embedded system board. Processor Board- Thread 2 400 350 300 Time(ms) 250 Thread 2 200 150 Thread 2 PO 100 Avg. Time (Thr 2) 50 0 Avg. Time PO th2 1 2 3 4 5 6 7 8 9 10 Threads Figure .6 Performance of thread 2 on custom based embedded system board 6
  • 7. Research Method to Optimize Logger for a Telecom Application Running on Embedded System Optimized syslog LOGGER TIME MEASUREMENTS Time( microseconds ) Thread 1 Thread 2 Avg. Time (Thread 1) Avg. Time (Thread 2) syslog() 52.925 106.104 55.469 105.945 53.469 105.182 52.061 103.795 61.251 112.082 87.55 130.79 71.563 76.347 60.848 91.74 58.123 98.318 56.791 98.568 61.005 102.8871 Table 4 OPTIMIZED SYSLOG 140 LOGGER TIME MEASUREMENTS 120 100 T Thread 1 80 i 60 Thread 2 m 40 e Avg. Time 20 ( (Thread 1) m 0 Avg. Time s 1 2 3 4 5 6 7 8 9 10 11 (Thread 2) Threads ) Fig.7 Performance of thread 1 & 2 on custom based embedded system board with optimized syslog. IP BTS Controller application running on customized PowerPC based processor board will support default logging and tracing for all the protocols and modules using the linux logging facilities. In this section we have optimized logger to minimize logging time for our IPBTS research project. The log messages for IPBTS with optimized syslogd- 1.4.1 package in the linux file system are depicted in the figure 8. 7
  • 8. Research Method to Optimize Logger for a Telecom Application Running on Embedded System Figure .8 Optimized log messages of IPBTS V. CONCLUSIONS In this paper we proposed an optimized logger for telecom application (IPBTS) running on customized PPC [15] based board which reduces 10 times of layer 1 processing time and also syslog performance is analyzed and assessed for IPBTS application. The performance levels are very much superior than the existing open source syslog package. The changes also discussed briefly this paper. This method can be applied to any syslog based log systems for any telecom application running on any platforms for different operating systems. VI. ACKNOWLEDGEMENTS Thanks to Wireless & Embedded System Group, Prof. G.Sri Ram Reddy and faculty members of ECE Department, VJIT for their suggestions and encouragement in the process of this research paper. We would like to dedicate this paper to Mr. M. Rajendra Prasad’s mother Late B.Suseelamma for her motivation towards this research project. 8
  • 9. Research Method to Optimize Logger for a Telecom Application Running on Embedded System REFERENCES [1]. GU zhaojun wang chao,”Statistic and analysis for host-based syslog”, Education technology and computer science (ETCS), 2010 second international workshop,vol: 2, pp.277-280, 6-7 march 2010. [2]. Rajendra Prasad.M, S. Ramasubba Reddy, V.Sridhar, “Framework to port linux kernel on powerpc based embedded system used for telecom application – ipbts”, International Journal of Software Engineering & Applications (IJSEA), Vol. 2, No.4, pp127-139, 2011 [3]. Rajendra Prasad.M, G.Nagendra, Ravi Mathey , V.Sridhar “Research Method For Transmission Of Speech Through RTP Packets On Abis Interface For IPBTS”, International Journal of Computer Information Systems,Vol. 3, No. 6, 2011 [4]. Slavicek, k. ledvinka, J.Javornik, M.Dostal,”Mathematical processing of syslog messages from routers and switches”, Inst. Of comput.sci, Masaryk univ., Bron, in Information and automation for sustainability, ICIAFS 4th international conference, pp.463-468, 12-14 dec 2008 [5]. Tsunoda, H.maruyarna, T.ohta, K.waizurni, Y.keeni, G.M.Nernoto,”A prioritized retransmission mechanism for reliable and efficient delivery of syslog messages’’, Fac. Of eng., tohoku inst. Of technol., Sendai, in Communication networks and service research conference, CNSR’09 seventh annual, pp.:158-165, 11-13 may 2009. [6]. Chinghway lim singh, n.yajnik,”A log mining approach to failure analysis of enterprise telephony systems”, Dependable systems and Network with FTCS and DCC, 2008 IEEE international conference, pp: 398-403, 24-27 june 2008. [7]. Forte,D.V. maruti,C.vetturi,M.R.zambelli,”Secsyslog:an approach to secure logging based on covert channels”,Incident response Italy project,univ. of Milano,crema,Italy, in Systematic approaches to digital forensic engineering, first international workshop,pp:248-263,7-9 nov,2005. [8]. Horn,B. balakrishnan,H.Maniampadavathu,B.T.Warnes,J.elko,D.A,”A logger system based on web services”,IBM systems journal,Vol:43 issue:4,pp:723-733,2004. [9]. Simache,c.kaaniche,”Availability assessment of sunos/solaris unix systems based on syslogd and wtmpx log files:a case study,Laas-Cnrs,Toulouse,france,in dependable computing,11 th pacific rim international sysmposium,pp:8,12-14 dec 2005. [10]. Musabekov S.B, Srinivasan, P.K., Durai, A.S. Ibroimov R.R, (2008) “Simulation analysis of abis interface over IP over DVB-S2-RCS in a GSM over satellite network”, ICI 4th IEEE/IFIP International Conference BC Transactions on ECE, Vol. 10, No. 5, pp120-122 [11]. Monteiro, S.D.S. erbacher,”Exemplifying attack identification and analysis in a novel forensically viable syslog model”, Systematic approaches to digital forensic engineering, SADFE’08 third international workshop, pp: 57-68, 22 may 2008. [12]. Fukuda, K. presto jst,”On the use of weighted syslog time series for anomaly detection”, integrated network management, pp: 393-398, 23-27 may 2011. [13]. K. Slavicek, J. Ledvinka, M. Javornik. "Mathematical Processing of Syslog Messages from Routers and Switches", 2008IEEE. [14]. J.Kelsey, J.Callas, and A.Clemm. Signed syslog Messages. Internet Draft, December 2008. [15]. “The PowerPC Architecture: A Specification for a New Family of RISC Processors”, Second Edition, by International Business Machines, Inc. [16]. MPC8548E PowerQUICC III™ Integrated Host Processor Family Reference Manual, MPC8548ERM Rev. 1, 2005. AUTHORS M.Rajendra Prasad obtained his B.E and M.E Electronics and Communication Engineering from SK University and Osmania University, Hyderabad respectively. He has 12 years of experience in embedded and telecom application research and development. He is currently working as Associate Professor, ECE Department, VJIT, Hyderabad. He has authored several Technical papers in International magazines and had more papers in Internatinational Journals. His main research interests are embedded systems, wireless protocols and RTOS. V.Sharath Babu is working as Associate. Professor in EEE department in Vardhaman College of Engineering (Autonomous) Hyderabad, INDIA. He has 8 years of experience in electrical applicationdevelopment and control system engineering. His research interests includes embedded systems for electrical and electronic applications. G.NAGENDRA is working as Associate. Professor in Department of Electronics and communication Engineering for VBIT, Proddatur, Kadapa . He completed M.Tech (Communications and Signal Processing) from S.K University, Ananthapur. He completed B.Tech Degree in E.C.E from J.N.T.U.H. His area of research includes Digital Signal Processing, Digital Image Processing, Embedded Systems, Mobile communications and Artificial neural networks. K. Damodara Reddy is working as a senior Assistant professor in EEE department in Vardhaman College of Engineering (Autonomous) Hyderabad INDIA. He has 4 years of experience in research. His research interests includes embedded systems for Electrical & Electronics applications, power electronics and multi level inverters. V. Sridhar working as Assistant professor in ECE department at Vidya Jyothi Institute of Technology, Hyderabad from 2009. He completed M. Tech with Specialization Wireless and mobile communication systems from vardhaman college of engineering (AUTONOMOUS) JNTUH in 2011.He has completed M.Sc (IT) from Nagarjuna University and completed Electronics and telecommunication engineering from VJIT, JNTUH in 2007. His areas of research interests include Wireless and Mobile communications, Digital signal processing, image processing, Telecommunications, communication systems, signal processing. He is Lifetime Member of ISTE and IETE. 9