• Title/Summary/Keyword: 호스트 시스템

Search Result 680, Processing Time 0.03 seconds

Design and Implementation of a Web-based Traffic Monitoring and Analysis System (웹 기반의 트래픽 모니터링 및 분석 시스템의 설계와 구현)

  • 이명섭;박창현
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.613-624
    • /
    • 2002
  • Within the past decade, TCP/IP network environment has been explosively widespread all over the world. As the internet and the WWW expand their boundaries, the network traffic caused by data transfers over the internet has also increased. In this paper, we present the design and implementation of a WebTraMAS (Web-based Traffic Monitoring and Analysis System) which can resolve the shortcomings of current management approaches, particularly on the network traffic monitoring and analysis. The WebTraMAS presented in this paper performs the network management activities based on the parameters related to the MIB-II of SNMP and the parameters related to the QoS such as network performance and fault. The proposed WebTraMAS, implemented using the WWW technology, is able for the network manager to manage the network easily and platform independently with the performance analysis of internet traffic.

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

A Global Framework for Parallel and Distributed Application with Mobile Objects (이동 객체 기반 병렬 및 분산 응용 수행을 위한 전역 프레임워크)

  • Han, Youn-Hee;Park, Chan-Yeol;Hwang, Chong-Sun;Jeong, Young-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.6
    • /
    • pp.555-568
    • /
    • 2000
  • The World Wide Web has become the largest virtual system that is almost universal in scope. In recent research, it has become effective to utilize idle hosts existing in the World Wide Web for running applications that require a substantial amount of computation. This novel computing paradigm has been referred to as the advent of global computing. In this paper, we implement and propose a mobile object-based global computing framework called Tiger, whose primary goal is to present novel object-oriented programming libraries that support distribution, dispatching, migration of objects and concurrency among computational activities. The programming libraries provide programmers with access, location and migration transparency for distributed and mobile objects. Tiger's second goal is to provide a system supporting requisites for a global computing environment - scalability, resource and location management. The Tiger system and the programming libraries provided allow a programmer to easily develop an objectoriented parallel and distributed application using globally extended computing resources. We also present the improvement in performance gained by conducting the experiment with highly intensive computations such as parallel fractal image processing and genetic-neuro-fuzzy algorithms.

  • PDF

Development of a Remote Interactive Shell for RTOS (RTOS 용 원격 대화형쉘 설계 및 구현)

  • Kim, Dae-Hui;Nam, Yeong-Gwang;Kim, Heung-Nam;Lee, Gwang-Yong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.4
    • /
    • pp.677-686
    • /
    • 2002
  • Recently, the Open-Development-Tool-Environment becomes a basic requirement of RTOS (Real Time Operating System) for embedded systems with restricted memory and CPU power in order to develop applications effectively. A remote interactive shell is one of the basic software components which makes users develop, test and control softwares without burdening target systems. In this paper, we have implemented the remote interactive shell with the following functions : loading object modules, spawning and manipulating tasks facilities thru a remote host. Comparing information reference methods with nonredundant overhead, we have achieved the system with easy maintenance. The shell has been developed with Q-PLUS RTOS under ARM EBSA285 target board and NT host.

Implementation of Web-based Data Storage Service System Using External Storage Devices (외장형 저장장치를 이용한 웹 기반 데이터 스토리지 서비스 시스템 구현)

  • Kim, Buemjun;Lee, Kyounghee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.111-114
    • /
    • 2017
  • As digital contents are widely used and require increasingly high quality, the data storage services over Internet also become more and more important. One of popular services, web-hard, provides lots of users with web-based functions for data storage, management and sharing but such storage utilization requires quite high cost compared to using portable storage devices. Moreover, some users may avoid putting their important data into open Internet area. On the other hand, portable storage devices are cheaper but can be used only when they are physically connected to host devices such as PC. Also additional management and security functions should be equipped to support data sharing among users. In this paper, we propose a web-based data storage system combining those advantages of aforementioned two approaches. The proposed system immediately provides web-based services for data management and sharing when a portable device such as SDD is connected to the server.

  • PDF

Design and Implementation of Network Access Control based on IPv6 (IPv6 기반의 네트워크 접근제어 시스템 설계 및 구현)

  • Shin, HaeJoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6310-6316
    • /
    • 2014
  • The increase in the Internet and smart device users requires high-level network security. Network security consists of Web Firewall, Network Firewall, IPS, DDoS system, UTM (Unified Treat Management), VPN, NAC (Network Access Control), Wireless security, Mobile security, and Virtualization. Most network security solutions running on IPv4, and IPv6 network services are not sufficiently ready. Therefore, in this paper, this study designed and implemented important functions of Network Access Control (NAC), which include IPv6 host detection, isolation, blocking and domain assignment for the IPv6 network. In particular, domain assignment function makes 128 bits IPv6 address management easy. This system was implemented on a KISA IPv6 test-bed using well known devices. Finally, the test result showed that all IPv6 based wired and wireless devices were well-controlled (detection, blocking, isolation and domain assignment).

Differential Multicast in Switch-Based Irregular Topology Network (스위치 기반의 비정규적 네트워크에서의 차별적인 다중 전송)

  • Roh, Byoun-Kwon;Kim, Sung-Chun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.7
    • /
    • pp.394-400
    • /
    • 2002
  • Networks of Workstations(NOWs), that has features of flexibility and scalability, recently has emerged as an inexpensive alternative to massively parallel multicomputers. However it is not easier to perform deadlock-free multicast than regular topologies like mash or hypercube. Single phase differential multicast(SPDM) is a modified multicast algorithm with less burden of the root node. By applying quality of serviece(QoS), a specific node can have differentiated service and artificial change of message flow pattern is also available. As the results of performance evaluation experiments, SPDM has lower latency and lower packet concentration rate of the root node than the case of SPAM, and has ability to control network load distribution among switch nodes by controlling the assignment rate among nodes.

A Route Optimization Mechanism using an Extension Header in the IPv6 Multihoming Environment (IPv6 멀티호밍 환경에서 확장 헤더를 이용한 경로 최적화 메커니즘)

  • Huh, Ji-Young;Lee, Jae-Hwoon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • A multihomed enterprise or AS(Autonomous System) improves reliability and performance by acquiring its Internet connectivity from more than two ISP(Internet Service Provider). Multihoming protocol must allow a multihomed site whose connectivity through one of the ISPs fails to keep its Internet connectivity As one of mechanisms to do this, tunneling mechanism through Non-direct EBGP(Exterior Border Gateway Protocol) is defined. This mechanism makes connectivity to the Internet more reliable, but causes the problem that makes the communication route non-optimal. In this paper, we propose the route optimization mechanism using an extension header in the IPv6 multihoming environment.

An Efficient Lookup Mechanism for Unstructured Peer-to-Peer Considering IP Distribution (ISP별 IP분포를 고려한 비구조적 Peer-to-Peer에서의 Lookup 기법)

  • 김홍일;신판섭
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.873-886
    • /
    • 2003
  • Lookup Is one of important factors for network traffic on peer-to-peer network. Especially, large amount of network resources are required for lookup process in p2p file sharing system that clients use the dynamic If and they import to p2p network in random. In this paper, we employ efficient lookup mechanism which searches lookup with the combined information of ISP key values and the extracted key values from SHA-1 hashing function for shared contents id. The proposed mechanism efficiently searches files on the network because the mechanism processes P2P lookup with consideration the routing information of ISP. We suggest the adapted simulation environment based upon the famous file sharing system of emule P2P and experiment the proposed system.

  • PDF

Numerical Analysis of Caching Performance in Content Centric Networks Using Markov Chain (마코프체인을 이용한 콘텐츠 중심 네트워크의 캐싱 성능 분석)

  • Yang, Won Seok
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.4
    • /
    • pp.224-230
    • /
    • 2016
  • Recently, CCN(Content Centric Network) has been extensively interested in the literature to transfer data traffic efficiently according to the rapid growth of multimedia services on the Internet. CCN is a new networking paradigm to deliver contents efficiently based on the named content not the named or addressed host. This paper presents a mathematical approach for analyzing CCN-caching systems with two routers. Considering the stochastic characteristics of communication networks, the caching system is modeled as a two dimensional Markov chain. This paper analyzes the structural feature of the transition rate matrix in the Markov chain and presents a numerical solution for the CCN-caching performance of the two router system. In addition, various numerical examples are presented.