• Title/Summary/Keyword: Centralized Architecture

Search Result 183, Processing Time 0.022 seconds

A Study on Traffic Analysis and Hierarchical Program Allocation for Distributed VOD Systems (분산 VOD 시스템의 트래픽 분석과 계층적 프로그램 저장에 관한 연구)

  • Lee, Tae-Hoon;Kim, Yong-Deak
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.2080-2091
    • /
    • 1997
  • It is generally recognized that Video On Demand (VOD) service will become a promising interactive service in the emerging broadband integrated services digital networks. A centralized VOD system, all programs are stored in a single VOD server which is linked to each user via exchanges, is applicable when a small number of users enjoys the VOD service. However, in case of large service penetration, it is very important to solve the problems of bandwidth and load concentrating in the central video server(CVS) and program transmission network. In this paper, the architecture of the video distribution service network is studied, then a traffic characteristics and models for VOD system are established, and proposed program allocation method to video servers. For this purpose, we present an analysis of program storage amount in each LVS(Local Video Server), transmission traffic volume between LVSs, and link traffic volume between CVS and LVSs, according to changing the related factors such as demand, the number of LVS, vision probability, etc. A method for finding out storage capacity in LVSs is also presented on the basis of the tradeoffs among program storage cost, link traffic cost, and transmission cost.

  • PDF

Digital Signature Mechanism by Mobile Agent Security Model of Distributed Web Environment (분산 웹 환경에서 이동 에이전트 보안 모델에 의한 전자서명 메카니즘)

  • Choi, Kil-Hwan;Shin, Min-Hwa;Bae, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.787-792
    • /
    • 2003
  • Telecommunication network are becomming bigger and more complex. Its difficult to manage efficiently the networks, because these networks usually have heterogeneous and inompatoble compinents. Nevertheless, current approaches to network management have focused on centralized managementstrategies based on client-server architecture. These approaches have resulted in much weakness in the real-time management, the service extensibility, and the network scalability. In thispaper, we applied the mobile agent technology to solve the above problems. Jave is a promising technology for developing mobile agent system. But, there are several problems like the service extensibility in using the Java. To solve these problems, a new approach using digital signature is suggested to authenticate mobile agent in network management environments. This approach can solve the conflict between security of the system and extensibility of the mobile code. Moreover, the system suggested in this paper show the decentralized and flexible network management solutions.

Estimation of Storage Capacity for CSOs Storage System in Urban Area (도시유역 CSOs 처리를 위한 저류형시스템 설계용량 산정)

  • Jo, Deok Jun;Lee, Jung Ho;Kim, Myoung Su;Kim, Joong Hoon;Park, Moo Jong
    • Journal of Korean Society on Water Environment
    • /
    • v.23 no.4
    • /
    • pp.490-497
    • /
    • 2007
  • A Combined sewer overflows (CSOs) are themselves a significant source of water pollution. Therefore, the control of urban drainage for CSOs reduction and receiving water quality protection is needed. Examples in combined sewer systems include downstream storage facilities that detain runoff during periods of high flow and allow the detained water to be conveyed by an interceptor sewer to a centralized treatment plant during periods of low flow. The design of such facilities as stormwater detention storage is highly dependant on the temporal variability of storage capacity available (which is influenced by the duration of interevent dry periods) as well as the infiltration capacity of soil and recovery of depression storage. As a result, a continuous approach is required to adequately size such facilities. This study for the continuous long-term analysis of urban drainage system used analytical probabilistic model based on derived probability distribution theory. As an alternative to the modeling of urban drainage system for planning or screening level analysis of runoff control alternatives, this model have evolved that offer much ease and flexibility in terms of computation while considering long-term meteorology. This study presented rainfall and runoff characteristics of the subject area using analytical probabilistic model. This study presented the average annual COSs and number of COSs when the interceptor capacity is in the range $3{\times}DWF$ (dry weather flow). Also, calculated the average annual mass of pollutant lost in CSOs using Event Mean Concentration. Finally, this study presented a decision of storage volume for CSOs reduction and water quality protection.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

An Analytical Traffic Model of Control Plane and Application Plane in Software-Defined Networking based on Queuing Theory (대기행렬 이론 기반 SDN 제어 평면 및 응용 평면의 트래픽 성능 분석 모델)

  • Lee, Seungwoon;Roh, Byeong-hee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.4
    • /
    • pp.80-88
    • /
    • 2019
  • Software Defined Networking (SDN) is the future network paradigm of decoupling control and data functions. In SDN structure, it is hard to address scalability in case of large-scale networks because single controller managed thousands of switches in a centralized fashion. Most of previous studies have focused on horizontal scalability, where distributed controllers are assigned to network devices. However, they have abstracted the control plane and the application plane into a single controller. The layer of the common SDN architecture is divided into data plane, control plane, and application plane, but the control plane and application plane have been modeled as a single controller although they are logically separated. In this paper, we propose a analytical traffic model considering the both application plane and control plane based on queuing theory. This model can be used to address scalability issues such as controller placement problem without complicated simulations.

A Study on Open Source Transition Strategy of Record System (기록시스템의 오픈소스화 전략 연구)

  • An, Dae-jin;Yim, Jin-hee
    • The Korean Journal of Archival Studies
    • /
    • no.52
    • /
    • pp.119-170
    • /
    • 2017
  • This study aims to analyze the environment for the open-source records system and to identify the risk and requirements for the success of the strategy in Korea. For this, Chapter 2 presented a review of the strategic benefits of open source to public organizations, developers, and users. It also discussed the process of cooperatively developing and releasing the source code and the technology infrastructure supporting open source. In Chapter 3, six representative open-source projects in the field of records management were selected, and case studies were conducted. To derive comprehensive implications, we have divided the main development body of open-source projects into international organizations, international cooperation systems, national archives, and software development companies. We also analyzed the background and purpose of each project, the agents of development and funding, the governance model, the development period and cost, the business model and software architecture, the community composition, and the licensing strategy. Through this, we have derived four critical success factors. In terms of technology, a component-based design was required; therefore, we proposed a microservice architecture and a model-view-controller design pattern. Next, it was necessary to reestablish system requirements of records center and archives. Moreover, we also proposed a dual licensing strategy to allow developers to easily participate in open-source projects. Lastly, we emphasized a strong governance structure and an effective cooperation framework to create a sustainable community. For a record system to be open-source successfully in an organization-centered market, the roles of software developers and end users should be exercised more in the community. To achieve this, it is important to build various collaborative tools and development infrastructure from a planning stage to a centralized one.

Green Spaces in the Urban Peripheries of Metropole Regions for Sustainable Development - Focused on Berlin, Milano and Seoul - (지속가능한 발전을 위한 대도시 외연부 녹지 활용 사례연구 - 베를린, 밀라노, 서울을 대상으로 -)

  • Hoh, Yun Kyeong;Chae, Jin-Hae
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.46 no.1
    • /
    • pp.72-85
    • /
    • 2018
  • This study focused on cases that led sustainable urban development through the construction and utilization of organic greenery systems linking green spaces of urban peripheries with metropolitan areas. To that end, Berlin - Brandenburg's regional parks in Germany and Milan's Raggi Verdi, a radial green axis project, in Italy were selected for analysis as case studies. As frameworks for this analysis, this study has established existing infrastructure accessibility and linkage, recycling and cooperative management. The results of the case study analysis are as follows: First, the specialized spatial strategy based on the individuality of the green space outside the city rather than a uniform landscape was used as the foundation of the sustainable development plan. Second, physical linkage from the center of the city to the periphery contributed to the sustainable development of the overall metropolis by improving the economic value of the surrounding area as well as ecological and environmental values. Third, the central management system was established to reduce the administrative inconvenience caused by multiple administrative districts in the green space of urban periphery. The implications of applying the above results to Seoul, Korea are as follows. First, it is necessary to establish a differentiation strategy by re-establishing the identity of a green landscape in the urban periphery, because the green spaces of Seoul's periphery are dispersed and mostly have a repetitious mountain landscape. Also, it is necessary to actively link peripheral mountains and urban green areas to create ecological value and economic value, and ultimately to help the sustainable development of the city. Finally, building an integrated management system is required to solve fragmented green space management departments in most of the urban periphery's green spaces. In conclusion, this study shows the significant possibility that the sustainable development of a metropolis can be derived from the utilization, linkage, and management of the green space in the urban peripheries, which is extraordinary compared to normal centralized urban development.

Design and Implementation of an Industrial-Design Collaborative System to Support Scalability (확장성을 고려한 산업디자인 협력시스템 설계 및 구현)

  • Yang, Jin-Mo;Lee, Seung-Ryong;Jeon, Tae-Woong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.5
    • /
    • pp.513-527
    • /
    • 2000
  • This paper describes our experience to design and implementation of a collaborative system framework that allows to develop certain collaborative applications such as 3D animation, computer game, and industrial design. The collaborative system enables users, who located in geographically long distance, to do collaborative work in a single virtual space. The proposed system basically consists of client and server system. The goal of proposed system is to support scalability, portability, and platform independent. In order to achieve these, the server is implemented in Java platform and is adopted to the hybrid architecture which takes the advantages both in centralized and decentralized collaborative system. We construct the server base on its functional characteristics so called User Manager Server (UMS), Session Manager Server (SMS), and Information Server (IS), The UMS manages the users who are taking part in the collaborative operations. The SMS supports the conferencing in the proposed system. The IS provides the connection methods among the UMSs. For user's convenience, we implement the client using Visual C++ in Windows. We also expend the functions of 3D Studio Max to distributed environment by means of the plug-in module, and facilitate the chatting and white board functions as well.

  • PDF

Distributed Mobility Management Scheme in LTE/SAE Networks (LTE/SAE 네트워크에서 분산 이동성 관리 기법)

  • Kim, Yong-Hwan;Han, Youn-Hee;Kim, Min;Park, Seok Yong;Moon, Sang Jun;Lee, Jin Ho;Choi, Dae Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.879-894
    • /
    • 2013
  • Recently, due to a explosive growth in the mobile Internet traffic, the problem of excessive data traffic handling on core network and thus scalability problem have been magnified in 3GPP LTE/SAE networks. Current LTE/SAE network based on the central P-GW (PDN Gateway) used as mobility anchor cannot deal with such demand for exponentially increasing mobile Internet traffic. In this paper, we propose a new LTE/SAE network architecture supporting distributed P-GWs and corresponding distributed mobility management to solve these problems. For this, in addition to the deployment of such distributed P-GWs, we propose a dynamic and distributed mobility management by distributing MMEs (Mobility Management Entities) which dynamically manages the location information of a UE's PDN connection, and also propose a handover procedure of such PDN connections by using the proposed distributed P-GWs and MMEs. The performance of the proposed dynamic and distributed LTE/SAE network system is compared with the current LTE/SAE network system in terms of handover latency and network throughput.

IT Governance of the Korean Conglomerates: A Comparative Case Study (국내 대기업들의 IT 거버넌스: 비교 사례 연구)

  • Zo, Hang-Jung;Song, Chan-Hoo;Kang, Hyun-Goo;Lim, Dong-Won
    • Journal of Korea Technology Innovation Society
    • /
    • v.12 no.2
    • /
    • pp.335-359
    • /
    • 2009
  • This study explores the IT governance structures of the Korean conglomerates. It investigates IT organization structures, decision making frameworks and processes, communication channels, implementation mechanisms, and performance evaluation methods around IT activities of the Korean conglomerates by analyzing four different cases. The results show that all of the conglomerates have an IT service firms as one of their subsidiaries, and all the subsidiaries in the conglomerates outsource their IT divisions to the IT service firms, The client firms in the conglomerates operate IT strategy and planning teams to coordinate their IT activities with their outsourcing partners. The IT governance archetype of the Korean conglomerates is found to be "business monarchy" because the client firms mostly make IT decisions. However, the IT service firms provide the information of IT trends and solutions to their clients, so the IT governance archetype of input framework for IT decisions can be "IT monarchy". In addition, the conglomerate which has the more centralized IT governance architecture appears to prefer the more integrated implementation mechanisms for IT decisions. The results of this study are expected to be used as a benchmarking model for the organizations which try to develop an effective IT governance structure.

  • PDF