• Title/Summary/Keyword: Client and Server

Search Result 1,774, Processing Time 0.035 seconds

A Study on the Control Agent System of P2P Business Model (P2P 비지니스 모델에서의 조정 에이전트 시스템에 관한 연구)

  • Kim, Dong-Hyun;Lee, Sung-Ju
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.1
    • /
    • pp.73-79
    • /
    • 2002
  • At present, most Electronic Commerce System is made mainstream of Server-Client Commerce. For searching goods information, we must entering the EC sites and search that s information. but, P2P(Peer to Peer) System being escape traditional structure, Server-Client, it enable information transact between users, and resolve the problem of network, add-cost of server-ensurance, etc. Also, it is possible to trade information between person to person, client to provide. In this paper, we investigate on-going p2p models and study on the p2p based control based system.

The design and implementation of the personalized service agent using user information (사용자 정보를 활용한 개인 맞춤형 에이전트의 설계 및 구현)

  • Lee, Jong-Seol;Shin, Sa-Im;Kim, Yun-Sang;Lee, Seok-Pil
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.503-505
    • /
    • 2006
  • In this paper we introduce a design and implementation of an agent for multimedia retrieval and personalized broadcasting service. It is compliant with TV Anytime Forum specifications and supports searching location resolving, storing and streaming of remote multimedia contents. For this service, we implemented a contents server, a 메타데이터 database server, a location resolution server and a client terminal is implemented The Client terminal gathers content information by SOAP of operation, and it has a user preference module and usage history module that make user information. The personalize service agent recommends suitable contents to user by similarity algorithm.

  • PDF

Transmission of Map Data of Location-Based Services in Mobile Environment

  • Han, Eun-Young;Choi, Hae-Ock
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.676-678
    • /
    • 2003
  • Recently, in according as rapid improvement of telecommunication markets and wireless internet technology, Location- Based Services (LBS) have been discussed as new 'Killer' application. The purpose of LBS is to determine location of user through mobile handset and to offer location information service to end-user. This paper has suggested an efficient transmission scheme of maps data as one of the important content services relating to data transmission of LBS in mobile environment. The basic system consists of three parts : (1) GIS (Geographic Information System) Server for storing, processing and handling map data, (2) Middleware Server for transmitting of map data by request of client, and (3) Client for requesting map data to Server and displaying them on handset. Also, in order to transmit map data, we are to expand WKB (Well Known Binary) in conformance to Simple Feature Specification of OGC (Open GIS Consortium), and increase efficiency of data transmission by developing trans mission data format to be able to transmit lightweight data and considering data compression technology.

  • PDF

Development of the Marine Engine Room Simulator

  • Jung, Byung-Gun;So, Myung-Ok;Eum, Pil-Yong;Paek, Se-Hwon;Kim, Chang-Hwa
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.31 no.7
    • /
    • pp.872-880
    • /
    • 2007
  • The development of a Marine Engine Room Simulator system for training and research is described. Development objectives of the system are for both student training, research and development work. The system includes a distributed server/client architecture for 1 to 1, or 1 to many client simulation operation through OPC server, complete separation of visual elements from the controlling routines and the ability to work on the mathematical model independent of the controller and visual systems. A graphical user interface for the man-machine interface has been developed and the mathematical model has been updated. Various engine room operational situations can be simulated. The use of marine engine room simulator for training of sea going engineers and its competency for STCW-95 is discussed.

A Design and Implementation about the Web-Based Remote Control System Environments (웹을 기반으로 한 원격 제어시스템 환경 설계 및 구현)

  • Lee, Jeong-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.377-384
    • /
    • 1999
  • In this paper, client/server model for remote conveyor control and monitoring system is designed and implemented to simulate the product line of vehicles. The client system located at the monitoring office is using a web applet based system, and sends some commands to the server system which guards and controls the conveyer system directly. And server system is implemented as the web based system by using Java programming language too. The system has a distributed database system environments to manage and maintain the product line of conveyor system.

  • PDF

A Study on Secure Interaction of DHCP Server with DNS Server

  • Ham Young Hwan;Chung Byung Ho;Chung Kyo Il
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.544-548
    • /
    • 2004
  • DHCP(Dynamic Host Configuration Protocol) is a protocol which dynamically allocates an IP address and/or host configuration parameters to a host. The DHCP client's address can be changed dynamically any time. For the possible communication with other system, the DHCP client has to inform its address to the DNS system with dynamic update facility. But the DNS dynamic update has a problem related to the security. So we proposed the efficient mechanism for the secure integration of DHCP and DNS by using DNS security extensions. The system also uses the DNS server as the certificate repository for the storing & retrieval of each other's certificate.

  • PDF

Design and performance evaluation of the software RAID file system in the NOW environment (NOW(Network of Workstations) 환경에서 소프트웨어 RAID 파일 시스템의 설계 및 성능 평가)

  • 김종훈;노삼혁;원유헌
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1266-1272
    • /
    • 1997
  • Due to the price and performanceof uniprocessor workstations and off-the shelf networking, network of workstations(NOW) ae now a cost-effective parallel processing platform tht is competitive with supercomputers. Meanwhile, current network fiile system protocols rely heavily on a central server to coordinate file activity among client workstations. This central server can become a bottleneck that limits scalibility for environments with large numbers of clients. In this paper, we propsoe a highly reliable and effective software RAID file system on the network of workstation environment. We present results form a trace-driven simulation study that shows that the designed software RAID file system is more effective in the aspect of elapsed time when compared with client/server file systems.

  • PDF

Efficient Three-Party Password Authenticated Key Exchange for Client-to-Client Applications

  • Yang, Yanjiang;Bao, Feng
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.249-257
    • /
    • 2008
  • Nowadays, client-to-client applications such as online chat (e.g. MSN) and SMS (Short Message Services) are becoming increasingly prevalent. These client-to-client applications are revolutionizing the way we communicate. Three-party PAKE (password authenticated key exchange) protocols provide a means for the two communicating parties holding passwords to establishment a secure channel between them with the help of a common server. In this paper, we propose an efficient three-party PAKE protocol for the client-to-client applications, which has much better performance than the existing generic constructions. We also show that the proposed protocol is secure in a formal security model.

Extraction Technique of Communication Packet between PMS server and Clients in Combined Cycle Power Plant (복합화력 발전소의 PMS 서버와 Client 간의 통신 패킷 추출 기법에 관한 연구)

  • Kang Feel-Soon;Hyun Surk-Hwan;Cha Dong-Jin;Chung Jae-Hwa;Seo Seok-Bin;Ahn Dal-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.681-684
    • /
    • 2006
  • A new packet extraction program is presented to extract communication packet between a server and clients. The extracted packet source is used to develope a special driver to access general clients to the server. The proposed scheme employs a relay server to take a specified packet among a large number of packets on the same network. The proposed method is tested in PMS (Plant Management System) sewer and ProDAS (Process Data Aquisition and Analysis System) in a combined cycle power plant. The developed scheme can be applied for extracting a specified communication packet between the general server and client.

  • PDF

Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication (OAuth 2.0 MAC 토큰인증의 효율성 개선을 위한 무상태 난수화토큰인증)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1343-1354
    • /
    • 2018
  • OAuth 2.0 bearer token and JWT(JSON web token), current standard technologies for authentication and authorization, use the approach of sending fixed token repeatedly to server for authentication that they are subject to eavesdropping attack, thus they should be used in secure communication environment such as HTTPS. In OAuth 2.0 MAC token which was devised as an authentication scheme that can be used in non-secure communication environment, server issues shared secret key to authenticated client and the client uses it to compute MAC to prove the authenticity of request, but in this case server has to store and use the shared secret key to verify user's request. Therefore, it's hard to provide stateless authentication service. In this paper we present a randomized token authentication scheme which can provide stateless MAC token authentication without storing shared secret key in server side. To remove the use of HTTPS, we utilize secure communication using server certificate and simple signature-based login using client certificate together with the proposed randomized token authentication to achieve the fully stateless authentication service and we provide an implementation example.