• Title/Summary/Keyword: Copy Network

Search Result 139, Processing Time 0.024 seconds

A Study on the License Management Model for Secure Contents Distribution in Ubiquitous Environment (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.550-558
    • /
    • 2009
  • In ubiquitous environment, more small, lightweight, cheap and movable device is used than one device used in wired network environment. Multimedia service which is anytime, anywhere, is provided by device. However, it does not ensure the fair use of multimedia contents and causes damage to the contents providers because of illegal copy and distribution and indiscriminate use of digital contents. For solving this problems, DRM is applied to wired network but it has the problems does not protect stored license and manage license completely because of depending on simple protection such as device authentication and cryptographic algorithm. This paper proposes the license management model using digital forensic and DRM that prevents contents and licenses from distributing illegally and also enables the creation of evidence for legal countermeasure and the protection of license in whole life cycle.

  • PDF

A Study on the Model of Inter-library Cooperation's Network in the Information of Library Materials (정보의 상호협력을 위한 네트웍모형에 관한 연구)

  • 권기원
    • Journal of Korean Library and Information Science Society
    • /
    • v.4
    • /
    • pp.39-60
    • /
    • 1977
  • The purpose of this study is to build a model of inter-library cooperation's network in the information of library materials. Results of this study are 1. The YTational Assembly Library and the Central National I, ibrar:; should be unified. 2. The unified organization should be organized its cooperative quarter for itself (in the Central National Library). .And every library should he organized his quarter and personnel for the inter-library cooperation. 3. The cooperatior, organization in the re~ion should organized by the Regional Central Public Library. 4. In case of the Central National Library, financial problems required of the performance in the inter-library cooperation should he charged equally among the Central National Library, the library belong to the reader and the reader. In case of the regional Central Public Library, it should be charged equally arnozlg the regional Central Public Library, the library belon-g' to the reader and the reader. 5. The Regional Central Public Library in the seat of provincial government should be managed the cooperation's work of the individual library, and upward the unified Central Xarional Library should generalize. 6. The purchase of materials should be done by the character of the each library 1r:ith the assignment of the each subject should be decided in the meeting of the each library personne!. -2nd the budget for purchasing per the year should be decided on the minimum by the circumstances of the each library regionally. 7. The unified Regional Central Public Library in the seat of provincial government should be charged of the Union Catalog's expense regionally, and the Central National Library should be charged of that National Union Catalog's expense to cumulative the Fegional Union Catalog within a definite period of time. 8. Books without presentation of a specimen copy to the unified Central National Library should be purchased, and r.cr 'oe included to the National Union Catalog. 9. The cooperation of the each library should be decided on the law, and considered the character of the each region.

  • PDF

IOMMU Para-Virtualization for Efficient and Secure DMA in Virtual Machines

  • Tang, Hongwei;Li, Qiang;Feng, Shengzhong;Zhao, Xiaofang;Jin, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5375-5400
    • /
    • 2016
  • IOMMU is a hardware unit that is indispensable for DMA. Besides address translation and remapping, it also provides I/O virtual address space isolation among devices and memory access control on DMA transactions. However, currently commodity virtualization platforms lack of IOMMU virtualization, so that the virtual machines are vulnerable to DMA security threats. Previous works focus only on DMA security problem of directly assigned devices. Moreover, these solutions either introduce significant overhead or require modifications on the guest OS to optimize performance, and none can achieve high I/O efficiency and good compatibility with the guest OS simultaneously, which are both necessary for production environments. However, for simulated virtual devices the DMA security problem also exists, and previous works cannot solve this problem. The reason behind that is IOMMU circuits on the host do not work for this kind of devices as DMA operations of which are simulated by memory copy of CPU. Motivated by the above observations, we propose an IOMMU para-virtualization solution called PVIOMMU, which provides general functionalities especially DMA security guarantees for both directly assigned devices and simulated devices. The prototype of PVIOMMU is implemented in Qemu/KVM based on the virtio framework and can be dynamically loaded into guest kernel as a module, As a result, modifying and rebuilding guest kernel are not required. In addition, the device model of Qemu is revised to implement DMA access control by separating the device simulator from the address space of the guest virtual machine. Experimental evaluations on three kinds of network devices including Intel I210 (1Gbps), simulated E1000 (1Gbps) and IB ConnectX-3 (40Gbps) show that, PVIOMMU introduces little overhead on DMA transactions, and in general the network I/O performance is close to that in the native KVM implementation without IOMMU virtualization.

Resource Management System for Multimedia Service in Wireless Mobile Networks (무선 이동 통신망에서의 멀티미디어 서비스를 위한 자원 제어 시스템)

  • Lee, Won-Yeoul
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1153-1164
    • /
    • 2007
  • One of the most challenging technical issues in mobile communication for multimedia is Quality of Service (QoS) management of handover calls. This paper proposes a 2-level handover control system to copy with this problem. A 2-level handover control system consists of resource reservation and call admission control modules. The resource reservation module divides the network resource into Hard and Soft reserved resource. The Hard reserved resource is only for the handover calls while the Soft reserved resource is for both the handovers and the new calls. And also, the resource reservation module classifies handovers into primary and secondary handovers based on often they occur. The call admission control module deals with the primary and secondary handover calls in different ways. The new calls can use Soft reserved resource only if there is sufficient amount available in the Hard reserved resource. Proposed system is evaluated using an M/M/c/c queueing model. It is shown that proposed system allows more efficient utilization of network resource without degrading QoS comparing with the legacy handover control systems.

  • PDF

Success Factor and Failure Factor of Social Media in Korean Society: Based on the Word Analysis and the Network Analysis on Interview Data (한국사회에서 소셜 미디어의 성공과 실패 요인 분석: 인터뷰 데이터에 대한 어절분석·네트워크 분석을 중심으로)

  • Hong, Juhyun;Kim, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.74-85
    • /
    • 2019
  • This Study explores the reason why the social media like Cyworld, Iloveschool in Korea in the viewpoint if the layered model by interview. As a result the success factor in the viewpoint of layered model, user used social media for fulfilling the need for linking with other users and the social media offers the customized contents to user. Finally the social media dominated the market in advance. Facebook and Kakao talk are good examples of successful media. The failure factors are to care less about what other users want, to limit the expand of platform and not to copy with the change of the media environment. Iloveschool, Cyworld and Twitter are the examples of failure social media in Korean society. This study highlights the importance of the sensitivity of the change of environment. The expert mentioned the importance of 4th industrial revolution technology like AI, Big data and expected that new technology will emerge and the service will be developed by the change of user's taste.

Website and Digital Content between Material Property and Intellectual Ownership Rights within the Legal Regulation of Internet

  • Azab, Rania S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.424-435
    • /
    • 2022
  • When the owners of the intellectual property rights of digital content have lost control over it in the digital environment, there emerged fears that the intellectual property laws, especially copyright law, would not be effective as in the material (Offline ) world. The reason is that the digital environment helps to reproduce copies in high quality and at almost no cost, while copyright law protection has been limited to programs embedded in CDs. According to copyright laws, the owner of the program did not have the right to prevent buyers of the initial physical copy of the program from copying and reselling it to more than one individual without the permission of the original owner. As a result, business owners have invented the idea of licensing digital content and programs instead of selling them. They set out terms that serve their commercial interests regardless of their abuse to intellectual property laws or even the rules of the traditional contract to sell a material property. The abuse has resulted from the way those terms are concluded and the heavy rules that are unfair to consumer rights. Therefore, business owners insisted on dealing with the website and its programs and digital content as material property. Here raises the question of whether the website and its digital content are subject to the protection of copyright law or the rules of the traditional contract or licensing contracts. As the answer to this question affects the protection of consumer rights, is it possible to find a balance between it and the protection of the owners of digital programs' rights.That is what we will discuss in this paper.

Design and Implementation of UCC Metadata Manager for Social Collaborative Service (소셜 협업 서비스를 위한 UCC 메타데이터 매니저 설계 및 구현)

  • Oh, Jung-Min;Song, Ju-Hong;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.1-10
    • /
    • 2011
  • Social network service is defined as an online service or communication service based on social relations among people applied the concept of social network. Social collaborative service included in social network service is characterized by the new value of modified content or recreated content made through collaborative creation process between members of the group. It has the remarkable merits such as sharing and collaboration. But, at the same time, it has the latent problems such as content reuse or copy that is not allowed for members to use. It has been emerged that UCC which is a typical example of recreated or modified content has the copyright issues in both creation and publishing step. To resolve this matter, we don't have many appropriate methods except CCL so far. So, in this paper, we define the problem and implement the UCC metadata manager to control metadata reflecting the feature of UCC. We draw the reference metadata element to identify original content utilized re-creation process. After that we define the R.Metadata Loader module based on the use case. Finally, the proposed UCC metadata manager provides the information of referenced content and lets us to identify the relationship between reference contents. So as to implement prototype, we use Kaltura which is CMS using open source and obtain functional extensibility of metadata manager by using open API.

A Packet Processing of Handling Large-capacity Traffic over 20Gbps Method Using Multi Core and Huge Page Memory Approache

  • Kwon, Young-Sun;Park, Byeong-Chan;Chang, Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.73-80
    • /
    • 2021
  • In this paper, we propose a packet processing method capable of handling large-capacity traffic over 20Gbps using multi-core and huge page memory approaches. As ICT technology advances, the global average monthly traffic is expected to reach 396 exabytes by 2022. With the increase in network traffic, cyber threats are also increasing, increasing the importance of traffic analysis. Traffic analyzed as an existing high-cost foreign product simply stores statistical data and visually shows it. Network administrators introduce and analyze many traffic analysis systems to analyze traffic in various sections, but they cannot check the aggregated traffic of the entire network. In addition, since most of the existing equipment is of the 10Gbps class, it cannot handle the increasing traffic every year at a fast speed. In this paper, as a method of processing large-capacity traffic over 20Gbps, the process of processing raw packets without copying from single-core and basic SMA memory approaches to high-performance packet reception, packet detection, and statistics using multi-core and NUMA memory approaches suggest When using the proposed method, it was confirmed that more than 50% of the traffic was processed compared to the existing equipment.

Design and Implementation of Buffer Cache for EXT3NS File System (EXT3NS 파일 시스템을 위한 버퍼 캐시의 설계 및 구현)

  • Sohn, Sung-Hoon;Jung, Sung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2202-2211
    • /
    • 2006
  • EXT3NS is a special-purpose file system for large scale multimedia streaming servers. It is built on top of streaming acceleration hardware device called Network-Storage card. The EXT3NS file system significantly improves streaming performance by eliminating memory-to-memory copy operations, i.e. sending video/audio from disk directly to network interface with no main memory buffering. In this paper, we design and implement a buffer cache mechanism, called PMEMCACHE, for EXT3NS file system. We also propose a buffer cache replacement method called ONS for the buffer cache mechanism. The ONS algorithm outperforms other existing buffer replacement algorithms in distributed multimedia streaming environment. In EXT3NS with PMEMCACHE, operation is 33MB/sec and random read operation is 2.4MB/sec. Also, the buffer replacement ONS algorithm shows better performance by 600KB/sec than other buffer cache replacement policies. As a result PMEMCACHE and an ONS can greatly improve the performance of multimedia steaming server which should supportmultiple client requests at the same time.

Discovery of Active Nodes and Reliable Transmission of Active Packets in IP Networks (IP 망에서의 액티브 노드 발견 및 액티브 패킷의 신뢰성 전송 기법)

  • Kim, Bang-Eun;Chae, Ki-Joon;Kim, Dong-Young;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.361-370
    • /
    • 2004
  • All active nudes which have no physically direct connection with each other in If network must be able to compose and manage network topology Informations. Besides one active program can be performed by the active nodes when every active packet for this program is transmitted without any loss of packets. Also the active packets should be transmitted effectively to minimize the transmission delay and securely from threatens. In this thesis, the discovery scheme of active nodes is adapted for active nodes in IP networks to compose and manage the topology information. The scheme for the efficient, reliable and secure transmission of active packets is also proposed. The sequence number is assigned to every active packet. If a receiver detects the loss of active packet checking the sequence number, the receiver requests the retransmission of the lost packet to the previous active node. kiter receiving an active packet and adapting security and reliability schemes, intermediate active nodes not only copy and send the Packet Instantly but also apply some suity mechanisms to it. And the active packet transmission engine is proposed to provide these transmission schemes The simulation of the adapted active node discovery scheme and the proposed active packet transmission engine is performed. The simulation results show that the adapted active node discovery scheme is efficient and the proposed active engine has the low latency and the high performance.