• Title/Summary/Keyword: Data Server Network

Search Result 1,019, Processing Time 0.026 seconds

Video Integrity Checking Scheme by Using Merkle Tree (머클트리를 활용한 영상무결성 검사 기법 )

  • Yun-Hee Kang;Eun-Young CHANG;Taeun Kwonk
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.39-46
    • /
    • 2022
  • Recently, digital contents including video and sound are created in various fields, transmitted to the cloud through the Internet, and then stored and used. In order to utilize digital content, it is essential to verify data integrity, and it is necessary to ensure network bandwidth efficiency of verified data. This paper describes the design and implementation of a server that maintains, manages, and provides data for verifying the integrity of video data. The server receives and stores image data from Logger, a module that acquires image data, and performs a function of providing data necessary for verification to Verifier, a module that verifies image data. Then, a lightweight Merkle tree is constructed using the hash value. The light-weight Merkle tree can quickly detect integrity violations without comparing individual hash values of the corresponding video frame changes of the video frame indexes of the two versions. A lightweight Merkle tree is constructed by generating a hash value of digital content so as to have network bandwidth efficiency, and the result of performing proof of integrity verification is presented.

Disk Load Balancing Scheme for High Speed Playback of Continuous Media in VOD Server (VOD서버에서 연속 매체의 고속 재생을 위한 디스크 부하 균형 정책)

  • Lee, Seung-Yong;Lee, Ho-Seok;Hong, Seong-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1172-1181
    • /
    • 1997
  • A militimedia data is a data mixed of formatted data like an audio and video. Multimedia data has characteristics that it need large amount of storage,wide network bandwith andreal time responsibolity. Because of these characteristocs, the VOD server and continous media storage server have a disk stripe structure or disk stripe sructure or disk array structure(RAID).In the parallel disk access system,high-speed play-back of continous media using segment interleavung may not ensure Qos pf other cioents because of the concentrated load within some disks. The load concentration of disks is related to both the number of disks in the system and playback rate of contimous media.In this paper. we describe that high-speed playback scheme,which is independent of the number of disk and plyback rate can be achieved by technique of changing the in-teval of access to segnent location.We show the experimental result of this technique in this pater.

  • PDF

A Study on the Development of the SCADA System using the Internet (인터넷을 이용한 SCADA 시스템 구축에 관한 연구)

  • Park, I.K.;Yoon, K.K.;Kim, Y.S.;Lee, S.G.;Ahn, B.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2373-2376
    • /
    • 1998
  • This paper describes the development of the SCADA(Supervisory Control and Data Acquisition) system which can be controlled via the Internet. In this paper, the SCADA system is composed of a number of microprocessor-based RTU(Remote Terminal Unit)s, a MMI(Man Machine Interface) host, a SCADA server, and SCADA clients. There are two protocols used in the system. Each RTU and the MMI host are connected by a RS-485 line and CSMA/CD(Carrier Sense Multiple Access / Collision Detection) protocol is used to communicate with each other. TCP/IP(Transmission Control Protocol/Internet Protocol) is used among the MMI host, the SCADA server, and SCADA clients. The equipments installed in the field are controlled by a number of RTUs. The function of the MMI host is to acquire real-time data from RTUs and control them. The SCADA server supports data transfer between the networked MMI host and the SCADA client on the web-server through TCP/lP. Data transfer is possible regardless of the type of network only if there are TCP/lP Winsock-compatible stack driver. The SCADA client is implemented as the shape of web-page by means of JAVA language. Therefore, it runs on a web-browser such as Netscape and Explorer, and allows a number of users to access this SCADA system.

  • PDF

Method to Support Mobility using MPLS in IP Network (IP망에서 다중 프로토콜 레이블 교환 방식을 사용하는 이동성 제공 방안)

  • Choi, Yun-Jin;Yu, Myoung-Ju;Lee, Jong-Min;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.34-41
    • /
    • 2008
  • Existing mobility support scheme like MIPv4 has the delay at data transfer and Triangle routing problem. This paper proposes the new mobility support scheme and method that can overcome the problem using MPLS LSP in Next Generation Network. The proposed scheme overcomes the problem by introducing the LMS(Location Management Server) managing the location of the mobile terminal and the MPLS LSP between FA for a tunneling. We shows on the mathematical analysis using the queuing theory that this proposed scheme is more superior to the existing method(MIP).

User Identification and Entrance/Exit Detection System for Smart Home (지능형 홈을 위한 사용자 식별 및 출입 감지 시스템)

  • Lee, Seon-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.3
    • /
    • pp.248-253
    • /
    • 2008
  • This paper presents a sensing system for smart home which can detect an location transition events such as entrance/exit of a member and identify the user in a group at the same time. The proposed system is compose of two sub-systems; a wireless sensor network system and a database server system. The wireless sensing system is designed as a star network where each of sensing modules with ultrasonic sensors and a Bluetooth RF module connect to a central receiver called Bluetooth access point. We propose a method to discriminate a user by measuring the height of the user. The differences in the height of users is a key feature for discrimination. At the same time, the each sensing module can recognize whether the user goes into or out a room by using two ultrasonic sensors. The server subsystem is a sort of data logging system which read the detected event from the access point and then write it into a database system. The database system could provide the location transition information to wide range of context-aware applications for smart home easily and conveniently. We evaluate the developed method with experiments for three subjects in a family with the installation of the developed system into a real house.

A New Model to Enhance Efficiency in Distributed Data Mining Using Mobile Agent

  • Bardab, Saeed Ngmaldin;Ahmed, Tarig Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.275-286
    • /
    • 2021
  • As a result of the vast amount of data that is geographically found in different locations. Distributed data mining (DDM) has taken a center stage in data mining. The use of mobile agents to enhance efficiency in DDM has gained the attention of industries, commerce and academia because it offers serious suggestions on how to solve inherent problems associated with DDM. In this paper, a novel DDM model has been proposed by using a mobile agent to enhance efficiency. The main idea behind the model is to use the Naive Bayes algorithm to give the mobile agent the ability to learn, compare, get and store the results on it from each server which has different datasets and we found that the accuracy increased roughly by 0.9% which is our main target.

A Method for Detection and Classification of Normal Server Activities and Attacks Composed of Similar Connection Patterns (종단간의 유사 연결 패턴을 갖는 정상 서버 활동과 공격의 구분 및 탐지 방법)

  • Chang, Beom-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1315-1324
    • /
    • 2012
  • Security visualization is a form of the data visualization techniques in the field of network security by using security-related events so that it is quickly and easily to understand network traffic flow and security situation. In particular, the security visualization that detects the abnormal situation of network visualizing connections between two endpoints is a novel approach to detect unknown attack patterns and to reduce monitoring overhead in packets monitoring technique. However, the session-based visualization doesn't notice a difference between normal traffic and attacks that they are composed of similar connection pattern. Therefore, in this paper, we propose an efficient session-based visualization method for analyzing and detecting between normal server activities and attacks by using the IP address splitting and port attributes analysis. The proposed method can actually be used to detect and analyze the network security with the existing security tools because there is no dependence on other security monitoring methods. And also, it is helpful for network administrator to rapidly analyze the security status of managed network.

Transmission of MPEG-4 Stream via Satellite (인공위성을 이용한 MPEG-4 스트림 전송)

  • Lee, Nam-Kyung;Chae, Soo-Hoan
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.4
    • /
    • pp.290-295
    • /
    • 2002
  • In Mpeg-4 system, objects are composed of ES(Elementary Stream). Each of the objects is managed independently by object-based coding and is transmitted via DMIF(Delivery Multimedia Integration Framework). The data streams in Mpeg-4 are transmitted with using DVB-Data Carousel which can improve the reliability and efficiency by cyclic retransmission. This paper describes a system which transmits some part of data stream of Mpeg-4 object with using DVB-Data Carousel to clients via satellite. This also uses a performance enhancing proxy server for reducing round trip time between ground network and satellite.

  • PDF

Assessment of Risk in Wireless-Wired Network Based Control of Indoor Air Quality (IAQ) in Subway Stations (유무선 네트워크기반 지하철역사 공기질 제어의 위험성 평가)

  • Choi, Gi Heung
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.1
    • /
    • pp.1-6
    • /
    • 2014
  • With increasing number of citizen using subway stations everyday, safety, health and comfort of passengers and occupants became an important social issue. Considering the fact that various physical variables and pollutants are related to indoor air quality (IAQ) which may cause health problem, IAQ need to be closely monitored and controlled in multiple locations in subway stations. This study is a continuation of the previous studies and delay induced in wireless-wired network is experimentally evaluated and the risk involved is assessed. In doing that, a key parameter is identified to be the network delay in different network media. Application of information-theoretic measure to assess the risk in network delay is then discussed. The idea is based on the general principles of engineering design and their applications to quantification of uncertainty in network delay. Experimental results show that more risk is involved in wireless data communication. Efficient and fast conversion of transmission data in both LonWorks/IP server and ZL converter is also noted.

Empirical Data Analysis of a Social Network Name-Directory Service with Advertisements (광고를 동반한 소셜 네트워크 이름-디렉터리 서비스의 실험적 데이터 분석)

  • Kim, Yung Bok
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.189-203
    • /
    • 2014
  • With the evolution of Internet technologies and the increasing variety of Internet devices, advertisements in various web services have also expanded. Interactive web services often go hand in hand with effective advertisements for a business model. We estimated statistical parameters of the interactive web server for service monitoring and advertisement-effect. In the web pages, we integrated the plugins of social networking services (SNSs) (e.g. Facebook, Twitter) and an advertisement scheme (e.g. Google AdSense) that regards social name-directory contents. Empirical data analysis and statistical results are presented with the implementation of estimations of parameters (e.g. utilization-level and serviceability) and advertisements in a social networking name-directory service (http://ktrip.net or http://한국.net). We found that estimated parameters were applicable to service monitoring of web-server as well as to synthesis of advertisement-effect in our social-web name-directory service.