• Title/Summary/Keyword: Deployment Service

Search Result 348, Processing Time 0.028 seconds

Design and Implementation of eBPF-based Virtual TAP for Inter-VM Traffic Monitoring (가상 네트워크 트래픽 모니터링을 위한 eBPF 기반 Virtual TAP 설계 및 구현)

  • Hong, Jibum;Jeong, Seyeon;Yoo, Jae-Hyung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.26-34
    • /
    • 2018
  • With the proliferation of cloud computing and services, the internet traffic and the demand for better quality of service are increasing. For this reason, server virtualization and network virtualization technology, which uses the resources of internal servers in the data center more efficiently, is receiving increased attention. However, the existing hardware Test Access Port (TAP) equipment is unfit for deployment in the virtual datapaths configured for server virtualization. Virtual TAP (vTAP), which is a software version of the hardware TAP, overcomes this problem by duplicating packets in a virtual switch. However, implementation of vTAP in a virtual switch has a performance problem because it shares the computing resources of the host machines with virtual switch and other VMs. We propose a vTAP implementation technique based on the extended Berkeley Packet Filter (eBPF), which is a high-speed packet processing technology, and compare its performance with that of the existing vTAP.

The Current Telecommunications Infrastructure in Ecuador is Ready to Start with the Implementation of IoT Applications?

  • Yepez, Johanna Fernandez;Kim, Yun Seon
    • Asia Pacific Journal of Business Review
    • /
    • v.3 no.1
    • /
    • pp.57-76
    • /
    • 2018
  • The "Internet of things" (IoT) is becoming an increasingly growing topic of conversation, it is a new emergent technology that can be present in almost every field and application. It's a concept that not only has the potential to impact how people live but also how people work. Broadband Internet and Mobile Internet are becoming more widely available, the cost of the service is decreasing, more devices are being created with Wi-Fi capabilities and sensors built into them, technology costs are going down, and smartphone penetration is growing so fast. All of these facts are creating the best environment for the IoT applications. In a country like Ecuador, is important to have a previous analysis about the feasibility of the implementation of this new technology in order to know what are the challenges the country has to face, and also to not stay behind as the other countries in the region are advancing. Currently, this kind of analysis does not exist. The Internet of Things is an innovation where business and technology models in Ecuador are relatively unexplored. The current infrastructure deployed in Ecuador and the available devices in the market are the central facts to initiate with the research, which is a starting point to show if Ecuador is ready to this technology, and if is not ready what is missing. This study shows the current telecommunications status in Ecuador, and its strengths and weaknesses to start the deployment of Internet of Things. Besides, it also will show the most likely applications that can be easily adopted for the Ecuadorian market with its respective availability, affordability, and adaptability.

Database Reverse Engineering Using Master Data in Microservice Architecture (마스터 데이터를 활용한 마이크로 서비스 아키텍처에서의 데이터베이스 리버스 엔지니어링)

  • Shin, Kwang-chul;Lee, Choon Y.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.523-532
    • /
    • 2019
  • Microservice architecture focuses on dividing it into small and lightweight services to build for the purpose of performing very close business functions. So it tends to concentrate only on agility, productivity, reliability, and ease of deployment of software development. Microservice architecture considers database as just a file or storage for storing and extracting data, emphasizing that data quality can be sacrificed for convenience and scalability of software development. Database reverse engineering for understanding database structure and data semantics is needed for data utilization for business decision making. However, it is difficult that reverse database engineering is applied in microservice architecture that neglects data quality. This study proposes database reverse engineering method that utilizes master data to restore the conceptual data model as a solution. The proposed method is applied to the return service database implemented by microservice architecture and verified its applicability.

Development of Microclimate-based Smart farm Predictive Platform for Intelligent Agricultural Services (지능형 농업 서비스를 위한 미기상기반 스마트팜 예측 플랫폼 개발)

  • Moon, Aekyung;Lee, Eunryung;Kim, Seunghan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.1
    • /
    • pp.21-29
    • /
    • 2021
  • The emerging smart world based on IoT requires deployment of a large number of diverse sensors to generate data pertaining to different applications. Recent years have witnessed a plethora of IoT solutions beneficial to various application domains, IoT techniques also help boost agricultural productivity by increasing crop yields and reducing losses. This paper presents a predictive IoT smart farm platform for forcast services. We built an online agricultural forecasting service that collects microclimate data from weather stations in real-time. To demonstrate effectiveness of our proposed system, we designed a frost and pest forecasting modes on the microclimate data collected from weather stations, notifies the possibilities of frost, and sends pest forecast messages to farmers using push services so that they can protect crops against damages. It is expected to provide effectively that more precise climate forecasts thus could potentially precision agricultural services to reduce crop damages and unnecessary costs, such as the use of non-essential pesticides.

A Mathematical Analysis of Automatic Balanced Placement of Icons in A Smartphone Launcher (스마트폰 런처에서 아이콘 자동 균형 배치의 수학적 분석)

  • Son, Kyung A;Eun, Seongbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1457-1462
    • /
    • 2020
  • There are dozens of applications on the smartphone. The service application that manages the loading, deletion, and deployment of these applications is called a smartphone launcher, and various launchers are used. Some of the existing launchers provide a function to automatically place icons by analyzing user application usage patterns. In this paper, we present a method of automatically arranging icons so that the icons are balanced on the smartphone screen. The usefulness of our method is illustrated by some exaples. In this case, it is proved that in an m × n screen layout with a height of m and a width of n, if n is an odd number, the entire screen can always be arranged in a balanced manner regardless of the n value by mathematical induction method.

Development of a Formal Access Control Model in CORBA Security using the Z Language (Z 언어를 기반으로 CORBA 보안의 정형화된 접근 제어 모델 개발)

  • 김영균;김경범;인소란
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.79-94
    • /
    • 1997
  • OMG (Object Management Group) published a security service specification, called CORBA (Common Object Request Broker Architecture) security reference model because the integration of security and object-oriented techniques was critical for successful deployment of distributed object systems. The CORBA security reference model treats access control as an implementation independent semantic concept but has incomplete semantics of the access control function. Because of such imcompleteness it is difficult for the system administrator and the CORBA security implementor to have the same understanding for the meaning of access control in the CORBA security. We propose a formal model for access control the CORBA security using the formal description language, which is called Z language based on typed set theory. The proposed model provides concrete semantics of the access control function to both the system administrator and the implementor.

Development of Autonomous Behavior Software based on BDI Architecture for UAV Autonomous Mission (무인기 자율임무를 위한 BDI 아키텍처 기반 자율행동 소프트웨어 개발)

  • Yang, Seung-Gu;Uhm, Taewon;Kim, Gyeong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.312-318
    • /
    • 2022
  • Currently, the Republic of Korea is facing the problem of a decrease in military service resources due to the demographic cliff, and is pursuing military restructuring and changes in the military force structure in order to respond to this. In this situation, the Army is pushing forward the deployment of a drone-bot combat system that will lead the future battlefield. The battlefield of the future will be changed into an integrated battlefield concept that combines command and control, surveillance and reconnaissance, and precision strike. According to these changes, unmanned combat system, including dronebots, will be widely applied to combat situations that are high risk and difficult for humans to perform in actual combat. In this paper, as one of the countermeasures to these changes, autonomous behavior software with a BDI architecture-based decision-making system was developed. The autonomous behavior software applied a framework structure to improve applicability to multiple models. Its function was verified in a PC-based environment by assuming that the target UAV is a battalion-level surveillance and reconnaissance UAV.

Extraction of Optimal Moving Patterns of Edge Devices Using Frequencies and Weights (빈발도와 가중치를 적용한 엣지 디바이스의 최적 이동패턴 추출)

  • Lee, YonSik;Jang, MinSeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.786-792
    • /
    • 2022
  • In the cloud computing environment, there has been a lot of research into the Fog/Edge Computing (FEC) paradigm for securing user proximity of application services and computation offloading to alleviate service delay difficulties. The method of predicting dynamic location change patterns of edge devices (moving objects) requesting application services is critical in this FEC environment for efficient computing resource distribution and deployment. This paper proposes an optimal moving pattern extraction algorithm in which variable weights (distance, time, congestion) are applied to selected paths in addition to a support factor threshold for frequency patterns (moving objects) of edge devices. The proposed algorithm is compared to the OPE_freq [8] algorithm, which just applies frequency, as well as the A* and Dijkstra algorithms, and it can be shown that the execution time and number of nodes accessed are reduced, and a more accurate path is extracted through experiments.

Implementation of Opensource-Based Automatic Monitoring Service Deployment and Image Integrity Checkers for Cloud-Native Environment (클라우드 네이티브 환경을 위한 오픈소스 기반 모니터링 서비스 간편 배포 및 이미지 서명 검사기 구현)

  • Gwak, Songi;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.637-645
    • /
    • 2022
  • Cloud computing has been gaining popularity over decades, and container, a technology that is primarily used in cloud native applications, is also drawing attention. Although container technologies are lighter and more capable than conventional VMs, there are several security threats, such as sharing kernels with host systems or uploading/downloading images from the image registry. one of which can refer to the integrity of container images. In addition, runtime security while the container application is running is very important, and monitoring the behavior of the container application at runtime can help detect abnormal behavior occurring in the container. Therefore, in this paper, first, we implement a signing checker that automatically checks the signature of an image based on the existing Docker Content Trust (DCT) technology to ensure the integrity of the container image. Next, based on falco, an open source project of Cloud Native Computing Foundation(CNCF), we introduce newly created image for the convenience of existing falco image, and propose implementation of docker-compose and package configuration that easily builds a monitoring system.

Study on the 3GPP International Standard for M2M Communication Networks (M2M네트워크통신을 위한 3GPP 국제표준화 동향연구)

  • Hwang, Jin-ok;Lee, Sang-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1040-1047
    • /
    • 2015
  • This study is investigated for M2M Communication Network Standard based on 3GPP. The environment of M2M communication, we can predict the new mobile service that gathering, handling, controlling, transferring of the data for Intelligence, so that we can consider new direction for a lot of subject of study development issue. This study is shown three types of M2M network structure and four types of use cases on 3GPP International Standard. In Addition, we can introduce the future M2M communication network model, it can be propagate the industry and academic cooperation with 3GPP standards. The suggestion develops multiple applications and multiple devices for industry and academic. With the deployment of network provider, this environment support our current communication market that the standard devices of M2M network and service requirement. We are suggest this study for grasp the initial market with the intellectual property right (IPR) based on International Standards. In the future, we wish the success that grap the initial market or initial academic study with helpful issue.