• Title/Summary/Keyword: Distribute Processing

Search Result 152, Processing Time 0.033 seconds

Design and Implementation of the Spatial Data Cache Based on Agents for Providing Mobile Map Services (모바일 지도 서비스를 위한 에이전트 기반의 공간 데이터 캐쉬의 설계 및 구현)

  • Lim, Duk-Sung;Lee, Jai-Ho;Hong, Bong-Hee
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.175-186
    • /
    • 2003
  • Mobile clients like a PDA need a cache and a spatial index to search and access map data efficiently. When a server transmits spatial objects to a mobile client which has a low storage capacity, some of them can be duplicated in a cache of the mobile client. Moreover, the cost for strong added data in the cache and reconfiguring spatial index is very high in the mobile client with low computing power. The scheme for processing duplicated objects and disturbing tasks of the mobile client which has low computing power is needed. In this paper, we classfy the method for strorng duplicated objects and present the scheme for the both caching objects and reconfiguring a spatial index of cached objects using the clipping technique. We propose the caching system based on an agent in order to distribute the overhead of a mobile client as well as to provide efficiently map services. We design and implement it, and evaluate the performance.

A Design of DDoS Attack Detection Scheme Using Traffic Analysis and IP Extraction in SIP Network (SIP망에서 트래픽 측정 및 IP 추출을 통한 DDoS공격 탐지 기법 설계)

  • Yun, Sung-Yeol;Sim, Yong-Hoon;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.729-732
    • /
    • 2010
  • 통신망의 발달로 다양한 인터넷 기반 기술들이 등장함에 따라 현재는 데이터뿐만 아닌 음성에 대한 부분도 IP 네트워크를 통해 전송하려는 움직임이 발판이 되어 VoIP(Voice Over Internet Protocol)라는 기술이 등장하였다. SIP(Session Initiation Protocol) 프로토콜 기반 VoIP 서비스는 통신 절감 효과가 큰 장점과 동시에 다양한 부가서비스를 제공하여 사용자 수가 급증하고 있다. VoIP 서비스는 호(Call)를 제어하기 위해 SIP 기반으로 구성이 되며, SIP 프로토콜은 IP 망을 이용하여 다양한 음성과 멀티미디어 서비스를 제공하게 되는데 IP 프로토콜에서 발생하는 인터넷 보안 취약점을 그대로 동반하기 때문에 DoS(Denial of Service) 및 DDoS(Distribute Denial of Service)에 취약한 성향을 가지고 있다. DDoS 공격은 단시간 내에 대량의 패킷을 타깃 호스트 또는 네트워크에 전송하여 네트워크 접속 및 서비스 기능을 정상적으로 작동하지 못하게 하거나 시스템의 고장을 유도하게 된다. 인터넷 기반 생활이 일상화 되어 있는 현 시점에서 안전한 네트워크 환경을 만들기 위해 DDoS 공격에 대한 대응 방안이 시급한 시점이다. DDoS 공격에 대한 탐지는 매우 어렵기 때문에 근본적인 대책 마련에 대한 연구가 필요하며, 정상적인 트래픽 및 악의적인 트래픽에 대한 탐지 시스템 개발이 절실히 요구되는 사항이다. 본 논문에서는 SIP 프로토콜 및 공격기법에 대해 조사하고, DoS와 DDoS 공격에 대한 특성 및 종류에 대해 조사하였으며, SIP를 이용한 VoIP 서비스에서 IP 분류와 메시지 중복 검열을 통한 DDoS 공격 탐지기법을 제안한다.

Base Station Assisted Optimization of Hierarchical Routing Protocol in Wireless Sensor Network (WSN 에서 베이스스테이션을 이용한 계층적 라우팅 프로토콜 최적화)

  • Kusdaryono, Aries;Lee, Kyoung-Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.564-567
    • /
    • 2011
  • Preserving energy of sensor node in wireless sensor network is an effort to prolong the lifetime of network. Energy of sensor node is very crucial because battery powered and irreplaceable. Energy conservation of sensor node is an effort to reduce energy consumption in order to preserve resource for network lifetime. It can be achieved through efficient energy usage by reducing consumption of energy or decrease energy usage while achieving a similar outcome. In this paper, we propose optimization of energy efficient base station assisted hierarchical routing protocol in wireless sensor network, named BSAH, which use base station to controlled overhead of sensor node and create clustering to distribute energy dissipation and increase energy efficiency of all sensor node. Main idea of BSAH is based on the concept of BeamStar, which divide sensor node into group by base station uses directional antenna and maximize the computation energy in base station to reduce computational energy in sensor node for conservation of network lifetime. The performance of BSAH compared to PEGASIS and CHIRON based of hierarchical routing protocol. The simulation results show that BSAH achieve 25% and 30% of improvement on network lifetime.

A Distributed Layer 7 Server Load Balancing (분산형 레이어 7 서버 부하 분산)

  • Kwon, Hui-Ung;Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.15A no.4
    • /
    • pp.199-210
    • /
    • 2008
  • A Clustering based wireless internet proxy server needs a layer-7 load balancer with URL hashing methods to reduce the total storage space for servers. Layer-4 load balancer located in front of server cluster is to distribute client requests to the servers with the same contents at transport layer, such as TCP or UDP, without looking at the content of the request. Layer-7 load balancer located in front of server cluster is to parse client requests in application layer and distribute them to servers based on different types of request contents. Layer 7 load balancer allows servers to have different contents in an exclusive way so that it can minimize the total storage space for servers and improve overall cluster performance. However, its scalability is limited due to the high overhead of parsing requests in application layer as different from layer-4 load balancer. In order to overcome its scalability limitation, in this paper, we propose a distributed layer-7 load balancer by replacing a single layer-7 load balancer in the conventional scheme by a single layer-4 load balancer located in front of server cluster and a set of layer-7 load balancers located at server cluster. In a clustering based wireless internet proxy server, we implemented the conventional scheme by using KTCPVS(Kernel TCP Virtual Server), a linux based layer-7 load balancer. Also, we implemented the proposed scheme by using IPVS(IP Virtual Server), a linux-based layer-4 load balancer, installing KTCPVS in each server, and making them work together. We performed experiments using 16 PCs. Experimental results show scalability and high performance of the proposed scheme, as the number of servers grows, compared to the conventional scheme.

A Routing-Tree Construction Algorithm for Energy Efficiency in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성을 고려한 라우팅 트리 구축 알고리즘)

  • Kim, Yul-Sang;Kim, Hyoun-Soo;Jeon, Joong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.731-736
    • /
    • 2009
  • In wireless sensor network, many sensor nodes are distributed in the field. They communicate the sensing data each other and forward it to sink. Routing protocols, which define the delivery methods of sending data, affect to the lifetime of sensor network. This paper proposes RTAF that is a routing-tree construction algorithm of sensor nodes by a single flooding process in wireless sensor network. A routing tree is constructed by selecting a parent node using the forward-direction flooding packet and gathering children nodes using the reverse-direction flooding packet. In this process, a node with much energy becomes the parent node. And the routing tree is periodically reconstructed in order to distribute the loads of parent nodes. The proposed algorithm compared performance with Modified-LEACH using NS2 network simulation tool. The simulation result shows that the proposed algorithm constructs a routing-tree faster and reduced 40-80% in routing-tree construction packet.

Agent Based Framework for Energy Distribution and Qos in Wireless Sensor Networks (무선 센서 네트워크에서의 에너지 분산과 QoS를 고려한 에이전트 기반의 프레임워크)

  • Sin, Hong-Joong;Kim, Sung-Chun
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.707-716
    • /
    • 2009
  • Wireless Sensor Networks are consisted of sensor nodes that communicated with each other to transmit information. Because sensor nodes have physically many limits, wireless sensor networks are hard to adopt for traditional networks. Transmissions are consumed most energy of sensor nodes. That's why energy-efficient transmission techniques and QoS support techniques for different kind of data are most important in wireless sensor networks. The thesis proposes the agent based framework for energy distribution and QoS in wireless sensor networks. Agents have its own behavior policy by means of a gene, which is optimized by genetic operations. Agents behavior to distribute energy consumption over sensor nodes. Simulation results show that the enhanced framework extends the lifetime of sensor nodes. Successful transmission ratios of emergency data and non emergency data are increased by 27% and 14%, respectively. Also, the results demonstrate that Qos of networks are improved.

Multi-level Consistency Control Techniques in P2P Multiplayer Game Architectures with Primary Copy (기본 사본을 갖는 P2P 멀티플레이어 게임 구조의 수준별 일관성 제어 기법)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.135-143
    • /
    • 2015
  • A Multiplayer Online Game(MOG) is a game capable of supporting hundreds or thousands of players and is mostly played using the Internet. P2P(peer-to-peer) architectures for MOGs can potentially achieve high scalability, low cost, and good performance. The basic idea of many P2P-based games is to distribute the game state among peers and along with it processing, network, and storage tasks. In a primary-copy based replication scheme where any update to the object has to be first performed on the primary copy, this means distributing primary copies of objects among peers. Most multiplayer games use a primary-copy model in order to provide strong consistency control over an object. Games consist of various types of actions that have different levels of sensitivity and can be categorized according to their consistency requirements. With the appropriate consistency level of each action type within a game, this paper allows developers to choose the right trade-off between performance and consistency. The performance for P2P game architecture with the primary-copy model is evaluated through simulation experiments and analysis.

A Heuristic Load Balancing Algorithm by using Iterative Load Transfer (반복적인 부하 이동에 의한 휴리스틱 부하 평형 알고리즘)

  • Song Eui-Seok;Oh Ha-Ryung;Seong Yeong-Rak
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.499-510
    • /
    • 2004
  • This paper proposes a heuristic load balancing algorithm for multiprocessor systems. The algorithm minimizes the number of idle links to distribute load traffic and reduces its communication cost. Each processor iteratively tries to transfer unit load to/from every neighbor processors. However, real load transfer is collectively done after complete load traffic calculation to minimize useless traffic. The proposed algorithm can be employed in various interconnection topologies with slight modifications. In this paper, it is applied to both hypercube and mesh environments. For performance evaluation, simulation studies are performed. The performance of proposed algorithm is compared to those of two well-known algorithms. The results show that the proposed algorithm always balances the loads perfectly. Furthermore, it reduces the communication costs by $70{\%}{\~}90{\%}$ in the hypercube ; and it reduces the cost by $\75{\%}$ in the mesh, compared to existing algorithms.

Optimal Information Dispersal Scheme for Survivable Storage Systems (서바이벌 스토리지 시스템을 위한 최적 정보 분할 기법)

  • Song, Sung-Keun;Youn, Hee-Yong;Lee, Hyung-Soo;Lee, Kang-Shin
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.657-664
    • /
    • 2003
  • Supporting the availability, integrity, and confidentiality of the information is crucial. The survivability storage systems require to encode and distribute data over multiple storage nodes or data base to survive failures and malicious attacks Information dispersal scheme is one of the most efficient schemes allowing high availability and security with reasonable overhead. In this paper, we propose an algorithm determining the optimal (m, n)-lDS in terms of availability, given a set of IDS's. The proposed algorithm will be very useful for designing a highly available and secure storage system since many factors such as node number, storage space, operation speed, etc. interact with each other and thereby finding an optimal information dispersal scheme is very difficult.

Robust watermarking technique in geometric distortion and authentication of digital images (기하학적인 변형에 강건한 워터마킹 기법과 디지털 영상의 인증)

  • Lee, Na-Young;Kim, Won;Kim, Gye-Young; Choi, Hyung-Il
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.367-372
    • /
    • 2003
  • The existing watermarking techniques for copyright protection of a digital image are fragile in geometric distortion and it is hard to detect whether it was manipulated artificially. In this paper, we proposed the new copyright protection system that can authorize a digital mage and :an embed or extract a robust watermark in a artificial manipulation in order to solve these problems. In a watermarking part, the proposed a watermarking technique embeds a watermark in a phase component after a Complex Wavelet Transform (CWT) with an original image, and a watermark is extracted from an watermarked image by stages. A copyright about an image can be insisted on than a threshold after comparing a correlation of an original watermark with an extracted watermark if large. In an authentication part of a digital image, EZW (Embedded Zerotree Wavelet) is used, and an authentication cord of an watermarked image is generated. An authentication code of an image to have been distribute to is compared with a generated authentication cord, and artificial operation isn´t than a threshold if large. The proposed copyright protection system through performance evaluation display that it was robust in geometric distortion and a artificial operation was able to be detected.