• Title/Summary/Keyword: File Transfer

Search Result 209, Processing Time 0.024 seconds

A P2P-to-UPnP Proxy Gateway Architecture for Home Multimedia Content Distribution

  • Hu, Chih-Lin;Lin, Hsin-Cheng;Hsu, Yu-Feng;Hsieh, Bing-Jung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.406-425
    • /
    • 2012
  • Deploying advanced home networking technologies and modern home-networked devices in residential environments provides a playground for new home applications and services. Because home multimedia entertainment is among the most essential home applications, this paper presents an appealing home media content sharing scenario: home-networked devices can discover neighboring devices and share local media content, as well as enormous amounts of Internet media content in a convenient and networked manner. This ideal scenario differs from traditional usages that merely offer local media content and require tedious manual operations of connection setup and file transfer among various devices. To achieve this goal, this study proposes a proxy gateway architecture for home multimedia content distribution. The proposed architecture integrates several functional mechanisms, including UPnP-based device discovery, home gateway, Internet media provision, and in-home media content delivery. This design addresses several inherent limitations of device heterogeneity and network interoperability on home and public networks, and allows diverse home-networked devices to play media content in an identical and networked manner. Prototypical implementation of the proposed proxy gateway architecture develops a proof-of-concept software, integrating a BitTorrent peer-to-peer client, a UPnP protocol stack, and a UPnP AV media server, as well as media distribution and management components on the OSGi home gateway platform. Practical demonstration shows the proposed design and scenario realization, offering users an unlimited volume of media content for home multimedia entertainment.

A Study on the RDP, VNC Applicaion for the computer Remote Control by Mobile (모바일 기반의 컴퓨터 원격제어를 위한 RDP, VNC Application에 관한 연구)

  • Song, Jong-gun;Jang, Won-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.459-462
    • /
    • 2009
  • The Growth in wireless Internet has made Networking possible at anytime and anywhere so that application program development is vigorous for mobile service implementation. In particular, mobile service has a feature that can present flexible service at anytime, and anywhere. This study proposes a system which is able to make a remote control of computer by means of mobile as an example of the production of application for such mobile service. This paper researches a RDP(Remote Desktop Protocol), VNC(Virtual Network Computing) system that control screen of remote computer and input devices by using smart-phone. The advantage of this system is the function that turning on and off the computer, file transfer, file upload/download, and paperwork. Therefore users are expected to use more conveniently.

  • PDF

Enhancing Installation Security for Naval Combat Management System through Encryption and Validation Research

  • Byeong-Wan Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.121-130
    • /
    • 2024
  • In this paper, we propose an installation approach for Naval Combat Management System(CMS) software that identifies potential data anomalies during installation. With the popularization of wireless communication methods, such as Low Earth Orbit(LEO) satellite communications, various utilization methods using wireless networks are being discussed in CMS. One of these methods includes the use of wireless network communications for installation, which is expected to enhance the real-time performance of the CMS. However, wireless networks are relatively more vulnerable to security threats compared to wired networks, necessitating additional security measures. This paper presents a method where files are transmitted to multiple nodes using encryption, and after the installation of the files, a validity check is performed to determine if there has been any tampering or alteration during transmission, ensuring proper installation. The feasibility of applying the proposed method to Naval Combat Systems is demonstrated by evaluating transmission performance, security, and stability, and based on these evaluations, results sufficient for application to CMS have been derived.

Analysis and Modeling of Traffic at Ntopia Subscriber Network of Korea Telecom (KT의 Ntopia가입자 망 트래픽 분석 및 모델링)

  • 주성돈;이채우
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.5
    • /
    • pp.37-45
    • /
    • 2004
  • As Internet technologies are mature, many new applications that are different characteristics are emerging. Recently we see wide use of P2P(Peer to Peer) applications of which traffic shows different statistical characteristics compared with traditional application such as web(HTTP) and FTP(File Transfer Protocol). In this paper, we measured subscriber network of KT(Korea Telecom) to analyze P2P traffic characteristics. We show flow characteristics of measured traffic. We also estimate Hurst parameter of P2P traffic and compare self-similarity with web traffic. Analysis results indicate that P2P traffic is much bustier than web traffic and makes both upstream traffic and downstream traffic be symmetric. To predict parameters related QoS such as packet loss and delays we model P2P traffic using two self-similar traffic models and predict both loss probability and mm delay then compare their accuracies. With simulation we show that the self-similar traffic models we derive predict the performance of P2P traffic accurately and thus when we design a network or evaluate its performance, we can use the P2P traffic model as reference input traffic.

Development of an X3D Python Language Binding Viewer Providing a 3D Data Interface (3D 데이터 인터페이스를 제공하는 X3D Python 언어 바인딩 뷰어 개발)

  • Kim, Ha Seong;Lee, Myeong Won
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.6
    • /
    • pp.243-250
    • /
    • 2021
  • With the increased development of 3D VR applications augmented by recent VR/AR/MR technologies and by the advance of 3D devices, interchangeability and portability of 3D data have become essential. 3D files should be processed in a standard data format for common usage between applications. Providing standardized libraries and data structures along with the standard file format means that a more efficient system organization is possible and unnecessary processing due to the usage of different file formats and data structures depending on the applications can be omitted. In order to provide the function of using a common data file and data structure, this research is intended to provide a programming binding tool for generating and storing standardized data so that various services can be developed by accessing the common 3D files. To achieve this, this paper defines a common data structure including classes and functions to access X3D files with a standardized scheme using the Python programming language. It describes the implementation of a Python language binding viewer, which is an X3D VR viewer for rendering standard X3D data files based on the language binding interface. The VR viewer includes Python based 3D scene libraries and a data structure for creation, modification, exchange, and transfer of X3D objects. In addition, the viewer displays X3D objects and processes events using the libraries and data structure.

Protocol converting method for the Real-time Safety Supervision System in Railway (실시간 철도안전 관제를 위한 프로토콜 변환 방안 연구)

  • Ahn, Jin;Kim, Sung-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1335-1341
    • /
    • 2016
  • For the safety of train operation, monitoring & supervisory systems for train, signal, power, communication and facilities is operating independently in another place, so, its sensors are interdependently connected from each other to transfer gathering datas of sensing to control center. A Goal of Real-time railway safety supervision system is to improve the safety oversight efficiency and to prevent accidents by means of hazard prediction based on big data by integrating all of safety sensing data in wayside of railway, and the System is requested acquisition of all of sensing data of safety. So, we need special method of protocol converting for the purpose of integrating all of detecting data concerning safety without any changing application. In this paper we investigate the existing converting method in communication field, and propose a new progress to converting protocol adding function of transfer using XML file, and implemented this algorithm, and tested with example packets, finally.

An Architecture and Experimentation for Efficient and Reliable Name Service Systems (효율적이고 신뢰성 있는 네임 서비스 시스템의 구조 및 실험)

  • 심영철;박준철;강호석;이준원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.375-390
    • /
    • 2004
  • Domain Name System(DNS), one of the most important Internet services, handles mapping from host names to Internet addresses and vice versa, and precedes many Internet applications such as Web, e-mail, file transfer, etc. In this paper, we propose a structural design of a generic name server system providing name services for a huge domain for the purpose of improving the performance as well as the reliability of the system. We demonstrate the validity of the design by implementing and running a testbed system. Our testbed employs a couple of master name sowers for distributing the service overhead over two, rather than one, servers and for achieving high availability of the system as a whole. We suggest the use of dynamic update to add and delete records from a zone for which the name server has authority. The slave name servers located remotely then get a new, updated copy of the zone via incremental zone transfers(IXFRs). The experiments with the implemented testbed show that the proposed structure would easily manage increasing demands on the server power, and be highly available in the face of transient faults of a module in the system.

A study of Web Service Security System using the Secure Network Transfer Message (안전한 네트워크 전송 메시지를 이용한 웹 서비스 보안 시스템에 관한 연구)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.850-853
    • /
    • 2008
  • As th Internet grew rapidly, the Electronic Commerce that is based on Internet increased. The Electronic Commerce is unsubstantial in the mutual authentication between the parties and a commerce As a solution to this issue, a Web server uses a Client Message technology. The purpose of Client Message is to validate the user and the electronic commercial transaction. Further, it increases efficiency and offers several ability at various purposes. However, the Client Message is transferred and stored as an unencrypted text file, the information can be exposed easily to the network threats, end system threats, and Client Message harvesting threats. In this paper designed by used crypto algorithm a Secure Message as a solution to the issue have proposed above. Further, designed a security service per Network transmitting message to transfer client's user input information to a Web server safety.

  • PDF

Stepwise Volume Decomposition Considering Design Feature Recognition (설계 특징형상 인식을 고려한 단계적 볼륨 분해)

  • Kim, Byung Chul;Kim, Ikjune;Han, Soonhung;Mun, Duhwan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.1
    • /
    • pp.71-82
    • /
    • 2013
  • To modify product design easily, modern CAD systems adopt the feature-based model as their primary representation. On the other hand, the boundary representation (B-rep) model is used as their secondary representation. IGES and STEP AP203 edition 1 are the representative standard formats for the exchange of CAD files. Unfortunately, both of them only support the B-rep model. As a result, feature data are lost during the CAD file exchange based on these standards. Loss of feature data causes the difficulty of CAD model modification and prevents the transfer of design intent. To resolve this problem, a tool for recognizing design features from a B-rep model and then reconstructing a feature-based model with the recognized features should be developed. As the first part of this research, this paper presents a method for decomposing a B-rep model into simple volumes suitable for design feature recognition. The results of experiments with a prototype system are analyzed. From the analysis, future research issues are suggested.

Design and Implementation of parallel Media server in current system environment (기존 시스템 환경에서의 병렬 미디어 서버의 설계 및 구현)

  • 김경훈;류재상;김서균;남지승
    • Proceedings of the IEEK Conference
    • /
    • 2000.06c
    • /
    • pp.97-100
    • /
    • 2000
  • As network resources have become faster and demands for multimedia service through network have increased, the demand for Media server system has increased. These kinds of media server solve their bottle neck problem of internal storage device by using parallel system which takes advantage of fast network resource. Many vendors have suggested each of their media server system to solve these problem radically, but most of them require major modification of infra component and additional drawback has added. For example, storage mechanism for specific media requires new file system which is totally different from traditional one, and algorithm for enhancing performance may not suit for traditional operating system environment. In this paper, we designed a parallel media server based on web interface of traditional system and implemented a program for media server. Implemented server system performs parallel processing through web interface without any modification of traditional system, and controls which is related to merging load by distributed data is charged only to client and control server and consequently load of storage server can be minimized. And also, data transfer protocol for streaming media includes Retransfer algorithm and client Admission control policy relevant to performance of whole system.

  • PDF