• Title/Summary/Keyword: Internet Computing

Search Result 3,550, Processing Time 0.028 seconds

A Study on the Virtual Switch Implementation and Comparison for Smart Node Platform (가상 스위치 구현 및 비교에 관한 연구)

  • Jeong, Gab Joong;Choi, Kang-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2911-2918
    • /
    • 2014
  • Nowadays, most Internet servers run on virtual a network which connects each virtual machine, to process large amounts of data on single physical computer. The virtual machines for their own purposes are interconnected to other virtual server systems with various types of operating systems. Each virtual server may share one physical computer resources and operates at a service seamlessly to each other. Sometimes even the virtual machines are implemented using a method that lease the physical IT resources without purchasing physical server. Therefore, a virtual switch is needed to improve the performance when a large number of virtual machines operate on physical server. In this study, the implementation and investigation was performed for the virtual switches, OpenvSwitch and DPDKvSwitch, in order to provide the necessary high-performance cloud services to creative business.

A Recommendation System of Exponentially Weighted Collaborative Filtering for Products in Electronic Commerce (지수적 가중치를 적용한 협력적 상품추천시스템)

  • Lee, Gyeong-Hui;Han, Jeong-Hye;Im, Chun-Seong
    • The KIPS Transactions:PartB
    • /
    • v.8B no.6
    • /
    • pp.625-632
    • /
    • 2001
  • The electronic stores have realized that they need to understand their customers and to quickly response their wants and needs. To be successful in increasingly competitive Internet marketplace, recommender systems are adapting data mining techniques. One of most successful recommender technologies is collaborative filtering (CF) algorithm which recommends products to a target customer based on the information of other customers and employ statistical techniques to find a set of customers known as neighbors. However, the application of the systems, however, is not very suitable for seasonal products which are sensitive to time or season such as refrigerator or seasonal clothes. In this paper, we propose a new adjusted item-based recommendation generation algorithms called the exponentially weighted collaborative filtering recommendation (EWCFR) one that computes item-item similarities regarding seasonal products. Finally, we suggest the recommendation system with relatively high quality computing time on main memory database (MMDB) in XML since the collaborative filtering systems are needed that can quickly produce high quality recommendations with very large-scale problems.

  • PDF

CCN-Helper Performance Analysis for Data Transmission Delay over Federated Testbed Environment (국제 연동 테스트베드에서 데이터 전송 지연을 위한 CCN-Helper 성능 분석)

  • Choi, Won-jun;Ramneek, Ramneek;Seok, Woo-jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1947-1957
    • /
    • 2015
  • CCN networking is one of the future internet. With the rapid development of network platforms emerged a wide range of services through a virtual network environment. The performance of CCN in the high bandwidth delay is important to provide various services between nations. We can check the high bandwidth delay product in federation. Federation between the nations has the advantage of being effective to do a various services for the users, and the remote heterogeneous physical hardware engine supports various environments. Data transmission delay can be occur in long distance network even though the network is federated network. In this paper, we propose CCN-Helper protocol for data transmission delay in ling distance networks. We connect from KREONET in Korea to iLab.t in Belgique in order to test CCNx over heterogeneous federated environment.

A Study on the Platform for Big Data Analysis of Manufacturing Process (제조 공정 빅데이터 분석을 위한 플랫폼 연구)

  • Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.177-182
    • /
    • 2017
  • As major ICT technologies such as IoT, cloud computing, and Big Data are being applied to manufacturing, smart factories are beginning to be built. The key of smart factory implementation is the ability to acquire and analyze data of the factory. Therefore, the need for a big data analysis platform is increasing. The purpose of this study is to construct a platform for big data analysis of manufacturing process and propose integrated method for analysis. The proposed platform is a RHadoop-based structure that integrates analysis tool R and Hadoop to distribute a large amount of datasets. It can store and analyze big data collected in the unit process and factory in the automation system directly in HBase, and it has overcome the limitations of RDB - based analysis. Such a platform should be developed in consideration of the unit process suitability for smart factories, and it is expected to be a guide to building IoT platforms for SMEs that intend to introduce smart factories into the manufacturing process.

An Empirical Study on Relationships among Contents Quality, Trust, and Intention to Use of e-Learning (e-러닝 컨텐츠 품질, 신뢰, 이용의도의 관계에 대한 실증 연구)

  • Lim, Se-Hun;Kim, Dae-Kil;Lee, Sang-Heon
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.267-279
    • /
    • 2011
  • A variety of Web Services are being existences based on the development of the Internet. Especially, e-Learning services in the Universities make the temporal and spatial constraints overcome, and e-Learning services have gained great popularity to the students who use because those provide various convenience and usefulness. e-Learning studies have been actively performed based on the spread of e-Learning in the various industries. A number of studies suggest the diffusion plan of e-Learning applying the Technology Acceptance Model studies. Those studies focused on the ease of use and usefulness of e-Learning. The explanation about educational contents perspectives, which is the key factor in e-Learning, is very weak. Therefore, this study suggested the strategy for spreading the e-Learning adoption through in terms of e-Learning educational contents and trust perspectives. This research results would provide the strategic implications to boost the e-Learning adoption in the various universities in terms of e-Learning educational contents and trust perspectives.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Performance Evaluation of Label Switching in ATM networks. (ATM 망에서의 레이블 스위칭 기법 성능 평가 및 분석)

  • 이수경;오경희;손홍세;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.3B
    • /
    • pp.437-445
    • /
    • 2000
  • More advanced and demanding applications, like videoconferencing, video on demand. distributed computing etc., have been devised thanks to the availability of enhanced network feature. Network technologies need to be enhanced to support these applications and to cope with the increasing number of users. Increasing the availability of network resources is just not enough to achieve this goal; scalable network architecture. increased packet forwarding capabilities, a wider range of services are all additional requirements. MOLS (multiprotocol label Switching) is one of the new networking techniques under standardization in the scientific community. In this paper, we analyze the performance of label switching in ATM networks. Simulation tests were performed. In this simulation, we set a simple network configuration and used internet traffic traces from NLANR as input traffic sources. The simulation results and analysis will be helpful in utilizing the functions of ATM switching and IP routing.

  • PDF

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

A Design of Data Model for Electronic Tag Information Processing (전자태그 정보 처리를 위한 데이터 모델 설계)

  • Chang, Jung-Soo;Song, Jong-Chul;Ko, Gwang-San;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.763-766
    • /
    • 2005
  • Ubiquitous Computing owes Internet and development of computer network and appeared. RFID (Radio frequency Identification) technology is noted by point technology to realize this. However, PML that present in Auto-lD Center is defined point part to describe information of object, and necessary part is to use defining extension separately in actuality application. So that can define object type that can be used for electron tag data processing in RFID application service because do fetters to Auto-lD Center's PML Core in this treatise hereupon and apply in physical distribution circulation service field, designed object information data model.

  • PDF

Design and Implementation of iATA-based RAID5 Distributed Storage Servers (iATA 기반의 RAID5 분산 스토리지 서버의 설계 및 구현)

  • Ong, Ivy;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.305-311
    • /
    • 2010
  • iATA (Internet Advanced Technology Attachment) is a block-level protocol developed to transfer ATA commands over TCP/IP network, as an alternative network storage solution to address insufficient storage problem in mobile devices. This paper employs RAID5 distributed storage servers concept into iATA, in which the idea behind is to combine several machines with relatively inexpensive disk drives into a server array that works as a single virtual storage device, thus increasing the reliability and speed of operations. In the case of one machine failed, the server array will not destroy immediately but able to function in a degradation mode. Meanwhile, information can be easily recovered by using boolean exclusive OR (XOR) logical function with the bit information on the remaining machines. We perform I/O measurement and benchmark tool result indicates that additional fault tolerance feature does not delay read/write operations with reasonable file size ranged in 4KB-2MB, yet higher data integrity objective is achieved.