• Title/Summary/Keyword: Internet Time Synchronization

Search Result 104, Processing Time 0.022 seconds

A Data-Consistency Scheme for the Distributed-Cache Storage of the Memcached System

  • Liao, Jianwei;Peng, Xiaoning
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.3
    • /
    • pp.92-99
    • /
    • 2017
  • Memcached, commonly used to speed up the data access in big-data and Internet-web applications, is a system software of the distributed-cache mechanism. But it is subject to the severe challenge of the loss of recently uncommitted updates in the case where the Memcached servers crash due to some reason. Although the replica scheme and the disk-log-based replay mechanism have been proposed to overcome this problem, they generate either the overhead of the replica synchronization or the persistent-storage overhead that is caused by flushing related logs. This paper proposes a scheme of backing up the write requests (i.e., set and add) on the Memcached client side, to reduce the overhead resulting from the making of disk-log records or performing the replica consistency. If the Memcached server fails, a timestamp-based recovery mechanism is then introduced to replay the write requests (buffered by relevant clients), for regaining the lost-data updates on the rebooted Memcached server, thereby meeting the data-consistency requirement. More importantly, compared with the mechanism of logging the write requests to the persistent storage of the master server and the server-replication scheme, the newly proposed approach of backing up the logs on the client side can greatly decrease the time overhead by up to 116.8% when processing the write workloads.

Implementation of A Networked Collaboration Engine for Virtual Engineering of Tilting Train (틸팅차량의 네트워크 협업 엔진 구현)

  • Chung, Yoo-Jin;Han, Seong-Ho;Song, Yong-Soo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.2 no.2
    • /
    • pp.45-50
    • /
    • 2006
  • Tilting technology is to tilt the train on the curve in order to minimize centrifugal force to passengers and to improve the speed within the limits of passenger's comfort and safety. According to reports from other countries, there is 15~30% speed improvement compared to the conventional trains. Recently, the advent of World-Wide-Web(WWW) and the explosive popularity of the Internet gave birth to collaborative applications which were enabled by computers and networks as their primary media. The progress of 3D computer graphics enabled collaborative applications with 3D virtual environments or distributed virtual environments. In this paper, we explain our implementation of the Share collaboration engine which is for collaboration applications based on a distributed virtual environment. The Share collaboration engine proposes a new Share network architecture for management of participants, and it provides some synchronization methods for 3D objects in virtual collaboration. TTX_PDM is an experimental application that tries to prevent wastes of human, material and time resources in networked virtual collaboration.

  • PDF

A Study on the Harmonizing media for E-learning service in Smart Environment (스마트 환경에서 이-러닝 서비스를 위한 학습 미디어 Harmonizing 기법 연구)

  • Kim, Svetlana;Yoon, Yong-Ik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.10
    • /
    • pp.137-143
    • /
    • 2012
  • The learners using learning content through the smart devices can access to the Internet from anytime and anywhere. However, with the rapid increase of learning content on the Web, it will be time-consuming for learners to find contents they really want to and need to study. Therefore, e-learning systems should not only provide flexible content delivery, but support adaptive harmonizing fusion content. The harmonizing fusion content it is a very important in fusion e-learning service. The representative method to provide synchronization between fusion content is a provide absolute time value between of the contents. However, this method is occurs a problem transferring time delay. Also, to enter an absolute time value for the duration of the each content is several problems arise. In this paper introduces a new smart e-smart service support the harmonizing media based technology to create synchronized learning presentation.

Development Migration Agent Server for Seamless Virtual Environment (Seamless 가상 환경을 위한 Migration Agent 서버 개발)

  • Won, Donghyun;An, Dongun;Chung, Seungjong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.223-228
    • /
    • 2016
  • Nowadays users of Virtual Environment are want to play with thousands of players in an evolving virtual world at the same time over the internet. So, the load of this kind of Virtual Environments is heavier than that of any other precedents. One of load balancing methods is map-partition to divide the load of entire system which is vulnerable to delay message between clients and servers. In this paper, we propose a Migration Agent application server architecture using to help migration of player character between field servers and to reduce response time between clients and field servers. Migration Agent is reduce Player Character's responds time as Cache Server, if Player Character move to another Field Server, Player Character need the synchronization process in the DBMS approach, to minimize response time by reducing the period for cross - Player Character Field Server to perform the role. Field Server by placing them in form of a stack existing form of grid, for load concentrated on a specific server.

Performance Evaluation for Speed of Mobile Devices in UFMC Systems (UFMC 시스템에서 모바일 장치의 이동속도에 대한 성능평가)

  • Lee, Kyuseop;Choi, Ginkyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.53-58
    • /
    • 2017
  • UFMC is known as the one among novel multi-carrier modulation techniques which are designed for replacing OFDM for 5G wireless communication systems. It is the generalized model of OFDM and FBMC, which combines the advantages of OFDM and FBMC and avoids their weak points. UFMC is more robust in synchronization condition like Time-frequency misalignment compared to CP-OFDM. Moreover UFMC is more proper to burst uplink transmission like M2M 5G Communications. In this paper we analyze the BER performance in various channels and speeds. The simulation result shows that the BER performance is lowered when mobile devices are moving fast and the BER performance is so sensitive for the good channel environment.

Analysis of Delay time by Adjusting of Check Interval in Asynchronous Wireless Sensor Network with Low Power (저전력 비동기 무선센서네트워크에서 체크인터벌 조절에 따른 지연시간 분석)

  • Yoon, Mi-Hee;Kim, Dongwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.75-80
    • /
    • 2020
  • There are so many low power MAC protocols for wireless sensor network. IEEE802.15.4 among them has disadvantage of a large power consumption for synchronization. To save power consumption it use the superframe operation alternating sleep mode and awake mode. But latency is longer result from superframe operation. B-MAC can have shorter latency according to check interval. But transmitter consumes more power because of long preamble. And receiver is suffering from overhearing. In this paper, we use the adaptive check interval scheme[1] of B-MAC for enhancing the power consumption. Its maximum throughput and minimum delay is evaluated by comparing the proposed scheme with a typical single channel IEEE802.15.4.

A Mobile P2P Semantic Information Retrieval System with Effective Updates

  • Liu, Chuan-Ming;Chen, Cheng-Hsien;Chen, Yen-Lin;Wang, Jeng-Haur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1807-1824
    • /
    • 2015
  • As the technologies advance, mobile peer-to-peer (MP2P) networks or systems become one of the major ways to share resources and information. On such a system, the information retrieval (IR), including the development of scalable infrastructures for indexing, becomes more complicated due to a huge increase on the amount of information and rapid information change. To keep the systems on MP2P networks more reliable and consistent, the index structures need to be updated frequently. For a semantic IR system, the index structure is even more complicated than a classic IR system and generally has higher update cost. The most well-known indexing technique used in semantic IR systems is Latent Semantic Indexing (LSI), of which the index structure is generated by singular value decomposition (SVD). Although LSI performs well, updating the index structure is not easy and time consuming. In an MP2P environment, which is fully distributed and dynamic, the update becomes more challenging. In this work, we consider how to update the sematic index generated by LSI and keep the index consistent in the whole MP2P network. The proposed Concept Space Update (CSU) protocol, based on distributed 2-Phase locking strategy, can effectively achieve the objectives in terms of two measurements: coverage speed and update cost. Using the proposed effective synchronization mechanism with the efficient updates on the SVD, re-computing the whole index on the P2P overlay can be avoided and the consistency can be achieved. Simulated experiments are also performed to validate our analysis on the proposed CSU protocol. The experimental results indicate that CSU is effective on updating the concept space with LSI/SVD index structure in MP2P semantic IR systems.

A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets

  • Kavisankar, L.;Chellappan, C.;Sivasankar, P.;Karthi, Ashwin;Srinivas, Avireddy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1726-1743
    • /
    • 2014
  • DDoS (Distributed Denial of Service) has been a continuous threat to the cyber world with the growth in cyber technology. This technical evolution has given rise to a number of ultra-sophisticated ways for the attackers to perform their DDoS attack. In general, the attackers who generate the denial of service, use the vulnerabilities of the TCP. Some of the vulnerabilities like SYN (synchronization) flooding, and IP spoofing are used by the attacker to create these Distributed Reflected Denial of Service (DrDoS) attacks. An attacker, with the assistance of IP spoofing creates a number of attack packets, which reflects the flooded packets to an attacker's intended victim system, known as the primary target. The proposed scheme, Efficient Spoofed Flooding Defense (ESFD) provides two level checks which, consist of probing and non-repudiation, before allocating a service to the clients. The probing is used to determine the availability of the requested client. Non-repudiation is taken care of by the timestamp enabled in the packet, which is our major contribution. The real time experimental results showed the efficiency of our proposed ESFD scheme, by increasing the performance of the CPU up to 40%, the memory up to 52% and the network bandwidth up to 67%. This proves the fact that the proposed ESFD scheme is fast and efficient, negating the impact on the network, victim and primary target.

Design of Efficient Adult Authentication Model for prevent of illegal Service of Child in IPTV Service Environment (IPTV 서비스를 이용하는 사용자의 효율적인 성인인증 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.68-75
    • /
    • 2013
  • Recently IPTV that transmits multimedia contents in real time through internet, cable TV net and satelite net gets the limelight. But IPTV service that gives service to users by various media has a problem of not supporting user certification fully. This paper suggests a certification model which prevents getting access permission of IPTV service by sending illegal certification information by adolescent through integrating mobile communication technique with RFID(Radio Frequency IDentification) technique which is a key technique of Ubiquitous environment. This model performs the process of adult certification by keeping synchronization with user's certificaiton information that is saved in data-base of certification server and contents server after getting the system of class categorization in contents server to overcome disadvantage of simple adult certification system that is popular in the existing internet. Also, it adapts double hash chain technique not to down load illegally contents without the permission of manager even if an adolescent gets manager's approval key.

A Design on The Zone Master Platform based on IIoT communication for Smart Factory Digital Twin (스마트 팩토리 디지털 트윈(Digital Twin)을 위한 IIoT 통신 기반 ZMP(Zone Master Platform) 설계)

  • Park, Seon-Hui;Bae, Jong-Hwan
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.81-87
    • /
    • 2020
  • This paper creates a standard node for acquiring sensor data from various industrial sensors (IoT/non-IoT) for the establishment of Smart Factory Digital Twin, and provides inter-compatible data by linking zones by group/process to secure data stability and to ensure the digital twin (Digital Twin) of Smart Factory. The process of the Zone Master platform contains interface specifications to define sensor objects and how sensor interactions between independent systems are performed and carries out individual policies for unique data exchange rules. The interface for execution control of the Zone Master Platform processor provides system management, declaration management for public-subscribe, object management for registering and communicating status information of sensor objects, ownership management for property ownership sharing, time management for data synchronization, and data distribution management for Route information on data exchange.