• Title/Summary/Keyword: Internet access

Search Result 2,614, Processing Time 0.038 seconds

A Comparative Study on Classification Schemes of Internet Services (인터넷 정보서비스의 분류체계에 대한 비교연구 : 물리학을 중심으로)

  • 최희윤
    • Journal of the Korean Society for information Management
    • /
    • v.15 no.3
    • /
    • pp.45-71
    • /
    • 1998
  • There is increasing importance of a system to reorganize explosive expansion of internet information resources efficiently; therefore, an increasing concern about classification system as an instrument for facilitating an access to a specific subject and improving efficiency in information retrieval. Comparing the hierarchical structure and access methodology of internet-based classification system with those of library classification such as Dewey Decimal Classification through their structural aspects and retrival process, this paper proposes the proper classification system in internet environment.

  • PDF

An Internet Based Data Storage Protocol for ATA devices

  • Singh, Kulveer;Lim, Hyo-Taek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1167-1170
    • /
    • 2007
  • This paper introduces a data storage transport protocol internet Advanced Technology Attachment (iATA) for ATA storage devices that can be accessed over (TCP/IP) networks. As the access speed of Advanced Technology Attachment (ATA) type storage is increasing, the importance of sharing the ATA type storages over internet is also increasing. We are proposing a protocol in which we have implemented the basic ATA command set to access the ATA type remote storage devices over the TCP/IP networks.In this paper, we give basic details of the protocol and discuss the existing storage protocols which are mainly used for accessing block storage like internet Small Computer System Interface (iSCSI) Hyper Small Computer System Interface (HyperSCSI) and ATA over Ethernet (AoE).

  • PDF

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.

Characterization Studies on Data Access Bias in Mobile Platforms

  • Bahn, Hyokyung
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.52-58
    • /
    • 2021
  • Data access bias can be observed in various types of computing systems. In this paper, we characterize the data access bias in modern mobile computing platforms. In particular, we focus on the access bias of data observed at three different subsystems based on our experiences. First, we show the access bias of file data in mobile platforms. Second, we show the access bias of memory data in mobile platforms. Third, we show the access bias of web data and web servers. We expect that the characterization study in this paper will be helpful in the efficient management of mobile computing systems.

Internet Based Remote Control of a Mobile Robot (인터넷 기반 이동로봇의 원격제어)

  • Choi, Mi-Young;Park, Jang-Hyun;Kim, Seong-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.502-504
    • /
    • 2004
  • With rapidly growing of computer and internet technology, Internet-based tote-operation of robotic systems has created new opportunities in resource sharing, long-distance learning, and remote experimentation. In this paper, remote control system of a mobile robot through the internet has been designed. The internet users can access and command a mobile robot in the real time, receiving the robot's sensor data. The overall system has been tested and its usefulness shown through the experimental results.

  • PDF

A MATHEMATICAL MODEL FOR HISTORY-BASED ACCESS CONTROL

  • Kim, Hee-Young
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.8 no.1
    • /
    • pp.11-30
    • /
    • 2004
  • Access Control is one of essential branches to provide system's security. Depending on what standards we apply, in general, there are Role-based access control, History-based access control. The first is based on subject's role, The later is based on subject's history. In fact, RBAC has been implemented, we are using it by purchasing some orders through the internet. But, HBAC is so complex that there will occur some errors on the system. This is more and more when HBAC is used with other access controls. So HBAC's formalization and model which are general enough to encompass a range of policies in using more than one access control model within a given system are important. To simplify these, we design the mathematical model called non-access structure. This Non-access structure contains to historical access list. If it is given subjects and objects, we look into subject grouping and object relation, and then we design Non-access structure. Then we can determine the permission based on history without conflict.

  • PDF

Design and Implementation of Mobile Class Homepage for Reinforcing Communication between School and Home (학교와 가정 사이의 의사소통을 강화한 모바일 학급 홈페이지의 설계 및 구현)

  • Hong, Yeon-Ho;Jun, Woo-Chun
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.1
    • /
    • pp.27-37
    • /
    • 2005
  • Advances in the wireless Internet have led to the rise of diverse techniques which can access information regardless of time and place. There are many research efforts to identify the various ways to use a cellular phone in our everyday life. However, it has been rarely used in the elementary school. As an attempt to apply the wireless Internet technology to the elementary school, this study is to design and implement a wireless Internet homepage where the parents would be able to have an easy access to the information any place and any time. The characteristics of the wireless Internet homepage are as follows; first, the images were reduced to the minimum and the text-oriented information is mostly used to deliver the key information, considering the small screen and relatively slow transmission rates. Second, by providing a link set up between the wireless homepage and the wired Internet homepage, users can choose the more convenient access tool. Finally, the SMS (Short Message Service) messages could be used for an immediate delivery of information.

  • PDF

The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database

  • Choi, Jeongseok;Kim, Jaekwon;Lee, Dong Kyun;Jang, Kwang Soo;Kim, Dai-Jin;Choi, In Young
    • Genomics & Informatics
    • /
    • v.14 no.1
    • /
    • pp.20-28
    • /
    • 2016
  • Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

Implementation of a Mobile Agent Platform for Handheld Devices to Access the SNMP MIB (SNMP MIB 액세스를 위한 휴대단말기용 이동에이전트 플랫폼)

  • 전병국;김영철
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2002
  • Due to rapid development of high speed wire/wireless internet technologies, at the current age, it cares into being one phenomenon that the internet business is able to work on anyplace and anytime. In this environment, a technology of mobile agent provides very useful mechanism for personal handheld devices because of supporting migration as autonomously executable software object Instead of users. Therefore, this paper focuses on Implementing a mobile agent platform for personal handheld devices, which supports mobile agents in wire/wireless internet environment. To do this, we construct the system with modified JAMAS, based on Java, in our previous research. Based on our proposed system, we implement the browsing application in personal handheld devices to access the MIB(Management Information Base) on SNMP(Simple Network Management Protocol), which supervises network environment on wire/wireless internet. This proposed application system is easily to access the MIB managed by SNMP agent. then provides network map viewer and updates the MIB through the browser to network administrator. As a result, we can support application area of mobile agents such as hare network management. M-Commerce, integration of remote database systems, active message and active network with personal handheld devices.

  • PDF

Implementation of WiFi-to-WiBro Access Point -WiMAX CPE (WiFi-to-WiBro Access Point 구현 -WiMAX CPE)

  • Park, Chun-Kwan;Song, Han-Young;Jeon, Byung-Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.53-63
    • /
    • 2009
  • This paper is to develop WiMAX CPE(wireless AP) that can provides Wi-Fi terminal with wireless Internet service by connecting to Wibro wireless network. This AP aims to support WiBro in upstream interface basically, and Wi-Fi and 100M Ethernet interface in downstream. So, we has developed the equipment for business that wireless ISP can provide many Internet customers with wireless Internet service by using Wi-Fi terminal in subway, car, ship, and so on, and the equipment for users that a user can purchase and then install in person. For the latter, multiple Wi-Fi terminals that be registered in WiBro service can be connected to Internet simultaneously.

  • PDF