• Title/Summary/Keyword: Kernel Module

Search Result 121, Processing Time 0.026 seconds

The Design and Implementation of the SRTPIO Module for a Real-time Multimedia Data Transport (실시간 멀티미디어 데이타 전송을 위한 SRTPIO 모듈 설계 및 구현)

  • Nam, Sang-Jun;Lee, Byung-Rae;Kim, Tai-Woo;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.621-630
    • /
    • 2001
  • Recently, users' demands for multimedia service are increasing. But, server systems offer inefficient multimedia data service to users. In this paper, to transport multimedia data in the server system more efficiently, we propose the SRTPIO(Special RTP Input/Output) module that process the RTP(Real-time Transport Protocol) data in the kernel with the SIO(Special Input/Output) Mechanism. The SIO mechanism improve a transfer speed because it reduces overheads associated with data copying and context-switching between the user mode and the kernel mode occured in general server system in the kernel-level. The SRTPIO module, integrating the SIO mechanism and the RTP data processing in the kernel, support efficient multimedia data transfer architecture.

  • PDF

A Memory Intensive Real-time 3x3 Neighborhood processor for Image Processing (Memory Intensive 실시간 영상신호처리용 3 $\times$ 3 Neighborhood VLSI 처리기)

  • 김진홍;남철우;우성일;김용태
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.6
    • /
    • pp.963-971
    • /
    • 1990
  • This paper proposes a memory intensive VLSI architecture for the realization of real-time 3x3 neighborhood processor based on the distributed arithmetic. The proposed architecture is characterized by a bit serial and multi-kernel parallel processing which exploits the pixel kernel parallelism and concurrency. The chip implements 8 neighborhood processing elements in parallel with efficirnt input and output modules which operate concurrently. Besides the a4chitectural design of a neighborhood processor, the design methodology using module generator concept has been considered and MOGOT(MOdule Generator Oriented VLSI design Tool) has been constructed based on the workstation. Based on these design environments MOGOT, it has been shown that the main part of the suggested architecture can be designed efficiently using 2\ulcorner double metal CMOS technology. It includes design of input delay and data conversion module, look-up table for inner product operation, carry save accumulator, output data converter and delay module, and control module.

  • PDF

LxBSM: Loadable Kernel Module for the Creation of C2 Level Audit Data based on Linux (LxBSM: C2 수준의 감사 자료 생성을 위한 리눅스 기반 동적 커널 모듈)

  • 전상훈;최재영;김세환;심원태
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.146-155
    • /
    • 2004
  • Currently most of commercial operating systems contain a high-level audit feature to increase their own security level. Linux does not fall behind the other commercial operating systems in performance and stability, but Linux does not have a good audit feature. Linux is required to support a higher security feature than C2 level of the TCSEC in order to be used as a server operating system, which requires the kernel-level audit feature that provides the system call auditing feature and audit event. In this paper, we present LxBSM, which is a kernel module to provide the kernel-level audit features. The audit record format of LxBSM is compatible with that of Sunshield BSM. The LxBSM is implemented as a loadable kernel module, so it has the enhanced usability. It provides the rich audit records including the user-level audit events such as login/logout. It supports both the pipe and file interface for increasing the connectivity between LxBSM and intrusion detection systems (IDS). The performance of LxBSM is compared and evaluated with that of Linux kernel without the audit features. The response time was increased when the system calls were called to create the audit data, such as fork, execve, open, and close. However any other performance degradation was not observed.

A Kernel Module to Support High-Performance Intra-Node Communication for Multi-Core Systems (멀티 코어 시스템을 위한 고속 노드내 통신 지원 모듈)

  • Jin, Hyun-Wook;Kang, Hyun-Goo;Kim, Jong-Soon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.9
    • /
    • pp.407-415
    • /
    • 2007
  • In parallel cluster computing systems, the efficiency of communication between computing nodes is one of important factors that decide overall system performance. Accordingly, many researchers have studied on high-performance inter-node communication. The recently launched multi-core processor, however. increases the importance of intra-node communication as well because the more the number of cores in a node, the more the number of parallel processes running in the same node. Though there have been studies on intra-node communications, these have limited considerations on the state-of-the-art systems. In this paper, we propose a Linux kernel module that minimizes the number of data copy by exploiting the memory mapping mechanism for high-performance intra-node communication. The proposed kernel module supports the Linux kernel version 2.6. The performance measurements over a multi-core system present that the proposed kernel module can achieve lower latency up to 62% and higher throughput up to 144% than an existing kernel module approach. In addition, the measurements reveal that the performance of intra-node communication can vary significantly based on whether the cores that run the communication processes are belong to the same processor package (i.e., sharing the L2 cache).

Kernel Hardening by Recovering Kernel Stack Frame in Linux Operating System (리눅스 운영체제에서 커널 스택의 복구를 통한 커널 하드닝)

  • Jang Seung-Ju
    • The KIPS Transactions:PartA
    • /
    • v.13A no.3 s.100
    • /
    • pp.199-204
    • /
    • 2006
  • The kernel hardening function is necessary in terms of kernel stability to reduce the system error or panic due to the kernel code error that is made by program developer. But, the traditional kernel hardening method is difficult to implement and consuming high cost. The suggested kernel hardening function that makes high availability system by changing the panic() function of inside kernel code guarantees normal system operation by recovering the incorrect address of the kernel stack frame. We experimented the kernel hardening function at the network module of the Linux by forcing panic code and confirmed the proposed design mechanism of kernel hardening is working well by this experiment.

Design and Implementation of iSCSI Protocol Based Virtual USB Drive for Mobile Devices (모바일 장치를 위한 iSCSI 프로토콜 기반의 가상 USB 드라이브 설계 및 구현)

  • Choi, Jae-Hyun;Nam, Young Jin;Kim, JongWan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.175-184
    • /
    • 2010
  • This paper designs a virtual USB drive for mobile devices which gives an illusion of a traditional USB flash memory drive and provides capacity-free storage space over IP network. The virtual USB drive operating with a S3C2410 hardware platform and embedded linux consists of USB device driver, an iSCSI-enabled network stack, and a seamless USB/iSCSI tunneling module. For performance enhancement, it additionally provides a kernel-level seamless USB/iSCSI tunneling module and data sharing with symbol references among kernel modules. Experiments reveal that the kernel-level implementation can improve the I/O performance up to 8 percentage, as compared with the user-level implementation.

Protocol Implementation for Ethernet-Based Real-Time Communication Network (이더넷 기반 실시간 통신 네트워크 프로토콜 구현)

  • Kwon, Young-Woo;Nguyen, Dung Huy;Choi, Joon-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.247-251
    • /
    • 2021
  • We propose a protocol for Ethernet-based industrial real-time communication networks. In the protocol, the master periodically transmits control frames to all slaves, and the ring-type network topology is selected to achieve high-speed transmission speed. The proposed protocol is implemented in the form of both firmware and Linux kernel modules. To improve the transmission speed, the MAC address table is disabled in the firmware implementation, and the NAPI function of the Ethernet driver is removed in the Linux kernel module implementation. A network experiment environment is built with four ARM processor-based embedded systems and network operation experiments are performed for various frame sizes. From the experimental results, it is verified that the proposed protocol normally operates, and the firmware implementation shows better transmission speed than the Linux kernel module implementation.

A study of analysis and improvement of security vulnerability in Bluetooth for data transfer (블루투스 환경에서 데이터 전송 시 보안 취약점 분석 및 개선 방안 관련 연구)

  • Baek, Jong-Kyung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2801-2806
    • /
    • 2011
  • During data transmissions via Bluetooth networks, data to be encrypted, or plain text between the application layer and the device layer, can be hacked similar to a key-logger by the major function hooking technique of Windows Kernel Driver. In this paper, we introduce an improved protection module which provides data encryption transmission by modifying the data transmission driver of the Bluetooth device layer, and also suggest a self-protecting scheme which prevents data exposure by various hacking tools. We implement the protection module to verify the confidentiality guarantee. Our protection module which provides data encryption with minimal latency can be expected the widespread utilization in Bluetooth data transmission.

Implementation of bluetooth LAN Access Point for the wireless Local access (근거리 무선 제어를 위한 Bluetooth LAN Access Point 구현)

  • Lee, Byeong-Woong;Oh, Won-Geun;Yoe, Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.5
    • /
    • pp.676-683
    • /
    • 2002
  • In this paper, LAN Access Point is realized by making out bluetooth protocol stack in Linux Kernel, porting Linux in an embeded system employed bluetooth module. Hardware for a general-purpose embeded system is designed and Linux Kernel is ported after deploying Bluetooth Module. Also, Boot loader for system booting and management is composed, and Kernel is modified to meet with the system. Finally, Ethernet devise driver is made out, and bluetooth protocol Stack and Lan Access Point are realized. The possibility of TCP/IP communication through LAN Access Point to PC employed Bluetooth module, which is considered as client, is evaluated. From the evaluation results, we can see that the performance in Telnet FTP, Web browsing through Bluetooth LAN Access Point is satisfactory.

Intrusion Response and Recovery System Using a File System Image Backup (파일시스템 이미지 백업을 이용한 침입대응 및 파일복구 시스템)

  • Lee Jae-Kwang;Lim Jung-Mok
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.182-190
    • /
    • 2005
  • As computers and Internet become popular, many corporations and countries are using information protection system and security network to protect their informations and resources in internet. But the Intrusional possibilities are increases in open network environments such as the Internet. Even though many security systems were developed, the implementation of these systems are mostly application level not kernel level. Also many file protection systems were developed, but they aren't used widely because of their inconvenience in usage. In this paper, we implement a kernel module to support a file protection function using Loadable Kernel Module (LKM) on Linux. When a system is damaged due to intrusion, the file system are easily recovered through periodical file system image backup.

  • PDF