• 제목/요약/키워드: Native client

검색결과 12건 처리시간 0.027초

Native Client 네트워크 기능 확장을 통한 웹기반 I/O 서비스 지원 (Supporting Web-Based I/O Service by Extending Network Communication to Native Client)

  • 성백재;박세진;박찬익
    • 대한임베디드공학회논문지
    • /
    • 제6권4호
    • /
    • pp.249-254
    • /
    • 2011
  • A user desktop service can be made available on internet or local area network with the help of virtualization and cloud technologies. The service is usually called a virtual desktop or a desktop cloud. However, a user interface is limited to I/O capabilities of a user's mobile terminal. In order to enhance a user interface on a remote virtual desktop, it is important to connect full-featured I/O devices which are founded locally. Our previous work called SoD (System-on- Demand) has proposed a technique to associate local full-featured I/O devices with a remote virtual desktop in Xen. On the technique, it is required to install a SoD client agent in a user's mobile terminal for connecting a remote virtual desktop. In this paper, we propose a new framework called Web-SoD that does not require any explicit installation to make SoD service available. The SoD client agent is provided by the web technology so that the agent can be installed transparently, and the platform independency is also achieved. Due to insufficient network socket performance of current web technologies, we extend Native Client (NaCl) proposed by Google to support a network functionality by modifying a NaCl library and a service runtime. With conducted experiment, we show that the network extension supports a full socket functionality over the compromised overhead on the web environment.

An OS Platform Independent Architecture of Web-based Teleoperation for mobile robot

  • Ko, Deok-Hyeon;Lee, Soon-Geul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.346-349
    • /
    • 2004
  • The teleoperation system applies all of the industrial fields due to the development of the network infrastructure. It is one of the indispensable elements for controlling the robot at a remote sight and monitoring the limit or unknown environment. The common teleoperation robot system is what has the visual module to supply the network system and realistic UI to the existed robot system. Therefore, remarked that the fusion between modules and transmission of visual data the remarked the important element to improve the robot application in the various environments. Delay of development time by robot platform and noneffective communication among developers are also problem to approach. In this paper we propose the independent teleoperation system. The main application language is JAVA in this system, which is applied JAVA API like JNI and JMF to construct the effective teleoperation system. The system has the both side communication system between sever and client as a basic structure. The visual data that is attached the robot at a remote sight is captured by JMF API and then is transmitted to the web browser called client by RTR protocol. JNI is used to connect between JAVA and the lower part application (sensor fusion, motion control.) of the robot programmed by various Native languages. The proposed system is the application that can perform the elements, for instance transmission of visual data, the fusion of various native application modules and the effective network communication, with any platform.

  • PDF

IPv6 망에서 IPv4 서비스를 위한 DSTM Server와 Client 설계 및 구현 (Design of DSTM Server and Client for IPv4 Service int Native IPv6 Networks)

  • 최영지;진재경;민상원;신명기;김형준
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2002년도 가을 학술발표논문집 Vol.29 No.2 (3)
    • /
    • pp.391-393
    • /
    • 2002
  • DSTM 기술은 IPv6 네트워크가 도입되기 시작함에 따라 논의되어야 할 가장 중요한 이슈들 중 하나로서 기존의 IPv4 에서 IPv6 로의 자연스러운 이전을 지원해 주는 IPv6 트랜지션 기술 중 하나이다. 이 기술은 IPv6 망에서 dual stack 을 기본으로 채택하여 해당IPv6 호스트의 IPv4 응용을 수정하지 않고 IPv6 터널링(Tunneling) 기술을 채택하여 목적지 IPv4 응용과의 통신을 제공한다. 본 논문은 이러한 DSTM 요소 기술 중 하나인 IPv6 호스트에 동적으로 IPv4 주소를 할당, 해제 및 IPv6 터널링을 관리 하는 DSTM Server와Client의 설계 및 구현을 기술한다.

  • PDF

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

Cloud Computing to Improve JavaScript Processing Efficiency of Mobile Applications

  • Kim, Daewon
    • Journal of Information Processing Systems
    • /
    • 제13권4호
    • /
    • pp.731-751
    • /
    • 2017
  • The burgeoning distribution of smartphone web applications based on various mobile environments is increasingly focusing on the performance of mobile applications implemented by JavaScript and HTML5 (Hyper Text Markup Language 5). If application software has a simple functional processing structure, then the problem is benign. However, browser loads are becoming more burdensome as the amount of JavaScript processing continues to increase. Processing time and capacity of the JavaScript in current mobile browsers are limited. As a solution, the Web Worker is designed to implement multi-threading. However, it cannot guarantee the computing ability as a native application on mobile devices, and is not sufficient to improve processing speed. The method proposed in this research overcomes the limitation of resources as a mobile client and guarantees performance by native application software by providing high computing service. It shifts the JavaScript process of a mobile device on to a cloud-based computer server. A performance evaluation experiment revealed the proposed algorithm to be up to 6 times faster in computing speed compared to the existing mobile browser's JavaScript process, and 3 to 6 times faster than Web Worker. In addition, memory usage was also less than the existing technology.

An Adaptive Frequency Hopping Method in the Bluetooth Baseband

  • Moon, San-Gook
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 춘계종합학술대회
    • /
    • pp.785-787
    • /
    • 2005
  • In the Bluetooth specification version 1.0, one specific frequency in one piconet was created depending upon the device clock and the Bluetooth native address at one specific time slot in the frequency hopping method. The basic hopping pattern was arranging the 79 ISM frequency band in pseudo-random fashion. Possible problem is the chance of collision of ownership of one specific frequency by more than 2 wireless devices when they are within the communication-active range. In this paper, we propose the adaptive frequency hopping method in order to resolve the possible problem so that more than 2 wireless devices communicates with their own client devices without being interfered. The proposed method was implemented with HDL later to be synthesized with an automatic EDA synthesizer and verified as well. The implemented adaptive frequency hopping circuit operated normally at 24MHz which will be the target clock frequency of the target Bluetooth device.

  • PDF

Cyclostorm : WAC 기반 모바일 앱의 자바스크립트 처리 효율 향상을 위한 클라우드 컴퓨팅 서비스 (Cyclostorm : The Cloud Computing Service for Uplifting Javascript Processing Efficiency of Mobile Applications based on WAC)

  • 방지웅;김대원
    • 전자공학회논문지
    • /
    • 제50권5호
    • /
    • pp.150-164
    • /
    • 2013
  • WAC (Wholesale Application Community) 기반 모바일 웹 애플리케이션의 보급이 널리 확산됨에 따라 자바스크립트와 HTML (Hyper Text Markup Language)로 구현된 애플리케이션의 처리 성능이 점차 이슈화되고 있다. 단순한 처리 기능만을 갖는 구조라면 현재 통용되는 브라우저에서도 문제가 없지만 자바스크립트의 처리량이 점점 증가 할수록 브라우저의 처리 부담 또한 가중된다. 현재 상용화 되어 있는 모바일 브라우저에서는 자바스크립트의 처리에 시간 및 용량의 제한을 두고 있다. 이러한 문제점의 해결을 위한 대안으로서 HTML 5에서는 기존의 자바스크립트에서는 지원하지 않는 멀티 스레드 구현을 위한 Web Worker를 제공하고 있다. Web Worker는 싱글 스레드에서 처리하는 일정 부분을 별도의 스레드를 통해서 처리하는 메커니즘을 제공한다. 하지만 이는 모바일상의 Native 애플리케이션만큼의 처리 능력을 보장하는 것이 아니며 근본적인 처리 속도 개선 방법으로는 미흡하다. Cyclostorm은 이러한 모바일 상에서의 자바스크립트 처리를 클라우드 상의 컴퓨터 서버에 이전함으로써 모바일 클라이언트로서의 자원적 한계를 극복하고 고성능 처리 서비스를 제공하여 Native 애플리케이션 만큼의 성능을 보장한다. 성능 평가 실험에서 Cyclostorm은 기존의 모바일 브라우저에서의 자바스크립트 처리보다 최대 6배 빠른 처리 속도를 보이고 있고 HTML 5의 Web Worker보다는 3~6배정도의 빠른 성능을 보이고 있다. 또한 메모리 부분에서도 서버 측에 존재하는 메모리를 사용하기 때문에 전반적으로 기존의 방법보다는 낮은 사용량이 측정 되었다. 본 논문에서는 현재 모바일 산업에서 화두가 되고 있는 WAC 기반에서 모바일 브라우저가 갖고 있는 한계를 극복하고 기존 웹 애플리케이션의 성능을 획기적으로 개선할 수 있는 클라우드 컴퓨팅 서비스인 Cyclostorm을 소개한다.

SVC-based Adaptive Video Streaming over Content-Centric Networking

  • Lee, Junghwan;Hwang, Jaehyun;Choi, Nakjung;Yoo, Chuck
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권10호
    • /
    • pp.2430-2447
    • /
    • 2013
  • In recent years, HTTP adaptive streaming (HAS) has attracted considerable attention as the state-of-the-art technology for video transport. HAS dynamically adjusts the quality of video streaming according to the network bandwidth and device capability of users. Content-Centric Networking (CCN) has also emerged as a future Internet architecture, which is a novel communication paradigm that integrates content delivery as a native network primitive. These trends have led to the new research issue of harmonizing HAS with the in-network caching provided by CCN routers. Previous research has shown that the performance of HAS can be improved by using the H.264/SVC(scalable video codec) in the in-network caching environments. However, the previous study did not address the misbehavior that causes video freeze when overestimating the available network bandwidth, which is attributable to the high cache hit rate. Thus, we propose a new SVC-based adaptation algorithm that utilizes a drop timer. Our approach aims to stop the downloading of additional enhancement layers that are not cached in the local CCN routers in a timely manner, thereby preventing excessive consumption of the video buffer. We implemented our algorithm in the SVC-HAS client and deployed a testbed that could run Smooth-Streaming, which is one of the most popular HAS solutions, over CCNx, which is the reference implementation of CCN. Our experimental results showed that the proposed scheme (SLA) could avoid video freeze in an effective manner, but without reducing the high hit rate on the CCN routers or affecting the high video quality on the SVC-HAS client.

제주도의 전통적 출산관리에 관한 연구 (A Study of Traditional Childbearing Management in Cheju-Do)

  • 강문정
    • 모자간호학회지
    • /
    • 제3권1호
    • /
    • pp.5-24
    • /
    • 1993
  • Where people within a certain cultural sphere have formed their own peculiar cultural beliefs including health belief, health value and health practice, care-givers have a good understanding of health management as those practices exist in the client's sociocultural background. The purpose of this study was to describe various caring behaviors in traditional childbearing management and ultimately to provide basic data for nursing practice and sustantive maternity nursing theory. To investigated taring behaviors, the ethnographic approaches were used. The fieldwork for this study has been conducted from December, 1991 to September, 1992. The data collection method was used in-depth interview. The key informants were 19 womans aged from 60 to 84, and general Informant was a native aged 50. Results of the study were as follows. The components of caring behavior inculded heeding, preventing from impurities, encouraging the power, praying, warming up one's body, enduring, helping, healing, resting, making preparations, utilizing mugwort, creating good blood circulation, tabooing, This components of taring behavior were 6 categories, making every effort, encouraing, contriving an easy labor, healing, making preparations, enduring, The prominent caring beehavier during childbearing process was making every effort. In conclusion, for more effective childbearing management of care-givers must eliminate from their own minds 'primitive' or 'supertitious' attitudes toward traditional childbearing management. Also it is desirable that they establish Korean style nursing intervention along with modern scientific practices in conjunction with the traditional childbearing management.

  • PDF

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.