• Title/Summary/Keyword: Network Architecture

Search Result 3,646, Processing Time 0.026 seconds

A Study on Web-based Collaborative CAD System (웹 기반 협동 CAD시스템에 관한 연구)

  • 윤보열;김응곤
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.4
    • /
    • pp.767-773
    • /
    • 2000
  • As computer systems and communication technologies develop rapidly, CSCW(Computer Supported Collaborative Work) system appears nowadays, through which it is available to work on virtual space without any restriction of time and place. Most of CWCS systems depend on a special network and groupware. The systems of graphics and CAD are not so many because they are specified by hardware and application software. In this paper, we propose a web-based collaborative CAD system, which can be jointly worked on Internet WWW being independent from any platforms. It can create and modify 3D objects easily using VRML and Java 3D API, and it can send, print, and store them. The interactive work for designing objects can be also carried out through chatting with each other. This system is executed in the environment of Client/server architecture. Clients connect to the CAD sewer through Java applet on WWW. The server is implemented by Java application, and it consists of three components : connection manager which controls the contact to users, work manager which keeps viewing in concurrency and provides virtual work space sharing with others, and solid modeler which creates 3D object.

  • PDF

Integrated Management Middleware for the Servers supporting the terminal-independent (단말기 독립형 서버 통합 관리 미들웨어)

  • Kim Jeong-Hee;Kwak Ho-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1106-1118
    • /
    • 2006
  • The Internet has become an important instrument for providing many pieces of information to us. And server systems offer the various services after processing a volume of information, it's network topology also has been complex for providing information. Therefore this expansion means the importance of fast and sustained management of server systems. But most of server systems are located in fire-walls to allow only restricted access. Moreover, due to the difference of management based on the different operating system of each server system, management of server system is not to efficiency. That is, sever administrators have to manage by themselves many kinds of servers by using local-based or socket-based single access applications. Therefore, we design and implement a middleware system which allows to manage many kinds of severs integrally ruling XML-based Web Services which have distributed object technology such as CORBA, Java RMI and DCOM, but are free from platforms or development languages. System also provides location transparency and terminal independence and calls a server system management command to manage systems.

The Study of System Visibility of Universal Middleware Pervasive Memorial Engine (시스템가시성평가를 위한 유니버설미들웨어기반 Pervasive Memorial Engine 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.335-338
    • /
    • 2017
  • Presently, the collaboration hardware system and software technology that promoted commercializing ICBMS for integrated system visibility evaluation. This variation will move on the next pervasive period that mixed with cultural and technology convergence. There is possibility for the period system can invoke unpredictable confusing blank state. The blank state systems have ecosystem characteristics that are supplied, maintained and operated through the complex interactions of technology and culture. Using universal middleware can support the life-cycle model and increase the visibility of complex systems and prepare for confusing situations. In this study, based on universal middleware, data and service dynamic standardized modules were evaluated to support stable system visibility platform. The system visibility module consists of Intelligent Pervasive Cloud module, Memorial Service module and Life Cycler connection module. each module reflects various requirements of system visibility requested by external system. In addition, the analysis results are supported by various network application service standards through platform independent system and architecture.

  • PDF

The Sentence Similarity Measure Using Deep-Learning and Char2Vec (딥러닝과 Char2Vec을 이용한 문장 유사도 판별)

  • Lim, Geun-Young;Cho, Young-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1300-1306
    • /
    • 2018
  • The purpose of this study is to see possibility of Char2Vec as alternative of Word2Vec that most famous word embedding model in Sentence Similarity Measure Problem by Deep-Learning. In experiment, we used the Siamese Ma-LSTM recurrent neural network architecture for measure similarity two random sentences. Siamese Ma-LSTM model was implemented with tensorflow. We train each model with 200 epoch on gpu environment and it took about 20 hours. Then we compared Word2Vec based model training result with Char2Vec based model training result. as a result, model of based with Char2Vec that initialized random weight record 75.1% validation dataset accuracy and model of based with Word2Vec that pretrained with 3 million words and phrase record 71.6% validation dataset accuracy. so Char2Vec is suitable alternate of Word2Vec to optimize high system memory requirements problem.

DRM Enabled P2P Model for Contents Protection (콘텐츠 보호를 위한 DRM이 적용된 P2P 모델)

  • Sung Jae-Youn;Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.389-396
    • /
    • 2006
  • P2P(Peer To Peer) system, a most attractive file sharing system, is the largest channel of contents distribution and it takes 50% of network traffic. But P2P systems are infamous for used to illegal contents distribution channel not only in music industry, but also in movie industry. But, DRM(Digital Right Management) enabled P2P models are not suggested until now that interrupting illegal contents distribution and keeping advantage of P2P. So in this paper, we suggest a DRM enabled P2P model that can support distributed processing ability and high scalability with no modification in exist P2P model or architecture.

Design and Implementaion of IPv4/IPv6 Translation Protocol (IPv4/IPv6 변환 프로토콜의 설계 및 구현)

  • Park, Seok-Cheon;Lee, Gwang-Bae
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.783-792
    • /
    • 2001
  • It is well known that, in the near future, the lifetime of the IPv4 address space will be limited and available 32-bit IP network addresses will not be left any more. In order to solve such IPv4 address space problem in an effective way, the transition to the new version using IPv6 architecture is inevitably required. At present, it is impossible to convert IPv4 into IPv6 at a time, since the coverage and the size of today's Internet is too huge. Therefore, the coexistence of both IPv4 and IPv6 must be arranged in a special and practical fashion for rapid conversion on the whole. IP protocol translation has been proposed to ease the translation of the Internet from IPv4 to IPv6. This paper presents the design and implementation of a transparent transition service that translates packet header as they cross between IPv4 and IPv6 networks. IPv4/IPv6 Translation Protocol is written in c source code and is tested by the local test recommended by ISO, which has the most excellent error detection function. The test was processed with a test scenario and it was found that the results were successful.

  • PDF

Design and Performance Analysis of ISDN Switching Systems for Frame Relay Service (프레임 릴레이 서비스를 위한 ISDN 교환시스템의 설계 및 성능 분석)

  • Jang, Jae-Deuk;Kim, Jin-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.3
    • /
    • pp.501-511
    • /
    • 1996
  • Typical integrated service digital network(ISDN) switching systems have several shortcomings including cumulated long call set-up delay and difficulty in higher speed packet communication. The problems come from the nature of X.25 packet swiching technique used in the systems. In this thesis, to solve the above problems, the use of frame relay service within the TDX-10 ISDN switching system is proposed and a frame handling susbsystem(FHS) is designed in order to support the high speed frame relay service in the TDX-10 switching systems. In the proposed TDX-10 architecture, the 64 Kbps packet communication can be executed more ef- ficiently and high speed packet communication is allowed. To measure theperformance characteristics of the proposed systemand to compare the performance with that of the proposed system is superior to that of the existion system and to compare the performance with that of the proposed system is superior to that of the existing system. The proposed switching system offers a seamless evolutionalry path from Narrowband-ISDNto Broadband-ISDNsince itallows anefficient channelutilization and speed packet communication.

  • PDF

An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices (저전력 모바일 장치에 적합한 효율적인 동적 그룹 키 동의)

  • Cho Seokhyang;Nam Junghyun;Kim Seungjoo;Won Dongho;Lee Hyejoo;Choi Jinsoo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.157-168
    • /
    • 2005
  • Group key agreement protocols are designed to provide a group of parties securely communicating over a public network with a session key. The mobile computing architecture is asymmetric in the sense of computational capabilities of participants. That is, the protocol participants consist of the stationary server(application servers) with sufficient computational Power and a cluster of mobile devices(clients) with limited computational resources. It is desirable to minimize the amount of computation performed by each group member in a group involving low-power mobile devices such as smart cards or personal digital assistants(PDAs). Furthermore we are required to update the group key with low computational costs when the members need to be excluded from the group or multiple new members need to be brought into an existing group. In this paper, we propose a dynamic group key protocol which offers computational efficiency to the clients with low-power mobile devices. We compare the total communicative and computational costs of our protocol with others and prove its suity against a passive adversary in the random oracle model.

Design of A Database Architecture for Hierarchical Security Policy Model (계층적 구조 보안 정책 모델을위한 데이터 베이스 구조 설계)

  • Yun, Yeo-Wung;Hwang, Yoon-Cheol;Um, Nam-Kyeong;Kim, Kwun-Woo;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.711-720
    • /
    • 2001
  • An enlarging a scale of logical domain organizing Internet, security policy association among entities become complicated. Establishment and control of security policies for each system is a hard problem to solve because of the environment and composite factors with variable properties. In this paper, to solve this actual problems, we orgainze a hierarchical structure of network and than we design the structure of database to apply security policies for secure communication. This enables efficient management of security data and association of security policy by using designed data structure between different domain in hierarchical structure with make secure communication possible.

  • PDF

A Study on the Disk Array Parameters for VOD Servers (VOD 서버를 위한 디스크 배열 파라미터에 관한 연구)

  • Park, Jung-Yeon;Ahn, Byoung-Chul;Kim, Jung-Doo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2662-2670
    • /
    • 1997
  • High speed network makes possible to transfer not only the test data but also multimedia data such as audio, image, and moving pictures and etc. In a multimedia applications, as a multimedia storage system, it is necessary to use a disk array to store and retrieve data by real time. It is important feature to various disk array parameters as a storage system on a real VOD system, such as configuration method of each disks and allocation method of multimedia data. In this paper, various parameters for the disk array are decided to be used for the video-on-demand system application by simulations in two ways. The real and simulation measurement are compared and analyzed on the performance. Simulation results shows that RAID level 5 and 256KB as striping unit and 185KB as data requests size per seconds are suitable parameter for the disk array architecture which provides MPEG-1 files with a rate of 1.5Mbps in two measurements of real and simulation.

  • PDF