• Title/Summary/Keyword: Network Server

Search Result 2,382, Processing Time 0.028 seconds

Server Selection Algorithm of Mobile Host for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 이동 호스트의 서버 선택 알고리즘)

  • Kim Seonho;Yoon Miyoun;Shin Yongtae
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.413-418
    • /
    • 2004
  • According as computer hardware became smaller and its performing power became improved due to the developed computer technology, clients demand more powerful accessibility to various information through getting the information at every time and every place. These needs led to the Ubiquitous computing technology which makes it possible to have access to a specific information regardless of clients' physical location. In this paper, we propose an approach that mobile host can get data from proper contents server by applying Contents Distributing Network to wireless network. By simulation, this paper proves that this approach can Improve performance by using contents server selection in wireless network. This research will contribute to realizing the Ubiquitous computing technology.

Proposal and Design of a Novel SNA Protocol for the Power Control System (전력제어 시스템을 위한 SNA 프로토콜 제안 및 설계)

  • Park, Min-Ji;Lee, Dong-Min;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1122-1128
    • /
    • 2010
  • In this paper, we proposed and designed a novel SNA protocol which operates in the way of a server and a client in the power control system. The proposed SNA protocol includes the information about the mode switching, the saving position of context information, the user trigger, and so forth, which are needed in the power management devices. We consider the application of the SNA protocol to the home network, where message flows between the SNA server and the SNA client. To verify the operation of the SNA protocol, the state transition diagrams of the server in the home gateway and the client in the network device are shown. Hence, we can conclude the SNA can operate without malfuction.

Embedded Web Server Implementation for Building Sensor Network Design (빌딩 센서 네트워크 설계를 위한 임베디드 웹서버 구축)

  • Kim, Yong-Ho;Nam, Soung-Youl;Kim, Hyeong-Gyun;Choi, Gwang-Mi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1015-1018
    • /
    • 2005
  • This study intended to demonstrate a general system as an web server implemented by pure software solution and focused on collecting data by remote control through Internet and constructing its' control frame. To achieve these, this study suggested an optimized, low-power, ultra tiny embedded web server. When unpredictable accidents, such as heat sensor or industrial disasters, happen, it will connect sensors collecting building information each other by network and obtain final results via web porting, web hardware control or porting, or hardware test process in a boot loader on the basis of StrongARM SA-1110 processor.

  • PDF

The Implementation of Personal Audio Recorder Service based on Embedded Linux (임베디드 리눅스 기반의 개인 오디오 레코더 서비스 구현)

  • Kim, Do-Hyung;Lee, Kyung-Hee;Lee, Cheol-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.257-262
    • /
    • 2008
  • This paper describes the implementations of the application service based on embedded Linux; Personal Audio Recorder (PAR) which uses WiBro network for data communications and CDMA network for voice communications. At PAR, when PAR client starts voice recording on a dual-mode terminal, the CDMA voice data of caller and callee is transmitted to storage server located in the Internet through WiBro network. Then, PAR server stores voice data on storage server according to the call number and call time. In case of shortage of storage space on terminal, PAR makes user to store voice data. And, PAR can search a catalog of stored data on server and play the specific content.

A Novle Method for Efficient Mobile AR Service in Edge Mesh Network

  • Choi, Seyun;Shim, Woosung;Hong, Sukjun;Kim, Hoijun;Lee, Seunghyun;Kwon, Soonchul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.22-29
    • /
    • 2022
  • Recently, with the development of mobile computing power, mobile-based VR and AR services are being developed. Due to network performance and computing power constraints, VR and AR services using large-capacity 3D content have limitations. A study on an efficient 3D content load method for a mobile device is required. The conventional method downloads all 3D content used for AR services at the same time. In this paper, we propose an active 3D content load according to the user's track. The proposed method is a partitioned 3D object load. Edge servers were installed for each area and connected through the MESH network. Partitioned load the required 3D object in the area referring to the user's location. The location is identified through the edge server information of the connected AP. The performance of the proposed method and the conventional method was compared. As a result of the comparison, the proposed method showed a stable Mobile AR Service. The results of this study, it is expected to contribute to the activation of edge server-based AR mobile services.

A Design of Client BBS System for Secure HVA

  • Park, Jae-Kyung;Kim, Young-Ja
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.73-80
    • /
    • 2018
  • In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.

PDA-based Text Localization System Using Client/Server Architecture (Client/Server 구조를 이용한 PDA기반의 문자 추출 시스템)

  • 박안진;정기철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.751-753
    • /
    • 2004
  • PDA에서 사용하는 대부분의 CPU는 실수 연산 구성요소(float computation component)가 없는 정수(integer) CPU를 사용한다. 인공 신경망(neural network)과 같은 실수 연산이 많은 알고리즘은 PDA에서 많은 수행시간을 가진다. 본 논문에서는 이런 단점을 해결하기 위해 무선 랜(LAN)으로 연결된 Client(PDA)/Server(PC) 구조를 이용한 효과적인 문자 추출 시스템을 제안한다. Client(PDA)는 대략적인 문자 추출 결과를 JPEG으로 압축하여 전송속도를 최소화한다. Server(PC)는 Client(PDA)의 결과를 바탕으로 정밀한 문자 영역 추출을 위해, 텍스춰 분류 방법과 연결 성분 분석 방법을 이용한다. 실험에서 제안한 방법은 속도뿐만 아니라 문자 추출에서도 효과적이었다.

  • PDF

CASMAC(Context Aware Sensor MAC Protocol) : An Energy Efficient MAC Protocol for Ubiquitous Sensor Network Environments (CASMAC(상황인식 센서 매체접근제어 프로토콜) : USN 환경을 위한 에너지 효율적 MAC 프로토콜)

  • Joo, Young-Sun;Jung, Min-A;Lee, Seong-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1200-1206
    • /
    • 2009
  • In this paper, we propose an energy-efficient MAC(Medium Access Control) protocol for processing context information in ubiquitous sensor network environments. CASMAC(Context Aware Sensor MAC) use context information for energy-efficient operation and its operation principle is as follows. First, we make scenarios with possible prediction for CASMAC. And then we save setted context information in server. When event occur at specific sensor node, and then it send three times sample data to server. According to context information, server process sample data. If server process sample data with event, it receive continuous data from event occur node by a transmission request signal. And then server send data transmission stop signal to event occur node when it do not need to data. If server process sample data with no event, it have not reply. Through we make energy consumption tables and an energy consumption model, we simulate analysis of CASMAC performance. In a result, we gains about 5.7 percents energy reduction compared to SMAC.

Vulnerability Analysis on a VPN for a Remote Monitoring System

  • Kim Jung Soo;Kim Jong Soo;Park Il Jin;Min Kyung Sik;Choi Young Myung
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.346-356
    • /
    • 2004
  • 14 Pressurized Water Reactors (PWR) in Korea use a remote monitoring system (RMS), which have been used in Korea since 1998. A Memorandum of Understanding on Remote Monitoring, based on Enhanced Cooperation on PWRs, was signed at the 10th Safeguards Review Meeting in October 2001 between the International Atomic Energy Agency (IAEA) and Ministry Of Science and Technology (MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an Internet system for Remote Monitoring. According to the Internet-based Virtual Private Network (VPN) applied to Remote Monitoring, the Korea Atomic Energy Research Institute (KAERI) came to an agreement with the IAEA, using a Member State Support Program (MSSP). Phase I is a Lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of Phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated System (SDIS) Server, IAEA Server and TCNC (Technology Center for Nuclear Control) Server. In each system, Virtual Private Network (VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS Server and VPN; TCNC Server and VPN; and IAEA Server and VPN) via penetration testing.

Efficient Load Balancing Technique through Server Load Threshold Alert in SDN (SDN 환경에서의 서버 부하 임계치 경고를 통한 효율적인 부하분산 기법)

  • Lee, Jun-Young;Kwon, Tea-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.817-824
    • /
    • 2021
  • The SDN(Software Defined Networking) technology, which appeared to overcome the limitations of the existing network system, resolves the rigidity of the existing system through the separation of HW and SW in network equipment. These characteristics of SDN provide wide scalability beyond hardware-oriented network equipment, and provide flexible load balancing policies in data centers of various sizes. In the meantime, many studies have been conducted to apply the advantages of SDN to data centers and have shown their effectiveness. The method mainly used in previous studies was to periodically check the server load and perform load balancing based on this. In this method, the more the number of servers and the shorter the server load check cycle, the more traffic increases. In this paper, we propose a new load balancing technique that can eliminate unnecessary traffic and manage server resources more efficiently by reporting to the controller when a specific level of load occurs in the server to solve this limitation.