• Title/Summary/Keyword: Network Server

Search Result 2,382, Processing Time 0.035 seconds

A Study on Design of a Distributed Game Server System (분산 게임 서버 시스템 설계에 관한 연구)

  • 배재환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12B
    • /
    • pp.1060-1065
    • /
    • 2003
  • As the Internet continues to grow, network games are widely spreaded. For most network games, many users' meet on a server causes a heavy load to the sewer, which in turn brings inconvenience to the user. Moreover, it demands increased expense to the service provider for deploying additional servers. In this paper, we propose a hybrid distributed system for network games. In our proposed system, a client is independents of the server and exchanges information directly with other clients. The client depends on servers only for the update information. The proposed methodology classifies messages according to the characteristics of information that the message handles and applies either client-to-server and pear-to-pear communication for processing messages which increases the efficiency of systems.

Implementation of Shadow Server for Fault-tolerance in SAN-based Shared File System (SAN 기반 공유 파일 시스템에서 Fault-tolerance를 위한 Shadow Server 구현)

  • 최영한;김형천;홍순좌
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.661-663
    • /
    • 2004
  • 본 논문에서는 SAN 기반 공유 파일 시스템인 SANfs의 fault-tolerance를 보장받기 위해 fault-tolerant server인 shadow server를 구현하였다 SANfs(1)는 SAN에서 Network-attached storage에 접근하는 여러 클라이언트가 서로의 데이터를 공유할 수 있도록 도와주는 파일시스템이다. SANfs에서 파일 관리를 위해 meta server를 두고 있으며, 이 서버에서 네트워크를 통해 접근하는 털러 클라이언트의 request를 관리한다. SAMfs에서는 meta server를 통해 중앙 집중식으로 파일시스템을 관리하고 있기에 meta server가 fault가 나게 되면 전체 시스템의 동작이 멈추게 되는 single point-of-failure의 문제가 생기게 된다. 본 논문에서는 meta server가 fault가 났을 경우에도 지속적으로 서비스를 할 수 있도록 shadow server를 두었으며. 이 서버가 meta server의 이상 시 그 기능을 대행하도록 하였다. 본 논문의 shadow server는 평상시에 meta server와 파일시스템의 metadata의 동기를 맞추고 있으며, 이 정보를 가지고 meta server로 그 기능을 전환하였을 때 서비스를 해 주도록 하고 있다. 상대 서버의 이상 유무의 판단은 heartbeat를 통해 이루어지고 있으며, meta server로의 failover는 heartbeat의 주기에 영향을 받음을 실험을 통해 알게 되었다.

  • PDF

The Architecture of Tool server in MPEG-21

  • Kim, Kwang-Yong;Hong, Jin-Woo;Kim, Jin-Woong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.272-275
    • /
    • 2003
  • This paper presents the role and its function of Tool server. MPEG-21 means multimedia framework for delivery and consumption of multimedia which is being discussed in ISO/IEC 21000. A view of MPEC-21 aims to define multimedia framework to enable transparent use of multimedia resource across a wide range of networks and devices used by different communities. MPEG-21 will enable all-electronic creation delivery and trade of digital multimedia content and transparent usage of various content types on network device. Therefore, we can provide access to information and services from almost anywhere at anytime with various terminals and networks. In order to support multimedia delivery chain that contains content creation, production, delivery and consumption, we need many standards(elements) for identify, describe, manage and protect the content. Thus, we define Digital Item Player(DIP), Digital Item Adaptation(DIA) server and Tool server as primary objects of MPEG-21 multimedia framework. DIP provides a function which creates and consumes Digital Item(DI) as a kind of a digital object by user. A DI contains both media resources and metadata including rights information. DIA server deals with the usage environment description schema of the user characteristics, terminal and network characteristics and natural environments. DIA server adapts the original DI to the usage environment description sent from the terminal and transmits the adapted DI to the terminal. Tool server searches for a tool requested from DIP or DIA and downloads the best tool to DIP or DIA server. In this paper, we present how Tool sewer is organized and is used among 2 primary objects. The paper is structured as followings: Section 1 briefly describes why MPEG-21 is needed and what MPEG-21 wants. We see requirement that tool server must equip functionally in section 2. The proposed tool server,its structure and its functionality are presented in section 3. Section 4 explains a scenario that tool server transmits tool to DIP and shows the experimental result. The paper concludes in section 5.

  • PDF

Peer-to-Peer Transfer Scheme for Multimedia Partial Stream using Client Initiated with Prefetching (멀티미디어 데이터를 위한 피어-투-피어 전송모델)

  • 신광식;윤완오;정진하;최상방
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7B
    • /
    • pp.598-612
    • /
    • 2004
  • Client requests have increased with the improvement of network resources at client side, whereas network resources at server side could not keep pace with the increased client request. Therefore, it is primary factor of the Qos that efficiently utilize network resources at server side. In this paper, we proposed a new model that peer-to-peer transfer scheme for partial multimedia stream based on CIWP which it decrease server network bandwidth by utilizing client disk resources saves additional server network resources. Especially, adapting Threshold_Based Multicast scheme guarantees to do that data transfer within clients never exceed service time of previous peer by restriction of which data size transferring from previous peer less than data size transferring from server. Peer-to-peer transfer within clients is limited in same group classified as ISPs. Our analytical result shows that proposed scheme reduces appling network resources at server side as utilizing additional client disk resource. furthermore, we perform various simulation study demonstrating the performance gain through comparing delay time and proportion of waiting requesters. As a result, when we compared to Threshold_Based Multicast scheme, the proposed scheme reduces server network bandwidth by 35%.

Moving Object Tracing System using Network-connected CCTV and Smartphone (네트워크 CCTV와 스마트 단말기를 연동한 이동체 추적 시스템)

  • Lim, Seungkyun;Lee, Sangwook
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.519-529
    • /
    • 2013
  • This paper introduces a moving object tracing system using network-connected CCTV and smartphone. In an emergency situation, a smartphone of the reporter gains its GPS information and sends that to the central server. The central server stores received GPS information as a dangerous area in the database and keeps sending the order of tracing the reporter to a network-connected CCTV which can film the reporter. At the same time, the central server sends pictures of the reporter to his or her family and related organization in order to handle the emergency situation as soon as possible. In addition, when a reporter want to know the risk around destination, the central server informs dangerous areas to the reporter by using smart phone application and database of a danger spot.

A Low Power Asynchronous MSP430 Processor for Ubiquitous Sensor Network (편재형 센서네트워크 노드를 위한 저전력 비동기 MSP430 프로세서)

  • Shin, Chi-Hoon;Shang, Belong;Oh, Myeong-Hoon;Kim, Young-Woo;Kim, Sung-Nam;Yakovlev, Alex;Kim, Sung-Woon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.451-453
    • /
    • 2007
  • This paper describes the design of an asynchronous implementation of a sensor network processor. The main purpose of this work is the reduction of power consumption in sensor network node processors and the research presented here tries to explore the suitability of asynchronous circuits for this purpose. The Handshake Solutions toolkit is used to implement an asynchronous version of a sensor processor. The design is made compact, trading area and leakage power savings with dynamic power costs, targeting the typical sparse operating characteristics of sensor node processors. It is then compared with a synchronous version of the same processor. Both versions are then compared with existing commercial processors in terms of power consumption.

  • PDF

A Method for Video Placement on a Cluster of Video Servers Using Server and Network Loads (비디오 서버 클러스터 상에서의 서버 및 네트워크 부하를 고려한 비디오 배치 방법)

  • Kim, SangChul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.43-52
    • /
    • 2008
  • The paper presents the problem definition of video placement and efficient methods for placing video data on a cluster of video servers. The video placement is to place each of video replicas on one of the servers where the number and location of the servers are already determined. The rejection ratio of user requests is one of most important user-perceive performance measures, so it has been used as a performance criteria in many researches on the VOD system. The objective of our video placement is to achieve the load balancing among servers and the minimization of total network loads. To our experiment, the presented methods show better performance in terms of the rejection ratio of user requests than the methods for video placements in which only either server load balancing or network load minimization is considered. Also, it is observed that considerations on server load balancing is especially important in video placement. To our survey, little research has been published on video placement in which server and network load are considered together in a video server cluster environment.

  • PDF

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.

A Study on PIN-based Authentication and ID Registration by Transfer in AAA System (AAA시스템에서의 이동에 따른 PIN 기반의 인증 및 ID 등록에 관한 연구)

  • Kang Seo-Il;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.359-368
    • /
    • 2006
  • AAA(Authentication, Authorization, Accounting) is the service that offers authentication, authorization, and accounting method, and every terminal that accesses the network requires this AAA service. The authentication process of a mobile terminal is as follows: a mobile phone accesses an authentication server in a home network via the authentication service in an external network, which receives the authentication result. And, for the home authentication server to offer secure service, a unique key is distributed for the secure communication between the external agent and the user, the external agent and the home authentication server, and the user and the home authentication server. This paper discusses and proposes the key distribution for secure communication among external authentication servers when a mobile terminal travels to an external network. As the proposed method does not require the home authentication server to reissue another authentication when a user travels to other external networks, it reduces the overload in the home authentication server. It can also distribute a PIN-driven key.

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity

  • Li, Chun-Ta;Lee, Cheng-Chi;Weng, Chi-Yao;Fan, Chun-I
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.119-131
    • /
    • 2013
  • With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access multi-server network architecture without repetitive registration and various multi-server authentication schemes have been proposed in recent years. Recently, Tsaur et al. proposed an efficient and secure smart card based user authentication and key agreement scheme for multi-server environments. They claimed that their scheme satisfies all of the requirements needed for achieving secure password authentication in multi-server environments and gives the formal proof on the execution of the proposed authenticated key agreement scheme. However, we find that Tsaur et al.'s scheme is still vulnerable to impersonation attack and many logged-in users' attack. We propose an extended scheme that not only removes the aforementioned weaknesses on their scheme but also achieves user anonymity for hiding login user's real identity. Compared with other previous related schemes, our proposed scheme keeps the efficiency and security and is more suitable for the practical applications.