• Title/Summary/Keyword: Proxy Service

Search Result 257, Processing Time 0.027 seconds

Improvement of Wireless Connectivity and Efficiency in E-Healthcare Service System Using a Proxy in Body Area Device

  • Kim, Sang Kon;Kim, Tae Kon;Koh, Jinhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.991-1013
    • /
    • 2020
  • E-health services have provided interoperability between personal health devices in personal area network, based the ISO/IEEE 11073 standard. In the healthcare system, the manager handles most agents concurrently through wireless communication. However, due to the distance limitation and the increased number of agents, it may be difficult to provide continuous connectivity. Recently, body area devices have been equipped with various applicable agents, which can even handle agents on behalf of the manager. A BAD may act as an intermediary device to increase system efficiency and performance. In this study, a device called "proxy", which can be installed as software on BAD devices, is proposed. The data measured by an agent can be sent to the proxy first, and subsequently be sent to the manager again. Agents and the manager are not aware of the proxy existence and work normally without the proxy. Furthermore, a new smart proxy and modified manager are proposed. The smart proxy acts as one agent handling measurement data from several agents, which can transmit a significant amount of data at once. The proxy and smart proxy maintain compatibility with existing devices that conform to the 20601 standard. The proposed schemes are verified and the complexities of devices are analyzed. The analysis shows no significant difference among the proxy, smart proxy, and manager. Simulations exhibit that the proposed schemes can improve the system performance.

Analysis and countermeasure of causes of inducing violence of private security companies on the actual sites of administrative execution by proxy (행정대집행 현장에서 민간경비업체의 폭력 유발 원인 분석과 대책)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.119-141
    • /
    • 2009
  • Administrative execution by proxy is one of forced executions of administration and is also called as "enforced execution by proxy" in which administration institutions or the third party executes by proxy on behalf of parties who did not execute obligations under administration law and files claims to compensate expenses required in the proxy execution. Despite the actual site of administrative execution by law, social problems are generated because various violence and behaviors of infringement of human rights between executer and obligator are rampant and thus causing human damages since forced execution by physical force is carried out and cases of police indictments and petition to human rights committee are gradually increasing. Majority of people mobilized in this actual site of violence are supplied by private security companies which provide service contract and mobilization of people without qualification of guards or security service and irrational execution by proxy and violent actions by so-called service hooligans connected to violence organizations are now becoming social issues. In these actual sites of violence, structurally very complicated problems such as economic rights, right of residence, struggle for living, and intervention by outsiders are contained. This thesis has analyzed causes of outbreaks of violence and discussed about improvement countermeasure by paying attention to mobilization of people by private security companies. As the result, through revision and improvement of laws and systems, execution institution and policemen must be present at actual sites of execution by proxy to control physical execution of private security companies to be carried out legally and when violent collisions are occurring, it shall be stipulated that police should immediately intervene. Practices of execution by proxy of execution administration institutions shall be avoided and causes of occurrences of violence shall be eliminated by discrete decisions of execution by proxy, elimination of service contract conditions focused on accomplishments, and stipulation of responsibility of execution institutions when problems occur. Practices of solving petitions through collective actions of obligators shall be eliminated and strict enforcement of laws such as disturbance of official execution or compensation claims for expenses of execution by proxy must be carried out and intervention by the third parties must be intercepted. Mobilization of manpower by security companies shall be limited to people with prior registration who have acquired and finished qualification and education by security business law and before putting them on actual sites, it shall be obliged that execution plan with clear written records of working location, mission, and work rules must be submitted in advance to police station in charge and also they must be controlled to follow laws and statutes such as uniform and equipments. In addition, personal criminal responsibility for violent actions must be clearly stipulated and advanced securing soundness of security companies such as limits of service contracts with records of accidents is required. Order placement behaviors of special organizations under the pretext of rehabilitation business must be eradicated and companies with capability and strong intention of observation of laws must be able to receive orders by intercepting chains of contracts and sub-contracts. Issues of improvement countermeasure of social problem, living, and compensation including rights of residence and environment are excluded from the discussion.

  • PDF

A study on performance evaluation of K4 Firewall System with multiple CPUs and security rules (K4 방화벽의 CPU 및 보안규칙의 증가에 따르는 성능평가연구)

  • 박대우;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.3
    • /
    • pp.203-218
    • /
    • 2002
  • According as development of networks and increasing on Internet service, For the performance increase of K4 Firewall require that hardware be installed of 2 CPU or 4 CPU instead of 1 CPU. Output of performance test among 1CPU, 2CPU, and 4CPU of K4 Firewall system has not any efficient about increasing multiple CPUs. K4 Firewall put performance on setting on demon of packet filtering rules and Network Address Translate and Authentication and Proxy services. Performance results that setting after security rules are less 2% Packet Filtering, 8%-11% NAT, 18%-20% Proxy and Authentication services than setting before security rules on K4 Firewall System. NAT and Proxy service have decrease of performance. This performance result comes in useful for research and development on K4 Firewall System.

  • PDF

Connection Setup Method for Mobile SCTP to a Mobile Node Using Direct Interoperation with Location Management System (Mobile SCTP에서 위치관리 시스템과 직접 연동을 통한 이동 단말로의 연결 설정 방법)

  • Kim, Kwang-Ryoul;Kim, Seung-Kuck;Min, Sung-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.183-191
    • /
    • 2008
  • In this paper, we propose Stream Control Transmission Protocol(SCTP) proxy which supports making an SCTP connection from a Corresponding Node(CN) to a Mobile Node(MN). Recently, mobility support in transport layer is proposed, which provides mobility in end-to-end way using the extension of SCTP. Mobile SCTP can provide handover to all applications that use SCTP as a transport protocol. However, current SCTP does not include independent location management service and can not make connection from a CN to a MN without assistance of other mobile protocols. To solve this problem, Proposed SCTP proxy interoperates with generic location management service and performs an address transformation to forward connection set up messages to the MN. Using the proposed proxy, SCTP can provide a complete mobility support including a connection setup to the MN and maintaining an existing connection.

Extended Design And Implementation of SIP Proxy Server or Improved Additional Internet Telephony Service (향상된 부가 서비스 지원을 위한 SIP 프락시 서버의 확장 설계 및 구현)

  • 민경주;이종화;강신각;박기식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.875-879
    • /
    • 2002
  • CPL is a technique that serves various additional service in Internet telephony such as call forwarding, call blocking etc. IETF IPTEL working group developed this CPL standard. Users could request various additional services such as call forwarding, call blocking etc. by registering XML scripts to location servers. This paper would describe the design and the implementation skill of SIP proxy server that support these improved functionalities in detail. SIP registrar and SIP proxy server are designed and implemented in Linux platform because this platform serves fast and low cost development environment.

  • PDF

Fuzzy Relevance-based Transcoding for Differentiated Streaming Media Service in the Proxy System (프록시 시스템에서 차별화된 스트리밍 미디어 서비스를 위한 퍼지 적합도 기반 트랜스 코딩)

  • Lee, Chong-Deuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2785-2792
    • /
    • 2011
  • Such problems as delay, congestion, and crosstalk in the proxy system degrade not only QoS (Quality of Service) but responsiveness and reliability of the streaming media service. To solve this problem this paper proposed a FRTP (Fuzzy Relevance-based Transcoding Proxy) mechanism. The proposed FRTP mechanism analyzes fuzzy similarity for partitioned segment versions of media objects to create a FRTG (Fuzzy Relevance-based Transcoding Graph). Created FRTG determines the transcoding for partitioned media object segment versions. Determined transcoding improves DSR (Delay Saving Ratios), CHPR (Cache Hit Precision Ratio), and CHRR (Cache Hit Recall Ratio). The proposed mechanism is simulated to evaluate such performance parameters as DSR, CHPR, and CHRR. Simulation results shows that the proposed mechanism outperforms in DSR, CHPR and CHRR compared with the other existing mechanisms.

Automatic Generation Method of Proxy Client Code to Autonomic Quality Information (자율적인 웹 서비스 품질 정보 수집을 위한 프록시 클라이언트 코드의 자동 생성 방안)

  • Seo, Young-Jun;Han, Jung-Soo;Song, Young-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.228-235
    • /
    • 2008
  • This paper proposes automatic generation method of proxy client code to automation of web service selection process through a monitoring agent. The technique of this paper help service consumer to provide source code of proxy client as it bring an attribute value of specific element of WSDL document using template rule. Namely, a XSLT script file provide code frame of dynamic invocation interface model. The automatic code generation technique need to solving starvation status of selection architecture. It is required to creating request HTTP message for every service on the result of search. The created proxy client program code generate dummy message about services. The proposed client code generation method show us a possibility of application in the automatic generation programming domain.

Performance Analysis of Cost-Effective Location and Service Management Schemes in LTE Networks (LTE 네트워크에서 비용효과적인 위치 및 서비스 관리 기법의 성능분석)

  • Lee, June-Hee;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.1-16
    • /
    • 2012
  • In this paper, we propose a cost-effective location and service management scheme in LTE (Long Term Evolution) networks, which a per-user service proxy is created to serve as a gateway between the mobile user and all client-server applications engaged by the mobile user. The service proxy is always co-located with the mobile user's location database such that whenever the MU's location database moves during a location hand-off, a service hand-off also ensues to co-locate the service proxy with the location database. This allows the proxy to know the location of the mobile user all the time to reduce the network communication cost for service delivery. We analyze four integrated location and service management schemes. Our results show that the centralized scheme performs the best when the mobile user's SMR (service to mobility ratio) is low and ${\upsilon}$(session to mobility ratio) is high, while the fully distributed scheme performs the best when both SMR and ${\upsilon}$ are high. In all other conditions, the dynamic anchor scheme is the best except when the service context transfer cost is high under which the static anchor scheme performs the best. Through analytical results, we demonstrate that different users with vastly different mobility and service patterns should adopt different integrated location and service management methods to optimize system performance.

u-Healthcare Context Information System Using Mobile Proxy Based on Distributed Object Group Framework (DOGF 기반의 모바일 프락시를 이용한 u-헬스케어 상황정보 시스템)

  • Jeong, Chang-Won;Ahn, Dong-In;Kang, Min-Gyu;Joo, Su-Chong
    • The KIPS Transactions:PartD
    • /
    • v.15D no.3
    • /
    • pp.411-420
    • /
    • 2008
  • This paper implemented the u-Healthcare Context Information System (HCIS) supporting ubiquitous healthcare by using location, health and titrating environment information collected from sensors/devices equipped in home for healthcare home service. The HCIS is based on the Distributed Object Group Framework (DOGF), a management model which can customize distributed resources, and manages various context information, applications and devices as a group in healthcare home environment, as one more logical units. Also, this system provides continuous healthcare multimedia service considering a resident's location using Mobile Proxy, and the healthcare context information through Context Provider to a resident in home. For verifying execution of our system, we implemented the seamless multimedia service based on resident's location and the prescription/advice and schedule notification/alarm service as healthcare applications in home. And we showed the executing results of healthcare home service by using service device existed in the residential space on which the resident is located according to the healthcare scenario.

The Design of Proxy for CORBA Traffic Monitoring Using OSI management technology (OSI 관리 기술을 이용한 CORBA 트래픽 모니터링 프록시 설계)

  • 박재성;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.355-362
    • /
    • 1999
  • Traffic monitoring, a part of the system management, is a vital function lot the proper operation of a system in use. Currently OMG has been trying to standardize CORBA system management. Besides, many companies and research laboratories have been developing and studying CORBA system management. In this paper, we have designed the proxy to monitor the CORBA traffic using the OSI management technology. To manage CORBA traffic resources, 6 parameters have been made into managed objects. The monitoring system consists of a CORBA server, a proxy object and an MIB. The CORBA server is made up of a service provider, a proxy server, and a event sewer. The proxy object acts as a process of a CORBA object, and is made up of a proxy client, a event client, and an IPC server.

  • PDF