• Title/Summary/Keyword: Server Structure

Search Result 530, Processing Time 0.268 seconds

The Architecture of Tool server in MPEG-21

  • Kim, Kwang-Yong;Hong, Jin-Woo;Kim, Jin-Woong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.272-275
    • /
    • 2003
  • This paper presents the role and its function of Tool server. MPEG-21 means multimedia framework for delivery and consumption of multimedia which is being discussed in ISO/IEC 21000. A view of MPEC-21 aims to define multimedia framework to enable transparent use of multimedia resource across a wide range of networks and devices used by different communities. MPEG-21 will enable all-electronic creation delivery and trade of digital multimedia content and transparent usage of various content types on network device. Therefore, we can provide access to information and services from almost anywhere at anytime with various terminals and networks. In order to support multimedia delivery chain that contains content creation, production, delivery and consumption, we need many standards(elements) for identify, describe, manage and protect the content. Thus, we define Digital Item Player(DIP), Digital Item Adaptation(DIA) server and Tool server as primary objects of MPEG-21 multimedia framework. DIP provides a function which creates and consumes Digital Item(DI) as a kind of a digital object by user. A DI contains both media resources and metadata including rights information. DIA server deals with the usage environment description schema of the user characteristics, terminal and network characteristics and natural environments. DIA server adapts the original DI to the usage environment description sent from the terminal and transmits the adapted DI to the terminal. Tool server searches for a tool requested from DIP or DIA and downloads the best tool to DIP or DIA server. In this paper, we present how Tool sewer is organized and is used among 2 primary objects. The paper is structured as followings: Section 1 briefly describes why MPEG-21 is needed and what MPEG-21 wants. We see requirement that tool server must equip functionally in section 2. The proposed tool server,its structure and its functionality are presented in section 3. Section 4 explains a scenario that tool server transmits tool to DIP and shows the experimental result. The paper concludes in section 5.

  • PDF

A study on embedded & wireless fault code transmission device development for railroad vehicle (철도차량용 임베디드 무선전송장치의 개발에 관한 연구)

  • Kim, Jong-Keol;Shim, Ja-Hyun;Shon, Kang-Ho
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.1255-1261
    • /
    • 2010
  • An operating information and fault recode of train is very important information for safety driving and maintenance. And these information is increased and need high speed as the number of trains is increased. Wireless LAN or CDMA network is efficient to report more complicated and various information from vehicle to server in control center. Existing wireless transmission system has weakness due to transmission system is separated with TDCS and standalone. At first, standalone system needs space to be installed and cost is increased. And data transmission capacity and speed is limited by complicated structure that transmission system receive data thru serial communication like RS232 and then data transmission system send data to server in control center. This article is study to develop embedded & wireless fault code transmission device to be installed in TDCS to overcome weakness of space and to have more cost effective and simple structure. It is adapted 802.11b/g WiFi for wireless communication and OS is used embedded Linux that can easily implement wireless communication environment and ensure TCP/IP communication’s security. We also implement simple server to test wireless communication between embedded & wireless fault code transmission device and server in control center.

  • PDF

An Effective Push Fault Management Algorithm for Distributed Object Replica based on Standard Middleware (표준 미들웨어 기반 분산 객체 리플리카를 위한 효과적 푸쉬 결함 관리 알고리즘)

  • Kim Boon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.37-46
    • /
    • 2005
  • In Processing many operations based on distributed environment, it is very important to support the reliability of resources. Providers of resources generally adapt the structure of server-replication to support the reliability of services. Tn server side, it maintains replicas. duplicated server objects. In the structure of this replication, service of stable replica is very important. Therefore the structure to diagnosis the fault of such replica is required. In this Paper, we suggested an effective PUSH fault management algorithm based on PUSH monitoring style of CORBAto overcome weak points of the PULL monitoring style of the replication management system in the distributed object system. Outcomes of the suggested PUSH fault monitoring style were better than other system. We confirmed valuable result in the workloads and timeout-rates.

  • PDF

A Structure of Realtime IPTV Service using Peer-to-Peer Technology (P2P 기술 기반 실시간 IPTV 서비스 구현 구조)

  • Kim, Jae-Hyuk;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.517-525
    • /
    • 2010
  • The IPTV Service provides various interactive services beyond the level of being able to substitute cable TV. The IPTV system is to be decentralized gradually in which one server conducts all tasks. Primarily, deliberation of media needs to be changed into a system in which relayer and peer from the central server is utilized. Secondarily, the way of controling IPTV network need to be decentralized. Unlike the current client-server system, P2P(Peer To Peer), the main technology of decentralized IPTV is able to provide a service by cooperation of each node. Dealing with live streaming IPTV system which is based on the P2P protocol, this paper design the pure P2P IPTV structure and does verify the performance of P2P IPTV structure by realizing real system.

A novel risk assessment approach for data center structures

  • Cicek, Kubilay;Sari, Ali
    • Earthquakes and Structures
    • /
    • v.19 no.6
    • /
    • pp.471-484
    • /
    • 2020
  • Previous earthquakes show that, structural safety evaluations should include the evaluation of nonstructural components. Failure of nonstructural components can affect the operational capacity of critical facilities, such as hospitals and fire stations, which can cause an increase in number of deaths. Additionally, failure of nonstructural components may result in economic, architectural, and historical losses of community. Accelerations and random vibrations must be under the predefined limitations in structures with high technological equipment, data centers in this case. Failure of server equipment and anchored server racks are investigated in this study. A probabilistic study is completed for a low-rise rigid sample structure. The structure is investigated in two versions, (i) conventional fixed-based structure and (ii) with a base isolation system. Seismic hazard assessment is completed for the selected site. Monte Carlo simulations are generated with selected parameters. Uncertainties in both structural parameters and mechanical properties of isolation system are included in simulations. Anchorage failure and vibration failures are investigated. Different methods to generate fragility curves are used. The site-specific annual hazard curve is used to generate risk curves for two different structures. A risk matrix is proposed for the design of data centers. Results show that base isolation systems reduce the failure probability significantly in higher floors. It was also understood that, base isolation systems are highly sensitive to earthquake characteristics rather than variability in structural and mechanical properties, in terms of accelerations. Another outcome is that code-provided anchorage failure limitations are more vulnerable than the random vibration failure limitations of server equipment.

Data Resource Management under Distributed Computing Environment (분산 컴퓨팅 환경하에서의 데이타 자원 관리)

  • 조희경;안중호
    • Proceedings of the Korea Database Society Conference
    • /
    • 1994.09a
    • /
    • pp.105-129
    • /
    • 1994
  • The information system of corporations are facing a new environment expressed by miniaturization, decentralization and Open System. It is therefore of utmost importance for corporations to adapt flexibly th such new environment by providing for corresponding changes to their existing information systems. The objectives of this study are to identify this new environment faced by today′s information system and develop effective methods for data resource management under this new environment. In this study, it is assumed that the new environment faced by information systems can be specified as Distributed Computing Environment, and in order to achieve such system, presents Client/server architecture as its representative computing structure, This study defines Client/server architecture as a computing architecture which specialize the fuctionality of the client system and the server system in order to have an application distribute and perform cooperative processing at the best platform. Furthermore, from among the five structures utilized in Client/server architecture for distribution and cooperative processing of application between server and client this study presents two different data management methods under the Client/server environment; one is "Remote Data Management Method" which uses file server or database server and. the other is "Distributed Data Management Method" using distributed database management system. The result of this study leads to the conclusion that in the client/server environment although distributed application is assumed, the data could become centralized (in the case of file server or database server) or decentralized (in the case of distributed database system) and the data management method through a distributed database system where complete responsibility and powers with respect to control of data used by the user are given not only is it more adaptable to modern flexible corporate environment, but in terms of system operation, it presents a more efficient data management alternative compared to existing data management methods in terms of cutting costs.

  • PDF

A Shared Cache Directory based Wireless Internet Proxy Server Cluster (공유 캐시 디렉토리 기반의 무선 인터넷 프록시 서버 클러스터)

  • Kwak Hu-Keun;Chung Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.343-350
    • /
    • 2006
  • In this paper, wireless internet proxy server clusters are used for the wireless internet because their caching, distillation, and clustering functions are helpful to overcome the limitations and needs of the wireless internet. A wireless Internet proxy server cluster needs a systematic scalability, simple communication structure, cooperative caching, and serving Hot Spot requests. In our former research, we proposed the CD-A structure which can be scalable in a systematic way and has a simple communication structure but it has no cooperative caching. A hash based load balancing can be used to solve the problem, but it can not deal with Hot Spot request problem. In this paper, we proposed a shared storage based wireless internet proxy server cluster which has a systematic scalability, simple communication structure, cooperative caching, and serving Hot Spot requests. The proposed method shares one cache directory and it has advantages: advantages of the existing CD-A structure, cooperative caching, and serving Hot Spot requests. We performed experiments using 16 PCs and experimental results show high performance improvement of the proposed system compared to the existing systems in Hot Spot requests.

A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server (델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구)

  • Jung, Myoung-Gyu;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

Study on Query Type and Data Structure for Mobile Meteorological Services

  • Choi, Jin-Oh
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.457-460
    • /
    • 2011
  • For the mobile meteorological services, sensed data should be gathered at a server from various clients like as Ubiquitous Sensor Network, mobile phone or public traffic vehicle by wireless network. The gathered data at server have huge volume and increase continuously. Therefore, a special query method and data structure should be considered. This paper studies on all possible query type on the data and processing steps for the mobile meteorological services. Some query spaces will be discussed. After that, this paper proposes effective data structure for the sensed data to support the query types.

Distributed OCSP Certificate Verification Model for decrease in Response Time (응답시간 감소를 위한 분산 OCSP 인증서 검증 모델)

  • 공문식;조용환
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.497-502
    • /
    • 2004
  • OCSP has specific characters which can suspend, close, and correct in real time. But, as more clients use the OCSP server verification, more updated information is needed, which can lead to jamming in the OCSP server. To apply this technique of Distributed OCSP server so as to reduce the certificate verification OCSP from jamming. Also, the Distributed OCSP server will solve the problems of the intensive central structure.

  • PDF