• Title/Summary/Keyword: Service Request

Search Result 769, Processing Time 0.026 seconds

Emergency Rescue Request Notification Service Using Bluetooth Low Energy Technology (Bluetooth Low Energy 기술을 이용한 긴급구조요청 알림서비스)

  • Kim, Sung-Jin;Cho, Kyoung-woo;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.529-530
    • /
    • 2016
  • When the mountain accident occurred, the accident victims should inform anyone of information of the location and accident situation rapidly. But if you are in the radio shadow area where you cannot use GPS, 3G/4G, and wireless communication, you can't inform someone your accidents. In this paper, we suggest the emergency rescue request notification service in situation that victims can't report their accidents. This service is to send request message for rescue in radio shadow area, in mountain accident, by BLE(Bluetooth Low Energy).

  • PDF

RAS: Request Assignment Simulator for Cloud-Based Applications

  • Rajan, R. Arokia Paul;Francis, F. Sagayaraj
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2035-2049
    • /
    • 2015
  • Applications deployed in cloud receive a huge volume of requests from geographically distributed users whose satisfaction with the cloud service is directly proportional to the efficiency with which the requests are handled. Assignment of user requests based on appropriate load balancing principles significantly improves the performance of such cloud-based applications. To study the behavior of such systems, there is a need for simulation tools that will help the designer to set a test bed and evaluate the performance of the system by experimenting with different load balancing principles. In this paper, a novel architecture for cloud called Request Assignment Simulator (RAS) is proposed. It is a customizable, visual tool that simulates the request assignment process based on load balancing principles with a set of parameters that impact resource utilization. This simulator will help to ascertain the best possible resource allocation technique by facilitating the designer to apply and test different load balancing principles for a given scenario.

Ultra Low Power Data Aggregation for Request Oriented Sensor Networks

  • Hwang, Kwang-Il;Jang, In
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.412-428
    • /
    • 2014
  • Request oriented sensor networks have stricter requirements than conventional event-driven or periodic report models. Therefore, in this paper we propose a minimum energy data aggregation (MEDA), which meets the requirements for request oriented sensor networks by exploiting a low power real-time scheduler, on-demand time synchronization, variable response frame structure, and adaptive retransmission. In addition we introduce a test bed consisting of a number of MEDA prototypes, which support near real-time bidirectional sensor networks. The experimental results also demonstrate that the MEDA guarantees deterministic aggregation time, enables minimum energy operation, and provides a reliable data aggregation service.

Client-Based Video-On-Demand System Implementation using Multicast (멀티캐스트를 이용한 사용자 기반의 비디오 주문형 시스템 구현)

  • Hwang, Tae-June;Kim, Back-Hyun;Ik, Soo-Kim
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.127-137
    • /
    • 2005
  • This paper presents implementation of client-based VOD service using multicast delivery, Conventional system provide server-based system in multicast delivery but implemented system provides on-demand client-based multicast system. The Multicast Agent Scheduler aggregates clients' request and it generate multicast group addresses and port numbers according to requested video items and service request time. Then it transmits immediately multicast address to VOD server and client who request service. And then VOD server transmits requested streams with a multicast group address and the client joins the group automatically. The Multicast Agent Scheduler assigns the same multicast group address when other clients request an identical video within the same scheduling duration. The proposed system can reduce load of server and support many clients at the same time and applies it to WMT(window media technology) of Microsoft.

  • PDF

Dynamic Handoff Control Methods Considering the Characteristics of Mobile Station (이동국의 특성을 고려한 동적 핸드오프)

  • 김재훈;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.1
    • /
    • pp.104-112
    • /
    • 2002
  • Dynamic Handoff Control Scheme (DHCS), which is propose d in this paper, suggests the method to request handoff at the optimal time. To accomplish this, DHCS measures the speed of the mobile station and sets the pilot strength for handoff request. When the pilot strength of the current base station is bigg or than the pilot strength for handoff request, which means the pilot strength of the current base station is big enough so the possibility of the call to be disconnected is low, DHCS doesn't request for the handoff even though the pilot strength of the adjacent base station is bigger than the pilot strength of the curent base station. DHCS guarantees the QoS (Quality of Service) by processing the handoff calls prior to new calls at the base station and providing continuous service for the mobile station by setting the priorities for the calls according to the queue waiting time transmitted from the mobile stations.

  • PDF

Priority-based Intelligent Uplink Random Access Scheme for Fourth-generation Cellular Systems and Its Standardization (4세대 이동통신시스템을 위한 우선순위 기반 지능적 상향링크 랜덤 접속 방법 및 표준화)

  • Moon, Jung-Min;Lee, Ho-Won;Cho, Dong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1623-1635
    • /
    • 2011
  • Fourth-generation (4G) cellular communication systems must provide different quality-of-service (QoS) to users according to the service type, membership class, and usage case of each user. For the purpose of user's QoS differentiation, we propose an enhanced uplink random access scheme for bandwidth request. More specifically, we divide a bandwidth request channel into two parts: One is a primary region and the other is a secondary region. Then, each region has a unique minimum access class that allows only specific users to perform random access through that region. By doing so, we can reduce collision probability and increase the success probability of bandwidth request. From the perspective of standardization, we presented this scheme in the IEEE 802.16m Session #66 held on March 2010. As a result, the concept of the proposed scheme and required messages were defined in the 802.16m standard.

A Performance Isolation Mechanism Considering SLA in High Available Heterogeneous Cluster Web Systems (SLA를 고려한 클러스터 기반 고가용성 이질 웹 시스템의 성능 분리 기법)

  • Kang, Chang-Hoon;Park, Kie-Jin;Kim, Sung-Soo
    • The KIPS Transactions:PartA
    • /
    • v.12A no.7 s.97
    • /
    • pp.613-620
    • /
    • 2005
  • To provide reliable differentiated service for internet clients, many studies on differentiated service are widely done. According to the types of the request of the clients in cluster-based web systems, SLA (Service Level Agreement) between service provider and the clients is considered. In this Paper, we study primary-backup web switch in the web systems that distribute the request of clients to each of web servers and also study performance isolation and admission control schemes of heterogeneous web systems which distinguish the servers into each different function domains. We analyze the availability, the response time and the performance of admission control through various simulated experiments on the proposed web systems.

A Web Server Load Balancing Mechanism for Supporting Service Level Agreement (SLA를 지원하는 웹 서버 부하 분산 기법)

  • Go Hyeon-Joo;Park Kie-Jin;Park Mi-Sun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.505-513
    • /
    • 2006
  • To satisfy SLA(Service Level Agreement) contract between a client and a service provider, the client requests are classified and processed by priorities. In providing differentiated service, a request from a client who has low priority can be dealt with less important. In this paper, we study static and dynamic partitioning mechanism of web servers and also admission control policy for multiclass request distribution. Through simulation experiments, we analyze web server throughput and response time considering SLA.

TCP-aware Segment Scheduling Method for HTTP Adaptive Streaming (HTTP 적응적 스트리밍을 위한 TCP 인지형 세그먼트 스케줄링 기법)

  • Park, Jiwoo;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.43 no.7
    • /
    • pp.827-833
    • /
    • 2016
  • HTTP Adaptive Streaming (HAS) is a technique that adapts its video quality to network conditions for providing Quality of Experience. In the HAS approach, a video content is encoded at multiple bitrates and the encoded video content is divided into several video segments. A HAS player estimates the network bandwidth and adjusts the video bitrate based on estimated bandwidth. However, the segment scheduler in the conventional HAS player requests video segments periodically without considering TCP. If the waiting duration for the next segment request is quite long, the TCP connection can be initialized and it restarts slow-start. Slow-start causes the reduction in TCP throughput and consequentially leads to low-quality video streaming. In this study, we propose a TCP-aware segment scheduling scheme to improve performance of HAS service. The proposed scheme adjusts request time for the next video request to prevent initialization of TCP connection and also considers the point of scheduling time. The simulation proves that our scheme improves the Quality of Service of the HAS service without buffer underflow issue.

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.