• Title/Summary/Keyword: User Connection

Search Result 578, Processing Time 0.024 seconds

Design and Implementation of a Java-Based WAP Transaction Layer with Priority Policy (자바기반 WAP 상의 우선순위 트랜잭션 계층의 설계 및 구현)

  • 이준규;임경수;안순신
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.244-251
    • /
    • 2003
  • As the Internet and wireless mobile communication is being widespread, the WAP (Wireless Application Protocol) that merges these two technologies has emerged. Also, the research of the WAP gateway that enables efficient processing of multiple user demands concurrently and prompt response to requests from various wireless devices has been performed in many working groups. The WAP stack is the most fundamental technology among these researches. In this paper, we implement the WAP container utilizing the JAVA's multithreading and applying to the connection pooling technique to manage the available resource in the container efficiently. Also, we design and implement the WTP(Wireless Transaction Protocol) layer and the UDP(User Datagram Protocol) layer based on the priority Policy. Our design and implementation showed the shorter waiting time than that of the existing FCFS(First-Come, First-Served) system in the transaction layer and its efficiency was proved through simulation.

A P2P-based Management Method for Dynamic AOI (동적 AOI를 위한 P2P 기반 관리기법)

  • Lim, Chae-Gyun;Rho, Kyung-Taeg
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.211-216
    • /
    • 2011
  • Networked virtual environments (NVEs) are distributed systems where geographically dispersed users interact with each other in virtual worlds by exchanging network messages. Massively Multiplayer Online Game (MMOG) is one of diverse applications where more than hundreds of users enjoy experiencing virtual worlds. A limited area called area of interest (AOI) in MMOG is reduced the load caused by message exchange between users. Voronoi-based Overlay Network (VON) is proposed to reduce the bandwidth consumption in P2P environments and Vorocast also is made using message forwarding in VON. We propose a dynamic AOI management method that solves problems such as a consistency and latency due to forwarding position updates to neighbor nodes from the message originator in forwarding scheme. Our scheme provides the consistency and reduces latency by combining direct connection scheme and Vorocast scheme compared to existing schemes. The communication between a user and users existing in center circle within AOI of the user is directly connected and the communication between the user and users existing outside the center area within AOI is using Vorocast scheme. The proposed model is evaluated through simulations.

A dynamic resource allocation and call admission control considering 'satisfaction degree of quality of service' for the VBR video sources with QoS constraints (QoS 제약 조건을 갖는 VBR 비디오에 대한 서비스 품질 만족도를 고려한 동적 자원 할당 및 호 수락 제어)

  • Yoo, Sang-Jo;Kim, Seong-Dae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.1
    • /
    • pp.1-13
    • /
    • 2001
  • In this paper, we propose a new dynamic bandwidth allocation and call admission control for VBR video sources with QoS constraints to support an efficient resource management and at the same Lime to satisfy the user's quality or service requirements. For the dynamic bandwidth allocation, first the next amount of traffic is predicted using a modified adaptive linear prediction method that considers abrupt scene change effects. And then, we dynamically allocate the necessary bandwidth to each connection based on the currently provided quality degree by the network with respect to the user's QoS requirements in terms of average delay and loss ratio. For the admission control, we determine the acceptance or rejection or a new connection based on the quality satisfaction degrees of the existing connections. Simulation results show that our proposed dynamic schemes are able to provide a stable service, which well meets the user's quality requirements.

  • PDF

A Study on the Value Evaluation of e-Trade Platform Services using IPA(Importance Performance Analysis) (IPA를 활용한 전자무역 시스템의 서비스 가치평가에 관한 연구)

  • Lee, Sang-Jin;Shin, Seung-Man
    • International Commerce and Information Review
    • /
    • v.12 no.2
    • /
    • pp.59-83
    • /
    • 2010
  • The purposes of the study is to evaluate the discrepancy between user's expectation and satisfaction degree in the service of uTradeHub. In this regard, this study infers general solutions in order to induce the intersection area using IPA technique. Then this paper will present directions to improve the service of uTradeHub. In terms of methodology, this article disclosed that IPA model approach is greatly useful to evaluate user's attribute. First, variables like the link of different works(f1), trust of system(f4), information connection(f7) are located on the first quadrant. This means that importance and satisfaction are all high variables for user. So, this is very important variables that need continuous administration in order to maintain present state. Second, variables such as the speed of information acquisition(f2), improvement of use(f3), stability of system(f5) are located on the second quadrant. This means that user's importance is high but user's satisfaction is low. Therefore, this area needs an active improvement strategy and quick maintenance for e-Trade application. Third, variables like the appropriateness of information usage fees(f8), easy subscription(f9), customer support service(f10) are located on the third quadrant. Because these variables are all low for user's importance and satisfaction, we have to arrange strong and radical remedy for e-Trade service. Finally, variables like information offer(f6) are located on the fourth quadrant. This means that user's satisfaction is high but user's importance is low. The research result suggests that e-Trade service development would be re-organised as much as user feels the importance of process innovation.

  • PDF

A Study on Connection Control using GRE Tunneling Technique in High-speed IP Infrastructure (초고속 IP 기반에서 GRE 터널링 기법을 이용한 접속 제어 연구)

  • Lee Jae-Wan;Kim Hyoung-Jin;Ko Nam-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1038-1044
    • /
    • 2006
  • Tunneling technique does a role to network authentication or the preservation support of date at high-speed network In order to this, IPsec, SOCKS V5 or GRE tunneling protocol have been using. This paper embodies the offer base of communication service by changing routing route to special IP band for connection interception of harmful service md according to user's needs, by changing routing route to special service at high-speed network. So we measure and analysis action principle of GRE with GRE protocol, the result apply to a service of connection control and authentication base.

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

Authentication Mechanism Implementation for Information Sharing in Peer-to-Peer Environment (Peer-to-Peer 환경에서의 정보 공유를 위한 인증 메커니즘 구현)

  • Lee, Jeong-Ki;Bae, Il-Ho;Lee, Cheol-Seung;Moon, Jung-Hwan;Park, Chan-Mo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.1120-1125
    • /
    • 2002
  • According as progress by information society, computer network use and enlargement of scale are accelerated more. Also, with good physician increase of information that is exchanged through computer network, security of network is embossed to controversial point that is new. Because P2P as that remove or weakens center server function is open network that can participate between each user, problem about authentication between each users is risen. If certain user in network i3 in open environment, this user must authenticate request about service to user who is admitted between each user to limit connection. This treatise proposed method to keep security in P2P environment to solve this and designed certification mechanism that quote Kerberos certification mechanism to mechanism that can share information safety in P2P environment.

Efficient Fine-grained Log Auditing using Correlation Method based on Secure OS (Secure OS 기반에서 상호연관 기법을 통한 효과적 상세 로그 감사)

  • Koo, Ha-Sung;Park, Tae-Kyou
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2381-2390
    • /
    • 2011
  • This paper presents the effective and detailed secure monitoring method being used based on Secure OS. For this, the detailed secure log of process, object, user's command and database query in task server are collected by 3 kinds of log collecting module. The log collecting modules are developed by ourselves and contained as constituents of security system. Secure OS module collects process and system secure log of objective unit, Backtracker module collects user's command session log, SQLtracker module collects database query in details. When a system auditor monitors and traces the behaviour of specified user or individual user, the mutual connection method between the secure logs can support detailed auditing and monitering effectively.

Design of the Adaptive SIP Application Server System Architecture supporting SIP-based Session Mobility over the Home Network configured with Private IP (사설IP 기반 홈네트워크에서 세션이동성 지원의 적응적인 SIP 응용서버 시스템 구조 설계)

  • Oh, Yeon-Joo;Beom, Min-Jun;Kim, Dong-Hee;Paik, Eui-Hyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.73-81
    • /
    • 2006
  • The home network is generally separated from the Internet, as it is made up of a private network due to security issues and the lack of IPv4 addresses space. Also, a user may want to move from a terminal to another terminal connected in the home network during communicating with people outside the home. In this case, people connected in the Internet, or another home network could not communicate the user at the home. These limitations prevent a SIP-capable device connected in the home network from communicating with another SIP-capable device connected in the Internet or the outside of the home network. To overcome the limitations, This paper proposes the Adaptive SIP Application Server System as a software architecture that a user inside of the home can communicate with people outside of the home when the home is composed of a private IP-based network. Moreover, the proposed architecture provides the session mobility that allows the user to maintain a media session even if changing the terminal inside of the home during the session established. The proposed system was implemented over a home server device which acts functionality as a connection point for transmitting IP packets between a home network and the Internet.

  • PDF

Automation Technique of Testing User Interface of Web Application (웹 어플리케이션의 사용자 인터페이스 테스트 자동화 기법)

  • Kwon, Young-Ho;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.293-300
    • /
    • 2003
  • As Internet has grown rapidly and been more complex by technology in connection with Web and requirement of business, qualify and reliability of Web application are getting important. It is necessary to study about testing method along with design technique specially in Web application. This paper explains automation method of user interface test to make test cases about user input form with HTML pages using by built-in browser objects. Examples shows the possibility of testing automation with Javascript objects get mapped. Overhead of writing Javascript can be reduced by making script generator. Generated test scripts are repeatedly used in regression testing Web-based application.