• Title/Summary/Keyword: a host computer

Search Result 536, Processing Time 0.025 seconds

A Development of Modular Monitoring System for Wind Turbine Test Site (풍력 실증단지를 위한 분산 형 모니터링 시스템 개발)

  • Lee Jeong Wan;Yoo Neung Soo;Nam Yoon Su;Cho Byung Ha
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.9-12
    • /
    • 2005
  • In this paper. we offer a new monitoring system that controls all of the windfar. it can also apply use general wind turbine systems and real meteorological tower. We propose a hierarchical releiable monitoring system connected by wireless communication channels between monitoring host computer and modular slave measuring subsystems. Our system has two hierarchical subsystems: slave measuring systems, and supervisory host computer. We design and implement that the slave measuring subsystems is placed in meteorological tower and wind turbines, and the supervisory host computer in safety zone, The micro-controller in slave measuring system is duplicated using cold-standby method for reliability. The host computer and slave system constructs a feedback system, with wireless communication channel between them. For monitoring and command function, the supervisory computer is implemented with a Personal Computer using graphic user interface. Consequently. we can get a reliable but economic system.

  • PDF

The development of a micro robot system for robot soccer game (로봇 축구 대회를 위한 마이크로 로봇 시스템의 개발)

  • 이수호;김경훈;김주곤;조형석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.507-510
    • /
    • 1996
  • In this paper we present the multi-agent robot system developed for participating in micro robot soccer tournament. The multi-agent robot system consists of micro robot, a vision system, a host computer and a communication module. Mcro robot are equipped with two mini DC motors with encoders and gearboxes, a R/F receiver, a CPU and infrared sensors for obstacle detection. A vision system is used to recognize the position of the ball and opponent robots, position and orientation of our robots. The vision system is composed of a color CCD camera and a vision processing unit. Host computer is a Pentium PC, and it receives information from the vision system, generates commands for each robot using a robot management algorithm and transmits commands to the robots by the R/F communication module. And in order to achieve a given mission in micro robot soccer game, cooperative behaviors by robots are essential. Cooperative work between individual agents is achieved by the command of host computer.

  • PDF

The improvement of Tree-First algorithm on End Host Multicast (End Host Multicast : Tree-First 방식의 트리구성 알고리즘 개선 제안)

  • Pom, Choung-Ung;Kang, Mi-Young;Nam, Ji-Seung
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.751-752
    • /
    • 2006
  • In this paper, we propose a improved tree construction algorithm on End Host Multicast. By using concurrent connection information of nodes at RP, we could diminish the RDP and the amount of control messages used for tree construction at the same time.

  • PDF

An Implementation of the Host-based DBMS Simulator for Developing Switching System Software (교환기 소프트웨어 개발을 위한 호스트 기반 데이터베이스 시뮬레이터의 구현)

  • Park, Young-Ho;Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.231-239
    • /
    • 2006
  • For such large-scale software as for operating a switching system, the use of real-time databases is essential for data exchanges among various functions and their data processing. Under the environment of developing the DBMS software for a switching system, the application program including database manipulations is first developed on a host computer and then the developed program is loaded into a switching system for its tests. To make it possible for DBMS manipulation software to be developed on a host computer rather than a switching system itself, we developed a host-based DBMS simulation system(HDBMS). In this paper we presented the roles and functions of HDBMS, its system structure, and the technical details for implementing HDBMS.

  • PDF

Implementation of RS232C Serial Communication by CSMA protocol (충돌검지 다중접속(CSMA) 프로토콜에 의한 RS232C 직렬통신의 구현)

  • Kwak, Hee-Soo;Han, Kyong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2473-2475
    • /
    • 1998
  • In this paper, we implemented RS232C serial communication by the 2 wires(Data,GND), and multiple access, by the applying Collision Sensing Multiple Access(CSMA) Protocol. Multiple access is implemented by assigning a unique ID to each controller. The multiple access control operation starts by sending a command packet from a host to another host and the command packet is composed of ID bytes of source and target host computer, data bytes and the check sum, byte. In host computer, after sending command packet, the collision from loop back data. If collision is detected, it means a command packet was collided with another command packet for another host. The packet communication of the controller enables the multiple acces of the controller through the common serial data link. The application of this serial communication through CSMA protocol and the usage of two wires, have an effect on saving the wires and convenient of layout work.

  • PDF

OTP: An Overlay Transport Protocol for End-to-end Congestion and Flow Control in Overlay Networks

  • Kim, Kyung-Hoe;Kim, Pyoung-Yun;Youm, Sung-Kwan;Seok, Seung-Joon;Kang, Chul-Hee
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.331-339
    • /
    • 2007
  • The problem of architecting a reliable transport system across an overlay network using split TCP connections as the transport primitive is mainly considered. The considered overlay network uses the application-level switch in each intermediate host. We first argue that natural designs based on store-and-forward principles that are maintained by split TCP connections of hop-by-hop approaches. These approaches in overlay networks do not concern end-to-end TCP semantics. Then, a new transport protocol-Overlay Transport Protocol (OTP)-that manages the end-to-end connection and is responsible for the congestion/flow control between source host and destination host is proposed. The proposed network model for the congestion and flow control mechanisms uses a new window size-Ownd-and a new timer in the source host and destination host. We validate our analytical findings and evaluate the performance of our OTP using a prototype implementation via simulation.

  • PDF

Security Gateway Extension Mechanism for Session Recovery in Virtual Private Network (가상 사설망에서의 세션 복구 서비스를 위한 Security Gateway 확장 메커니즘)

  • Kim, Jeong-Beom;Lee, Yun-Jung;Park, Nam-Sub;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.77-85
    • /
    • 2002
  • The surge in use of networks has recently increased demands for cryptography. Cryptography, however, can cause various problems because of difficulty of key management. A lot of researchers have been concentrating on the key recovery technique to eliminate the reverse effect of using these kinds of security and to promote positive aspects of using it. They have suggested many key recovery techniques up to the present. we propose a mechanism as a solution, which are employed to reduce the time needed to reconnect SG and the host in Host-to-Gateway in VPNs supporting IPsec, in case they are disconnected. This new mechanism using KRFSH stores information at each session in advance so that users can recall the session information when needed to rebuild the tunnel between SG and the host in a VPN. As a result, the mechanism built into SG will solve the problems above in host-to-gateway VPNs using IPsec.

Optimizing Garbage Collection Overhead of Host-level Flash Translation Layer for Journaling Filesystems

  • Son, Sehee;Ahn, Sungyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.27-35
    • /
    • 2021
  • NAND flash memory-based SSD needs an internal software, Flash Translation Layer(FTL) to provide traditional block device interface to the host because of its physical constraints, such as erase-before-write and large erase block. However, because useful host-side information cannot be delivered to FTL through the narrow block device interface, SSDs suffer from a variety of problems such as increasing garbage collection overhead, large tail-latency, and unpredictable I/O latency. Otherwise, the new type of SSD, open-channel SSD exposes the internal structure of SSD to the host so that underlying NAND flash memory can be managed directly by the host-level FTL. Especially, I/O data classification by using host-side information can achieve the reduction of garbage collection overhead. In this paper, we propose a new scheme to reduce garbage collection overhead of open-channel SSD by separating the journal from other file data for the journaling filesystem. Because journal has different lifespan with other file data, the Write Amplification Factor (WAF) caused by garbage collection can be reduced. The proposed scheme is implemented by modifying the host-level FTL of Linux and evaluated with both Fio and Filebench. According to the experiment results, the proposed scheme improves I/O performance by 46%~50% while reducing the WAF of open-channel SSDs by more than 33% compared to the previous one.

Host-Based Malware Variants Detection Method Using Logs

  • Joe, Woo-Jin;Kim, Hyong-Shik
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.851-865
    • /
    • 2021
  • Enterprise networks in the PyeongChang Winter Olympics were hacked in February 2018. According to a domestic security company's analysis report, attackers destroyed approximately 300 hosts with the aim of interfering with the Olympics. Enterprise have no choice but to rely on digital vaccines since it is overwhelming to analyze all programs executed in the host used by ordinary users. However, traditional vaccines cannot protect the host against variant or new malware because they cannot detect intrusions without signatures for malwares. To overcome this limitation of signature-based detection, there has been much research conducted on the behavior analysis of malwares. However, since most of them rely on a sandbox where only analysis target program is running, we cannot detect malwares intruding the host where many normal programs are running. Therefore, this study proposes a method to detect malware variants in the host through logs rather than the sandbox. The proposed method extracts common behaviors from variants group and finds characteristic behaviors optimized for querying. Through experimentation on 1,584,363 logs, generated by executing 6,430 malware samples, we prove that there exist the common behaviors that variants share and we demonstrate that these behaviors can be used to detect variants.

Implementation of Memory Efficient Flash Translation Layer for Open-channel SSDs

  • Oh, Gijun;Ahn, Sungyong
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.142-150
    • /
    • 2021
  • Open-channel SSD is a new type of Solid-State Disk (SSD) that improves the garbage collection overhead and write amplification due to physical constraints of NAND flash memory by exposing the internal structure of the SSD to the host. However, the host-level Flash Translation Layer (FTL) provided for open-channel SSDs in the current Linux kernel consumes host memory excessively because it use page-level mapping table to translate logical address to physical address. Therefore, in this paper, we implemente a selective mapping table loading scheme that loads only a currently required part of the mapping table to the mapping table cache from SSD instead of entire mapping table. In addition, to increase the hit ratio of the mapping table cache, filesystem information and mapping table access history are utilized for cache replacement policy. The proposed scheme is implemented in the host-level FTL of the Linux kernel and evaluated using open-channel SSD emulator. According to the evaluation results, we can achieve 80% of I/O performance using the only 32% of memory usage compared to the previous host-level FTL.