• Title/Summary/Keyword: access server

Search Result 963, Processing Time 0.027 seconds

AS B-tree: A study on the enhancement of the insertion performance of B-tree on SSD (AS B-트리: SSD를 사용한 B-트리에서 삽입 성능 향상에 관한 연구)

  • Kim, Sung-Ho;Roh, Hong-Chan;Lee, Dae-Wook;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.157-168
    • /
    • 2011
  • Recently flash memory has been being utilized as a main storage device in mobile devices, and flashSSDs are getting popularity as a major storage device in laptop and desktop computers, and even in enterprise-level server machines. Unlike HDDs, on flash memory, the overwrite operation is not able to be performed unless it is preceded by the erase operation to the same block. To address this, FTL(Flash memory Translation Layer) is employed on flash memory. Even though the modified data block is overwritten to the same logical address, FTL writes the updated data block to the different physical address from the previous one, mapping the logical address to the new physical address. This enables flash memory to avoid the high block-erase cost. A flashSSD has an array of NAND flash memory packages so it can access one or more flash memory packages in parallel at once. To take advantage of the internal parallelism of flashSSDs, it is beneficial for DBMSs to request I/O operations on sequential logical addresses. However, the B-tree structure, which is a representative index scheme of current relational DBMSs, produces excessive I/O operations in random order when its node structures are updated. Therefore, the original b-tree is not favorable to SSD. In this paper, we propose AS(Always Sequential) B-tree that writes the updated node contiguously to the previously written node in the logical address for every update operation. In the experiments, AS B-tree enhanced 21% of B-tree's insertion performance.

Study on Context-Aware SOA based on Open Service Gateway initiative platform (OSGi플렛폼 기반의 상황인식 서비스지향아키텍쳐에 관한 연구)

  • Choi, Sung-Wook;Oh, Am-Suk;Kwon, Oh-Hyun;Kang, Si-Hyeob;Hong, Soon-Goo;Choi, Hyun-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2083-2090
    • /
    • 2006
  • In an proposed Context-Aware SOA(Service Oriented Architecture) based OSGi(Open Service Gateway initiative) platform, Service provider manages relative kinds of services in an integrative basis from various sensors, puts each service in a SOAP (Simple Object access Protocol) message, and register thorn to the UDDI(Universal Description Discovery and Integration) server of service registry, service requester retrivel the specified kinds of services and call them to service provider. Recently most context-aware technologies for ubiquitous home network are mainly putting emphasis on RFID/USN and location-based technology. Because of this, service-oriented architecture researches have not been made enough. Under the environment of an OSGi service platform, various context-aware services are dynamically mapping from various sensors, new services are being offered for the asking of users, and existing services are changing. Accordingly, the data sharing between services provided, management of service life cycle, and the facilitation of service distribution are needed. Taking into considering all these factors, this study has suggested an Context-Aware SOA based eclipse SOA Tools Platform using OSGi platform that can transaction throughtput of more than 546 TPS of distributional Little's Law from ATAM(Architecture Tradeoff Analysis Method) while remaining stable other condition.

Page Logging System for Web Mining Systems (웹마이닝 시스템을 위한 페이지 로깅 시스템)

  • Yun, Seon-Hui;O, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.847-854
    • /
    • 2001
  • The Web continues to grow fast rate in both a large aclae volume of traffic and the size and complexity of Web sites. Along with growth, the complexity of tasks such as Web site design Web server design and of navigating simply through a Web site have increased. An important input to these design tasks is the analysis of how a web site is being used. The is paper proposes a Page logging System(PLS) identifying reliably user sessions required in Web mining system PLS consists of Page Logger acquiring all the page accesses of the user Log processor producing user session from these data, and statements to incorporate a call to page logger applet. Proposed PLS abbreviates several preprocessing tasks which spends a log of time and efforts that must be performed in Web mining systems. In particular, it simplifies the complexity of transaction identification phase through acquiring directly the amount of time a user stays on a page. Also PLS solves local cache hits and proxy IPs that create problems with identifying user sessions from Web sever log.

  • PDF

Implementation of User-friendly Intelligent Space for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 사용자 친화적 지능형 공간 구현)

  • Choi, Jong-Moo;Baek, Chang-Woo;Koo, Ja-Kyoung;Choi, Yong-Suk;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.443-452
    • /
    • 2004
  • The paper presents an intelligent space management system for ubiquitous computing. The system is basically a home/office automation system that could control light, electronic key, and home appliances such as TV and audio. On top of these basic capabilities, there are four elegant features in the system. First, we can access the system using either a cellular Phone or using a browser on the PC connected to the Internet, so that we control the system at any time and any place. Second, to provide more human-oriented interface, we integrate voice recognition functionalities into the system. Third, the system supports not only reactive services but also proactive services, based on the regularities of user behavior. Finally, by exploiting embedded technologies, the system could be run on the hardware that has less-processing power and storage. We have implemented the system on the embedded board consisting of StrongARM CPU with 205MHz, 32MB SDRAM, 16MB NOR-type flash memory, and Relay box. Under these hardware platforms, software components such as embedded Linux, HTK voice recognition tools, GoAhead Web Server, and GPIO driver are cooperated to support user-friendly intelligent space.

End-to-end Packet Statistics Analysis using OPNET Modeler Wireless Suite (OPNET Modeler Wireless Suite를 이용한 종단간 패킷 통계 분석)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.265-278
    • /
    • 2011
  • The objective of this paper is to analyze and characterize end-to-end packet statistics after modeling and simulation of WiFi (IEEE 802.11g) and WiMAX (IEEE 802.16e) of a virtual wireless network using OPNET Modeler Wireless Suite. Wireless internal and external network simulators such as Remcom's Wireless InSite Real Time (RT) module, WinProp: W-LAN/Fixed WiMAX/Mobile WiMAX, and SMI system, are designed to consider data transfer rate based on wireless propagation signal strength. However, we approached our research in a different perspective without support for characteristic of these wireless network simulators. That is, we will discuss the purpose of a visual analysis for these packets, how to receive each point packets (e.g., wireless user, base station or access point, and http server) through end-to-end virtual network modeling based on integrated wired and wireless network without wireless propagation signal strength. Measuring packet statistics is important in QoS metric analysis among wireless network performance metrics. Clear packet statistics is an especially essential metric in guaranteeing QoS for WiMAX users. We have found some interesting results through modeling and simulation for virtual wireless network using OPNET Modeler Wireless Suite. We are also able to analyze multi-view efficiency through experiment/observation result.

Study of Local Area Weather Condition Monitoring System in WSN (WSN기반의 국지적 기상모니터링 시스템 고찰)

  • Chung, Wan-Young;Jung, Sang-Joong;Kim, Jong-Jin;Kwon, Tae-Ha
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.271-276
    • /
    • 2009
  • An local area weather condition monitoring system to minimize many disasters from the sudden change of weather condition in local and mountain area is proposed. Firstly, the comparison of present state of the related monitoring systems and the possibility of realization with some merits are investigated. Moreover, this paper present direction of local area weather condition monitoring system based on integration of wireless sensor network and CDMA network following some case study. Through the efficient integration of both networks, the measured weather condition data from sensors can be transmitted to the server or mobile to monitor with high reliability. The proposed monitoring system will guide new type of project in wireless sensor network and support alarm service of the sudden change of weather condition to mobile user from central official regulations.

  • PDF

Conceptual Design of Networking Node with Real-time Monitoring for QoS Coordination of Tactical-Mesh Traffic (전술메쉬 트래픽 QoS 조율을 위한 네트워킹 노드의 개념 설계 및 실시간 모니터링)

  • Shin, Jun-Sik;Kang, Moonjoong;Park, Juman;Kwon, Daehoon;Kim, JongWon
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • With the advancement of information and communication technology, tactical networks are continuously being converted to All-IP future tactical networks that integrate all application services based on Internet protocol. Futuristic tactical mesh network is built with tactical WAN (wide area network) nodes that are inter-connected by a mesh structure. In order to guarantee QoS (quality of service) of application services, tactical service mesh (TSM) is suggested as an intermediate layer between infrastructure and application layers for futuristic tactical mesh network. The tactical service mesh requires dynamic QoS monitoring and control for intelligent QoS coordination. However, legacy networking nodes used for existing tactical networks are difficult to support these functionality due to inflexible monitoring support. In order to resolve such matter, we propose a tactical mesh WAN node as a hardware/software co-designed networking node in this paper. The tactical mesh WAN node is conceptually designed to have multi-access networking interfaces and virtualized networking switches by leveraging the DANOS whitebox server/switch. In addition, we explain how to apply eBPF-based traffic monitoring to the tactical mesh WAN node and verify the traffic monitoring feasibility for supporting QoS coordination of tactical-mesh traffic.

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

APPLICATION OF WIFI-BASED INDOOR LOCATION MONITORING SYSTEM FOR LABOR TRACKING IN CONSTRUCTION SITE - A CASE STUDY in Guangzhou MTR

  • Sunkyu Woo;Seongsu Jeong;Esmond Mok;Linyuan Xia;Muwook Pyeon;Joon Heo
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.869-875
    • /
    • 2009
  • Safety is a big issue in the construction sites. For safe and secure management, tracking locations of construction resources such as labors, materials, machineries, vehicles and so on is important. The materials, machineries and vehicles could be controlled by computer, whereas the movement of labors does not have fixed pattern. So, the location and movement of labors need to be monitored continuously for safety. In general, Global Positioning System(GPS) is an opt solution to obtain the location information in outside environments. But it cannot be used for indoor locations as it requires a clear Line-Of-Sight(LOS) to satellites Therefore, indoor location monitoring system could be a convenient alternative for environments such as tunnel and indoor building construction sites. This paper presents a case study to investigate feasibility of Wi-Fi based indoor location monitoring system in construction site. The system is developed by using fingerprint map of gathering Received Signal Strength Indication(RSSI) from each Access Point(AP). The signal information is gathered by Radio Frequency Identification (RFID) tags, which are attached on a helmet of labors to track their locations, and is sent to server computer. Experiments were conducted in a shield tunnel construction site at Guangzhou, China. This study consists of three phases as follows: First, we have a tracking test in entrance area of tunnel construction site. This experiment was performed to find the effective geometry of APs installation. The geometry of APs installation was changed for finding effective locations, and the experiment was performed using one and more tags. Second, APs were separated into two groups, and they were connected with LAN cable in tunnel construction site. The purpose of this experiment was to check the validity of group separating strategy. One group was installed around the entrance and the other one was installed inside the tunnel. Finally, we installed the system inner area of tunnel, boring machine area, and checked the performance with varying conditions (the presence of obstacles such as train, worker, and so on). Accuracy of this study was calculated from the data, which was collected at some known points. Experimental results showed that WiFi-based indoor location system has a level of accuracy of a few meters in tunnel construction site. From the results, it is inferred that the location tracking system can track the approximate location of labors in the construction site. It is able to alert the labors when they are closer to dangerous zones like poisonous region or cave-in..

  • PDF

Development of a low-power remote monitoring module for set-net fish school based on WCDMA (WCDMA 기반의 저전력 정치망 어군 정보전송 모듈 개발)

  • Donggil LEE;Myungsung KOO;Gyeom HEO;Jiwon CHEONG;Hyohyuc IM;Jaehyun BAE
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.59 no.3
    • /
    • pp.206-214
    • /
    • 2023
  • Fish school monitoring technology is utilized for various purposes, such as boat fishing and resource surveys. With advancements in information and communication technology, this technology has expanded its application to remote areas. Its significance has grown in fishing sites, particularly for improving the efficiency and cost-effectiveness of set-net fishing. Set-net fishing gears are not limited to coastal areas, but are also installed in inland and remote sea regions. Consequently, fishermen require technology that allows them to quickly transmit information about approaching fish schools and enables them to perform long-term monitoring. The development of remote monitoring technology for set-net fish schools must consider crucial design factors such as communication range, transmission speed, power consumption of information modules, and operational expenses. In this study, we developed a low-power remote monitoring module for set-net fish school based on WCDMA. The module was specifically designed to minimize power consumption, allowing for communication over long distances and extended operation times in set-net fishing applications. Furthermore, we developed a web server software application that enables remote access to fish schools and provides real-time weather information. The performance of the developed module was evaluated through set-net fishing site application and experiments with moving ships on the sea. The experimental results demonstrated that the remote monitoring system, consisting of the developed low-power remote monitoring module for set-net fish school based on WCDMA and a fish finder, had an average power consumption of 4.6 W, a maximum communication range of 22.84 km, and a data transmission and reception rate of 98.79%. The maximum fish school information transmission and reception rate was 97.26%