• Title/Summary/Keyword: centralized control

Search Result 390, Processing Time 0.027 seconds

SPDX Document Generation Visual Studio Plug-in development for Invigorating Blockchain based Software Distribution Platform (블록체인 기반의 소프트웨어 유통 플랫폼의 활성화를 위한 SPDX 문서 생성 Visual Studio용 플러그인 개발)

  • Yun, Ho-Yeong;Joe, Yong-Joon;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.13 no.2
    • /
    • pp.9-17
    • /
    • 2017
  • Software compliance is an essential process when Open Source Software is included in software development to avoid such as license violation issue. However, analyzing quite big software which involves many developers requires enormous time and hard difficulty. To resolve these kinds of problem, SPDX formalizes and standardize the metadata about the software package. When the use of SPDX is activated, software package analysis would be simple and could contribute fair Open Source Software distribution. In this paper, we develop blockchain based SPDX distribution platform which fulfills the requirement of SPDX lifecycle to provide SPDX database which does not depend on particular centralized service but serve as distributed ledger and control by user's certification and their purpose. Moreover, to contribute invigoration of blockchain based SPDX distribution platform, we develop SPDX document generation plug-in for integrated development environment such as Visual Studio.

A Study on the Efficient Load Balancing Method Considering Real-time Data Entry form in SDN Environment (SDN 환경에서 실시간 데이터 유입형태를 고려한 효율적인 부하분산 기법 연구)

  • Ju-Seong Kim;Tae-Wook Kwon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1081-1086
    • /
    • 2023
  • The rapid growth and increasing complexity of modern networks have highlighted the limitations of traditional network architectures. The emergence of SDN (Software-Defined Network) in response to these challenges has changed the existing network environment. The SDN separates the control unit and the data unit, and adjusts the network operation using a centralized controller. However, this structure has also recently caused a huge amount of traffic due to the rapid spread of numerous Internet of Things (IoT) devices, which has not only slowed the transmission speed of the network but also made it difficult to ensure quality of service (QoS). Therefore, this paper proposes a method of load distribution by switching the IP and any server (processor) from the existing data processing scheduling technique, RR (Round-Robin), to mapping when a large amount of data flows in from a specific IP, that is, server overload and data loss.

COMS Electrical Power Subsystem Preliminary Design (통신해양기상위성 전력계 예비설계)

  • Gu, Ja-Chun;Kim, Ui-Chan
    • Journal of Satellite, Information and Communications
    • /
    • v.1 no.2
    • /
    • pp.95-100
    • /
    • 2006
  • The COMS(Communication, Ocean and Meteorological Satellite) EPS(Electrical Power Subsystem) is derived from an enhanced Eurostar 3000 version. Eurostar 3000 EpS is fully autonomous operation in nominal conditions or in the event of a failure and provides a high level of reconfigure capability. This paper introduces the COMS EPS preliminary design result. COMS EPS consists of a battery, a solar arrat wing, a PSR(Power Supply Regulator), a PRU(Pyrotechnic Unit), a SDAM(Solar Array Drive Mechanism) and relay and fuse brackets. COMS EPS can offer a bus power capability of 3 kW. The solar array is made of a deployable wing with two panels. One type fo solar cells is selected ad GaAs/Ge triple junction cells. Li-ion battery is base lined with ten series cell module of five cells in parallel. PSR associated to battery and solar array wing generates a power bus fully regulated at 50 V. Power bus os centralized protection and distribution by relay and fuse brackets. PRU provides power for firing actuarors devices. The solar array wing is rotated by the SADM under control of the attitude orbit control subsystem. The control and monitoring of the EPS, especially of the battery, is performed by the PSR in combination with the on-board software.

  • PDF

Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks (무선 메쉬 네트워크에서의 아이디 기반 프록시 암호화를 이용한 안전한 다대다 멀티캐스트 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.72-83
    • /
    • 2010
  • Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.

Violation Detection of Application Network QoS using Ontology in SDN Environment (SDN 환경에서 온톨로지를 활용한 애플리케이션 네트워크의 품질 위반상황 식별 방법)

  • Hwang, Jeseung;Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.7-20
    • /
    • 2017
  • The advancement of cloud and big data and the considerable growth of traffic have increased the complexity and problems in the management inefficiency of existing networks. The software-defined networking (SDN) environment has been developed to solve this problem. SDN enables us to control network equipment through programming by separating the transmission and control functions of the equipment. Accordingly, several studies have been conducted to improve the performance of SDN controllers, such as the method of connecting existing legacy equipment with SDN, the packet management method for efficient data communication, and the method of distributing controller load in a centralized architecture. However, there is insufficient research on the control of SDN in terms of the quality of network-using applications. To support the establishment and change of the routing paths that meet the required network service quality, we require a mechanism to identify network requirements based on a contract for application network service quality and to collect information about the current network status and identify the violations of network service quality. This study proposes a method of identifying the quality violations of network paths through ontology to ensure the network service quality of applications and provide efficient services in an SDN environment.

The Effect of Customer Orientation on Perceived Referral Risk and Referral Intention (보험 영업사원의 고객지향성이 지각된 소개위험과 추천의도에 미치는 영향: 고객성향의 조절효과를 중심으로)

  • Kim, Dong-Hyun;Cha, Jae-Bin;Park, Chan-Wook
    • Journal of Distribution Science
    • /
    • v.15 no.7
    • /
    • pp.61-71
    • /
    • 2017
  • Purpose - This study empirically analyzed the effect of the customer orientation in Insurance Salespersons on the perceived referral risk and referral intention. In the empirical study, we try to provide suggestions for reducing the perceived referral risk of customer oriented selling activities and improving the referral intentions according to customers' tendencies. Research design, data, and methodology - Data collection was conducted through the convenience sampling method for customers who had insurance coverage for about two months from March to May 2015. A total of 700 copies were distributed and 670 copies (95.7% recovery) were collected. Finally, 661 copies were used for final analysis. With the IBM PASW 22.0 statistical program. The interaction effect for the hypothesis test was generated by multiplying the average centralized independent variable and the control variable, and the average centralization variable was used to minimize the multi-collinearity problem of the interaction effect between the independent variable and the control variables. Results - Hypothesis 1 was adopted because the effect of customer-oriented selling activities on perceived referral risk were significantly negative. The effect of customer orientation on perceived referral risk is affected by innovative tendency, risk-taking tendency, and interpersonal tendency Interaction effect was observed. Therefore, Hypothesis 2-2, Hypothesis 2-3, Hypothesis 2-4 were adopted. The effect of customer-oriented selling activities on referral intention was significantly positive, and Hypothesis 3 was adopted. The effect of customer orientation was influenced by the interaction effect of innovative tendency. Therefore, only Hypothesis 4-2 was adopted. Finally, the effect of perceived referral risk on referral intention was significantly negative and hypothesis 5 was adopted. Conclusions - This study suggests that it is important for the salespeople to grasp the customers' propensity in consideration of the perceived referral risk and referral intention according to the moderating effect of customer orientation. In this study, we showed that customer-oriented selling activities positively influence referral intention by inducing perceived referral risk in customers with stronger risk-taking tendencies. It is thought that it will be an important basic data in designing a customer's selling strategy or conducting selling activities.

An Integrated QoS Management System for Large-Scale Heterogeneous IP Networks : Design and Prototype Implementation (대규모 이기종 IP 망의 통합품질관리 시스템의 설계 및 구현)

  • Choi, Tae-Sang;Chung, Hyung-Seok;Choi, Hee-Sook;Kim, Chang-Hoon;Jeong, Tae-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3633-3650
    • /
    • 2000
  • Internet is no longer a network for special communities but became a global means of communication infrastructure for everyday life. People are exchanging their personal messages using e-mails, students are getting their educational aids through the web, people are buying a variety of goods from cyber shopping malls, and companies are conducting their businesses over the Internet. Recently, such an explosive growth of the traffic in the Internet raised a big concern on how to accommodate ever-changing user's needs in terms of an amount of the traffic, characteristics of the traffic, and various service quality requirements, Over provisioning can be a simple solution but it is too expensive and inefficient. Thus many new technologies to solve this very difficult puzzle have bcen introduced recently, Any single solution, however, can be insufficient and a carefully designed architecture, which integrates a group of solutions, is required. In this paper, we propose a policy-based Internet QoS provisioning, traffic engineering and perfonnance management system as our solution to this problem. Our integrated management QoS solution can provide highly responsive flow-through service provisioning, more realistic service and resource policy control based on the real network performance information, and centralized control of traffic engineering for heterogeneous networks.

  • PDF

Design of IoT Gateway based Event-Driven Architecture for Intelligent Buildings. (IoT 게이트웨이 기반 지능형 건물의 이벤트 중심 아키텍쳐 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.256-259
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The gateway based RESTful technology responsible for handling clients' requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in intelligent building IoT environment.

  • PDF

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.

Homeland Security Management: A Critical Review of Civil Protection Mechanism in Korea (국가안전관리: 한국의 시민보호(위기재난관리) 체계에 관한 비판적 고찰)

  • Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.121-144
    • /
    • 2011
  • The Framework Act on the Management of Disasters and Safety 2004(FAMDS) currently underpins Korean civil protection system, and under this FAMDS, Korean civil protection establishes a three-tiered government structure for dealing with crises and disasters: central government, provincial & metropolitan government, and local government tiers. In particular, the concept of Integrated Emergency Management(IEM) emphasizes that emergency response organizations should work and act together to respond to crises and disasters effectively, based on the coordination and cooperation model, not the command and control model. In tune with this trend, civil protection matters are, first, dealt with by local responders at the local level without direct involvement of central or federal government in the UK or USA. In other words, central government intervention is usually implemented in the UK and the USA, only when the scale or complexity of a civil protection issue is so vast, and thus requires a degree of central government coordination and support, resting on the severity and impact of the event. In contrast, it appears that civil protection mechanism in Korea has adopted a rigid centralized system within the command and control model, and for this reason, central government can easily interfere with regional or local command and control arrangements; there is a high level of central government decision-making remote from a local area. The principle of subsidiarity tends to be ignored. Under these circumstances, it is questionable whether such top-down arrangements of civil protection in Korea can manage uncertainty, unfamiliarity and unexpectedness in the age of Risk Society and Post-modern society, where interactive complexity is increasingly growing. In this context, the study argues that Korean civil protection system should move towards the decentralized model, based on coordination and cooperation between responding organizations, loosening the command and control structure, as with the UK or the USA emergency management arrangements. For this argument, the study basically explores mechanisms of civil protection arrangements in Korea under current legislation, and then finally attempts to make theoretical suggestions for the future of the Korean civil protection system.

  • PDF