• 제목/요약/키워드: client/server architecture

검색결과 276건 처리시간 0.032초

분산 DB 환경에서 동기화 이동에이전트 (A synchronized mobile agent in Distributed Database Environments)

  • 국윤규;김운용;정계동;김영철;최영근
    • 정보처리학회논문지A
    • /
    • 제10A권4호
    • /
    • pp.313-320
    • /
    • 2003
  • 본 논문에서는 분산 환경에서 e-비즈니스 프로세스들 간에 SFT(Slow Frequency Transaction) 데이터를 처리하는 동기화 에이전트 시스템을 설계 및 구현한다. 이 동기화 에이전트 시스템은 분산 프로세스들의 상호운용성 보장과 클라이언트/서버 구조의 문제를 해결하기 위해 이동에이전트를 이용하며, 분산된 이종 시스템 플랫폼상의 e-비즈니스 프로세스들의 데이터 동기화를 위한 정책을 제시한다. 제안된 동기화 정책은 유니캐스팅 전송 상에서 시스템 우선순위와 타임스탬프의 트랜잭션을 기본으로 한다.

웹 환경에서 분산-큐 이중-버스의 공정성 제어를 위한 슬롯양보 방식 (A Slot Concession Scheme for Fairness Control of DQDB in Web Environment)

  • 김재수;김정홍;황하응
    • 한국컴퓨터정보학회논문지
    • /
    • 제7권4호
    • /
    • pp.133-140
    • /
    • 2002
  • 분산-큐 이중-버스(DQDB)는 단일 방향 버스 구조를 갖는 망의 고유 특성으로 인해 대역폭 할당에 있어 공정하지 않다. 지금까지 DQDB에서 공정성 제어 연구는 대부분 평형 부하. 대칭형 부하, 비대칭형 부하 형태와 같은 특정 부하 형태를 대상으로 수행하였다. 웹 환경에서 클라이언트-서버 부하 형태는 특정 부하 형태 보다 더 실질적인 트래픽 패턴이다. 본 논문에서는 웹 환경에서 DQDB에 접속된 각 스테이션들에게 대역폭을 공정하게 할당하기 위해, 대역폭 요구 패턴으로부터 직접 접근 임계값을 구하여, 이 값을 기준으로 하여 클라이언트 쪽에서 빈 슬롯을 서버에게 양보함으로써 대역폭을 제어하는 방식을 제안하였다. 그리고 시뮬레이션을 통하여 다른 방식보다 제안한 방식이 더 우수하다는 것을 확인하였다.

  • PDF

확장성과 개방성을 지원하는 SCADA 시스템 설계 및 구현 (Design and implementation of SCADA system to support scalability and openness)

  • 김형일;이승룡;전태웅;박영택
    • 제어로봇시스템학회논문지
    • /
    • 제5권6호
    • /
    • pp.753-763
    • /
    • 1999
  • The existing SCADA(Supervisory Control and Data Acquisition) system software is usually developed to suitable for the specific hardware platforms. However, as per rapid improvement of computer performance and development of network technology, it is required to support scalability and inter-operability in existing different SCADA systems. In order to meet such requirements, in this paper, we propose a new type of SCADA testbed using Java for electric distribution applications. The system consists of three modules; development support tools, client and server modules. The basic architecture of the proposed SCADA system is similar to existing one, however, we improve the function of MTU and MMI interface to facilitate LAN and WAN environment. Also, the proposed system can deals with alarm and history data by using heterogeneous DBMS. Since the system is built in Java environment, the development cost is cheap and it can support sacalability and portability. Our experience can be utilized to develop next generation of small and medium size of SCADA system.

  • PDF

원전 증기 발생기 전열관 검사 자동화를 위한 지능형 통합 시스템 개발 (Development of an intelligent and integrated system for automatic inspection of steam-generator tubes in nuclear power plant)

  • 강순주;최유락;최성수;우희곤
    • 제어로봇시스템학회논문지
    • /
    • 제2권3호
    • /
    • pp.236-241
    • /
    • 1996
  • This paper presents a new eddy current testing system for inspecting tubes of steam generator in nuclear power plant. The proposed system adopted embedded expert system concept to automate tasks of the inspection such as inspection planning and flaw signal interpretation, and integrated all the tasks into a client/server type computing architecture using database management system. Therefore, human factor errors occurred during inspection could be minimized and the inspection data could be transferred in real-time. As a result, we can increase the level of inspection confidence and the productivity of a personal inspector. A prototype of the proposed system has been developed for 5 years and the test operation has been performed in domestic nuclear power plants.

  • PDF

회로해석 및 PCB 전자장 분석을 위한 웹 기반 자동화 프로세스에 관한 연구 (A Study on Automation Process Based on WEB for Circuit and PCB EM Analysis)

  • 이장훈;장석환;정성일;이승요
    • 전기학회논문지
    • /
    • 제63권12호
    • /
    • pp.1716-1721
    • /
    • 2014
  • In this paper, a study on automation method for the circuit/EM (Electro-Magnetic) simulation is carried out to analyze effectively the SI/PI (Signal Integrity/Power Integrity) issues which occur on circuits and/or PCBs (Printed Circuit Boards). For the automation of the circuit/EM simulation, algorithms performing each process of the SI/PI analysis automatically (such as ports setup, circuit definition and SI/PI evaluation) are developed; thereby automation system for the SI/PI analysis is constructed with the algorithms. The automation of the circuit/EM simulation is accomplished in the environment of the C/S (Client/Server) architecture in order to reduce resources such as high cost computers demanded for the SI/PI analysis. The automation method for the SI/PI analyses proposed in this paper reduces effort, time, and cost spent on the environment setup for simulation and the SI/PI analysis process. In addition, the proposed method includes automation of the documenting process, which organizes, records and displays the SI/PI analysis results automatically for users.

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

EPICS 를 이용한 BPM시스템 개발 (1) (Development of BPM System using EPICS (1))

  • 이은희;윤종철;이진원;최진혁;황정연;남상훈
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 하계학술대회 논문집 D
    • /
    • pp.2325-2327
    • /
    • 2002
  • 포항 가속기연구소(PAL)에서는 포항방사광가속기(PLS)가 가동을 시작한 1994년 이후 현재까지 사용되어 온 기존의 제어 시스템을 새로운 환경인 EPICS(Experimental Physics and Industrial Control System) 시스템으로 개발하고 있다. EPICS 시스템의 구성은 IOC(Input/Ouput Controller) 와 OPI(Operator Interface)의 2-Layer로 구성되며 이는 MIU(Machine Interfaces Unit), SCC(Subsystem Computer Control System) 그리고 HMI(Human Machine Interface)로 이어지는 기존의 3-Layer 단계 중 SCC단계를 줄여 2-Layer로 구성된다. 이들 두 계층간의 통신은 Client(OPI)/Server(IOC) 구조의 Channel Access를 통해서 이루어진다. 개발중인 EPICS 시스템은 Open Architecture 구조로 IOC와 OPI 각 부분에서 개발시에 사용된 운영체제나 Hardware 를 사용하지 않고 다른 운영체제나 Hardware를 사용하더라도 하나의 공통부분 즉, Channel Access만 있으면 이를 통해 서로 다른 Subsystem IOC의 데이터를 Access할 수 있다. 전체 EPICS 제어시스템 중 저장링 운전의 핵심이 되는 BPM(Beam Position Monitoring) 및 MPS(Magnet Power Supply) 시스템은 IOC부분에 MVME5100(Target Machine) 보드와 vxWorks(Operating System)를 이용하고 OPI부분에는 SUN Workstation(Host Machine)와 Solaris(Operating System)을 사용하여 개발하고 있다. 본 논문에서는 IOC 및 OPI의 설치 절차와 설치 방법에 대해 기술하였다.

  • PDF

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network

  • Pattaranantakul, Montida;Sanguannam, Kittichai;Sangwongngam, Paramin;Vorakulpipat, Chalee
    • ETRI Journal
    • /
    • 제37권4호
    • /
    • pp.696-706
    • /
    • 2015
  • This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.

AOA망 환경에서 ATS 애플리케이션 구현을 위한 VDL Mode 2 데이터링크 프로토콜 설계 (Design of VDL Mode 2 Protocol under AOA Network for the Implementation of Bit-oriented ATS Applications)

  • 배중원;김현경;김인규;김태식;김동민
    • 항공우주시스템공학회지
    • /
    • 제1권4호
    • /
    • pp.13-21
    • /
    • 2007
  • As one of YHF digital data link technologies, VDL Mode 2 is designed to be an air-to-ground subnetwork of the Aeronautical Telecommunication Network (ATN) based on the Open System Interconnection (OSI) architecture. VDL Mode 2 can be used in ATS Applications especially for CPDLC and ADS. And it is also expected to replace ACARS (Aircraft Communications Addressing and Reporting System) which has broadly been used in AOC for over 20 years. This paper presents the design result of VDL Mode 2 system under AOA (ACARS Over AVLC) environment for the implementation of bit-oriented ATS applications. The system is composed of airborne and ground subsystem. Airborne subsystem consists of VDR, CMU and an aircraft test equipment with CPDLC/ADS client applications for operational test and ground system consists of Ground Station which includes ground VDR and ground communication controller, simple DSP (Datalink Service Processor) and a ground test equipment with CPDLC/ADS server applications.

  • PDF

A Study on the IDL Compiler using the Marshal Buffer Management

  • Kim, Dong-Hyun
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 춘계종합학술대회
    • /
    • pp.843-847
    • /
    • 2005
  • The development of distributed application in the standardized CORBA(Common Object Request Broker Architecture) environments reduces the developing time and maintaining cost of the systems. Because of these advantages, the development of application is being progressed in the several fields using the CORBA environments. The programmers in the CORBA environments usually develop the application programs using the CORBA IDL(Interface Definition Language). The IDL files are compiled by IDL compiler and translated into the stubs and skeleton codes which are mapped onto particular target language. The stubs produced by IDL compilers processes the marshaling a data into message buffer. Before a stub can marshal a data into its message buffer, the stub must ensure that the buffer has at least enough free space to contain the encoded representation of the data. But, the stubs produced by typical IDL compilers check the amount of free buffer space before every atomic data is marshaled, and if necessary, expand the message buffer. These repeated tests are wasteful and incidence of overheads, especially if the marshal buffer space must be continually expanded. Thus, the performance of the application program may be poor. In this paper, we suggest the way that the stub code is maintain the enough free space before marshaling the data into message buffer. This methods were analyzes the overall storage requirements of every message that will be exchanged between client and server. For these analysis, in the Front End of compiler has maintain the information that the storage requirements and alignment constraints for data types. Thus, stub code is optimized and the performance of application program is increased.

  • PDF