• Title/Summary/Keyword: internet addresses

Search Result 228, Processing Time 0.023 seconds

A Fault-Tolerant Mobile Agent Framework and Replication Study for Internet Applications (인터넷 응용을 위한 고장 감내 이동 에이전트 프레임워크와 레플리케이션 연구)

  • Park, Kyeong-mo
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.701-708
    • /
    • 2003
  • This paper addresses the issue involved in dependability of distributed mobile agents in the Internet environment. We propose an architectural framework for the Internet applications making mobile agents into fault-tolerant. The replication of agents and data is of great importance to achieve fault tolerance in distributed systems over the Internet. This research focuses on the replication component for the proposed fault-tolerant mobile agent framework. We present and analyze the performance results obtained when doing simulation study on the effects of the degree of replication, the active and passive replication strategies, and the replication scale.

A Study on Next Generation IPTV Multimedia Service Management Architecture (차세대 IPTV 멀티미디어 서비스 관리 구조 연구)

  • Park, Byungjoo;Moon, Sungbong;Kim, Bongki
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.1-12
    • /
    • 2008
  • The multimedia streaming service in NGN architecture is not only to deliver video streaming (VoD, Broadcasting TV, etc.) but also to provide new services and service bundles, such as Triple Play (IPTV + VoIP + Internet). Among these services, Internet Protocol Television (IPTV) is becoming a convergence of communication, content, computing, as well as an integration of broadcasting and telecommunication services. In this paper, we addresses enhanced IPTV management scheme aspect of E2E from Home Network to Head End Center over NGN to support efficient service management with a full quality of service (QoS) guarantee.

  • PDF

Security Threats and Attacks in Internet of Things (IOTs)

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.107-118
    • /
    • 2021
  • The term Internet of Things (IoTs) refers to the future where things are known daily through the Internet, whether in one way or another, as it is done by the method of collecting various information from various sensors to form a huge network through which people, things and machines are helped to make a link between them at all time and anywhere. The IoTs is everywhere around us such as connected appliances, smart homes security systems and wearable health monitors. However, the question is what if there is a malfunction or outside interference that affects the work of these IoTs based devises? This is the reason of the spread of security causes great concern with the widespread availability of the Internet and Internet devices that are subject to many attacks. Since there aren't many studies that combines requirements, mechanisms, and the attacks of the IoTs, this paper which explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality Additionally, the paper addresses the different types of attacks in IoTs. We have also addressed the different approaches aim to prevention mechanisms according to several researchers' conclusions and recommendations.

Development of a Telemetering Device Using RF Transceivers and a Mobile-Phone (RF 트랜시버와 무선전화기를 이용한 텔레미터링 장치 개발)

  • Jung, Tae-Hong;Kang, Moon-Ho;Lee, Jeong-Kn
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2173-2175
    • /
    • 2004
  • This paper addresses a telemetering device which uses RF transceivers and a mobile-phone. Locally collected data arc encoded with a BCH error correcting code and transferred to a receiver through a RF module. The receiver-side RF module decodes the transferred data and then repetes them to a mobile-phone. Lastly, the mobile-phone hands over the data through a wireless phone network to a host computer in the internet.

  • PDF

Managing Knowledge Creating Relationships

  • Gadman, Sean
    • International Journal of Quality Innovation
    • /
    • v.6 no.2
    • /
    • pp.46-58
    • /
    • 2005
  • The internet is enabling a new economy based on the networking of human knowledge. While the benefits of connecting people to people, people to information and people to data within an organization are becoming more recognized and appreciated, much less is known about managing knowledge creation and dissemination across corporate boundaries. This paper addresses the challenges associated with selecting the best collaborative strategy and managing relationships which span organizational cultures and boundaries.

A Propagated-Mode LISP-DDT Mapping System (전달모드 LISP-DDT 매핑 시스템에 관한 연구)

  • Ro, Soonghwan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2211-2217
    • /
    • 2016
  • The Locator/Identifier Separation Protocol (LISP) is a new routing architecture that implements a new semantic for IP addressing. It enables the separation of IP addresses into two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs). This approach will solve the issue of rapid growth of the Internet's DFZ (default-free zone). In this paper, we propose an algorithm called the Propagated-Mode Mapping System to improve the map request process of LISP-DDT.

Two-way DLNA Adaptor for Interconnecting Media Contents in Internet of Things (사물인터넷에서 미디어 콘텐츠 연동을 위한 양방향 DLNA 어댑터)

  • Yim, Hyung-Jun;Lee, Kyu-Chul
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.706-710
    • /
    • 2014
  • The Internet of Things (IoT) is a concept that describes environments where various things are connected to the Internet. These objects can identify themselves and allow other devices the identify them as well. DLNA focuses on delivering interoperability guidelines based on open industry standards in order to complete cross-industry digital convergence. This paper proposes a two-way DLNA Adaptor and addresses the methodologies of service interoperation of the media contents. In this paper, the designs of the components of the DLNA Adaptor are presented, and the conclusion provides general remarks and a discussion of future work.

Design of the Adaptive SIP Application Server System Architecture supporting SIP-based Session Mobility over the Home Network configured with Private IP (사설IP 기반 홈네트워크에서 세션이동성 지원의 적응적인 SIP 응용서버 시스템 구조 설계)

  • Oh, Yeon-Joo;Beom, Min-Jun;Kim, Dong-Hee;Paik, Eui-Hyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.73-81
    • /
    • 2006
  • The home network is generally separated from the Internet, as it is made up of a private network due to security issues and the lack of IPv4 addresses space. Also, a user may want to move from a terminal to another terminal connected in the home network during communicating with people outside the home. In this case, people connected in the Internet, or another home network could not communicate the user at the home. These limitations prevent a SIP-capable device connected in the home network from communicating with another SIP-capable device connected in the Internet or the outside of the home network. To overcome the limitations, This paper proposes the Adaptive SIP Application Server System as a software architecture that a user inside of the home can communicate with people outside of the home when the home is composed of a private IP-based network. Moreover, the proposed architecture provides the session mobility that allows the user to maintain a media session even if changing the terminal inside of the home during the session established. The proposed system was implemented over a home server device which acts functionality as a connection point for transmitting IP packets between a home network and the Internet.

  • PDF

An Optimal Incentive-Compatible Pricing for Congestible Networks (혼잡이 있는 네트워크를 위한 동기 유발 가격)

  • Kim, Yong-Jae
    • Asia pacific journal of information systems
    • /
    • v.7 no.3
    • /
    • pp.109-124
    • /
    • 1997
  • Pricing information services, where congestion can threaten the efficient operation of information systems, has been studied in economics and information systems literature, Recent explosion of the Internet ana proliferation of multimedia content over the Internet have rekindled the research interest in designing pricing schedules for differentiated information services, In order for the information system to effectively serve users having heterogeneous needs, pricing rules for discriminated services should be considered. At the same time, when individual users' interest does not align with that of the organization that individual users belong to, organization-wide pricing policy should be devised to improve the value of the services rendered by the system. This paper, using a priority queuing model, addresses the need for such on incentive-compatible pricing for different information services.

  • PDF

Efficient Resource Allocation with Multiple Practical Constraints in OFDM-based Cooperative Cognitive Radio Networks

  • Yang, Xuezhou;Tang, Wei;Guo, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2350-2364
    • /
    • 2014
  • This paper addresses the problem of resource allocation in amplify-and-forward (AF) relayed OFDM based cognitive radio networks (CRNs). The purpose of resource allocation is to maximize the overall throughput, while satisfying the constraints on the individual power and the interference induced to the primary users (PUs). Additionally, different from the conventional resource allocation problem, the rate-guarantee constraints of the subcarriers are considered. We formulate the problem as a mixed integer programming task and adopt the dual decomposition technique to obtain an asymptotically optimal power allocation, subcarrier pairing and relay selection. Moreover, we further design a suboptimal algorithm that sacrifices little on performance but could significantly reduce computational complexity. Numerical simulation results confirm the optimality of the proposed algorithms and demonstrate the impact of the different constraints.