• Title/Summary/Keyword: mobile host

Search Result 377, Processing Time 0.028 seconds

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

Hydrodynamic interactions and coupled dynamics between a container ship and multiple mobile harbors

  • Kang, H.Y.;Kim, M.H.
    • Ocean Systems Engineering
    • /
    • v.2 no.3
    • /
    • pp.217-228
    • /
    • 2012
  • As the size of container ships continues to increase, not many existing harbors can host the super-container ship due to its increased draft and the corresponding dredging requires huge budget. In addition, the minimization of waiting and loading/offloading time is the most important factor in harbor competitiveness. In this regard, mobile-harbor concept has been developed in Korea to achieve much improved harbor capacity and efficiency. In developing the concept, one of the most important elements is the operability of crane between two or more floating bodies in side-by-side arrangement. The container ship is to be stationed through a hawser connection to an outside-harbor fixed-pile station with the depth allowing its large draft. The mobile harbors with smart cranes are berthed to the sides of its hull for loading/offloading containers and transportation. For successful operation, the relative motions between the two or more floating bodies with hawser/fender connections have to be within allowable range. Therefore, the reliable prediction of the relative motions of the multiple floating bodies with realistic mooring system is essential to find the best hull particulars, hawser/mooring/fender arrangement, and crane/docking-station design. Time-domain multi-hull-mooring coupled dynamic analysis program is used to assess the hydrodynamic interactions among the multiple floating bodies and the global performance of the system. Both collinear and non-collinear wind-wave-current environments are applied to the system. It is found that the non-collinear case can equally be functional in dynamics view compared to the collinear case but undesirable phenomena associated with vessel responses and hawser tensions can also happen at certain conditions, so more care needs to be taken.

Performance Analysis of TCP using DSR Routing Protocols in Ad-hoc Mobile Network (DSR 라우팅 프로토콜을 사용한 Ad-hoc 무선망에서의 TCP 성능 분석)

  • Park, Seung-Seob;Yuk, Dong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.647-654
    • /
    • 2002
  • Ad-hoc networks consist of a set of mobile hosts that communicate using wireless links, without the use of other supporting communication facilities (such as base stations, etc.). Therefore, the topology of an Ad-hoc network frequently changes due to the movement of mobile host, which nay lead to sudden packet loss. Recently, the large amount of research has focused on the routing protocols needed in such an environment. In this paper, TCP Reno, Sack, and Tahoe versions are analysed using DSR protocol which is the representative On-Demand routing protocol in Ad-hoc wireless network. As the result of this simulation, we know that TCP Reno relatively has higher throughput than that of Sack and Tahoe, and TCP Reno has more stable performance than that of TCP Tahoe and Sack, regardless of the speed of mobile node and the size of topology.

Design of Mobile Agent Model Supporting the Intelligent Path Search (지능형 경로 탐색을 지원하는 이동 에이전트 모델 설계)

  • Ko, Hyun;Kim, Kwang-Myoung;Lee, Yon-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.550-554
    • /
    • 2002
  • In this paper, we design the CORBA-based Mobile-Agent Model (CMAM) which has the capability of the efficient work processing in distributed environment through sensing network traffic and searching the optimal path for migration nodes of mobile agent. In case existing mobile agent model is given various works from user, the network overhead and traffic are increased by increasing of execution module size. Also, if it happens a large quantity of traffics due to migration of nodes according to appointment of the passive host(node) muting schedule by user, it needs much cost for node search time by traffic. Therefore, in this paper, we design a new mobile agent model that assures the reliability of agent's migration through dynamic act on the specific situation according to appointment of the active routing schedule and can minimize agent's work processing time through optimal path search. The proposed model assigns routing schedule of the migration nodes actively using an extended MAFFinder. Also, for decreasing overhead of network by agent's size, it separated by mobile agent including oかy agent calling module and push agent with work executing module based on distributed object type of CORBA. Also, it can reduce the required time for round works of mobile agent through the optimal path search of migration nodes.

  • PDF

An Efficient Data Delivery Information Exchange for Reliable Wireless Multicasting (신뢰성 있는 무선 멀티캐스팅을 위한 효율적인 데이터 수신 정보 교환)

  • Lim Ji-Yeong;Chung Tai-Myeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.59-68
    • /
    • 2002
  • In this paper we issue some problems occurring when a mobile host moves from a base station to another in a wireless multicasting and propose a solution. In the case of not being in the same multicast group, the old base station will pre-forward data to neighboring base stations to avoid transmission delay. However, if other mobile hosts move at short interval, the old base station may retransmit the same dta to the same neighboring base stations. Also, the old base station should retransmit data if the new base station has already discarded data even if the new base station is a member of the multicast group. In this paper we propose called Information Exchange Scheme (IES). In this scheme, each base station exchanges indirectly the data delivery information with the rest of the base stations in the same multicast group for efficient and reliable multicast and pre-forwards data not retransmitting the same data for minimizing transmission delay when a mobile host moves. We also present how IES is efficient by analyzing and simulating.

Smart Battery System of Lithium ion Batteries (리튬이온전지의 Smart Battery System)

  • Kim Hyun-Soo;Moon Seong-In;Yun Mun-Soo;Ko Beyng-Hi;Park Sang-Kun;Shin Dong-O;Yoo Seong-Mo;Lee Seung-Ho
    • Journal of the Korean Electrochemical Society
    • /
    • v.4 no.3
    • /
    • pp.132-137
    • /
    • 2001
  • Recently, the demand for notebook PC with lithium ion batteries has steadily increased and consumers require them to adopt a SBP(smart battery pack) able to predict the remaining capacity and the run time of batteries precisely. The SBP is composed of a protection If, by which safety of lithium ion batteries is maintained against overcharge, overdischarge and overcurrent, and a smart IC, which calculates the remaining capacity and the remaining run time. The protection IC shut abmormal current down by using overcharge/overdischarge FET. A SBS(smart battery system) is composed of a system host, a smart battery and a smart battery charger. The smart ICs for SBP will be required to provide a low cost, low current consumption and small size. There will need to develop a microcomputer control type IC and an optimum algorism which is able to predict the residual capacity and the residual run time precisely. SBS will apply to many kinds of industry fields such as an electric bicycle, an electric vehicle, a load levelling and a military.

A Two-Step Call Admission Control Scheme using Priority Queue in Cellular Networks (셀룰러 이동망에서의 우선순위 큐 기반의 2단계 호 수락 제어 기법)

  • 김명일;김성조
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.461-473
    • /
    • 2003
  • Multimedia applications are much more sensitive to QoS(Quality of Service) than text based ones due to their data continuity. In order to provide a fast moving MH(Mobil Host) using multimedia application with a consistent QoS,an efficient call admission mechanism is in need. This paper proposes the 2SCA(2-Step Call Admission) scheme based on cal admission scheme using pripority to guarantee the consistent QoS for mobile multimedia applications. A calls of MH are classified new calls, hand-off calls, and QoS upgrading calls. The 2SCA is composed of the basic call admission and advanced call admission; the former determines the call admission based on bandwidth available in each cell and the latter determines the call admission by applying DTT(Delay Tolerance Time), PQeueu(Priority Queue), and UpQueue(Upgrade Queue) algorithm according to the type of each call blocked at the basic call admission stage. In order to evaluate the performance of our mechanism, we measure the metrics such as the dropping probability of new calls, dropping probability of hand-off calls, and bandwidth utilization. The result shows that the performance of our mechanism is superior to that of existing mechanisms such as CSP(Complete Sharing Policy), GCP(Guard Channel Policy) and AGCP(Adaptive Guard Channel Policy).

A Study on Information Exchange Scheme for Reliability in the Wireless Multicasting (무선 멀티캐스팅에서 신뢰성을 위한 정보 교환 기법에 관한 연구)

  • Im, Ji-Yeong;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.247-256
    • /
    • 2002
  • In a wireless multicasting when a mobile host moves to the new bate station being in the same multicast group it needs to exchange information about data delivery between base stations to receive data from the new base station at once. However it is inefficient to use the existence schemes because it takes too much time to exchange information and many overheads. The next, a mobile host moving to the base station not being in the same multicast group, the old base station will pre-forward data to neighboring base stations to avoid transmission delay. However, if other mobile hosts move at short interval, the old base station may retransmit the same data to the same neighboring base stations. In this paper we proposed called Information Exchange Scheme (IES). In IES in the same multicast grope the base stations exchange information locally so it takes the minimum time and overheads to use IES. Also in IES the neighboring base stations delay to delete data for continuous moving of other MHs. We also present how our scheme is efficient by producing cost ad simulating.

Analysis of I/O Response Time Throughout NVMe Driver Implementation Architectures (NVMe 드라이버 구현 방식에 따른 I/O 응답시간 분석)

  • Kang, Ingu;Joo, Yongsoo;Lim, Sung-Soo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.3
    • /
    • pp.139-147
    • /
    • 2017
  • In recent years, non-volatile memory express (NVMe), a new host controller interface standard, has been adapted to overcome performance bottlenecks caused by the acceleration of solid state drives (SSD). Recently, performance breakthrough cases over AHCI based SATA SSDs by adapting NVMe based PCI Express (PCIe) SSD to servers and PCs have been reported. Furthermore, replacing legacy eMMC-flash storage with NVMe based storage is also considered for next generation of mobile devices such as smartphones. The Linux kernel includes drivers for NVMe support, and as the kernel version increases, the implementation of the NVMe driver code has changed. However, mobile devices are often equipped with older versions of Android operating systems (OSes), where the newest features of NVMe drivers are not available. Therefore, different features of different NVMe driver implementations are not well evaluated on Android OSes. In this paper, we analyze the response time of the NVMe driver for various Linux kernel version.

Basic MOFI Testbed Implementation for Host ID-based Communication (호스트 ID 기반 통신을 위한 기본 MOFI 테스트베드 구축)

  • Jung, Whoi-Jin;Min, Seok-Hong;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.7
    • /
    • pp.17-27
    • /
    • 2011
  • In recent years, the interest and research for Future Internet are rapidly increasing. In domestic, MOFI (Mobile Oriented Future Internet) is proposed as one architecture of Future Internet. MOFI is a data transmission architecture which provides a mobility, name-based communication and routing scalability. In this paper we implement a basic MOFI testbed that supports HID-based communication, and verify the feasibility of HID-based communication through experimentation of general service such as PING and WWW service. We used "VirtualBox" as a virtual machine and implement a packet processing and a HCP header addition and translation function using "Click Modular Router".