• Title/Summary/Keyword: network computing

Search Result 3,187, Processing Time 0.023 seconds

Methods for Enhancing Reliability of On-Ground IoT Applications (지상용 IoT 애플리케이션의 신뢰성 향상 기법)

  • Shin, Dong Ha;Han, Seung Ho;Kim, Soo Dong;Her, Jin Sun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.151-160
    • /
    • 2015
  • Internet-of-Things(IoT) is the computing environment to provide valuable services by interacting with multiple devices, where diverse devices are connected within the existing Internet infrastructure and acquire context information by sensing. As the concern of IoT has been increased recently, most of the industries develop many IoT devices. And, many people are focused on the IoT application that is utilizing different technologies, which are sensor network, communication technologies, and software engineering. Developing on-ground IoT application is especially even more active in progress depending on increasing of on-ground IoT devices because it is possible for them to access dangerous and inaccessible situation. However, There are a few studies related IoT. Moreover, since on-ground IoT application, which is different from typical software application, has to consider device's characteristics, communication, and surround condition, it reveal challenges, decreasing reliability. Therefore, in this paper, we analyze reliability challenges related to maturity and fault tolerance, one of reliability attributes, occurring in developing on-ground IoT applications and suggest the effective solutions to resolve the challenges. To verify proposed the challenges and solutions, we show result that is applying the solutions to applications. By presenting the case study, we evaluate the effectiveness of applying the solutions to the application.

Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States (유비쿼터스 서비스 상태지속을 지원하는 안전한 Jini 서비스 구조)

  • Kim, Sung-Ki;Jung, Jin-Chul;Park, Kyung-No;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.157-166
    • /
    • 2008
  • The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.

A Study on the Performance Analysis of Cache Coherence Protocols in a Multiprocessor System Using HiPi Bus (HiPi 버스를 사용한 멀티프로세서 시스템에서 캐쉬 코히어런스 프로토콜의 성능 평가에 관한 연구)

  • 김영천;강인곤;황승욱;최진규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.1
    • /
    • pp.57-68
    • /
    • 1993
  • In this paper, we describe a multiprocessor system using the HiPi bus with pended protocol and multiple cache memories, and evalute the performance of the multiprocessor system in terms of processor utilization for various cache coherence protocols. The HiPi bus is delveloped as the shared bus of TICOM II which is a main computer system to establish a nation-wide computing network in ETRI. The HiPi bus has high data transfer rate, but it doesn't allow cache-to-cache transfer. In order to evaluate the effect of cache-to-cache transfer upon the performance of system and to choose a best-performed protocol for HiPi bus, we simulate as follows: First, we analyze the performance of multiprocessor system with HiPi bus in terms of processor utilizatIOn through simulation. Each of cache coherence protocol is described by state transition diagram, and then the probability of each state is calculated by Markov steady state. The calculated probability of each state is used as input parameters of simulation, and modeling and simulation are implemented and performed by using SLAM II graphic symbols and language. Second, we propose the HiPi bus which supports cache-to-cache transfer, and analyze the performance of multiprocessor system with proposed HiPi bus in terms of processor utilization through simulation. Considered cache coherence protocols for the simulation are Write-through, Write-once, Berkely, Synapse, Illinois, Firefly, and Dragon.

  • PDF

Design of Mobile Agent Management System based on OSGi (OSGi 기반 이동 에이전트 관리 시스템 설계)

  • Lee, Seung-Keun;Kim, In-Tae;Kim, Tae-Gan;Lee, Kyoung-Mo;Rim, Ki-Wook;Lee, Jung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.41-48
    • /
    • 2005
  • OSGi(Open Service Gateway Initiative) offers a unique opportunity for pervasive computing as a potential framework for achieving interoperability between various sensors, home appliances, and networked devices. The OSGi framework supports a remote installation of a bundle, which is a unit that installs and deploys services. However, in order for the bundle in execution to migrate, a specific form of bundle such a mobile agent, is needed one which is able to move through a heterogeneous network. This paper proposes a method that can manage bundles like these dynamic agents, in order to ensure the mobility of entities in multiple OSGi framework environments. For our purposes, we have designed the mobile agent management system for managing the lifecycle and mobility of agents in the OSGi framework. The mobile agent management system we are proposing implements a bundle form which can perform in an OSGi framework as well as manage autonomous mobile services. As a result, mobility in a pervasive environment will be supported more efficiently.

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.

A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering (자금 세탁 방지를 위한 블록체인 기반 스마트 컨트랙트 메커니즘 설계)

  • Kang, Heejung;Kim, Hye Ri;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.1-11
    • /
    • 2018
  • The Blockchain is a technique that prevents data from being manipulated and guarantees the integrity and reliability of the data by all participants in the network jointly owning and validating the data. Since the Blockchain characterized by security, scalability and transparency, it is used in a variety of fields including logistics, distribution, IoT and healthcare, including remittance. In particular, there is a growing interest in smart contract that can create different forms of contracts and automate implementation based on Blockchain. Smart Contract can be used to pre-programme contracts and are implemented immediately when conditions are met. As a result, digital data can be more reliable. In this paper, we are conducting a study on the smart contract design as a way to solve such problems as illegal misuse of funds on virtual currency, which has become an issue recently. Through this process, we applied the customer identification and money laundering prevention process using smart contract, and then check the possibility of preventing money laundering and propose the ASM (AML SmartContract Mechant) design.

The effects of the Partnership in Supply Chain Management with Appling Social Business on the outcome of the SCM (소셜 비즈니스를 활용한 공급 사슬에서의 파트너십이 SCM 성과에 미치는 영향)

  • Kim, So-Chun;Lim, Wang-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.95-110
    • /
    • 2014
  • The purpose of this research is to further investigate the influence of partnership between with the mediator effect of the social business on the outcome of SCM. IT technology fusion electronic tags, mobile phone, such as cloud computing is also activated in supply chain management of recently, business is faster, if social business is applied here that are smarter, customers or suppliers, there may be communication directly and to further improve the relationship partnership. 150 questionnaires were sent to companies that have introduced SCM to their systems and are operating it. Among 150 questionnaires, 127 collected data were analyzed excluding incomplete 23 data. Statistical methods used in this study were frequency analysis, factor analysis, reliability analysis, t-test, ANOVA, path analysis, Scheffe test and Sobel test with Amos 18.0. and SPSS 21.0. The analytical results are as follows. First, the more the reliability, information share, continuous transaction, effects on the social business are getting higher, the interdependence has little impact on it. Second, the impact on the outcome of SCM, partnerships between companies, showed a significant influence the reliability, the share of information, the continuous transaction, but the interdependence was analysed as an uninfluential factor. Third, the social business is analyses to have a mediator effect in relationship between the partnership and the outcome of SCM.

Understanding the Roles and Limitations of SNS for Network Social Movements: A Case Study of "Save Jeju Island" Movement in South Korea (네트워크 사회운동과 SNS: Save Jeju Island (SJI) 운동 사례)

  • Chae, Younggil
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.89-102
    • /
    • 2014
  • Since the Arab spring in 2010, SNS prompted discussions about the roles to organize collective actions. First of all, mobile media and SNS help to mobilize both on and offline social movement, second, to create new forms of collective actions, third, to organize social movement organizations across the world, fourth, to empower movement participants to develop new collective identities. On the other hand, the same technologies also hinder social movements from developing continuity and dedication. In addition, the problems of digital divide might aggravate the divisive process to organize collective actions across the world. This research is built on these ongoing arguments about the potentials and limitations of new media technologies. In particular, this research tries to move beyond the confrontational approaches to the media through the case study of Save The Jeju Island social movements on Facebook. The movement SNS on Facebook aims to provide as well as organize international SMOs and activists that might help deeper understandings on the potentials and limitations of online communication strategies for global social movements.

The Effect of Online Community, Members, and Personal Characteristics on Lurking Behavior: Why do people only consume rather than create contents? (온라인 커뮤니티 특성, 커뮤니티 멤버 특성, 개인 특성이 잠복관찰 활동에 미치는 영향:왜 사람들은 쓰지 않고 읽기만 하는가?)

  • Park, Do-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.73-88
    • /
    • 2014
  • Online communities are getting more popular with the development of information technology. It is essential that community members participate actively and share their contents or opinions continuously for the success and growth of online communities. However, it is revealed that most of members just take the role of passive observer. They are lurking community information and contents without any contribution. In this sense, this study focuses on explore lurking behavior of online community members. This study investigates the effect of the characteristics of online community, community members, and personal traits on user's lurking intention. Member familiarity and community identity have a strong positive effect on de-lurking intention, while the perception of usefulness and ease of use for communities and member expertise have a negative effect on de-lurking intention. Interestingly, users with a low level of self-esteem have higher level of motivation of participation than those with a high level of self-esteem. Finally, this study proposes several strategies to enhance information and contents sharing in online communities.

Frame Transmission and Channel Changing Methods of IEEE 802.15.4 Nodes in WiFi Traffic Interference Environment (WiFi 트래픽의 간섭환경에서 IEEE 802.15.4 노드의 프레임 전송 및 채널변경 방법)

  • Song, Myong Lyol
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.179-191
    • /
    • 2014
  • In this paper, a frame transmission method to make IEEE 802.15.4 nodes run at a new channel and its characteristics are studied when they experience difficulties in transmission of frames due to WiFi traffic. The researches on evaluating the interference from WiFi traffic, searching for a new channel with little interference or not, and changing the operating channel are analyzed. In an wireless channel overlapped with IEEE 802.11 network, the transmission delay of IEEE 802.15.4 frames, the collision of frames in sending IEEE 802.15.4 frames without applying CSMA-CA algorithm, and the operation of IEEE 802.11 nodes are explained. A transmission method of frames including frame-formated code blocks in order to use the rest part of collided IEEE 802.15.4 frame is proposed. In the experiments of the proposed method, it is observed that frame-formated code blocks are synchronized and received by receivers in case of collision, and then the collided positions in IEEE 802.15.4 frame and the characteristics of frame reception rate are analyzed. The experimental results show that the performance of the proposed method is improved in comparison to an existing method when we measure the time taken to send a channel change command and get the response in order to avoid the interference from WiFi traffic.