• Title/Summary/Keyword: proxy server system

Search Result 91, Processing Time 0.029 seconds

Transmission of MPEG-4 Stream via Satellite (인공위성을 이용한 MPEG-4 스트림 전송)

  • Lee, Nam-Kyung;Chae, Soo-Hoan
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.4
    • /
    • pp.290-295
    • /
    • 2002
  • In Mpeg-4 system, objects are composed of ES(Elementary Stream). Each of the objects is managed independently by object-based coding and is transmitted via DMIF(Delivery Multimedia Integration Framework). The data streams in Mpeg-4 are transmitted with using DVB-Data Carousel which can improve the reliability and efficiency by cyclic retransmission. This paper describes a system which transmits some part of data stream of Mpeg-4 object with using DVB-Data Carousel to clients via satellite. This also uses a performance enhancing proxy server for reducing round trip time between ground network and satellite.

  • PDF

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

Design of Smart Service based on Reverse-proxy for the Internet of Things (리버스 프록시 기반 IoT 서비스 도메인 설계)

  • Park, Jiye;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.1-6
    • /
    • 2014
  • The IoT (Internet of Things) is considered as a core technology to realize interconnected world. At this, companies composing ICT industry and standard organizations make efforts to accelerate it. IETF CoRE(Constrained RESTful Environment) working group standardized CoAP (Constrained Application Protocol) for the constrained device. CoAP has RESTful architecture and CoAP option is provided to use forward-proxy. The forward-proxy is used to translate protocol and perform requests on behalf of the client. However, communication between Internet based client and LLN(Low-power and Lossy Network) based CoAP server architecture has limitations to deploy real IoT service. In this architecture, problems like response delay, URI assignment and DoS attack can be occurred. To solve these problems, we propose the reverse-proxy based system. We consider both of static IoT and mobility IoT environments. Finally, our proposed system is expected to provide efficient IoT service.

Definition of Performance Indices and Unplementation of Tester for SIP Servers in Next Generation Networks (차세대 방 SIP 서버 시험을 위한 성능 지표 및 시험기 구현)

  • 김용권;박준형;기장근;이규호;최길영;최진규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4B
    • /
    • pp.411-423
    • /
    • 2004
  • This paper defines test methodologies and performance indices for SIP server system, and describes elements that can have influence on the test of SIP network equipments. Moreover, we implement a tester to evaluate the performance of SIP Servers such as Registrar and Proxy server. The performance indices for testing SIP servers are message processing rate, transaction delay, and call success probability. The parameters that can have an effect on the performance of SIP servers are user population, transport protocol, method of database access, method of DNS, call creation pattern, definition of transactions, and size of packets. We tested several SIP servers that act as Registrar, Proxy, and Redirect server using the implemented SIP tester, and, as a result, verified functions of the tester and performance indices and input parameters defined in this paper. Performance indices and methodologies presented in this paper can be used to evaluate SIP servers in NGN

A VoIP System for Secure Support in Next Generation Networks based on SIP (차세대 네트워크환경에서의 보안성 지원을 위한 SIP 기반 VoIP 시스템)

  • Sung, Kyung;Kim, Seok-Hun;Park, Gil-Ha
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2321-2328
    • /
    • 2006
  • Today, SIP standard (The signalling protocol for the Internet phone service) raises to be the standard technique because the expandability is high and complexity is low. It is widely investigated and actively advocated to use Si81a1 ring protocol for SIP in VoIP service. SIP service can be applied even outside the Internet phone service; instance messaging and various multimedia technology are just an example. This paper proposed an embodiment proxy server for rambling support to use JAIN SIP API. It provides standard interface for testing the Proxy server for SIP and embodiment of user agent that transfer instant massaging and voice communication.

Targeting Algorithm for Personalized Message Syndication (개인 맞춤형 메시지 신디케이션을 위한 타겟팅 알고리즘)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.43-49
    • /
    • 2012
  • Personalized message syndication is an important process for maximizing the effect of mobile marketing. This paper proposes an algorithm for determining clients satisfying target conditions in real-time. The proxy server as an intermediate node stores client profiles (gender, age, location, etc) and their respective summaries into a database. When a company syndicates messages at run time, the proxy server maps target conditions expressed by boolean expressions to integer value and determines target clients by comparing target value with profile summary. Thus, this approach provides efficient personalized message syndication in very large systems with millions of clients because it can determine target clients in real-time and work with a traditional database easily.

Context Information and Active Proxy for Mobile GIS Web Service (모바일 GIS 웹 서비스를 위한 컨텍스트 정보와 액티브 프록시)

  • Lee, Hun;Yoo, Sang-Bong
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.2
    • /
    • pp.1-16
    • /
    • 2007
  • Recently the computing environment has been moved to open architectures that include Web technologies. Web Service is one of import component of the new paradigm. This paper presents a design and implementation of GIS Web Service for mobile devices. As many mobile devices are equipped with GPS (Global Positioning System), it is required to handle the position information more effectively. We have extended the proxy program in the client device to actively send the context information to the server. Based on the context information the server determines the optimal service mode to a particular client. A working example of location?based GIS Web Service is also presented. By using Web Service standards and XML messages we can achieve the maximal interoperability for heterogeneous mobile devices.

  • PDF

Distributed Access Privilege Management for Secure Cloud Business (안전한 클라우드 비즈니스를 위한 접근권한 분산관리)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.369-378
    • /
    • 2011
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.

Design of User Authentication System for Secure Support in VoIP Service Environment Based on SIP (SIP 기반 VoIP 서비스 환경에서의 보안성 확보를 위한 사용자 인증 시스템 설계)

  • Kim, Cheol-Joong;Yun, Sung-Yeol;Park, Seok-Cheon
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.461-464
    • /
    • 2008
  • 본 논문에서는 SIP 기반의 VoIP 서비스 환경에서 보안성 확보를 위해 속성인증서를 사용한 사용자 인증 시스템을 설계하였다. Redirect Server와 인증 서버를 각 Proxy Server 사이에 두어 인증서의 발급 및 검증, 사용자의 등록 및 관리 기능을 수행한다. 기존에 인증 시스템은 사용자 인증서가 외부에 노출이 되면 심각한 보안상의 문제가 발생할 수 있지만 속성인증서를 사용하면 외부에 노출에도 강력한 보안을 적용할 수 있다. 이에 본 논문에서는 속성인증서를 인증 서버가 발급과 검증을 하므로 안전한 통신 시스템을 구현할 수 있으며, 서비스 사용자를 Redirect Server에 등록 하게 함으로써 불법사용자의 접근을 제한하고, 정상적인 사용자를 인증하여 사용자의 정보보안 및 올바른 서비스의 제공이나 서비스 이용 요금의 과금시 유용하게 사용될 수 있다.

  • PDF

Dynamic Distributed Adaptation Framework for Quality Assurance of Web Service in Mobile Environment (모바일 환경에서 웹 서비스 품질보장을 위한 동적 분산적응 프레임워크)

  • Lee, Seung-Hwa;Cho, Jae-Woo;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.839-846
    • /
    • 2006
  • Context-aware adaptive service for overcoming the limitations of wireless devices and maintaining adequate service levels in changing environments is becoming an important issue. However, most existing studies concentrate on an adaptation module on the client, proxy, or server. These existing studies thus suffer from the problem of having the workload concentrated on a single system when the number of users increases md, and as a result, increases the response time to a user's request. Therefore, in this paper the adaptation module is dispersed and arranged over the client, proxy, and server. The module monitors the contort of the system and creates a proposition as to the dispersed adaptation system in which the most adequate system for conducting operations. Through this method faster adaptation work will be made possible even when the numbers of users increase, and more stable system operation is made possible as the workload is divided. In order to evaluate the proposed system, a prototype is constructed and dispersed operations are tested using multimedia based learning content, simulating server overload and compared the response times and system stability with the existing server based adaptation method. The effectiveness of the system is confirmed through this results.