• Title/Summary/Keyword: 클라이언트 제어

Search Result 303, Processing Time 0.032 seconds

A Ring-based Cluster Pure Peer-to-Peer Network Design (Ring을 기반으로 하는 클러스터 순수 Peer-to-Peer 네트웍 설계)

  • Jeon, Sang-Hyun;Gu, Tae-Wan;Jeong, Yeon-Jin;Lee, Kwang-Mo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.275-278
    • /
    • 2001
  • 인터넷의 활용이 급속도로 확산되어지고 사용환경도 점점 고급화가 되어가고 있다. 분산환경에는 네트웍에 연결된 각 Peer 들의 유휴자원을 이용하여 대규모의 데이터를 처리하기 위한 연구와 기존의 클라이언트-서버 환경에서의 부하를 각 Peer들에게 분산시키는 연구가 활발하게 진행되고 있다. 이 연구에서는 서버의 지원이 없는 순수 Peer-to-Peer 환경에서 현재의 Peer 들의 네트웍 구성을 살펴보고 효율적으로 중복된 메시지를 제어하기 위한 Ring-based 클러스터를 통한 네트웍 구성 환경과 클러스터간의 메시지 전파와 대역폭에 따른 클러스터 기법을 제안한다.

  • PDF

A Study on the Monitoring System for Embedded Device Based on the NFS (NFS 기반의 임베디드 장비 모니터링 시스템 설계에 관한 연구)

  • Kim, Soo-Hyun;Han, Ji-Hwan;Bae, Ji-Hye;Bae, Sung-Hwan;Jo, Han-Shin;Park, Yoon-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.899-902
    • /
    • 2004
  • 임베디드 시스템은 현재 가전, 단말, 제어, 통신등 다양한 분야에서 응용되고 있으며 컴퓨터 관련 기술의 발전과 더불어 응용분야는 더욱 넓어질 것이다. 이러한 임베디드 시스템의 관리나 테스트를 위해 모니터링 프로그램이 필요하다. 임베디드 시스템은 일반 PC 시스템과 달리 많은 제약을 가지고 있다. 본 논문에서는 자원적 제약을 가진 임베디드에 활용되어지는 NFS를 이용한 임베디드 장비 모니터링에 적합한 MONETA(distributed MONitoring for Embedded TArget system)를 설계, 구현하였다. MONETA에서 제시하는 구조는 모니터링을 위한 서버, 모니터링하는 대상인 클라이언트, 시스템 사용자의 3계층 구조의 분산 모니터링 시스템으로 각 장비별 CPU, Moemory, Disk, 트래픽량을 그래프로 나타도록 구현된다.

  • PDF

Implementation of Distributed Observer Pattern about SOMAR environment for URC Robot Status Information Monitoring (URC 로봇 상태정보 모니터링을 위한 SOMAR 환경에서의 분산 Observer 패턴 구현)

  • Kim, Sooyeon;Kwak, Donggyu;Choi, Jaeyoung;Yoo, Chae-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.217-218
    • /
    • 2009
  • URC 로봇은 고성능 서버를 통해 로봇이 수행할 서비스의 일부를 외부 디바이스에 분담시킴으로써 저렴한 하드웨어로 로봇을 구현하고자 하는 목적을 가지는 지능형 서비스 로봇이다. SOMAR는 유비쿼터스 환경에서 사용자에게 다양한 원격 로봇 서비스를 제공하기 위한 URC 로봇 미들웨어로, URC 로봇 클라이언트와 이를 등록, 제어, 관리하는 서버로 구성된다. SOMAR 서버를 통해 로봇 서비스를 수행하기 위해서는 로봇 클라이언트의 상태정보를 모니터링하여 수행가능 여부를 판단해야 한다. 본 논문은 이러한 상태정보 모니터링을 위해 R-OSGi를 이용한 분산 Observer 패턴을 구현한다. Observer 패턴은 객체간에 느슨한 결합구조를 가져 URC 로봇 클라이언트 모니터링 프로그램의 개발과 수정이 용이하고, 플러그인 방식의 개발을 통해 다양한 프로그램 설치와 응용이 가능하다.

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class (제한된 내부 네트워크 정보 접근제어와 계층별 클라이언트 권한설정 관리에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.287-293
    • /
    • 2012
  • It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.

Performance Improvement of Channel Access Control Method in Wireless Mesh Networks (무선 메쉬 네트워크에서 성능향상을 위한 채널접속 제어 방법)

  • Lee, Soon-Sik;Yun, Sang-Man;Lee, Sang-Wook;Jeon, Seong-Geun;Kim, Eung-Soo;Lee, Woo-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.572-580
    • /
    • 2010
  • The Wireless Mesh Network uses a wireless communication technology with transmission rates simular to a cable which is used as a backbone networks. The topology structure is in a Mesh form which resembles an Ad-hoc networks. However, a metric is needed in order to set the channel access control method to operate intentions and interior motions are different. In this document, an efficient channel for delivering datas to improve access controls to a wireless mesh networks. The improved performance of the proposed plan is for a hidden and exposed mesh client through an exclusive channels to perform a proposed and analyzed methods.

System Design for the Implementation of Virtual Laboratory (가상 실험실 구현을 위한 시스템 설계)

  • Song Min-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.6
    • /
    • pp.547-554
    • /
    • 2005
  • Virtual Laboratory is the new concept in the field of Control & Measurement as network technology development, it is used in many university and institute nowadays. It is possible to control and measure the instrument in anywhere, anytime by the use of Virtual Laboratory and we can raise the efficiency of experiment. In this paper, we review the concept and necessity of Virtual Laboratory at first and discuss about how we can implement Virtual Laboratory. Then we design framework of Client-Server based Virtual Laboratory fur operating of remote instrument through network, and finally we suggest system model of Virtual Laboratory capable of controlling & monitoring of instrument.

  • PDF

A Study on the Flow Control Based Estimated Receiving Capacity on the Video Conference System (화상회의 시스템에서 수신능력 예측을 이용한 흐름제어에 관한 연구)

  • 김상진;남지승
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.488-495
    • /
    • 2003
  • With the development of networks, multimedia communication has expanded its application field. From the remote control for household electric appliances to medicine, games, video conferencing and multimedia chatting, multimedia communication is being used in all parts of our lives. This multimedia communication requires the transmission of a lot of data at high speed. But if the transmission rate of the communication network exceeds the processing speed of being used in the high speed network environment, a bottleneck occurs in each node and deteriorates the performance of the network. This is the main reason for the slow speed of data transmission and packet loss. In this paper, considering the client's processing performance, reception performance was predicted and the way of flow control was shown. The computing performance of relevant Processor and its performance was estimated through the actual implementation.

  • PDF

Intelligent Surveillance System using Kinect sensor and Multirotor (키넥트 및 멀티로터를 이용한 지능형 감시 시스템)

  • Oh, Jung-hak;Yu, Do-jun;Goo, Ha-neul;Kim, Ho-sung;Kim, Seong-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.541-544
    • /
    • 2012
  • In technology advances, The field of military and security surveillance system for a wide range of interest is required. Surveillance system offers a variety of services by the software that work with a remote access server. This paper shows the results of the implementation using three platforms as Mjpg-streamer for server, Arduino-multiwii for control system, OpenNI and OpenCV for image processing.

  • PDF

Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method (DNS 정보 검색 연동 기법을 이용한 침해 사고 예방 시스템 설계)

  • Kim, Kwang-Sup;Park, Young-Gil;Ro, Soong-Hwan;Kim, Bong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1955-1962
    • /
    • 2012
  • Recently the flow of information security has become a user-centered change. This is mostly breach of security by the normal and abnormal entering harmful files during user internet. Therefore, we would like to design security system that breach of security can be prevented in advance to improve using the reliability of DNS and system control in this paper. In other words, we would like to suggest method can be block randomly to access the site which information security system of user-centric is breached harmful files infected in user computer.

A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare (u-헬스케어 지원 분산 프레임워크에서 접근 제어 모델을 이용한 동적 보안 서비스)

  • Jeong, Chang-Won;Kim, Dong-Ho;Kim, Myung-Hee;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.29-42
    • /
    • 2007
  • This paper describes a security object designed to support a dynamic security service for application services in u-healthcare computing environments in which domains are used to object groups for specifying security policies, In particular, we focus on security object for distributed framework support for u-healthcare including policy, role for security and operations use to access control. And then, by using the DPD-Tool. we showed the access right grant procedure of objects which are server programs, the developing process of client program. Also, we verified the executablility of security service supporting by distributed framework support for u-healthcare use to the mobile monitoring application developing procedure implemented through DPD-Tools.

  • PDF