• Title/Summary/Keyword: Client Control

Search Result 631, Processing Time 0.024 seconds

Recovery Management of Split-Brain Group in Highly Available Cluster file System $\textrm{SANique}^{TM}$ (고가용성 클러스터 파일 시스템 $\textrm{SANique}^{TM}$의 분할그룹 탐지 및 회복 기법)

  • 이규웅
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.505-517
    • /
    • 2004
  • This paper overviews the design details of the cluster file system $\textrm{SANique}^{TM}$ on the SAN environment. $\textrm{SANique}^{TM}$ has the capability of transferring user data from shared SAN disk to client application without control of centralized file server. We, especially, focus on the characteristics and functions of recovery manager CRM of $\textrm{SANique}^{TM}$. The process component for failure detection and its overall procedure are described. We define the split-brain problem that cannot be easily detected in cluster file systems and also propose the recovery management method based on SAN disk in order to detect and solve the split-brain situation.

  • PDF

Mobile database server management system (모바일 데이트베이스 서버 관리 시스템)

  • Zheng, Bao-Wei;Park, Sang-Gug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.645-648
    • /
    • 2007
  • This paper describes database server management system by mobile device. Our system can control database server immediately in any where by mobile device. We have developed the dataset server CE which interface with mobile device, database management system which rons in mobile device and web services which connect the mobile database with desktop database. External mobile device communicate with web service agent via wireless equipment. Our system includes dataset server CE client engine, web service server agent and mobile device management system. Through the test by an application program, we have confirmed that our system operates very well each others.

  • PDF

An Efficient Selective Encryption of Fingerprint Images for Embedded Processors

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Chung, Kyo-Il
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.444-452
    • /
    • 2006
  • Biometric-based authentication can provide a strong security guarantee of the identity of users. However, the security of biometric data is particularly important as any compromise of the biometric data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting the characteristics of the fingerprint images. Because the fingerprint sensor is computationally limited, a standard encryption algorithm may not be applied to the full fingerprint images in real-time to guarantee the integrity and confidentiality of the fingerprint images transmitted. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a nonce for integrity and to a specific bitplane of each pixel of the fingerprint image for confidentiality. Experimental results show that the integrity and confidentiality of the fingerprint images can be guaranteed without any leakage of the fingerprint ridge information and can be completed in real-time on embedded processors.

  • PDF

IP router-based W-PAN (Wireless Personal Area Network) Authentication Control Technology (IP 공유기 기반 W-PAN(Wireless Personal Area Network) 인증 제어기술 개발)

  • Choi, Jung-In;Lee, Sun-Sook;Lee, Ha-Kyung;Lee, Jun-Hyeong;Jeong, Jung-Su;Young, Hwan-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.311-313
    • /
    • 2013
  • 본 논문에서는 W-PAN 환경에서 IP공유기를 표준설계하고 구현하며 효율적인 실시간 사용자 웹기반 인증 기법을 연구하였다. 또한 W-PAN Device & Service Application 인증과 접근, 권한제어를 위한 인증 Client 모듈과 Server 모듈, Supplicant를 개발하고 제안하였다. 이를 통해 IP 공유기 기반 환경에서의 W-PAN 환경에서 인증 제어 솔루션에 대한 개발로 생산되는 단말기의 서비스 품질을 향상시키고 무선 접속 기술을 표준화 할 수 있다. 또한 유해한 트래픽을 검색하고 보호하는 안정적인 시스템 관리가 가능해졌다. W-PAN Device와 Service Application 인증, 접근 및 권한 제어를 위한 인증 시스템의 플랫폼 구축으로 향후 관련 기술의 통합과 융합 기술을 적용할 수 있는 능력을 확보하였다.

  • PDF

Design and Implementation of Real-Time Satellite Communication Network Management System (실시간 위성통신망 관리 시스템의 설계 및 구현)

  • Kim, Sin-Hong;Chae, Yi-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1198-1206
    • /
    • 1996
  • This paper proposes the functionality of communication network management which operates in central control station of satellite communication network, which will be constructed to DAMA-SCPC ground station using KORE ASAT. And communication network configuration components are classified with hierarchical structure in order to efficiently maintain communication network operation management, and configuration components that are classified into graphic objects and this graphic objects are visualized with tree structure which can be handled uniformally and efficiently. In addition to that, this paper proposes expression method of graphic object to implement our real time communication network management system, and the real time communication net-work management composed as client-server system. The performance of the proposed algorithm is analyzed through the computer simulation.

  • PDF

Utilization of Mediation under KCAB in International Commercial Disputes - Focusing on Comparison with AAA - (국제상사분쟁에서 KCAB 조정의 활용방안 - AAA와의 비교를 중심으로 -)

  • JANG, Eun-Hee
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.77
    • /
    • pp.91-112
    • /
    • 2018
  • Mediation is one of several alternatives to litigation or arbitration. It is the most informal of the alternatives and the only one that gives the parties control over the outcome. The mediator in mediation is there to help the parties persuade each other that it is in their best interests to settle. As several advantages of mediation, it is considered as the fastest way to resolve a dispute because procedures associated with litigation are not imported into the process. In mediation, the client's resources are focused on resolving the dispute as opposed to building armaments of evidence to buttress legal and factual positions. The AAA commercial mediation rules and operations in the USA are very successful owing to professional training for mediators and simple procedures for mediation to the public. Comparison with USA mediation, KCAB mediation system has several weak points. KCAB mainly deals with administrative matters related to Foreign Trade Law. Therefore, it is necessary for KCAB to come up with more improved international commercial mediation. For example, mediation should be promoted to the public as who easily rely on litigation or arbitration. Second, Setting a rule for easy access to mediation is needed by bench marking AAA's mediation guidelines and operations. Third, professional mediators should be developed by establishing relevant ADR course in law schools. This article investigated some differences of mediation system between KCAB in Korea and AAA in USA, and present some suggestions in order to promote International commercial mediation in KCAB.

  • PDF

A Study on Access Authorization Inference Modes for Information Security of Specialized Private Networks (특성화 사설 네트워크 정보보호를 위한 접근권한 추론모드에 관한 연구)

  • Seo, Woo Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.99-106
    • /
    • 2014
  • The most significant change and trend in the information security market in the year of 2014 is in relation to the issue and incidents of personal information security, which leads the area of information security to a new phase. With the year of 2011 as the turning point, the security technology advanced based on the policies and conditions that combine personal information and information security in the same category. Such technical changes in information security involve various types of information, rapidly changing security policies in response to emerging illegal techniques, and embracing consistent changes in the network configuration accordingly. This study presents the result of standardization and quantification of external access inference by utilizing the measurements to fathom the access authorization performance in advance for information security in specialized networks designed to carry out certain tasks for a group of clients in the easiest and most simple manner. The findings will provide the realistic data available with the access authorization inference modes to control illegal access to the edge of a client network.

The Design and Implementation of Automatic Communication System using Mobile Instant Messenger (모바일 인스턴스 메신저를 활용한 자동화 커뮤니케이션 시스템 설계 및 구현)

  • Kim, Tae Yeol;Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.11-21
    • /
    • 2014
  • In this paper, concerning the various advertising and policy advertising of the election with respect to whether to deliver a message to a large number of people, we design and implement an automative system what enables sending the text messages directly from the server to the client and also fast feedback is enabled by utilizing a number of operational programs to connect to the server. Therefore, we design and implement the automative communication system which enables delivering message to each user mobile terminal from a plurality of relay mobile terminals by utilizing the mobile instant messenger, not to deliver a message from the server to the mobile instant messenger user directly. In result of comparative analysis on the number of times of data transmission, this automative communication system utilizing mobile instant messenger shows the result that it enables transmitting five times per minute as it can copy and paste in the automation system regardless of the size of the data loading, otherwise in case of transmitting manually it show the result that the number of times of data transmission is reduced if the size of the data is larger.

Validation of Job Analysis for Hospital HIV/AIDS Nurse Counselor (의료기관 에이즈 상담간호사 직무의 타당성)

  • Baek, Hee Chong;Cho, Hee;Han, Jong Sook
    • Journal of Home Health Care Nursing
    • /
    • v.19 no.2
    • /
    • pp.173-182
    • /
    • 2012
  • The purpose of this study is to identify the appropriateness and validity of the HIV/AIDS nurse counselor's job, and to propose the job description. Mixed method was used: nominal group interview was used as a qualitative research and a survey was used as a quantitative research. Three of the nominal group members evaluated the appropriateness of the duties and tasks. To identify the validity of the evaluated duties and tasks, importance, difficulty and frequency were surveyed by 14 nurses who were working at the hospital as a HIV/AIDS nurse counselors. For the HIV/AIDS nurse counselor, 7 duties and 35 tasks - infection control of the HIV/AIDS, counseling, client advocacy, development of the educational material, referral to the resources, referral services at the hospital, and self-improvement - were identified. Proposed job description will be used as a reference for the role position and the training curriculum of the HIV/AIDS nurse counselors who are working at the hospital.

  • PDF

(An Efficient Transmission Rate Control Algorithm for MPEG VOD Service) (MPEG 동영상 서비스를 위한 효율적인 전송률 조절 알고리즘)

  • 이면재;곽준원;송하윤;박도순
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.8
    • /
    • pp.1027-1038
    • /
    • 2002
  • Multimedia data services have been widely developed with the recent progression of the Internet technology. Multimedia services, especially, must guarantee Quality of Service with restricted environment resources. The abrupt increase of transmission quanta, so called burst, and the number of client that access multimedia server, with limited network bandwidth will demage the quality of service and the utilization of network resource. Smoothing techniques can reduce the burst of a variable bit rate stream by transmitting data at a series of fixed rates. In this paper, we present a new smoothing algorithm using MPEG's characteristics in transmitting stored video data with VBR. The smoothing algorithm we present will be verified with assorted existing techniques in diverse environments.

  • PDF