• Title/Summary/Keyword: Distributed Server

Search Result 849, Processing Time 0.024 seconds

Design md Implementation for the Remote Real Time Process Monitoring and Control System based on the JMF (JMF 기반의 실시간 원격 공정 감시 및 제어 시스템 설계 및 구현)

  • Kim, Sam-Ryong;Lim, In-Taek;Lee, Jeong-Bae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.453-460
    • /
    • 2004
  • In this thesis, remote conveyor control and monitoring system is designed and Implemented for shoes production process based on Lego prototyping mechanism by using the I/O interface control board for the ISA Interface control board. A conveyor server for real time profess control is implemented based on RTLinux(Real-Time Linux) so that users deride priority of work. And device driver is implemented bated on the RTLinux. Through this system, real-time Client/server monitoring environments Is implemented and tested. And the JMF(Java Media Framework) based monitoring system was implemented and the total processing status war monitored.

An Adaptive Server Clustering for Terminal Service in a Thin-Client Environment (썬-클라이언트 환경에서의 터미널 서비스를 위한 적응적 서버 클러스터링)

  • Jung Yunjae;Kwak Hukeun;Chung Kyusik
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.582-594
    • /
    • 2004
  • In school PC labs or other educational purpose PC labs with a few dozens of PCs, computers are configured in a distributed architecture so that they are set up, maintained and upgraded separately. As an alternative to the distributed architecture, we can consider a thin-client computing environment. In a thin-client computing environment, client side devices provide mainly I/O functions with user friendly GUI and multimedia processing support whereas remote servers called terminal server provide computing power. In order to support many clients in the environment, a cluster of terminal servers can be configured. In this architecture, it is difficult due to the characteristics of terminal session persistence and different pattern of computing usage of users so that the utilization of terminal server resources becomes low. To overcome this disadvantage, we propose an adaptive terminal cluster where terminal servers ,ire partitioned into groups and a terminal server in a light-loaded group can be dynamically reassigned to a heavy-loaded group at run time. The proposed adaptive scheme is compared with a generic terminal service cluster and a group based non-adaptive terminal server cluster. Experimental results show the effectiveness of the proposed scheme.

A synchronized mobile agent in Distributed Database Environments (분산 DB 환경에서 동기화 이동에이전트)

  • Kook, Youn-Gyou;Kim, Woon-Yong;Jung, Gye-Dong;Kim, Yung-Chul-R.;Choi, Yung-Keun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.313-320
    • /
    • 2003
  • This paper design and implements a synchronized agent mechanism that be able to synchronize SFT (Slow Frequency Transaction) data among e-business processes in distributed environment. This synchronized agent system is adopted to use mobile agent to guarantee the interoperability of the distributed processes and to solve some problems at the client/server architecture and proposes a policy to synchronize data of e-business processes on the any platforms of distributed heterogeneous systems. The proposed synchronization policy is based on the time-stamp transaction with the system priority on the unicasting transportation.

Design and Implementation for A Scalable Web-Based Distributed Simulator (확장성을 갖는 웹 기반 분산 시뮬레이터의 구현 및 설계)

  • Kim, Jong-Eun
    • Journal of Korea Game Society
    • /
    • v.2 no.1
    • /
    • pp.42-48
    • /
    • 2002
  • Many web-based simulation environments have been proposed to create models and execute simulation through the Web. Although web-based simulation has the advantage of utilizing many computers connected to Internet, overhead of the web server and heavy traffic caused by Java RMI degrade the performance and scalability of simulation. In this paper, we design and implement web-based distributed simulator using Java for the scalability and performance. In addition, we can apply the proposed simulator to create model server and client engines in online game. We apply the proposed simulator to simulate ATM switch queueing model.

  • PDF

Design and Implementation of the Educational System based on the Distributed Virtual Environment using VRML and EAI (VRML과 EAI를 이용한 분산 가상환경 기반 교육 시스템의 설계 및 구현)

  • 이신걸;전희성
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.1
    • /
    • pp.14-22
    • /
    • 2000
  • We have designed and implemented an educational system based on the distributed virtual environment. The developed system has a client-server architecture: the platform-independent server is implementes by Java machine and the client is composed of VRML, EAI, and general web browser. If a change occurs in this virtual environment, all connected users can perceive the updated environment immediately. the system maintains its virtual environment after it is modified by a user. Also, the system can accommodate many users by minimizing the information exchange. Since users can share multimedia information and virtual objects by overcoming the limitation of time and space, the educational effects can be progressed through the use of the developed system.

  • PDF

Implementation of OpenGIS-based middleware using CORBA (CORBA를 이용한 OpenGIS 기반 미들웨어 구현)

  • An, Kyoung-Hwan;Cho, Dae-Soo;Hong, Bong-Hee
    • Journal of Korea Spatial Information System Society
    • /
    • v.1 no.1 s.1
    • /
    • pp.19-28
    • /
    • 1999
  • The focus is moving from the problem of building data to the problem of accessing and efficient utilization of data fitting to the purpose of a user. A distributed technology and a standard of geodata and geoprocessing is needed to satisfy these needs. This paper suggests an implementation method of a standard interface defined by OpenGIS with CORBA which is a distributed object technology. A client can invoke Open API of the middleware implemented with CORBA through IIOP. CORBA server objects which provide a client with Open API is the essence of an interoperability. CORBA server objects wrap the data formats and access methods of different GIS engines, and translate the data formats of different data servers to a standard data format.

  • PDF

Development of Big-data Management Platform Considering Docker Based Real Time Data Connecting and Processing Environments (도커 기반의 실시간 데이터 연계 및 처리 환경을 고려한 빅데이터 관리 플랫폼 개발)

  • Kim, Dong Gil;Park, Yong-Soon;Chung, Tae-Yun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.4
    • /
    • pp.153-161
    • /
    • 2021
  • Real-time access is required to handle continuous and unstructured data and should be flexible in management under dynamic state. Platform can be built to allow data collection, storage, and processing from local-server or multi-server. Although the former centralize method is easy to control, it creates an overload problem because it proceeds all the processing in one unit, and the latter distributed method performs parallel processing, so it is fast to respond and can easily scale system capacity, but the design is complex. This paper provides data collection and processing on one platform to derive significant insights from various data held by an enterprise or agency in the latter manner, which is intuitively available on dashboards and utilizes Spark to improve distributed processing performance. All service utilize dockers to distribute and management. The data used in this study was 100% collected from Kafka, showing that when the file size is 4.4 gigabytes, the data processing speed in spark cluster mode is 2 minute 15 seconds, about 3 minutes 19 seconds faster than the local mode.

Design of a Z39.50 Server, and Integration of the Z39.50 Server and Database Engines using COBRA (Z39.50 서버의 설계 및 CORBA를 이용한 Z39.50 서버와 데이터베이스 엔진의 통합)

  • Son, Chung-Beom;Yoo, Jae-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3775-3784
    • /
    • 2000
  • The CORBA presents the method of integrating heterogeneous systems in the distributed environment. In recent, many existing information retrieval servers with Z19.50 protocol have been developed and used in the libraries and companies, etc. The servers construct each database and provide users with various information services. In this paper, we design and implement a Z39.50 server that supports various Z39.50 protocol services over the existing servers. We also integrate various database engines and the Z39.50 server using CORBA. Our Z39.50 server basically provides the init service, the search service, and the close service. In addition, it supports the scan service browsing a term list, the segment service presenting large records, and the explain facility explaining the implementation information of the server.

  • PDF

A Secure Authentication Model Using Two Passwords in Client Server Systems (클라이언트 서버 시스템 환경하에서 2개의 패스워드를 사용하는 안전한 인증 모델)

  • Lee, Jae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1350-1355
    • /
    • 2011
  • It is very important issues to protect many system resources using authorized client authentication in distributed client server systems. So it is not enough to prevent unauthorized opponents from attacking our systems that client authentication is performed using only the client's identifier and password. In this paper, we propose a secure authentication database modeling with two authentication keys such as a client authentication key and a server authentication key. The proposed authentication model can be used making high quality of computer security using two authentication keys during transaction processing. The two authentication keys are created by client and server, and are used in every request transaction without user's extra input. Using the proposed authentication keys, we can detect intrusion during authorized client's transaction processing because we can know intrusion immediately through comparing stored authentication keys in client server systems when hackers attack our network or computer systems.