• Title/Summary/Keyword: Distributed Server

Search Result 848, Processing Time 0.026 seconds

A Study on the Internet Remote Control System in the Distributed Environment (분산환경에 적합한 인터넷 원격제어 시스템에 관한 연구)

  • 엄한성;안병원;김현수;박영산;노영오;김윤식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.301-304
    • /
    • 2003
  • Recently, the development of internet remote control system has been studied lively along with fast growth of internet. In this paper, we proposed the internet-based remote control and monitoring system using java platform. The apache web server that is now used worldwide was constructed for monitoring and controlling of an machine in administrator's web browser. We solved the limitation on security which is the biggest problem of internet control system due to strong security setting in web server. As a result of experiment which is used in the proposed remote internet control system, several time-delay occurred in internet. However, correct control result could be achieved without an error. And this system monitored informations of a RPM, temperature and the other condition in almost real time.

  • PDF

A Duplicate Address Resolution Protocol in Mobile Ad Hoc Networks

  • Lin Chunhung Richard;Wang Guo-Yuan Mikko
    • Journal of Communications and Networks
    • /
    • v.7 no.4
    • /
    • pp.525-536
    • /
    • 2005
  • In an IP-based network, automated dynamic assignment of IP addresses is preferable. In most wired networks, a node relies on a centralized server by using dynamic host configuration protocol (DHCP) to obtain a dynamic IP address. However, the DHCP­based approach cannot be employed in a mobile ad hoc network (MANET) due to the uncertainty of any centralized DHCP server. That is, a MANET may become partitioned due to host mobility. Therefore, there is no guarantee to access a DHCP server. A general approach to address this issue is to allow a mobile host to pick a tentative address randomly, and then use duplicate address resolution (DAR) protocol to resolve any duplicate addresses. In this paper, an innovative distributed dynamic host configuration protocol designed to configure nodes in MANET is presented. The proposed protocol not only can detect the duplicate address, but also can resolve the problem caused by duplicate address. It shows that the proposed protocol works correctly and is more universal than earlier approaches. An enhanced version of DAR scheme is also proposed in this paper to solve the situation of duplicate MAC address. The new and innovative approach proposed in this paper can make the nodes in MANET provide services to other networks and avoid packets from being delivered to incorrect destinations.

Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection

  • Nam, Seung Yeob;Djuraev, Sirojiddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2512-2531
    • /
    • 2014
  • We propose a new Distributed Denial of Service (DDoS) defense mechanism that protects http web servers from application-level DDoS attacks based on the two methodologies: whitelist-based admission control and busy period-based attack flow detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identify bad flows only based on the incoming traffic patterns. The stress is measured by the time interval during which a given client makes the server busy, referred to as a client-induced server busy period (CSBP). We also need to protect the servers from a sudden surge of attack flows even before the malicious flows are identified by the attack flow detection mechanism. Thus, we use whitelist-based admission control mechanism additionally to control the load on the servers. We evaluate the performance of the proposed scheme via simulation and experiment. The simulation results show that our defense system can mitigate DDoS attacks effectively even under a large number of attack flows, on the order of thousands, and the experiment results show that our defense system deployed on a linux machine is sufficiently lightweight to handle packets arriving at a rate close to the link rate.

Design and Implementation of a Content Manager in the Multimedia Steaming Framework (멀티미디어 스트리밍 프레임워크에서 컨텐츠 관리자의 설계 및 구현)

  • Hong, Yeong-Rae;Kim, Hyeong-Il;Lee, Seung-Ryong;Jeong, Byeong-Su;Yun, Seok-Hwan;Jeong, Chan-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2S
    • /
    • pp.733-743
    • /
    • 2000
  • This paper describes design and implementation of a content manager in the Integrated Steaming Framework Architecture (ISSA) that is proposed by the authors. The ISSA can provide an environment to develop multimedia streaming applications under heterogeneous distributed systems. The goal of ISSA is to extend the limitations of existing streaming systems. It can support diverse media formats and high level programming environment for streaming application developers. Moreover, it is independent from underlying networks and operating systems, and compatible with the global real-time multimedia database system(BeeHive) so that streaming media is efficiently retrieved, stored, and serviced. The role of a content manager is important in the ISSA environment since it manages an information of media that are provided by the server, and allow users to access media more easily by means of conveying that information to the streaming server, Web server, and client efficiently. The proposed content manager is not only to meed these requirements, but also to provide streaming information to media source and transport manager in order to be an efficient streaming. Furthermore, it supports database transaction processing by using the database connector.

  • PDF

A Design of Redirection System for Server Selection on the Content Distribution Environment (콘텐츠 분산 환경에서 서버 선택을 위한 리다이렉션 시스템의 설계)

  • Kim, Seon-Ho;Ko, Hoon;Shin, Yongtae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.283-290
    • /
    • 2004
  • With the development of Web technologies, the demand for multimedia contents and network bandwidth is increasing explosively. In this situation, Caching, P2P and CDN are using for fast transmission with low traffic. In this research, we designed and implemented a redirection system for best replica selection where contents are distributed to multiple replicated web servers. This redirection system selects a close and least loaded replica and redirect a client's request to the replica. As a result, this system improved user-perceived performance. It is expected that this redirection system will contribute to the faster and more stable transmission of massive multimedia contents.

Mutual Surveillance based Cheating Detection Method in Online Games (상호 감시 기반의 온라인 게임 치팅 탐지 방법)

  • Kim, Jung-Hwan;Lee, Sangjin
    • Journal of Korea Game Society
    • /
    • v.16 no.1
    • /
    • pp.83-92
    • /
    • 2016
  • An online game is a huge distributed system comprised of servers and untrusted clients. In such circumstances, cheaters may employ abnormal behaviors through client modification or network packet tampering. Client-side detection methods have the merit of distributing the burden to clients but can easily be breached. In the other hand, server-side detection methods are trustworthy but consume tremendous amount of resources. Therefore, this paper proposes a security reinforcement method which involves both the client and the server. This method is expected to provide meaningful security fortification while minimizing server-side stress.

Development of the Remote-Educating Communication Tool using DCOM Voice Module (DCOM 음성 모듈을 이용한 원격 대화식 학습 도구의 개발)

  • Jang, Seung-Ju
    • The KIPS Transactions:PartA
    • /
    • v.10A no.2
    • /
    • pp.173-180
    • /
    • 2003
  • This paper proposes Remote Educating Communication Tool (RECT) that allows students and teachers to communicate using Web-based Bulletin Board System. The distance teaching using DCOM (Distributed Component Object Model) voice module is used to enhance academic accomplishments for students in computer class. The DCOM voice module to be used in distance learning is designed, implemented and applied to teachers and students in the computer class in order to measure and analyze academic results. The RECT server provides Q&A sessions between students and teachers in the BBS using recording and playback functions. The client RECT includes recording and playback functions. The client module of RECT receives and uses DCOM module. When recording, the client transmits voice files with the recorded content to the server.

A Super-Peer Coordination Scheme for Decentralized Peer-to-Peer Networking Using Mobile Agents

  • Chung, Won-Ho;Kang, Namhi
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.38-45
    • /
    • 2015
  • Peer-to-Peer(P2P) systems are generally classified into two categories; hybrid and pure P2P. Hybrid systems have a single central index server keeping the details of shared information, so that undesirable effects such as heavy load on that server and lack of fault-tolerance can be caused. Pure P2P causes the other problems such as message flooding and scalability although it shows high degree of fault-tolerance. Recently, mobile agent-based distributed computing has been receiving wide attention for its potential to support disconnected operations, high asynchrony, and thus saving network bandwidth. In this paper, a new scheme of peer coordination is proposed for a decentralized P2P network with self-organizing structure. We deployed mobile agents for incorporating the advantages of usage of mobile agents into our P2P network. Proposed P2P network has both advantages of hybrid and pure P2P. The problems of heavy load on the server and lack of fault-tolerance are improved by using multiple special peers called super-peers. And the problems of pure P2P can be reduced by using mobile agents.

P2P System for Simultaneous Support of Menu and Social Network Joint Buying Information (메뉴와 소셜 네트워크 공동구매 정보 동시제공 P2P 시스템)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.3
    • /
    • pp.445-449
    • /
    • 2011
  • A P2P technique is the concept to share sources efficiently in distributed environment that is studying a lot. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we suggest a P2P system to support conveniences for users that were connected with the information of joint-buying based on social network. The joint-buying information based on social network is supported by peers using a p2p system and these information to intermediate are supported by a P2P server.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.