• Title/Summary/Keyword: Internet server

Search Result 1,960, Processing Time 0.035 seconds

Fair Peer Assignment Scheme for Peer-to-Peer File Sharing

  • Hu, Chih-Lin;Chen, Da-You;Chang, Yi-Hsun;Chen, Yu-Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.709-735
    • /
    • 2010
  • The reciprocal virtue of peer-to-peer networking has stimulated an explosion of peer population and service capacity, ensuring rapid content distribution in peer-to-peer networks. Critical issues such as peer churn, free riding, and skewed workload significantly affect performance results such as service agility, fairness, and resource utilization. To resolve these problems systematically, this study proposes a peer assignment scheme that supports fair peer-to-peer file sharing applications. The proposed scheme exploits the peer duality of both server-oriented peer capacity and client-oriented peer contribution. Accordingly, the system server can prioritize download requests and appropriately assign server peers to uploading file objects. Several functional extensions, including peer substitution and elimination, bandwidth adjustment, and distributed modification, help cope with subtle situations of service starvation and download blocking, and hence make the system design robust and amenable. Simulation results show this design is examined under both centralized and distributed peer-to-peer environments. Performance results confirm that the proposed mechanisms are simple but effective in maintaining service agility and fairness, without loss of overall service capacity in peer-to-peer files sharing systems.

Implementation of A Bridge Monitoring System Based on Ubiquitous Sensor Networks (USN기반의 교량 모니터링 시스템 구현)

  • Lee, Sung-Hwa;Jeon, Min-Suk;Lee, An-Kyu;Kim, Jin-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.1-8
    • /
    • 2009
  • The proposed real-time structural health monitoring(SHM) system in past transferred and received data, central server gathered data from sensors, through coaxial cable. an immense sum of money is required to structure sensor network using coaxial cable. This paper proposes USN-based structural health monitoring(SHM). AIso, this paper designs and realizes prototypes according to proposed SHM. The value of sensing data obtained through HSDPA transfer to the BMS(Bridge Monitoring Server) passing through the TCP / IP socket by building two-way communication system, We have implemented a complete graph converting full system.

  • PDF

Distributed Image Preprocessing using Object Activation (객체 활성화를 이용한 분산 영상처리)

  • Heo, Jin-Kyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.87-92
    • /
    • 2011
  • Server overload is directly proportional to requested image data size in a image processing. If request data are increase then system is overloaded in a image processing system. For the reduce of server bottle neck, we will be able to consider a distributed processing. Simple distributed processing system can solve server bottleneck and system overload but high cost system requirements. In this paper, Proposes a new distributed image processing system. Object activation technology are being grafted on to simple distributed processing system. It can optimize the user of system resources and can reuse idle system resources in network.

SysWatcher: A Tool for Measuring the Utilitization of Internet-Connected Local Computing Systems (시스와쳐: 인터넷에 연결된 구내전산시스템의 활용도 분석기)

  • 노상호;김상연;양희재
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.344-349
    • /
    • 1999
  • As the computing environment in a typical organization has changed rapidly an Internet-connected client/server system, new tools to measure the utilization of such system are becoming increasingly important. Most of contemporary performance measuring tools are based on the old computing models, such as the centralized server model or the networked server model. In this paper, we present a tool, railed SysWatcher, which is based on the latest computing paradigm.. What is to be analyzed in the new computing environment and flow can achieve it by using SysWatcher, as well as its detailed design concept, are presented.

  • PDF

Future Trends of IoT, 5G Mobile Networks, and AI: Challenges, Opportunities, and Solutions

  • Park, Ji Su;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.743-749
    • /
    • 2020
  • Internet of Things (IoT) is a growing technology along with artificial intelligence (AI) technology. Recently, increasing cases of developing knowledge services using information collected from sensor data have been reported. Communication is required to connect the IoT and AI, and 5G mobile networks have been widely spread recently. IoT, AI services, and 5G mobile networks can be configured and used as sensor-mobile edge-server. The sensor does not send data directly to the server. Instead, the sensor sends data to the mobile edge for quick processing. Subsequently, mobile edge enables the immediate processing of data based on AI technology or by sending data to the server for processing. 5G mobile network technology is used for this data transmission. Therefore, this study examines the challenges, opportunities, and solutions used in each type of technology. To this end, this study addresses clustering, Hyperledger Fabric, data, security, machine vision, convolutional neural network, IoT technology, and resource management of 5G mobile networks.

A Sufferage offloading tasks method for multiple edge servers

  • Zhang, Tao;Cao, Mingfeng;Hao, Yongsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3603-3618
    • /
    • 2022
  • The offloading method is important when there are multiple mobile nodes and multiple edge servers. In the environment, those mobile nodes connect with edge servers with different bandwidths, thus taking different time and energy for offloading tasks. Considering the system load of edge servers and the attributes (the number of instructions, the size of files, deadlines, and so on) of tasks, the energy-aware offloading problem becomes difficult under our mobile edge environment (MCE). Most of the past work mainly offloads tasks by judging where the job consumes less energy. But sometimes, one task needs more energy because the preferred edge servers have been overloaded. Those methods always do not pay attention to the influence of the scheduling on the future tasks. In this paper, first, we try to execute the job locally when the job costs a lower energy consumption executed on the MD. We suppose that every task is submitted to the mobile server which has the highest bandwidth efficiency. Bandwidth efficiency is defined by the sending ratio, the receiving ratio, and their related power consumption. We sort the task in the descending order of the ratio between the energy consumption executed on the mobile server node and on the MD. Then, we give a "suffrage" definition for the energy consumption executed on different mobile servers for offloading tasks. The task selects the mobile server with the largest suffrage. Simulations show that our method reduces the execution time and the related energy consumption, while keeping a lower value in the number of uncompleted tasks.

A Study on Finding Emergency Conditions for Automatic Authentication Applying Big Data Processing and AI Mechanism on Medical Information Platform

  • Ham, Gyu-Sung;Kang, Mingoo;Joo, Su-Chong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2772-2786
    • /
    • 2022
  • We had researched an automatic authentication-supported medical information platform[6]. The proposed automatic authentication consists of user authentication and mobile terminal authentication, and the authentications are performed simultaneously in patients' emergency conditions. In this paper, we studied on finding emergency conditions for the automatic authentication by applying big data processing and AI mechanism on the extended medical information platform with an added edge computing system. We used big data processing, SVM, and 1-Dimension CNN of AI mechanism to find emergency conditions as authentication means considering patients' underlying diseases such as hypertension, diabetes mellitus, and arrhythmia. To quickly determine a patient's emergency conditions, we placed edge computing at the end of the platform. The medical information server derives patients' emergency conditions decision values using big data processing and AI mechanism and transmits the values to an edge node. If the edge node determines the patient emergency conditions, the edge node notifies the emergency conditions to the medical information server. The medical server transmits an emergency message to the patient's charge medical staff. The medical staff performs the automatic authentication using a mobile terminal. After the automatic authentication is completed, the medical staff can access the patient's upper medical information that was not seen in the normal condition.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

The Study of Ethernet Communication Using 3100A (W3100A를 이용한 Ethernet 통신에 대한 연구)

  • Kwon, Hae-Young;Jo, Heung-Kuk
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.321-326
    • /
    • 2005
  • 근거리 통신망 LAN(Local Area Network)는 일반적으로 회사, 학교, PC방에서 널리 사용하는 통신 방식으로 Serial, USB 통신방식과 더불어 반드시 습득해야 할 프로토콜 중의 하나로서 앞으로는 이러한 LAN 통신방식을 이용하여 모든 가전기기, 회사 내의 보안장치 등이 모두 유무선 복합적으로 연결되어 휴대폰 또는 PDA로 상태변화를 실시간으로 확인이 가능한 시대가 올 것이다. 본 논문에서는 LAN LSI인 W3100A를 분석해 보고, MCU(Atmega128)과 Phycei ver인 RTL8201과 Interface하여 회로를 구성한 다음, TCP Client 역할을 위한 MCU Programming을 하여 .NET으로 Server 프로그램을 만들어 Server에 데이터를 전송한다. 이와 같이 MCU(Atmega128)을 사용하여 들어온 데이터를 Ethernet Network상으로 데이터의 전송을 가능하게 하는 Ethernet 통신 시스템을 연구하였다.

  • PDF

WWW Based Instruction Systems for English Learning: GAIA

  • Park, Phan-Woo
    • Journal of The Korean Association of Information Education
    • /
    • v.3 no.2
    • /
    • pp.113-119
    • /
    • 2000
  • I studied a distance education model for English learning on the Internet. Basic WWW files, that contain courseware, are constructed with HTML, and functions, which are required in learning, are implemented with Java. Students and educators can access the preferred unit composed of the appropriate text, voice and image data by using a WWW browser at any time. The education system supports the automatic generation facility of English problems to practice reading and writing by making good use of the courseware data or various English text resources located on the Internet. Our system has functions to manage and control the flow of distance learning and to offer interaction between students and the system in a distributed environment. Educators can manage students' learning and can immediately be aware of who is attending and who is quitting the lesson in virtual space. Also, students and educators in different places can communicate and discuss a topic through the server. I implemented these functions, which are required in a client/server environment of distance education, with the use of Java. The URL for this system is "http://park.taegu-e.ac.kr" in the name of GAIA.

  • PDF