• Title/Summary/Keyword: Legacy Service

Search Result 230, Processing Time 0.028 seconds

A Empirical Study on Applying Ubiquitous Technology for Gas Safety Management (U-기반 가스안전관리의 기술을 적용을 위한 실증적 연구)

  • Oh, Jeong-Seok;Choi, Kyung-Suhk;Kwon, Jeong-Rock
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.2
    • /
    • pp.63-68
    • /
    • 2008
  • The ubiquitous technology is capable of innovating various area to constructing intelligent and network to all objects. This technology can construct network infrastructure to facilities for applying legacy industry and need to develop intelligent service that analyze context-aware through network. This paper derive and propose the introduction range of ubiquitous technology, which should be testified and analyzed network, and studied the detection and analysis of information for managing gas facilities. We investigate the current status of gas facilities and automatic reading system, testing and analyzing wireless personal area network and mobile communication by scalability, self-configuration, connection in underground. Furthermore, we propose modelization method for intelligent service and derive the introduction range for applying ubiquitous technologies for managing gas facilities.

  • PDF

Resource Management System for Multimedia Service in Wireless Mobile Networks (무선 이동 통신망에서의 멀티미디어 서비스를 위한 자원 제어 시스템)

  • Lee, Won-Yeoul
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1153-1164
    • /
    • 2007
  • One of the most challenging technical issues in mobile communication for multimedia is Quality of Service (QoS) management of handover calls. This paper proposes a 2-level handover control system to copy with this problem. A 2-level handover control system consists of resource reservation and call admission control modules. The resource reservation module divides the network resource into Hard and Soft reserved resource. The Hard reserved resource is only for the handover calls while the Soft reserved resource is for both the handovers and the new calls. And also, the resource reservation module classifies handovers into primary and secondary handovers based on often they occur. The call admission control module deals with the primary and secondary handover calls in different ways. The new calls can use Soft reserved resource only if there is sufficient amount available in the Hard reserved resource. Proposed system is evaluated using an M/M/c/c queueing model. It is shown that proposed system allows more efficient utilization of network resource without degrading QoS comparing with the legacy handover control systems.

  • PDF

A Method for Migrating Object-Oriented Systems into SOA Services (객체지향 시스템에서 SOA서비스로의 전이 기법)

  • Kim, Ji-Won;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.1
    • /
    • pp.25-40
    • /
    • 2010
  • Service-Oriented Architecture (SOA) is a development paradigm for reusing services as an independent reuse unit. A service delivers a cohesive functionality through its external interface. Since services have unique characteristics which are not typically presented in conventional development approaches, there is a demand for effective approaches to developing services. Most of the current SOA methodologies presenta process where services are designed and developed from the requirements rather than reusing existing assets, which demands high cost and effort. Hence, a desirable approach is to be able to develop services by migrating from their existing legacy systems such as object-oriented system. A difficulty in this migration is that objects in object-oriented systems reveal characteristics which differ considerably from those of services. That is, objects are designed without considering commonalities among several consumers. In this paper, we first define mapping relationships between key artifacts in object-oriented system and those in SOA services. By these relationships and considering commonalities among several applications in a domain, we propose three systematic methods to migrate from object-oriented system to SOA services. Each method consists of a list of input and output artifacts and detailed guidelines which are performed in order. Through these methods, service developers can easily develop services with less effort.

Conceptual Design of Networking Node with Real-time Monitoring for QoS Coordination of Tactical-Mesh Traffic (전술메쉬 트래픽 QoS 조율을 위한 네트워킹 노드의 개념 설계 및 실시간 모니터링)

  • Shin, Jun-Sik;Kang, Moonjoong;Park, Juman;Kwon, Daehoon;Kim, JongWon
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • With the advancement of information and communication technology, tactical networks are continuously being converted to All-IP future tactical networks that integrate all application services based on Internet protocol. Futuristic tactical mesh network is built with tactical WAN (wide area network) nodes that are inter-connected by a mesh structure. In order to guarantee QoS (quality of service) of application services, tactical service mesh (TSM) is suggested as an intermediate layer between infrastructure and application layers for futuristic tactical mesh network. The tactical service mesh requires dynamic QoS monitoring and control for intelligent QoS coordination. However, legacy networking nodes used for existing tactical networks are difficult to support these functionality due to inflexible monitoring support. In order to resolve such matter, we propose a tactical mesh WAN node as a hardware/software co-designed networking node in this paper. The tactical mesh WAN node is conceptually designed to have multi-access networking interfaces and virtualized networking switches by leveraging the DANOS whitebox server/switch. In addition, we explain how to apply eBPF-based traffic monitoring to the tactical mesh WAN node and verify the traffic monitoring feasibility for supporting QoS coordination of tactical-mesh traffic.

Multicore Flow Processor with Wire-Speed Flow Admission Control

  • Doo, Kyeong-Hwan;Yoon, Bin-Yeong;Lee, Bhum-Cheol;Lee, Soon-Seok;Han, Man Soo;Kim, Whan-Woo
    • ETRI Journal
    • /
    • v.34 no.6
    • /
    • pp.827-837
    • /
    • 2012
  • We propose a flow admission control (FAC) for setting up a wire-speed connection for new flows based on their negotiated bandwidth. It also terminates a flow that does not have a packet transmitted within a certain period determined by the users. The FAC can be used to provide a reliable transmission of user datagram and transmission control protocol applications. If the period of flows can be set to a short time period, we can monitor active flows that carry a packet over networks during the flow period. Such powerful flow management can also be applied to security systems to detect a denial-of-service attack. We implement a network processor called a flow management network processor (FMNP), which is the second generation of the device that supports FAC. It has forty reduced instruction set computer core processors optimized for packet processing. It is fabricated in 65-nm CMOS technology and has a 40-Gbps process performance. We prove that a flow router equipped with an FMNP is better than legacy systems in terms of throughput and packet loss.

FaST: Fine-grained and Scalable TCP for Cloud Data Center Networks

  • Hwang, Jaehyun;Yoo, Joon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.762-777
    • /
    • 2014
  • With the increasing usage of cloud applications such as MapReduce and social networking, the amount of data traffic in data center networks continues to grow. Moreover, these appli-cations follow the incast traffic pattern, where a large burst of traffic sent by a number of senders, accumulates simultaneously at the shallow-buffered data center switches. This causes severe packet losses. The currently deployed TCP is custom-tailored for the wide-area Internet. This causes cloud applications to suffer long completion times towing to the packet losses, and hence, results in a poor quality of service. An Explicit Congestion Notification (ECN)-based approach is an attractive solution that conservatively adjusts to the network congestion in advance. This legacy approach, however, lacks scalability in terms of the number of flows. In this paper, we reveal the primary cause of the scalability issue through analysis, and propose a new congestion-control algorithm called FaST. FaST employs a novel, virtual congestion window to conduct fine-grained congestion control that results in improved scalability. Fur-thermore, FaST is easy to deploy since it requires only a few software modifications at the server-side. Through ns-3 simulations, we show that FaST improves the scalability of data center networks compared with the existing approaches.

Measurement Scheme for One-Way Delay Variation with Detection and Removal of Clock Skew

  • Aoki, Makoto;Oki, Eiji;Rojas-Cessa, Roberto
    • ETRI Journal
    • /
    • v.32 no.6
    • /
    • pp.854-862
    • /
    • 2010
  • One-way delay variation (OWDV) has become increasingly of interest to researchers as a way to evaluate network state and service quality, especially for real-time and streaming services such as voice-over-Internet-protocol (VoIP) and video. Many schemes for OWDV measurement require clock synchronization through the global-positioning system (GPS) or network time protocol. In clock-synchronized approaches, the accuracy of OWDV measurement depends on the accuracy of the clock synchronization. GPS provides highly accurate clock synchronization. However, the deployment of GPS on legacy network equipment might be slow and costly. This paper proposes a method for measuring OWDV that dispenses with clock synchronization. The clock synchronization problem is mainly caused by clock skew. The proposed approach is based on the measurement of inter-packet delay and accumulated OWDV. This paper shows the performance of the proposed scheme via simulations and through experiments in a VoIP network. The presented simulation and measurement results indicate that clock skew can be efficiently measured and removed and that OWDV can be measured without requiring clock synchronization.

An Efficient Network Management System using The Smart Router (스마트 라우터를 사용한 효율적인 네트워크 관리 시스템)

  • Park Moon-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.253-260
    • /
    • 2005
  • Active networks not only allows the network nodes, switches or routers. to perform routing and forwarding but so allows their users inject customized programs into the nodes of the network or the packets. that may modify, store or redirect the user data flowing through the network. In this paper, we proposed a new network management system built using active network technology, that can solve problems inherent in most of existing legacy centralized network management systems. The main contribution is to present the Smart Router model that can reduce traffics due to managing networks by way of making control packets into simplified patterns. The disadvantages of the centralized network management are presented and the current solution for distributed network management are discussed. The performance improvements that our architecture offers are showed through a service example experiment.

  • PDF

Design and Implementation of Security Frame work for Application Server with Components

  • 김행곤;강전근
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.4
    • /
    • pp.531-540
    • /
    • 2004
  • Development of Web service application requires the interoperability between various heterogeneous systems, extensibility to allow modification of business environment not of user interface, maintainability, flexibility and reusability As the properties of CBD (Component Based Development) have gradually become clear, attention has started to turn the smooth technology and methodology to solve the existing problems and issues the dynamic responds for the distributed web environments. In this paper, we identify some of the major architectural affecting CBD and describe the Design and Implementation of Security Framework for Application Server with Components. We identify the candidate components, model it using UML and layer it on the architecture. The frameworks will Provide the various security functions, such as incorporating with legacy security systems, supporting of J2EE, JAAS and Kerberos and assisting in increasing the tailorability of component.

  • PDF

Designing of Smart WAMAC Infra Architecture based on Synchro-Phasor (Synchro-Phasor 기반의 Smart WAMAC 인프라 아키텍쳐 설계)

  • Kim, Ji-Young;Woo, Doug-Je;Kim, Sang-Tae;Choi, Mi-Hwa;Kim, Yong-Kwang
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.9
    • /
    • pp.1549-1559
    • /
    • 2010
  • Modern power system is operated and managed in closed network environment with treating a great variety of data, and requirement of real time power system data is more increasing. However, it is difficult for operators to fast evaluate the condition of power system using only isolation network system such as SCADA or EMS regarding unexpecting situations occurring. Recent technology achievement in areas of distributed computing, networking high speed communications and digital control as well as the availability of accurate GPS time source are rapidly becoming the enabling factors for the development of a new generation of real time power grid monitoring tools. In this paper, architecture of WAMAC which is the wide area monitoring and control system not only to control but also to monitoring in real time is proposed and the plan of integration interface with legacy system such as EMS for providing power system analysis base data effectively is suggested.