• 제목/요약/키워드: Network Application

Search Result 5,742, Processing Time 0.033 seconds

Study about implementation of the system management application system that used an ubiquitous sensor network (유비쿼터스 센서 네트워크를 이용한 시스템관리 응용 시스템의 구현에 관한 연구)

  • Nam, Sang-Yep;Lee, Min-Goo;Kang, Jung-Hun;Yoon, Myung-Hyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.116-122
    • /
    • 2007
  • System management application system is one of the most interesting fields in Ubiquitous Sensor Networks. It conforms to the property of Ubiquitous Sensor Networks very well, and it is the closest application for commercial use. We have two kinds of system management technology, such as the one which is accessed by web browser at anytime, anywhere and another one which is for local accessed system. In this paper, our purpose is implementation of system management application system which provides Mesh Sensor Networks topology with IP based agent platform and system management server. Furthermore we introduce the functions used for our recent implementation and propose several future issues about system management application system.

  • PDF

Log-based Wireless Sensor Network Simulator (로그 기반 무선 센서 네트워크 시뮬레이터)

  • Cho, Min-Hee;Son, Cheol-Su;Kim, Won-Jung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.845-848
    • /
    • 2008
  • In case of application test in wireless sensor network, there are many difficulties in power supplying to wireless sensor node, installing and deploying of sensor nodes, maintaining and debugging. For efficient development and maintenance of wireless sensor network-based application, a simulator is essentially needed. However, the existing wireless sensor network simulators are focused to distribution of MAC address, routing, power management, it is not suitable to test the function of application in host which processes message through sink node. In this paper, we designed and implemented a log-based simulator for application running in host connected sink node.

  • PDF

A study on service composition for web caching on active network (액티브네트워크상의 웹 캐싱을 위한 서비스 컴포지션에 관한 연구)

  • 홍성준;이용수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.129-134
    • /
    • 2003
  • This paper describes an application level composition mechanism called Generic Modeling Environment(GME) for web caching on an Application Level Active Network(ALAN). Web caching on an ALAN requires the application level composition mechanism and a service composition to support adaptability for self-organization. ALAN was developed to solve the problems of the network level Active Network(AN) ALAN has the features of both AN as well as mobile agents. The efficient composition mechanism for the existing AN Projects has been supported primarily for the network level AN. Conversely, ALAN lacks support for the application level AN The existing web caching technology is inter-connected in a manually configured hierarchical tree. Since a self-organization system is intended to be adaptive, web caching for self-organization does not involve a manual configuration or any low-level tuning of the individual nodes of the entire system but requires service composition to support adapting intelligence and fault-tolerance to enable self-organization.

  • PDF

Development of a Design Information Sharing System Using Network and STEP (네트워크와 STEP 표준을 이용한 설계 정보 공유 시스템의 개발)

  • Cho, Sung-Wook;Choi, Young;Kwon, Ki-Eok;Park, Myung-Jin;Yang, Sang-Wook
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.15 no.9
    • /
    • pp.82-92
    • /
    • 1998
  • An international standard for the product model data, STEP, and a standard for the distributed object technology, CORBA, will play a very important role in the future manufacturing environment. These two technologies provide background for the sharing of product data and the integration of applications on the network. This paper describes a prototype CAD/CAE environment that is integrated on the network by STEP and CORBA. Several application servers and client software were developed to verify the proposed concept. The present CAD/CAE environments are composed of several individual software components which are not tightly integrated. They also do not utilize the rapidly expanding network and object technologies for the collaboration in the product design process. In the design process in a large organization, sharing of application resources, design data and analysis data through the network will greatly enhance the productivity. The integration between applications can be supported by two key technologies, CORBA(Common Object Request Broker Architecture) and STEP(Standard for the Exchange of Product Model Bata). The CORBA provides interoperability between applications on different machines in heterogeneous distributed environments and seamlessly interconnects distributed object systems. Moreover, if all the data in the CAD/CAE environment are based on the STEP, then we can exclude all the data conversion problems between the application systems.

  • PDF

Load Balancing for Zone Routing Protocol to Support QoS in Ad Hoc Network

  • Chimmanee, Sanon;Wipusitwarakun, Komwut;Runggeratigul, Suwan
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1685-1688
    • /
    • 2002
  • Application Routing Load Balancing (ARLB) is a novel load balancing mode that combines QoS routing and load balancing in per application to support QoS far real-time application based on wired network. Zone Routing Protocol (ZRP) is a recent hybrid proactive/reactive routing approach in an attempt to achieve scalability of ad-hoc network. This routing approach has the potential to be efficient in the generation of control traffic than traditional routing schemes. Up to now, without proper load balancing tools, the ZRP can actually guarantee QoS for delay-sensitive applications when congestion occurred in ad-hoc network. In this paper, we propose the ARLB to improve QoS fur delay-sensitive applications based on ZRP in ad-hoc network when congestion occurred and to be forwarding mechanism fur route coupling to support QoS for real-time applications. The critical point is that the routing metric of ARLB is originally designed for wired network environment. Therefore, we study and present an appropriate metric or cost computation routing of ARLB for recently proposed ZRP over ad-hoc network environment.

  • PDF

Development of Rainfall Forecastion Model Using a Neural Network (신경망이론을 이용한 강우예측모형의 개발)

  • 오남선
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1996.10a
    • /
    • pp.253-256
    • /
    • 1996
  • Rainfall is one of the major and complicated elements of hydrologic system. Accurate prediction of rainfall is very important to mitigate storm damage. The neural network is a good model to be applied for the classification problem, large combinatorial optimization and nonlinear mapping. In this dissertation, rainfall predictions by the neural network theory were presented. A multi-layer neural network was constructed. The network learned continuous-valued input and output data. The network was used to predict rainfall. The online, multivariate, short term rainfall prediction is possible by means of the developed model. A multidimensional rainfall generation model is applied to Seoul metropolitan area in order to generate the 10-minute rainfall. Application of neural network to the generated rainfall shows good prediction. Also application of neural network to 1-hour real data in Seoul metropolitan area shows slightly good predictions.

  • PDF

Analysis of capabilities and application characteristic of AIS

  • Shiyuan, Wang;Kaiyu, Xu;Zhijing, Xu;Wenhua, Hu
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2006.10a
    • /
    • pp.223-229
    • /
    • 2006
  • This paper compares and analyzes the capabilities and application characteristic between the shipborne AIS and ARPA Radar. AIS base station and VTS Radar, give a brief introduction of the AIS base station network's building and application in China, and give a discussion on the information fusion and technology integrated of ATS and ARPA Radar, AIS base station network and VTS Radar.

  • PDF

Performance analysis of IPv4/IPv6 for Internet application services (인터넷 응용 서비스 제공을 위한 IPv4/IPv6의 성능 분석)

  • 김광수;김광현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8B
    • /
    • pp.747-754
    • /
    • 2004
  • The Internet is in the phase of transition of IPv6 and the network equipments based on IPv6 are released. A lot of investments are done in development of network equipments but important thing is service technology. And a various experiments are performed for this service technology. However, the performance measurements of a router between IPv4 and nv6 networks are mainly focused. Therefore, the performance measurement of Internet application services need to be done. In this paper, we show the performance analysis results that the Internet application services are provided regardless of network infra and protocols. As a result, we know that the efficiency of dual networks is lower than the native network for the Internet application services.

A study on unmanned watch system using ubiquitous sensor network technology (유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구)

  • Wee, Kyoum-Bok
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.