• Title/Summary/Keyword: Reliable Internet Service

Search Result 186, Processing Time 0.026 seconds

Development of an Integrated IoT System for Searching Dependable Device based on User Property (사용자 요소 기반의 신뢰성 있는 기기 탐색을 위한 사물인터넷 통합 시스템 개발)

  • Ryu, Shinhye;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.791-799
    • /
    • 2017
  • With the development of the internet of things, sensor and device are can be applied to various scenario. Overall improving of the dependability index of internet of things is the ultimate goal. And reliability aims to increase the success rate of internet of things service delivery. Many studies about internet of things system have been made on the system to assess a dependability for providing reliable service to user, but it has difficult to reflect the user context for evaluating the device reliability. Also, most do not consider the availability of content information. In this paper, it proposed dependable device searching system in the internet of things environment. This system evaluates device dependability based on device status and measured data. Through the proposed system, it can be provided reliable context information for user-centric service.

Influence of User's Behavior about Delay on Media Server

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1150-1158
    • /
    • 2010
  • At present multimedia service composed of voice, data, and video service is prevalent in the Internet. As such, wide-scale penetration of Internet service imposes tremendous pressure to the network infrastructure such as the media servers and links as well as the nodes. In addition, users from a large-scale population require broad bandwidth and high level of QoS. This requires a network with reliable and scalable services to customers, which also necessitates a realistic method for the design of the a media server. In this work, we explore the influence of user's behavior about delay on the performance of media server that takes into account the system and user attributes in a realistic manner. By incorporating user's behavior about the delay-sensitivity, we present an analytic framework for the evaluation of the performance of the media server, via which we illustrate a meaningful intuition in the provision of Internet multimedia service.

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet

  • Lee, Jeong Kyu;Moon, Seo Yeon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.489-501
    • /
    • 2016
  • As interest in the Internet increases, related technologies are also quickly progressing. As smart devices become more widely used, interest is growing in words are missing here like "improving the" or "figuring out how to use the" future Internet to resolve the fundamental issues of transmission quality and security. The future Internet is being studied to improve the limits of existing Internet structures and to reflect new requirements. In particular, research on words are missing here like "finding new forms of" or "applying new forms of" or "studying various types of" or "finding ways to provide more" reliable communication to connect the Internet to various services is in demand. In this paper, we analyze the security threats caused by malicious activities in the future Internet and propose a human behavior analysis-based security service model for malware detection and intrusion prevention to provide more reliable communication. Our proposed service model provides high reliability services by responding to security threats by detecting various malware intrusions and protocol authentications based on human behavior.

JACE: A Reliable Group Communication System over the Internet (JACE: 인터넷 환경을 지원하는 신뢰성 있는 그룹통신 시스템)

  • Mun, Nam-Du;An, Geon-Tae;Yu, Yang-U;Lee, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3379-3389
    • /
    • 1999
  • Important network application services have been rapidly increased along with the growth of the Internet. So, it is desirable for such applications to serve transparently, continuously and safely even if the network is temporally disconnected or certain hosts running those services are crashed down. To satisfy such requirementes, many group communication systems have been developed; but, those systems restrict its range within a single LAN or directly interconnected LAN environments since the communication through the Internet is too slow and too unreliable to support group communication. As of now, it is expected the Internet is going to e sufficiently fast and reliable in the near communication system, named FACE(Java Advanced Communication Environment), supporting Extended Virtual which is a basic communication layer, RPGS(Reliable Process Group Service) which manages application process groups, and JACE API for developing Java application services and clients programs. In addition, an experimental replicated object space is developed as an application of the JACE system.

  • PDF

An Integrated Method for Application-level Internet Traffic Classification

  • Choi, Mi-Jung;Park, Jun-Sang;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.838-856
    • /
    • 2014
  • Enhanced network speed and the appearance of various applications have recently resulted in the rapid increase of Internet users and the explosive growth of network traffic. Under this circumstance, Internet users are eager to receive reliable and Quality of Service (QoS)-guaranteed services. To provide reliable network services, network managers need to perform control measures involving dropping or blocking each traffic type. To manage a traffic type, it is necessary to rapidly measure and correctly analyze Internet traffic as well as classify network traffic according to applications. Such traffic classification result provides basic information for ensuring service-specific QoS. Several traffic classification methodologies have been introduced; however, there has been no favorable method in achieving optimal performance in terms of accuracy, completeness, and applicability in a real network environment. In this paper, we propose a method to classify Internet traffic as the first step to provide stable network services. We integrate the existing methodologies to compensate their weaknesses and to improve the overall accuracy and completeness of the classification. We prioritize the existing methodologies, which complement each other, in our integrated classification system.

The Security Considerations for Implementation of Secure and Reliable e-Government (안전하고 신뢰성있는 전자정부 구축을 위한 보안요구사항)

  • 김명은;오승희;정연서;서동일
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.77-83
    • /
    • 2004
  • According as information society has been raised, many countries of the world have taken a lot of interests in e-government implementation. The several guidance countries already have offered people various administrative service and popular enmity service in the Internet conveniently People can use e-government service more conveniently by the Internet, but important personal information or state secret can be leaked in the Internet. Because of these security vulnerabilities, a lot of countries are constructing security infrastructure that can protect personal information. In this paper, we examine e-government construction trends of the several guidance countries, and propose security considerations to provide safe and reliable e-government service.

  • PDF

The Security Requirement for Implementation of Secure and Reliable e-Government (안전하고 신뢰성있는 전자정부 구축을 위한 보안 요구사항)

  • 김명은;오승희;정연서;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.243-249
    • /
    • 2004
  • According as information society has been raised, many countries of the world have taken a lot of interests in e-government implementation. The several guidance countries already have offered people various administrative service and popular enmity service in the Internet conveniently, People can use e-government service more conveniently by the Internet, but important personal information or state secret can be leaked in the Internet. Because of these security vulnerabilities, a lot of countries are constructing security infrastructure that can protect personal information. In this paper, we examine e-government construction trends of the several guidance countries, and propose security considerations to provide safe and reliable e-government service.

  • PDF

A Task Scheduling Strategy in Cloud Computing with Service Differentiation

  • Xue, Yuanzheng;Jin, Shunfu;Wang, Xiushuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5269-5286
    • /
    • 2018
  • Task scheduling is one of the key issues in improving system performance and optimizing resource management in cloud computing environment. In order to provide appropriate services for heterogeneous users, we propose a novel task scheduling strategy with service differentiation, in which the delay sensitive tasks are assigned to the rapid cloud with high-speed processing, whereas the fault sensitive tasks are assigned to the reliable cloud with service restoration. Considering that a user can receive service from either local SaaS (Software as a Service) servers or public IaaS (Infrastructure as a Service) cloud, we establish a hybrid queueing network based system model. With the assumption of Poisson arriving process, we analyze the system model in steady state. Moreover, we derive the performance measures in terms of average response time of the delay sensitive tasks and utilization of VMs (Virtual Machines) in reliable cloud. We provide experimental results to validate the proposed strategy and the system model. Furthermore, we investigate the Nash equilibrium behavior and the social optimization behavior of the delay sensitive tasks. Finally, we carry out an improved intelligent searching algorithm to obtain the optimal arrival rate of total tasks and present a pricing policy for the delay sensitive tasks.

A Proposal of Fake-free Ranking Method and Its Application : O2O-based Local Information Providing Service

  • Choe, Jong-gak;Lee, Inbok;Kwon, YongJin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.57-64
    • /
    • 2020
  • The widespread use of smartphones with a variety of features has enabled mobile Internet-based services. One of these is online-to-offline (O2O) based services that connects online users with offline stores to add value. Applying this O2O strategy to local information retrieval induces online users to be linked to offline regions, thereby enabling the exchange of local-based information and helps create new value. This paper proposes and illustrates the implementation of O2O-based a local information providing service that utilizes photos of the local attraction. Also, we propose a fake-free ranking method to provide reliable local information to users and suggest its application of the service.

A Design and Implementation of Service Provider Initiated Multicast Middleware for Reliable Multimedia Data Communication (멀티미디어 데이터 통신의 신뢰성 보장을 위한 서비스 제공자 중심의 멀티캐스트 미들웨어 설계 및 구현)

  • Kim, Moon-Hwa;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.11-18
    • /
    • 2002
  • The IP multicasting service system based on IGMP(Internet Group Management Protocol) is the receiver initiated multicasting system that all receivers must join to and leave from the server of multicasting service. The IGMP is less effective and reliable to apply the education system that all computers of students ore synchronized a teacher's computer. A proposed middle-ware in this paper provides the reliable data transferring and the server initiated multicasting system that client as student's PC is controled by a multicasting server as teacher's PC, This middle-ware is consisted with two major component, The one is the group manager that handle the status informations of members in each group. Another is the reliable sender/receiver that has The transmission protocol based on NAK message and flow control. As the results of the test that 22khz digital voice data and 1024$\times$768 24bit color image data were tested for 30 PCs connected with 100baseT, the voice data was completely without error transferred and the image data was successfully transferred with 0.004% retransmit rate under 2 frames/sec load.

  • PDF