• Title/Summary/Keyword: Service Requirement

Search Result 814, Processing Time 0.025 seconds

Implementation of a Cluster VOD Server and an Embedded Client based on Linux (리눅스 기반의 클러스터 VOD서버와 내장형에 클라이언트의 구현)

  • Seo Dongmahn;Bang Cheolseok;Lee Joahyoung;Kim Byounggil;Jung Inbum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.435-447
    • /
    • 2004
  • For VOD systems, it is important to provide QoS to more users under the limited resources. To analyze QoS issues in real environment, we implement clustered VOD server and embedded client system based on the Linux open source platform. The parallel processing of MPEG data, load balancing for nodes and VCR like functions are implemented in the server side. To provide more user friendly interface, the general TV is used for a VOD client's terminal and the embedded board is used supporting for VCR functions. In this paper, we measure the performance of the implemented VOD system under the various user requirement features and evaluate the sources of performance limitations. From these analyses, we propose the dynamic admission control method based on the availability memory and network bandwidth. The proposed method enhances the utilization of the system resource for the more QoS media streams.

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

Fuzzy Closed BCMP Queueing Network Model for Performance Evaluation of Centralized Distributed Processing System (집중형 분산처리시스템의 성능평가를 위한 퍼지 폐쇄형 BCMP 큐잉네트워크모델)

  • Choo, Bong-Jo;Jo, Jung-Bok;Woo, Chong-Ho
    • The KIPS Transactions:PartA
    • /
    • v.9A no.1
    • /
    • pp.45-52
    • /
    • 2002
  • This paper proposes the fuzzy closed RCMP queueing network model using fuzzy set theory for the performance evaluation of centralized distributed processing system with ambiguous system factors in the network environments. This model can derive the measures for system performances such as the job spending time, the system throughput, average job number and server utilizations using fuzzy mean value analysis which can process the fuzzy factors. Computer simulation has been performed centralized distributed system with fuzzy service requirement time for verifying the effectiveness of derived equations of performance evaluation according to the numbers of clients, and the results were analyzed. The proposed model provides more and flexible realistic than performance evaluation of conventional method when we evaluated system performance with ambiguous factors.

A Study on the Facility Eligibility Inspection & Effect of Environment Improvement for National Inpatient Isolation Units (국가지정 입원치료 격리병상 시설적격성 및 환경개선효과 분석에 관한 연구)

  • Lee, Du Ru Na;Kwon, Soon Jung;Sung, Min Ki;Yoon, Hyung Jin;Hong, Jin Kwan
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.23 no.4
    • /
    • pp.67-75
    • /
    • 2017
  • Purpose: This study is for the facility eligibility and improvement evaluation analysis for the patient care environment of 7 facilities which has national inpatient isolation units. Methods: For the evaluation, first of all, the patient care environment of national inpatient isolation units are scrutinized by the checklist which is used on from 2014 with the 4 fields of criteria : architectural planning and layout, general requirement and condition for operating the negative pressured isolated patient room, HVAC system, and waste water discharging system. Finally, the evaluation results are compared with that of 2014. Results: The result shows that the average value of facility eligibility is 89.3 percent and which is 8.9 percent higher than the value before the MERS occurred. Implications: It is clear that facility remodeling of 7 institutions is being performed continuously, and the result of facility eligibility evaluation is reflected on design of a new 21 national inpatient isolation units those are going to be constructed from 2016. Therefore, it is expected that this study is used as a practical reference to establish the criteria of patient care environment management and safety management for both infectious disease outbreak and general service condition.

Hyperspectral Remote Sensing for Agriculture in Support of GIS Data

  • Zhang, Bing;Zhang, Xia;Liu, Liangyun;Miyazaki, Sanae;Kosaka, Naoko;Ren, Fuhu
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1397-1399
    • /
    • 2003
  • When and Where, What kind of agricultural products will be produced and provided for the market? It is a commercial requirement, and also an academic questions to remote sensing technology. Crop physiology analysis and growth monitoring are important elements for precision agriculture management. Remote sensing technology supplies us more selections and available spaces in this dynamic change study by producing images of different spatial, spectral and temporal resolutions. Especially, the hyperspectral remote sensing should do play a key role in crop growth investigation at national, regional and global scales. In the past five years, Chinese academy of sciences and Japan NTT-DATA have made great efforts to establish a prototype information service system to dynamically survey the vegetable planting situation in Nagano area of Japan mainly based on remote sensing data. For such concern, a flexible and light-duty flight system and some practical data processing system and some necessary background information should be rationally made together. In addition, some studies are also important, such as quick pre-processing for hyperspectral data, Multi-temporal vegetation index analysis, hyperspectral image classification in support of GIS data, etc. In this paper, several spectral data analysis models and a designed airborne platform are provided and discussed here.

  • PDF

Architecture of Policy-Based Network Management for Providing Internet Differentiated Service on Mobile IP Environment (이동 IP 환경에서 인터넷 차별화 서비스 제공을 위한 정책기반 네트워크 관리 구조)

  • 강승완;김태경;유상조
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.721-736
    • /
    • 2004
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. Today users want to be provided suitable QoS in the internet since demand of services is variety. The policy-based network management is method which can solve various problems of QoS, security, and complication of management in IP networks. This paper presents the network topology constitution, operation procedure and architecture of policy-based network management for providing internet DiffServ on mobile IP environment. In this paper we propose policy classes of policy-based DiffServ network management on mobile environment and create policy scenarios using the proposed policy description language to represent the policy classes. Finally, we implemented a policy-based DiffServ network management system on mobile IP environment.

  • PDF

A Call Admission Control Algorithm in 3GPP LTE System for Guarantee of Packet Delay (패킷 지연 보장을 위한 LTE 시스템의 호 수락 제어 알고리즘)

  • Bae, Sueng-Jae;Choi, Bum-Gon;Lee, Jin-Ju;Kwon, Sung-Oh;Chung, Min-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.458-467
    • /
    • 2009
  • Long Tenn Evolution (LTE) is the next generation mobile phone technology which has being standardized by the Third Generation Partnership Project (3GPP). In the existing mobile communication networks, voice traffic is delivered through circuit switched networks. In LTE, however, all kinds of traffic are transferred through IP based packet switched networks which has best-effort characteristic. Therefore, providing QoS in LTE system is difficult. In order to provide QoS in LTE, RRM is very important. Especially, in part of RRM, call admission control (CAC) performs an important function to reduce network congestion and guarantee a certain level of QoS for on-going calls. In this paper, we propose a CAC algorithm in order to provide QoS for various kinds of services in LTE system. The performance of the proposed algorithm is evaluated with various simulation environments. The results show that the proposed algorithm provides QoS through rejections of requested calls. Especially, the proposed CAC algorithm can be satisfied with packet delay requirement defined in LTE specification.

A Study on dynamic gateway system for MOST GATEWAY Scheduling Algorithm in MOST25 and MOST150 Networks (MOST25와 MOST150 네트워크에서 효율적인 데이터 전송을 위한 MOST GATEWAY 스케줄링 알고리즘에 관한 연구)

  • Jang, Seong-jin;Jang, Jong-yug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.784-788
    • /
    • 2009
  • In recent years, the driver needs the convenience of their vehicles and that there is an increasing requirement. Many researches have been mainly focused on MOST Networks to provide quality of multimedia service. The MOST network to support different bandwidth(MOST 25, MOST 50, MOST 150) should consist of a heterogeneous network. So the networks to used different protocols required gateway for receive and transmit information. The method to used gateway has problems occured loss of a packet by a lot of delay. Therefore in this paper, we propose a MOST GATEWAY system for organically connected to the network MOST150 and MOST 25. After analyzing the performance of the existing scheduling algorithm, we will present an improvement scheme of the efficiency and scalability.

  • PDF

Security Analysis on the Implementation Vulnerabilities of I-PIN (주민등록번호 대체수단에 대한 구현 취약점 분석)

  • Choi, Youn-Sung;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.145-185
    • /
    • 2007
  • A resident registration number is used to confirm and prove his/her identity in a government/non-governmental agency. It is a essential requirement to become the registered member on internet website in Korea. It is serious problem that the resident registration number and name are outflowed in internet and misused by others. So the MIC(Ministry of Information and Communication) in Korea plans and operates the identification system using I-PIN that integrate 5 alternative methods of resident registration number. In this paper, we analyze the problem about the method of 5 I-PIN services and show the security analysis on the implementation vulnerabilities of I-PIN services. we also analyze 17 websites that provides identification system using I-PIN. Finally, we analyze the overall problem of I-PIN service and propose the countermeasure about the problem.

Design and Implementation of the Cdma2000 EV-DO security layer supporting Hardware using FPGA (FPGA를 이용한 Cdma2000 EV-DO 시큐리티 지원 하드웨어 설계 및 구현)

  • Kwon, Hwan-Woo;Lee, Ki-Man;Yang, Jong-Won;Seo, Chang-Ho;Ha, Kyung-Ju
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.65-73
    • /
    • 2008
  • Security layer of the Cdma2000 1x EV-DO is currently completing standard (C.S0024-A v2.0). Accordingly, a hardware security devices, that allows to implementation requirement of the security layer described in standard document, is required to apply security function about data transferred between AT and AN of then Cdma2000 1x EV-DO environment. This paper represents design of hardware device providing EV-DO security with simulation of the security layer protocol via the FPGA platform. The SHA-1 hash algorithm for certification and service of packet data, and the AES, SEED, ARIA algorithms for data encryption are equip in this device. And paper represents implementation of hardware that applies optionally certification and encryption function after executing key-switch using key-switching algorithm.