• 제목/요약/키워드: access server

Search Result 963, Processing Time 0.026 seconds

Developing Tool of Distributed Application Program Based on Distributed Object Group Framework (분산객체그룹 프레임워크 기반 분산응용 프로그램 개발 도구)

  • Lim Jeong-Taek;Shin Chang-Sun;Joo Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.71-83
    • /
    • 2005
  • In this paper, we developed the Distributed Programming Developing Tool(DPDT) which can make distributed application program efficiency based on the distributed object group framework supporting group management and dynamic binding for object resources requested from clients on distributed systems. The distributed object group framework we constructed provides not only the group register/withdraw, the access right and the name/property services for server objects from a point of view of group management services, but also dynamic binding, replicated object supporting, load balance, and federation among the object groups from a point of view of the supporting services of distributed application, When developing distributed application, by using our tool, server programming developer implements objects in each server system, next registers the properties to need for service provision to the object group. Client programming developer can also develop client program easily by obtaining the access right for the object or the object group and using the properties of objects with the access right permitted to the client. For providing above application developing environment in this paper. we described the definition of object group, the architecture of the distributed object group framework which our tool supports, and its functionalities, then specified the 3 GUI environments of DPDT implemented for providing efficient interfaces between the distributed object group and distributed applications. Finally, by using the DPDT, we showed the group register/withdraw and the access right grant procedure of objects which are server programs, the developing process of client program, and the executing results of the distributed application developed.

  • PDF

A Mechanism of CAS Client Personalization through separating CAS Service of Protocol A.1 on TTA.KO-07.0079 XCAS (TTA.KO-07.0079 XCAS 프로토콜 A.1의 CAS 서비스 분리를 통한 CAS Client 개인화 메커니즘)

  • Kim, Young-Mo;Jang, Eun-Gyeom;Choi, Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.57-66
    • /
    • 2010
  • CAS Client personalization means to issue CAS ID or Key for CAS service, which is Core Technology for CAS operation. Protocol A.1 on TTA.KR-07.0079 XCAS, stores CAS Client personalization data from CAS server in XCAS server, and transmits the personalization data by request of XCAS HOST for CAS Client personalization. However, this may increase Network Traffic and CAS Client image management in XCAS server. In this thesis, to complement this, CAS Client personalization is executed on CAS Server by separating CAS service field. Therefore this can distribute Image management and Network Traffic of XCAS server.

Design and Implementation of IMAP Server Supporting E-mail Address Internationalization(EAI) in a Mobile Environment (모바일 환경에서 다국어 전자 우편 주소 지원을 위한 IMAP 서버 설계 및 구현)

  • Lee, Jin-Kyu;Kim, Kyongsok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.343-348
    • /
    • 2015
  • Due to the need for multilingual e-mail address, EAI Working Group of the IETF has created a wide range of standards associated with e-mail address internationalization(EAI) since 2006. One of the authors and colleagues designed and implemented the mail server, SMTPUTF8, that supports EAI RFC protocols. SMTPUTF8 mail server is composed of new SMTP and POP3 servers supporting EAI RFC protocols. However, SMTPUTF8 did not include a new IMAP server supporting EAI RFC protocol. Recently many people are using smart phones to read and send e-mail messages in a mobile environment. IMAP server is more useful than POP3 server in a mobile environment. Therefore, in this paper, the authors have designed and implemented IMAP server and client app that complies with the IMAP standard (RFC) published by EAI WG of IETF to support multilingual e-mail address. This IMAP server is added to the SMTPUTF8 mail server so that users can access e-mail messages via IMAP client app in a mobile environment.

Implementation and Performance Evaluation of Migration Agent for Seamless Virtual Environment System in Grid Computing Network (그리드 컴퓨팅 네트워크에서 Seamless 가상 환경 시스템 구축을 위한 마이그레이션 에이전트 구현 및 성능 평가)

  • Won, Dong Hyun;An, Dong-Un
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.11
    • /
    • pp.269-274
    • /
    • 2018
  • MMORPG is a role-playing game that tens of thousands of people access it online at the same time. Users connect to the server through the game client and play with their own characters. If the user moves to a management area of another server beyond the area managed by the server, the user information must be transmitted to the server to be moved. In an actual game, the user is required to synchronize the established and the transferred information. In this paper, we propose a migration agent server in the virtual systems. We implement a seamless virtual server using the grid method to experiment with seamless server architecture for virtual systems. We propose a method to minimize the delay and equalize the load when the user moves to another server region in the virtual environment. Migration Agent acts as a cache server to reduce response time, the response time was reduced by 50% in the case of 70,000 people.

CoDes: A Real-Time Collaborative Design System (실시간 원격 협력 설계 시스템 -CoDes)

  • Yang, S.;Choi, Y.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.5 no.1
    • /
    • pp.42-49
    • /
    • 2000
  • This paper presents a solid modeling system that enables real time co-operative modeling and discussion on m between geographically separated designers. The modeling system is implemented using CORBA architecture and integrated in WWW with Java technology. The server objects use a commercial solid modeling kernel to provide modeling features and access database including product model data. The client is implemented using Java2 platform so that enables end-users access the system with web-browsers.

  • PDF

Development of Parts Management System Using Intranet (인트라넷을 이용한 부품관리 시스템 개발)

  • 김정률;박정선;김선호
    • The Journal of Society for e-Business Studies
    • /
    • v.3 no.1
    • /
    • pp.81-94
    • /
    • 1998
  • In Client/Server environments, an employee should be able to access only applications which were assigned to him/her. That makes it difficult to share information among employees. The development of intranet system made it possible to share more information and to access broader information. In this paper, we present a parts management system developed by using Intrabuilder which is an intranet development tool. We intend to suggest a prototype which can guide the development of more delicate and complete parts management systems in the future.

  • PDF

Feasibility study of wireless motion control (Wireless 모션제어의 가능성 연구)

  • Lee, Don-Jin;Ahn, Jung-Hwan
    • Proceedings of the KSME Conference
    • /
    • 2001.06b
    • /
    • pp.82-86
    • /
    • 2001
  • This papers deals with feasibility study of wireless motion control. Wireless telecommunication advances with development of IT technology and extends more and more areas. So we selected Bluetooth out of the technologies(Bluetooth, SWAP(SharedWireless Access Protocol), IrDA(Infra Red Data Association), WLAN(Wireless Local Area Network)) which was developed for local data communication and set up simple experimental system for wireless data transfer and server and client program for wireless data transfer was wrote. We successfully transferred some data wirelessly with this program.

  • PDF

Designing Summary Tables for Mining Web Log Data

  • Ahn, Jeong-Yong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.1
    • /
    • pp.157-163
    • /
    • 2005
  • In the Web, the data is generally gathered automatically by Web servers and collected in server or access logs. However, as users access larger and larger amounts of data, query response times to extract information inevitably get slower. A method to resolve this issue is the use of summary tables. In this short note, we design a prototype of summary tables that can efficiently extract information from Web log data. We also present the relative performance of the summary tables against a sampling technique and a method that uses raw data.

  • PDF

Multi-access Edge Computing Scheduler for Low Latency Services (저지연 서비스를 위한 Multi-access Edge Computing 스케줄러)

  • Kim, Tae-Hyun;Kim, Tae-Young;Jin, Sunggeun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.15 no.6
    • /
    • pp.299-305
    • /
    • 2020
  • We have developed a scheduler that additionally consider network performance by extending the Kubernetes developed to manage lots of containers in cloud computing nodes. The network delay adapt characteristics of the compute nodes were learned during server operation and the learned results were utilized to develop placement algorithm by considering the existing measurement units, CPU, memory, and volume together, and it was confirmed that the low delay network service was provided through placement algorithm.

Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures (비단조 접근 구조를 갖는 CP-ABE 방식)

  • Sadikin, Rifki;Moon, SangJae;Park, YoungHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.21-31
    • /
    • 2013
  • A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control mechanism without a trusted server. We propose an attribute-based access control mechanism by incorporating a CP-ABE scheme to ensure only authorized users can access the sensitive data. The idea of CP-ABE is to include access control policy in the ciphertexts, in which they can only be decrypted if a user possesses attributes that pass through the ciphertext's access structure. In this paper, we prove a secure CP-ABE scheme where the policy can be expressed in non-monotonic access structures. We further compare the performance of our scheme with the existing CP-ABE schemes.