• Title/Summary/Keyword: peer communication

Search Result 405, Processing Time 0.024 seconds

Design of an Advanced Kerbros P2P Authentication System to Share Digital Content (디지털 콘텐츠 공유를 위한 개선된 Kerberos P2P 인증시스템 설계)

  • Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1516-1523
    • /
    • 2004
  • In the paper, an algorithm fitted to P2P system was proposed by improving Kerberos which is an algorithm for mutual authentication. To keep the role of Kerberos and minimize load to server, the proposed algorithm imposed the server role of ticket recognition to the opposite peer. Using this method, the number of sewers as ticket recognition server was averted and function of server for authentication was minimized so that server load was mininized. The proposed algorithm enables the server to play the minimum of the role and to perform strong mutual authentication, while imposeing on the peers the role of authentication. To make suitable to P2P system, trial number oriented authentication limit was given, not time-oriented authentication expiration time. In the paper, a new P2P system was designed using this algorithm.

A history-based peer selection algorithm for WebRTC-based P2P-assisted DASH systems (WebRTC 기반 P2P 통신 병용 DASH 시스템을 위한 이력 기반 피어 선택 알고리듬)

  • Choi, Seong Hyun;Seo, Ju Ho;Kim, Sang Jin;Jeon, Jae Young;Kim, Yong Han
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.11a
    • /
    • pp.110-113
    • /
    • 2018
  • 최근 인터넷 미디어 스트리밍 수요의 증가로 인해 CDN(Content Delivery Network) 서버 비용이 크게 증가하였으며 이를 절감하기 위한 방안의 필요성이 날로 증가하고 있다. 이러한 상황에 맞춰 최근 CDN 서버 비용을 절감할 수 있는 WebRTC(Web Real-Time Communication) 표준 기반의 P2P(Peer-to-Peer) 통신을 병용하는 DASH(Dynamic Adaptive Streaming over HTTP) 기술이 등장하였다. 본 논문에서는 이 기술의 CDN 서버 부하 절감 효과를 크게 개선할 수 있는 알고리듬을 제안한다. 또한 실제 모바일 네트워크 환경과 유사하게 실험 조건을 설정한 후, 이 알고리듬을 구현하여 그 성능을 측정한 결과, 기존과 비교하여 더 높은 절감 효과를 달성할 수 있음을 실험실 내 실험을 통해 보인다.

  • PDF

Design of Social Network P2P System based on Agent (에이전트 기반 소셜 네트워크 P2P 시스템 설계)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.1
    • /
    • pp.121-126
    • /
    • 2013
  • In the past several years there has been increasing the studies using P2P technology in the distributed system areas. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we propose the system to support a social network P2P service based on the social network P2P system. The object of this study was to widen the use of this menu system to determine the price based on visual information by a software agent. Therefore, this system is suitable for micro, small and medium industries in the use of P2P servers and is more usable system interface for owners than previous study.

Social Network P2P System based on Visual Information (시각 정보 기반 소셜 네트워크 P2P 시스템)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1103-1108
    • /
    • 2012
  • In the past several years there has been increasing the studies using P2P technology. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we propose the system to support a menu based on the social network P2P system. The object of this study was to widen the use of this menu system to determine the price based on visual information. This system is based on previous research, showing excellent success rate. Therefore, this system is suitable for micro, small and medium industries in the use of P2P servers. This system is more usable than previous study.

The Effect of Organizational Information Security Environment on the Compliance Intention of Employee (조직의 정보보안 환경이 조직구성원의 보안 준수의도에 미치는 영향)

  • Hwang, Inho;Kim, Daejin
    • The Journal of Information Systems
    • /
    • v.25 no.2
    • /
    • pp.51-77
    • /
    • 2016
  • Purpose Organizations invest significant portions of their budgets in fortifying information security. Nevertheless, the security threats by employees are still at large. We discuss methods to reduce security threats that are posed by employees in organization. This study finds antecedent factors that increases or decreases employee's compliance intention. Also, the study suggests organizations' security environmental factors which influences the antecedent factors of compliance intention. Design/methodology/approach The structural equation model is then applied in order to verify this research model and hypothesis. Data were collected on 415 employees working in organizations with an implemented information security policy in South Korea. We analyzed the fitness and validity of the research model via confirmatory factor analysis in order to verify the research hypothesis, then we analyzed structural model, and derived the result. Findings The result shows that organizational commitment and peer behavior increase security compliance intention of employees, while security system anxiety decreases compliance intention. And, organization's physical security system and security communication both have influence on antecedent factors for information security compliance of employees. Our findings help organizations to establish information security strategies that enhance employee security compliance intention.

Autonomous Separation Methodology of Faulted Section based on Multi-Agent Concepts in Distribution System (멀티 에이전트 개념에 기반한 배전계통의 분산 자율적 고장구간 분리 기법)

  • Ko, Yun-Seok;Hong, Dae-Seung;Song, Wan-Seok;Park, Hak-Ryeol
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.6
    • /
    • pp.227-235
    • /
    • 2006
  • In this paper, autonomous separation methodology of faulted section based on network is proposed newly, which can minimize the outage effect as compared with the existing center-based faulted section separation method by determining and separating autonomously the faulted section by the free operation information exchange among IEDs on the feeder of distribution system. The all IEDs is designed in network in which client/server function is possible in order to separate autonomously the faulted section using PtP(Peer to Peer) communication. Also, Inference based solution of IED for the autonomous faulted section separation is designed by rules obtained from the analyzing results of distribution system topology. Here, the switch IEDs transmit on network the fault information utilizing on multi-casting communication method, at the fame time, determine selfly whether they operates or not by inferencing autonomously the faulted section using the inference-based solution after receiving the transmitted information. Finally, in order to verify the effectiveness and application possibility of the proposed methodology, the diversity fault cases are simulated for the typical distribution system.

The Ecological Variables Affecting Adolescent's Sexual Behavior (청소년 성행동에 영향을 미치는 생태학적 변인)

  • Kim, Eun-Hwa;Jeon, Gwee-Yeon
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.7
    • /
    • pp.71-91
    • /
    • 2007
  • We investigated the ecological variables of adolescent sexual behavior. We grouped the behaviors into organism, microsystem, mesosystem, and exosystem. The variables belonging to the organism group were sexual attitude, sex, grade, sexual knowledge, sexual education, dating experience, problem behaviors, and self-control. The microsystem variables included the parent-adolescent communication about sexuality, parental monitoring, parent educational background, friend relationships, and school environment. Moreover, the mesosystem variables included family-peer and family-school relationships. The exosystem variables were comprised of neighborhood environment and pornography. The study group included 369 adolescents from the first and second grade of several high school in Daegu, Korea. We found that the factors affecting adolescent sexual behavior included grade, sex, dating experience, self-control, smoking, and pursuing sexual pleasure. As well, contact with deviant friends, father-adolescent communication about sexuality, school type, and attachment to teacher. In addition the family-peer relationship also affected adolescent's sexual behaviors as well as pornography and neighborhood environment. Lastly the variable belonging to the organism group was found to have the greatest effect on adolescent, sexual behavior compared to the other variables.

The effects of personal and environmental factors on adolescent' self-esteem (개인적 요인 및 환경적 요인이 청소년의 자아존중감에 미치는 영향)

  • 김희화
    • Journal of the Korean Home Economics Association
    • /
    • v.36 no.2
    • /
    • pp.47-60
    • /
    • 1998
  • The effects of personal(gender, physical growth) and environmental(communication with parent, intimacy of friendship, school performance, and satisfaction of school-life) factors on adolescent's self-esteem were examined in a samlpe of 525 first and second grades in middle school. The subdomains of the self-esteem were peer-related self, home self, teacher-related self, academic self, physical appearance self, physical competence self, personality self, and general self. T-test, Pearson's correlation, and regression were used as statistical analysis. Results were as follows. First, there was evidence of a gender difference in the level of the subsdomains of self-esteem: teacher-related, physical-appearance, physical-competence, and personality. Second, the factor which was the most powerful predictor of each subdomain of the self-esteem was as follows 1) the most powerful predictor of the peer-related self was the intimacy of friendship, 2) the most powerful predictor of the home self was the communication with parent, 3) the most powerful predictor of the teacher-related self was the satisfaction of school-life, 4) the most powerful predictor of the academic self was the school performance, 5)the most powerful predictor of the physical-appearance self, the physical competence self, and the personality self was the satisfaction of school-life, 6) the most powerful predictor of the general self was the school performance.

  • PDF

P2P System for Simultaneous Support of Menu and Social Network Joint Buying Information (메뉴와 소셜 네트워크 공동구매 정보 동시제공 P2P 시스템)

  • Kim, Boon-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.3
    • /
    • pp.445-449
    • /
    • 2011
  • A P2P technique is the concept to share sources efficiently in distributed environment that is studying a lot. In these P2P systems, the server to support the contents-information have less overloads than the composed system as the server to have resources generally. In this paper, we suggest a P2P system to support conveniences for users that were connected with the information of joint-buying based on social network. The joint-buying information based on social network is supported by peers using a p2p system and these information to intermediate are supported by a P2P server.

A Study of Collision Avoidance Algorithm Based on Multi-Beacon in the Vehicular Ad-hoc Network (VANET 환경에서 멀티 비콘을 적용한 충돌 회피 알고리즘에 관한 연구)

  • Kim, Jae-Wan;Eom, Doo-Seop
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.195-213
    • /
    • 2012
  • In ubiquitous environments, the Intelligent Transportation System (ITS) protocol is a typical service used to improve the quality of life for humans. The Vehicular Ad-hoc Network (VANET) protocol, a part of ITS, needs further study with regards to its support for high reliability, high speed mobility, data transmission efficiency, and so on. The IEEE 802.11 standard provides a high data rate channel, but it was designed for peer-to-peer network protocols. IEEE 802.11p also provides a high data rate channel, however, it only facilitates communication between roadside and on-board equipment. A VANET has characteristics that enable its topology to change rapidly; it can also be expanded to a multi-hop range network during communication. Therefore, the VANET protocol needs a way to infer the current topology information relating to VANET equipped vehicles. In this paper, we present the Multi-Beacon MAC Protocol, and propose a method to resolve the problem of beacon collisions in VANET through the use of this Multi-Beacon MAC protocol. Evaluation of the performance of Multi-Beacon MAC protocol by means of both mathematical analyses and simulation experiments indicate that the proposed method can effectively reduce beacon collisions and improve the throughput and the delay between vehicles in VANET systems.