• Title/Summary/Keyword: peer-to-peer (p2p)

Search Result 585, Processing Time 0.032 seconds

Design and Implementation of File Sharing Model on Browsing Method of Using the URL (URL을 이용한 Browsing방식의 File공유모텔의 설계 및 구현)

  • 이경숙;송영한;박원배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.79-81
    • /
    • 2003
  • 본 논문에서는 인터넷상에 존재하는 네트워크의 특화된 주소인 지정된 URL로 Address Mapping기법을 이용하여 Peer 상호간의 파일공유 및 검색이 가능한 Peer-to-Peer프로그램을 구현하여 보았으며, 이를 응용한 하나의 제안으로써 원격지 상에 존재하는 내 컴퓨터의 저장드라이브를 같은 방법의 URL ID로 제어하여 Server운영체제 없이 개인용 PC를 자료공유용 Server로 활용할 수 있는 방법을 구현하였다. 따라서 기존의 P2P프로그램의 기본기능과 비교하여 Web Blower상에서 원격지 개인 PC의 자료실을 손쉽게 운영할 수 있는 Web Service가 가능하도록 설계하였고, 인터넷 사용자가 손쉽게 파일 검색 및 공유, 저장, 원격제어가 가능하도록 UI에 초점을 맞추어 시스템을 구현하였다.

  • PDF

Performance Optimization and Analysis on P2P Mobile Communication Systems Accelerated by MEC Servers

  • Liang, Xuesong;Wu, Yongpeng;Huang, Yujin;Ng, Derrick Wing Kwan;Li, Pei;Yao, Yingbiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.188-210
    • /
    • 2022
  • As a promising technique to support tremendous numbers of Internet of Things devices and a variety of applications efficiently, mobile edge computing (MEC) has attracted extensive studies recently. In this paper, we consider a MEC-assisted peer-to-peer (P2P) mobile communication system where MEC servers are deployed at access points to accelerate the communication process between mobile terminals. To capture the tradeoff between the time delay and the energy consumption of the system, a cost function is introduced to facilitate the optimization of the computation and communication resources. The formulated optimization problem is non-convex and is tackled by an iterative block coordinate descent algorithm that decouples the original optimization problem into two subproblems and alternately optimizes the computation and communication resources. Moreover, the MEC-assisted P2P communication system is compared with the conventional P2P communication system, then a condition is provided in closed-form expression when the MEC-assisted P2P communication system performs better. Simulation results show that the advantage of this system is enhanced when the computing capability of the receiver increases whereas it is reduced when the computing capability of the transmitter increases. In addition, the performance of this system is significantly improved when the signal-to-noise ratio of hop-1 exceeds that of hop-2.

Donate system development using Blockchain technology (블록체인 기반 기부 시스템 개발)

  • An, Kyu-hwang;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.812-817
    • /
    • 2018
  • Blockchain technology removes the central system and connects each block throughout every person. This paper proposes new method to exploit the blockchain feature to apply existing donation system. In the current system, the donator does not donate to poor neighbor which means donator must have to donate some donate organization. The donator does not recognize how the donation has been spent after donation. In this case, we can solve that problem by using the blockchain where the donator can watch how the money works and everyone can browse the account history. To make a virtual fundraising box based on blockchain technology, donator sends some money at virtual account and exchanges the money to crypto-currency. Donator can use crypto-currency which is donate to poor neighbor that poor neighbor can exchanges crypto-currency to the money. Through this proposed system, the donation is managed by secure and transparent blockchain system.

A Hybrid Vulnerability of NFC Technology in Smart Phone (스마트폰에서 NFC를 이용한 융.복합 하이브리드 취약점)

  • Park, Chang Min;Park, Neo;Park, Won Hyung
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.3-8
    • /
    • 2012
  • Smartphones have all the recent technology integration and NFC (Near Field Communication) Technology is one of them and become an essential these days. Despite using smartphones with NFC technology widely, not many security vulnerabilities have been discovered. This paper attempts to identify characteristics and various services in NFC technology, and to present a wide range of security vulnerabilities, prevention, and policies especially in NFC Contactless technology. We describe a security vulnerability and an possible threat based on human vulnerability and traditional malware distribution technic using Peer-to-Peer network on NFC-Enabled smartphones. The vulnerability is as follows: An attacker creates a NFC tag for distributing his or her malicious code to unspecified individuals and apply to hidden spot near by NFC reader in public transport like subway system. The tag will direct smartphone users to a certain website and automatically downloads malicious codes into their smartphones. The infected devices actually help to spread malicious code using P2P mode and finally as traditional DDoS attack, a certain target will be attacked by them at scheduled time.

The Effect of Animal-assisted Therapy Using Therapy Dogs on Children's Self-Esteem and Peer Relationship (치료도우미견을 활용한 동물매개치료가 아동의 자아존중감과 또래관계에 미치는 영향)

  • Kang, Won-guk;Kim, Ok jin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.327-335
    • /
    • 2021
  • In this study, we sought to investigate how animal-assisted therapy using therapy dogs affects the relationship between children's self-esteem and age. The subjects of the study were 20 children in the lower grades of elementary school in I City who were recommended by a school social worker and their homeroom teacher, and 10 control groups of 10 experimental groups were selected. From October 1st to December 17th, 2019, the program conducted an animal-mediated treatment program once a week for 50 minutes for 12 sessions. Using SPSS 20.0 for verification, the experimental and control groups were analyzed by performing pre- and post-relationship calm scale measurements of self-esteem and age. As a result, first, the overall self-esteem of the experimental group (Z = -2.75, p<.05), the self-esteem at home (Z = -2.02, p<.05), and the academic self-esteem (Z = -2.06, p<. 05) shows a statistically significant difference. Second, significant differences were shown in overall peer relationships(Z=-3.83, p<.05), scrupulosity(Z=-2.68, p<.05), and empathy(Z=-2.81, p<.05) in the experimental population. Therefore, in this study, it was confirmed that animal-assisted therapy using therapy dogs had a positive effect on the relationship between children's self-esteem and age.

Network Traffic Monitoring System Applied Load Shedder to Analyze Traffic at the Application Layer (애플리케이션 계층에서 트래픽 분석을 위해 부하 차단기를 적용한 네트워크 트래픽 모니터링 시스템)

  • Son Sei-Il;Kim Heung-Jun;Lee Jin-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.53-60
    • /
    • 2006
  • As it has been continuously increased the volume of traffic over Internet, it is hard for a network traffic monitoring system to analysis every packet in a real-time manner. While it is increased usage of applications which are dynamically allocated port number such as peer-to-peer(P2P), steaming media, messengers, users want to analyze traffic data generated from them. This high level analysis of each packet needs more processing time. This paper proposes to introduce load shedder for limiting the number of packets. After it determines what application generates a selected packet, the packet is analyzed with a defined application protocol.

  • PDF

An Access Control using SPKI Certificate in Web Environment (웹 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.11-19
    • /
    • 2006
  • Web service is giving an equal privilege to all user for sharing their resources. Under this situation, a lot of vulnerability against the various attacks through the Internet is possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

  • PDF

Fast Hologram Generation Method Using Scheduling of Multi-GPGPUs (다중 GPGPU의 스케쥴링을 이용한 고속 홀로그램 생성 방법)

  • Lee, Yoon-Hyuk;Seo, Young-Ho;Kim, Dong-Wook
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2016.06a
    • /
    • pp.364-365
    • /
    • 2016
  • 컴퓨터 생성 홀로그램(CGH)는 방대한 계산 량을 가지고 있어, 고해상도의 홀로그램을 생성하기 위하여 고속 홀로그램 생성 방법이 필요하다. 본 논문에서는 다중 GPGPU의 스케쥴링 기법을 이용하여 고속화 하는 방법을 제안한다. 첫 번째로는 커널 내에서 공유 메모리를 이용한 스케쥴링 기법을 통하여 고속화를 하고, 두 번째로는 GPGPU간의 P2P(peer-to-peer)데이터 전송을 이용한 스케쥴링을 했다. nVidia의 GTX680 2개 GPGPU를 이용하여 기존의 방법보다 약 50%의 속도 향상을 확인하였다.

  • PDF

ITU-T 응용서비스 보안 및 서비스 지향 구조(SOA) 국제표준화 동향

  • Lim, Hyung-Jin;Seo, Dae-Hee;Nah, Jae-Hoon
    • Review of KIISC
    • /
    • v.21 no.2
    • /
    • pp.53-60
    • /
    • 2011
  • 국제표준화기구 ITU-T에서는 연구그룹(Study Group)17이 정보통신 응용보안에 관한 표준화를 리드하는 연구그룹으로, 산하 4개의 연구과제(Question)를 구성하여 정보보호 국제표준을 개발하고 있다. 이 연구과제들 중 Q.7(의장, 나재훈, ETRI)에서는 안전한 응용 서비스라는 범주로 안전한 응용 프로토콜, 웹서비스 보안, P2P(Peer-to-Peer) 보안 등 정보통신환경의 응용서비스 보호에 적용될 수 있는 국제표준들의 개발을 담당하고 있다. Q.8(의장, Liang Wei, CATR)에서는 서비스 지향 구조라는 범주로 SOA(Service Oriented Architecture) 기술 및 통신 보안에 관련된 국제표준들의 개발을 담당하고있다. 현재 Q.7에서는 총 7건의 국제표준을 제정하였으며, 총 6건의 표준초안들이 개발중에 있다. Q.8의 경우는 현재 총3건의 표준초안들이 개발중에 있다. 본 논문에서는 해당 연구과제들의 표준화 현황과 향후 추진 방향을 제시한다.

Effects of ICT Device Ownership on Consumers' Digital Piracy Behavior

  • Sim, Hyeonbo;Kim, Minki;Moon, Junghoon
    • The Journal of Information Systems
    • /
    • v.23 no.4
    • /
    • pp.169-196
    • /
    • 2014
  • This study investigates how information and communication technology (ICT) can damage intellectual property rights (IPR) in the movie industry. Utilizing a survey questionnaire to gather information about the extensive use of ICT devices, including tablet PCs and smartphones, we demonstrate how digital piracy behavior is associated with various socio-demographic characteristics. Econometrically, since a large number of people do not engage in piracy activities, we adopt a zero-inflated negative binomial model. We find that people with tablet PCs are more likely to engage in the piracy of movies from peer-to-peer (P2P) sites. In particular, when we categorize ICT devices based on whether they are portable and allow downloads, we find that people with devices equipped with both functions are most likely to engage in movie piracy.