• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.032 seconds

A Router Auto-Configuration Protocol(RACP) for IPv6 Networks (IPv6 네트워크를 위한 라우터 자동 설정 프로토콜)

  • Lee Wan-Jik;Heo Seok-Yeol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.47-58
    • /
    • 2006
  • Address Auto-configuration capability is one of important advantages of IPv6 protocol This function enables the IPv6 hosts to configure IPv6 networks automatically, while IPv6 routers still have to be configured manually. To solve this problem, we propose RACP(Router Auto-Configuration Protocol), a new address auto-configuration protocol which configures all routers of a small network consisting of several routers and sub-networks automatically. The RACP protocol can automatically create and deliver IPv6 prefixes and routing informations of all routers on the network by using the network's prefix assigned by ISP. The proposed RACP can be used to set up network automatically for a small IPv6 site such as a small office network, a home network without the assistance of network administrator.

  • PDF

Design and Implement of Anti-Smishing System based-on Android (안드로이드 기반 스미싱 방지 시스템 설계 및 구현)

  • Jang, Rae-Young;Bae, Jung-Min;Jung, Sung-Jae;Sung, Kyung;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.790-793
    • /
    • 2013
  • Lastest Smishing is one of the hacking techniques target on the Android smartphone. Smishing using the SMS message is a new hacking techniques. smishing sends a message to the user included trojan address. It collects personal information and to control smartphones. In particular, without the user's knowledge of the retail payment service provider uses the service. It caused damage worth up to 300,000 won. It damage to users through different types of text messages. This paper Smishing typical methods and types are described in damages. This paper are described in damages and type by Smishing. This paper propose preventive and fundamental solution. We designed and implemented a anti-smishing system for android.

  • PDF

Design and Implementation of Beacon based Wireless Sensor Network for Realtime Safety Monitoring in Subway Stations (지하철 역사에서 실시간 안전 모니터링 위한 비컨 기반의 무선 센서 네트워크 설계 및 구현)

  • Kim, Young-Duk;Kang, Won-Seok;An, Jin-Ung;Lee, Dong-Ha;Yu, Jae-Hwang
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.364-370
    • /
    • 2008
  • In this paper, we proposed new sensor network architecture with autonomous robots based on beacon mode and implemented real time monitoring system in real test-bed environment. The proposed scheme offers beacon based real-time scheduling for reliable association process with parent nodes and dynamically assigns network address by using NAA (Next Address Assignment) mechanism. For the large scale multi-sensor processing, our real-time monitoring system accomplished the intelligent database processing, which can generate not only the alert messages to the civilians but also process various sensing data such as fire, air, temperature and etc. Moreover, we also developed mobile robot which can support network mobility. Though the performance evaluation by using real test-bed system, we illustrate that our proposed system demonstrates promising performance for emergence monitoring systems.

Performance and Power Consumption Improvement of Embedded RISC Core (임베디드 RISC 코어의 성능 및 전력 개선)

  • Jung, Hong-Kyun;Ryoo, Kwang-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.453-461
    • /
    • 2010
  • This paper presents a branch prediction algorithm and a 4-way set-associative cache for performance improvement of embedded RISC core and a clock-gating algorithm using ODC (Observability Don't Care) operation to improve the power consumption of the core. The branch prediction algorithm has a structure using BTB(Branch Target Buffer) and 4-way set associative cache has lower miss rate than direct-mapped cache. Pseudo-LRU Policy, which is one of the Line Replacement Policies, is used for decreasing the number of bits that store LRU value. The clock gating algorithm reduces dynamic power consumption. As a result of estimation of performance and dynamic power, the performance of the OpenRISC core applied the proposed architecture is improved about 29% and dynamic power of the core using Chartered $0.18{\mu}m$ technology library is reduced by 16%.

An Efficient Route Optimization Algorithm using Intermediate Agents in Mobile IP Networks (중간 에이전트를 이용한 Mobile IP 망에서의 효율적인 경로 최적화 알고리즘)

  • 박은영;이재훈;최병구
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.677-684
    • /
    • 2003
  • IETF's Mobile IP protocol allows Mobile Node(MN) to keep connection to Correspondent Node(CN) no matter what the MN changes its point of attachment to the Internet. However, the protocol incurs triangle routing problem, because all packets for the MN are routed through its Home Agent(HA). Route optimization mechanism is proposed by IETF in order to resolve triangle routing problem, but it requires that any node in the Internet should also implement route optimization mechanism. In this paper, we propose a new route optimization algorithm. With the algorithm, routers between HA and CN are considered as Intermediate Agent(IA), and packets transmitted by CN are not forwarded to HA but intercepted by IA and tunneled to MN directly.

An Implementation of Explicit Multicast with Mobile IP for Small Group Communications in Mobile Networks (이동통신환경에서의 소규모 그룹통신을 위한 XMIP 프로토콜의 구현)

  • PARK IN-SOO;PARK YONG-JIN
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.267-280
    • /
    • 2005
  • In this paper, we implement and verify XMIP integrating IETF Mobile IP and the Explicit Multicast mechanism for a great number of small group multicast communications. U a source node sends Xcast packets explicitly inserting destination nodes into the headers, each Xcast router decides routes and forwards the packets toward each destination node based on unicast routing table without the support of multicast trees. n is a straightforward and simple multicast mechanism just based on a unicast routing table without maintaining multicast states because of the inheritance from the Explicit Multicast mechanism. This research modifies and extends the functionality of IETF Mobile IP's mobility agents, such as HA/FA to HA+/FA+ respectively, considering interworking with Xcast networks. Xcast packets captured by HA+ are forwarded into X-in-X tunnel interfaces for each FA+ referred to the binding table of HA.. This X-in-X tunneling mechanism can effectively solve the traffic concentration problem of IETF Mobile IP multicast services. Finally WLAN-based testbed is built and a multi-user Instant messenger system is developed as a Xcast application for finally verify the feasibility of the implemented XMIP/Xcast protocols.

SNP: A New On-Chip Communication Protocol for SoC (SNP : 시스템 온 칩을 위한 새로운 통신 프로토콜)

  • Lee Jaesung;Lee Hyuk-Jae;Lee Chanho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.9
    • /
    • pp.465-474
    • /
    • 2005
  • For high density SoC design, on-chip communication based on bus interconnection encounters bandwidth limitation while an NoC(Network-on-Chip) approach suffers from unacceptable complexity in its Implementation. This paper introduces a new on-chip communication protocol, SNP (SoC Network Protocol) to overcome these problems. In SNP, conventional on-chip bus signals are categorized into three groups, control, address, and data and only one set of wires is used to transmit all three groups of signals, resulting in the dramatic decrease of the number of wires. SNP efficiently supports master-master communication as well as master-slave communication with symmetric channels. A sequencing rule of signal groups is defined as a part of SNP specification and a phase-restoration feature is proposed to avoid redundant signals transmitted repeatedly over back-to-back transactions. Simulation results show that SNP provides about the same bandwidth with only $54\%$ of wires when compared with AMBA AHB.

Cybersquatting-related Precedent Tendency (사이버스쿼팅 관련 판례 동향)

  • Oh, Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.221-227
    • /
    • 2013
  • Cybersquatting is a type of conflicts between a trademark and a domain, and refers to "behaviors of registering, retaining, transferring, and using the identical or similar domain name in bad faith for the profit from the mark such as trademark". That is, it is preoccupying behavior to abuse the fact that the domain name in the Internet can be freely registered on a first come, first served basis and can't duplicate. Though this should be prohibited, given the reality that most of our daily lives are based in the Internet, this is creating many problems in IT environment beyond social structure in rule of law. Therefore, this study has the purpose that it provides cybersquatting-related information and suggests legislative implications hereafter through the analysis of cybersquatting-related precedent from the Supreme Court.

Systematic Review of an Intervention Program for the Improved Reading Comprehension of Elementary School Students (초등학생의 읽기이해력 향상 중재프로그램에 대한 체계적 문헌고찰)

  • Joo, So-Hyun;Lee, Soo-Sang
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.3
    • /
    • pp.197-215
    • /
    • 2021
  • This study analyzed experimental studies of intervention programs provided to improve reading comprehension of elementary school students using a systematic review research method. Cochrane's handbook was applied, and key questions were formulated according to the PICOTS-SD. The inclusion and exclusion criteria were applied to 1,610 papers searched in KCI, and the final 18 cases were selected for analysis. The risk of bias was evaluated using the 'RevMan5' tool provided by Cochrane. As a result of the evaluation, the risk of bias was low in most areas. And for the qualitative analysis of these papers, a data summary table was prepared. As a result, the types of intervention programs were diverse, and in many cases, upper grade students were applied. The size of the experimental group ranged from 6 to 29, and there were more QED-based studies than RCT-based studies. The most mediation time was 40 minutes, and the number of mediation sessions was 8 to 24. And in all studies, the intervention programs were found to be effective in improving reading comprehension.

An Improved Index Structure for the Flash Memory Based F2FS File System

  • Kim, Yong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.1-8
    • /
    • 2022
  • As an efficient file system for SSD(Solid State Drive), F2FS is employed in the kernel of Linux operating system. F2FS applies various methods to improve performance by reflecting the characteristics of flash memory. One of them is improvement of the index structure that contains addresses of data blocks for each file. This paper presents a method for further improving performance by modifying the index structure of F2FS. F2FS manages all index blocks as logical numbers, and an address mapping table is used to find the physical block addresses of index blocks on flash memory. This paper shows performance improvement by applying logical numbers to the last level index blocks only. The count of mapping table search for a data block access is reduced to 1~2 from 1~4.