• Title/Summary/Keyword: 주소 설정

Search Result 179, Processing Time 0.023 seconds

P-HDNS : A New Scheme to Support Multilingual Domain Names (한글도메인이름을 지원하기 위한 Proxy HDNS 구현)

  • Kim, Weon;Chin, Yong-Ohk
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.12
    • /
    • pp.1-10
    • /
    • 1999
  • Given a domain, client applications over the Internet are in support of the DNS (Domain Name System) to get its corresponding IP address. Currently, only domain names expressed by ASCII code are recognized over the Internet. This enforces the usage of ASCII domain names even in countries which use languages based on multilingual code other than ASCII code. In this paper, we present a methodology to support multilingual domain names on top of the existing DNS. The methodology is based on code translation of domain names in multilingual code into ASCII code via UTF5. We implement a gateway, called Proxy Hangul DNS (P-HDNS) based on the proposed methodology. This paper presents the principles of the methodology and the implementation details of P-HDNS.

  • PDF

Development of Remote Management and Control System for VoIP Terminal (인터넷전화 단말기 원격관리 및 제어시스템 개발)

  • Song, Han-Chun;Ban, Ku-Ik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.73-80
    • /
    • 2011
  • In this paper, we design and implementation of effective remote management system for VoIP(Voice over IP) terminal. Ordinary VoIP terminal is connected inside of NAT(Network Address Translation) assigned private IP address. NAT provides address mapping between outside public IP address and inside private IP address, for outside system telephone call is connected to inside VoIP terminal. In this paper, we also design and implementation of UDP hole punching function that the outside calls pass through the NAT, for outside management system call is connected to internal VoIP terminal, and gathered to management information of the VoIP terminal. Also, we evaluated and analysed of developed system in the test environment. As a result of test, It showed that it was well performed without any data error and data loss in the connectivity, and It showed that it was well gathered management information of the VoIP terminal.

User Interface Model Based Automatic Mobile Web Application Generation Tool for Embedded Systems (내장형 시스템을 위한 사용자 인터페이스 모델 기반 모바일 웹앱 자동 생성 도구)

  • Choi, Kibong;Kim, Saehwa
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.1
    • /
    • pp.13-27
    • /
    • 2017
  • This paper presents a tool that automatically generates mobile web applications from user interface (UI) models which are based on PELUM (Pattern and Event based Logical User Interface Modeling). PELUM is a method for the effective development of UI-centered embedded systems via UI modeling. The proposed tool consists of a model editor and a code generator. The former provides an environment for modeling a Logical UI Model (LUM) and a Programming Interface Model (PIM) on the web. On the other hand, the code generator sets the screen configuration and events' behavior, according to the LUM, synthesizing a local database schema according to the PIM, and then generates an executable mobile web app. It also can produce mashup web apps by receiving an open API address via the PIM. The generated mobile web apps follow the Model-View-Controller (MVC) architecture in order for users to easily customize them. The proposed tool enables them to generate mobile web apps that can be executed on various devices by modeling logical UIs on the web.

Applying TIPC Protocol for Increasing Network Performance in Hadoop-based Distributed Computing Environment (Hadoop 기반 분산 컴퓨팅 환경에서 네트워크 I/O의 성능개선을 위한 TIPC의 적용과 분석)

  • Yoo, Dae-Hyun;Chung, Sang-Hwa;Kim, Tae-Hun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.351-359
    • /
    • 2009
  • Recently with increase of data in the Internet, platform technologies that can process huge data effectively such as Google platform and Hadoop are regarded as worthy of notice. In this kind of platform, there exist network I/O overheads to send task outputs due to the MapReduce operation which is a programming model to support parallel computation in the large cluster system. In this paper, we suggest applying of TIPC (Transparent Inter-Process Communication) protocol for reducing network I/O overheads and increasing network performance in the distributed computing environments. TIPC has a lightweight protocol stack and it spends relatively less CPU time than TCP because of its simple connection establishment and logical addressing. In this paper, we analyze main features of the Hadoop-based distributed computing system, and we build an experimental model which can be used for experiments to compare the performance of various protocols. In the experimental result, TIPC has a higher bandwidth and lower CPU overheads than other protocols.

Development of Standard Body Measurement for Elderly Women(II) - Somatotype Classification & Standard Body Measurement - (노년 여성의 표준 신체치수 설정에 관한 연구(제2보) -체형분류와 표준 신체치수-)

  • 이정임;주소령;남윤자;류영실
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.28 no.3_4
    • /
    • pp.377-386
    • /
    • 2004
  • This report is the second study to develop the standard tables of body measurements to be used for improving the fit of garments and patterns for women aged 60 and older. The purpose of this study is to suggest the new sizing system proper to the women aged 60 and older by classifying their somatotype and developing the standard tables of body measurements for each somatotype. The data are the anthropometric measurements of 329 women aged 60 and older measured in 2001 and the 1997 National Somatometry Survey data. The major contents of this study are as follows. The applicability of KS K 0051 and ISO 3637 sizing systems to the women aged 60 and older was investigated by analyzing the distribution of height and drop index the difference of hipgirth and bustgirth. In this result, we certified the two sizing systems were not so proper to elderly women and the new sizing system proper to them was required. So, we classified the somatotype of the women aged 60 and older to 3 groups, 135cm$\leq$H(height)<145cm, 145cm$\leq$H<155cm, 155cm$\leq$H<165cm by height and classified to 3 groups, -4cm$\leq$D(drop)<16cm, -4cm$\leq$D<4cm, -l6cm$\leq$D<-4cm by drop index, and we suggested more proper sizing system for women aged 60 and older by compounding height and drop groups. We also developed the standard tables of body measurements every bustgirth groups of 9 somatotypes. We expect the standard tables of body measurements to applicate to manufacture clothing for elderly women.

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

Automated Generation of Multi-Scale Map Database for Web Map Services (웹 지도서비스를 위한 다축척 지도 데이터셋 자동생성 기법 연구)

  • Park, Woo Jin;Bang, Yoon Sik;Yu, Ki Yun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.5
    • /
    • pp.435-444
    • /
    • 2012
  • Although the multi-scale map database should be constructed for the web map services and location-based services, much part of generation process is based on the manual editing. In this study, the map generalization methodology for automatic construction of multi-scale database from the primary data is proposed. Moreover, the generalization methodology is applied to the real map data and the prototype of multi-scale map dataset is generated. Among the generalization operators, selection/elimination, simplification and amalgamation/aggregation is applied in organized manner. The algorithm and parameters for generalization is determined experimentally considering T$\ddot{o}$pfer's radical law, minimum drawable object of map and visual aspect. The target scale level is five(1:1,000, 1:5,000, 1:25,000, 1:100,000, 1:500,000) and for the target data, new address data and digital topographic map is used.

Full mouth rehabilitation with vertical dimension elevation in the patient with severely worn dentition: case report (과도한 치아 마모 환자에서 수직고경 증가를 동반한 전악 수복 증례)

  • Lee, Eun-Jee;Shin, Soo-Yeon
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.30 no.4
    • /
    • pp.315-323
    • /
    • 2014
  • Excessive teeth abrasion causes pathologic changes of oral environment and masticatory system due to decrease in occlusal vertical dimension. When establishing new occlusal plane and recovering vertical dimension, accurate diagnosis and analysis are essential. In this case, after appropriate centric relation in elevated vertical dimension was taken using Gothic arch tracer, full mouth rehabilitation was performed. A 70-year-old male patient had the chief complaint that he could not eat due to teeth wear. He showed generalized teeth wear and decreased vertical dimension. Elevation of vertical dimension was planned by model analysis. According to increased vertical dimension, centric relation was recorded using Gothic arch tracer and temporary prostheses were applied. Appropriate occlusion was established by temporary prostheses for 4 months. Final prostheses were fabricated using vertical dimension adapted by temporary prostheses. Through this procedure, satisfactory outcomes were achieved both in functional and esthetic aspects.

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

An Implementation of Explicit Multicast with Mobile IP for Small Group Communications in Mobile Networks (이동통신환경에서의 소규모 그룹통신을 위한 XMIP 프로토콜의 구현)

  • PARK IN-SOO;PARK YONG-JIN
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.267-280
    • /
    • 2005
  • In this paper, we implement and verify XMIP integrating IETF Mobile IP and the Explicit Multicast mechanism for a great number of small group multicast communications. U a source node sends Xcast packets explicitly inserting destination nodes into the headers, each Xcast router decides routes and forwards the packets toward each destination node based on unicast routing table without the support of multicast trees. n is a straightforward and simple multicast mechanism just based on a unicast routing table without maintaining multicast states because of the inheritance from the Explicit Multicast mechanism. This research modifies and extends the functionality of IETF Mobile IP's mobility agents, such as HA/FA to HA+/FA+ respectively, considering interworking with Xcast networks. Xcast packets captured by HA+ are forwarded into X-in-X tunnel interfaces for each FA+ referred to the binding table of HA.. This X-in-X tunneling mechanism can effectively solve the traffic concentration problem of IETF Mobile IP multicast services. Finally WLAN-based testbed is built and a multi-user Instant messenger system is developed as a Xcast application for finally verify the feasibility of the implemented XMIP/Xcast protocols.