• Title/Summary/Keyword: 네트워크 NAT

Search Result 151, Processing Time 0.023 seconds

A New Buffer Management Algorithm to Support TCP/IP Traffic over ATM Network (ATM 네트워크에서 TCP/IP 트래픽을 서비스하기 위한 새로운 버퍼관리 알고리즘)

  • Kim, Kwan-Woong;Bae, Sung-Hwan;Chon, Byoung-Sil
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.7
    • /
    • pp.22-29
    • /
    • 2002
  • The Gauranteed Frame Rate service category was proposed by the ATM Forum as an enhancement to the UBR service. This service aims to support minimum cell rate gaurantee for each virtual connection and allow any excess bandwidth in the network to be shared among the contending VCs in a fair manner. We propose a new buffer management algorithm for GFR service through FIFO queuing discipline. Proposed scheme can provide minimum bandwidth guarantee for GFR VCs as well as improve the fairness among the competing GFR VCs on a single FIFO queue. From simulation results, we demonstrate the proposed scheme fulfills the requirement of GFR service as well as improves the TCP throughput.

A Study of Internet Radio Platform based on MIPS Core (MIPS Core에 기반한 인터넷 라디오플랫폼에 관한 연구)

  • Kim, Jong-Duk;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1370-1376
    • /
    • 2008
  • Recently years There are numerous music contents on the internet and it can easily be used without any authority. because of this, casualties of music contents has been increased and music market has collapsed. Therefore Record Copyright Association protection law has revised and using music contents are being managed by copyright holders group from this year. It is one of ways to protect their contents copyright. So on this paper Internet Radio solution is provided to solve the problem between copyright holders and someone wants to use their contents and to make a part of new market on the music contents.

MPICH-GP : An MPI Extension to Supporting Private IP Clusters in Grid Environments (MPICH-GP : 그리드 상에서 사설 IP 클러스터 지원을 위한 MPI 확장)

  • Park, Kum-Rye;Yun, Hyun-Jun;Park, Sung-Yong;Kwon, Oh-Young;Kwon, Oh-Kyoung
    • The KIPS Transactions:PartA
    • /
    • v.14A no.1 s.105
    • /
    • pp.1-14
    • /
    • 2007
  • MPICH-G2 is an MPI implementation to solve complex computational problems by utilizing geographically dispersed computing resources in grid environments. However, the computation nodes in MPICH-G2 are exposed to the external network due to the lack of supporting the private IP clusters, which raises the possibility of malicious security attacks. In order to address this problem, we propose MPICH-GP with a new relay scheme combining NAT(Network Address Translation) service and an user-level proxy. The proxy running on the front-end system of private IP clusters forwards the incoming connection requests to the systems inside the clusters. The outgoing connection requests out of the cluster are forwarded through the NAT service on the front-end system. Through the connection path between the pair of processes, the requested MPI jobs can be successfully executed in grid environments with various clusters including private IP clusters. By simulations, we show that the performance of MPICH-GP reaches over 80% of the performance of MPICH-G2, and over 95% in ease of using RANK management method.

Coreference Resolution using Hierarchical Pointer Networks (계층적 포인터 네트워크를 이용한 상호참조해결)

  • Park, Cheoneum;Lee, Changki
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.542-549
    • /
    • 2017
  • Sequence-to-sequence models and similar pointer networks suffer from performance degradation when an input is composed of multiple sentences or when the length of the input sentence is long. To solve this problem, this paper proposes a hierarchical pointer network model that uses both the word level and sentence level information to encode input sequences composed of several sentences at the word level and sentence level. We propose a hierarchical pointer network based coreference resolution that performs a coreference resolution for all mentions. The experimental results show that the proposed model has a precision of 87.07%, recall of 65.39% and CoNLL F1 74.61%, which is an improvement of 21.83% compared to an existing rule-based model.

A Design and Implementation of Direct Volume Rendering View Program based on Web (웹 기반의 다이렉트 볼륨 렌더링 View 프로그램의 설계 및 구현)

  • Yoon, Yo-Sup;Yoon, Ga-Rim;Kim, Young-Bong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.402-407
    • /
    • 2004
  • Since the world wide web, simple and convenient tool, has proposed, the Internet became the most simple network resource which provide many informations of the world. Furthermore, various methodologies are developed to support the dynamic service such as 3D View web service. We will propose the volume rendering view program that interactively visualize the 3D data on the web. The 3D Data is obtained by stacking the 2D images along the z-direction. We also employ the COM based OCX control which is a kind of Active component. This web program will contribute the diagnosis of the diseases through the 3D visualization and image analysis functions at remote places.

  • PDF

Design and Analysis of a New Video Conference System Supporting the NAT of Firewall (방화벽 NAT를 지원하는 새로운 다자간 화상회의 시스템의 설계 및 분석)

  • Jung, Yong-Deug;Kim, Gil-Choon;Jeon, Moon-Seog
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.4
    • /
    • pp.137-155
    • /
    • 2004
  • A video-conference system is being utilized in web based application services in various fields due to the widespread use of Internet and the progress of computer technologies. This system should use the public IP address for sharing file and white board and it is difficult to manage the internal network users of the firewall and non-public IP address users. In this paper, we propose an Application Level Gateway which transforms non-public IP address into public IP address. This mechanism is for the internal network users of the firewall or non-public IP address users over the Internet. We also propose a Control Daemon which manages video and audio media dynamically according to network bandwidth. This mechanism can start and terminate a video conference and manage the process of the video conference.

  • PDF

A Study on Security Analysis and Security Design for IPv6 Transition Mechanisms (IPv6 전환 기술의 보안 위협 분석 및 보안 설계에 대한 연구)

  • Choi, In-Seok;Kim, Young-Han;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.689-697
    • /
    • 2005
  • The IETF has created the v6ops Working Group to assist IPv6 transition and propose technical solutions to achieve it. But it's quite problem which security consideration for a stage of IPv4/IPv6 transition and co-existence. There are new security problem threat that it caused by the characteristics of heterogeneity. In this paper, we describe IPv6 transition mechanisms and analyze security problem for IPv6 transition mechanism. also we propose security consideration and new security mechanism. We analyzed DoS and DRDoS in 6to4 environment and presented a address sanity check as a solution. We also showed an attack of address exhaustion in address allocation server. To solve this problem, we proposed challenge-response mechanism in DSTM.

Ubiquitous Home Networking Architecture based on Virtual Overlay Network (가상 오버레이 네트워크 기반 유비쿼터스홈 네트워킹 구조)

  • Park, Ho-Jin;Park, Jun-Hee;Kim, Nam
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.8-17
    • /
    • 2010
  • Ubiquitous home refers not only to home but also to logical space, including a wide range of out-home personal devices such as mobile phones, PDAs, laptops, car navigators, and office PCs. There are certain connection barriers among the devices, such as the dynamic IP address, NAT. In a home network, various devices coexist in heterogeneous networks, such as IP, IEEE1394, PLC, Bluetooth, ZigBee, UWB, and IrDA, all of which lack interoperability due to their different physical transmission characteristics and protocols. In ubiquitous home where an unrestricted collaboration of the devices is essential to offer services that meet the users' requirements, free interoperability among the devices must be guaranteed. This paper proposes a networking model for interoperability of the heterogeneous devices in a ubiquitous home based on a virtual overlay network which hides the complicated physical network configurations and heterogeneity of the service protocols.

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

Balancing the Load of Web Server and Improving Network Performance by Control1ing RTO Value (웹 서버의 부하 분산과 RTO (Retransmission Time-Out) 값 조정를 통한 네트워크 이용율 향상)

  • 김진희;한설흠;권경희
    • Proceedings of the KAIS Fall Conference
    • /
    • 2002.11a
    • /
    • pp.220-224
    • /
    • 2002
  • 본 논문에서는 웹 서버의 부하가 급증하면서 대두된 네트워크 과부하를 해결하기 위한 방법으로 서버분산처리 방식과 RTO(retransmission time out : 재전송타임아웃)간을 조정하는 기법을 이용하였다. 부하 분산을 위한 방법으로는 기존의 NAT 기반의 가상서버 방식과 비슷하나, 기존의 가상서버에서 서버들을 선택하는 스케줄링 방법을 이용하지 않고 네트워크 주소(IP)룰 통한 서버 분산방법을 선택하였다. 이를 위해 Linux 기반의 PC에 라우터론 구축하였고 여기에 실제 IP를 할당하였으며, 라우터를 경유하여 연결된 두개의 서버에는 가상 IP를 할당 내부접속용과 외부접속용으로 나누어 서버 분산이 이루어지게끔 하였다. 이러한 서버 분산은 학교라는 즉. 웹서버의 접속이 내부접속 비율과 외부접속 비율 어느 한쪽으로도 크게 기울지 않는 네트워크 환경을 고려한 것이다. 네트워크의 성능 평가에 있어 가장 기본이 될 수 있는 응답시간은 전송거리와 트래픽량에 비례한다. 이에 외부접속용 서버와 내부접속용 서버 각각에 RTO 값을 다르게 적용시킴으로써 전체적인 Delay의 변화를 확인해 볼 수 있다. 이는 전송거리가 길 경우 생길 수 있는 패킷 손실을 고려한 것으로 패킷 손실로 인하여 재전송이 이루어질 경우 재전송 time이 RTO를 통하여 이루어지며 이러한 RTO의 적절한 값은 전체적인 응답시간에 영향을 미칠 수 있다는 것에 기인한 것으로 RTO값을 전송거리가 긴 외부접속용 서버에는 전송거리가 짧은 내부접속용 서버에 비해 길게 적응시킴으로써 전체적인 응답시간의 개선을 유도하였다