• Title/Summary/Keyword: Address system

Search Result 2,377, Processing Time 0.033 seconds

Design of the Covered Address Generation using the Super Increasing Sequence in Wireless Networks (무선 네트워크에서의 초증가 수열을 통한 주소 은닉 기법 설계)

  • Choun, Jun-Ho;Kim, Sung-Chan;Jang, Kun-Won;Do, Kyung-Hwa;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.411-416
    • /
    • 2007
  • The General security method of wireless network provides a confidentiality of communication contents based on the cryptographic stability against a malicious host. However, this method exposes the logical and physical addresses of both sender and receiver, so transmission volume and identification of both may be exposed although concealing that content. Covered address scheme that this paper proposes generates an address to which knapsack problem using super increasing sequence is applied, and replaces the addresses of sender and receiver with addresses from super increasing sequence. Also, proposed method changes frequently secret addresses, so a malicious user cannot watch a target system or try to attack the specific host. Proposed method also changes continuously a host address that attacker takes aim at. Accordingly, an attacker who tries to use DDoS attack cannot decide the specific target system.

Cultural Differences in Politeness and Notion of Flattery (공손표현과 아부의 문화적 차이)

  • Yoon, Jae-Hak
    • Cross-Cultural Studies
    • /
    • v.33
    • /
    • pp.331-358
    • /
    • 2013
  • This paper looks into several aspects of linguistic behaviors attested in Korean and American English corpora. A special attention is paid to the areas of politeness phenomena, terms of address, power and solidarity, practice of flattery, and closely-related non-linguistic behaviors such as tipping and gift-giving conventions. An analysis of the data reveals that Korean society remains very much superior-oriented, non-egalitarian, non-democratic despite the pride and sense of accomplishment among the populace that the nation has achieved a satisfactory level of democracy. In particular, the following facts in Korean and the Korean society are exposed by an examination of the data: ${\bullet}$ There is a notional gap of positive politeness ${\bullet}$ Superiors enjoy an unfair advantage in the power and solidarity system ${\bullet}$ The terms of address system is set up to make a clear distinction between levels and the terms of address, in turn, dictate norms of expected behavior ${\bullet}$ The notion and practice of flattery heavily favors superiors ${\bullet}$ Non-linguistic acts of gift-giving and tipping are consistent with the examined social interactions As a result, all the benefits, emotional as well as material, are garnered by superiors. These facts may reflect the real Korea that people are used to being comfortable with, a pre-modern, feudalistic society, something akin to its kin in the north. We may proclaim that we aspire to a more democratic society. However, it appears Koreans, deep inside, may have been seeking a powerful dictator all along. These findings help provide a partial but insightful clue to the political puzzle: why Koreans grew uncomfortable with an egalitarian and democratic president and could not save him, but instead replaced him with a succession of a corrupted businessman and the authoritarian daughter of a former dictator. The flight to democracy has stalled in midair, not quite making the grade yet. There is plenty of linguistic evidence in Korean.

Transaction Processing Scheme for Mobile Database Systems (이동 데이터베이스체계를 위한 거래처리 기법)

  • 최용구
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.19-26
    • /
    • 1998
  • Mobile database system address information processing based on database system in mobile computing environment. In the mobile database system, when a mobile transaction host enter a other radio coverage area called a cell while processing a transaction, it have to alter the communication network address to new database server. This is called transactional service handoff. This paper propose a transaction processing scheme for providing the proper function of this transactional service handoffs in mobile database system. This scheme apply coordinator migration mechanism which perform the transaction in new database server when posed to be the transaction service handoff. Fially, the proposed scheme will improve system performance by minimizing the tansmission of message for processing the transactions in mobile database system.

  • PDF

A Method for Quantifying the Risk of Network Port Scan (네트워크 포트스캔의 위험에 대한 정량화 방법)

  • Park, Seongchul;Kim, Juntae
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.4
    • /
    • pp.91-102
    • /
    • 2012
  • Network port scan attack is the method for finding ports opening in a local network. Most existing IDSs(intrusion detection system) record the number of packets sent to a system per unit time. If port scan count from a source IP address is higher than certain threshold, it is regarded as a port scan attack. The degree of risk about source IP address performing network port scan attack depends on attack count recorded by IDS. However, the measurement of risk based on the attack count may reduce port scan detection rates due to the increased false negative for slow port scan. This paper proposes a method of summarizing 4 types of information to differentiate network port scan attack more precisely and comprehensively. To integrate the riskiness, we present a risk index that quantifies the risk of port scan attack by using PCA. The proposed detection method using risk index shows superior performance than Snort for the detection of network port scan.

Design and Implementation of Beacon based Wireless Sensor Network for Realtime Safety Monitoring in Subway Stations (지하철 역사에서 실시간 안전 모니터링 위한 비컨 기반의 무선 센서 네트워크 설계 및 구현)

  • Kim, Young-Duk;Kang, Won-Seok;An, Jin-Ung;Lee, Dong-Ha;Yu, Jae-Hwang
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.364-370
    • /
    • 2008
  • In this paper, we proposed new sensor network architecture with autonomous robots based on beacon mode and implemented real time monitoring system in real test-bed environment. The proposed scheme offers beacon based real-time scheduling for reliable association process with parent nodes and dynamically assigns network address by using NAA (Next Address Assignment) mechanism. For the large scale multi-sensor processing, our real-time monitoring system accomplished the intelligent database processing, which can generate not only the alert messages to the civilians but also process various sensing data such as fire, air, temperature and etc. Moreover, we also developed mobile robot which can support network mobility. Though the performance evaluation by using real test-bed system, we illustrate that our proposed system demonstrates promising performance for emergence monitoring systems.

Design and Verification of Addressable Automatic Fire Detection System for Existing Apartments (기존아파트의 적용성을 고려한 주소형 자동화재탐지설비의 설계 및 검증)

  • An, Hyunsung
    • Land and Housing Review
    • /
    • v.13 no.4
    • /
    • pp.105-114
    • /
    • 2022
  • Non-fire activated fire alarms caused by such actions as cigarette smoke, cooking, and high humidity are fire safety risk factors. In such instances, it is important to quickly locate and replace the actuated detector. However, it is difficult to locate those detectors because most do not have an address function. While new apartments can incorporate addressable fire alarm detectors, in existing apartments there are limitations in converting over to addressable detectors due to cost and power line issues. This study developed an efficient address function for fire alarms in existing apartments. The newly developed system consists of the existing receiver, and a proposed addressable repeater and detector. Utilizing an experimental setup, the performance of the proposed address monitoring system was confirmed to be stable and compatible with the receiver and existing detectors.

An Efficient Address Mapping Table Management Scheme for NAND Flash Memory File System Exploiting Page Address Cache (페이지 주소 캐시를 활용한 NAND 플래시 메모리 파일시스템에서의 효율적 주소 변환 테이블 관리 정책)

  • Kim, Cheong-Ghil
    • Journal of Digital Contents Society
    • /
    • v.11 no.1
    • /
    • pp.91-97
    • /
    • 2010
  • Flash memory has been used by many digital devices for data storage, exploiting the advantages of non-volatility, low power, stability, and so on, with the help of high integrity, large capacity, and low price. As the fast growing popularity of flash memory, the density of it increases so significantly that its entire address mapping table becomes too big to be stored in SRAM. This paper proposes the associated page address cache with an efficient table management scheme for hybrid flash translation layer mapping. For this purpose, all tables are integrated into a map block containing entire physical page tables. Simulation results show that the proposed scheme can save the extra memory areas and decrease the searching time with less 2.5% of miss ratio on PC workload and can decrease the write overhead by performing write operation 33% out of total writes requested.

Performance Analysis of an Address Auto-configuration Method Applying to Mobile Ad hoc Network Using NS-2 (NS-2를 이용한 MANET의 주소 자동설정 기법의 성능분석 연구)

  • Kim, Sun-Hwa;Go, Bin;Lee, Kyou-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2010
  • Simulation analysis may be the essential means to either evaluate performance of systems or optimize system parameters for new design. Including many variations for design and implementation, MANET (Mobile Ad-hoc NETwork) is one target area of such an analysis. Since every node, however, included in the network has mobility, one MANET could be overlapped or merged with another one which use a different transport protocol. In order to communicate among nodes in this case, the new merged network should configure paths and addresses in advance. Configuring paths and addresses generates much overheads which ultimately cause delay in communicating data. Performance analysis is required to improve the data transport performance by minimizing overheads. This paper proposes a sound address auto-configuration method which is based on an on-demand manner and then presents modeling and performance analysis of the method. NS-2 simulation results verify that the proposed method can not only alleviate overheads, which are inevitably generated for address auto-configuration processes, and but also decentralize them in time.

Low-Latency Implementation of Multi-channel in AoIP/UDP-based Audio Communication (AoIP/UDP 기반 오디오 통신의 다중 채널 Low-Latency 구현)

  • Seung-Do Yang;Jin-ku Choi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.59-64
    • /
    • 2023
  • Fire and disaster broadcasting systems are divided into analog, digital, and network-based digital public address systems, and important specifications in network-based digital public address systems are low-latency audio, high sampling rate, and multi-channel input and output. In the past, it has been widely used to the AoE method for distinguishing based on the MAC address of the data link layer. However, this method has a problem of increasing complexity and cost. This proposal is an AoIP/UDP method, which allows communication to be easily distinguished by IP address without the need for a separate redundant network, so that the network can be freely used and configured, and cost can be reduced by reducing complexity. After implementing the AoIP/UDP method, the experimental results showed that the cost was improved with the equivalent performance with 2.66ms latency.

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).