• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.025 seconds

Supporting Group Workspaces Based on WebDAV (웹데브 기반의 그룹 작업공간 지원)

  • Kim Dong-Ho;Shin Won-Joon;Park Jin-Ho;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.521-532
    • /
    • 2006
  • WebDAV is an IETF standard protocol which support asynchronous collaborative authoring on the Web. The recently published WebDAV Access Control Protocol provides various methods of controlling the resources on a WebDAV server and their properties, helping high-level group activities to be performed through the WebDAV server. Based on the WebDAV access control protocol, we developed Group Workspaces which support exchanging and/or sharing data among the group members. Any member of a Group Workspace can create and share resources among the members. Also, any member can add, change or delete the resources. To support the Group Workspaces, we developed a client application named GroupExplorer, which solely supports Group Workspaces. We constructed the server for Group Workspaces using Jakarta Slide - a WebDAV server supporting the WebDAV Access Control Protocol.

Transformation Methodology from Specification of ESTELLE to VHDL (ESTELLE 명세에서 VHDL 명세로의 변환 방법론)

  • 이미경;이익섭;김선규;조준모;김성운
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.174-183
    • /
    • 2000
  • Formal methods for protocol description of a system is based on the implementation id S/W. However, the importance of H/W implementation for a parts of protocol design is increasing. The combination between H/W and IP technology is needed since the implementation environment is changing from S/W to H/W for implementation of specific application protocol. H/W implementation method starting with formal description procedure is essential to guarantree correctness and reliability of the implemented H/W by characteristic of formal description language. Inthis paper, for an automated H/W implementations, ESTELLE, a formal description method, is adopted. A transformation method from specification of ESTELLE to VHDL is suggested. This is an conceptual method that comparing and analyzing similarities between basic units of protocol description such as computation and communication unit and inter processors in H/W. Then we describe transformation model, and suggest example of transformation from ESTELLE to VHDL with Inres protocol.

  • PDF

Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices (모바일 기기를 위한 가상 스토리지 프로토콜(iATA)의 설계 및 파라메터 최적화)

  • Yeoh, Chee-Min;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.267-276
    • /
    • 2009
  • Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.

A Design and Implementation of WAP Gateway/server Integration Structure based on Linux (LINUX 기반 WAP 게이트웨이/서버 통합구조의 설계 및 구현)

  • Song, Byung-Kwen;Oh, Tae-An
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.209-216
    • /
    • 2003
  • As the interest in the wireless internet services is increasing recently, the related technology development is in active progress. According to WAP (Wireless Application Protocol) specification which is currently considered as one of the most powerful international standardizations, mobile terminal and WAP server are supposed to communicate through WAP Gateway. This paper is about the design and implementation of IWAP platform where WAP Gateway and Server are integrated and supported based on Linux. The proposed WAP platform broadly consists of four modules like WAP Gateway, JAVA based Server development environment, WML Tool-Kit, and MUL (Management User Interface) and for bearer network, SMSC (Short Message Service Center) and CSD (Circuit Switched Data) router are considered.

A Study on the Implemention of a Mini-MAP Network Interface Module for CIM (CIM을 위한 Mini-MAP 네트워크 접속장치의 구현에 관한 연구)

  • 김현기;이전우;하정현;정하재;채영도
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.10
    • /
    • pp.59-68
    • /
    • 1993
  • This paper describes implemation of 'General-purpose ETRI MAP interface module' (GEM) for Mini-MAP network. GEM operates as a Mini-MAP node in our FA system. To communicate between GEM and programmable devices(PD) such as PLC and CNC, serial communication is used. Application programs of a MiNi-MAP host system control and monitor programmable devices via GEM. GEM is implemented and tested on the basis of the MAP 3.0. TBC in the Nini-MAP board performs the function of the MAC sublayer. The LLC sublayer is implemented according to the specification of Class 3 that includes Type 1 and 3. And the MMS services are designed within the scope of implementation class MAP3. All the softwares are implemented under the real-time multitask OS for real-time application of the Mini-MAP and they are loaded into PROMs at the network board of GEM. We tested the LLC functions to make use of a protocol analyzer for the token-passing protocol. Also the MMS conformance test was carried out by exchanging primitives between GEM and a MMS product that had already passed the conformance test. Therefore GEM is proposed as a network tool of Computer Integrated Manufacturing (CIM) to integrate PDs which don't support MAP functions.

  • PDF

Study of Integrated Scheduling Guide in Terrestrial DTV (지상파 DTV 기반의 통합편성가이드에 관한 연구)

  • Moon Nam-Mee;Jang Ho-Yeon
    • Journal of Broadcast Engineering
    • /
    • v.11 no.3 s.32
    • /
    • pp.311-319
    • /
    • 2006
  • Platform operators adopted ATSC standard send only their own channel program schedule information, so in order for the viewer to see other channel information, they have to tune the channel to the other. This issue arises from the operators' lack of bandwidth and the business interest conflicts between the platform operators. This paper guides how ATSC standard could be used within Xlet based application to display other channel information through the ISG (Integrated Scheduling Guide) technology via interactive return channel services. Its own channel information can be displayed by using on-air PSIP (Program and System Information Protocol) data.

A Designing Method of Digital Forensic Snort Application Model (Snort 침입탐지 구조를 활용한 디지털 Forensic 응용모델 설계방법)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users. Snort identifies network indicators by inspecting network packets in transmission. A process on a host's machine usually generates these network indicators. This means whatever the snort signature matches the packet, that same signature must be in memory for some period (possibly micro seconds) of time. Finally, investigate some security issues that you should consider when running a Snort system. Paper coverage includes: How an IDS Works, Where Snort fits, Snort system requirements, Exploring Snort's features, Using Snort on your network, Snort and your network architecture, security considerations with snort under digital forensic windows environment.

A TEST Frame Application Technique for Improving Data Communication and Topology Update Function in Ad-Hoc Tactical Wireless Networks (Ad-Hoc 전술 무선 통신망에서 데이터 통신 및 토폴로지 갱신 기능 향상을 위한 TEST 프레임 적용 기법)

  • You, Ji-Sang;Baek, In-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.1
    • /
    • pp.44-54
    • /
    • 2007
  • In the military field, according to the MIL-STD-188-220, which is an Ad-Hoc communication protocol used for sending out or receiving data and voice smoothly among nodes in the situation that wireless communication nodes move arbitrarily, data communication is cut off because nodes can not know topology changes perpetually in the link disconnection state due to node movement in the case that transmitters do not confirm whether data is delivered to receivers or not, and transmit only the data having routine precedence continuously. In order to solve this problem, we have proposed the technique that makes efficient data communication possible by achieving a rapid topology change detection and link information update using TEST frame. We have analyzed TEST frame application effects in the two aspects of the topology update delay time and the data transmission success ratio.

UC(Unified Communication) Systems Development using Mobile Application (Mobile Application을 이용한 UC(Unified Communication) 시스템 개발)

  • Kim, Hee-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.873-879
    • /
    • 2013
  • In this paper, high-quality business-type communications(UC) capabilities of the communication activities overlap, waste, reducing rework process improvement provides for high efficiency. Messages sent via UC app development, FMC calling features, schedule management organization for the development and deployment DataBase UC server deployment, the search for the JSP implementation, XMPP is using the messaging system. IP-PBX running on the IP network, on the basis of UC applications in real life, improve utilization of the infrastructure necessary to provide services to the system design and implementation.

A Design and Analysis, Simulation of Intelligent Network Application Protocol (차세대지능망 응용 프로토콜 분석/설계 및 검증)

  • Do, Hyun-Sook
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1576-1588
    • /
    • 1997
  • The AIN(Advanced Intelligent Network) employs the Intelligent Network Application Protocol(INAP) which is transparent to services and low layer telecommunication networks. In this paper, we introduce the standard structure of INAP, which has flexible structure for easy expansion as AIN evolves, and we propose a structure of INAP by defining its functional elements. Also we design, analyze the INAP for AAB(Automatic Alternative Billing) service, which is one of the target services of IN CS-1 using object-oriented methodology. We use OMT method which is modified by ObjectGEODE in the analysis phase and SDL language for design. Furthermore we simulate the INAP system to prove that the system has been correctly built and supplies the service correctly for which it was designed.

  • PDF