• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.025 seconds

A STUDY OF AN NAT USING THE TCP SEGMENT INFORMATION (TCP 세그멘트 정보를 이용한 NAT에 대한 연구)

  • JaeYongHwang;GiHoJoo
    • Journal of the Korean Geophysical Society
    • /
    • v.4 no.4
    • /
    • pp.239-249
    • /
    • 2001
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP addresses into authentic Internet addresses. The main features of NAT are to improve network security and to save IP addresses. Generally speaking, in order to perform its functionality. NAT uses the address informaiton in the packet header. Certain application protocols, however, use the information in the packet data as well as the imformation in the packet header to perform end-to-end communication. Therefor, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet data into real IP information by using port proxy server.

  • PDF

Development of automatic alert populating system of earth structures based on sensor monitoring (센서 모니터링을 활용한 토류구조물 상황전파 자동화 시스템 개발)

  • Kim, Yong-Su;Ahan, Sang-Ro;Jung, Jae-Hyun;Han, Sang-Jea;Jung, Seung-Yong
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.03a
    • /
    • pp.667-672
    • /
    • 2009
  • Gathering information and systemization of infrastructure disaster management is to reduce uncertainties in making decisions and maximize the number of alternations. The key objects of a sensor-based progress report and propagation automation systems are to provide objective data, realize and support decision making and deliver them to a certain area, department, manager and other people rapidly. The major findings and results of this study are as follows. 1) Application of international standard-based alerting protocol(CAP; Common Alerting Protocol). 2) Development of database of existing progress report and propagation manual in order to achieve networking of safety management on major social infrastructure of the nation. 3) Development middleware application programs to progress report and propagation data using SMS, FAX, EMS, VMS, MMS.

  • PDF

A Digital Carousel System based on CoAP for N-Screen Environment (N-스크린 환경을 위한 CoAP 기반 디지털 캐로절 시스템)

  • Ko, Eung-nam
    • Journal of Digital Contents Society
    • /
    • v.17 no.1
    • /
    • pp.59-63
    • /
    • 2016
  • In this paper, we discuss a model for increasing reliability of data through N screen server and client model environment. Our Digital Carousel enables user to share media objects through media synchronization mechanism. We suggest the Digital Carousel system based on CoAP(Constrained Application Protocol) for N-Screen so that the users participated in collaborative work may refer shared media objects as the same view to others. With this sharing system, a group cooperating users can share applications data. This paper explained a performance analysis of a system with function comparison running on multimedia collaboration work based on CoAP and N screen techniques.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Development of Inter-ORB Protocol for FPGA ORB (FPGA ORB를 고려한 ORB 연동 프로토콜 개발)

  • Jeong, Hea-Kyung;Bae, Myung-Nam;Lee, In-Hwan;Lee, Yong-Seok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.10
    • /
    • pp.34-42
    • /
    • 2009
  • HAO is a ORB engine to support the logic-based CORBA component developments in FPGA. In this papers, in order to give the interoperability between general CORBA and HAO, we propose newly the specialization of GIOP(General Inter-ORB Protocol) from consideration of FPGA. It compose of the two major capability. First, it can abstract the hardware structure from the various system board environments. Secondly, also it is possible to minimize the monopoly occupation for shared resource such as system bus, external memory.

A Design and Implementation of Remote Video Monitoring System for the Mobile Internet (무선 인터넷에서의 원격 화상 모니터링 시스템의 설계 및 구현)

  • 공인엽
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.53-56
    • /
    • 2001
  • It has been increasing that the use of Mobile Internet these days. And the demand of user is changing from the text based services to multimedia based data services like pictures, sounds and streaming videos in Mobile Internet. In this paper, It is proposed a remote monitoring system that .an transfer the video data through WAP(Wireless Application protocol) based Mobile Internet used generally in anywhere. And this system is a low-cost efficient system compared with a existing high-cost Internet Camera system, using video module connected to Internet directly and PC-based server. In this paper, It is explained a design and implementation of such WAP-based remote monitoring system.

  • PDF

Cross-Layer Reduction of Wireless Network Card Idle Time to Optimize Energy Consumption of Pull Thin Client Protocols

  • Simoens, Pieter;Ali, Farhan Azmat;Vankeirsbilck, Bert;Deboosere, Lien;Turck, Filip De;Dhoedt, Bart;Demeester, Piet;Torrea-Duran, Rodolfo;Perre, Liesbet Van der;Dejonghe, Antoine
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.75-90
    • /
    • 2012
  • Thin client computing trades local processing for network bandwidth consumption by offloading application logic to remote servers. User input and display updates are exchanged between client and server through a thin client protocol. On wireless devices, the thin client protocol traffic can lead to a significantly higher power consumption of the radio interface. In this article, a cross-layer framework is presented that transitions the wireless network interface card (WNIC) to the energy-conserving sleep mode when no traffic from the server is expected. The approach is validated for different wireless channel conditions, such as path loss and available bandwidth, as well as for different network roundtrip time values. Using this cross-layer algorithm for sample scenario with a remote text editor, and through experiments based on actual user traces, a reduction of the WNIC energy consumption of up to 36.82% is obtained, without degrading the application's reactivity.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Implementation of a Medical Information Transmission Protocol Based on Mobile Wireless Communication (무선 이동통신 기술에 기반한 의료 정보 전송 프로토콜 구현)

  • 정희창;한민수
    • Journal of Biomedical Engineering Research
    • /
    • v.19 no.1
    • /
    • pp.19-24
    • /
    • 1998
  • The main goal of this paper is to propose and to test a radio protocol based CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) for the purpose of enhancing the existing medical information system. The feature of the new medical information system, Medical Application Radio System(MARS), which operating in real time is the transmission of medical information in bi-direction between the hospital control office and patients mobile stations. MARS monitors patients linked to the network by radio and provides quick alarm, flexible documentation capabilities, asnd fast treatment for the analysis of collected medical data. The existing medical information system, radio telemetry system which transfers the message of patients to the CAP(Central Access Point) unit in one way at the speed of 9.6Kbps and operates a channel frequency bandwidth. To verify the Performance of the proposed system, we have performed the numerical analysis and have implemented a test system which consists of the 2.4Ghz radio transceiver and personal computer.

  • PDF

Efficient multi-hop relay transmission on sensor network (센서 네트워크 기반 효율적인 멀티 홉 릴레이 전송)

  • Kwon, Tai-Gil;Kim, Do-Hoon;Won, Hui-Chul;Hwang, Kyu-Sung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.7
    • /
    • pp.1-8
    • /
    • 2012
  • In this paper, we consider an efficient protocol for the multi-hop relay transmission on a sensor network which can be utilized in a ubiquitous environment. More specifically, we propose an efficient relaying protocol for the distance and position recognition on the proposed sensor network which performs with the differentially bi-orthogonal chirp spread spectrum (DBO-CSS) in the industrial, scientific and medical (ISM) bands. For an efficient networking access, we design and implement four different packet structures, zone information packet, hop information packet, tag information packet, and application serial packet. Additionally, we also propose an efficient position recognition algorithm. Finally, for verification of our proposed protocol's efficiency, we build the testbed system which consists of $15m{\times}15m$ multi-cell and 10 hops in the network.