• Title/Summary/Keyword: Internet Domain

Search Result 703, Processing Time 0.024 seconds

Assessing Resilience of Inter-Domain Routing System under Regional Failures

  • Liu, Yujing;Peng, Wei;Su, Jinshu;Wang, Zhilin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1630-1642
    • /
    • 2016
  • Inter-domain routing is the most critical function of the Internet. The routing system is a logical network relying on the physical infrastructure with geographical characteristics. Nature disasters or disruptive accidents such as earthquakes, cable cuts and power outages could cause regional failures which fail down geographically co-located network nodes and links, therefore, affect the resilience of inter-domain routing system. This paper presents a model for regional failures in inter-domain routing system called REFER for the first time. Based on REFER, the resilience of the inter-domain routing system could be evaluated on a finer level of the Internet, considering different routing policies of intra-domain and inter-domain routing systems. Under this model, we perform simulations on an empirical topology of the Internet with geographical characteristics to simulate a regional failure locating at a city with important IXP (Internet eXchange Point). Results indicate that the Internet is robust under a city-level regional failure. The reachability is almost the same after the failure, and the reroutings occur at the edge of the Internet, hardly affecting the core of inter-domain routing system.

A study on hangul domain structure application on internet (인터넷의 한글도메인 체계 적용에 관한 연구)

  • Kim, Weon;Chin, Yong-Ohk
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.301-304
    • /
    • 1998
  • Now, the world is faced with radical changing in the new rvolution which is followed by speading and utilization of internet. The domain names which are currently used on the internet are unique throgh out the world. Therefore, U.S government positively intervenes in the management of the internet domain name for the effective implementation. The thesis descrbes research of the korean domain name system which allows us to use korea character into current internet domain name system and implements the architecture of the korean domain name system by analysis the structure and behavior of domain name server.

  • PDF

Bad Faith Intent in Internet Address Resources Act (인터넷주소자원에 관한 법률 제12조에 규정된 부정한 목적의 해석 : 대법원 2013. 4. 26. 선고 2011다64836 판결을 중심으로)

  • Park, Young-Gyu
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.129-148
    • /
    • 2014
  • Generally, the Internet Address Resources Act is intended to protect the public from acts of Internet "cybersquatting", a term used to describe the bad faith, abusive registration of Internet domain names. In determining whether a person has a bad faith intent, a court may consider factors such as, (1) the trademark or other intellectual property rights of the person, if any, in the domain name, (2) the extent to which the domain name consists of the legal name of the person or a name that is otherwise commonly used to identify that person, (3) the person's prior use, if any, of the domain name in connection with the bona fide offering of any goods or services, (4) the person's bona fide noncommercial or fair use of the mark in a site accessible under the domain name, (5) the person's intent to divert consumers from the mark owner's online location to a site accessible under the domain name that could harm the goodwill represented by the mark, either for commercial gain or with the intent to tarnish or disparage the mark, by creating a likelihood of confusion as to the source, sponsorship, affiliation, or endorsement of the site, (6) the person's offer to transfer, sell, or otherwise assign the domain name to the mark owner or any third party for financial gain without having used, or having an intent to use, the domain name in the bona fide offering of any goods or services, or the person's prior conduct indicating a pattern of such conduct.

A Dynamic Internet Address Model for Providing Customized Information (사용자 맞춤형 정보 제공을 위한 동적 인터넷 주소 모델)

  • Lee, Young Ho;Koo, Yong Wan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.27-34
    • /
    • 2016
  • The referents of internet addresses are no longer limited to web sites. A new address service by the international organization for the internet address (ICANN) introduces an open space for the TLD (Top Level Domain) strings so that each service, content, product, and other linguistic expressions may be allowed. The open TLD addresses are more suitable for representing the address of service units, contents, or products. In this paper, as an alternative to static Internet address service to return a consistent mapping result regardless of a user-specific different requirements, we design a dynamic internet address mapping model that returns mapping result to suit user particular requirements. In addition, we propose a method for implementing a internet address service without any changes in the existing domain protocols. It may implement a dynamic internet address by attaching to a encoded user's metadata and environment data within a internet address representation, and adding the module for dynamic mapping to the name servers. Through this proposal, trying to expand the functions of internet address, it is expected to be able to provide customized informaiton retrieval services for each user by using just internet address.

Development of Domain Model and Reuse Using Model Template (모델 템플리트를 이용한 도메인 모델 개발과 재사용)

  • 김지홍
    • Journal of Internet Computing and Services
    • /
    • v.3 no.3
    • /
    • pp.39-53
    • /
    • 2002
  • Since domain model affects largely on the development of object model and design decisions, this model is widely used in the object-oriented and component-based system development. Current $\infty$ methods and UML notation, however, do not support both engineering with reuse and engineering for reuse, This problem causes delay in project development time and inadequate domain model. The integration of extended UML notation and reuse process method can provide a solution to the reusability problem. In this paper, we designed UML based domain model template for the reuse of domain model and proposed domain model development method for the reuse of analysis information, In addition, it was possible to represent reusable domain model template in UML and to develope domain model in the internet sales domain.

  • PDF

ITU, Internet 도메인 네임 관리개선을 위한 gTLD-MoU회의 개최

  • 이홍림
    • TTA Journal
    • /
    • s.51
    • /
    • pp.108-117
    • /
    • 1997
  • 현행 Internet 도메인 네임(domain name)에 대한 관리체계를 개선하기 위한 gTLD-MoU회의가 4월 29일부터 5월1일까지 스위스 제네바의 ITU본부에서 개최되었다. 현재 미국 독점으로 관리되고 있는 Internet top level domain name의 등록 및 관리체계를 전면적으로 개선하기 위해 개최된 본 회의는 지난해 11월 발족이후 이에 대한 검토작업을 진행해 온 IAHC(Internet International Ad Hoc Committee)의 주관으로 IANA, ISOC, ITU, WIPO를 포함, 전 세계로부터 101개 기관, 126명의 대표가 참석하였으며, 향후 Internet top level domain name의 등록업무 및 관리체계 개선에 관한 세부내용을 담은 양해각서(gTLD-MoU)에 대한 논의와 함께 80개 기관 대표가 서명에 참가한 가운데 gTLD-MoU에 대한 서명식을 가졌다. 한편, gTLD-MoU가 5월 1일로 정식 발효됨에 따라 ITU는 앞으로 gTLD-MoU의 관리기관(depository) 역할을 수행하게 되며, MoU 및 서명자 관리와 관련정보의 유통업무 등을 담당하게 된다.

  • PDF

Domain Adaptation Image Classification Based on Multi-sparse Representation

  • Zhang, Xu;Wang, Xiaofeng;Du, Yue;Qin, Xiaoyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2590-2606
    • /
    • 2017
  • Generally, research of classical image classification algorithms assume that training data and testing data are derived from the same domain with the same distribution. Unfortunately, in practical applications, this assumption is rarely met. Aiming at the problem, a domain adaption image classification approach based on multi-sparse representation is proposed in this paper. The existences of intermediate domains are hypothesized between the source and target domains. And each intermediate subspace is modeled through online dictionary learning with target data updating. On the one hand, the reconstruction error of the target data is guaranteed, on the other, the transition from the source domain to the target domain is as smooth as possible. An augmented feature representation produced by invariant sparse codes across the source, intermediate and target domain dictionaries is employed for across domain recognition. Experimental results verify the effectiveness of the proposed algorithm.

A Derivation of Resource Level Domain Names (자원단위 도메인이름의 도출)

  • Han, Young-S.
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.179-186
    • /
    • 2008
  • The access to web applications has continuously evolved toward the adoption of content centric interfaces. Services and information items are much of user's concern than web sites. For an efficient accommodation of increasing needs of content oriented operations, the scope of domain names is extended in two directions. A naming scheme is derived that is suitable for resource level access units and the semantics of domain names is conceived as very flexible functions. First extension regards the removal of unnecessary TLD's of domain names for resource level binding. Second extension makes the resource level domain names rich in functional binding and consequently various applications can be directly triggered by the invocation of domain names without intervening medium. These extensions may lay a certain direction for the future internet evolution.

  • PDF

Internet Governance & Politics of Expertise (인터넷 거버넌스와 전문성의 정치)

  • Kim, Ji-Yeon
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.5-20
    • /
    • 2013
  • ICANN has been governing the Domain Name System(DNS) "technically" since 1998. The architecture is called Internet Governance, and it brings about many different discourses; "What does that govern?", "Who delegate its role to ICANN?"," How could the regime ensure fairness?" etc. This article will analyze on Internet Governance by applying the government approach of Foucault, and try to compare two parts, the 'core' and the 'edge' of Internet Governance for method. Whereas the 'core' of it refers the site that be governed by the formal contract directly, the 'edge' as the rest of it means informal friendly relations with ICANN. The 'core' rule was stemmed from technological community such as IAB or IETF historically. They had invented new world and its population to integrate the technical order as protocol and the semiotic order as language, that be based on new government mode. On the other hand, ".KR" domain, one of the 'edges', has been evolved into more heterogeneous system, through contest and conflict between traditional state and Internet Governance. The governed object of ".KR" domain is situated in the crossing of each other the 'protocol user', the 'language-semiotic user' and the' geographical resident'. Here the 'geographical resident' rule was weird for DNS, so that shows the internal lack of Internet Governance. It needs to move to the concept of 'Hangeul(Korean-language) user' rather than the 'geographical resident'.

  • PDF

Inter-domain Authentication Mechanism using MIPv6 in Portable Internet Environments (휴대인터넷 환경에서 모바일 IPv6을 이용한 인터 도메인간 인증)

  • Jeong Yoon-Su;Woo Sung-Hee;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.223-230
    • /
    • 2006
  • Portable Internet is a new service providing a high-speed wireless Internet service. The high-speed wireless Internet service guarantees terminal mobility. Portable Internet is expected to commercialize in 2005. Network expansion and terminal mobility should be guaranteed in of order to efficiently introduce and distribute portable Internet service. Accordingly, the thesis suggests a mechanism which applies mobile IPv6 technology and supports inter-domain authorization In order to guarantee expansion and mobility of portable Internet. The suggested mechanism applies diameter protocol to the mobile IPv6 to improve securities. Also, The suggested mechanism safely transmits data at the minimal signal number, to guarantee the data secrecy.

  • PDF