• Title/Summary/Keyword: L-헤더

Search Result 11, Processing Time 0.022 seconds

Experimental Study on the Buckling Behavior of L-Shaped Header System (L-헤더 시스템의 좌굴 거동에 관한 실험 연구)

  • Park, Wan Soon;Kim, Gap Deuk
    • Journal of Korean Society of Steel Construction
    • /
    • v.14 no.5 s.60
    • /
    • pp.665-674
    • /
    • 2002
  • The back-to-back and box-shaped headers used in light gauge steel structures have some disadvantages, i.e., construction efficiency and cost competitiveness. As such, cold-formed steel L-shaped headers have been developed and are used actively in advanced nations. However, this system has not been used in Korea because of inadequate investigation and adaptation efforts and lack of application example. Thus, this research evaluated the structural performance of L-header using buckling analyses and bending tests. Test results were compared using the AISI design criteria. Test results showed that local buckling and distortional buckling governed buckling behavior in gravity loads and uplift loads, respectively. These results were consistent with the calculated nomial strengths using the AISI design criteria.

An Improved CBRP using Secondary Header in Ad-Hoc network (Ad-Hoc 네트워크에서 보조헤더를 이용한 개선된 클러스터 기반의 라우팅 프로토콜)

  • Hur, Tai-Sung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.1
    • /
    • pp.31-38
    • /
    • 2008
  • Ad-Hoc network is a network architecture which has no backbone network and is deployed temporarily and rapidly in emergency or war without fixed mobile infrastructures. All communications between network entities are carried in ad-hoc networks over the wireless medium. Due to the radio communications being extremely vulnerable to propagation impairments, connectivity between network nodes is not guaranteed. Therefore, many new algorithms have been studied recently. This study proposes the secondary header approach to the cluster based routing protocol (CBRP). The primary header becomes abnormal status so that the primary header can not participate in the communications between network entities, the secondary header immediately replaces the primary header without selecting process of the new primary header. This improves the routing interruption problem that occurs when a header is moving out from a cluster or in the abnormal status. The performances of proposed algorithm ACBRP(Advanced Cluster Based Routing Protocol) are compared with CBRP. The cost of the primary header reelection of ACBRP is simulated. And results are presented in order to show the effectiveness of the algorithm.

  • PDF

Numerical Analysis of Flow Rate Distribution of Diffusers with Various Shapes (다양한 디퓨저 형상의 유량 분배 특성에 관한 수치해석 연구)

  • Kim, Myoung Soo;Kim, Hoo Bae;Choi, Hyoung Gwon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.38 no.9
    • /
    • pp.789-795
    • /
    • 2014
  • In this study, the distribution characteristics of diffusers with various shapes that are installed in an open-type thermal storage system are numerically investigated. Four diffusers are designed to distribute a working fluid evenly through the holes on bifurcated pipes. Three-dimensional steady simulations of incompressible laminar flow are conducted using commercial software (ANSYS-FLUENT). The simulation results show that both the bidirectional header-type diffuser and the H-type diffuser distribute the working fluid evenly whereas both the unidirectional and the bidirectional diffusers distribute the working fluid unevenly. The results also show that the H-type diffuser requires a higher head of pump than the bidirectional header-type diffuser. Therefore, the bidirectional header-type diffuser is recommended for use because it enables even distribution of the working fluid and requires a low head of pump.

Investigation of Flow Distribution Characteristics at the Channel Location according to the Header Shape of Welded Plate Heat Exchanger (용접식 판형열교환기 헤더형상에 따른 채널 위치별 유량 분배 특성 고찰)

  • Ham, Jeonggyun;Kim, Eui;An, Sungkook;Cho, Honghyun
    • Journal of the Korean Society for Geothermal and Hydrothermal Energy
    • /
    • v.15 no.3
    • /
    • pp.7-13
    • /
    • 2019
  • To improve the flow distribution at channel locations in the welded plate heat exchanger with "L"-type inflow, the flow visualization of Model 1 was carried out. Besides, the characteristics of flow distribution was investigated experimentally according to the header shape. The inlet flow rate for each channel location was increased at the side channels but decreased at the central channels. In the case of Model 2, which has a slant structure added to the basic header of Model 1, the unevenness of inlet flow increased by 23% from 0.019 to 0.023 as compared to Model 1. On the other hand, Model 3, which has a baffle structure added to Model 2, showed 0.064 unevenness in inlet flow, which was a 36% reduction one compared to Model 1. To improve the distribution at each channel in the welded plate heat exchanger with "L"-type flow, it is necessary to improve the header external shape for the guide of flow as well as the baffle structure for reduction of vortex flow.

ATM Cell Security Techniques Using OFB Mode on AES Block Cipher (AES 블록 암호에 OFB 모드를 적용한 ATM 셀 보안 기법)

  • Im, Sung-Yeal
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1237-1246
    • /
    • 2021
  • This paper is about Asynchronous Transfer Mode (ATM) cell security in which an Output Feedback (OFB) mode is applied to an AES block ciphers. ATM cells are divided into user data cells and maintenance cells, and each cell is 53 octets in size and consists of a header of 5 octets and a payload of 48 octets. In order to encrypt/decrypt ATM cells, the boundaries of cells must be detected, which is possible using the Header Error Control (HEC) field in the header. After detecting the boundary of the cell, the type of payload is detected using a payload type (PT) code to encrypt only the user cell. In this paper, a security method for ATM cells that satisfies the requirements of ISO 9160 is presented.

Proposal for Designing and Building a Special Purpose Web Server with Enhanced Security (보안이 강화된 특수목적용 웹서버 설계 및 구축 제안)

  • Hong, Seong-Rak;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.71-79
    • /
    • 2022
  • Currently, even if control and mock hacking are performed for the security of web servers, vulnerabilities continue to occur and be hacked. To solve this problem, we have developed a secure web server that can control all web communication using sockets between L4 and L5. And when giving HTTP responses, we proposed a method of combining files and headers in advance. As a result, both security and speed could be improved. Therefore, in this paper, we proposed the reason why vulnerabilities occur even if control and mock hacking occur, a solution to it, and a security web server development method that can maintain security up to DB.

Performance Analysis of an Multiplexer for Guaranteed QoS in ATM Networks (ATM망에서 보장된 QoS을 위한 다중화기의 성능분석)

  • 음호식;이명호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.82-89
    • /
    • 2000
  • This study analyzes the cell loss probability of an ATM multiplexer with real time and non-real time bursty traffics. It is assumed that an ATM multiplexer with loss priority control for the analysis. The loss priority control uses the CLP Reld of cell header. For easy analysis and less computation. the multiplexed traffic of the ATM multiplexer was modeled by the MMDP. The ATM multiplexer is simulated by the MMDP/MMDP/l/K queueing system. From the above results, The connection admission of an ATM multiplexer with loss priority control is determined by the cell loss probability with low priority as well as the size of threshold buffer. Therefore, to increase the statistical multiplexing gain it will be good to utilize the loss priority control in order.

  • PDF

Error Recovery Schemes with IPv6 Header Compression (IPv6 헤더 압축에서의 에러 복구방안)

  • Ha Joon-Soo;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1237-1245
    • /
    • 2006
  • This paper presented a hardware implementation of ARIA, which is a Korean standard l28-bit block cryptography algorithm. In this work, ARIA was designed technology-independently for application such as ASIC or core-based designs. ARIA algorithm was fitted in FPGA without additional components of hardware or software. It was confirmed that the rate of resource usage is about 19% in Altera EPXAl0F1020CI and the resulting design operates stably in a clock frequency of 36.35MHz, whose encryption/decryption rate was 310.3Mbps. Consequently, the proposed hardware implementation of ARIA is expected to have a lot of application fields which need high speed process such as electronic commerce, mobile communication, network security and the fields requiring lots of data storing where many users need processing large amount of data simultaneously.

BPFast: An eBPF/XDP-Based High-Performance Packet Payload Inspection System for Cloud Environments (BPFast: 클라우드 환경을 위한 eBPF/XDP 기반 고속 네트워크 패킷 페이로드 검사 시스템)

  • You, Myoung-sung;Kim, Jin-woo;Shin, Seung-won;Park, Tae-june
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.213-225
    • /
    • 2022
  • Containerization, a lightweight virtualization technology, enables agile deployments of enterprise-scale microservices in modern cloud environments. However, containerization also opens a new window for adversaries who aim to disrupt the cloud environments. Since microservices are composed of multiple containers connected through a virtual network, a single compromised container can carry out network-level attacks to hijack its neighboring containers. While existing solutions protect containers against such attacks by using network access controls, they still have severe limitations in terms of performance. More specifically, they significantly degrade network performance when processing packet payloads for L7 access controls (e.g., HTTP). To address this problem, we present BPFast, an eBPF/XDP-based payload inspection system for containers. BPFast inspects headers and payloads of packets at a kernel-level without any user-level components. We evaluate a prototype of BPFast on a Kubernetes environment. Our results show that BPFast outperforms state-of-the-art solutions by up to 7x in network latency and throughput.