• Title/Summary/Keyword: Network NAT

Search Result 306, Processing Time 0.023 seconds

A Study on Unevenness of Paper Surface Properties - Effect of Hot Calendering on Surface Roughening -

  • Chin, Seong-Min;Youn, Hye-Jung;Jung, Hyun-Do;Choi, Ik-Sun
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2006.06b
    • /
    • pp.485-488
    • /
    • 2006
  • Surface roughening which is occurred by interaction between base paper and water in coating color deteriorates surface properties of coated paper. In this study, the effect of calendering variables on surface roughening and the relationship between hot calendering and water penetration depth were investigated. BCTMP handsheets were calendered at the various conditions of temperature and linear load, and its PPS roughness was measured before and after moistening to evaluate surface roughening. To determine water penetration depth, thickness was measured from the cross sectional images of sheet which were obtained using CLSM technique. High pressure calendering was beneficial to reduce surface roughness before coating but its smoothening effect was mostly lost by contact with water. On the contrary, sheet calendered at the highest temperature showed the lowest roughening. High temperature calendering allowed the smallest penetration of water into fiber network because of sufficient deformation and densification in top side of z-direction of sheet. Consequently, hot calendering could be the effective way to reduce surface roughening and unevenness of paper surface.

  • PDF

Positioning using ZigBee and Ultrasound

  • Park, Chan-Sik;Kim, Seung-Beom;Kang, Dong-Youn;Yun, Hee-Hak;Cha, En-Jong;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.217-222
    • /
    • 2006
  • To find a location, GPS has been wildly used. But, it is hard to use in indoor because of very weak signal level. To meet indoor requirements, there have been many studies applying wireless communication networks such as WLAN, UWB and ZigBee. Among these, ZigBee is widely adopted in many WSN applications because it has an advantage of low-power and low-cost. In ZigBee, the RSSI is used as range measurement for ad-hoc network. The RSSI are converted to ranges using the signal attenuation model and these ranges become inputs of positioning methods. The obtained position with RSSI has large error because of its poor accuracy. To overcome this problem, ultrasonic sensors are added in many researches. By measuring the arrival time difference of ZigBee and ultrasound as a range measurement, the precise position can be found. However, there are still many problems: scheduling of beacons to transmit signals in a correct order, addition and synchronization of beacons and low-rate positioning rate. At this paper, an efficient method to solve these problems is proposed. In the proposed method, a node transmits ZigBee and ultrasound signal simultaneously. And beacons find the range with the received signals and send it back to a node with ZigBee. The position is computed in a node with the received ranges. In addition, a new positioning algorithm to solve the risk of the divergence in the linearization method and the singularity problem in the Savarese method is presented. Both static and dynamic experimental results show 0.02m RMS errors with high output rate.

  • PDF

Control of the Z-Source Inverter using Average Model (평균 모델을 이용한 Z-소스 인버터의 제어)

  • Lee, Kwang-Woon
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.19 no.3
    • /
    • pp.290-296
    • /
    • 2014
  • This paper presents a design strategy for the control of the Z-source inverter (ZSI). For the Z-network capacitor voltage control, the average current model is derived to describe the dynamics of the voltage control and the controller outputs the average current command for the capacitor. Z-network inductor current reference is derived from the average current model of the Z-network capacitor. The inner current control loop outputs the average voltage command for the Z-network inductor and the shoot-through duty ratio of the ZSI is calculated from the output using the average voltage model of the Z-network inductor. The gain values of the current and voltage controllers are directly obtained by the Z-network parameters and desired bandwidth of each controller without a gain tuning process.

Ubiquitous Home Networking Architecture based on Virtual Overlay Network (가상 오버레이 네트워크 기반 유비쿼터스홈 네트워킹 구조)

  • Park, Ho-Jin;Park, Jun-Hee;Kim, Nam
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.8-17
    • /
    • 2010
  • Ubiquitous home refers not only to home but also to logical space, including a wide range of out-home personal devices such as mobile phones, PDAs, laptops, car navigators, and office PCs. There are certain connection barriers among the devices, such as the dynamic IP address, NAT. In a home network, various devices coexist in heterogeneous networks, such as IP, IEEE1394, PLC, Bluetooth, ZigBee, UWB, and IrDA, all of which lack interoperability due to their different physical transmission characteristics and protocols. In ubiquitous home where an unrestricted collaboration of the devices is essential to offer services that meet the users' requirements, free interoperability among the devices must be guaranteed. This paper proposes a networking model for interoperability of the heterogeneous devices in a ubiquitous home based on a virtual overlay network which hides the complicated physical network configurations and heterogeneity of the service protocols.

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

Comparison of Efficiency for Voltage Source and Current Source Based Converters in 5MW PMSG Wind Turbine Systems (전압형 및 전류형 컨버터를 적용한 5MW PMSG 풍력발전시스템의 효율 비교)

  • Kang, Tahyun;Kang, Taewon;Chae, Beomseok;Lee, Kihyun;Suh, Yongsug
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.20 no.5
    • /
    • pp.410-420
    • /
    • 2015
  • This paper provides a comparison of power converter loss and thermal description for voltage source and current source type 5 MW-class medium-voltage topologies of wind turbines. Neutral-point clamped three-level converter is adopted for a voltage source type topology, whereas a two-level converter is employed for current source type topology, considering the popularity in the industry. To match the required voltage level of 4160 V with the same switching device of IGCT as in the voltage source converter, two active switches are connected in series for the case of current source converter. Transient thermal modeling of a four-layer Foster network for heat transfer is done to better estimate the transient junction and case temperature of power semiconductors during various operating conditions in wind turbines. The loss analysis is confirmed through PLECS simulations. Comparison result shows that the VSC-based wind turbine system has higher efficiency than the CSC under the rated operating conditions.

Transportation Network Data Generation from the Topological Geographic Database (GIS위상구조자료로부터 교통망자료의 추출에 관한 연구)

  • 최기주
    • Spatial Information Research
    • /
    • v.2 no.2
    • /
    • pp.147-163
    • /
    • 1994
  • This paper presents three methods of generating the transportation network data out of the topological geographic database in the hope that the conversion of the geographic database file containing the topology to the conventional node-link type trans¬portation network file may facilitate the integration between transportation planning mod¬els and GIS by alleviating the inherent problems of both computing environments. One way of the proposed conversion method is to use the conversion software that allows the bi-directional conversion between the UTPS (Urban Transportation Planning System) type transportation planning model and GIS. The other two methods of data structure conversion approach directly transform the GIS's user-level topology into the transportation network data topology, and have been introduced with codes programmed with FORTRAN and AML (Arc Macro Language) of ARC/INFO. If used successfully, any approach would not only improve the efficiency of transportation planning process and the associated decision-making activities in it, but enhance the productivity of trans¬portation planning agencies.

  • PDF

Design and Implementation of ARIA Cryptic Algorithm (ARIA 암호 알고리듬의 하드웨어 설계 및 구현)

  • Park Jinsub;Yun Yeonsang;Kim Young-Dae;Yang Sangwoon;Chang Taejoo;You Younggap
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.4 s.334
    • /
    • pp.29-36
    • /
    • 2005
  • This paper presents the first hardware design of ARIA that KSA(Korea Standards Association) decided as the block encryption standard at Dec. 2004. The ARIA cryptographic algorithm has an efficient involution SPN (Substitution Permutation Network) and is immune to known attacks. The proposed ARIA design based on 1 cycle/round include a dual port ROM to reduce a size of circuit md a high speed round key generator with barrel rotator. ARIA design proposed is implemented with Xilinx VirtexE-1600 FPGA. Throughput is 437 Mbps using 1,491 slices and 16 RAM blocks. To demonstrate the ARIA system operation, we developed a security system cyphering video data of communication though Internet. ARIA addresses applications with high-throughput like data storage and internet security protocol (IPSec and TLS) as well as IC cards.

Optical Switching Architectures using WDM for High-Speed ATM Networks (고속 ATM망을 위한 파장 분할 광교환기 구조)

  • So, W.H.;Lee, C.H.;Kim, Y.S.;Kim, Y.C.
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.8
    • /
    • pp.12-20
    • /
    • 1998
  • All-optical networks(AON) are emerging as the next generation broadband networks for wide-area and local-area networks. Many optical switch architectures are currently proposed to realize AON. Specially, optical switches using WDM have a lot of advantages in point of the optical transparency and network topology for B-ISDN services in AON. In this paper, two kinds of Knockout Optical Switching Architectures(KOSA) are proposed for high speed optical ATM networks. We use WDM technologies for them to operate in all-optical area and they are called Architecture-Ⅰ, Architecture-Ⅱ respectively. Each one represents different characteristics according to the number of components and the kind of components, which make KOSA have different performance and system complextity. In order to verify and to compare the performance, these architectures were analyzed and simulated in terms of cell loss ratio, system complexity and buffering speed.

  • PDF

Design and Implementation of Multipoint VoIP using End-point Mixing Model (단말혼합 방법을 이용하는 다자간 VoIP의 설계 및 구현)

  • Lee, Sung-Min;Lee, Keon-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.335-347
    • /
    • 2007
  • VoIP (Voice over IP) is a technology to transport video and voice traffic over IP networks such as Internet. Today, the VoIP technology is viewed as the right choice for providing voice, video, and data communication among various terminals over the next generation network. This paper discusses a multipoint VoIP implementation with end-point mixing model which can support multipoint conference without a conference bridge. The multipoint VoIP is implemented with SIP (Session Initiation Protocol), and supports STUN (Simple Traversal of UDP Through NATs) since it works in an asymmetric NAT (Network Address Translator) environment. The characteristics of this paper are as follows. It is possible that all terminals in the hierarchical conference don't receive the duplicated media information because we use the end-point mixing model with the new media processing module. And, the paper solves the problem that the hierarchical conference session should be separated into several sessions when a mixing terminal terminates the hierarchical conference session.

  • PDF