• Title/Summary/Keyword: Virtual address

Search Result 199, Processing Time 0.033 seconds

Implementation and performance evaluation of network address translator (네트워크 주소변환 장치 구현 및 성능 평가)

  • Cho Tae-Kyung;Park Byoung-soo
    • Proceedings of the KAIS Fall Conference
    • /
    • 2004.11a
    • /
    • pp.225-229
    • /
    • 2004
  • 현재 인터넷에서 사용하고 있는 네트워크 계층 프로토콜은 IP 버전 4 인데, 이러한 주소 부족 문제를 해결하고자 IP 주소 필드의 길이가 대폭 확장되는 IPv6 라는 새로운 인터넷 프로토콜을 개발하게 된다(5). 그러나 이러한 신 표준안을 인터넷에 실제로 적용하고 운영하기에는 많은 어려운 문제들이 남아있어 그 대안으로 NAT(Network Address Translation)[1]가 등장하게 된다. 그러나 이러한 NAT 기능은 외부 망으로부터의 접촉이 불가능하다는 특성을 가지고 있다. 이러한 특성은 보안 유지측면에서는 장점으로 작용하나, 소규모 기업이나 사무실이 웹(Web) 서버(Server) 나 메일(mail) 서버등을 두고 싶어하는 경우에는 외부에서의 접근이 허용되어야 하므로 단점이 된다. 본 연구에서는 이러한 단점을 파악하기 위하여 NAT 테이블(table) 에 수정을 가함으로써 사설망내부의 특정 서버에 접근할 수 있는 확장된 개념의 NAT를 제안하고자 한다. 아울러 이러한 NAT 기능을 이용하여 구성된 사설망 간의 연결기능을 제공할 수 있는 방법을 제안함으로써 기존의 가상 사설망(VPN : Virtual Private Network) 외 일부 기능도 수용할 수 있도록 하였다.

  • PDF

A study on the risk of taking out specific information by VoIP sniffing technique (VoIP 스니핑을 통한 특정정보 탈취 위험성에 관한 연구)

  • Lee, Donggeon;Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.117-125
    • /
    • 2018
  • Recently, VoIP technology is widely used in our daily life. Even VoIP has become a technology that can be easily accessed from services such as home phone as well as KakaoTalk.[1] Most of these Internet telephones use the RTP protocol. However, there is a vulnerability that the audio data of users can be intercepted through packet sniffing in the RTP protocol. So we want to create a tool to check the security level of a VoIP network using the RTP protocol. To do so, we capture data packet from and to these VoIP networks. For this purpose, we first configure a virtual VoIP network using Raspberry Pi and show the security vulnerability by applying our developed sniffing tool to the VoIP network. We will then analyze the captured packets and extract meaningful information from the analyzed data using the Google Speech API. Finally, we will address the causes of these vulnerabilities and possible solutions to address them.

An Exploration of the Relationship Between Virtual Museum Exhibitions and Visitors' Responses (미술관, 박물관 가상전시디자인에 대한 관람객의 반응연구)

  • Park, Nam-Jin
    • Archives of design research
    • /
    • v.19 no.1 s.63
    • /
    • pp.181-190
    • /
    • 2006
  • This study began with an assumption that virtual museum exhibitions will continue to be created in the future and more knowledge is required about designing effective virtual exhibit designs. This study explored the relationship between virtual exhibitions and visitor's opinions following the viewing of the virtual exhibit in order to determine the components of a well-constructed virtual exhibit design. To address the research problem, this study explored two aspects of virtual exhibit design: 1) what are the components of a well-constructed virtual exhibit, 2) how does viewing the virtual exhibit change visitors' opinions about both physical and virtual museum experiences. The methodology of the study employed surveys, interviews and observations as instruments of data collection. Twenty-five participants were given a survey prior to their viewing of the on-line exhibit, then they were given the opportunity to view the web-site and finally surveyed regarding their opinions. From the 25 participants, six were selected for observation to record behavior exhibited while they viewed the site. In addition, five were interviewed for a better understanding of their responses to various aspects of the virtual exhibit experiences. Data from the surveys was tabulated for descriptive percentages in order to identify numerical patterns of relationship. Observation data was analyzed for simple frequencies in categories of responses and interview data was tape recorded and transcribed into text files. Based on study results, recommendations were made for the future role of interior design in virtual space that stands independent from a physical building and resides only on the Internet.

  • PDF

A Legal Review on Abuse Cases of Virtual Currency and Legal Responses (가상화폐의 악용사례와 법적 대응방안에 관한 고찰)

  • Hwang, Suk-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.585-594
    • /
    • 2018
  • Virtual currencies have emerged along with new technologies such as block chain, artificial intelligence (AI), and big data. This study examines the benefits of a security-enhanced block chain resulting from individual trading, decentralized from governments, as well as the problems associated with misuse of virtual currencies. Virtual currencies, due to its anonymity, is vulnerable to financial crimes, such as ransom-ware, fraud, drug trafficking, tax evasion and money laundering. Use of virtual currencies can facilitate criminals avoid detection from investigative agencies. Government regulatory policy continues to address these concerns, and the virtual currency exchange has also announced a self-regulation proposal. However, a fundamental solution remains necessary. The purpose of this paper is to investigate the problems regarding abuse of virtual currency and to identify a practical system for transactions involving virtual currencies. However, in order to promote transactions involving virtual currencies and to institutionalize a governance system, multilateral cooperation is required. Although the restricting the use of virtual currencies regarding minors and foreign trade, as well as the introduction of a real-name system are considered promising prospects, many problems remain. Virtual currency is not a simple digital item but a method of redesigning the function of money. Coordinated efforts are needed globally to be able to further activate the positive aspects concerning the use of virtual currencies.

Big Data Management System for Biomedical Images to Improve Short-term and Long-term Storage

  • Qamar, Shamweel;Kim, Eun Sung;Park, Peom
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.2
    • /
    • pp.66-71
    • /
    • 2019
  • In digital pathology, an electronic system in the biomedical domain storage of the files is a big constrain and because all the analysis and annotation takes place at every user-end manually, it becomes even harder to manage the data that is being shared inside an enterprise. Therefore, we need such a storage system which is not only big enough to store all the data but also manage it and making communication of that data much easier without losing its true from. A virtual server setup is one of those techniques which can solve this issue. We set a main server which is the main storage for all the virtual machines(that are being used at user-end) and that main server is controlled through a hypervisor so that if we want to make changes in storage overall or the main server in itself, it could be reached remotely from anywhere by just using the server's IP address. The server in our case includes XML-RPC based API which are transmitted between computers using HTTP protocol. JAVA API connects to HTTP/HTTPS protocol through JAVA Runtime Environment and exists on top of other SDK web services for the productivity boost of the running application. To manage the server easily, we use Tkinter library to develop the GUI and pmw magawidgets library which is also utilized through Tkinter. For managing, monitoring and performing operations on virtual machines, we use Python binding to XML-RPC based API. After all these settings, we approach to make the system user friendly by making GUI of the main server. Using that GUI, user can perform administrative functions like restart, suspend or resume a virtual machine. They can also logon to the slave host of the pool in case of emergency and if needed, they can also filter virtual machine by the host. Network monitoring can be performed on multiple virtual machines at same time in order to detect any loss of network connectivity.

Performance Evaluation of Organization Methods and Scheduling Algorithms in a Linux Virtual Server (리눅스 가상 서버의 구성방식과 스케줄링 알고리즘의 성능평가)

  • 박동국;이용우
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.613-615
    • /
    • 2002
  • 본 논문에서는 멀티미디어 데이터의 증가로 인한 네트워크 전송량 폭주 현상 및 서비스 비용의 증가를 감소시키기 위한 방법으로, 부하분산과 관련된 가상서버의 개념에 대해서 알아보고, 대표적인 가상 서버중 하나인 리눅스 가상 서버 (LVS : Linux Virtual Server)의 성능 측정을 통해 멀티미디어 컨텐츠 전송에 사용되는 CDD 시스템에 가장 적합한 가상서버의 구성 및 알고리즘을 도출하였다. 이를 위해서 리눅스 가상서버 시스템을 구축하고, 3가지 구성방식과 8가지 스케줄링 알고리즘에 대한 성능 평가를 수행하였으며, 각 경우에 대한 비교분석을 하였다. 이를 토대로, 추후 CDD 시스템과의 접목을 통하여 네트워크 부하량을 감소시키고, 서버로부터 발생할 수 있는 병목현상을 적은 비용으로 해결할 수 있는 방향을 제시하고자 하였다.

  • PDF

e-Commerce and Korean Express Delivery Industry (전자상거래(電子商去來)와 한국(韓國)의 택배산업(宅配産業))

  • Lim, Seok-Min
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.16
    • /
    • pp.295-329
    • /
    • 2001
  • The wonderful new world of shopping - being able to order items you need by just one click. However, there is one factor that has not changed at all - customers, whether they are private individuals or public companies, want to have the product delivered to their address, and usually as fast as possible too. To achieve this, the operators of virtual shops must make use of a fully operational and efficient delivery service. The internet and its potential for creating a virtual market for millions of buyers and sellers, has generated a lot of excitement in the express delivery industry. Clearly e-commerce will cause greater growth in the business-to-residential package market. Korean express delivery industry is not an exception to this trend. Currently, while major three service providers enjoy a lion's share in Korea, a lot of small and medium companies are struggling to capture more shipments in express parcel market. Nevertheless, it will be forecasted that Korean parcel market will be consolidated and become an oligopoly market in the near future.

  • PDF

Bi-active Load Balancer for enhancing of scalability and fault-tolerance of Cluster System (확장성과 고장 감내를 위한 효율적인 부하 분산기)

  • Kim, Young-Hwan;Youn, Hee-Yong;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.381-384
    • /
    • 2002
  • This paper describes the motivation, design and performance of bi-active Load balancer in Linux Virtual Server. The goal of bi-active Load balancer is to provide a framework to build highly scalable, fault-tolerant services using a large cluster of commodity servers. The TCP/IP stack of Linux Kernel is extended to support three IP load balancing techniques, which can make parallel services of different kinds of server clusters to appear as a service on a single IP address. Scalability is achieved by transparently adding or removing a node in the cluster. and high availability is provided by detecting node or daemon failures and reconfiguring the system appropriately. Extensive simulation reveals that the proposed approach improves the reply rate about 20% compared to earlier design.

  • PDF

The virtual penetration laboratory: new developments for projectile penetration in concrete

  • Adley, Mark D.;Frank, Andreas O.;Danielson, Kent T.;Akers, Stephen A.;O'Daniel, James L.
    • Computers and Concrete
    • /
    • v.7 no.2
    • /
    • pp.87-102
    • /
    • 2010
  • This paper discusses new capabilities developed for the Virtual Penetration Laboratory (VPL) software package to address the challenges of determining Penetration Resistance (PR) equations for concrete materials. Specifically, the paper introduces a three-invariant concrete constitutive model recently developed by the authors. The Advanced Fundamental Concrete (AFC) model was developed to provide a fast-running predictive model to simulate the behavior of concrete and other high-strength geologic materials. The Continuous Evolutionary Algorithms (CEA) automatic fitting algorithms used to fit the new model are discussed, and then examples are presented to demonstrate the effectiveness of the new AFC model. Finally, the AFC model in conjunction with the VPL software package is used to develop a PR equation for a concrete material.

Learning Analytics Framework on Metaverse

  • Sungtae LIM;Eunhee KIM;Hoseung BYUN
    • Educational Technology International
    • /
    • v.24 no.2
    • /
    • pp.295-329
    • /
    • 2023
  • The recent development of metaverse-related technology has led to efforts to overcome the limitations of time and space in education by creating a virtual educational environment. To make use of this platform efficiently, applying learning analytics has been proposed as an optimal instructional and learning decision support approach to address these issues by identifying specific rules and patterns generated from learning data, and providing a systematic framework as a guideline to instructors. To achieve this, we employed an inductive, bottom-up approach for framework modeling. During the modeling process, based on the activity system model, we specifically derived the fundamental components of the learning analytics framework centered on learning activities and their contexts. We developed a prototype of the framework through deduplication, categorization, and proceduralization from the components, and refined the learning analytics framework into a 7-stage framework suitable for application in the metaverse through 3 steps of Delphi surveys. Lastly, through a framework model evaluation consisting of seven items, we validated the metaverse learning analytics framework, ensuring its validity.