http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
An Efficient Transaction Cancellation Mechanism of Session Initiation Protocol
Jaecheon Han,Shingak Kang 대한전자공학회 2007 ITC-CSCC :International Technical Conference on Ci Vol.2007 No.7
SIP is a transactional protocol. There are two types of transactions depending on the method of the request: INVITE transaction and NON-INVITE transaction. RFC3261 describes state machines for SIP transactions. Unfortunately, there is a hole in the one of the state machines. When UAC cancels INVITE transaction, a race condition might be occurred. In that case, UAC believes the session is cancelled, but UAS believes the session is immediately established. In this paper, we will describe that why the problem break out and how the problem can be overcome.
Method for providing IP-based voice conferencing service using Session Initiation Protocol
Wook Hyun,ShinGak Kang 대한전자공학회 2007 ITC-CSCC :International Technical Conference on Ci Vol.2007 No.7
Since SIP has been proposed and standardized in IETF, it has been one of major signaling protocol in internet telephony service area. Since SIP has been selected as a base protocol in 3GPP, ITU-T, there have been several kinds of new featured services proposed by extending SIP. However this kind of new featured services requires some service-specific extensions on the signaling protocol. In other words, it is required to upgrade or replace firmware of end user devices for accommodating each new service. In this paper, we introduce a way of providing conference service to conference-unaware SIP UAs.
Analysis of Electronic Surveillance Methods for VoIP Communication
Soyoung Park,Sunghei Kim,Shingak Kang 대한전자공학회 2009 ITC-CSCC :International Technical Conference on Ci Vol.2009 No.7
This paper describes technical considerations for electronic surveillance of VoIP communication, especially in Korea. There are several methods for electronic surveillance of VoIP communication including Tapping, SSW/Router-based ES and SBC-based ES. In this document, architecture and characteristics of each method and considerations to be taken for the decision of VoIP ES method are provided.
Loop Detection of Internal Resources within Resource List URI in Resource List Server
MiYoung Huh,Wook Hyun,ShinGak Kang 대한전자공학회 2007 ITC-CSCC :International Technical Conference on Ci Vol.2007 No.7
We will describe the system components in the presence service using resource list server. And we will suggeste the loop detection mechanism among resources within resource list.
Mesh Routing Protocol with Use of Mac Cross-Layer for Wireless Mesh Networks
Sung Hei Kim,Shingak Kang,Sang Ha Kim 대한전자공학회 2007 ITC-CSCC :International Technical Conference on Ci Vol.2007 No.7
The wireless mesh network(WMN) has emerged as a key technology for next-generation wireless networking. The reason is that the network infrastructure based on WMN can be creased with much simplicity and cost-efficiently compared to the convetional wired method. The WMN has many advantages but also some open issues that needs to be solved to make efficient use of this promising technology. One of the problem is finding an efficient mesh routing protocol that can be used in the WMN. The routing protocol of the WMN routers needs to interact woth the MAC layer in order to improve performance. This paper proposed the use of IEEE 802.21 MIH(Media Indepenedent Handover) technique for the interaction between MAC and routing layer. The use of MIH would make WMN flexible and efficient.
박소영(Soyoung Park),강신각(Shingak Kang) 한국정보보호학회 2011 情報保護學會誌 Vol.21 No.2
본 고는 ITU-T SG17 Q.5 "Countering spam by technical means"에서의 스팸 대응 기술 표준화 현황을 정리한다. Q.5/17에서의 스팸차단기술 표준화는 주로 이메일 스팸, IP 멀티미디어 스팸, 모바일 단문메시지서비스 스팸을 대상으로 하며, 스팸 차단을 위한 상위 수준의 개요 표준, 기술 프레임워크 표준 및 기술 기법에 대한 표준 개발이 이루어지고 있다.
Presence Architecture for RFID-based Supply Chain
최선완,김은숙,강신각,J.J. Garcia-Luna-Aceves 안양대학교 산업기술연구소 2004 自然科學硏究 Vol.11 No.1
RFID-based supply chain is performed by using RFID tags and readers to pass RFID tag numbers, and then leveraging the Internet to access large amount of associated information that can be shared among authorized users [6]. The information is for physical objects such as foods, items, goods, equipments, or transportations. They move through supply chain such as manufactures, distributors, and retailers. The movement incurs the change of location (spatial and/or temporal) and ownership. The status of change should be notified to information recipients. This paper defines presence architecture for the RFID-based supply chain. This paper adopts the previous work of the IETF GEOPRIV WG, which applies mobile devices, such as GPS device and cell phone, to a present architecture for the distribution of location objects by examining the existing IETF works [2,3].