DOI QR코드

DOI QR Code

The case study for Implementation and verification of Network based on VLSM

VLSM 기반의 네트워크 구현과 검증 사례연구

  • 장재열 (경동대학교 정보보안학과) ;
  • 김노환 (경동대학교 정보보안학과)
  • Received : 2014.09.15
  • Accepted : 2014.11.10
  • Published : 2014.11.30

Abstract

As the volume of internet rapidly increases, the number of IPv4 addresses available is quickly declining, while transition to IPv6 is being delayed. As a interim solution, Variable-Length Subnet Masking(VLSM) addressing scheme, which varies the length of each IP address allowing more efficient, is being used. This paper suggests effective example of network based on virtual network with topology designed using VLSM charting rather than usual theoretical approach in VLSM, which allows more efficient use of address space.

인터넷의 규모가 급성장하면서 IPv4 주소는 고갈되었고 IPv6로의 전이는 지연되고 있다. 차선책으로 IP 주소 크기를 서로 다르게 부여함으로써 IPv4 주소공간의 낭비를 줄일 수 있는 VLSM 주소할당기법이 사용되고 있다. 본 논문에서는 주소공간을 효율적으로 사용할 수 있는 VLSM 기반의 네트워크 설계를 기존의 이론중심에서 탈피하여 VLSM chart를 이용하여 토폴로지를 설계하고 가상 망을 구현하여 시뮬레이션 한 결과를 검증하기 위한 효과적인 구현사례를 제시하였다.

Keywords

References

  1. J. Mogul and J. Postel, Internet Standard Subnetting Procedure (Request for Comments 950). Stanford Univ, CA, USA, Aug. 1985.
  2. R. Braden and J. Postel, Requirements for Internet Gateways. (Request for Comments 1009). USC Information, Sciences Institute, CA. USA, June 1987.
  3. D.-H. Kim, S.-K. Cheon, M. Wu, and C.-G. Kim, "Effective subnet IP address allocation by using VLSM," Conf. of Korea Multimedia Society, Chuncheon, Korea, vol. 5, no. 2, Nov. 2002, pp. 1-8.
  4. S.-K. Cheon, D.-X. Jin, Y.-R. Kim, and C.-G. Kim, "An IP Subnet Address calculation and Management method on VLSM," J. of Korea Information Processing Society, vol. 12-C, no. 97, Feb. 2005, pp. 474-480.
  5. S.-E. Kim, J.-Y. Yoon, J.-S. Jin, S.-C. Lee, and S.-H. Lee "IP subnet model for IEEE 802.16-based access network," Conf. of The Institute of Electronics and Information Engineers, Yongpyung, Korea, vol. 31, no. 1, June 2008, pp. 173-174.
  6. H. Eidnes, "Practical Considerations for Network Addressing using CIDR, "Communications of the ACM, vol 37, issue 8, Aug. 1994, pp. 46-53. https://doi.org/10.1145/179606.179622
  7. U. Garg, P. Verma, Y. S. Moudgil, and S. Sharma, "MAC and Logical addressing (A Review Study)," Int. J. of Engineering Research and Applications, vol. 2, issue 3, May-June 2012, pp. 474-480.
  8. A. B. Mohideen, Lab#10: IP address Design and Subnetting (Computer Networks CPIT 370). Department of Information Technology, King Abdul- Aziz University. 2012.
  9. H. A.-R. Lafta and A. O. Hoori, "Design and Implementation of a Vlsm Simulator," J. of Engineering, vol. 18, no. 9, Sept. 2012, pp. 1030-1041.
  10. H.-J. Suh, "An Improved Algorithm of Distributed QoS in Real-time Networks," J. of the Korea Institute of Electronic Communication Science, vol. 7, no. 1, 2012, pp. 53-60.
  11. Y.-D. Kim, "Transmission Performance of Lattice Structure Ad-Hoc Network under Intrusions," J. of the Korea Institute of Electronic Communication Science, vol. 9, no. 7, 2014, pp. 767-772. https://doi.org/10.13067/JKIECS.2014.9.7.767
  12. W.-S. Seo, J.-P. Park, and M.-S. Jun, "A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class," J. of the Korea Institute of Electronic Communication Science, vol. 7, no. 2, 2012, pp. 287-293.