• Title/Summary/Keyword: All-IP Network

Search Result 267, Processing Time 0.024 seconds

Intrusion Detection Using Bayesian Techniques on the IPv6 Environment (IPv6 환경에서의 베이지안 기법을 이용한 침해탐지)

  • Koo, Min-Jeong;Min, Byoung-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.385-387
    • /
    • 2006
  • The rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. The IPv6 environment combined the home network and All-IP Network with has arrived, the damages cased by the attacks from the worm attacks and the various virus has been increased. the In this paper, intrusion detection method using Attack Detection Algorithm Using Bayesian Techniques on the IPv6 Environment.

  • PDF

The Interoperability Issue in Broadband Convergence network Implementation (광대역통합망 구축에서 상호운용성 이슈)

  • Lee, Jae-Jeong;Ryu, Han-Yang;Nam, Ki-Dong;Kim, Chang-Bong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.57-64
    • /
    • 2011
  • The NGN (Next Generation Network) means the kernel infrastructure technology to provide information and communication services which are able to be used at present and future when a ubiquitous computing era has been realized. In other words, NGN can be the frame providing the same information and communication services anytime and anywhere regardless of wire and wireless. The broadband convergence network that has been built in the public institution has established a broadband multimedia communication network supporting voice telephone, task net, internet network, video conference network, voice over IP (VoIP) network and etc. It is possible for a requested bandwidth and services to be served, only if a broadband convergence network provide the interoperability between the various classes which include a transport network layer, network control layer, service control layer and other layers. In this paper, we analyzed the interoperability issues of the present broadband convergence network and propose a guideline for the future one.

A Study on Key Delivery Protocols for End-to-End Secure Communication (종단 간 암호화 통신을 위한 키 전달 프로토콜에 관한 연구)

  • Kim, Jung-Yoon;Hwang, In-Yong;Lee, Jong-Eon;Kim, Seok-Joong;Lee, You-Shin;Choi, Hyoung-Kee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.391-394
    • /
    • 2009
  • All-IP는 통신에 관련된 모든 개체가 IP를 사용하는 네트워크를 의미한다. All-IP 네트워크에서는 보안을 위해 통신 내용에 대한 암호화가 반드시 이루어져야 하며, 신뢰할 수 있는 3자 (trusted third party)는 서비스 중재 및 부가 서비스 제공을 위해 통신에 사용된 암호화 키를 획득할 수 있어야 한다. 이는 통신 개체가 다른 개체에게 암호화 키를 전달하는 메커니즘이 필요하다는 것을 의미한다. 우리는 본 논문을 통해, 통신 개체가 다른 개체에게 키를 전달하는 기법을 37에로 분류하고 각 기법에 대해 상세히 설명한다. 또한, 우리는 새로운 키 전달 프로토콜을 제안하고 3가지 운용 모드를 제시한다. 우리가 제안하는 프로토콜용 사용자의 필요에 따라 보안 기능을 선택적으로 운용할 수 있다. 성능평가 및 분석 결과에 따르면, 보안 가능과 성능은 뚜렷한 트레이드오프(trade-off) 관계가 있음을 알 수 있고, 기본적인 기능만을 운용할 경우 추가적인 오버헤드가 거의 없음을 알 수 있다.

  • PDF

A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching

  • Tao, Zhiyuan;Liu, Fenlin;Liu, Yan;Luo, Xiangyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2764-2782
    • /
    • 2021
  • Existing city-level boundary nodes identification methods need to locate all IP addresses on the path to differentiate which IP is the boundary node. However, these methods are susceptible to time-delay, the accuracy of location information and other factors, and the resource consumption of locating all IPes is tremendous. To improve the recognition rate and reduce the locating cost, this paper proposes an algorithm for city-level boundary node identification based on bidirectional approaching. Different from the existing methods based on time-delay information and location results, the proposed algorithm uses topological analysis to construct a set of candidate boundary nodes and then identifies the boundary nodes. The proposed algorithm can identify the boundary of the target city network without high-precision location information and dramatically reduces resource consumption compared with the traditional algorithm. Meanwhile, it can label some errors in the existing IP address database. Based on 45,182,326 measurement results from Zhengzhou, Chengdu and Hangzhou in China and New York, Los Angeles and Dallas in the United States, the experimental results show that: The algorithm can accurately identify the city boundary nodes using only 20.33% location resources, and more than 80.29% of the boundary nodes can be mined with a precision of more than 70.73%.

MIWF: Message Inter-Working Framework to Connect Rich Communication Service Messages and SMS Messages (MIWF: 리치 커뮤니케이션 서비스 메시지와 단문메시지의 연동을 위한 메시지 연동 프레임워크)

  • Lee, Dongcheul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.93-99
    • /
    • 2013
  • We have used SMS to exchange messages between mobile phones. Since the network evolved to the ALL-IP network, the next generation messaging service, RCS, has emerged to the market. Because SMS and RCS coexist, we need to inter-work the messages between SMS users and RCS users. This paper introduces a message inter-working framework(MIWF) that can inter-work SMS and RCS without changing end user's UX. It defines the call flows between the network equipment and MIWF. Also, it shows how MIWF converts messages between 3 protocols. Performance evaluation proves that MIWF does not add loads to the existing network.

Design of QoS Manager related in Radio Resource Allocation within All-IP Network (All-IP 망에서 무선 자원 할당과 연계된 QoS 관리자의 설계)

  • Go, Hui-Chang;Wang, Chang-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8S
    • /
    • pp.2722-2728
    • /
    • 2000
  • 현재의 인터넷 망을 이용하여 음성, 화상 정보를 실시간으로 이용하고자 하는 다양한 응용이 시도되고 있다. 차세대 통신으로 주목 받고 있는 IMT-2000에서도 기존의 회선 교환망 대신 인터넷 망을 이용함으로써 경제성, 관리의 편의성, 새로운 서비스의 창출이 가능한 등의 이점이 있다. 인터넷 망이 최선의 노력(best effort)만을 제공하기 때문에 발생되는 신뢰성과 지연의 문제는 이미 많은 연구가 있어왔고 현재 어느 정도의 서비스 품질을 획득하여 VoIP(Voice Over Internet Protocol)와 같은 서비스가 실제로 이용되고 있다. 그러나 무선 통신의 경우는 이에 더하여 무선 구간에서의 자원 할당의 문제가 남아 있다. 본 연구에서는 코어 망으로 인터넷 프로토콜을 사용하는 차세대 All-IP 망에서, 무선 이동단말 간의 멀티미디어 서비스가 가능하도록 효율적인 주파수 할당을 지원하는 QoS 관리자를 설계하였다. 제안한 QoS(Quality Of Service)관리자는 요구 대역폭이 다른 멀티미디어 호 요청에 대해 융통성 있는 주파수 할당이 가능하도록 대국의 QoS 관리자와의 협상을 통해 제한된 범위 내에서 서비스 품질을 조절하여 보다 많은 호 연결 요청이 성공할 수 있도록 한다.

  • PDF

An analysis on the development of a new multicasting method for telecommunication networking (텔레커뮤니케이션 네트워크상 멀티캐스팅 신기술 개발 분석)

  • Cho, Myeong-Rai
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.5 no.3
    • /
    • pp.27-45
    • /
    • 2010
  • It is strongly believed that multicast will become one of the most promising services on internet for the next generation. Multicast service can be deployed either on network-layer or application-layer. IP multicast (network-layer multicast) is implemented by network nodes (i.e., routers) and avoids multiple copies of the same datagram on the same link. Despite the conceptual simplicity of IP multicast and its obvious benefits, it has not been widely deployed since there remain many unresolved issues. As an alternative to IP multicast, overlay multicast (application-layer multicast) implements the multicast functionality at end hosts rather than routers. This may require more overall bandwidth than IP multicast because duplicate packets travel the same physical links multiple times, but it provides an inexpensive, deployable method of providing point-to-multipoint group communication. In this paper we develop an efficient method applied greedy algorithm for solving two models of overlay multicast routing protocol that is aimed to construct MDST (Minimum Diameter Spanning Tree : minimum cost path from a source node to all its receivers) and MST (Minimum Spanning Tree : minimum total cost spanning all the members). We also simulate and analyze MDST and MST.

  • PDF

Efficient multicast Transmission Mechanism for Mobile IPv6 Networks Environments (Mobile IPv6 네트워크를 위한 효율적인 멀티캐스트 전송 기법)

  • Lee, In-Sik;Seo, Doo-Ok;Lee, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.42-52
    • /
    • 2006
  • The interest for IPv6, Which is next generation IP, increases, while th difficulty for adopting it into IT indestries also increase too. We also expect that Internet technologies develop 0 basis of All-IP networks, which include various heterogeneous networks. Therefore, it is necessary for network to support mobility and multicast capavility to create application with wide-variety- In this paper, we propose a scheme that be able to provide mobility and multicast efficient in IPv6 networks. The proposed scheme has been implemented and experimented on NS-2 and validated with respect to multicast packet delay time and count of Joining and pruning)

차세대 통신망 구조 및 프로토콜

  • 이경휴
    • Information and Communications Magazine
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2002
  • 차세대 통신망 구조란 다각도로 고려 되지만 일반적으로 방향은 "ALL OPTICAL 기간망 기반의 ALL IP 유무선 통합 네트워킹" 이라는 중장기적인 예측으로 볼 수 있다. 현재 NGN(Next Generation Network)라는 명으로 흐르는 중단기적인 관점에서 본고에 소개하고자 하며, NGN이라는 흐름에 포함되는 유무선 통합 구조 측면도 고려하였다. 여기에 대하여 여러 논의 대상이 많지만 어느 정도 공통된 방향의 특징 관점에서 제시하였다.점에서 제시하였다.

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF