• Title/Summary/Keyword: IP Encapsulation

Search Result 30, Processing Time 0.045 seconds

A Study on IP Encapsulation for Efficient Transmission of IP Datagram over T-DMB (지상파 DMB에서 효과적인 IP 인캡슐레이션 방법)

  • Yang, Seung-Chur;Bae, Byung-Jun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11B
    • /
    • pp.693-699
    • /
    • 2007
  • In this Paper we present analysis of efficiency for various encapsulation methods to transport IP datagram over terrestrial digital multimedia broadcasting (T-DMB). The multimedia broadcasting system transmitted in one-way needs the data reliability for efficient transmission. And then It is able to select the independent data service using If encapsulation over T-DMB. We examine the compatibility in adopting T-DMB and the overhead of transmission occurring encapsulation. it also needs the full analysis of data framing because the cost of return channel is relatively higher. We do analysis based on theoretical calculation and propose an efficient, reliable and adaptable method in T-DMB.

Encapsulation of IP Traffic through GFP in OTN Transmission Network (OTN 광전송망에서 GFP를 통한 IP 트래픽의 인캡슐레이션)

  • Lee, Chang-Ki;Yang, Choong-Reol
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.567-572
    • /
    • 2008
  • It is necessary to study about the scheme to accept IP traffic effectively in OTN, according to expect that IP traffic data will be increase constantly. In this paper, we studied the encapsulation method of IP traffic through GFP in OTN transmission network. Therefore we knew the IP/GFP/OTN method is more efficient than existing methods from structure, overhead rates and possibility of grow, and showed the functional block of high level about this method. Also we showed the implementation scheme of this method by processing the functional simulation to make use of VHDL programming.

RIPE: RSVP-in-IP Encapsulation to Support QoS for Mobile IP Networks (RIPE: Mobile IP망에세 QoS를 지원하기 위한 RSVP-in-IP 캡슐화 방안)

  • Min-Kyu, Kim;Myong-Soon, Park
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.501-510
    • /
    • 2004
  • While the Internet keeps its permeation into every aspect of human life, two things stand out. One is the requirement for high quality of services to support multimedia data service.'The other is the desire for ubiquitous network connection. Combining the two things makes the Internet possible in supporting multimedia communications for nomadic users on the locomotion. To support QoS communication for mobile users by applying RSVP to Mobile IP, RSVP Tunnel, which specifies building separately a RSVP session between the home agent and the foreign agent, was proposed. However, the RSVP Tunnel method breeds bandwidth overhead and association problems in tunnel because of duplicated RSVP messages use. To resolve these problems, in this paper, we propose the new encapsulation method, the RSVP-in-IP Encapsulation (RIPE) that can support QoS guaranteed service efficicntly in Mobile IP networks. The proposed method supports RSVP mobility to Mobile If tunneling mechanism efficiently without any additional session as the RSVP Tunnel scheme. Moreover it removes the critical problems of bandwidth overhead in a tunnel and association by duplicated messages. We compared the performance of our proposed scheme with RSVP Tunnel scheme in term of mean delay, mean data rate and bandwidth overhead in tunnel.

The Intruder Traceback technology using If Encapsulation on Policy- based Network Security Architecture (정책기반 네트워크 보안구조에서 IP Encapsulation을 이 용한 실시간 침입자 추적 기술)

  • Lee, Kwang-Hee;An, Gae-Il;Jang, Jong-Su;Choi, Hun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.524-526
    • /
    • 2003
  • 본 논문에서는 고도로 지능화고 복잡한 공격으로부터 광대역 네트워크를 보호하기 위한 정책기반 네트워크 보안구조와 능동적 네트워크 보안 기술의 핵심인 실시간 침입자 추적 기능의 효율적인 통합 방안을 제시하기 위해 필요한 구성요소를 정의하고 이들간의 통신 프로토콜을 확장하여 정책기반 네트워크 보안구조에 적합한 실시간 침입자 추적 기술로서 IP Encapsulation을 이용한 실시간 침입자 추적 알고리즘을 제시한다.

  • PDF

Interconnection Architecture of Cross-Layer Protocols to Provide Internet Services in VSAT Based Satellite Communication Systems (VSAT 기반 위성통신 시스템에서 인터넷 서비스 제공을 위한 계층 간 프로토콜 연동 구조)

  • Kim, Jeehyeong;Noh, Jaewon;Cho, Sunghyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1190-1196
    • /
    • 2016
  • In this paper, a cross-layer interworking scheme for different protocols is proposed to provide an efficient internet services in very small aperture terminal (VSAT) based satellite communication systems. In addition, we implement the proposed interworking model and prove the feasibility of the proposed system. VSAT based satellite communication systems commonly use digital video broadcasting (DVB)-S2 standard. Unfortunately, DVB-S2 has inefficient parts to support IP based internet services because it has originally been designed to support broadcasting services. Generic stream encapsulation (GSE) protocol, which is a layer 2 protocol, has been proposed to mitigate this inefficiency. We propose a cross-layer interworking scheme to cooperate efficiently between IP and GSE protocols and between GSE protocol and DVB-S2, respectively. In addtion, we implement the proposed interworking schemes via computer softwares and prove the feasibility using NI-USRP and commercial DVB receiver.

QoS Functions in Mobile Backhaul Network (이동 백홀 네트워크에서 QoS 기능)

  • Park, Chun-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.101-105
    • /
    • 2013
  • This paper addresses QoS functions in mobile backhaul network to accommodate the diverse traffics in cell site. The traffics assigned to the switching function in RAN system, such as Ethernet frame, IP packet, and ATM cell, are segmented, and then encapsulated to transfer then to the mobile backhaul network. ISP can converge all generation traffics, such as voice, HSPA, over all-IP RAN through standard pseudowire encapsulation. These can be enhanced with diverse QoS methods as well as comprehensive monitoring and diagnostic capabilities. Therefore in this paper, QoS functions under theses operations is simulated according to the encapsulation functions.

Backward-Compatible Route Optimization in Mobile IP (Mobile IP에서의 역 방향 호환성 Route Optimization 방안)

  • Park, Hyun-Seo;Choi, Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1079-1082
    • /
    • 2000
  • 인터넷에서 호스트의 이동성을 지원해주기 위한 프로토콜인 Mobile IP 의 가장 근 문제점의 하나는 Triangle Routing Problem이며 이를 해결하기 위한 방안으로서 Route Optimization이 있다. 그러나, 이 방식은 Route Optimization 을 위해서 기존의 인터넷 호스트, 즉 Correspondent Node 가 Binding Cache를 유지하고, Encapsulation의 기능을 가져야 하고, Home Agent와 Security Association을 갖도록 변경이 불가피하다. 본 논문에서는 기존 인터넷 호스트에서의 변경을 필요로 하지 않는 새로운 Route Optimization 방안인 Backward-Compatible Route Optimization을 제시한다.

  • PDF

Study on Improving Vulhearability in IPv4/IPv6 Header Translation Mechanism (IPv4/IPv6 헤더변환 방식에서의 취약성 개선에 관한 연구)

  • 황호준;유승재;김귀남
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.73-84
    • /
    • 2003
  • The IPv4 that used to be generally used as a medium of computer communications in 1980s has reached its limits now. IPv6 (IP Version 6) is being prepared to solve the limitations of the IPv4. However, the biggest problem of IPv6 is that it is not compatible with the IPv4. To resolve the compatibility issue, Dual Stack, Tunneling and Header Converting methods have been proposed. The Header Converting method allows communications between the IPv4 and IPv6 networks with the converter. This method's strength is that it is easy to embody and the procedures for embodiment is simple. However, this method still contains the weaknesses that the existing IPv4 has. On the current document, the Header Converting method among the three methods is discussed to resolve the problems this method has. To solve the Header Converting method's weakness, the security problem between sections, the IP Header field values are converted to the relative field values and IPSec (IP Security) and ESP (Encapsulation Security Payload) are applied. The proposed "Encrypted Header Converting Method" that is encrypted in packet units has solved the weakness that the pre-existing Header Converting method used to have.d to have.

  • PDF

Implementation and Analysis of Tunneling Method for Mobile Service (이동 서비스를 위한 터널링 기법의 구현과 성능분석)

  • 천정훈;정진우강현국
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.47-50
    • /
    • 1998
  • In recent years, it is required that computing support mobile user with computer. The advantage of mobile computing is that users may access all their applications from any location, whether they are in another building or a different state. So, Internet combines with mobile computing technology to make new communication environment for supporting mobility. The research for solving the problem of mobility is actively in progress. This paper describes the implementation of tunneling method for flexible bypass between specific region. Tunneling method provide mobile service to mobile hosts. IP datagram's address tranform method is IP-within-IP encapsulation by which an IP datagram may be encapsulated within an IP datagram. The developed IP-within-IP protocol can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library. Verification of IP packet tunneling was text file transfer program.

  • PDF

IV attack protection through IV having (IV 해쉬를 통한 IV 공격 방어)

  • 이영지;김태윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.421-423
    • /
    • 2001
  • IPSec(IP Security)은 데이터가 공개적으로 전송되는 네트워크 데이터에 암호화와 인증, 무결성을 제공하기 위해 사용되는 프로토콜이다. IPSec 안에는 여러 프로토콜이 있는데, 그 중에 실제 패킷에 암호화와 인증, 무결성을 추가해 전달하기 위해서는 ESP(Encapsulation Security Payload)라는 프로토콜이 사용된다. 이 ESP(Encapsulation Security Payload)라는 프로토콜이 사용된다. 이 ESP는 패킷을 암호화하기 위해 DES-CBC 모드를 사용하는데, 여기에서 IV(Initialization Vector) 값이 쓰인다. 이 값은 패킷 복호화를 하기 위해 공개적으로 전달이 되기 때문에 중간에 공격자에 의해 공격 당할 위험이 많다. 본 논문에서는 IV 공격을 방지하기 위해 IV의 값을 해쉬 함수를 통해 한번 해슁을 한 다음에, IV 값을 안전하게 전달하는 방법을 제시하고자 한다.