• Title/Summary/Keyword: IP Policy

Search Result 205, Processing Time 0.026 seconds

Implementation Options and Economics of Phased UMTS Deployment

  • Grillo, Davide;Montagna, Maurizio;Alfano, Franco;Colombo, Antonio;Ricci, Simone
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.282-291
    • /
    • 2002
  • 3GPP (Third Generation Partnership Project) is defining UMTS (Universal Mobile Telecommunication System) releases which span the transition from GSM/UMTS coexistence to All-IP UMTS networks. The deployment of an UMTS network depends, in the first place, on the intended service offerings and the release an operator chooses to start service with. Other key decisions in-fluencing UMTS deployment relate to the timing of the functional enhancements and capacity increases along the economic life of the network. This paper gives an overview on the architectural and technical options for UMTS deployment. It also outlines the methodology underlying the business plan aimed at estimating the returns from investments in the UMTS infrastructure, thus helping to tune operators’ strategies for UMTS deployment.

네트워크 연결형 가상화 스토리지 시스템 표준화 연구

  • 최성
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.221-229
    • /
    • 2005
  • 네트워크 연결형 가상화스토리지 기술의 대표로서 SAN(Storage Area Network)와 NAS(Network Attached Storage) 및 IP SAN이 있다. NAS와 SAN은 시스템 통합, 빠르고 편리한 설치, 중앙 관리, 편리한 백업, 고가용성, 데이터 공유의 장점을 가지고 있다. 현재까지는 SAN 제품들 간 호환성 문제나 투자비용의 문제 등으로 인하여 시장 형성이 빠르지 못하나 SAN 환경에 대한 투자가 증가하고 있다. 그리고 앞으로는 서버 종속적인 가상화스토리지 시스템의 증가세는 둔화되고 NAS 또는 SAN의 가상화스토리지의 성장세가 지속될 것이다. 본 연구에서는 최근의 인터넷 환경으로 인한 컴퓨팅 환경의 변화에 따른 가상화스토리지 시스템에 대한 요구 사항의 분석과 이를 만족하기 위한 스토리지 기술과 네트워크 연결형 가상화스토리지 기술의 NAS와 SAN을 비교하며 네트워크 연결형 가상화스토리지 시스템에 관련된 표준화에 대하여 연구하였다.

  • PDF

Development of the SysLog-based Integrated Log Management system for Firewalls in Distributed Network Environments (분산 환경에서 SysLog기반의 방화벽 통합로그관리시스템 개발)

  • Lee, Dong Young;Seo, Hee Suk;Lee, Eul Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.39-45
    • /
    • 2011
  • Application log files contain error messages; operational data and usage information that can help manage applications and servers. Log analysis system is software that read and parse log files, extract and aggregate information in order to generate reports on the application. In currently, the importance of log files of firewalls is growing bigger and bigger for the forensics of cyber crimes and the establishment of security policy. In this paper, we designed and implemented the SILAS(SysLog-based Integrated Log mAanagement System) in distribute network environments. It help to generate reports on the the log fires of firewalls - IP and users, and statistics of application usage.

Bridging the Digital Divide : The Case of Nepal Wireless

  • Pun, Mahabir
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.3
    • /
    • pp.105-127
    • /
    • 2013
  • Information and Communication Technology (ICT) has become a vital instrument for delivering a number of services such as education, healthcare and public services. Community wireless networks are community-centric telecommunication infrastructure developed to provide affordable communication for those who live in remote areas. This chapter discusses the role of Nepal Wireless in achieving socio economic development of rural communities by facilitating affordable Internet access. We analyze the challenges Nepal Wireless faced and articulate on the approaches it took to address those challenges such as lack of technical skills, appropriate technology and funding, difficult geographical terrains, unstable political situation, and expensive devices. In addition, we address the success and failure factors of this community-based ICT4D approach in order to guide similar endeavors. We conclude the chapter by some suggestions for policy makers, community developers, and academicians.

The Policy Association using SPP and NAT-PT on SPS (SPS상에서의 SPP와 NAT-PT을 이용한 정책 협상)

  • Song, Chi-Pyoung;Kim, Gun-Woo;Na, Jae-Hoon;Lee, Sang-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.925-928
    • /
    • 2002
  • 네트워크의 규모가 방대해지고 복잡해지면서 IP 주소 부족문제와 그에 따르는 보안문제가 중요시되어 지고 있다. 여기에서 IPv4/IPv6 변환 기술인 NAT-PT 는 구조적 특성상 보안에 대한 메커니즘을 제공하지 못한다. 즉, 종단간 IPSec 보안은 다른 주소 영역사이(IPv4-IPv6)를 교차하는 것이 불가능하기 때문이다. 따라서 이 논문에서는 이를 해결하기 위해 NAT-PT 와 SPP 가 결합된 SPS 환경에서의 정책협상을 위한 정책기반 보안 메커니즘을 제안 한다.

  • PDF

Evaluation of the Spatial Resolution for Exposure Class in Computed Radiography by Using the Modulation Transfer Function (변조전달함수를 이용한 컴퓨터 방사선영상의 감도 노출 분류에 따른 공간분해능 평가)

  • Seoung, Youl-Hun
    • Journal of Digital Convergence
    • /
    • v.11 no.8
    • /
    • pp.273-279
    • /
    • 2013
  • The purpose of the study was to present basic data to evaluation of the spatial resolution for exposure class(EC) in computed radiography(CR) by using the modulation transfer function(MTF). In this study, MTF was measured the edge method by using image plate(IP) of $100{\mu}mm$ pixels. A standard beam quality RQA5 based on an international electro-technical commission(IEC) standard was used to perform the X-ray imaging studies. Digital imaging began to set the sensitivity to EC 50, 100, 200, 300, 400, 600, 800, 1200 in X-ray irradiated to IP. The MTF 50% and 10% in the final images was analysis by using an authorized image analysis program the Origin 8.0 and the image J. As a results, the EC 200 was the best spatial resolution at MTF 50% ($1.979{\pm}0.114lp/mm$) and MTF 10% ($3.932{\pm}0.041$). Therefore, the EC 200 could be useful for the diagnosis of diseases that require high spatial resolution such as fractures.

A RealTime DNS Query Analysis System based On the Web (웹 기반 실시간 DNS 질의 분석 시스템)

  • Jang, Sang-Dong
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.279-285
    • /
    • 2015
  • In this paper, we present the design and implementation of a realtime DNS Query Analysis System to detect and to protect from DNS attacks. The proposed system uses mirroring to collect data in DMZ, then analizes the collected data. As a result of the analysis, if the proposed system finds attack information, the information is used as a filtering information of firewall. statistic of the collected data is viewed as a realtime monitoring information on the web. To verify the effictiveness of the proposed system, we have built the proposed system and conducted some experiments. As the result, Our proposed system can be used effectively to defend DNS spoofing, DNS flooding attack, DNS amplification attack, can prevent interior network's attackers from attacking and provides realtime DNS query statistic information and geographic information for monitoring DNS query using GeoIP API and Google API. It can be useful information for ICT convergence and the future work.

Content aware Internet Application Traffic Measurement and Analysis for Precise Accounting and Billing (정밀 과금을 위한 컨텐츠기반 인터넷 응용 트래픽 측정 및 분석)

  • 최태상;박정숙;윤승현;김형환;김창훈;정형석;이병준;정태수
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.138-149
    • /
    • 2003
  • As the Internet is quickly evolving from best-effort networks to business quality networks, billing based on the precise traffic measurement becomes an important issue for Internet Service Providers (ISPs). Billing settlement is necessary not only between ISP and customers but also between ISPs. Currently, most ISPs use a flat rate charging policy. Besides the degree of difficulty in deriving appropriate charging policies agreeable by a concerned party, there are substantial technical challenges to come up with a good usage-based accounting system. Usage-based accounting depending on IP packet header information only is not sufficient anymore due to highly dynamic nature of the development and the use of the Internet applications such as peer-to-peer and network games. They are using port numbers dynamically and even several applications can use the same port number. Thus, more precise means of classifying them and accounting their traffic usages are required. In this paper, we propose a high performance, adaptable, configurable, and scalable content-aware application traffic measurement and analysis system which can achieve very accurate usage-based accounting.

A Home-Stream Station for Recording and Transmitting of The Digital Broadcasting (디지털 방송의 저장 및 송출을 위한 홈 스트림 스테이션 개발)

  • Nahm, Eui-Seok
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.307-314
    • /
    • 2014
  • Digital broadcasting areas are leading information technology and having been strengthen the competitiveness of industries. In this paper, we developed HSS(Home Stream Station) for recording and transmitting digital broadcasting on digital TV without additional devices, which is based on cable TV network at home. The HSS can record a broadcasting program selected by user while digital TV shows the other channel. User can watch the program stored on the HSS at any time and any digital TV in the home. LAN interface of the HSS was also developed for supplying high quality digital broadcasting-contents through home network using IP-STB(Set Top Box).

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.