• Title/Summary/Keyword: IP Policy

Search Result 205, Processing Time 0.026 seconds

LISP based IP Address Virtualization Technique for Resource Utilization on Virtualized SDN (가상화된 SDN에서 효과적인 자원 활용을 위한 LISP 기반 IP 주소 가상화 기법)

  • Go, Youngkeun;Yang, Gyeongsik;Yu, Bong-yeol;Yoo, Chuck
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1404-1411
    • /
    • 2016
  • Network virtualization is a technique that abstracts the physical network to provide multiple virtual networks to users. Virtualized network has the advantage to offer flexible services and improve resource utilization. In SDN architecture, network hypervisor serves to virtualize the network through address virtualization, topology virtualization and policy virtualization. Among them, address virtualization refers to the technique that provides an independent address space for each virtual network. Previous work divided the physical address space, and assigned an individual division to each virtual network. Each virtual address is then mapped one-to-one to a physical address. However, this approach requires a lot of flow entries, thus making it disadvantageous. Since SDN switches use TCAM (Ternary Contents Addressable Memory) for the flow table, it is very important to reduce the number of flow entries in the aspect of cost and scalability. In this paper, we propose a LISP based address virtualization, which separates address spaces for the physical and virtual addresses and transmits packet through tunneling, in order to resolve the limitation of the previous studies. By implementing a prototype, we show that the proposed scheme provides better scalability.

A Study on Developing Strategies of the Mongolia Tourism based on IPA (IPA를 통한 몽골관광산업의 발전 전략에 관한 연구)

  • Lee, Seung-Koo;Gankhuu, CH
    • Korean Business Review
    • /
    • v.21 no.2
    • /
    • pp.43-56
    • /
    • 2008
  • Many tourists in the world are expected to visit Mongolia that has impression such as country of nature with no damage, broad prairie of Mongolia, unique world natural heritage of $13^{th}$ century designated by UNESCO, and nomad's life in self-sufficiency. Mongol tourism industry, which has been newly recognized since collapse in the socialism system in 1990, is abundant in historical and cultural resources In tourism. Nevertheless, a research is insufficient on tourism business, developmental sphere in tourism industry, tourism policy and tourism resource development. Accordingly, it is important to conduct tourism promotional survey and implementation of new ideas to develop and to attach more foreign tourists to Mongolia. The purpose of this study is to grasp factors to gain an interest of foreign tourists to select Mongolia as a destination. The aim was also to confirm differences in awareness and performance before and after a visit for foreign tourists to select a trip to Mongolia. Also, the level of factors is compared between expectation before the trip to Mongolia, and the actual satisfaction in tourists through IP analysis(IPA). Finally, to study the present situation of Mongolian tourism to improve its present situation by taking immediate concrete decision for the betterment of Mongolian tourism industry. In order to achieve the objectives of this study, the exploratory factors analysis, reliability test, and One-way ANOVA were carried out by using SPSS 12.0 statistical program.

  • PDF

Selection of Light Character for Marking with Lights on Offshore Wind Farms (해양풍력발전단지 표지등광의 등질선정에 관한 연구)

  • Yang, Hyoung-Seon
    • Journal of Navigation and Port Research
    • /
    • v.38 no.2
    • /
    • pp.105-110
    • /
    • 2014
  • Korean government sets up a goal that jumps up to the third ranked powerful nation of offshore wind in the world until 2020 and announced "The plan for 2.5-gigawatt wind farm off the south-west coast by 2019". Such above, according to green energy policy, offshore wind farms(OWF) will be increased continuously. The development of OWF should be taken account of wind volume as well as marine traffic environment. Specially aids to navigation of OWF play a significant role in preventing collision between vessels navigating near waters and structures. For purpose of distinguishing OWF, IALA recommendations define installation of lights on SPS and IPS. However, there is no mention of light character that plays important role in identification of lights as marking offshore wind farm. Also the research on selection of proper light character has been insufficient state. Therefore in this paper, we analyzed internal and external regulations concerned marking with light on SPS and IPS in OWF. And suggested patterns and rhythms of light having not only easily recognized feature but also no confusion with other light of aids to navigation. The proposed light characters were verified by simulation, and the results were analysed that synchronism flickering of "Fl Y(4) 12s(SPS)" and "Fl Y 6s(IPS)" would be useful in combination of both lights.

Analysis of VoLTE Charge Reduction under VoLTE Growth (VoLTE 활성화에 따른 요금 인하 여력 분석)

  • Lee, Sang-Woo;Jeong, Seon-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.92-100
    • /
    • 2016
  • It is informed that the Voice over LTE(VoLTE) which serves voice and message on IP networks is better in terms of economies of scale than the legacy voice service on 2G/3G circuit-switched networks because of its technological and cost efficiency. In addition, services of voice and data are running on a single LTE network and as a result VoLTE has the more economies of scope. But, there is no study about how much technology-efficiency VoLTE has compared to circuit-based voice service and how much voice charge can be reduced as VoLTE grows up. This paper analyzes empirically cost-efficiency of VoLTE against circuit-based voice service and quantifies the reduction of voice charge as 2G/3G voice traffic shifts to VoLTE. The results describe the first is that the average cost of the total voice traffic rises shortly just after the investment of LTE network for providing VoLTE but it will soon have a capacity available to reduce the charge due to VoLTE's outstanding cost efficiency on the assumption that voice traffic is fixed, and the second is that the charge can be cut to 60% of the current rate in case of all the voice traffic moves to VoLTE. The latter proves partially the validation of data-focusing pricing plan. Our results are expected to become basic data for network operators' establishing pricing strategies and for policy makers' inducing price cutting.

Efficient Session Management mechanism applied Key Recovery technique in IPSec (IPSec에서 키 복구 기술을 적용한 효율적인 연결 관리 메커니즘)

  • Kim, Jeong-Beom;Lee, Yun-Jeong;Park, Nam-Seop;Kim, Tae-Yun
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.775-782
    • /
    • 2001
  • Recently the use of Linux OS is increasing to tremendous figures. But due to the fact that Linux is distributed on an open-source policy, the need of security is an upcoming question which leads to widespread development of security on a Linux based environment. Cryptography, however, can cause various problems because of difficulty of key management. A lot of researchers have been concentrating on the key recovery technique to eliminate the reverse effect of using these kinds of security and to promote positive aspects of using it. In this thesis I am suggesting an mechanism based on the key recovery technique, as a method to save time in recovery and resetting a disconnection between two end-users through IPSec (IP Security) protocols in a VPN (Virtual Private Network) environment. The main idea of the newly suggested mechanism, KRFSH (Key Recovery Field Storage Header), is to store the information of the session in advance for the case of losing the session information essential to establish a tunnel connection between a SG and a host in the VPN environment, and so if necessary to use the pre-stored information for recovery. This mechanism is loaded on the IPSec based FreeS/WAN program (Linux environment), and so the VPN problem mentioned above is resolved.

  • PDF

Vertical Handover between LTE and Wireless LAN Systems based on Common Radio Resource Management (CRRM) and Generic Link Layer (GLL) (LTE/WLAN 이종망 환경에서 범용링크계층과 통합무선자 원관리 기법이 적용된 VHO 방안 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Yoon, Suk-Ho;Ryu, Seung-Wan;Cho, Choong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.35-48
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL and CRRM. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate and the system service cost.

The Development of 1G-PON Reach Extender based on Wavelength Division Multiplexing for Reduction of Optical Core (국사 광역화와 광코어 절감을 위한 파장분할다중 기반의 1기가급 수동 광가입자망 Reach Extender 효율 극대화 기술 개발)

  • Lee, Kyu-Man;Kwon, Taek-Won
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.229-235
    • /
    • 2019
  • As the demand for broadband multimedia including the Internet explosively increases, the advancement of the subscriber network is becoming the biggest issue in the telecommunication industry due to the surge of data traffic caused by the emergence of new services such as smart phone, IPTV, VoIP, VOD and cloud services. In this paper, we have developed WDM(Wavelength Division Multiplexing)-PON(passive optical network) based on the 1-Gigabit Reach Externder (RE) technique to reduce optical core. Particularly, in order to strengthen the market competitiveness, we considered low cost, miniaturization, integration technique, and low power of optical parts. In addition, we have developed a batch system by integrating all techniques for reliability, remote management through the development of transmission distance extension and development of capacity increase of optical line by using RE technology in existing PON network. Based on system interworking with existing commercial 1G PON devices, it can be worthy of achievement of wide nationalization and optical core reduction by using this developed system. Based on these results, we are studying development of 10G PON technology.

Artificial Intelligence-based Security Control Construction and Countermeasures (인공지능기반 보안관제 구축 및 대응 방안)

  • Hong, Jun-Hyeok;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.531-540
    • /
    • 2021
  • As cyber attacks and crimes increase exponentially and hacking attacks become more intelligent and advanced, hacking attack methods and routes are evolving unpredictably and in real time. In order to reinforce the enemy's responsiveness, this study aims to propose a method for developing an artificial intelligence-based security control platform by building a next-generation security system using artificial intelligence to respond by self-learning, monitoring abnormal signs and blocking attacks.The artificial intelligence-based security control platform should be developed as the basis for data collection, data analysis, next-generation security system operation, and security system management. Big data base and control system, data collection step through external threat information, data analysis step of pre-processing and formalizing the collected data to perform positive/false detection and abnormal behavior analysis through deep learning-based algorithm, and analyzed data Through the operation of a security system of prevention, control, response, analysis, and organic circulation structure, the next generation security system to increase the scope and speed of handling new threats and to reinforce the identification of normal and abnormal behaviors, and management of the security threat response system, Harmful IP management, detection policy management, security business legal system management. Through this, we are trying to find a way to comprehensively analyze vast amounts of data and to respond preemptively in a short time.

An Overview of the Developments of ICANN Internet Governance and Some Recommendations for Korea (ICANN의 진화과정 고찰을 통해 본 한국 인터넷주소 거버넌스의 개선방향)

  • Chung, Chan-Mo
    • Informatization Policy
    • /
    • v.19 no.3
    • /
    • pp.36-49
    • /
    • 2012
  • Internet Corporation for Assigned Names and Numbers (ICANN) is the body which manages the allocation and registration of global Internet IP addresses and domain names. As a gesture to overcome the dependency on the U.S. government, ICANN and the U.S. Department of Commerce jointly made the Affirmation of Commitment in which they submitted the workings of ICANN to the supervision of a council of Internet experts. Accountability and Transparency Review Team (ATRT) is one of four teams created for this purpose. In December 2010, ATRT made 27 recommendations, which were subsequently approved by the ICANN Board. These reform efforts of ICANN provide significant implications for the future of Korean Internet governance. Korea should enhance the compatibility of its domestic decision making process related to Internet addresses with the private sector driven, bottom-up process of global Internet governance. In order to increase the involvement of private sector and civil society, it is recommended for Korea to formalize the mechanism for bottom-up process. Insertion of a new provision concerning a bottom-up process into the Internet Addresses Act should be considered.

  • PDF

MIPv4/MIPv6 Mobility Simulation Model of the Multihomed Node (멀티홈드 노드의 MIPv4/MIPv6 이동성 시뮬레이션 모델)

  • Zhang, Xiaolei;Wang, Ye;Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.179-186
    • /
    • 2012
  • Nowadays, the multihomed host equipped with multiple network interfaces has been interested research in next generation wireless network, because the mobile users expect that they can be able to access services not only anywhere, at any time and from any network but also simultaneously. This paper addresses the mobility simulation model of the multihomed node for supporting MIPv4 and MIPv6 function in an interworking of Worldwide Interoperability for Microwave Access (WiMAX) and IEEE 802.11 WLAN. The multihomed node with two air interfaces has been developed based on WiMAX and WLAN workstation node model in simulation software. The main point of the developed model is to support both MIPv4 and MIPv6 function, and provide network selection policy for the multihomed node between WiMAX and WLAN network. Based on the received Router Advertisement along with the interface number, we can manage the access interfaces in ordered list to make handover decision while the multihomed node is moving. In the end of this paper, the simulation scenarios and results are shown for testing MIPv4 and MIPv6 function.