• Title/Summary/Keyword: IP Policy

Search Result 205, Processing Time 0.027 seconds

Implementation of QoS Provisioning Model in VANET (VANET에서 QoS Provisioning모델의 구현)

  • Huh, Jee-Wan;Song, Wang-Cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.884-888
    • /
    • 2009
  • Vehicular Adhoc Networks (VANET), a Vehicle-to-Infrastucture or Vehicle-to-Vehicle communication technology, is an area that makes more specific use of Mobile Adhoc Networks(MANET). VANET's Quality of Service(QoS) focuses on preventing possible emergencies like car crash from happening by immediately transmitting information to the cars around, while MANET's QoS is being studied for the quality of multimedia data such as Video on Demand(VoD), Video streaming, Voice over IP(VoIP), etc. In this paper, I structure the actual network configuration using Link State Routing(LSR), implement QoS Provisioning Model using Common Open Policy Service(COPS), and suggest more effective k-hop Cluster and inter-domain policy negotiation which fit better to the characteristics of VANET.

  • PDF

A Study on Prediction Reputation System Improvement for Prevention of SPIT (SPIT 차단을 위한 예측 평판도 기법 개선에 대한 연구)

  • Bae, Kwang-yong;Jo, Hwa;Yoon, Oh-jun;Jang, Sung-jin;Shin, Yongtae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1568-1576
    • /
    • 2015
  • This paper proposes a prediction reputation system for the anti-SPIT solution in real-time VoIP environment. Increased accuracy of the determination as to whether spam or not by deriving a threshold based on SPIT presence in the existing paper. The existing schemes need to get the user's feedback and/or have experienced the time delay and overload as session initiates due to real-time operation. To solve these problems, the proposed scheme predicts the reputation through the statistical analysis based on the period of session initiation of each caller and the call duration of each receiver. As per the second mentioned problem, this scheme performs the prediction before session initiation, therefore, it's proper for real-time VoIP environment.

SLA Parameter Measurement Of Policy Routing Network (Policy Routing Network에서의 SLA 파라메터 측정)

  • Shim, Hoi-Jung;Nam, Ji-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1597-1600
    • /
    • 2001
  • In-Service-Monitoring을 통하여 네트웍 계층에서 성능저하와 전달되어지는 QOS의 영향을 감시하여 Pro-Active 매니지먼트가 가능하다. 그 결과로서 SLA 보증을 위반하기 전에 성능저하를 조기 발견하여 행동을 취한 수 있게 한다. 본 논문에서는 사용자의 요구조건을 만족하기 위한 네트웍의 구성과 SLA 측정의 제약조건들을 고려하고 Policy Based Routing이 적용되는 네트웍에서 Technology-Specific Parameter인 IP Packet Loss Ratio, IP 패킷전송지연, 패킷지터, 가용도등의 SLA Parameter를 측정하였다.

  • PDF

Error Handling and Data Synchronization in Policy and Charging Control Architecture in WiMAX (WiMAX 정책 제어 시스템의 정보 동기화)

  • Seol, Soonuk;Cho, Sungsoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.355-367
    • /
    • 2013
  • In the Policy and Charging Control(PCC) architecture of the 3GPP and WiMAX forum, the Policy and Charging Rule Function(PCRF) controls and configures the policies of quality of services(QoS) and accounting to a Policy and Charging Rule Enforcement Function(PCEF). In this paper, we categorize the errors into three types that include a disconnection with peer entity, a delayed or no response and a response with failure result, and propose a scheme to automatically synchronize the data between the PCRF and the PCEF for each type of error. Also, we conduct a quantitative analysis to see how much it can help to maintain the cell capacity of the mobile VoIP service in a WiBro network, which is implemented in Korea according to the standards of WiMAX. We can see that our proposed scheme improves the performances of PCC by preventing the waste of radio resources, the overload of systems, the memory leakage of servers, the system shutdown, and so on. We have validated the scheme by implementation, and reflected it in WiMAX standard documents.

A Study on Control of VoIP Traffic in Linux Kernel (리눅스 커널에서 VoIP 트래픽 제어에 관한 연구)

  • Kang, Gyong-Cheol;Lim, Seong-Uk;Ryu, Yeon-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.1361-1364
    • /
    • 2003
  • 본 논문에서는 리눅스 커널에서 VoIP(Voice over IP) 트래픽을 탐지하고 제어하는 네트워크 모쥴을 설계하고 구현하는 연구를 소개한다. 구현하는 리눅스 네트워크 모듈은 실시간으로 VoIP 세션연결 요청 패킷을 탐지하고 정해진 정책(policy)에 따라 서비스 품질(QoS)을 제어할 수 있다.

  • PDF

A Policy-based Network Control Methodology for Large-scale IP Network (대규모 IP 네트워크에서 정책기반의 네트워크 제어방법 연구)

  • Oh, Jun-Suk;Son, Choon-Ho;Kim, Ki-Eung;Lee, Jae-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.364-367
    • /
    • 2008
  • Many different types of network equipments are deployed in a large-scale IP network. In this operating environment, network service providers suffer from difficulty in controlling various equipments simultaneously in case network faults happen in their overall or regional network due to physical link failure or abnormal traffic. This paper presents a policy-based methodology to control many different types of network equipments at the same time in abnormal cases. The key idea is that NMS(Network Management System) keeps vendor-neutral control policies in normal times and that when an abnormal case occurs in network, NMS transforms the selected policy into vendor-specific control commands and enforces them to various equipments simultaneously.

  • PDF

A Study on Information Security policy for VoIP Service in Next Generation Networks (차세대 네트워크 환경에서의 인터넷전화 서비스를 위한 정보보호 대책 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.28-33
    • /
    • 2008
  • VoIP provided voice service using Internet is receiving footlights when it escapes an initial curiosity. VoIP interest became larger, because it can transfer existing phone service and deliver voice data through internet technology. Is inheriting as it is threats of IP base because a VoIP technology provides audiocommunication service taking advantage of an existing IP technology, and have new threats that happen from new know-hows for VoIP service offer. In this paper, presented about problem and consideration and countermeasure of examines about security threat of VoIP service, and applies security.

  • PDF

Extended Security Policy Protocol that considers NAT-PT (NAT-PT를 고려한 확장된 보안정책 프로토콜)

  • Hyun, Jeung-Sik;Hwang, Yoon-Cheol;Um, Nam-Kyoung;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.549-556
    • /
    • 2003
  • In this paper, we describe security policy protocol to provide end-to-end IPSec security service that considers characteristics of NAT-PT. NAT-PT is describing IP address translation and protocol translation for communication on heterogeneous IP network by one of the technology that is proposed by IETF to provide communication between IPv4 and IPv6 network in transitional step to evolve by IPv6 network to IPv4 network. But NAT-PT has the limitation on security one of the essential requirement of Internet. Therefore, we propose the extended security protocol that offers a security policy negotiation that should be achieved for the first time to provide end-to-end IPSec security service that considers NAT-PT in this paper.

A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers (TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구)

  • Seo, Woo Seok;Park, Dea Woo;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.

Bilateral Trade Potential of IP Sensitive Products: A Comparative Study of India and China

  • Sharma, Ruchi;Jain, Arushi;Panda, Sidheswar
    • Asian Journal of Innovation and Policy
    • /
    • v.11 no.1
    • /
    • pp.69-86
    • /
    • 2022
  • This study examines performances and varieties of export of IP sensitive products across emerging countries, namely, India and China by utilizing 6-digit disaggregated product-level export data. Further, this study constructs trade margins - extensive and intensive margins to understand trade potential and different trade patterns, specifically, exporters' productivity, product diversification, and volume of trade during 2007-2016. This study finds India's performance is comparable with China at the extensive margin though the gap between India and China is very wide in terms of the total value of exports and the intensive margin. China majorly exports more expensive electronics and manufacturing-related products as opposed to relatively cheaper medicinal and synthetic products, the total value of exports from China to the rest of the world is much higher than that of India. This study suggests that India is exporting IP-sensitive products to lower-income countries sufficiently, but the IP-sensitive exports to higher-income countries are still lagging.