• Title/Summary/Keyword: VPN system

Search Result 118, Processing Time 0.027 seconds

Design of an Access Router for Internet Access Services in the Integrate Access Node (통합 액세스 노드에서의 인터넷 액세스 라우터 설계)

  • 홍록기;이현태
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.438-442
    • /
    • 1999
  • More and more residential and mobile users are requiring access to the Internet. This paper presents an architecture of the network solution for cost-effective Internet/intranet access between users and Network Service Providers(NSPs). It also presents a functional architecture of Internet access router in the integrated access node system. The proposed Internet access router provides the functionality that users select any of a number of NSPs and mutiple user PPP calls are multiplexed over each secure tunnel between the Internet access router and NSP.

  • PDF

Implementation and performance evaluation of network address translator (네트워크 주소변환 장치 구현 및 성능 평가)

  • Cho Tae-Kyung;Park Byoung-soo
    • Proceedings of the KAIS Fall Conference
    • /
    • 2004.11a
    • /
    • pp.225-229
    • /
    • 2004
  • 현재 인터넷에서 사용하고 있는 네트워크 계층 프로토콜은 IP 버전 4 인데, 이러한 주소 부족 문제를 해결하고자 IP 주소 필드의 길이가 대폭 확장되는 IPv6 라는 새로운 인터넷 프로토콜을 개발하게 된다(5). 그러나 이러한 신 표준안을 인터넷에 실제로 적용하고 운영하기에는 많은 어려운 문제들이 남아있어 그 대안으로 NAT(Network Address Translation)[1]가 등장하게 된다. 그러나 이러한 NAT 기능은 외부 망으로부터의 접촉이 불가능하다는 특성을 가지고 있다. 이러한 특성은 보안 유지측면에서는 장점으로 작용하나, 소규모 기업이나 사무실이 웹(Web) 서버(Server) 나 메일(mail) 서버등을 두고 싶어하는 경우에는 외부에서의 접근이 허용되어야 하므로 단점이 된다. 본 연구에서는 이러한 단점을 파악하기 위하여 NAT 테이블(table) 에 수정을 가함으로써 사설망내부의 특정 서버에 접근할 수 있는 확장된 개념의 NAT를 제안하고자 한다. 아울러 이러한 NAT 기능을 이용하여 구성된 사설망 간의 연결기능을 제공할 수 있는 방법을 제안함으로써 기존의 가상 사설망(VPN : Virtual Private Network) 외 일부 기능도 수용할 수 있도록 하였다.

  • PDF

Implementation of File Security Module Using on Windows (윈도우즈 기반 파일 보안 모듈 설계 및 구현)

  • Sung Kyung;Yoon Ho-gun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.105-112
    • /
    • 2005
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, If system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

  • PDF

Implementation of file Access Control Module Using on Windows XP (윈도우 XP 기반의 파일 정책 모듈 설계 및 구현)

  • 성경
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1204-1211
    • /
    • 2004
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, f system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

Implementation of Hybrid IP-PBX System offer to Voice Conference and Video Conference base on the SIP (SIP 기반 음성 및 화상회의용 하이브리드 IP-PBX 시스템 구현)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.115-122
    • /
    • 2009
  • These day, market demanded to a Video conference systems rapidly increases in our life for cut cost in communication. more and more it will be grow up. but the cost building to a Voice conference and a Video conference is very hight. therefore it is builded around the big company and the public office. so in this study, we have developed to hybrid IP-PBX which is able to a Voice conference and a Video conference with one system. the system developed has the merits to low-price for it's building in a small company. we make proof the performance through the test. with using the hybrid IP-PBX, we can sharply reduce to communication cost.

  • PDF

A Study of the Performance Degradation Factors of An Internal Network (내부 네트워크의 성능저하요인에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.43-50
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network and most of the network through a various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information Assets from External attacks. But, The use of Security Systems and Network deployment inside the network makes a significant impact on Security and Performance. Therefore, In this paper, it will be to analyze the Performance Degradation Factors of the Internal Network according to the Security System's use and placement. In a future, This paper is expected to serve as a valuable information for the Network Performance and Security improvements.

A Cause-Effect Model for Human Resource Management (정보시스템의 효율적인 인적자원 관리를 위한 Cause-Effect, Model의 활용)

  • Lee, Nam-Hoon;In, Hoh;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.161-169
    • /
    • 2006
  • According to the development of information system, many information system and application soft-ware are develop. However, cyber attack and incident have more increased to the development of them. To defend from cyber attack and incident, many organizations has run information security systems, such as Intrusion Detection System, Firewall, VPN etc, and employed information Security person till now But they have many difficulty in operating these information security component because of the lack of organizational management and analysis of each role. In this paper, We propose the formal Cause-Effect Model related with the information security system and administrative mission per each security. In this model, we regard information system and information system operator as one information component. It is possible to compose the most suitable information component, such as information system, human resource etc., according to the analysis of Cause-Effect Model in this paper. These analysis and approaching methodology can make effective operation of each limited resource in organization and effective defense mechanism against many malicious cyber attack and incident.

  • PDF

Real Time Monitoring of Cars during European Rally Championships in Poland in 2005

  • Bartlomiej, Oszczak;Cezary, Specht;Stanislaw, Oszczak;Sitnik, Eliza
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.241-246
    • /
    • 2006
  • The paper presents the preparations work and experiences gained from realtime GPS car monitoring during the European Rally Championships organized on 10-12 June 2005 in Poland. The developed system is based on GPS and GSM/GPRS technology. Distribution and teletransmission of data are possible using different GSM operators in Poland, which makes the system fully independent. The system's server collects data from rally cars, processing and send data through VPN connections to the SQL server located in main control room. Data can be collected in real time via Internet or GPRS. Some information on GSM/GPRS range during rally championships are also presented in the paper. The study covered many trials and tests of different software and various configurations of the GPRS modems before finally the system started to work. Information coming from 10 Rally Cars were collected to the SQL Server continuously in one second interval. In real time mode these all data were displayed simultaneously in the rally main control room and in the rally press conference room. Paper describes also adopted emergency procedures and remote reconfiguration of GPS/GPRS boxes inside rally cars made during championships. Some problems and method of practical solutions are presented to avoid active jamming dangerous for a driver and his pilot, having system of communication intercoms jammed by teletransmission of GPRS 900/1800 MHz. In cooperation with rally teams special GPS/GPRS safety boxes were designed and made. Monitoring of all 7 rally stages with GPS receivers and method of calibrations of the maps were presented. GSM signal coverage was also checked in all stages. All data transmitted from rally cars were recorded in the computer. Some of our GPS cars had accidents and dispite them information were continuously sent to server. There is possibility to show in post mission mode the position of chosen cars in our rally application. Some information of best rally cars are presented also in the paper.

  • PDF

A VoIP System for Secure Support in Next Generation Networks based on SIP (차세대 네트워크환경에서의 보안성 지원을 위한 SIP 기반 VoIP 시스템)

  • Sung, Kyung;Kim, Seok-Hun;Park, Gil-Ha
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2321-2328
    • /
    • 2006
  • Today, SIP standard (The signalling protocol for the Internet phone service) raises to be the standard technique because the expandability is high and complexity is low. It is widely investigated and actively advocated to use Si81a1 ring protocol for SIP in VoIP service. SIP service can be applied even outside the Internet phone service; instance messaging and various multimedia technology are just an example. This paper proposed an embodiment proxy server for rambling support to use JAIN SIP API. It provides standard interface for testing the Proxy server for SIP and embodiment of user agent that transfer instant massaging and voice communication.

A Study of Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network (내부 네트워크의 성능저하요인에 따른 이산화탄소 배출에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1315-1322
    • /
    • 2011
  • Recently, The Problem of Global Warming around the world, is emerging as a very serious environmental problems, and as a way to fix it 'Green IT' is becoming an Issue. In these situations the evolution of network technologies with a various attacks, it appears, add the different security devices and systems are deployed. But, Deployment methods such a network, the performance and security of the internal network will affect on the greater and it will be increase Carbon Dioxide emissions. Therefore, In this paper, it will be to analyze Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network. and In a future, This paper is expected to serve as a valuable Information for the Network Performance and Security improvements and to reduce Carbon Emissions in the Field of IT.