• Title/Summary/Keyword: virtual-IP

Search Result 221, Processing Time 0.024 seconds

Performance Improvement Method of Handoff considering Virtual Home Agent in Mobile IP (Virtual Home Agent 를 고려한 Mobile IP 핸드오프 성능 개선 방안)

  • Lee, Byoung-Moon;Lee, Jae-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.1011-1014
    • /
    • 2003
  • 표준 Mobile IP(MIP)에서는 기본 구조에 따른 성능상의 문제점들이 제기되어 왔으며 이를 해결하기 위해 MIP 확장을 통한 성능 개선 기법들이 연구되어 왔다. 핸드오프에 따른 성능 저해 요소를 분석하여 라우팅 최적화, 등록 및 전송지연, 데이터 패킷 손실률을 개선하기 위해 본 논문에서는 Foreign Agent(FA)내에 Virtual Home Agent(VHA) 기능을 추가함으로써 Home Agent(HA)의 Mobile Host(MH)에 대한 이동 관리 역할 분담 마른 등록, FA의 효율적인 버퍼 이용이 가능한 방안을 제안하였다.

  • PDF

A Study of Virtual Private Network On based Environment IP Security Simulations Quality of Service Guarantee (IPSec 기반 환경하에서 QoS 보장 가상 사설망 구현 방안 연구)

  • Kim, Jeong-Hun;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.150-153
    • /
    • 2001
  • Today Internet is only Best-Effort service. During the past few years, new types of internet applications which require performance beyond the best-effort service that is provided by the current internet have emerged. These applications required QoS(Quality of Services) guarantee and Security between end-to-end. In this paper simulations Differentiated Services that IETF(Internet Engineering Task Forte) has proposed one of QoS(Quality of Services) guarantee VPN(Virtual private Network) using QoS(Quality of Services) guarantee and IP Security between end-to-end.

  • PDF

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

Experimental Performance Evaluation of Vertical Handover with Virtual Interface in Heterogeneous Mobile Networks (이종 무선네트워크에서 가상인터페이스기반 수직적 핸드오버 실증 성능 평가)

  • Cho, Il-Kwon;Yun, Dong-Geun;Ha, Sang-Yong;Choi, Seong-Gon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.127-134
    • /
    • 2012
  • In this paper, we propose a mobility management scheme which has a simple IP emulation method based on virtual interface. This scheme supports prevention of service abortion resulting from RAT (Radio Access Technology) interface switching during vertical handover and provides mobility management convenience according to maintenance of consistency in simple IP mobility management scheme of 3rd generation mobile network. Through the empirical experiments of proposed method, we check out the improvement of handover performance of the proposed scheme based on vertical handover latency comparing with a non-virtual interface system.

Intellectual Property Disputes in the Era of the Metaverse: Complexities of Cross-Border Justice and Arbitration Consideration

  • Kye Hwan Ryu;Choong Mok Kwak
    • Journal of Arbitration Studies
    • /
    • v.33 no.3
    • /
    • pp.147-175
    • /
    • 2023
  • The emergence of the metaverse, a complex three-dimensional virtual environment, has led to significant changes in the intellectual property (IP) landscape. This paper examines the challenges and legal intricacies of IP within the virtual realm, focusing on the unprecedented nature of these disputes and on the inadequacies of traditional jurisdiction methods. Drawing from international frameworks, including the International Law Association's Guidelines and WIPO's guides, the study critically explores arbitration as an alternate approach to metaverse IP disputes, analyzing its complexities and applicability. The paper further delves into challenges arising from diverse protection laws that pertain to the global nature of the metaverse, including the nuances of various digital assets like NFTs. By assessing jurisdictional difficulties, the paper addresses the adoption of decentralized justice platforms, and examines the role of Alternative Dispute Resolution (ADR) methods, this paper presents a comprehensive view of the evolving virtual legal field. It suggests that while innovative methods are emerging, traditional arbitration will likely remain the preferred choice for complex disputes, offering a balance of speed, cost-effectiveness, and legal robustness within the virtual world.

Design and Implementation of LonWorks/IP Router for Network-based Control (네트워크 기반 제어를 위한 Lonworks/IP 라우터의 설계 및 구현)

  • Hyun, Jin-Waok;Choi, Gi-Sang;Choi, Gi-Heung
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.409-412
    • /
    • 2007
  • Demand for the technology for access to device control network in industry and for access to building automation system via internet is on the increase. In such technology integration of a device control network with a data network such as internet and organizing wide-ranging DCS(distributed control system) is needed, and it can be realized in the framework of VDN(virtual device network). Specifications for device control network and data network are quite different because of the differences in application. So a router that translates the communication protocol between device control network and data network, and efficiently transmits information to destination is needed for implementation of the VDN(virtual device network). This paper proposes the concept of NCS(networked control system) based on VDN(virtual device network) and suggests the routing algorithm that uses embedded system.

  • PDF

Development of Easy-to-use VI Programming Library (사용자 편의성을 고려한 VIA 라이브러리 개발에 관한 연구)

  • 이상기;이윤영;서대화
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4C
    • /
    • pp.326-332
    • /
    • 2002
  • To transfer the large size of data more quickly among cluster nodes, the lightweight messaging scheme has been developed. VIA(Virtual Interface Architecture) allows that user can directly communicate with network devices without any interference of kernel and has become a communication protocol for clusters. But one must spend a lot of time to be skillful with it because of difficulties of programming. Therefore, we propose an easier library called EVIL(Easy-to-use Virtual Interface Library) that developers can easily deal with. We evaluated the performance of EVIL, Native VIA, TCP/IP respectively.

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

IPSec VPNs vs. SSL VPNs

  • 윤재호;권태경;천동현;임선간
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.24-30
    • /
    • 2003
  • 인터넷을 비롯한 대부분의 패킷스위칭 네트워크는 IP(Internet Protocol)을 기반으로 하고 있다. 그러나, IP는 기본적으로 보안에 취약하게 설계되어 보안이 필요한 통신에 사용하는데는 어려움이 있다. IPSec(IP Security)은 IP 트래픽에 대한 이러한 보안문제를 극복하기 위해 생겨났으며, 방화벽과 결합된 형태로 가장 널리 쓰이고 있는 VPN(Virtual Private Network) 제품의 하나이다. 그러나 IPSec의 문제점이 대두되고, Web-based Service가 영역을 넓혀가면서 기존의 웹보안프로토콜인 SSL이 VPN의 새로운 형식으로 나타나고 있다. 본 고에서는 IPSec VPN과 SSL VPN의 차이점의 분석하여 정리하고자 한다.

Analysing the SSL VPN model compared with IPSec VPN (SSL을 이용한 VPN Model분석)

  • 윤재호;권태경
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.760-762
    • /
    • 2003
  • 인터넷을 비롯한 대부분의 패킷스위칭 네트워크는 IP(Internet Protocol)을 기반으로 하고 있으나, IP는 기본적으로 보안에 취약하게 설계되어 보안이 필요한 통신에 사용하는데는 어려움이 있다. IPSec(IP Security)은 IP 트래픽에 대한 이러한 보안문제를 극복하기 위해 생겨났으며, 방화벽과 결합된 형태로 가장 널리 쓰이고 있는 VPN(Virtual Private Network) 제품의 하나이다. 그러나 IPSec 자체의 문제점이 대두되고, Web-based Service가 영역을 넓혀가면서 기존의 웹 보안 프로토콜인 SSL이 VPN의 새로운 형식으로 나타나고 있다. 본 고에서는 이러한 SSL VPN의 모델을 IPSec VPN과 비교하여 분석하고자 한다.

  • PDF