• Title/Summary/Keyword: 가상망

Search Result 550, Processing Time 0.032 seconds

망 분리기반의 정보보호에 대한 고찰

  • Lee, Eun-Bae;Kim, Ki-Young
    • Review of KIISC
    • /
    • v.20 no.1
    • /
    • pp.39-46
    • /
    • 2010
  • 정보 통신의 발전으로 인하여 모든 장소에서 인터넷, 인트라넷을 적용하여 외부와의 업무 연속성을 활용하고 있다. 그러나 이러한 환경은 계속적인 기업 내의 정보 유출에 대한 위험으로 내부 정보보호를 위해업무 영역과 개인 영역으로 구분된 환경을 조성하고 있다. 이를 위한 망 분리는 IT기술의 발전으로 물리적인 망 분리에서 가상화를 접목한 논리적 망 분리가 제시되고 있다. 업무 환경의 보호를 위한 망 분리에 대한 다양한 방안과 그에 대한 장단점을 소개하도록 한다.

Network Management Model of MPLS Network with GSMP Interface (GSMP 인터페이스를 갖는 MPLS 네트워크의 망 관리 모델)

  • 권태현;이경만;차영욱
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05c
    • /
    • pp.390-395
    • /
    • 2002
  • MPLS는 고속 전달, 트랙픽 엔지니어링 그리고 가상 사설망 서비스를 가능하게 한다. MPLS 레이블 스위치와 제어기 사이에서 동작하는 GSMP 프로토콜은 연결, 구성, 장애, 성능관리 및 동기화 기능을 제공하는 개방형 인터페이스 프로토콜이다. GSMP가 적용된 개형형 인터페이스의 망 관리 기능은 제어기 또는 레이블 스위치에 위치할 수 있다. 본 논문에서는 MPLS 레이블 스위치의 단순화 및 자원 이용의 효율성을 높이기 위하여 SNMP 에이전트가 제어기에 탑재되는 망 관리 모델을 제시하였다. MPLS-LSR 및 FTN MIB와 GSMP 메시지의 매핑 시나리오를 제시하였으며, 제어기의 구현을 통하여 본 논문에서 제시된 망 관리 모델의 실현성을 확인하였다.

  • PDF

Multicast Routing Algorithm for Multimedia Transmission in an ATM Network (ATM망에서의 멀티미디어 전송을 위한 다중점 경로설정 알고리즘)

  • 김경석;이상선;오창환;김순자
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.1
    • /
    • pp.91-102
    • /
    • 1996
  • The multicast routing algorithm is necessary to transmit multimedia traffic efficiently in ATM (asynchronous transfer mode) networks. In this paper, we propose the multicast routing algorithm which is based on VP/VC characteristic. The proposed algorithm is based on VP tree concept and using cost function which is based on VP/VC switching. The cost funication is composed of link cost, delay and weighting factor on delay and the weighting factor is calculated by delay sensitivity of the traffic. The proposed algorithm can choose delay bounded path which satisfies delay constraint, moreover it can choose optimal path among VPs which has the same link cost and satisfying delay constraint. With controlling weighting factor, proposed algorithm can set-up efficient path. When the weighting factor sets to be between 0.8 and 1, experimental results show that the perforance of proposed scheme is approximated to that of cost optimal algorithm and strongly delay optimized algorithm.

  • PDF

5G mobile network and ATSC 3.0 broadcasting network interworking trend and plan (5G 이동망과 ATSC 3.0 방송망 연동 동향 및 방안)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.47-52
    • /
    • 2020
  • The introduction of virtualization technology in the broadcasting field is actively progressing broadcasting service automation and intelligence based on the effective operation of IT resources throughout the broadcasting industry ecosystem. In recent years, there is increasing interest in increasing the flexibility of various broadcasting resources and increasing the efficiency of interworking with other networks through network virtualization of the broadcasting network infrastructure. The fundamental transformation from the broadcasting network to the IP paradigm is facing a situation where it is necessary to solve various problems for the effective interworking of Internet-based service platforms and 5G networks and the development of new convergence services. In other words, for organic and effective interworking with the next-generation broadcasting network represented by ATSC 3.0, a mobile communication network represented by 5G, and the Internet, a number of difficulties must be solved. In this paper, the basic technology and status for the convergence of ATSC 3.0 broadcasting network and mobile communication network represented by 5G was examined, and a plan for the ATSC 3.0 broadcasting network and 5G network to interwork with each other as a network was described.

The case study for Implementation and verification of Network based on VLSM (VLSM 기반의 네트워크 구현과 검증 사례연구)

  • Jang, Jae-Yeol;Kim, No-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.11
    • /
    • pp.1267-1276
    • /
    • 2014
  • As the volume of internet rapidly increases, the number of IPv4 addresses available is quickly declining, while transition to IPv6 is being delayed. As a interim solution, Variable-Length Subnet Masking(VLSM) addressing scheme, which varies the length of each IP address allowing more efficient, is being used. This paper suggests effective example of network based on virtual network with topology designed using VLSM charting rather than usual theoretical approach in VLSM, which allows more efficient use of address space.

A Study on Performance analysis of protocol in VPN (가상 사설망에서 프로토롤의 성능분석에 관한 연구)

  • 김도문;전문석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.625-632
    • /
    • 2003
  • We are view of the information on VPN(Virtual private Network) into each difference layer protocol. network on mutuality exchanged of information is importance of the confidentiality and Integrity. But it is presented problems about compatability and availability between variable equipment as several protocol. hence, it was achieved of the transmission through encryption and authentication of information, although there is secured an intended attack from the third intruder. so tunneling VPN system on achieving, each layer position transmit of mutuality exchanged. This study will investigate the codification and certified security status when layer2 and layer 3 informations are each transmitted using protocol with integrity Public Key. In addition, we will using protocol and the performance analysis difference between layers and layers.

  • PDF

A Dynamic Key Lifetime Change Algorithm for Performance Improvement of Virtual Private Networks (가상사설망의 성능개선을 위한 동적 키 재생성 주기 변경 알고리즘)

  • HAN, Jong-Hoon;LEE, Jung Woo;PARK, Sung Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.10 s.340
    • /
    • pp.31-38
    • /
    • 2005
  • Ipsec is a security protocol suite that provides encryption and authentication services for IP messages at the network layer of the internet. Internet Key Exchange (IKE) is a protocol that is used to negotiate and provide authenticated keying materials in a protected manner for Security Associations (SAs). In this paper, we propose a dynamic key lifetime change algorithm for performance enhancement of virtual private networks using IPSec. The proposed algorithm changes the key lifetime according to the number of secure tunnels. The proposed algorithm is implemented with Linux 2.4.18 and FreeS/WAN 1.99. The system employing our proposed algorithm performs better than the original version in terms of network performance and security.

The case study for Implementation and verification of Dynamic NAT and PAT (동적 NAT과 PAT의 구현과 검증 사례연구)

  • Kim, No-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1131-1138
    • /
    • 2015
  • As the size of the internet market grows rapidly, the number of IPv4 addresses available is being exhausted, while transition to IPv6 is being delayed. As the best alternative solution, Network Address Translation(NAT) scheme is being used. It connects the public internet network with the private internet network in order to reduce the waste of IPv4 addresses space. The purpose of this paper is to study the effective example of network based on common virtual network using Packet Tracer with topology designed rather than usual theoretical approach in Dynamic NAT and PAT, which allows more efficient use of address space.

An Adaptive Distributed Wavelength Routing Algorithm in WDM Networks (파장분할 다중화 (WDM) 망을 위한 적응 분산 파장 라우팅 알고리즘)

  • 이쌍수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1395-1404
    • /
    • 2000
  • In this paper, we propose a heuristic wavelength routing algorithm for IP datagrams in WDM (Wavelength-Division Multiplexing) networks which operates in a distributed manner, while most previous works have focused centralized algorithms. We first present an efficient construction method for a loose virtual topology with a connectivity property, which reserves a few wavelength to cope with dynamic traffic demands properly. This connectivity property assures that data from any source node could reach any destination node by hopping one or multiple lightpaths. We then develop a high-speed distributed wavelength routing algorithm adaptive to dynamic traffic demands by using such a loose virtual topology and derive the general bounds on average utilization in the distributed wavelength routing algorithms. Finally, we show that the performance of the proposed algorithms is better than that of the FSP(Fixed Shortest-Path) wavelength routing algorithms through simulation using the NSFNET[1] and a dynamic hot-spot traffic model, and that the algorithms is a good candidate in distributed WDM networks in terms of the blocking performance, the control traffic overhead, and the computation complexity.

  • PDF

A Study on Network Partition to Cope with Cyber Attack (사이버 공격에 대응할 수 있는 망분리 방안 연구)

  • Lee, Ji-Sang;Jee, Jung-Eun;Shin, Yong-Tae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.313-315
    • /
    • 2011
  • 인터넷의 급속한 발달로 빈번히 발생하고 있는 해킹 및 악성프로그램과 같은 사이버 공격으로부터 중요 정보를 보호하기 위한 망분리 기술이 요구되고 있다. 망분리에는 외부와 내부망을 물리적으로 분리하는 물리적 망분리와 가상화 기술을 이용하여 분리하는 논리적 망분리가 있다. 물리적 망분리는 망구축 및 유지비용이 높으며, 논리적 망분리는 보안 신뢰성이 낮다. 제안하는 LNP는 사이버 공격을 대응할 수 있는 논리적 망분리 방안으로 트래픽 유형을 탐지하여 망을 분리하고, 위협 요소 제거 시 망분리를 해제한다. 논리적으로 망을 분리하는 LNP는 트래픽 경로를 차단하여 중요 정보를 안전하게 보호할 수 있다.