• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.031 seconds

Performance Evaluation of Hybrid Distributed Mobility Management (하이브리드 분산 이동성 관리 방식의 성능 평가)

  • Wie, Sunghong;Jang, Jaeshin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1862-1872
    • /
    • 2017
  • To overcome the limitations of the current Central Mobility Management (CMM) protocols, IETF has been discussing about the Distributed Mobility Management (DMM) protocols that the centralized mobility functions of Home Agents (HA) are distributed to network edges closer to mobile users. The DMM protocol has some advantages of low-cost traffic delivery and high scalability. However, it faces several problems such as a high signaling cost and a complex address management. Especially, users moving at a high speed and with long-live sessions can make these problems worse. To reduce the high signaling cost for long-live sessions, we propose a novel hybrid DMM protocol allocating different mobility anchors according to the session durations. In this paper, we analyze the performance of the proposed hybrid DMM protocol and show superior performance with respect to the signaling cost.

A Handover Scheme for Seamless Service Support between Wired and Wireless Networks over BcN (BcN 환경에서 유선망과 무선망간의 끊김없는 서비스를 지원하기 위한 핸드오버 절차)

  • Yang, Ok-Sik;Choi, Seong-Gon;Choi, Jun-Kyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.799-808
    • /
    • 2005
  • This paper proposes low latency handover procedure for seamless connectivity and QoS support between wired (e.g. Ethernet) and wireless (e.g. WLAN, WiBro(802.16-compatible), CDMA) networks by the mobile-assisted and server-initiated handover strategy. It is assumed that the server decides the best target network considering network status and user preferences. In this algorithm a mobile terminal associates with the wireless link decided at the server In advance and receives CoA as well. When handover occurs without the prediction in wired networks, the server performs fast binding update using physical handover trigger through the MIH(media independent handover) function. As a result, a mobile terminal does not need to perform L2 and L3 handover during handover so that this procedure decreases handover latency and loss.

EEPB-MAC: Energy Efficient & Priority-Based MAC Protocol for Energy Harvesting Wireless Sensor Networks (에너지 수확 무선 센서 네트워크에서 에너지 효율 및 우선순위 기반의 MAC 프로토콜)

  • Kim, Seong-Cheol;Jeon, Jun-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.755-761
    • /
    • 2013
  • Medium access control (MAC) protocols for wireless sensor networks make sensor nodes on state for energy-efficiency only when necessary. In this paper we present an energy efficient priority-based MAC protocol for energy-harvesting Wireless Sensor Networks (WSNs). For support priority-based packet transmission the proposed EEPB-MAC protocol uses the modified IEEE 802.15.4 beacon frames including priority bit, sender node address, and NAV value fields. A receiver node periodically wakes up, receives sender beacon frames, selects data sending sender, and broadcasts a beacon frame containing the selected sender's address. A receiver node selects sender node according to sender's data priority. A receiver nodes also adjust wake up period based on their energy states. Hence, the energy consumption of receiver node can be minimized. Through simulations and analytical analysis, we evaluate the performance of our proposed the EEPB-MAC protocol and compare it against the previous MACs. Results have shown that our protocol outperforms other MAC in terms of energy consumption, higher priority packet delivery delay.

Model Validation of a Fast Ethernet Controller for Performance Evaluation of Network Processors (네트워크 프로세서의 성능 예측을 위한 고속 이더넷 제어기의 상위 레벨 모델 검증)

  • Lee Myeong-jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.92-99
    • /
    • 2005
  • In this paper, we present a high-level design methodology applied on a network system-on-a-chip(SOC) using SystemC. The main target of our approach is to get optimum performance parameters for high network address translation(NAT) throughput. The Fast Ethernet media access controller(MAC) and its direct memory access(DMA) controller are modeled with SystemC in transaction level. They are calibrated through the cycle-based measurement of the operation of the real Verilog register transfer language(RTL). The NAT throughput of the model is within $\pm$10% error compared to the output of the real evaluation board. Simulation speed of the model is more than 100 times laster than the RTL. The validated models are used for intensive architecture exploration to find the performance bottleneck in the NAT router.

The DSTM TEP for IPv4 and IPv6 Interoperability (IPv4/IPv6의 연동을 위한 DSTM TEP의 기능)

  • 진재경;최영지;민상원
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.578-587
    • /
    • 2003
  • The DSTM (Dual Stack Transition Mechanism), one of tunneling mechanism, is considered as the best solution in IPv4/IPv6 transition recently. The DSTM provides a method to assure IPv4/v6 connectivity based on 4over6 (IPv4-over-IPv6) tunneling and temporal allocation of a global IPv4 address to a host requiring such communication. A TEP (Tunnel End Point) operates as a border router between IPv6 domain and IPv4 Internet, which performs encapsulation and decapsulation of 4over6 tunneling packets to assure hi-directional forwarding between both networks. In this paper, we analyze basic standards of the IPv6 protocol. And, we design and implement a DSTM TEP daemon block. The TEP daemon analyzes a fevers tunneling packet that is forwarded by the DSTM node, establishes the TEP's 4over6 interface, and supplies communication between a DSTM and a IPv4-only node. Finally, we construct a DSTM testbed and measure performance of the DSTM TEP. Our observation results show that performance of TEP supports the DSTM service.

Design and Implementation of Dynamic Peer Selection Scheme for Allocating Proxy-Server on Pure P2P Network Environments (순수 P2P 네트워크 환경에서 프락시-서버 할당을 위한 동적 피어 선정 기법 설계 및 구현)

  • Kim, Young-Jin;Kim, Moon-Jeong;Kim, Ung-Mo;Eom, Young-Ik
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.153-160
    • /
    • 2003
  • Recently, deployments of firewalls and NATs ire increasing to provide network security features or to solve the problem of public IP shortage. But, in these environments, peers in different firewall or NAT environments may get limited services because they cannot open direct communicate channels. This can be a significant problem in pure P2P environments where the peers should get or provide services by opening direct channels among themselves. In this paper, we propose a scheme for dynamically selecting a peer that fan be used as a proxy server. The proxy server supports the communication between the peers in different firewall or NAT environments. The proposed scheme is operating system independent and supports bidirectional communication among the peers in P2P environments. Additionally, the proposed scheme can distribute network traffic by dynamically allocating proxy servers to the peers that is not located in the firewall or NAT environments.

Applying TIPC Protocol for Increasing Network Performance in Hadoop-based Distributed Computing Environment (Hadoop 기반 분산 컴퓨팅 환경에서 네트워크 I/O의 성능개선을 위한 TIPC의 적용과 분석)

  • Yoo, Dae-Hyun;Chung, Sang-Hwa;Kim, Tae-Hun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.351-359
    • /
    • 2009
  • Recently with increase of data in the Internet, platform technologies that can process huge data effectively such as Google platform and Hadoop are regarded as worthy of notice. In this kind of platform, there exist network I/O overheads to send task outputs due to the MapReduce operation which is a programming model to support parallel computation in the large cluster system. In this paper, we suggest applying of TIPC (Transparent Inter-Process Communication) protocol for reducing network I/O overheads and increasing network performance in the distributed computing environments. TIPC has a lightweight protocol stack and it spends relatively less CPU time than TCP because of its simple connection establishment and logical addressing. In this paper, we analyze main features of the Hadoop-based distributed computing system, and we build an experimental model which can be used for experiments to compare the performance of various protocols. In the experimental result, TIPC has a higher bandwidth and lower CPU overheads than other protocols.

A Study on the Legislation Directions of FRAMEWORK ACT ON KOREA COAST GUARD(tentative name) ((가칭) 해양경찰기본법 입법방향에 관한 연구)

  • Son, Yeongtae
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.396-407
    • /
    • 2014
  • In 19th May 2014, the government announced that KCG(Korea Coast Guard) is dissolved regarding responsibility for recently accident which is Sewol ferry disaster. But KCG, a central administrative agency is responsible for protecting maritime sovereignty of South Korea; the most basic and indispensable organization. Furthermore, The purpose of KCG is to provide the safety of the public and keeping of public order by prescribing matters necessary for the securement of maritime security, maintenance of public order and protection of marine resources & facilities. Therefore, In this article, I would like to suggest tentatively named FRAMEWORK ACT ON KOREA COAST GUARD's management plan which could reflect the scope of functions. It means we examine the current state of KCG, and would like to signpost for the most ideal way of legal system in Korea Coast Guard. Finally, this treatise is expected that this research can be a guideline contribute to improving Korea Coast Guard relevant laws even a little.

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

Suggestion on Korean Internet governance system by multi stakeholder approach and Introduction of Korean Internet address law (한국 내 인터넷 거버넌스 형성과 인터넷주소에 관한 법률)

  • Yun, Boknam
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.68-77
    • /
    • 2013
  • This article consists of 3 parts. Part I is multi stakeholder approach on Internet governance system. Part II is analysis of the Korean Internet governance system. In this part, I explain relevant laws in Korea, including Korean Internet Address Resources Act. Part III is my suggestion on Korean Internet governance system using a multi stakeholder approach. First of all, the keyword of the Internet governance system is decision making process: that is, consensus based versus top-down approach. Then who are major players in Internet governance in national level? Government, or Private sectors such as business and civil society. Korean legal system for Internet governance shows a top-down decision making process. Major players are the government (that is, Ministry of Science, ICT and Future Planning) and KISA affiliated with the government. Other players include Internet Address Policy Committee, Korea Internet Governance Alliance, and NGOs. The key statute for Internet governance in Korea is Internet Address Resources Act of 2004. Articles 3 and 5 require the Ministry of Science, ICT and Future Planning to take a proactive role in Internet governance. The government shall consult with the Internet Address Policy Deliberation Committee for Internet governance. Yet this Committee is established under the control of the Ministry of Science, ICT and Future Planning. All members of this Committee are also commissioned or nominated by the Chairman of the Ministry. Meanwhile, there are also non-official organizations, including Sub-committee on Address & Infrastructure of Korea Internet Governance Alliance. I suggest to reform decision making process of Korean Internet governance system based on BOTTOM-UP process for CONSENSUS BASED DECISION. My suggested system includes the following: (1) The government hands over a major role in Internet governance to INDEPENDENT Internet policy organization. And the government participates in such organization as ONE of the players. (2) Nomination of this committee member must be bottom-up process for a genuine multi-stakeholder model including civil society, commercial organization, end-users and experts. (3) The government should establish plan for supporting the private sector's international activity on the long-term basis.

  • PDF