• Title/Summary/Keyword: Access Gateway

Search Result 234, Processing Time 0.021 seconds

Performance Analysis of Cost-Effective Inter-LMA Domain Handover Scheme in PMIPv6 Networks with NEMO Supporting (NEMO를 지원하는 프록시 모바일 IPv6 네트워크에서 비용효과적인 LMA 도메인간 핸드오버 기법의 성능분석)

  • Yi, Yun-Su;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.201-210
    • /
    • 2012
  • Now, there are many mobile nodes are efficient and stable when they move to operate with variety techniques have emerged.Recently, there is a growing interest about PMIPv6(Proxy Mobile IPv6) and, in this proposal of essay is the based on the way to mobility support system will stand on the basis from PMIPv6 network to NEMO(Network Mobility). PMIPv6 is mobility support system from single domain, it actual network is composed with nested in a multiple domain structural system. The proposed technique in the domain of two or more, the LMA(Local Mobility Anchor) communication between LMA(Local Mobility Anchor) and MAG(Mobile Access Gateway) of movable domain can increase performance by handover delay and signaling.

Intelligent Hierarchical Mobility Support Scheme in F-PMIPv6 Networks (F-PMIPv6 네트워크에서 지능적인 계층적 이동성 지원 기법)

  • Han, Sunghee;Jeong, Jongpil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.337-349
    • /
    • 2013
  • In this paper, we propose a new mobility management scheme, called i-FP(intelligent Fast PMIPv6). Our proposed i-FP scheme is addressed for solving the existing local mobility management problems from legacy frameworks. To move MN(Mobile Node) to other networks in one domain, i-FP employs three network entities which are extended from PMIPv6(Proxy Mobile IPv6), LMA(Local Mobility Anchor), MAG(Mobile Access Gateway) and MN. In i-FP, the three network entities can reduce the handover delay time of MNs. Also, i-FP uses an IP header swapping mechanism to avoid the traffic overhead and improve the throughput of network. To evaluate the performance of i-FP, we analyze our i-FP, HMIPv6(Hierarchical Mobile IPv6) and PMIPv6 which are legacy protocols of local mobility management in terms of various parameters. Finally, our i-FP scheme shows good performance(reduction of routing hops 10.2%, signaling costs 58.5% and handover delay 16.3%) than other network schemes for the total cost.

Analysis of Digital Achilles Tendon of Scholarly Journals (학술지의 디지털 아킬레스건 분석)

  • 윤희윤
    • Journal of Korean Library and Information Science Society
    • /
    • v.34 no.4
    • /
    • pp.43-66
    • /
    • 2003
  • Nowadays many academic libraries have considered and some have implemented the just-in-time(access) approach to collection development especially of scholarly journals. The adaption of the scholarly electronic journal based on access paradigm has brought a number of advantages and disadvantages to academic libraries. Electronic journals have promised rapid delivery of the latest research to the desktop through the ubiquitous platform of the Internet. But the promise of the e-journal is not yet a reality, and there are many misconceptions about what is actually available today. The objective of this paper is to analyse the probabilities of digital achilles tendon of scholarly journals resulting from a decline of purchase power, absence of selection(evaluation) criteria, superfluities and abuses of impact factor, access paradigm and halo effects, mismatching of demand-supply, md insufficiency in subject gateway functions.

  • PDF

Dynamic RBAC Model based on OSGi (OSGi 기반 동적 RBAC 모델)

  • Kim, In-Tae;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.53-60
    • /
    • 2009
  • In home network environments, the user authentication and authorization associated user's information and usability may be important security issue. The OSGi service platform, a well-known home network gateway already specifies the mechanism of that. The traditional authority method provided OSGi implements simple RBAC(Role Based Access Control) model. This is difficult to support efficient access control. In this paper, we propose the dynamic RBAC model based on OSGi. The proposed method describes the extended framework that manage two roles named as absolute role and relative role, extend existed framework with relative role and propose programming model to enable dynamic access control. Finally, we implement the proposed framework using AspectJ and Java annotation.

An Enhanced Handoff Support Based on Network-based Mobility Management Protocol (향상된 핸드오프를 지원하는 망 기반의 이동성 지원 방안)

  • Lee, Sung-Kuen;Jeon, You-Chan;Lim, Tae-Hyong;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1B
    • /
    • pp.1-9
    • /
    • 2009
  • In this paper, we propose an enhanced handoff support scheme based on network-based mobility management protocol, Proxy Mobile IPv6 (PMIPv6), which is actively standardized by the IETF NETLMM working group. By utilizing the dynamic virtual hierarchy network architecture between mobile access gateways (MAGs), the proposed scheme can support network scalability and reliability to wireless access network. In addition, we propose pre-authentication process based on the policy store (PS) to support a fast and seamless handoff. We evaluate the performance of the proposed scheme in terms of handoff delay and end-to-end delay thru computer simulation. Thru, various computer simulation results, we verified the superior performance of the proposed scheme by comparing with the results of other schemes.

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

Analysis of Secure Remote Access to Virtual Private Home Network with L2TP Tunneling methods (L2TP tunneling 방법을 기반으로 한 가설 사설망의 보안 원격 접속분석)

  • Basukala, Roja Kiran;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2188-2194
    • /
    • 2008
  • Home network is the connection and communication of several electronic and electrical devices at hone with the integration of several technologies like Ethernet, wireless, phone line and power-line at the residential gateway to the internet. This internet based home network can be accessed from any part of the world through any device by any poison via internet. Since home network is developed for comfortable and safe life of home users, the information flow to/from home network needs to be private. Hence the remote access of the home network must be secured. This paper analyses two secure tunneling methods, voluntary and compulsory for L2TP(Layer Two Tunneling Protocol) based VPN(Virtual Private Network) for secure remote access of the home network.

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (혼합형 침입차단시스템을 위한 통합 접근제어 규칙기술 언어 및 그래픽 사용자 인터페이스 구현)

  • 박찬정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.57-70
    • /
    • 1999
  • Since a hybrid firewall filters packets at a network layer along with providing gateway functionalities at an application layer, it has a better performance than an If filtering firewall. In addition, it provides both the various kinds of access control mechanisms and transparent services to users. However, the security policies of a network layer are different from those of an application layer. Thus, the user interfaces for managing a hybrid firewalls in a consistent manner are needed. In this paper, we implement a graphical user interface to provide access control mechanisms and management facilities for a hybrid firewall such as log analysis, a real-time monitor for network traffics, and the statisics on traffics. And we also propose a new rule script language for specifying access control rules. By using the script language, users can generate the various forma of access control rules which are adapted by the existing firewalls.

Constructing a Metadata DB to Facilitate Retrieval of Faculty Syllabi on the Internet (인터넷 대학강의안의 검색을 위한 Metadata DB 구축)

  • 오삼균
    • Journal of the Korean Society for information Management
    • /
    • v.16 no.2
    • /
    • pp.149-164
    • /
    • 1999
  • The purpose of this paper is to introduce and discuss a newly-constructed metadata database system that facilitates the retrieval of faculty syllabi available on the Internet. This gateway system aims to provide users with one-stop access to syllabi posted by the faculty of the institutes of post-secondary education from all around the world. Several elements of the Dublin Core (DC) and other supplementary elements were used for cataloging the syllabi. The conceptual schema of all the selected elements of the syllabi was developed following the entity-relationship model. The metadata of the syllabi was then stored in a relational database system. Various searching and browsing interfaces were implemented to facilitate effective retrieval. The prototype, named as Gateway to Faculty Syllabi (GFS), is available at http:/Ais.skku.ac.kr/gfs/.

  • PDF

Future Northeast Asia Transport and Communications System

  • Rimmer, Peter J.
    • Journal of Korea Port Economic Association
    • /
    • v.17 no.2
    • /
    • pp.1-28
    • /
    • 2001
  • Korea has been at the forefront of efforts to enhance international cooperation in transport and communications within Northeast Asia. This effort is driven not only by the benefits that could accrue to the Korean Peninsula but also to all nations in the region. Mutual cooperation within Northeast Asia would reduce transport and communications costs and provide the basis for a regional transport and logistics network. Before progress can be made towards an integrated transport and communications system in Northeast Asia, however, there is a need to evaluate its prospects, outline a visionary plan, and detail a preferred strategy. The strategy to develop the Korean Peninsula as the gateway for Northeast Asia should harmonize with the region's common transport (and communications) policy The strategy adopted by South Korea is focused primarily on the development of an improved logistics infrastructure that would be extended to North Korea upon reunification. The seaport and airport developments In Korea will have to be supported by improved access to planned high-speed railways, expressways and freight distribution centers that, in turn, are to be integrated with new telecommunications and computer technologies. The benefits from these improvements will be lost unless existing government monopolies controlling seaport, airport, rail, road and expressway developments are commercialized to ensure that the price of transport reflects its actual cost. Technical harmonization between different modes should be promoted to facilitate efficient intermodal transport between the Korean Peninsula and the rest of Northeast Asia.

  • PDF