• Title/Summary/Keyword: Local Area Network정의

Search Result 19, Processing Time 0.026 seconds

Software-Defined WAN and Exchange for Edge-to-Edge Network Softwarization

  • Kim, Dong-Gyun;Jo, Hyeon-Hun
    • Information and Communications Magazine
    • /
    • v.32 no.7
    • /
    • pp.17-26
    • /
    • 2015
  • 최근 네트워크 기술 동향에 있어서 이른바 핫 이슈 중 하나인 소프트웨어 정의 네트워킹(SDN, Software-Defined Networking)은 바야흐로 데이터센터, 기업, 캠퍼스 등의 근거리 데이터 네트워크(LAN, Local Area Network) 환경을 넘어서 통신망 사업자(캐리어)와 서비스 제공자를 통해 원거리 데이터 네트워크 (WAN, Wide Area Network)로 진화하고 있다. 본고에서는 종단간 SDN 프로덕션 서비스를 위한 소프트웨어 정의 원거리 네트워크(SD-WAN, Software-Defined WAN)의 개요 및 적용 사례를 소개하고, SD-WAN의 핵심 서비스 기술로 인식되고 있는 네트워크 최적화, 가상화, 자동화, SDX(Software-Defined Exchange) 등의 요소 기술과 연구 동향을 알아본다.

Model and Architecture of User-Defined Networks for Seamless Mobility Management in Diverse Wireless Environment (다양한 무선 환경에서 끊김 없는 이동성 관리를 위한 사용자 정의 네트워크 모델 및 구조)

  • Chun, Seung-Man;Nah, Jae-Wook;Lee, Seung-Mu;Choi, Jun-Hyuk;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.35-43
    • /
    • 2011
  • In this paper, we propose a novel architecture for seamless mobility management to provide users with seamless Internet connection when users roam between diverse wireless local area networks (WLANS) controlled by different management entities. There have been many researches in IETF, i.e., MIPv6, HMIPv6, and PMIPv6, to provide the mobility management. However, practically since wireless access points or access routers, which are managed by an individual manager or ISP managers, have different authentication scheme and the supported mobility management, the previous mobility management protocol developed by IETF can not guarantee the quality of service of application services as the mobile node performs the handover. To solve this drawback, we propose the mobility management scheme to provide QoS-guaranteed Internet services during the handover by configurating the wireless networks which is defined by users. More specifically, we present a model, the architecture and an algorithm for user-defined network (UDN) to provide the seamless Internet service. Finally, the performance of the proposed algorithm is evaluated by the network simulation tool.

The Study for Supporting IPv6 in GGSN of UMTS/GPRS (UMTS/GPRS의 GGSN에서 IPv6 지원 방안에 대한 연구)

  • Lim, Sun-Hwa;Kim, Yeong-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1257-1260
    • /
    • 2002
  • 3 세대 이동통신 시스템인 UMTS/GPRS 는 모든 MS(Mobile Station)에게 인터넷 서비스를 항상 제공할 수 있도록 하는 것을 목표로 하고 있다. 그러나 최근 인터넷 사용의 증가로 인해 public IPv4 주소 부족 현상이 발생함에 따라 인터넷에 연결되어 있는 모든 MS 에게 public IPv4 주소를 할당하는데 한계가 있다. 이에 따라 3GPP의 Release 2000 IM CN(IP Multimedia Core Network) 서브 시스템에서는 멀티미디어 서비스 지원을 위해 인터넷에 연결되어 있는 모든 MS 에게 IP 를 할당할 수 있도록 IPv6 지원을 필수로 정의하고 있다. 따라서 UMTS/GPRS 에서 IPv6 를 지원할 경우 이동망과 인터넷망간의 패킷 서비스 전달을 위해 게이트웨이 기능을 수행하는 GGSN 에서 가장 큰 변화가 이루어질 것이다. 그러므로 본 논문에서는 GGSN 이 dual stack 을 지원해야하는지에 대해 살펴본 후 UMTS/GPRS 프로토콜 구조를 제안한다. 그리고 IPv6 지원을 위해 GGSN의 기능을 설계하고 GTP 메시지와 IPv6 주소 할당 방법에 대해 살펴본다.

  • PDF

A Design of Security Mechanism to control LR-WPAN in WLAN (LR-WPAN을 제어하기 위한 WLAN에서의 보안 매커니즘 설계)

  • Lee, Jae-Won;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.178-180
    • /
    • 2005
  • 저렴한 비용, 매우 작은 파워 소비라 낮은 데이터 전송속도를 지원 하는 IEEE 802.15.4 LR-WPAN(Wireless Personal Area Network) 기술은 앞으로 다가올 유비쿼터스 시대의 핵심이라고 할 수 있다. 도래할 유비쿼터스 시대에는 댁내에 LR-WPAN 기술을 적용한 다양한 상품이 보급될 것이다. 그러나 LR-WPAN은 매우 낮은 전력 소비를 위해 네트워크 기능을 최소화 하였기 때문에 응용에 있어 LAN 또는 WLAN(Wireless Local Area Network)등 기존 네트워크와의 통신 및 보안이 아직 고려되지 않아 보완이 필요하다. 본 논문에서는 WLAN의 Station이 LR-WPAN을 보안적으로 안전하게 제어할 수 있도록 AP(Acess Point)와 WLAN의 Station 그리고 LR-WPAN의 PAN Coodinator 간의 새로운 Message와 Function를 정의하고, 다른 두 네트워크간의 효율적이고 보안이 유지되는 프레임 프로세싱 매커니즘을 제안한다.

  • PDF

The Support Scheme for New Farmers and the Role of Local Group in Biratori-cho, Hokkaido, Japan (일본 홋카이도 비라토리정의 신규취농 지원정책과 마을조직의 역할)

  • Jeong, Yong-Kyeong;Kobayashi, Kuniyuki;Hwang, Jeong-Im
    • Journal of Agricultural Extension & Community Development
    • /
    • v.25 no.4
    • /
    • pp.211-224
    • /
    • 2018
  • The presence of agricultural and rural society in South Korea has been threatened due to aging as well as depopulation. This study aims to explore the Japanese support scheme for new farmers and the role of local group in new farmers' successful settlement in agricultural and rural society. The case study area is Biratori-cho, Hokkaido, Japan. Firstly, this study identified the systemic support scheme for new farmers of Biratori-cho, which provides with two years' training program, mentoring, rental housing and financial aid. Secondly, we focused on the birth and the supporting role of local group, which is called 'Neo-frontier'. Lastly, we analysed the relationship of new farmers and local residents based on the in-depth interview of 11 new farmers' household. As conclusions, we emphasized the value of quality-based support scheme of local government, unlike the quantity-based policy focused on the number of in-migrants. Also, we discussed the meaning of social network in new farmers' successful settlement in agricultural and rural society.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

An Uplink Scheduling Algorithm for VoIP in IEEE 802.16d Systems (IEEE 802.160에서 상향링크 VoIP 스케줄링 알고리즘 방식 연구)

  • Kang, Min-Seok;Jang, Jae-Shin
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.87-91
    • /
    • 2006
  • With the growth of the internet, the number of wireless internet users has increased continuously up to date. However, mobile communications could not support high speed transmission rate with cheap communication fee and wireless LAN has problems in providing terminal mobility and wide area connectivity, respectively. So the WMAN standard has been newly designed to make up for these limits. The initial 802.16 specification effectively offers a solution for providing fixed users with high speed wireless communication but it does not offer terminal mobility. So the 802.16d and 802.16e have been developed as the next generation solution that can support various PHY layer (SC, SCa, OFDM, OFDMA) and offer the terminal mobility. In this paper, we propose an effective uplink scheduling algorithm for VoIP with using UGS, and we show that our proposed algorithm is superior in view of average delay and management of uplink bandwidth to conventional rtPS algorithm and the scheme in reference, with using NS-2 network simulator.

  • PDF

A Back-Pressure Algorithm for Lifetime Extension of the Wireless Sensor Networks with Multi-Level Energy Thresholds (센서네트워크 수명 연장을 위한 에너지 임계값 기반 다단계 Back-Pressure 알고리즘)

  • Jeong, Dae-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12B
    • /
    • pp.1083-1096
    • /
    • 2008
  • This paper proposes an energy-aware path management scheme, so-called the TBP(Threshold based Back-Pressure) algorithm, which is designed for lifetime extension of the energy-constrained wireless sensor networks. With the goal of fair energy consumptions, we extensively utilize the available paths between the source and the sink nodes. The traffic distribution feature of the TBP algorithm operates in two scales; the local and the whole routing area. The threshold and the back-pressure signal are introduced for implementing those operations. It is noticeable that the TBP algorithm maintains the scalability by defining both the threshold and the back-pressure signal to have their meanings locally confined to one hop only. Throughout several experiments, we observe that the TBP algorithm enhances the network-wide energy distribution. which implies the extension of the network lifetime. Additionally, both the delay and the throughput outcomes show remarkable improvements. This shows that the energy-aware path control scheme holds the effects of the congestion control.

Study on Security Framework using Security Quantitative Analysis for the Effective Multimedia Services to WLAN Mesh Network (무선랜 메쉬 네트워크에서의 효율적인 멀티미디어 서비스를 위한 보안 정량화 기반의 프레임워크 연구)

  • Shin, Myoung-Sub;Lim, Sun-Hee;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.261-273
    • /
    • 2008
  • Multimedia service whose use is rapidly increasing supports effective services to convert and transmit multimedia data based on network speed, noise circumstance, terminal computation, and type of contents for satisfying QoS. For supporting information protection of multimedia service, it offers middle level of singular security service or security mechanism which is based on policy of service provider, depending on present terminal computation and type of contents. It can support security mechanism for more effective multimedia service, if we study security of application layer and network layer for supporting multimedia service. In this paper, we propose Multimedia security framework reflected on quantitative analysis of the WLAN(Wireless Local Area Network) mesh network security using the utility function in the level of the sorority, violation and addictive compensation model.