Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
 
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
 
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

   
 
Private 5G Deployment   Private 5G Deployment Status in Korea  UPDATED   South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
 
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
 
banner
banner
SEARCH
Let us introduce the NAT behavior discovery algorithms defined in RFC 3489. To fully understand what's discussed below, we recommend you read the following posts first: 1. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 1. Mapping Behavior 2. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 2. Filtering Behavior 3. STUN (RFC 3489) vs. STUN (R...
11/04/2013
47,208
Table of Contents I. Introduction II. Procedures for Detecting IP Address Conflicts III. DHCP Offer/ACK Messages: Broadcast or Unicast ? IV. State Transition of DHCP Clients I. Overview Dynamic Host Configuration Protocol (DHCP) has been widely adopted as a protocol for allocating network configuration data, including an IP address, dynamically to...
10/30/2013
87,357
Table of Contents I. Introduction II. IP Address Allocation/Lease Procedure III. IP Address Renewal Procedure IV. IP Address Release Procedure V. Summary VI. Closing Appendix A - Format of DHCP Messages in IP Address Allocation/Lease Procedure Appendix B - Format of DHCP Messages in IP Address Renewal Procedure Appendix C - Format of DHCP Me...
10/23/2013
394,311
Table of Contents 1. Introduction 2. EPS Mobility Management (EMM) Scenario 3. Closing 1. Introduction This document and its subsequent documents will provide descriptions of specific EMM procedures based on our understanding of EMM and ECM/RRC states covered in our LTE technical document, “LTE EMM and ECM States” [1]. EMM features are explained in...
10/22/2013
95,358
What are the differences between NAT types defined in RFC 3489 and RFC 5780? To understand the differences to be explained below, you must be familiar with the Mapping Behavior and Filtering Behavior of a NAT that we covered last time. What is STUN? STUN is a protocol that allows two devices (P2P devices) to discover the presence and types of a NAT between them, and to find out what Exte...
10/21/2013
51,427
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties This is the last post on RFC 4787. 4. Application Level Gateway For information about Application Level Gateways (ALGs), please click here....
10/10/2013
36,607
SK Telecom, the Korean No. 1 telecom operator, launched Btv Mobile service (in SD/HD) offering a variety of live broadcasting and VoD contents for mobile devices in around July 2012. And a year later in July 2013, boosted by the commercialization of LTE-A, it began a "Full HD" streaming service with drastically enhanced video quality. The following is the press release by SK Telecom about its n...
09/24/2013
83,297
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties Now that we learned a NAT's mapping behaviors last time, below we will study its filtering behaviors as defined in RFC 4787. For information about the terms used below (Internal En...
09/23/2013
35,886
Table of Contents 1. Introduction 2. EMM, ECM and RRC States 3. EMM State Transition 4. EMM Features 5. EMM User Information 6. Closing 1. Introduction Through the previous technical documents, we have studied the LTE network architecture and LTE identifications, the fundamentals of LTE technology, and LTE security operation required for a user to...
09/20/2013
287,649
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties Many applications like Skype, online games, etc. are all Peer-to-Peer (P2P) applications based on UDP. When running these applications, two devices communicate with each other without a...
09/12/2013
38,580
Table of Contents 1. Introduction 2. SDF and EPS Bearer 3. QoS Parameters of SDF and EPS Bearer 4. QoS Provisioning and Enforcement 5. An Example for SDF and EPS Bearer QoS 6. Closing 1. Introduction An LTE service provider should be able to make services with different QoS requirements available to its users with different subscription levels. So,...
09/11/2013
362,304
Today, NATs are employed by Korean telecom operators in almost all of their access networks except for wired access networks (FTTH, Ethernet, DSL, etc.). 3G/LTE network: Large Scale NAT (LSN) installed beyond GGSN/P-GW in the 3G/LTE core networks. Also called "Carrier Grade NAT (CGN)". Wi-Fi Hotspot network: NAT implemented in Wi-Fi hotspot AP. Residential network: NAT implemented in su...
09/03/2013
35,682
Table of Contents 1. Introduction 2. EPS Session and EPS Bearer: Overview 3. Identifiers for EPS Session/Bearer (Session/Bearer IDs) 4. Summary: Table of LTE Identifiers 5. Closing and References 1. Introduction We have learned about the LTE ID groups such as UE and ME IDs, and Network Equipment (NE) and UE location identifier (location) IDs in LTE Iden...
08/26/2013
241,613
Table of Contents 1. Introduction 2. Identifiers for Network Equipment (NE IDs) 3. Identifiers for User Location (Location IDs) 4. Closing and References 1. Introduction In the previous document, “Part I, LTE Identification I” [1], identifications of UE and ME have been described. This document (Part II, LTE Identification II), as the second...
08/26/2013
122,303
Table of Contents 1. Introduction 2. Classification of LTE Identification 3. Identifiers for User Equipment (UEI IDs) 4. Identifiers for Mobile Equipement (ME IDs) 5. Closing and References 1. Introduction In LTE network, different IDs are used to identify each entity depending on their relationship with other IDs just like different names and titles ar...
08/20/2013
170,724
4.5G (3) 4G (2) 4G LTE (5) 5G (498) 5G Private 5G (1) 5G-SIG (2) 6G (4) AI (36) AR (4) ARP (3) ARPU (3) AT&T (2) Akamai (3) Alcatel (1) Authentication (5) Autonomous Driving (9) BMW (2) BSS (1) Backbone (2) Backhaul (6) Big Data (3) Billing (1) Blockchain (4) C-RAN (1) C-RAN/Fronthaul (73) CDN (14) CES (2) CORD (2) CPRI (6) Carrier Aggregation (11) Carrier Ethernet (6) Charging (2) China (3) China Mobile (5) Cisco (4) Cloud (6) Cloud Native (1) CoMP (7) Connected Car (16) Core (1) D-RAN (1) DASAN Networks (5) DHCP (10) Data Center (1) Deutsche Telekom (4) ECM (2) EDGE (4) EMM (16) EPS (2) Edge Computing (1) Ericsson (18) FTTH (16) Femto Gateway (3) Frequency (7) Fronthaul (2) GCSE (1) GSLB (1) GiGA LTE (1) GiGA WiFi (1) GiGAtopia (6) Gigabit Internet (82) Google (11) Google Global Cache (3) HDR (1) HDS (1) HFR (2) HLS (9) HSDPA (2) HTTP Adaptive Streaming (12) Handover (7) Harman (1) HeNB-GW (3) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (101) Immersive Service (1) Initial Attach (2) Intel (1) IoST (5) IoT (205) Jio (2) KDDI (6) KT (254) Korea (88) Korea ICT Market (50) Korea ICT Service (33) Korea ICT Vendor (9) LAA (5) LEO Satellite (1) LG U+ (103) LPWA (7) LSC (1) LTE (302) LTE Identification (2) LTE-A (37) LTE-A Pro (1) LTE-B (3) LTE-H (3) LTE-M (5) LTE-R (5) LTE-U (8) LWA (1) LoRa (14) MEC (19) MPLS (5) MPLS-TP (1) MPTCP (7) MSIP (4) MWC (1) MWC 2015 (26) MWC 2016 (4) MWC 2017 (8) MWC 2018 (3) Massive MIMO (1) Media Platform (1) Microsoft (1) Mobility (2) NAT (8) NB-IoT (15) NTT (1) NTT Docomo (1) Netflix (5) Network Architecture (12) Network Protocol (44) Network Slice (1) Network Slicing (6) New Radio (11) Nokia (17) O-RAN (1) OCP (3) OSPF (2) OTT (8) On-Net CDN (3) Openflow (2) Orange (1) PCRF (4) PS-LTE (7) Pay TV (1) Platform (5) Pri8vate 5G (1) Private 5G (95) Private LTE (1) Public Safety (10) QoS (6) Qualcomm (10) RCS (9) Railway (1) Roaming (3) SD-WAN (21) SDF (2) SDN/NFV (143) SIM (1) SK Broadband (12) SK Telecom (350) SK telecom (1) Samsung (186) Security (25) Self-Driving (3) Sk Telecom (1) Small Cell (6) Spectrum Sharing (2) Sprint (1) Switching (6) T-Mobile (1) TAU (2) Transparent Cache (3) UHD (24) URLLC (1) V2X (2) VR (13) Verizon (8) Video Streaming (43) VoLTE (14) VoWiFi (2) Wi-Fi (72) WiGig (1) Wideband LTE (2) YTL (1) YouTube (9) blockchain (1) eICIC (1) eMBMS (9) ePDG (1) iBeacon (1) mmWave (2) security (1) telecoin (1) uCPE (2) vCPE (1) vRAN (1)