Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
 
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
 
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

   
 
Private 5G Deployment   • Private 5G Frequency Allocation Status in Korea  South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
 
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
 
banner
banner
SEARCH
Let us introduce the NAT behavior discovery algorithms defined in RFC 3489. To fully understand what's discussed below, we recommend you read the following posts first: 1. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 1. Mapping Behavior 2. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 2. Filtering Behavior 3. STUN (RFC 3489) vs. STUN (R...
11/04/2013
45,158
We will look into DHCP Option 82 used in the wireline networks of network operators today. Most of you are probably subscribing to a wireline Internet service provided by one of the network operators such as KT, SK Telecom or LGU+ (Korean Operators). When users subscribe to the Internet service, they pay a monthly fee to their network operator for using the Internet service. So, as a genera...
11/01/2013
54,512
Table of Contents I. Introduction II. Procedures for Detecting IP Address Conflicts III. DHCP Offer/ACK Messages: Broadcast or Unicast ? IV. State Transition of DHCP Clients I. Overview Dynamic Host Configuration Protocol (DHCP) has been widely adopted as a protocol for allocating network configuration data, including an IP address, dynamically to...
10/30/2013
84,596
Table of Contents I. Introduction II. IP Address Allocation/Lease Procedure III. IP Address Renewal Procedure IV. IP Address Release Procedure V. Summary VI. Closing Appendix A - Format of DHCP Messages in IP Address Allocation/Lease Procedure Appendix B - Format of DHCP Messages in IP Address Renewal Procedure Appendix C - Format of DHCP Me...
10/23/2013
377,261
What are the differences between NAT types defined in RFC 3489 and RFC 5780? To understand the differences to be explained below, you must be familiar with the Mapping Behavior and Filtering Behavior of a NAT that we covered last time. What is STUN? STUN is a protocol that allows two devices (P2P devices) to discover the presence and types of a NAT between them, and to find out what Exte...
10/21/2013
49,138
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties This is the last post on RFC 4787. 4. Application Level Gateway For information about Application Level Gateways (ALGs), please click here....
10/10/2013
34,645
Last time when we introduced a DHCP proxy agent through our previous blog post dated in September 1. 2013, we mentioned that this DHCP proxy agent can offer the benefits of enhanced security. So, we will look into these security-related functions in more detail today. As shown in the figure below, if there is a DHCP proxy agent in a network, all DHCP messages (used in IP address allocation...
10/01/2013
46,223
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties Now that we learned a NAT's mapping behaviors last time, below we will study its filtering behaviors as defined in RFC 4787. For information about the terms used below (Internal En...
09/23/2013
34,708
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties Many applications like Skype, online games, etc. are all Peer-to-Peer (P2P) applications based on UDP. When running these applications, two devices communicate with each other without a...
09/12/2013
37,240
Today, NATs are employed by Korean telecom operators in almost all of their access networks except for wired access networks (FTTH, Ethernet, DSL, etc.). 3G/LTE network: Large Scale NAT (LSN) installed beyond GGSN/P-GW in the 3G/LTE core networks. Also called "Carrier Grade NAT (CGN)". Wi-Fi Hotspot network: NAT implemented in Wi-Fi hotspot AP. Residential network: NAT implemented in su...
09/03/2013
34,474
Now that we know what DHCP relay agents are, we will find out another DHCP agent, a DHCP proxy agent today. What a DHCP relay agent does is simply relay broadcast DHCP packets (DHCP Discover/Request) to DHCP server(s) located in other subnets whenever it receives packets from a DHCP client residing in that same subnet. On the other hand, a DHCP proxy agent not only relays the DHCP packets...
09/01/2013
44,119
We talked about the basic operations of DHCP in our previous blog post, "What is DHCP?”. Today, we will find out what kind of agent a DHCP relay agent is. Generally, DHCP messages are broadcasted. So, in order for the messages to be exchanged between a DHCP client (PC) and DHCP server, both the client and server have to reside on the same subnet. That is because routers do not fo...
08/01/2013
85,827
As we need a phone number to make a call to someone, we need an address to communicate with a network host over the Internet. This address is called an "Internet Protocol (IP) address". Generally, IP addresses are dynamically allocated to clients accessing the Internet, through Dynamic Host Configuration Protocol (DHCP), a protocol designed for dynamic allocation of IP addresses, as defined in...
07/01/2013
46,879
4.5G (3) 4G (2) 4G LTE (5) 5G (486) 5G-SIG (2) 6G (4) AI (32) AR (4) ARP (3) ARPU (3) AT&T (2) Akamai (3) Alcatel (1) Authentication (5) Autonomous Driving (9) BMW (2) BSS (1) Backbone (2) Backhaul (6) Big Data (3) Billing (1) Blockchain (4) C-RAN (1) C-RAN/Fronthaul (70) CDN (14) CES (2) CORD (2) CPRI (6) Carrier Aggregation (11) Carrier Ethernet (6) Charging (2) China (3) China Mobile (5) Cisco (4) Cloud (6) Cloud Native (1) CoMP (7) Connected Car (16) Core (1) D-RAN (1) DASAN Networks (5) DHCP (10) Data Center (1) Deutsche Telekom (4) ECM (2) EDGE (4) EMM (16) EPS (2) Edge Computing (1) Ericsson (18) FTTH (16) Femto Gateway (3) Frequency (7) Fronthaul (2) GCSE (1) GSLB (1) GiGA LTE (1) GiGA WiFi (1) GiGAtopia (6) Gigabit Internet (82) Google (11) Google Global Cache (3) HDR (1) HDS (1) HFR (2) HLS (9) HSDPA (2) HTTP Adaptive Streaming (12) Handover (7) Harman (1) HeNB-GW (3) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (101) Immersive Service (1) Initial Attach (2) Intel (1) IoST (5) IoT (205) Jio (2) KDDI (6) KT (254) Korea (88) Korea ICT Market (50) Korea ICT Service (33) Korea ICT Vendor (9) LAA (5) LG U+ (103) LPWA (7) LSC (1) LTE (302) LTE Identification (2) LTE-A (37) LTE-A Pro (1) LTE-B (3) LTE-H (3) LTE-M (5) LTE-R (5) LTE-U (8) LWA (1) LoRa (14) MEC (19) MPLS (5) MPLS-TP (1) MPTCP (7) MSIP (4) MWC (1) MWC 2015 (26) MWC 2016 (4) MWC 2017 (8) MWC 2018 (3) Massive MIMO (1) Media Platform (1) Microsoft (1) Mobility (2) NAT (8) NB-IoT (15) NTT (1) NTT Docomo (1) Netflix (5) Network Architecture (12) Network Protocol (44) Network Slice (1) Network Slicing (6) New Radio (11) Nokia (17) O-RAN (1) OCP (3) OSPF (2) OTT (8) On-Net CDN (3) Openflow (2) Orange (1) PCRF (4) PS-LTE (7) Pay TV (1) Platform (5) Private 5G (86) Private LTE (1) Public Safety (10) QoS (6) Qualcomm (10) RCS (9) Railway (1) Roaming (3) SD-WAN (21) SDF (2) SDN/NFV (143) SIM (1) SK Broadband (12) SK Telecom (347) SK telecom (1) Samsung (181) Security (25) Self-Driving (3) Sk Telecom (1) Small Cell (6) Spectrum Sharing (2) Sprint (1) Switching (6) T-Mobile (1) TAU (2) Transparent Cache (3) UHD (24) URLLC (1) V2X (2) VR (13) Verizon (8) Video Streaming (43) VoLTE (14) VoWiFi (2) Wi-Fi (72) WiGig (1) Wideband LTE (2) YTL (1) YouTube (9) blockchain (1) eICIC (1) eMBMS (9) ePDG (1) iBeacon (1) mmWave (2) security (1) telecoin (1) uCPE (2) vCPE (1) vRAN (1)