Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
 
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
 
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

   
 
Private 5G Deployment   • Private 5G Frequency Allocation Status in Korea  South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
 
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
 
banner
banner
SEARCH
Our previous document described the NAT behavior discovery algorithms defined in RFC 3489. This document will explain what algorithms for discovering NAT behaviors are defined in RFC 5780. Again, to fully understand what's discussed below, we recommend you read the following posts first: 1. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 1. Mapping Behavior 2....
11/18/2013
36,915
Let us introduce the NAT behavior discovery algorithms defined in RFC 3489. To fully understand what's discussed below, we recommend you read the following posts first: 1. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 1. Mapping Behavior 2. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 2. Filtering Behavior 3. STUN (RFC 3489) vs. STUN (R...
11/04/2013
40,965
What are the differences between NAT types defined in RFC 3489 and RFC 5780? To understand the differences to be explained below, you must be familiar with the Mapping Behavior and Filtering Behavior of a NAT that we covered last time. What is STUN? STUN is a protocol that allows two devices (P2P devices) to discover the presence and types of a NAT between them, and to find out what Exte...
10/21/2013
44,160
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties This is the last post on RFC 4787. 4. Application Level Gateway For information about Application Level Gateways (ALGs), please click here....
10/10/2013
31,026
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties Now that we learned a NAT's mapping behaviors last time, below we will study its filtering behaviors as defined in RFC 4787. For information about the terms used below (Internal En...
09/23/2013
32,276
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties Many applications like Skype, online games, etc. are all Peer-to-Peer (P2P) applications based on UDP. When running these applications, two devices communicate with each other without a...
09/12/2013
33,832
Today, NATs are employed by Korean telecom operators in almost all of their access networks except for wired access networks (FTTH, Ethernet, DSL, etc.). 3G/LTE network: Large Scale NAT (LSN) installed beyond GGSN/P-GW in the 3G/LTE core networks. Also called "Carrier Grade NAT (CGN)". Wi-Fi Hotspot network: NAT implemented in Wi-Fi hotspot AP. Residential network: NAT implemented in su...
09/03/2013
31,858
4.5G (3) 4G (2) 4G LTE (4) 5G (475) 5G-SIG (2) 6G (3) AI (31) AR (4) ARP (3) ARPU (3) AT&T (2) Akamai (3) Alcatel (1) Authentication (5) Autonomous Driving (9) BMW (2) BSS (1) Backbone (2) Backhaul (6) Big Data (3) Billing (1) Blockchain (4) C-RAN (1) C-RAN/Fronthaul (68) CDN (14) CES (2) CORD (2) CPRI (6) Carrier Aggregation (11) Carrier Ethernet (6) Charging (2) China (3) China Mobile (5) Cisco (4) Cloud (6) Cloud Native (1) CoMP (7) Connected Car (16) Core (1) D-RAN (1) DASAN Networks (5) DHCP (10) Data Center (1) Deutsche Telekom (4) ECM (2) EDGE (4) EMM (16) EPS (2) Edge Computing (1) Ericsson (18) FTTH (16) Femto Gateway (3) Frequency (7) Fronthaul (2) GCSE (1) GSLB (1) GiGA LTE (1) GiGA WiFi (1) GiGAtopia (6) Gigabit Internet (82) Google (11) Google Global Cache (3) HDR (1) HDS (1) HFR (2) HLS (9) HSDPA (2) HTTP Adaptive Streaming (12) Handover (7) Harman (1) HeNB-GW (3) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (101) Immersive Service (1) Initial Attach (2) Intel (1) IoST (5) IoT (205) Jio (2) KDDI (6) KT (253) Korea (88) Korea ICT Market (50) Korea ICT Service (33) Korea ICT Vendor (9) LAA (5) LG U+ (103) LPWA (7) LSC (1) LTE (302) LTE Identification (2) LTE-A (37) LTE-A Pro (1) LTE-B (3) LTE-H (3) LTE-M (5) LTE-R (5) LTE-U (8) LWA (1) LoRa (14) MEC (19) MPLS (5) MPLS-TP (1) MPTCP (7) MSIP (4) MWC (1) MWC 2015 (26) MWC 2016 (4) MWC 2017 (8) MWC 2018 (3) Massive MIMO (1) Media Platform (1) Microsoft (1) Mobility (2) NAT (8) NB-IoT (15) NTT (1) NTT Docomo (1) Netflix (5) Network Architecture (12) Network Protocol (44) Network Slice (1) Network Slicing (6) New Radio (11) Nokia (17) O-RAN (1) OCP (3) OSPF (2) OTT (8) On-Net CDN (3) Openflow (2) Orange (1) PCRF (4) PS-LTE (7) Pay TV (1) Platform (5) Private 5G (80) Private LTE (1) Public Safety (10) QoS (6) Qualcomm (10) RCS (9) Roaming (3) SD-WAN (21) SDF (2) SDN/NFV (142) SIM (1) SK Broadband (12) SK Telecom (347) SK telecom (1) Samsung (178) Security (25) Self-Driving (3) Sk Telecom (1) Small Cell (6) Spectrum Sharing (2) Sprint (1) Switching (6) T-Mobile (1) TAU (2) Transparent Cache (3) UHD (24) URLLC (1) V2X (2) VR (13) Verizon (8) Video Streaming (43) VoLTE (14) VoWiFi (2) Wi-Fi (72) WiGig (1) Wideband LTE (2) YTL (1) YouTube (9) blockchain (1) eICIC (1) eMBMS (9) ePDG (1) iBeacon (1) mmWave (2) security (1) telecoin (1) uCPE (2) vCPE (1) vRAN (1)