Home | Reports | Technical Documents | Tech-Blog | One-Shot Gallery | Korea ICT News | Korea Communication Market Data | List of Contributors | Become a Contributor |    
 
 
Section 5G 4G LTE C-RAN/Fronthaul Gigabit Internet IPTV/Video Streaming IoT SDN/NFV Wi-Fi KT SK Telecom LG U+ Network Protocol Samsung   Korean Vendors
 
Real World Private 5G Cases   4 Deployment Models On-Premise Cases 5G Core Control Plane Sharing Cases

5G Core Sharing Cases

   
 
Private 5G Deployment   • Private 5G Frequency Allocation Status in Korea  South Korean government's regulations on private 5G and KT's strategy for entering the market
Cases in Korea   Private 5G Operators |   SK Networks Service (SI) Sejong Telecom (Wire-line Carrier) KT MOS (Affiliate of KT) • Newgens (SI) • NAVER Cloud more >>  
    Enterprise DIY |   Korea Hydro & Nuclear Power (Power Plant) Korea Electric Power Corporation (Energy) • Republic of Korea Navy more >>
 
CHANNELS     HFR Private 5G Solution (my5G)       my5G Solution Components       my5G Key Features        my5G Resources        my5G News          
 
banner
banner
SEARCH
Our previous document described the NAT behavior discovery algorithms defined in RFC 3489. This document will explain what algorithms for discovering NAT behaviors are defined in RFC 5780. Again, to fully understand what's discussed below, we recommend you read the following posts first: 1. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 1. Mapping Behavior 2....
11/18/2013
37,261
Table of Contents I. Overview II. Introduction to DHCP Proxy Agents III. Basic Operations of DHCP Proxy Agents IV. Security Functios of DHCP Proxy Agents V. Summary and Closing Appendix A - Format of DHCP Messages in IP Address Allocation/Lease Procedure Appendix B - Format of DHCP Messages in IP Address Renewal Procedure Appendix C - Format of DHC...
11/07/2013
57,486
Table of Contents I. Overview II. Why are DHCP Relay Agents Needed in DHCP Operations ? III. Basic Operation of DHCP Relay Agents Appendix - Format of DHCP Messages in a Network with DHCP Relay Agents I. Overview This document provides a technical understanding of a DHCP relay agent that is required in a multi-subnet environment where a DHCP client...
11/05/2013
190,472
Let us introduce the NAT behavior discovery algorithms defined in RFC 3489. To fully understand what's discussed below, we recommend you read the following posts first: 1. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 1. Mapping Behavior 2. NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) - Part 2. Filtering Behavior 3. STUN (RFC 3489) vs. STUN (R...
11/04/2013
41,600
Table of Contents I. Introduction II. Procedures for Detecting IP Address Conflicts III. DHCP Offer/ACK Messages: Broadcast or Unicast ? IV. State Transition of DHCP Clients I. Overview Dynamic Host Configuration Protocol (DHCP) has been widely adopted as a protocol for allocating network configuration data, including an IP address, dynamically to...
10/30/2013
79,889
Table of Contents I. Introduction II. IP Address Allocation/Lease Procedure III. IP Address Renewal Procedure IV. IP Address Release Procedure V. Summary VI. Closing Appendix A - Format of DHCP Messages in IP Address Allocation/Lease Procedure Appendix B - Format of DHCP Messages in IP Address Renewal Procedure Appendix C - Format of DHCP Me...
10/23/2013
340,265
What are the differences between NAT types defined in RFC 3489 and RFC 5780? To understand the differences to be explained below, you must be familiar with the Mapping Behavior and Filtering Behavior of a NAT that we covered last time. What is STUN? STUN is a protocol that allows two devices (P2P devices) to discover the presence and types of a NAT between them, and to find out what Exte...
10/21/2013
44,825
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties This is the last post on RFC 4787. 4. Application Level Gateway For information about Application Level Gateways (ALGs), please click here....
10/10/2013
31,552
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties Now that we learned a NAT's mapping behaviors last time, below we will study its filtering behaviors as defined in RFC 4787. For information about the terms used below (Internal En...
09/23/2013
32,644
NAT Behavioral Requirements, as Defined by the IETF (RFC 4787) Part 1. Mapping Behavior Part 2. Filtering Behavior Part 3. Deterministic Properties Many applications like Skype, online games, etc. are all Peer-to-Peer (P2P) applications based on UDP. When running these applications, two devices communicate with each other without a...
09/12/2013
34,405
Today, NATs are employed by Korean telecom operators in almost all of their access networks except for wired access networks (FTTH, Ethernet, DSL, etc.). 3G/LTE network: Large Scale NAT (LSN) installed beyond GGSN/P-GW in the 3G/LTE core networks. Also called "Carrier Grade NAT (CGN)". Wi-Fi Hotspot network: NAT implemented in Wi-Fi hotspot AP. Residential network: NAT implemented in su...
09/03/2013
32,188
4.5G (3) 4G (2) 4G LTE (4) 5G (479) 5G-SIG (2) 6G (4) AI (31) AR (4) ARP (3) ARPU (3) AT&T (2) Akamai (3) Alcatel (1) Authentication (5) Autonomous Driving (9) BMW (2) BSS (1) Backbone (2) Backhaul (6) Big Data (3) Billing (1) Blockchain (4) C-RAN (1) C-RAN/Fronthaul (70) CDN (14) CES (2) CORD (2) CPRI (6) Carrier Aggregation (11) Carrier Ethernet (6) Charging (2) China (3) China Mobile (5) Cisco (4) Cloud (6) Cloud Native (1) CoMP (7) Connected Car (16) Core (1) D-RAN (1) DASAN Networks (5) DHCP (10) Data Center (1) Deutsche Telekom (4) ECM (2) EDGE (4) EMM (16) EPS (2) Edge Computing (1) Ericsson (18) FTTH (16) Femto Gateway (3) Frequency (7) Fronthaul (2) GCSE (1) GSLB (1) GiGA LTE (1) GiGA WiFi (1) GiGAtopia (6) Gigabit Internet (82) Google (11) Google Global Cache (3) HDR (1) HDS (1) HFR (2) HLS (9) HSDPA (2) HTTP Adaptive Streaming (12) Handover (7) Harman (1) HeNB-GW (3) Huawei (1) IEEE 802.1 (1) IP Routing (7) IPTV (101) Immersive Service (1) Initial Attach (2) Intel (1) IoST (5) IoT (205) Jio (2) KDDI (6) KT (253) Korea (88) Korea ICT Market (50) Korea ICT Service (33) Korea ICT Vendor (9) LAA (5) LG U+ (103) LPWA (7) LSC (1) LTE (302) LTE Identification (2) LTE-A (37) LTE-A Pro (1) LTE-B (3) LTE-H (3) LTE-M (5) LTE-R (5) LTE-U (8) LWA (1) LoRa (14) MEC (19) MPLS (5) MPLS-TP (1) MPTCP (7) MSIP (4) MWC (1) MWC 2015 (26) MWC 2016 (4) MWC 2017 (8) MWC 2018 (3) Massive MIMO (1) Media Platform (1) Microsoft (1) Mobility (2) NAT (8) NB-IoT (15) NTT (1) NTT Docomo (1) Netflix (5) Network Architecture (12) Network Protocol (44) Network Slice (1) Network Slicing (6) New Radio (11) Nokia (17) O-RAN (1) OCP (3) OSPF (2) OTT (8) On-Net CDN (3) Openflow (2) Orange (1) PCRF (4) PS-LTE (7) Pay TV (1) Platform (5) Private 5G (81) Private LTE (1) Public Safety (10) QoS (6) Qualcomm (10) RCS (9) Roaming (3) SD-WAN (21) SDF (2) SDN/NFV (142) SIM (1) SK Broadband (12) SK Telecom (347) SK telecom (1) Samsung (178) Security (25) Self-Driving (3) Sk Telecom (1) Small Cell (6) Spectrum Sharing (2) Sprint (1) Switching (6) T-Mobile (1) TAU (2) Transparent Cache (3) UHD (24) URLLC (1) V2X (2) VR (13) Verizon (8) Video Streaming (43) VoLTE (14) VoWiFi (2) Wi-Fi (72) WiGig (1) Wideband LTE (2) YTL (1) YouTube (9) blockchain (1) eICIC (1) eMBMS (9) ePDG (1) iBeacon (1) mmWave (2) security (1) telecoin (1) uCPE (2) vCPE (1) vRAN (1)