dia_bluve.gif µî·Ïºñ (ÀÚ·áÁý, Áᫎ Æ÷ÇÔ)
     ÇöÀåµî·Ï : 180,000¿ø
     »çÀüµî·Ï : 150,000¿ø
     Çлýµî·Ï :   50,000¿ø

 dia_bluve.gif »çÀüµî·Ï (11¿ù 21ÀÏ ±Ý¿äÀϱîÁö)
   ¾Æ·¡ÀÇ »çÀü µî·Ï ¾ç½ÄÀ» ÀÌ¿ëÇÏ¿© Âü¼® Èñ¸ÁÀÚÀÇ ¼º¸í, ¼Ò¼Ó, ¿¬¶ôó¸¦ ¾Ë·ÁÁֽðí, 11¿ù 21ÀÏ(±Ý)±îÁö ÁöÁ¤ ÀºÇà°èÁ·ΠÀÔ±ÝÇÏ¿© Áֽñ⠹ٶø´Ï´Ù.

      - ÀüÈ­ : 031-201-2987 / ÆÑ½º : 031-204-9082
         (´ã´çÀÚ: ¹ÚÇÊ¿ë Çлý, È«Ãæ¼± ±³¼ö)
      - E-mail : pypark@networking.khu.ac.kr
      - °èÁ : ¿ì¸®ÀºÇà 133-118981-13-120
                   (¿¹±ÝÁÖ¸í: (»ç)Çѱ¹Åë½ÅÇÐȸ)

 dia_bluve.gif µî·Ï½Åû¼­ ´Ù¿î·Îµå
   http://www.knom.or.kr/tutorial/Tutorial2003

 dia_bluve.gif Çà»ç¹®ÀÇ
     °æÈñ´ëÇб³ È«Ãæ¼± ±³¼ö
      (031-201-2532 / cshong@khu.ac.kr)

 dia_bluve.gif »çÀü µî·Ï ¾ç½Ä

µî·Ï ½Åû¼­ (KNOM Tutorial 2003)

 ¼º   ¸í

 

 ±¸ ºÐ

ÀϹÝ( ) Çлý( )

 ¼Ò   ¼Ó

 

 ÀÔ±ÝÀÚ

 

ÀԱݾ×

               ¿ø

 Àü   È­

 

FAX

 

 E-mail

 

 ºñ   °í

 

 

  

  

 dia_bluve.gif ÁöÇÏö : 2È£¼±-¼±¸ª¿ª ÇÏÂ÷
                (5¹øÃⱸ-¸£³×»ó½º È£ÅÚ ¹æÇâ 300m)

 dia_bluve.gif Çѱ¹±â¼ú¼¾ÅÍ ¹®ÀÇÀüÈ­ : 02-6009-3000


 

 

  circle03_blue.gif KNOM À§¿øÀå : È«¿ø±â ±³¼ö(Æ÷Ç×°ø´ë)
  
circle03_blue.gif ¿î¿µÀ§¿øÀå : È«Ãæ¼± ±³¼ö(°æÈñ´ë)
  
circle03_blue.gif È«º¸ : Á¤ÀçÀÏ ±³¼ö(ÇѾç´ë)
              À̱¤ÈÖ ±³¼ö(â¿ø´ë)
              ±è¿µÀÏ ºÎÀå(KT
)
  
circle03_blue.gif ÇöÁöÁøÇà : ÀÌÀç¿À ±³¼ö(Çѱ¹±â¼ú±³´ë)
                    ±èÀ±Èñ ±³¼ö(¼÷¸í¿©´ë)
  
circle03_blue.gif ÃâÆÇ : ±è¿µ¸í ºÎÀå(KT)

 

 

 

 

2003³â Åë½Å¸Á ¿î¿ë°ü¸®

´Ü±â°­ÁÂ

 

 

 

ÀϽÃ:2003³â 11¿ù 28ÀÏ(±Ý) 10:00 - 18:00

Àå¼Ò:Çѱ¹±â¼ú¼¾ÅÍ (KOTECH)

       16Ãþ ´ëȸÀǽÇ

ÁÖÃÖ:Çѱ¹Åë½ÅÇÐȸ Åë½Å¸Á¿î¿ë°ü¸®¿¬±¸È¸

 

http://www.knom.or.kr

 


 


 

¾È³çÇϽʴϱî?

Çѱ¹Åë½ÅÇÐȸ Åë½Å¸Á¿î¿ë°ü¸® ¿¬±¸È¸(KNOM)´Â ±Þ°ÝÈ÷ ¹ßÀüÇϰí ÀÖ´Â Åë½Å¸Á ¿î¿ë°ü¸® ºÐ¾ßÀÇ ÃֽŠ÷´Ü ±â¼ú °³¹ß ÇöȲ ¹× ±¹Á¦ ¿¬±¸È°µ¿À» ¼Ò°³Çϱâ À§ÇØ ¸Å³â ´Ü±â °­ÁÂ(KNOM Tutorial)¸¦ °³ÃÖÇϰí ÀÖ½À´Ï´Ù.

¿ÃÇØ¿¡´Â ÃÖ±Ù ´Ù¾çÇÏ°Ô ¿¬±¸È°µ¿ ¹× ±â¼ú °³¹ßÀÌ ÀÌ·ç¾îÁö°í ÀÖ´Â ¼±Áø¿Ü±¹ Åë½Å¸Á »ç¾÷ÀÚÀÇ ÀÎÅÍ³Ý ±â¹Ý¸ÁÀ» À§ÇÑ ¸Á°ü¸® ½Ã½ºÅÛ °³¹ß ¹× ¿î¿ëÇöȲÀ» ¼Ò°³Çϰí IP VPN °ü¸®, NGN °ü¸® µî°ú °°ÀÌ ±â°£¸Á¿¡¼­ ÀÎÅͳݼ­ºñ½º¸¦ Á¦°øÇϱâ À§ÇØ ÇÊ¿äÇÑ ÇÙ½É ¸Á°ü¸® ±â¼ú¿¡ ´ëÇÑ °­Á¸¦ ÁغñÇÏ¿´½À´Ï´Ù. ¶ÇÇÑ, ÃÖ±Ù °ü½ÉÀÌ °íÁ¶µÇ°í ÀÖ´Â ÀÎÅÍ³Ý º¸¾È°ü¸®¿¡ ´ëÇÑ À̽´ÀÎ ÇØÅ· ¹× ¹ÙÀÌ·¯½º °ø°Ý°ú °°Àº ³×Æ®¿öÅ© ¼­ºñ½º¿¡ ¸·´ëÇÑ ÇÇÇØ¸¦ ÁÙ ¼ö ÀÖ´Â ÁÖÁ¦¿¡ °üÇØ¼­µµ ÃÖ°íÀÇ Àü¹®°¡¸¦ ÃʺùÇÏ¿© °­Á¸¦ ÁغñÇÏ¿´½À´Ï´Ù.

Åë½Å¸Á ¿î¿ë°ü¸®¿Í °ü·ÃÇÑ »ý»ê ¾÷ü, ¿¬±¸¼Ò, Çаè, Åë½Å¸Á ¹× Åë½Å¼­ºñ½º »ç¾÷ÀÚ, Åë½Å±â±â Á¦Á¶¾÷ü¿¡ °è½Å ºÐµé¿¡°Ô ½ÇÁúÀûÀÎ ±â¼úÀ» ½ÀµæÇϰí Åä·ÐÇÒ ¼ö ÀÖ´Â ÁÁÀº ±âȸ°¡ µÉ °ÍÀÔ´Ï´Ù. ¶ÇÇÑ ±¹³» Åë½Å¸Á ¿î¿ë °ü¸® Àü¹®°¡µé°£ÀÇ ÁÁÀº ¸¸³²ÀÇ ÀåÀÌ µÉ °ÍÀÔ´Ï´Ù.

¿©·¯ºÐÀÇ ¸¹Àº Âü¿©¿Í ¼º¿øÀ» ºÎŹ µå¸³´Ï´Ù.


 

2003. 11

Åë½Å¸Á¿î¿ë°ü¸®¿¬±¸È¸ À§¿øÀå È«¿ø±â

KNOM Tutorial 2003 ¿î¿µÀ§¿øÀå È«Ãæ¼±

 

2003³â 11¿ù 28ÀÏ (±Ý¿äÀÏ) 
Çѱ¹±â¼ú¼¾ÅÍ 16Ãþ ´ëȸÀǽÇ

½Ã  °£

ÁÖ ¿ä Çà »ç

´ã  ´ç

09:00~10:00

µî·Ï ¹× ¾È³»

È«Ãæ¼±

10:00~12:00

Internet Traffic Monitoring and Analysis

¹®¼öº¹
(KAIST)

12:00~13:20

Áß  ½Ä

13:20~14:20

IP VPN Management

¹Ú¿ë¼®
(»ï¼ºÀüÀÚ)

15:00~16:20

NGN Management

¼®½ÂÇÐ
(KT)

16:40~18:00

ISP Security Management and Operation

¼ºÀç¸ð
(KISA)

T1 : Internet Traffic Monitoring and Analysis

Traffic measurement and analysis in the Internet is a serious challenge to network operators and end users for its diversity in applications and services, amount of traffic to monitor, and often the lack of proper tools. In this talk we review recent developments and ongoing efforts in traffic analysis. As the backbone link speeds increase, the sheer volume of traffic to monitor and collected data poses much overhead in network operation. Even a simple question, such as how much traffic flowed from point A to point B, turns into a daunting task to network operators and router designers. Sampling is used as one method to decrease the amount of collected data. We look at various sampling techniques used in flow and delay measurements and conclude with a discussion for future work.

 

T2 : IP VPN Management

MPLS based VPN is one of the fastest growing services in telecommunications these days, replacing frame relay, ATM, and private line services. Although some equipment vendors claim that the MPLS based VPN is easy to provision and manage, it is still a new and complex technology to service providers anyway. It involves multiple routing tables, route redistribution, inter-working with other services, partitioning of network statistics, and so on. In this tutorial, we will first review the currently available MPLS based VPN technologies with possible deployment scenarios. And then, we will investigate what kind of management tools and options are available for the VPNs, and consider how to use them to manage the VPN networks efficiently.
 

T3 : NGN Management

Â÷¼¼´ë ³×Æ®¿öÅ©´Â ¼­ºñ½ºÀÇ À¶ÇÕ, ¸Á°ü¸®½Ã½ºÅÛÀÇ ÅëÇÕÀ» ÅëÇØ Áö´ÉÈ­µÈ ¸ÖƼ¹Ìµð¾î¸¦ Á¦°øÇÑ´Ù. º» °­Á¿¡¼­´Â ¸ÖƼ¹Ìµð¾î ¼­ºñ½º¸¦ °ü¸®Çϱâ À§ÇØ ¼­´Â ¸Å¿ì Áß¿äÇÑ Á¤Ã¥±â¹ÝÀÇ QoS Á¦¾î ±â´ÉÀ» »ìÆìº¸°í, ¸Á°ü¸®½Ã½ºÅÛ ÅëÇÕ¿¡ µû¸¥ °ü·Ã ±â¼úµéÀ» »ìÆìº»´Ù.
 

T4 : ISP Security Management and Operation

ÃÖ±Ù ÇØÅ· ¹× ¹ÙÀÌ·¯½º¿¡ ÀÇÇÑ Ä§ÇØ»ç°í´Â ½Ã½ºÅÛº¸´Ù´Â ³×Æ®¿öÅ© Àüü¸¦ °ø°ÝÇÏ¿© ÀÎÅÍ³Ý ¼­ºñ½º¸¦ ¸¶ºñ½ÃŰ´Â Ư¡ÀÌ ÀÖ´Ù. ÀÌ·¯ÇÑ ÀÎÅÍ³Ý Ä§ÇØ»ç°í´Â ÀÎÅͳÝÀ» Á¦°øÇÏ´Â »ç¾÷ÀÚÀÇ ³×Æ®¿öÅ©¿¡ °ú´Ù Æ®·¡ÇÈÀ» À¯¹ßÇÏ¿© ³×Æ®¿öÅ©°¡ ´À·ÁÁö°Ô ÇÏ´øÁö ¶ó¿ìÅÍ, ½ºÀ§Ä¡ µîÀÇ ³×Æ®¿öÅ© Àåºñ¿¡ °úºÎÇϸ¦ ¹ß»ý½ÃÄÑ Àåºñ¸¦ ´Ù¿î½ÃŰ´Â µî ¿øÈ°ÇÑ ÀÎÅÍ³Ý »ç¿ëÀ» ¹æÇØÇÑ´Ù. ÀÌ·¯ÇÑ ½ÃÁ¡¿¡ ÀÎÅÍ³Ý ¼­ºñ½ºÁ¦°øÀÚ°¡ ¾ÈÀüÇÑ ÀÎÅÍ³Ý »ç¿ëÀ» Áö¼Ó½Ã۱â À§ÇÏ¿© °í·ÁÇÏ¿©¾ß ÇÒ ³×Æ®¿öÅ© º¸¾È °ü¸® ¹× ¿î¿µ¿¡ ´ëÇÏ¿© ¼Ò°³ÇÑ´Ù. ¶ÇÇÑ º¸¾È¼ºÀ» °­È­ÇÑ ½Å±Ô º¸¾È ³×Æ®¿öÅ©¿¡ ´ëÇÑ ¼Ò°³¿Í ÇâÈÄ ¹ßÀü ¹æÇâ¿¡ ´ëÇØ¼­µµ ¼³¸íÇÑ´Ù.