Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IF-RFC5338 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-11-20 ÃÑÆäÀÌÁö 24
ÇѱÛÇ¥Áظí È£½ºÆ® ½Äº° ÇÁ·ÎÅäÄÝ°ú ±âÁ¸ ÀÀ¿ë°úÀÇ ¿¬µ¿
¿µ¹®Ç¥Áظí Using the Host Identity Protocol with Legacy Applications
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ±âÁ¸ÀÇ ÀÀ¿ëµéÀÌ È£½ºÆ® ½Äº° ÇÁ·ÎÅäÄÝ (HIP: Host Identity Protocol))°ú ¾î¶»°Ô µ¿ÀÛÇÒ ¼ö ÀÖ´Â °¡¸¦ ±â¼úÇϴ ǥÁØÀÌ´Ù. È£½ºÆ® ½Äº° ÇÁ·ÎÅäÄÝÀº ³×Æ®¿öÅ© ¿£ÅÍƼ¸¦ À§ÇÑ ¾ÏȣȭµÈ ÁÖ¼Ò °ø°£À» Á¦°øÇÑ´Ù. ÀÀ¿ëÀÇ °üÁ¡¿¡¼­ HIP ÇÁ·ÎÅäÄÝÀÌ Å¾ÀçµÈ ½Ã½ºÅÛÀº »õ·Î¿î ÁÖ¼Òü°è¸¦ Áö¿øÇØ¾ß ÇÏÁö¸¸, HIP ±â¹Ý ÀÀ¿ëÀÌ µµÀ﵃ ¶§±îÁö´Â »ó´çÇÑ ½ÃÀÏÀÌ ¼Ò¿äµÉ °ÍÀ¸·Î ¿¹»óµÈ´Ù. º» Ç¥ÁØÀº HIP ÇÁ·ÎÅäÄÝÀÌ Å¾ÀçµÈ ½Ã½ºÅÛ¿¡¼­ HIPÀ» Áö¿øÇÏÁö ¾Ê´Â ÀÀ¿ë°ú ¿¬µ¿Çϱâ À§ÇÑ API ¹× ±¸Çö À̽´¸¦ ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines overview of how legacy applications can be made to work with the Host Identity Protocol (HIP). HIP proposes to add a cryptographic name space for network stack names, but it is expected to take a long time to deploy the HIP protocol to the network. So, it is necessary to define the interaction between HIP-enabled systems and the applications that are not aware.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE_IF-RFC5338.zip TTAE_IF-RFC5338.zip            

ÀÌÀü
Åë½Å¸Á¿î¿ë°ü¸®¸¦ À§ÇÑ ¼º´É ºñÁî´Ï½º ¿£Æ¼Æ¼ Á¤º¸¸ðµ¨
´ÙÀ½
CSMA/CD Á¢±Ù¹ý ¹× ¹°¸®°èÃþ,°³Á¤:¸Åü ÀÇÁ¸ Á¢¼ÓÀåÄ¡ »ó¿¡¼­ µ¥ÀÌÅÍ ´Ü¸» ÀåÄ¡ Àü¿ø±â¼ú