• Title/Summary/Keyword: IP Analysis

Search Result 996, Processing Time 0.033 seconds

Impact Analysis of Intellectual Property Infrastructure

  • Sohn, Soo Jeoung
    • STI Policy Review
    • /
    • v.4 no.2
    • /
    • pp.1-18
    • /
    • 2013
  • As the value and role of intellectual property increases in our knowledge-based economy, countries around the world have exerted various efforts to secure, utilize, and protect their intellectual property. The present study diagnoses the level of IP infrastructure of major OECD countries and analyzes their characteristics and impact. According to the diagnosis, the US, Switzerland, and Germany form a leading group followed by the mid-level countries of Korea, Ireland, Australia, and France, with Spain and Italy in the bottom group. In contrast to Korea's competitiveness in S&T and R&D infrastructures, its competitiveness in IP infrastructure is lower than the OECD average. This is thought to be due to Korea's IP infrastructure being hastily formed under the influence of international pressures rather than having been gradually built up by internal needs. A TFP analysis of the impact of IP infrastructure on economic growth shows IP infrastructure positively influences economic growth. Though this analysis is limited due to inability to secure sufficient data and indicators, it is a useful guide for understanding the nature and key characteristics of IP infrastructure.

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

A Study on IP Encapsulation for Efficient Transmission of IP Datagram over T-DMB (지상파 DMB에서 효과적인 IP 인캡슐레이션 방법)

  • Yang, Seung-Chur;Bae, Byung-Jun;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11B
    • /
    • pp.693-699
    • /
    • 2007
  • In this Paper we present analysis of efficiency for various encapsulation methods to transport IP datagram over terrestrial digital multimedia broadcasting (T-DMB). The multimedia broadcasting system transmitted in one-way needs the data reliability for efficient transmission. And then It is able to select the independent data service using If encapsulation over T-DMB. We examine the compatibility in adopting T-DMB and the overhead of transmission occurring encapsulation. it also needs the full analysis of data framing because the cost of return channel is relatively higher. We do analysis based on theoretical calculation and propose an efficient, reliable and adaptable method in T-DMB.

Design and Implementation of Intelligent IP Switch with Packet FEC for Ensuring Reliability of ATSC 3.0 Broadcast Streams

  • Lee, Song Yeon;Paik, Jong Ho;Dan, Hyun Seok
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.21-27
    • /
    • 2019
  • The terrestrial ATSC 3.0 broadcasting system, which is capable of converging broadcast and communication services, uses IP based technology for data transmission between broadcasting equipment. In addition, data transmission between broadcasting equipment uses IP-based technology like existing wired communication network, which has advantageous in terms of equipment construction and maintenance In case IP based data transmission technology is used, however, it may inevitably cause an error that a packet is lost during transmission depending on the network environments. In order to cope with a broadcasting accident caused by such a transmission error or a malfunction of a broadcasting apparatus, a broadcasting system is generally configured as a duplication, which can transmit a normal packet when various types of error may occur. By this reason, correction method of error packets and intelligent switching technology are essential. Therefore, in this paper, we propose a design and implementation of intelligent IP switch for Ensuring Reliability of ATSC 3.0 Broadcast Streams. The proposed intelligent IP consists of IP Stream Analysis Module, ALP Stream Analysis Module, STL Stream Analysis Module and SMPTE 2022-1 based FEC Encoding/Decoding Module.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

VoIP service performance improvements of MANET based on Diffserv (Diffserv기반 MANET에서 VoIP 서비스 성능 개선)

  • Yoon, Tong-il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.777-779
    • /
    • 2009
  • Study for VoIP in MANET is mainly focused on transmission performance or voice quality of VoIP traffic as single traffic. In this study, VoIP performance is analyzed of MANET which has several types of traffics. Diffserv scheme is used to process the traffics. It is showed that VoIP traffic performance is improved by differv scheme, as a result of analysis for VoIP and FTP traffic. Simulator, which is implemented with NS-2 package and VoIP patch, is used.

  • PDF

Study of the Simulation of VoIP Traffic Generation with Considering Self-Similiarity (자기유사성을 고려한 VoIP 트래픽 생성 시뮬레이션 방법 의 연구)

  • 김윤배;이계신;김재범
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.25-29
    • /
    • 2004
  • VoIP는 인터넷 프로토콜(IP)를 이용하여 음성을 데이터 packet처럼 전송하는 것을 의미한다. 최근 VoIP 기술의 도입으로 기존 망 성능 관리에 대한 관심이 높아지고 있다. 보다 원활한 기술 구현을 위해서는 VoIP 트래픽에 대한 체계적인 분석과 위험성 검증을 할 수 있는 도구가 필요하다. 또한 기존의 트래픽 시뮬레이션 기법에서 실제 망에서의 자기유사성을 적용한 사례가 적다는 것 또한 본 연구가 행하여진 동기이다. 본 연구에서는 자기유사성을 반영하여 소량의 샘플을 갖고 전체 VoIP 망 트래픽을 생성할 수 있는 방법론을 개발하고자 시도하였다.

  • PDF

Industry Activation Scheme through mVoIP Technology Trends and Market Analysis (mVoIP 기술동향 및 시장분석을 통한 산업 활성화 방안)

  • Park, Se-Hwan;Park, Jong-Kyu;Kim, Cheong-Ghil
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.477-482
    • /
    • 2012
  • The mVoIP service is the technology which focuses on the wireless data service as the IP network having the transmission rate of 100 Mbps classes on the high-speed middle of movement through the WiFi, WiBro and 3G mobile radio communication network, and etc. and is developed. Since 2010, the mVoIP (mobile VoIP) service shows the rapid growth due to 4G-LTE service seriously disclosed from July with the Smart phone and 2,011 it begins to be rapidly popularized. In this research, additionally the mVoIP service industry activation plan is presented with the trends of technology development including the chip-set/module/terminal, etc. based upon local and foreign market trend searchlight through the market demand analysis. The mVoIP service downloads App to the mobile apparatus and or can provide the service as the software through the WiFi network. Therefore, the change which is large in the products development aspect is to be have no. Expected to is being provided as the added service in the case of 4G-LTE as a matter of course, the service deployment where it is based on the market principle and demand needs is needed.

Performance Analysis of IP Packet over MPLS Domain (MPLS 영역에서 IP Packet의 성능 분석)

  • 박상준;박우출;이병호
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.29-32
    • /
    • 2000
  • MPLS stands for “Multi-protocol Label Switching”. It's a layer 3 switching technology aimed at greatly improving the packet forwarding performance of the backbone routers in the Internet or other large networks. We compare the performance of unlabeled IP traffic and labeled IP traffic. In this paper, by varying the packet rate and measuring throughput of the flows we analyze the performance of labeled IP packet traffic and unlabeled IP packet traffic in IP over MPLS.

  • PDF

Voice/Data Integration and Performance Analysis using Mobile If on the VoIP Network for the service of CDMA-2000 (CDMA-2000 서비스를 위한 VoIP 기반 망에서 Mobile IP를 이용한 음성/데이타 통합 및 성능평가)

  • Eom, Ki-Bok;Yoe, Hyun;Lee, Yoon-Ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.89-92
    • /
    • 2001
  • In this paper, it is proposed that RSVP and WFQ must be a good way of a better service for the better quality for Mobile If Network. For the Performance Analysis of working it was composed of Mobile IP and VoIP Network model, and further more test of the postpone and QoS was implemented. The results of the test is as follows, Before the movement of mobile agent was 2ms, after that, 3ms, And before QoS was adapted the value was 30ms, after being adapted, analyzed as 10ms. This research that the problem of put off was improved by adaping QoS in the mobile IP Network.

  • PDF