• Title/Summary/Keyword: IP convergence network

Search Result 218, Processing Time 0.033 seconds

A Gateway Protocol Architecture for Zigbee Based Wireless Sensor Network Interconnecting TCP/IP Networks

  • Qiu, Peng;Heo, Ung;Choi, Jae-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.3
    • /
    • pp.176-180
    • /
    • 2009
  • This paper investigates protocol architecture for a web-sensor gateway interconnecting internet and wireless sensor network, in which Zigbee sensors are connected over the IEEE802.15.4 communication protocol standard. The web-sensor gateway is to deliver data between TCP/IP and Zigbee/IEEE802.15.4 protocols, transparently. Since the gateway provides a means to remotely control and aggregate sensor data over the internet, it needs to be designed in the view point of users and in their convenience. In accordance, the common gateway interface technology satisfying users on the web browser to efficiently manage and query the sensors in the wireless sensor networks, ubiquitously, is also introduced. Finally, a simulation prototype for the web-sensor gateway is proposed and verified using OPNET simulation tool.

  • PDF

Study of applicable security tunneling technique for military wireless network (군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구)

  • Kim, Yun-young;Namkung, Seung-Pil
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.107-112
    • /
    • 2015
  • Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.

Transmission Performance of VoIP Traffics on Underwater MANET (수중 MANET에서 VoIP 트래픽의 전송 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.12
    • /
    • pp.1187-1192
    • /
    • 2016
  • Performance analysis results are limited to of network level, because network level transmission parameters are used for performance measure and analysis of network design, construction and operation on underwater MANET, With this way of performance analysis based on network level, it is not easy to analyze transmission performance related with user level transmission quality. In this paper, transmission performance focused on application traffic be required by user is investigated to supplement weakness of performance analysis based on network level. Voice traffic, which is expected to be increasingly used on underwater MANET, is considered as application service, Some conditions for underwater MANET will be proposed to support transmission quality, MOS, CCR and EED, etc.. A computer simulation based on NS-2 is used for performance measure, voice traffic is generated as VoIP specification.

A Study of Hacking Attack Analysis for IP-PBX (IP-PBX에 대한 해킹 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.273-276
    • /
    • 2011
  • Voice over Internet Protocol(VoIP) compared to the traditional PSTN communications costs and because of the ease of use has been widespread use of VoIP. Broadband Convergence Network (BCN) as part of building with private Internet service provider since 2010, all government agencies are turning to the telephone network and VoIP. In this paper, we used the Internet on your phone in the IETF SIP-based IP-PBX is a hacking attack analysis studies. VoIP systems are built the same way as a test bed for IP-PBX hacking attacks and vulnerabilities by analyzing the results yielded. Proposes measures to improve security vulnerabilities to secure VoIP.

  • PDF

5G mobile network and ATSC 3.0 broadcasting network interworking trend and plan (5G 이동망과 ATSC 3.0 방송망 연동 동향 및 방안)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.47-52
    • /
    • 2020
  • The introduction of virtualization technology in the broadcasting field is actively progressing broadcasting service automation and intelligence based on the effective operation of IT resources throughout the broadcasting industry ecosystem. In recent years, there is increasing interest in increasing the flexibility of various broadcasting resources and increasing the efficiency of interworking with other networks through network virtualization of the broadcasting network infrastructure. The fundamental transformation from the broadcasting network to the IP paradigm is facing a situation where it is necessary to solve various problems for the effective interworking of Internet-based service platforms and 5G networks and the development of new convergence services. In other words, for organic and effective interworking with the next-generation broadcasting network represented by ATSC 3.0, a mobile communication network represented by 5G, and the Internet, a number of difficulties must be solved. In this paper, the basic technology and status for the convergence of ATSC 3.0 broadcasting network and mobile communication network represented by 5G was examined, and a plan for the ATSC 3.0 broadcasting network and 5G network to interwork with each other as a network was described.

Voice and Video Call Continuity for Enterprise Users (기업형 사용자들을 위한 음성/영상 서비스 이동성 제공 방안)

  • Jung, Chang-Yong;Kim, Hyeon-Soo;Moon, Jeong-Hyeon;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.99-103
    • /
    • 2009
  • Recently, as wired and wireless communication services have rapidly developed and multimodal mobile devices which have various characteristics have widely spread, the need for new convergence services increases. The growing population of VoIP technologies and the high communication expense yield that the market of IP based telephony such as WiFi phone and IP phone is substituted for one of the conventional PSTN telephony. With the help of this trend, the wireline network operators desire to find a market in mobile networks. Therefore, they focus on Fixed Mobile Convergence (FMC) service as one of the key factors to accomplish this goal. FMC services are able to provide the mobility of voice services between circuit switched and packet switched networks. IP Multimedia Subsystem (IMS) based Voice Call Continuity (VCC) is one of the schemes to embody FMC services. As Application Server (AS) which has this VCC function provides seamless handover of services between heterogeneous networks, FMC subscribers can communicate seamlessly with others m WiFi domain and COMA domain using WiFi-COMA dual phone. Most of enterprises have already introduced IP network infrastructure and IP-PBX (Private Branch eXchange) for telephony. However, the problems of high communication cost and work inefficiency due to frequent outside jobs or business trips have remained. In order to solve these problems, demands for enterprise FMC services increase. In this paper, we introduce a new IP-PBX based VCC model that can provide seamless handover of voice services between WiFi and COMA networks for enterprise users and we investigate some interworking and security issues between Soft Switch (SSW) and IMS, or between IMSs. In addition, we introduce a new service that can provide the continuity of voice sessions as well as video sessions using Multimedia Session Continuity (MMSC) technology which has evolved from VCC. This service is expected to be one of the next-generation personalized services based on user's context.

  • PDF

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

Design and Implementation of Intelligent IP Switch with Packet FEC for Ensuring Reliability of ATSC 3.0 Broadcast Streams

  • Lee, Song Yeon;Paik, Jong Ho;Dan, Hyun Seok
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.21-27
    • /
    • 2019
  • The terrestrial ATSC 3.0 broadcasting system, which is capable of converging broadcast and communication services, uses IP based technology for data transmission between broadcasting equipment. In addition, data transmission between broadcasting equipment uses IP-based technology like existing wired communication network, which has advantageous in terms of equipment construction and maintenance In case IP based data transmission technology is used, however, it may inevitably cause an error that a packet is lost during transmission depending on the network environments. In order to cope with a broadcasting accident caused by such a transmission error or a malfunction of a broadcasting apparatus, a broadcasting system is generally configured as a duplication, which can transmit a normal packet when various types of error may occur. By this reason, correction method of error packets and intelligent switching technology are essential. Therefore, in this paper, we propose a design and implementation of intelligent IP switch for Ensuring Reliability of ATSC 3.0 Broadcast Streams. The proposed intelligent IP consists of IP Stream Analysis Module, ALP Stream Analysis Module, STL Stream Analysis Module and SMPTE 2022-1 based FEC Encoding/Decoding Module.

BcN/NGN에서의 세션제어 기술

  • Lee, Yeong-Seok;Kim, Yeong-Han
    • Information and Communications Magazine
    • /
    • v.24 no.3
    • /
    • pp.44-52
    • /
    • 2007
  • BcN (Broadband Convergence Network) / NGN (Next Generation Network)은 통신 방송 인터넷이 융합된 품질 보장형 광대역 서비스를 언제 어디서나 안전하게 즐길 수 있게 하는 차세대통신망이다. 이중 세션제어 기술은 VoIP, 영상전화와 같이 연속적으로 이어지는 세션 형태의 서비스를 제어해주는 기술로서 H.323, Megaco, SIP등을 기본프로토콜로 사용하던 기존의 VoIP망 기술에서 현재는 3GPP ($3^{rd}$ generation partnership project)에서 표준화 된 IMS (IP multimedia subsystem) 를 기반기술로 채택하여 다양한 세션기반 응용서비스를 개발하고 있다. 본 고에서는 BcN/NGN에서의 세션제어 기술인 IMS의 등장 배경과 요소 기술, 동작 절차를 살펴본다.