• Title/Summary/Keyword: IP2

Search Result 2,048, Processing Time 0.03 seconds

IP Modeling and Inversion Using Complex Resistivity (복소 전기비저항을 이용한 IP 탐사 모델링 및 역산)

  • Son, Jeong-Sul;Kim, Junhg-Ho;Yi, Myeong-Jong
    • Geophysics and Geophysical Exploration
    • /
    • v.10 no.2
    • /
    • pp.138-146
    • /
    • 2007
  • This paper describes 2.5D induced polarization (IP) modeling and inversion algorithms using complex resistivity. The complex resistivity method has merits for acquiring more valuable information about hydraulic parameters and pore fluid than the conventional IP methods. The IP modeling and inversion algorithms are developed by allowing complex arithmetic in existing DC modeling and inversion algorithms. The IP modeling and inversion algorithms use a 2.5D DC finite-element algorithm and a damped least-squares method with smoothness constraints, respectively. The accuracy of the IP modeling algorithm is verified by comparing its responses of two synthetic models with two different approaches: linear filtering for a three-layer model and an integral equation method for a 3D model. Results from these methods are well matched to each other. The inversion algorithm is validated by a synthetic example which has two anomalous bodies, one is more conductive but non-polarizable than the background, and the other is polarizable but has the same resistivity as the background. From the inverted section, we can cleary identify each anomalous body with different locations. Furthermore, in order to verify its efficiency to the real filed example, we apply the inversion algorithm to another three-layer model which includes phase anomaly in the second layer.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study of VoIP Encryption and Authentication Technologies in 4G WiBro Services (4G WiBro서비스에서 VoIP 암호화와 인증기술 연구)

  • Baek, Jong-Il;Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.291-294
    • /
    • 2011
  • 4G WiBro service in Korea, the world's fourth-generation communication is standardized. VoIP service has been activated one of the application in WiBro communications infrastructure. When using VoIP in the WiBro service, complementing the existing VoIP vulnerabilities in the encryption and authentication technology is a need for research. In this paper, fourth-generation WiBro, LTE, and the definition, 1G, 2G, 3G and 4G compares. And, WiBro service in the VoIP edaehan technical, administrative, physical, and hacker attacks and vulnerability analysis is the study of security measures. Enhanced security measures for the WiBro service to VoIP security through encryption and authentication technologies are studied.

  • PDF

A Network Module and a Web Server for Web-based Remote Control of Embedded Systems (웹 기반 원격 제어를 위한 내장형 시스템용 네트워크 모듈 및 웹 서버)

  • 선동국;김성조;이재호;김선자
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.3
    • /
    • pp.231-242
    • /
    • 2004
  • Remote control and monitoring of information appliances require RTOS and TCP/IP network module to communicate each other. Traditional TCP/IP protocol stacks, however, require relatively large resources to be useful in small 8 or 16-bit systems both in terms of code size and memory usage. It motivates design and implementation of micro TCP/IP that is lightweight for embedded systems. Micro embedded web server is also required to control and monitor information appliances through the Web. In this paper, we design and implement micro TCP/IP and Web server for information appliances. For this goal, we investigate requirements for the interoperability of embedded systems with the Internet and the Web-based control of embedded systems. Next, we compare our micro TCP/IP protocol stack with that of RTIP and QPlus in terms of object code size and performance. The size of micro TCP/IP protocol stack can be reduced by 3/2 and 1/4, respectively, comparing with that of RTIP and QPlus. We also show that the performance of our micro TCP/IP is similar to that of RTIP and QPlus since it handles 2.9Mbps when delayed ACK is not adapted.

End-to-End Performance of Packet Aggregation Transmission over MANETs under Blackhole Attacks (블랙홀 공격이 있는 MANET에서 패킷취합전송의 종단간 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.1
    • /
    • pp.71-76
    • /
    • 2013
  • In this paper, end-to-end performances for some VoIP traffics are measured and analyzed over MANET(Mobile Ad-hoc Networks) with packet aggregation transmission under blackhole attacks. A VoIP simulator based on NS-2 is used for performance measure. In the simulation, MOS, call connection ratio, network delay and packet loss rate are measured for end-to-end transmission performance. With analysis of measured data, characteristics of each traffics for performance parameters of packet aggregation transmission is showed on MANET under blackhole attack, As a results of this paper, some considerations be required for packet aggregation transmission are suggested to implement VoIP services on MANET under blackhole attacks.

Design and Implementation of IP-TV Set-Top Box for IP-TV Service (IP-TV서비스를 위한 IP-TV Set-Top Box설계와 구현)

  • Park, Hyung-Do;Lee, Kyoung-Won;Ahn, Chang-Won;Kim, Dae-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.171-174
    • /
    • 2006
  • 본 논문에서는 IP-TV 보금을 위해서 고성능 저가의 IP-TV(Internet Protocol TV) 셋탑박스의 필요성을 감안하여 TV를 통한 인터넷 컨텐츠 이용에 최적화된 IP-TV 셋탑박스를 제조업체(Ninelanes)와 공동으로 개발하였다. 개발된 셋탑박스는 브로드밴드를 이용한 VOD서비스, 1Mbps급의 DVD급 화질을 지원하고 스트리밍 비디오와 저장된 콘텐츠를 직접 재생할 수 있다. 개발된 셋탑박스는 VHS(450kbps), DVD급(750kbps), DVD(1.2Mbps), MP3, AC3, MPEG-2/4, VP4/5/6, WMV9, DVIX 등의 다양한 디지털 미디어 재생 포맷을 지원 할 수 있도록 개발되어 가격경쟁력 향상 및 멀티미디어 지원환경 구축, 인코더방식의 코덱 전환이 가능하다. 또한 고집적, 저전력, 고성능, 저가형 개발 개념으로 개발된 이 셋탑박스는 각종 IP-TV기능을 펌웨어나 소프트웨어 수정으로 시스템 변경이 가능하여 IP-TV 셋탑박스 보급에 크게 기여할 것으로 기대된다.

  • PDF

Design and Implementation of Intelligent IP Switch with Packet FEC for Ensuring Reliability of ATSC 3.0 Broadcast Streams

  • Lee, Song Yeon;Paik, Jong Ho;Dan, Hyun Seok
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.21-27
    • /
    • 2019
  • The terrestrial ATSC 3.0 broadcasting system, which is capable of converging broadcast and communication services, uses IP based technology for data transmission between broadcasting equipment. In addition, data transmission between broadcasting equipment uses IP-based technology like existing wired communication network, which has advantageous in terms of equipment construction and maintenance In case IP based data transmission technology is used, however, it may inevitably cause an error that a packet is lost during transmission depending on the network environments. In order to cope with a broadcasting accident caused by such a transmission error or a malfunction of a broadcasting apparatus, a broadcasting system is generally configured as a duplication, which can transmit a normal packet when various types of error may occur. By this reason, correction method of error packets and intelligent switching technology are essential. Therefore, in this paper, we propose a design and implementation of intelligent IP switch for Ensuring Reliability of ATSC 3.0 Broadcast Streams. The proposed intelligent IP consists of IP Stream Analysis Module, ALP Stream Analysis Module, STL Stream Analysis Module and SMPTE 2022-1 based FEC Encoding/Decoding Module.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

Comparison of Mobility Support Schemes for Next Generation Network (차세대 네트워크에서의 이동성 제공 방안 비교)

  • Lee, Jong-Min;Yu, Myoung-Ju;Choi, Seong-Gon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.63-70
    • /
    • 2005
  • Various schemes for mobility are currently studied in ITU-T, 3GPP, IETF, and so on. Mobility support in NGN for seamless service is necessarily required. Currently proposed mechanisms are MIPv6, $IP^2$, and Q.MMF. However the performance comparison of all existing schemes is not examined as yet. That is, the existing methods need to be compared according to each performance parameter. So, in this paper, we investigate and compare the performances of MIPv6, $IP^2$, Q.MMF to location registration. In addition, this paper presents the performance comparison of handover latency times. For this, we use NS-2 simulator. As a result of analysis, $IP^2$ shown the best performance as it is measured the minimum time and cost. And it has low handover latency time in comparison with other mechanisms.

Effect of Packaging on Quality of Stored Gangjung (포장방법이 강정의 저장 중 품질특성에 미치는 영향)

  • Kim, Haeng-Ran;Shin, Dong-Sun;Kim, Kyung-Mi;Yu, Sun-Mi;Kim, Jin-Sook
    • Korean Journal of Food Science and Technology
    • /
    • v.44 no.1
    • /
    • pp.48-54
    • /
    • 2012
  • This study was conducted to improve the packaging technology used for Gangjung and the product's quality characteristics during storage. Packaging materials consisting of (1) IP: OPP (oriented polypropylene)/PE (polyethylene) + Paper, (2) LP1: OPP/PE + Paper, (3) LP2: OPP/PE + Can, (4) LP3: OPP/PE + Plastic, (5) BP1: OPP/PE, (6) BP2: OPP/DL/CPP (cast polypropylene), (7) BP3: PET/PE/CPP, and (8) BP4: OPP/PVDC (polyvinylidene chloride)/PE/CPP were used. The major fatty acids including 54.2% linoleic acid, 24.1% oleic acid, 11.2% palmitic acid and 6.0% linoleic acid were assessed. The packages effective in maintaining moisture were in the order of LP2, BP4 > IP > LP3, BP1, BP2 > LP1 > BP3. There were no significant differences in water content and the products in IP, BP3, and BP showed the highest level in the increase in hardness on day 60 of storage. Acid values of IP, LP1, LP2, LP3, BP1, and BP2 were maintained at <2.0 during 40 days of storage. IP, LP1, LP2 and BP1.