• Title/Summary/Keyword: IP3

Search Result 1,734, Processing Time 0.028 seconds

차세대 VoIP 네트워크를 위한 QoS 구조

  • 최영일;성기순;이병선
    • The Magazine of the IEIE
    • /
    • v.31 no.3
    • /
    • pp.66-77
    • /
    • 2004
  • Since telecommunication operators have commercialized VoIP services recently, it is important to provide quality of the call across networks. It is demanded that the same quality as PSTN provides should be supported in VoIP networks too. Several QoS solutions have been developed and proposed for VoIP service in many organizations for this purpose. In this paper, we explain several QoS Solutions for IP networks, and present the QoS architecture for Next Generation VoIP Networks, which is proposed by Multi-service Switching Forum.(omitted)

  • PDF

Intelligent Peripheral 의 기능과 Signaling

  • 신석현;권은희;홍성주
    • Information and Communications Magazine
    • /
    • v.11 no.3
    • /
    • pp.66-73
    • /
    • 1994
  • IP(intelligent peripheral)은 AIN(Advanced Intelligent Network)을 구성하는 망 요소들 중의 하나로 사용자와의 상호동작을 제공하여 지능망 서비스를 보다 유연하고 다양하게 하는 지능망 지원 시스팀인 동시에, 자체적으로 새로운 서비스를 제공할 수도 있는 시스팀이다. IP는 AIN 교환기에 ISDN PRI(primary rate access interface)를 통하여 연결되어지고, SCP(Service Control Point)/Adjunct의 통제하에 음성안내, 음성인식, 테스트/음성 변환 등의 기술을 이용하여 사용자로부터 정보를 수집하고, 저장된 정보를 전달하는 기능을 수행한다. 본 고에서는 IP 시스팀의 하드웨어/소프트웨어적인 구조, 기능, 사용자와의 IP를 연결시켜주는 신호방식, IP가 서비스 제공을 위해 사용자와 어떻게 연결되는지를 프로토콜 측면에서 예를 들어 설명하고, 마지막으로 이러한 IP 개발 관련 소요기술과 활용방안을 고찰한다.

  • PDF

Study on QoE of the VoIP Service for QoS levels over LTE Mobile Communication System (LTE 이동통신 시스템에서 QoS 변화에 따른 VoIP 서비스의 사용자 체감 품질 변화에 대한 연구)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.309-316
    • /
    • 2016
  • Recently, the voice service over a mobile communication system tends to be provided based on the packet-based technology. Even though the sufficient transmission rate is supported by LTE mobile communication system, the quality of VoIP service that is experienced by the user can be degraded by the change in the transmission conditions and the terminal mobility. This paper has established an environment on which experiments are conducted for the different values of the major parameters that represent the transmission conditions. The result can contribute to the decision of the requirement that the mobile system should meet for maintaining the quality of VoIP service.

Design and Implementation of IP-TV Set-Top Box for IP-TV Service (IP-TV서비스를 위한 IP-TV Set-Top Box설계와 구현)

  • Park, Hyung-Do;Lee, Kyoung-Won;Ahn, Chang-Won;Kim, Dae-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.171-174
    • /
    • 2006
  • 본 논문에서는 IP-TV 보금을 위해서 고성능 저가의 IP-TV(Internet Protocol TV) 셋탑박스의 필요성을 감안하여 TV를 통한 인터넷 컨텐츠 이용에 최적화된 IP-TV 셋탑박스를 제조업체(Ninelanes)와 공동으로 개발하였다. 개발된 셋탑박스는 브로드밴드를 이용한 VOD서비스, 1Mbps급의 DVD급 화질을 지원하고 스트리밍 비디오와 저장된 콘텐츠를 직접 재생할 수 있다. 개발된 셋탑박스는 VHS(450kbps), DVD급(750kbps), DVD(1.2Mbps), MP3, AC3, MPEG-2/4, VP4/5/6, WMV9, DVIX 등의 다양한 디지털 미디어 재생 포맷을 지원 할 수 있도록 개발되어 가격경쟁력 향상 및 멀티미디어 지원환경 구축, 인코더방식의 코덱 전환이 가능하다. 또한 고집적, 저전력, 고성능, 저가형 개발 개념으로 개발된 이 셋탑박스는 각종 IP-TV기능을 펌웨어나 소프트웨어 수정으로 시스템 변경이 가능하여 IP-TV 셋탑박스 보급에 크게 기여할 것으로 기대된다.

  • PDF

IP Over USB for Improved QoS of UDP/IP Messages (UDP/IP 메시지 전송의 QoS 성능 향상을 위한 IP Over USB)

  • Jang, Byung-Chul;Park, Hyeon-Hui;Yang, Seung-Min
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.295-300
    • /
    • 2007
  • The Linux-based embedded systems such as mobile telephones. PDAs and MP3 players are widely in use. USB(Universal Serial Bus) is the interface for data communication between the computers and these peripheral devices. Some embedded systems like intelligent home networking and multimedia streaming require guaranteed QoS(Quality of Service), which is needed for real time transmission of UDP/IP messages through USB. Although USB Ethernet driver is supported by USB Gadget API in Linux, it is unable to provide the desirable QoS required by each type or small embedded systems due to the unpredictability or TCP/IP Stack in Linux. This paper proposes IP-Over-USB to improve QoS of UDP/IP message transmission in the embedded systems using USB in Linux system.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study of VoIP Encryption and Authentication Technologies in 4G WiBro Services (4G WiBro서비스에서 VoIP 암호화와 인증기술 연구)

  • Baek, Jong-Il;Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.291-294
    • /
    • 2011
  • 4G WiBro service in Korea, the world's fourth-generation communication is standardized. VoIP service has been activated one of the application in WiBro communications infrastructure. When using VoIP in the WiBro service, complementing the existing VoIP vulnerabilities in the encryption and authentication technology is a need for research. In this paper, fourth-generation WiBro, LTE, and the definition, 1G, 2G, 3G and 4G compares. And, WiBro service in the VoIP edaehan technical, administrative, physical, and hacker attacks and vulnerability analysis is the study of security measures. Enhanced security measures for the WiBro service to VoIP security through encryption and authentication technologies are studied.

  • PDF

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

Effect of Packaging on Quality of Stored Gangjung (포장방법이 강정의 저장 중 품질특성에 미치는 영향)

  • Kim, Haeng-Ran;Shin, Dong-Sun;Kim, Kyung-Mi;Yu, Sun-Mi;Kim, Jin-Sook
    • Korean Journal of Food Science and Technology
    • /
    • v.44 no.1
    • /
    • pp.48-54
    • /
    • 2012
  • This study was conducted to improve the packaging technology used for Gangjung and the product's quality characteristics during storage. Packaging materials consisting of (1) IP: OPP (oriented polypropylene)/PE (polyethylene) + Paper, (2) LP1: OPP/PE + Paper, (3) LP2: OPP/PE + Can, (4) LP3: OPP/PE + Plastic, (5) BP1: OPP/PE, (6) BP2: OPP/DL/CPP (cast polypropylene), (7) BP3: PET/PE/CPP, and (8) BP4: OPP/PVDC (polyvinylidene chloride)/PE/CPP were used. The major fatty acids including 54.2% linoleic acid, 24.1% oleic acid, 11.2% palmitic acid and 6.0% linoleic acid were assessed. The packages effective in maintaining moisture were in the order of LP2, BP4 > IP > LP3, BP1, BP2 > LP1 > BP3. There were no significant differences in water content and the products in IP, BP3, and BP showed the highest level in the increase in hardness on day 60 of storage. Acid values of IP, LP1, LP2, LP3, BP1, and BP2 were maintained at <2.0 during 40 days of storage. IP, LP1, LP2 and BP1.