• Title/Summary/Keyword: SOME/IP

Search Result 354, Processing Time 0.022 seconds

Trends in Major Countries Related to PSTN Shutdown and Domestic Status (PSTN 종료 관련 해외 주요국 동향과 국내 현황)

  • Jeong, S.K.;Lee, K.H.;Lee, H.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.68-77
    • /
    • 2020
  • Along the advancement of mobile networks, fixed telephone networks are gradually advancing from legacy networks based on copper and circuit-switches to optical cables and packet-switched IP networks. Incumbent fixed-line telephone operators are facilitating the introduction of IP networks and are gradually converting to IP-based facilities according to the investment plans for each operator. As the PSTN's IP conversion exceeds a certain level and VoIP; (an alternative service); is activated, some countries; such as Europe; are considering terminating the PSTN service, centering on operators. In this paper, trends in the procedure, timing, and major issues related to the termination of an overseas PSTN are examined. The domestic status is also examined.

Performance of VoIP based on Speed of Mobile Node over MANETs (MANET에서 모바일 노드 이동 속도에 따른 VoIP 성능)

  • Yoon, Tong-Il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.750-752
    • /
    • 2010
  • MANET has some interest as a wireless mobile network supporting node mobility and having no additional infrastructure. Speed of mobile node on MANET is various from just slow speed of human's walk to vehicle's moving speed. In this study, VoIP performance of MANET is evaluated in the view of speed of mobile node. VoIP performance is studied on walking speed, vehicle speed and higher speed on MANET. PDR(Packet Delivery Ratio), MOS(Mean Opinion Score) are used as performance parameters.

  • PDF

Desiogn of secure IP SAN with high-speed paralllel PS-WFSR (고속 병렬형 PS-WFSR을 적용한 보안 IP SAN 설계)

  • Kim, Bong-Geun;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2164-2170
    • /
    • 2011
  • Rapid surge in date quantity lead to increase in storage demand from corporate. The existing SAN with fiber channel is being changed to IP-based SAN environment due to installment and maintenance cost. But the IP-based network still have some similar security problems as existing TCP/IP network. Also, for the security reasons of storage traffic, data are encrypted, but with the existing system, data larger than 10G can't be handled. To address security and speed issue, this paper proposes to a structure applied to IP SAN environment with Parallel Structure Word-based FSR (PS-WFSR) as hardware.

A Study on Mobile IP-over-MPLS Framework to Provide Mobile IP service with Guarantied QoS (QoS 보장형 이동성 IP 서비스 제공을 위한 Mobile IP-over-MPLS 구조 연구)

  • 김호철;김영탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9B
    • /
    • pp.834-844
    • /
    • 2003
  • Mobile IP has some performance degrade factors such as triangle routing and packet loss by the hand-off because the original IP was designed for the fixed network. The design goal for the next generation Internet service is to guarantee QoS. So, Mobile IP also should be able to provide the guaranteed QoS with performance enhancement because it is an IP-based mobile Internet service. In this paper, we propose route optimization, smooth hand-off scheme and MIP-LDP(Mobile IP-Label Distribution Protocol) on Mobile IP-over-MPLS framework to enhance the performance of the previously researched Mobile IP-over-MPLS schemes. The proposed framework enhanced long routing path problem and packet loss problem by the hand-off.

A Study on the Current Status and Improvement Plan of Chinese IP Movies (中国IP电影的现状及改善方案研究)

  • Wang, Luoxue;Kim, Sunyoung
    • 지역과문화
    • /
    • v.7 no.4
    • /
    • pp.69-81
    • /
    • 2020
  • As internet companies advance into the film industry, China's IP movies have grown rapidly and brought huge business benefits to the movie market. This paper tried to diagnose the phenomenon of the Chinese IP film craze and derive its meaning and implications. To this end, we selected representative cases to examine the problems and the corresponding improvement measures. Among the three genres of novels, cartoons, and music that are currently drawing the most attention in IP film adaptation, the examples were "Wu Kong", "Take My Brother Away", "My Old Classmate". The research results show that there are problems such as the unification of Chinese IP films, the lack of screenplay ability, and the copyright. Some improvement measures such as establishing IP copyright trading platform, strengthening IP creation, and promoting the value chain of IP industry are put to solve these problems. We hope that China's IP film market create a value chain on the basis of this paper.

The Proposal of IoT products tracking and inventory management system using IPv6 based on static IP (고정IP 기반의 IPv6를 이용한 사물인터넷 제품 추적 및 재고관리 시스템 제언)

  • Lee, Jeong-Min;Ahn, Jong-Chang;Lee, Ook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.423-437
    • /
    • 2015
  • The IPv6 which solved the exhaustion problem of IPv4's IP address is going to be used for many kinds of industries. As a result, there are some products which can be connected to other connectable things, it called Internet of Things (IoT). With growing new propagated products including networking, each product can get an IP address of IPv6, which means it is possible that things also have their own IP addresses. Thus, IP address management system is more important and needs tracking and collecting system for unused products with IP addresses. This study suggests new distribution tracking and inventory management system for IoT products, which offers a current location of things and manages stocks in the warehouse with the static IP address and the location-based service.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

Design of Internet Telephony Network System using Open Source Softwares (오픈 소스 소프트웨어를 활용한 인터넷 전화망 시스템 설계)

  • Ha, Eun-Yong
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.259-267
    • /
    • 2012
  • Internet telephony is an Internet service which supports voice telephone using VoIP technology on the IP-based Internet. It has some advantages in that voice telephone services can be accompanied with multimedia services such as video communication and messaging services. Recently, the introduction of smart phones has led to a growth in social networking services and thus, the research and development of Internet telephony has been actively progressed and has the potential to become a replacement for the telephone service that is currently being used. In this paper we designed and implemented an Internet telephony network system which is developed by using Asterisk and open source softwares. It is developed on the linux system and has some features such as VoIP telephony service between SIP phones, voice mail, and call recording. It also supports web-based functions such as SIP users and server system management that is implemented by Apache web server and PHP programs. Afterwards, this system will be applied as VoIP network base technology for small sized companies and organizations. It will paly a role for encouraging companies to use open source softwares.

Security Framework for Improving the Performance of the Malicious Process Control System (악성 프로세스 제어 시스템의 성능 향상을 위한 보안 프레임워크)

  • Kim, Iksu;Choi, Jongmyung
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.61-71
    • /
    • 2013
  • Until now, there have been various studies against Internet worms. Most of intrusion detection and prevention systems against Internet worms use detection rules, but these systems cannot respond to new Internet worms. For this reason, a malicious process control system which uses the fact that Internet worms multicast malicious packets was proposed. However, the greater the number of servers to be protected increases the cost of the malicious process control system, and the probability of detecting Internet worms attacking only some predetermined IP addresses is low. This paper presents a security framework that can reduce the cost of the malicious process control system and increase the probability of detecting Internet worms attacking only some predetermined IP addresses. In the proposed security framework, virtual machines are used to reduce the cost of control servers and unused IP addresses are used to increase the probability of detecting Internet worms attacking only some predetermined IP addresses. Therefore the proposed security framework can effectively respond to a variety of new Internet worms at lower cost.

Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection (IP Fragmentation 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • Guk, Gyeong-Hwan;Lee, Sang-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.331-338
    • /
    • 2001
  • With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  • PDF