• Title/Summary/Keyword: ip

Search Result 6,889, Processing Time 0.03 seconds

Development of the IP-PBX with VPN function for voice security (VPN 기능을 가진 음성 보안용 IP-PBX 개발)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.63-69
    • /
    • 2010
  • Today, Internet Telephony Services based on VoIP are gaining tremendous popularity for general user. Therefore a various demands of the user keep up increase, the most important requirements of these is voice security about telephony system. It is needed to ensure secret of voice call in a special situation. Due to the fact that many users can connect to the internet at the same time, VoIP can always be in a defenseless state by hackers. Therefore, in this paper, we have developed VPN IP-PBX for the voice security and measured conversation quality by adopting VPN IPsec based on SIP and using tunnel method in transmitting voice data to prevent eavesdrop of voice data. This VPN IP-PBX that is connected Soft-phone provide various optional services.

Advanced n based Packet Marking Mechanism for IP Traceback (TTL 기반 패킷 마킹 방식을 적용한 IP 패킷 역추적 기법)

  • Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.13-25
    • /
    • 2005
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. Existing PPM based tracing scheme(such as router node appending, sampling and edge sampling) insert traceback information in IP packet header for IP Traceback. But, these schemes did not provide enhanced performance in DDoS attack. In this paper, we propose a 'TTL based advanced Packet Marking' mechanism for IP Traceback. Proposed mechanism can detect and control DDoS traffic on router and can generate marked packet for reconstructing origin DDoS attack source, by which we can diminish network overload and enhance traceback performance.

  • PDF

Implementation and Performance Evaluation of a Wireless VoIP System based on the Binary-CDMA Technology (Binary CDMA 기반의 무선 VoIP 시스템의 구현 및 성능평가)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2555-2562
    • /
    • 2011
  • Binary CDMA is a new standard technology for wireless communication developed by our country that makes high speed communications and good quality of services. In this paper we researched the development methods and implementation of a wireless VoIP System based on the Binary-CDMA technology that makes it freely installed in any place without phone cables and laying works. We designed the structure of the Binary-CDMA Wireless VoIP System and defined messages and data structures for call control. And then we designed and implemented call control message flow between VoIP terminals for user's communication.

Encapsulation of IP Traffic through GFP in OTN Transmission Network (OTN 광전송망에서 GFP를 통한 IP 트래픽의 인캡슐레이션)

  • Lee, Chang-Ki;Yang, Choong-Reol
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.567-572
    • /
    • 2008
  • It is necessary to study about the scheme to accept IP traffic effectively in OTN, according to expect that IP traffic data will be increase constantly. In this paper, we studied the encapsulation method of IP traffic through GFP in OTN transmission network. Therefore we knew the IP/GFP/OTN method is more efficient than existing methods from structure, overhead rates and possibility of grow, and showed the functional block of high level about this method. Also we showed the implementation scheme of this method by processing the functional simulation to make use of VHDL programming.

A Comparative Study on broadcasting video quality using PSNR in IPTV Network Adopted Transition Mechanism (트랜지션 메카니즘이 적용된 IPTV Network에서 PSNR을 이용한 방송화질 측정 연구)

  • Kim, Kwang-Hyun;Park, Seung-Seob
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.156-166
    • /
    • 2010
  • Development of IP network technology creates new service which applying to fusion technologies such as IPTV, VoIP, and so on. Especially, Next generation IP is called IPv6 which will solve the lack of IP. IPv6 is very important on IPTV which needs best quality of service about security, QoS, and bandwidth. In this paper, we constructed experimental network, measured PSNR which computes the peak signal-to-reconstructed video measurement in experimental network environment, analyzed PSNR value. And as a result of measurement, we, Propose optimum network environment for IPTV service provider and transition mechanism designer.

End-to-End Performance of VoIP Traffics over Large Scale MANETs (대규모 MANET에서 VoIP 트래픽의 종단간 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.49-54
    • /
    • 2011
  • In this paper, End-to-End VoIP(Voice over Internet Protocol) performance over large scale MANET(Mobile Ad-hoc Networks) is evaluated. VoIP implementation model, which can be used for large scale MANET, is suggested through this evaluation. VoIP simulator based on NS-2 network simulator is used for performance measurement. Call connection ratio as a connection performance, MOS and network delay as a transmission performance, packet loss rate as other performance is measured with this simulation. Finally, maximum $10{\sim}15km^2$ as a single MANET, 500 nodes and 100 call connections is suggested for VoIP implementation and operation conditions over large scale MANETs.

Development of the Integrated Multimedia IP-PBX System (차세대 멀티미디어 음성보안 IP-PBX 시스템 개발)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.95-100
    • /
    • 2011
  • The next generation IP-PBX system are demanding multimedia facility to carry out UC(Unified Communication) and voice security also. Therefore, in this paper, we have developed the integrated solution of IP-PBX for the voice security by adopting VPN IPsec based on SIP using tunnel method in transmitting voice data to prevent eavesdrop of voice data and have shared between communication system based on PC and PSTN terminals. In particular, We have developed a video conference, private switching, distributed processing and measured telephone conversation quality. This IP-PBX that is connected Soft-phone provide various optional services.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

Desiogn of secure IP SAN with high-speed paralllel PS-WFSR (고속 병렬형 PS-WFSR을 적용한 보안 IP SAN 설계)

  • Kim, Bong-Geun;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2164-2170
    • /
    • 2011
  • Rapid surge in date quantity lead to increase in storage demand from corporate. The existing SAN with fiber channel is being changed to IP-based SAN environment due to installment and maintenance cost. But the IP-based network still have some similar security problems as existing TCP/IP network. Also, for the security reasons of storage traffic, data are encrypted, but with the existing system, data larger than 10G can't be handled. To address security and speed issue, this paper proposes to a structure applied to IP SAN environment with Parallel Structure Word-based FSR (PS-WFSR) as hardware.

The CODEC Performance Analysis of VoIP for QoS (QoS를 위한 인터넷전화의 CODEC 성능 분석)

  • Rha, Sung-Hun;Yoo, Jae-Duck
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.2
    • /
    • pp.93-100
    • /
    • 2009
  • As the Internet Protocol be widely/rapidly used in packet communication, common carriers are providing the multimedia service(Both direction real-time voice, video conference, remote educational etc.)on the Internet. Also the 070 VoIP (Voice over IP) service is provided by the carriers on the packer network. In order to offer VoIP service in Korea, common carrier has to acquire the optimum level for QoS(quality of service). In this paper, we study on CODEC quality to get a higher QoS for VoIP.

  • PDF