• Title/Summary/Keyword: ip

Search Result 6,871, Processing Time 0.03 seconds

Study on VoIP Service Quality Management (VoIP 서비스 품질관리에 관한 연구)

  • Chang, Byeong-Yun;Seo, Dong-Won;Park, Byung-Joo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.245-252
    • /
    • 2011
  • VoIP transmits voices over IP-based networks and it is the abbreviation of Voice over Internet Protocol. Recently, VoIP provides various services in addition to voices. Since VoIP services' provision is extending, VoIP service quality management is becoming an important issue. Therefore, in this paper, we study VoIP service quality management. We examine VoIP technology, service types, and network architecture. Then, we investigate key quality indicators(KQIs)/key performance indicators(KPIs) in terms of customers, not network service providers. Toward this, we also study the concept of general service quality management as well as the concept of telecommunication related service quality management. Moreover, we apply $\bar{x}$ and R charts to show how to use statistical quality control techniques in real telecommunication companies with one KQI.

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Study on Design of IP PBX of Distribute Base on SIP Protocol Stack (SIP프로토콜 스텍을 기반으로 하는 분산형 IP PBX 단말기 설계)

  • Yoo Seung-Sun;Yoo Gi-Hyoung;Lim Pyung-Jong;Hyun Chul-Ju;Kwak Hoon-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4A
    • /
    • pp.377-384
    • /
    • 2006
  • According to fast VoIP technology development, more and more companies change voice network into IP based network among branch offices. IP PBX, which is deployed up to now, composed of IP phone and VoIP Gateway. Every telphone has replaced with If phone which support VoIP and VoIP gateway is installed in PBTN connection point to relay voice data. It can reduce the communication expense of International call, long distance call and call between a headquater and a trance because it uses internet line. In this paper, IP PBX is implemented that can distribute call using PBX network only usig personal terminal without Proxy Server. Depending on Role, terminal can be registered Master, Server and Client and it is verified in terms of performance and validation.

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

A Partitioned Compressed-Trie for Speeding up IP Address Lookups (IP 주소 검색의 속도 향상을 위한 분할된 압축 트라이 구조)

  • Park, Jae-Hyung;Jang, Ik-Hyeon;Chung, Min-Young;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.641-646
    • /
    • 2003
  • Packet processing speed of routers as well as transmission speed of physical links gives a great effect on IP packet transfer rate in Internet. The router forwards a packet after determining the next hop to the packet's destination. IP address lookup is a main design issue for high performance routers. In this paper, we propose a partitioned compressed-trie for speeding-up IP address lookup algorithms based on tie data structure by exploiting path compression. In the ,proposed scheme, IP prefixes are divided into several compressed-tries and lookup is performed on only one partitioned compressed-trie. Memory access time for IP address lookup is lessen due to compression technique and memory required for maintaining partition does not increased.

The Trend of Internet Telephony(VoIP) Technology for BcN (BcN 인터넷전화(VoIP) 기술 동향)

  • Kang, T.G.;Kim, D.Y.;Kim, Y.S.
    • Electronics and Telecommunications Trends
    • /
    • v.19 no.6 s.90
    • /
    • pp.66-73
    • /
    • 2004
  • 2004년도 정보통신부의 IT839 전략에 따르면 8대 신규 서비스로 인터넷 전화(VoIP)와 3대 첨단 인프라로 광대역 통합망(BcN)을 선정한 바 있다. 이에 본 고에서는 9대 신성장동력에서 공동으로 활용하기 위한 VoIP와 BcN을 연계한 기술 동향을 설명한다. SIP 와 H. 323에 의한 VoIP 서비스가 제공되면서 네트워크 구조 변화가 시작되었다. 유선 네트워크, 무선 이동통신 네트워크, 인터넷 등을 통합하는 유무선 통합네트워크(BcN)는 VoIP 기술로 구축될 것이다. 본 고의 구성으로는 VoIP 기술 특성을 설명하고, VoIP 표준 동향을 분석한 후에 앞으로 구축될 BcN VoIP 의 발전 방향에 대하여 설명한다. VoIP 기술은 회선 정합및 인터넷 정합 기술과 H. 323, SIP, MEGACO 등의 프로토콜 기술과 VoIP 품질을 결정하는 코덱 기술이있다. VoIP 표준은 IETF에서 제정한 SIP를 중심으로 네트워크 특성을 고려하여 3GPP, 3GPP2, ITU에서개발하고 있다. BcN VoIP 는 기존의 VoIP 기술을 발전시켜 음성 품질이 오디오 수준으로 향상되고, 유선과 무선, 방송이 통합되는 제어 기술과 연계하여 실시간 멀티미디어 서비스를 제공할 것이다.

Comparative LCA of three types of Interior Panel(IP) in Electric Motor Unit(EMU) (전동차 내장패널(Interior Panel)에 대한 비교 전과정평가)

  • Choi, Yo-Han;Lee, Sang-Yong;Kim, Yong-Ki;Lee, Kun-Mo
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.584-588
    • /
    • 2007
  • A comparative Life Cycle Assessment(LCA) among three types of Electric Motor Unit(EMU) Interior Panel(IP) was conducted. A functional unit for comparative LCA is a weight of IP for 1 EMU. It assumed that Manufacturing stage and its upstream processes, Use stage and End of Life(EoL) stage are included in the boundary of product system. For Use stage, the weight of IP causes electricity consumption. It is assumed that aluminum IP is recycled and the other IPs are incinerated at the EoL stage. As comparison results, aluminum IP has much larger environmental impact(5.162pt) than others(FRP IP; 4.069pt, Phenol IP; 4.053pt) even though recycling consideration is included. The manufacturing stage of aluminum has relative big envrionmental impact(1.824pt) and this point make the most important difference from other IPs(FRP IP; 0.1617pt, Phenol IP; 0.4534pt)). Despite of large weight difference between FRP IP(888.56Kg) and phenol IP(315Kg), the final environmental impact result has only little difference(0.016pt, 0.39%). With this result, the EMU designer can choose IP with a consideration of the environmental performance of IP.

  • PDF

Performance Evaluation of MCS&MNMCA IP Mobility Management Scheme Using MPLS Networks (MPLS 네트워크를 이용한 MCS&MNMCA IP 이동성 관리기법의 성능 평가)

  • Jang, Seong-Jin;Kim, Jin-Man;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.49-53
    • /
    • 2007
  • The Next generation IP-based wireless access network proposed Mobile IP(IPv4) protocols to support mobility of node. Because Mobile IPv4 operates on th basis deigned IP in fixed network, it causes performance drop like triangle routing and handover delay. Therefore Mobile IPv4 needs scheme to complement this problems and to support service guaranteed QoS. Concerns about using MPLS networks in the next generation IP-based wireless access network are increasing. In our previous research, we proposed MCS&MUMCA, IP mobility management scheme. In this paper, we linkage the MCS&MUMCA in MPLS network and analyze its the performance.

  • PDF