• Title/Summary/Keyword: IP

Search Result 6,870, Processing Time 0.038 seconds

Handling of IP Version for Interworking IP Transport and ATM Transport Mechanisms in a Radio Access Network (무선접속망에서 IP 전송 방식과 ATM 전송 방식간의 상호연동을 위한 IP 버전 처리)

  • Lee, Wan-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.627-636
    • /
    • 2002
  • In this paper, we investigate the interworking method between three transport mechanisms, that is, ATM transport, IP$_v$4 transport and Ip$_v$6transport, where these mechanisms are wholly used in a Mobile RAN (Radio Access Network). The proposed interworking method, called Triple Capable Node, is to implement three transport mechanisms simultaneously in a single node so that the node can communicate directly to other nodes having various transport mechanisms by using one of three transport mechanisms. In addition, we propose a dynamic algorithm which selects one among multiple transport mechanisms at run time in order to achieve better communication performance.

A Study on Spam Protection Technolgy for Secure VoIP Service in Broadband convergence Network Environment (BcN 환경에서 안전한 VoIP 서비스를 위한 스팸대응 기술 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.670-676
    • /
    • 2008
  • There is a difficult plane letting a security threat to occur in Internet networks as VoIP service uses technology-based the Internet is inherent, and you protect without adjustment of the existing security solution or changes with real-time service characteristics. It is a voice to single networks The occurrence security threat that it is possible is inherent in IP networks that effort and cost to protect a data network only are complicated relatively as provide service integrated data. This paper about various response way fields to be able to prevent analysis regarding definition regarding VoIP spam and VoIP spam technology and VoIP spam.

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

The Effect of IP Telephony Diffusion on the IT Industry (IP 전화서비스의 확산이 정보통신업계에 미치는 영향)

  • Kim, B.R.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.157-166
    • /
    • 2005
  • IP 전화 확산이 정보통신산업에 미치는 영향에 관한 분석은 현재까지 저자들의 직관에 의존한 것들이 대부분이었다. 이런 점에서 볼 때, IP 전화의 보급과 제도화에 있어서 세계에서 가장 앞서가고 있는 일본의 사례를 중심으로 IP 전화 확산이 실제로 정보통신업계에 미치는 영향을 살펴보는 것은 매우 의미있는 일이라 사료된다. IP 전화의 확산은 기존 고정전화사업자의 트래픽 감소를 초래하고, 이는 다시 기존 고정사업자의 접속료 인상을 가져 온다. 그 결과 IP 전화서비스의 확산은 IP 전화사업자의 수지에 큰영향을 미칠 뿐만 아니라, 고정전화사업자 스스로에게도 긍정적, 부정적 영향을 동시에 미치고 있다. 이하에서는 일본 사례를 중심으로 IP 전화 확산이 기존 시장지배적사업자와 IP 전화사업자들에게 어떠한영향을 미치고 있으며, 이들 각 기업들은 이러한 변화에 어떠한 대응 시나리오를 가지고 대처하고 있는지를 주로 문헌연구를 통하여 고찰한다. 일본 사례가 우리나라에도 그대로 적용된다면 본 연구에서 다루고 있는 각 기업들의 대응 시나리오는 실질적으로 IP 전화사업을 추진하고자 하는 정보통신사업자들에게 많은 시사점을 줄 수 있으리라 판단된다.

An Analysis of Packet over SONET/SDH for the Next Generation Internet (차세대 인터넷 구축을 위한 Packet over SONET/SDH 기술의 분석)

  • 박준현;홍석원
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.156-160
    • /
    • 1999
  • This paper explains tile IP over SONET/SDH that becomes nowadays one of the compelling candidates for building tile next generation IP backbone networks. First we introduce the protocol stack and tile related protocols of IP over SONET/SDH and explain the new scrambling technique using 1+X$^{43}$ scrambler since the legacy scrambler could be vulnerable by malicious users. And we compare tile IP over SONET/SDH with the IP over ATM that has long been a strong candidate for future IP backbone networks and we recommend that the optimal choice for the IP backbone should lie considered based on the merits and demerits of each technology.

  • PDF

Reliability for A Fault-Detection Agent running on Home Network Environment based IP-USN (IP-USN 기반의 홈 네트워크 환경에서 결함 감지 에이전트를 위한 신뢰성)

  • Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.74-78
    • /
    • 2009
  • This paper explains the design and implementation of the FDA(Fault Detection Agent) based on IP-USN. FDA is a system that is suitable for detecting software error for multimedia distance education running on home network environment based on IP-USN. This system consists of an ED, and ES. ED is an agent that detects an error by hooking techniques for multimedia distance education based on IP-USN environment. ES is an agent that is an error sharing system for multimedia distance education based on IP-USN environment.

  • PDF

An Enhancement Technique of IP Address Reusability over the Dynamic IP Address Assignment Method (동적 IP 주소 할당방식의 IP주소 재사용 효율 증가 기법)

  • Bae Byeong-Sook;Yang Jun-Whan;Kim Jae-Dong;Min Kyeong-Seon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2003.08a
    • /
    • pp.244-248
    • /
    • 2003
  • DHCP를 이용한 동적 IP주소 할당방식에서 클라이언트가 네트워크 접속을 해제하면서 IP 주소를 자동적으로 반납하지 않음으로 인해 IP 주소 회수가 즉각 이루어지지 않아 IP 주소 재활용을(reusability)이 저하된다. IP 주소의 재활용율을 증가시키면서 DHCP 서버의 부하증가 및 네트워크의 트래픽 증가 최소화를 위한 두 가지 기법으로 DHCP 서버에서 IP 주소의 임대시간을 적응적으로 조정하는 기법과 ICMP echo request 및 reply 메시지를 통한 클라이언트의 동작유무 확인을 통해 비동작 클라이언트의 IP 주소 회수 기법을 제안한다.

  • PDF

Implementation of Fault Tolerant BBMD Mechanism in BACnet/IP Protocol (BACnet/IP 프로토콜에서 BBMD의 결함허용 기능 구현)

  • Cho, Su-Un;Hong, Seung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.107-109
    • /
    • 2005
  • BACnet(Building Automation and Control networks) is a standard data communication protocol designed specifically for building automation and control systems. BACnet provides BACnet/IP Protocol for data communication through the internet. BACnet device transmits BACnet broadcast messages and BACnet/IP messages using conventional IP technologies. Specially, BBMD(BACnet Broadcasting Management Device) is used to deliver BACnet broadcast messages. In this study, we propose a mechanism of fault tolerant BBMD in the BACnet/IP protocol. The Fault Tolerant BBMD mechanism(FTBM) improves the connectivity of BACnet/IP networks by inheriting the operation of BBMD in the networks. The FTBM is implemented with added functions to the original BACnet/IP protocol so that it can be applied together with original BACnet/IP devices. We also prove the FTBM's backward compatibility with original BACnet/IP protocol using experimental analysis.

  • PDF

IP Management Method Using RADIUS Authentication and Accounting Servers (RADIUS 인증 및 과금 서버를 이용한 IP 관리 방법)

  • Park Jeong-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.12D no.1 s.97
    • /
    • pp.121-128
    • /
    • 2005
  • This paper describes the requested IP assignment and authentication problem for wireless internet service of visited ISP subscriber on GPRS network, and proposes to use RADIUS authentication and accounting server for these problems. In this paper, we also define signals between GGSN and RADIUS, and between RADIUS authentication server and accounting sever for IP management and wireless internet service.

A Study on Countering SIP-based VoIP Spam using VoIP-RBL (VoIP-RBL을 이용한 SIP기반 VoIP스팸 차단 방법)

  • Yoon, Seok-Ung;Jung, Hyun-Cheol;Park, Hae-Ryoung;Won, Yoo-Jae;Yoo, Hyeong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.135-136
    • /
    • 2011
  • The more VoIP service is widely used, the more VoIP spam becomes threatened. Both VoIP spam violates the user's privacy and VoIP spam can cause money trouble. Therefore, it is important to reduce the VoIP spam but it is not easy to adopt some useful techniques to counter e-mail spam due to VoIP characteristics. We propose a technique using VoIP-RBL for countering SIP-based VoIP spam.