• Title/Summary/Keyword: IP 10

Search Result 2,602, Processing Time 0.023 seconds

Design and Implementation of Intelligent IP Switch with Packet FEC for Ensuring Reliability of ATSC 3.0 Broadcast Streams

  • Lee, Song Yeon;Paik, Jong Ho;Dan, Hyun Seok
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.21-27
    • /
    • 2019
  • The terrestrial ATSC 3.0 broadcasting system, which is capable of converging broadcast and communication services, uses IP based technology for data transmission between broadcasting equipment. In addition, data transmission between broadcasting equipment uses IP-based technology like existing wired communication network, which has advantageous in terms of equipment construction and maintenance In case IP based data transmission technology is used, however, it may inevitably cause an error that a packet is lost during transmission depending on the network environments. In order to cope with a broadcasting accident caused by such a transmission error or a malfunction of a broadcasting apparatus, a broadcasting system is generally configured as a duplication, which can transmit a normal packet when various types of error may occur. By this reason, correction method of error packets and intelligent switching technology are essential. Therefore, in this paper, we propose a design and implementation of intelligent IP switch for Ensuring Reliability of ATSC 3.0 Broadcast Streams. The proposed intelligent IP consists of IP Stream Analysis Module, ALP Stream Analysis Module, STL Stream Analysis Module and SMPTE 2022-1 based FEC Encoding/Decoding Module.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

A Study on the Multi-Dimensional Interactivity in IP-Based Interactive Media: e-Learning Service Case (IP기반 양방향 매체에서의 다차원적 상호작용에 관한 연구: e-러닝 서비스를 중심으로)

  • Lee, Ji-Eun;Shin, Min-Soo
    • Information Systems Review
    • /
    • v.10 no.3
    • /
    • pp.39-64
    • /
    • 2008
  • As digital convergence evolves, it is expected that the market of IP-based services like VoIP and IPTV will be expanded. In particular, IPTV market is expected to attract consumers' attention through various interactive services offering a variety of experiences to consumers. Interactivity sets apart old media from new one in terms of how to mediate effects of user satisfaction. The object of this study is to investigate (1) multi-dimensional Interactivities in an interactive medium based on IP and relationship among them, and (2) significant factors affecting cognitive absorption of interactive media users. This study aims to provide implications on how to develop strategies for IP-based media including e-learning system.

High Reliability Rx Power System Design for Military VoIP Phone (군용 VoIP 전화기를 위한 고신뢰성 Rx 전력 시스템 설계)

  • Park, Kyung-Hwa;Park, Hyun-Jeong;Kim, Hyeon-Sung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.857-864
    • /
    • 2020
  • The multi-functional VoIP phone supports the Ethernet protocol in the TIPS(: Tactical IP Switch), which is one of the sub-systems of the tactical information and communication system (TICN). It provides secured voice / video calls in conjunction with VoIP exchanges and supports differential services such as multi-party calls and command functions. In this paper, improving methods have been proposed to reduce power supply defects in the field of multi-functional VoIP phones. The power supply part was improved by applying TVS of the output voltage inlet of the dedicated adapter of the multi-functional VoIP phone, TVS of the PoE module input, adding blocking diodes, and adding DC / DC converters behind the poly-switch. Also, functional and environmental tests were performed to verify the validity of the proposed methods.

Effects of Inositol 1,4,5-triphosphate on Osteoclast Differentiation in RANKL-induced Osteoclastogenesis

  • Son, A-Ran;Kim, Min-Seuk;Jo, Hae;Byun, Hae-Mi;Shin, Dong-Min
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.16 no.1
    • /
    • pp.31-36
    • /
    • 2012
  • The receptor activator of NF-${\kappa}B$ ligand (RANKL) signal is an activator of tumor necrosis factor receptor-associated factor 6 (TRAF6), which leads to the activation of NF-${\kappa}B$ and other signal transduction pathways essential for osteoclastogenesis, such as $Ca^{2+}$ signaling. However, the intracellular levels of inositol 1,4,5-trisphosphate ($IP_3$) and $IP_3$-mediated cellular function of RANKL during osteoclastogenesis are not known. In the present study, we determined the levels of $IP_3$ and evaluated $IP_3$-mediated osteoclast differentiation and osteoclast activity by RANKL treatment of mouse leukemic macrophage cells (RAW 264.7) and mouse bone marrow-derived monocyte/macrophage precursor cells (BMMs). During osteoclastogenesis, the expression levels of $Ca^{2+}$ signaling proteins such as $IP_3$ receptors ($IP_3Rs$), plasma membrane $Ca^{2+}$ ATPase, and sarco/endoplasmic reticulum $Ca^{2+}$ ATPase type2 did not change by RANKL treatment for up to 6 days in both cell types. At 24 h after RANKL treatment, a higher steady-state level of $IP_3$ was observed in RAW264.7 cells transfected with green fluorescent protein (GFP)-tagged pleckstrin homology (PH) domains of phospholipase C (PLC) ${\delta}$, a probe specifically detecting intracellular $IP_3$ levels. In BMMs, the inhibition of PLC with U73122 [a specific inhibitor of phospholipase C (PLC)[ and of $IP_3Rs$ with 2-aminoethoxydiphenyl borate (2APB; a non-specific inhibitor of $IP_3Rs$) inhibited the generation of RANKL-induced multinucleated cells and decreased the bone-resorption rate in dentin slice, respectively. These results suggest that intracellular $IP_3$ levels and the $IP_3$-mediated signaling pathway play an important role in RANKL-induced osteoclastogenesis.

Terminal Characteristics-Based IP Paging Strategy with Low Power Consumption for Wireless Sensor Networks (무선 센서 네트워크에 적합한 단말 특성 기반 저전력형 IP 페이징 기법)

  • Suh, Bong-Sue;Choi, Jin-Seek
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.29-36
    • /
    • 2007
  • IP paging strategy, one of the solutions for derived problems in IP mobility support protocol, reduces the messages and the overheads over the network, since there is not registration procedure when a mobile terminal moves into a new router within the same paging area. However, the fact that the mobile terminals with the previous strategy consume electrical power continuously for paging signal reception obstructs the application of IP paging strategy to the IP-based wireless sensor networks. In this paper, we propose a discontinuous paging reception strategy based on the characteristics of the wireless sensor networks and their mobile terminals. As a result of the mathematical analysis, the proposed strategy significantly reduces the terminals' power consumption. In addition, by setting the relating parameters as appropriate values, the proposed strategy can be switched to the continuous reception strategy, or can be adjusted to limit the terminals' power consumption or paging delay.

Security Mechanism for Firewall Traversal in Mobile IP (안전한 방화벽 Traversal을 제공하는 Mobile IP의 보안 메커니즘)

  • Jin, Min-Jeong;Park, Jung-Min;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.11-20
    • /
    • 2004
  • Mobile IP is designed to provide IP services to roaming nodes. Mobile users take advantage of this protocol to obtain the services as if they were connected to their home network. In many cases mobile users is connected through a wireless link and is protected by corporation's firewall in virtual Private network. In order to have a successful deployment of Mobile IP as an extension of a private network, security services should be provided as if the mobile node were attached to its home network. In this paper, we propose the security mechanism of combining Mobile IP and IPSec tunnels, which can provide secure traversal of firewall in a home network. The simulation results show that the proposed mechanism provides the secure and efficient communication.

MPICH-GP : An MPI Extension to Supporting Private IP Clusters in Grid Environments (MPICH-GP : 그리드 상에서 사설 IP 클러스터 지원을 위한 MPI 확장)

  • Park, Kum-Rye;Yun, Hyun-Jun;Park, Sung-Yong;Kwon, Oh-Young;Kwon, Oh-Kyoung
    • The KIPS Transactions:PartA
    • /
    • v.14A no.1 s.105
    • /
    • pp.1-14
    • /
    • 2007
  • MPICH-G2 is an MPI implementation to solve complex computational problems by utilizing geographically dispersed computing resources in grid environments. However, the computation nodes in MPICH-G2 are exposed to the external network due to the lack of supporting the private IP clusters, which raises the possibility of malicious security attacks. In order to address this problem, we propose MPICH-GP with a new relay scheme combining NAT(Network Address Translation) service and an user-level proxy. The proxy running on the front-end system of private IP clusters forwards the incoming connection requests to the systems inside the clusters. The outgoing connection requests out of the cluster are forwarded through the NAT service on the front-end system. Through the connection path between the pair of processes, the requested MPI jobs can be successfully executed in grid environments with various clusters including private IP clusters. By simulations, we show that the performance of MPICH-GP reaches over 80% of the performance of MPICH-G2, and over 95% in ease of using RANK management method.

A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine (Support Vector Machine 기반 TCP/IP 헤더의 은닉채널 탐지에 관한 연구)

  • 손태식;서정우;서정택;문종섭;최홍민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.35-45
    • /
    • 2004
  • In explosively increasing internet environments, information security is one of the most important consideration. Nowadays, various security solutions are used as such problems countermeasure; IDS, Firewall and VPN. However, basically internet has much vulnerability of protocol itself. Specially, it is possible to establish a covert channel using TCP/IP header fields such as identification, sequence number, acknowledge number, timestamp and so on. In this Paper, we focus cm the covert channels using identification field of IP header and the sequence number field of TCP header. To detect such covert channels, we used Support Vector Machine which has excellent performance in pattern classification problems. Our experiments showed that proposed method could discern the abnormal cases(including covert channels) from normal TCP/IP traffic using Support Vector Machine.

Performance Evaluation of VoIP Security Protocols (VoIP를 위한 보안 프로토콜 성능 평가)

  • Shin, Young-Chan;Kim, Kyu-Young;Kim, Min-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.109-120
    • /
    • 2008
  • VoIP utilizes the Internet for the services, and therefore it is vulnerable to intrusions and attacks. Because provided services deal with information related to privacy of users, it requires high level security including authentication and the confidentiality/integrity of signaling messages and media streams. However, when such a protocol is implemented in a VoIP phone, the implementation can have limitations due to the limited resources. The present study purposed to implement VoIP security protocols and to evaluate their performance in terms of connection quality and voice quality by applying them to SIP proxy and UA (User Agent). In the result of performance evaluation, the application of the security protocols did not lower voice quality, but connection quality was high in the DTLS based security protocol. As the protocol was applicable to signaling and media paths based on DTLS, we found that it can be a solution for the limited resources of VoIP phone.