• Title/Summary/Keyword: IP Network

Search Result 2,373, Processing Time 0.029 seconds

Design of Multiple VoIP Service Networks for P2P Network Environments based on Portable Internet (휴대인터넷 기반 P2P 망 환경에서의 다자간 VoIP 서비스 망 설계)

  • Eom Ki-Bok;Yoe Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1640-1646
    • /
    • 2004
  • In this study, we propose the multiple VoIP service networks for P2P network environments based on portable internet. We found that voiceservice using portable internet is possible for real time services. After we designe the multiple VoIP service networks for P2P network environments based on portable internet, evaluate the performances. from the performance evaluations, we found satisfactory results and so we can expect the possibility of the portable internet services.

Mobility Management for Next Generation $IP^2$ Mobile Network Architecture (차세대 $IP^2$ 모바일 네트워크아키텍처에서의 이동성 관리)

  • 박수현
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.123-130
    • /
    • 2004
  • 모바일 인터넷 액세스 서비스에서의 트래픽은 음성위주에서 동영상에 기반 한 멀티미디어 서비스로 급속히 전이되고 있으며 그 속도는 점차 가속되고 있다. 따라서 이러한 멀티미디어 트래픽을 보다 효율적이고 신속히 처리하기 위하여 IP에 기반 한 'Beyond IMT-2000(3G 및 그 이후 세대)' 네트워크의 필요성이 대두되고 있다. 본 논문에서는 모바일 환경에서 대용량의 멀티미디어 트래픽을 보다 효율적이고 신속히 처리하고 유비쿼터스 컴퓨팅 환경을 지원하기 위한 'Beyond IMT-2000' 네트워크의 의미를 가진 다양한 Seamless 서비스를 제공해 주는 IP에 기반하고 있는 IP$^2$네트워크의 개념 및 아키텍처에 대하여 서술한다. 나아가 본 논문은 모바일 전달매체의 역할을 수행하는 IP$^2$ 트랜스포트 네트워크의 설계 시 요구되는 필요사항을 IP-BB의 관점에서 정의하였으며 이와 같은 요구사항을 충족시킬 수 있는 방안을 설명하였다.충족시킬 수 있는 방안을 설명하였다.

  • PDF

IP Assignment Analysis Based on DHCP at High-speed Network (초고속통신망에서 DHCP 기반의 IP 할당 분석)

  • Kim, Hyoung-Jin;Cho, Hyun-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2300-2305
    • /
    • 2009
  • Recently, Telecommunication companies have introduced a new network architecture that assigns network resources consistent and protects their systems more secure. Now, they provide multimedia services through various types of access networks. In this study, I'd like to introduce IP address assignment method based on the Dynamic Host Configuration Protocol (DHCP) and find out how success or failure of Ip address assignment will be taken place according to the booting order of xDSL modem, AP and PC.

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

FDANT-PCSV: Fast Detection of Abnormal Network Traffic Using Parallel Coordinates and Sankey Visualization (FDANT-PCSV: Parallel Coordinates 및 Sankey 시각화를 이용한 신속한 이상 트래픽 탐지)

  • Han, Ki hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.693-704
    • /
    • 2020
  • As a company's network structure is getting bigger and the number of security system is increasing, it is not easy to quickly detect abnormal traffic from huge amounts of security system events. In this paper, We propose traffic visualization analysis system(FDANT-PCSV) that can detect and analyze security events of information security systems such as firewalls in real time. FDANT-PCSV consists of Parallel Coordinates visualization using five factors(source IP, destination IP, destination port, packet length, processing status) and Sankey visualization using four factors(source IP, destination IP, number of events, data size) among security events. In addition, the use of big data-based SIEM enables real-time detection of network attacks and network failure traffic from the internet and intranet. FDANT-PCSV enables cyber security officers and network administrators to quickly and easily detect network abnormal traffic and respond quickly to network threats.

User Access Control and Authentication System in VoIP Service Environment (VoIP 서비스 환경에서의 사용자 접근 통제 및 인증시스템)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Han, In-Sung;Ryou, Hwan-Bin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.63-66
    • /
    • 2007
  • 인터넷 상에서 음성데이터를 전달하는 VoIP는 기존의 PSTN망을 대체하는 수단으로 환영받고 있다. 음성데이터를 인터넷 프로토콜 데이터 패킷으로 변환하여 데이터가 일반 IP망에서 전달이 가능하게 해주어 기존 일반 전화망에 비해 요금이 저렴하고 확장성이 뛰어난 특징을 가지고 있다. 이러한 VoIP서비스가 점차 증가함에 따라 보안의 취약점 및 서비스의 질이 저하되는 문제가 발생하고 있다. 이러한 점을 줄이기 위해 본 논문은 기존의 VoIP에 AA(Attribute Authority) Server를 추가하여서 보안성 및 사용자 접근에 차등을 줄 수 있는 인증 시스템을 설계하였다.

  • PDF

Analysis of IP/WDM Traffic Engineering Model (IP/WDM 트래픽 엔지니어링 모델의 분석)

  • Lim Seog-Ku
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.5
    • /
    • pp.378-383
    • /
    • 2005
  • Traffic engineering is a technology that guarantees quality of service that users want and maximize inflection degree of network resources at the same time as evenly distributing traffic to whole network. To improve performance of network at traffic and resources level, traffic engineering aims at utilizing network resource efficiently and effectively and must be satisfied performance requirement concerned with traffic. In this paper, two models to embody traffic engineering are analyzed and finally functional structure of IP/WDM traffic engineering is explained.

  • PDF

A Scalable and Practical Authentication Protocol in Mobile IP (Mobile IP에서 확장성과 실용성 있는 인증 프로토콜 제안 및 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.35-44
    • /
    • 2005
  • In Mobile IP protocol, because a mobile node still uses its home IP address even though it moves to foreign network from home network, authentication among mobile node, foreign network and home network is critical issue. Many researches about this issue have been based on shared secret, for example mobile node and home agent authenticate each other with pre-shared symmetry key. And they missed several security issues such as replay attack. Although public key scheme could be applied to this issue easily, since the public key cryptography is computationally complicated, it still has the problem that it is not practical to realistic environment. In this paper, we describe several security issues in Mobile IP protocol. And we propose new Mobile IP authentication protocol that is applicable to realistic environment using public key algorithm based on certificate. It has scalability for mobile nodes and is applicable to the original Mobile IP protocol without any change. Finally we prove security of the proposed protocol and that it might not affect performance of the original Mobile IP protocol.

A study on the mobility control in the next generation wireless mobile network (차세대 무선 이동 통신망에서의 이 동성 제어 방안에 관한 고찰)

  • Kim, Duck-Jung;Kim, Jae-Hak;Kim, Hyoung-Taek;Ahn, Gil-Whan
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.273-278
    • /
    • 2007
  • In the next generation wireless mobile network, various methods are studied to offer interworking and mobility between various radio networks. To offer these harmoniously, network adaptation methods based on IP is generalized, and specifications of host-based mobility method with Mobile IPv4 and Mobile IPv6 to offer IP's mobility are defined in IETF specially. However, it is insufficient to satisfy quality of service that should be offered in wireless mobile network environment. Alternatively studies about Network-Based Mobility of Proxy Mobile IPv4, Proxy Mobile IPv6 etc. are preceded. This paper presents optimum plan that can offer mobility in the next generation radio transfer communication network by comparing and analyzing IP mobility methods divided by Host-based Mobility and Network-based Mobility.

  • PDF

Real-time Control on LonWorks/IP Virtual Device Network(VDN) for Rail Transit Vehicles (철도차량용 LonWorks/IP 가상 디바이스 네트워크 (VDN)에서의 실시간 분산제어)

  • Choi, Gi-Heung
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1253-1258
    • /
    • 2004
  • A general idea of implementing and managing real-time control on the VDN for rail transit vehicles is presented. In particular, the virtual device network considered in this paper is composed of Ethernet as the data network and LonWorks network as the device (control) network. A LonWorks/IP web server was used as a gateway to realize peer to peer data communication on the virtual device networks. Experimental results are given to validate the suggested architecture.

  • PDF