• Title/Summary/Keyword: IP Telephony

Search Result 97, Processing Time 0.042 seconds

Market Response of Household IP Telephony Services and Implications (가정용 인터넷전화 시장 반응분석 및 시사점)

  • Kim, H.
    • Electronics and Telecommunications Trends
    • /
    • v.21 no.2 s.98
    • /
    • pp.149-160
    • /
    • 2006
  • 본 고에서는 2005년 11월 실시된 시장조사결과를 바탕으로 가정용 VoIP 서비스의 시장 반응 분석 및 전망과 함께 시사점을 제시한다. 본 고에서 실시한 시장조사는 가정용으로 사용될 070 번호가 인터넷전화로서, 전용 IP 폰을 이용한 음성전화서비스, 기존전화에 모뎀만 추가 혹은 교체함으로써 가능한 음성전화서비스, 그리고 영상전화로 구분하여 제시하였다. 이들 각 서비스에 대해 가입의향, 가입/비가입 사유, 그리고 요금의지불의향 등을 조사하여 제시하였다. 결과를 요약하면 음성전용 전화의 주 가입이 유가경제성으로 나타난 반면 영상전화의 주 가입이유는 영상통화에 대한 기대로 나타났으며, 가입의향은 영상전화가 25.4%, 모뎀을 이용한 음성전화가 13.3%, 그리고 IP 폰을 이용한 음성전화가 6.5%로 나타나 영상전화에 대한 기대가 높게 나타났다. 또한 최대지불의향의 경우 현재 인터넷전화사업자들이 제시하고 있는 수준에서 지불의향이 형성되고 있는 것으로 조사되어 상기 가입의향의 과대추정은 미미한 것으로 보인다. 예상 가입 사업자는 KT가 67.3%로 나타나 인터넷전화 시장의 형성과 보급률의 증가는KT의 적극적 진입시점에 의해 크게 영향을 받을 것으로 예상된다.

The Implementation of VoIP Terminal using PPTP for Voice Security (PPTP를 이용한 VoIP 음성보안 단말기 구현)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.73-80
    • /
    • 2009
  • Although it is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with direct circuit, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. However, it is needed to ensure secret of voice call in a special situation. Due to the fact that many users can connect to the internet at the same time, VoIP can always be in a defenseless state by hackers. Therefore, in this paper, we have developed the increased voice security internet telephone terminal and measured conversation quality by adopting VPN PPTP based on SIP and using tunnel method in transmitting voice data to prevent eavesdrop of internet telephone.

  • PDF

Transmission Performance of VoIP Traffic under Blackhole Attacks on MANET (블랙홀 공격이 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.637-640
    • /
    • 2011
  • Recently, rapid spreading of smart-phone make an expectation for increase of practical application for MANET(Mobile Ad-Hoc Network) which is not used infrastructure like as base-station. One of important application for MANET will be VoIP(Voice over Internet Protocol) known as Internet telephony. On the other hand, information intrusions causing serious problems is not allowed exception of MANET. Especially, there are some dangerous problems of intrusions to MANET, differently to other networks, because of it's usage of military purpose or emergency application of rescue. In this paper, to analyze this intrusion problem on MANET with blackhohe attacks, effect of intrusion to transmission performance is studied. VoIP traffic is assumed as an application service on MANET, computer simulation with NS-2 is used for this analysis.

  • PDF

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Design Criteria of Dynamic Applications for Voice over Mobile IP (이동 인터넷 전화를 위한 동적 애플리케이션 개발 표준 설계)

  • 김동진;신인숙;설순욱;김명철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.442-444
    • /
    • 2002
  • 본 논문은 인터넷 전화 (Internet Telephony)의 대표적 프로토콜인 SIP의 이동성과 효율적인 네트워크 대역 이용에 관한 연구이다. 이동성을 제공하기 위해 모바일 IP를 사용하기에는 삼각 라우팅, 캡슐화 오버헤드와 같은 단점이 있다고 알려진 것에 비해 이러한 모바일 IP 기반 SIP 애플리케이션의 가능성과 적합성을 보인 기존의 연구 〔1〕에서 더 나아가 무선통신에서 발생하는 핸드오프 동안에도 패킷 손실을 최소화 할 수 있는 패킷 당 오디오 프레임 수의 상관관계를 설계하고, 무선통신 종단 간 물리적 거리 변화에 따라 동적으로패킷 당 프레임 수를 조절하여 적용할 수 있는 적응적 애플리케이션 개발을 위한 표준을 제시한다.

  • PDF

Design of B-ISDN Protocol embedded Internet-Phone PBX System (B-ISDN 프로토콜 내장의 인터넷 폰 교환시스템 설계)

  • Choi Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.821-831
    • /
    • 2006
  • In this paper we researched on the development methods and design of the B-ISDN protocol embedded Internet-Phone PBX System for the previous telephone exchange and communication. We designed the structure of the user terminal md exchange server of the Internet-Phone PBX System, defined message and data structure for call control, and designed call control message flows between sender and receiver terminal for user's communication.

Strategic Study of Internet-Phone Service Quality (인터넷전화(VoIP)서비스품질의 전략적 연구)

  • Kim, Ho-Joon;Cho, Jai-Rip
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2009.10a
    • /
    • pp.89-94
    • /
    • 2009
  • In the past few years with the popularization of the Internet using mobile devices such as the universal in the field of information technology has made rapid development and spread, the width and speed of change is also expected to grow much. As a result Internet telephony (VoIP) was to emerging, VoIP as a leader in next-generation converged services, the proliferation of IPTV services, including the successful introduction and subsequent convergence of the early to gauge whether the settlement is much distance in terms of importance. Therefore, this research using the Internet and telephone customer satisfaction survey, and Kano analysis is important from the perspective of the customer requirements by looking at what the Internet phone service in the development and improvement priorities are supposed to be able to stand.

  • PDF

A Study on Location discrimination and Application method using Internet Telephony Originating IP Address (인터넷전화 발신 IP 주소를 이용한 위치식별 및 응용방안에 관한 연구)

  • Ahn, Cheol-Joo;Shin, Seung-Jung;Ryoo, Dae-Hyun;Lee, Seok-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.622-624
    • /
    • 2012
  • 본 논문에서는, 인터넷전화환경에서 인터넷 전화단말의 물리적인 위치정보를 수신되는 단말의 IP 주소를 이용하여 획득하는 방안과, 그 단말로부터 호가 발신되는 경우, 그 물리적인 위치 식별코드를 발신번호에 포함하여 착신망 또는 착신단말로 전송하는 방안을 제시 함으로서, 보이스피싱 등, 인터넷전화 발신번호 변작에 의한 범죄의 피해를 예방하는데 응용할 수 있는 방안을 제시한다.

A Study on VoIP Security Risk Analysis and Countermeasure (VoIP 보안 위협 분석 및 대책 연구)

  • Kim, Hyun-Chul;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.277-280
    • /
    • 2011
  • VoIP is a technology of voice communication, using the existing internet network which sends and receives voice packets. VoIP has an advantage that VoIP is cheaper than an existing telephony, and the tech is vitalized lately. But recently you can download Volp Application in the Market that have a vulnerability(Anyone Can Upload). This weakness is wrongfully used that People are downloaded by encouraging about malignant code is planted. Signal intercepts indicates from this case. and paralysis by DDoS Attack, bypass are charged for hacking. Judging from, security threat of VolP analysis and take countermeasures. In the thesis we analyze the VoIP security caused on 'Soft Phone' and 'Smart Phone', and figure out security policies and delineate those policies on the paper.

  • PDF

VoIP Planning and Evaluation through the Analysis of Speech Transmission Quality Based on the E-Model (E-모델 기반 통화 품질 분석을 통한 VoIP Planning 및 평가)

  • Bae Seong Yong;Kim Kwang Hoon
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.31-43
    • /
    • 2004
  • Voice over Internet Protocol (VoIP) is currently a popular research topic as a real time voice packet transmission method. But current Internet environment do not guarantee the quality of voice when we take a side view of delay, jitter and loss. Up to now, many voice based evaluation algorithms have been used to measure speech quality of VoIP systems. However, these algorithms have the defects that their results are different according to voice samples and some algorithms can not take network environment for speech transmission path. The E-model can be used to solve the problems of these algorithms. In this paper. we introduce VoIP planning guidelines through the various analysis of E-model which can model impairments of network quality as well as VoIP equipment quality systematically, We, also, show the evaluation method and results of speech transmission quality.

  • PDF