• Title/Summary/Keyword: IP infrastructure

Search Result 147, Processing Time 0.023 seconds

Impact Analysis of Intellectual Property Infrastructure

  • Sohn, Soo Jeoung
    • STI Policy Review
    • /
    • v.4 no.2
    • /
    • pp.1-18
    • /
    • 2013
  • As the value and role of intellectual property increases in our knowledge-based economy, countries around the world have exerted various efforts to secure, utilize, and protect their intellectual property. The present study diagnoses the level of IP infrastructure of major OECD countries and analyzes their characteristics and impact. According to the diagnosis, the US, Switzerland, and Germany form a leading group followed by the mid-level countries of Korea, Ireland, Australia, and France, with Spain and Italy in the bottom group. In contrast to Korea's competitiveness in S&T and R&D infrastructures, its competitiveness in IP infrastructure is lower than the OECD average. This is thought to be due to Korea's IP infrastructure being hastily formed under the influence of international pressures rather than having been gradually built up by internal needs. A TFP analysis of the impact of IP infrastructure on economic growth shows IP infrastructure positively influences economic growth. Though this analysis is limited due to inability to secure sufficient data and indicators, it is a useful guide for understanding the nature and key characteristics of IP infrastructure.

A study on the availability of IP Telephony Network (KOREN망을 통한 IP전화망의 가용성에 관한 연구)

  • Cho, Sok-Pal
    • The Journal of Information Technology
    • /
    • v.12 no.1
    • /
    • pp.21-27
    • /
    • 2009
  • Telecommunications infrastructure based on circuit switch network is rswidly migrating to "all IP" network. However migration to IP has betw slower thaw in mawy other ve "icals because the potis ial risks and adve se impact of se vice impedi is s that may result from a migration ofttw outweigh the btwefi s of IP network. IP Telephony network has several strattgy for the replace is rof the existing Privatto nranch Exchangt, the construction of new IP networks cswible of suwoo "ing multiple communication se vices and applications, includirattgytelephony and the t ofgration of the remainiratexisting Privatto nranch Exchangts t oo new IP tfor the repfrastructure. ThTele "icle suggts s the IP tfor the network infrastructure for migration.

  • PDF

Implementation of QoS Control Function in SIP based VoIP System (SIP 기반 VoIP 시스템에서 QoS 제어기능 구현)

  • 라정환;윤덕호;김영한;김은숙;강신각
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.18-26
    • /
    • 2003
  • In this paper, we design and implement a QoS control function in the SIP-based VoIP system. As a network infrastructure for VoIP service, we select the Intserv over Diffserv architecture where the network resources are managed by a call admission control mechanism. The SIP protocol extended to support QoS signaling procedure is modulized to operate independently with the infrastructure. The performance of the QoS-enabled VoIP system is verified by experiments.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

A Study analysis and solutions to the problems related to use of IP phones in ALL IP environment and IMS server products (All IP 환경에서 상용화 IP Phones 과 IMS 서버 제품 군에 대한 문제점 분석 및 해결 방안연구)

  • Chung, In-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.581-584
    • /
    • 2010
  • Based on superspeed nation-wide communication infrastructure, high speed and high quality ALL IP communication network is created. It is a point in time where such infrastructure allows residential and commercial phones to be ported from PSTN to IP network. The problem experienced on IP phones in ALL IP environment and IMS server products are not easily approachable and dealt with. Therefore, this paper discusses approaches used in analyzing and resolving problems before they actually occur. This paper first discusses briefly the IP phones used in IMS network and their related problems. Then next topic deals with characteristics of these problems and current status. Last but not least, the causes of the problems are analyzed and solutions to these problems are introduced. Also discussed are solutions to possible future issues followed by conclusion.

Authentication System Construction in a high-speed IP Infrastructure using Spam Sever (SPAM 서버를 이용한 초고속 IP 기반의 인증시스템 구축)

  • Lee Jae-Wan;Ko Nam-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1501-1505
    • /
    • 2004
  • The authentication system of high-speed internet in IP-infra is not warm enough to administration of systematic authentication information for user's legalization, connection right and resources allocation in order to both methods of authentication-unauthentication connection system according to transmission method . Also unauthentication connection raises a difficulty condition to user's needs satisfaction in order to a load weighting of system and network and a drop of transmission speed. Accordingly, this study brings forth authentication system construction in a high-speed IP infrastructure using spam sever able to construct the suitable network condition according to unifying authentication-unauthentication system for single authentication system.

An RFID Multi-Reader System Development for TCP/IP Based Security Control (TCP/IP 기반 보안통제 RFID 멀티리더 시스템 개발)

  • Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1587-1592
    • /
    • 2009
  • RFID is Playing a central role in ubiquitous technology according with the advent of the ubiquitous era, and the development of an RFID reader is also emerging as an important technical development field. In this paper, we developed a hardware system which is able to make use of the 13.56MHz RFID infrastructure being used as a transportation card, a credit card, and so on as well as the 125KHz RFID infrastructure being used in security company, and which is applicable to a location identification, an entrance and exit control, and security control over the TCP/IP communication. The existing local RFID methods have some problems which bottlenecks such as administrative problems, technical problems, and so force frequently occur because a casual server is placed and operated in a company. Hence, in this paper we developed an RFID multi reader which is connected to a central administrable server over the TCP/IP in order to solve these problems, and we make it be possible to keep an security control and be easy to install, transfer and administrate RFID infrastructures.

The Authentication Mechanism Using Public-Key infrastructure in Mobile IP Registration Protocol (Mobile-IP 등록 프로토콜에서 공개키를 이용한 인증 방안)

  • 박상준;홍충선;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3C
    • /
    • pp.211-219
    • /
    • 2002
  • Mobile IP(RFC2002) is representative protocols that support mobility to host. In this paper, we propose a mobile IP registration protocol using public-key based certificates and CA(certification authority). Our proposed protocol authenticates the registration message of mobile node and prevents replay attack and minimal use of public key cryptography, Also, Our proposed protocol directly authenticates between agents and mobile nodes using certificates. Though the computer simulation, we prove that our proposal has better performance than the previous public-key based Mobile IP registration protocol.

A Study on Mobile-IP-based Interworking Model for IMT-2000 Network (IMT-2000망을 위한 Mobile-IP기반 연동모델에 대한 연구)

  • 박병섭;이동철
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.2
    • /
    • pp.85-90
    • /
    • 2002
  • This paper presents tuo implementation models for wireless service operators to offer Mobile-IP over IMT-2000 Data service under IMT-2000 network by taking advantage of the existing infrastructure for IMT-2000 services. For this purpose, a new Mobile-IP over IMT-2000-based protocol architectures are introduced and service operation schemes and handoff schemes according to various scenarios of packet data services in the IMT-2000 core network are presented. Also, this paper describes the handoff scheme in terms of channel states.

  • PDF