• Title/Summary/Keyword: Ip convergence

Search Result 423, Processing Time 0.023 seconds

A Study on The Improvement of Multidisplinary Structure Technique of Ethrnet Network based of PC Serial Communication (PC 시리얼통신 기반의 이더넷 네트워크 융복합 구성 기술 성능 향상에 관한 연구)

  • Jin, Hyun-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.263-269
    • /
    • 2015
  • This paper suggest remote control technic using TCP/IP protocol network after UART serial communication implemented through RS-232 cable to ethernet module. This is multidisplinary signal technique which is PC signal is converted to internet communication signal. Ethernet module is WIZ1000SR. This is gate module which convert RS-232 protocol to TCP/IP protocol. This module convert serial data transmitted serial device to TCP/IP type data, in contrast TCP/IP data received through network converted to serial data transmitted to serial device. This paper propose that the lower subnet internet layer UDP module make the higher speed in control board than TCP/IP signal.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

An Internet Telephony Recording System using Open Source Softwares (오픈 소스 소프트웨어를 활용한 인터넷 전화 녹취 시스템)

  • Ha, Eun-Yong
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.225-233
    • /
    • 2011
  • Internet telephony is an Internet service which supports voice telephone using VoIP technology on the IP-based Internet. It has some advantages in that voice telephone services can be accompanied with multimedia services such as video communication and messaging services. Recently, the introduction of smart phones has led to a growth in social networking services and thus, the research and development of Internet telephony has been actively progressed and has the potential to become a replacement for the telephone service that is currently being used. In this paper we designed and implemented a recording system which records voice data of SIP-based Internet telephone's voice calls. It is developed on the linux system and has some features such as audio mixing of two in/out voice channels, live packet sniffing, and the ability to transfer mixed audio files to the log file server. These functions are implemented using various open source softwares. Afterwards, this VoIP recording system will be applied as a base technology to advanced services like a VoIP-based call center system.

The core information protection mechanism in the BcN(Broadband Convergence Network) (BcN(Broadband Convergence Network) 환경에서의 중요정보에 대한 도청방지 메카니즘)

  • Oh, Sek-Hoan;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.14-26
    • /
    • 2008
  • IP over Ethernet technology widely used as Internet access uses the ARP(Address Resolution Protocol) that translates an ip address to the corresponding MAC address. recently, there are ARP security attacks that intentionally modify the IP address and its corresponding MAC address, utilizing various tools like "snoopspy". Since ARP attacks can redirect packets to different MAC address other than destination, attackers can eavesdrop packets, change their contents, or hijack the connection. Because the ARP attack is performed at data link layer, it can not be protected by security mechanisms such as Secure Shell(SSH) or Secure Sockets Layer(SSL). Thus, in this paper, we classify the ARP attack into downstream ARP spoofing attack and upstream ARP redirection attack, and propose a new security mechanism using DHCP information for acquisition of IP address. We propose a "DHCP snoop mechanism" or "DHCP sniffing/inspection mechanism" for ARP spoofing attack, and a "static binding mechanism" for ARP redirection attack. The proposed security mechanisms for ARP attacks can be widely used to reinforce the security of the next generation internet access networks including BcN.

Studying on Mobile backhaul Based on FTTH network (FTTH 인프라를 이용한 이동통신 기지국 백홀 제공방안 연구)

  • Kim, Geun-Young;Kim, Jin-Hee;Woo, Kyung-Il
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.78-80
    • /
    • 2009
  • In this paper, we have described the advantages of fixed mobile convergence access network based on FTTH. Also, we have investigated the possibility of mobile backhaul based on FTTH network combined TOM over IP emulation and adaptive clock recovery technologies, and verified successful transport of both E1 TDM traffic and Clock through the packet based PON network. within the allowable tolerance.

  • PDF

BcN/NGN에서의 세션제어 기술

  • Lee, Yeong-Seok;Kim, Yeong-Han
    • Information and Communications Magazine
    • /
    • v.24 no.3
    • /
    • pp.44-52
    • /
    • 2007
  • BcN (Broadband Convergence Network) / NGN (Next Generation Network)은 통신 방송 인터넷이 융합된 품질 보장형 광대역 서비스를 언제 어디서나 안전하게 즐길 수 있게 하는 차세대통신망이다. 이중 세션제어 기술은 VoIP, 영상전화와 같이 연속적으로 이어지는 세션 형태의 서비스를 제어해주는 기술로서 H.323, Megaco, SIP등을 기본프로토콜로 사용하던 기존의 VoIP망 기술에서 현재는 3GPP ($3^{rd}$ generation partnership project)에서 표준화 된 IMS (IP multimedia subsystem) 를 기반기술로 채택하여 다양한 세션기반 응용서비스를 개발하고 있다. 본 고에서는 BcN/NGN에서의 세션제어 기술인 IMS의 등장 배경과 요소 기술, 동작 절차를 살펴본다.

Design and Implementation of SIP Testing Simulator for Security Management (보안관리를 위한 SIP 시험 시뮬레이터 설계 및 구현)

  • Jang, Sung-Man;Kill, Min Wook;Lee, Geuk;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.99-107
    • /
    • 2003
  • One of the most important part in next generation VoIP is security management. When we develop a protocol stack based on SIP (Session Initiation Protocol), it is necessary to develop test scenario, test environment, adaptation test technology for security test of the system. In this paper, we design and implement security test environment and test program for SIP. This system also can be used as a fundamental system when someone develop a communication system based on SIP.

  • PDF

Study of applicable security tunneling technique for military wireless network (군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구)

  • Kim, Yun-young;Namkung, Seung-Pil
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.107-112
    • /
    • 2015
  • Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.

A PRECISE AUDIO/VIDEO SYNCHRONIZATION SCHEME FOR MULTIMEDIA STREAMING

  • Chi, Won-Sup;Jung, Soon-Heung;Yoo, Jeong-Ju;Seo, Kwang-Deok
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.49-54
    • /
    • 2009
  • Synchronization between media is an important aspect in the design of multimedia streaming system. This paper proposes a precise media synchronization mechanism for digital video and audio transport over IP networks. To support synchronization between video and audio bitstreams transported over IP networks, RTP/RTCP protocol suite is usually employed. To provide a precise mechanism for media synchronization between video and audio, we suggest an efficient media synchronization algorithm based on NPT (Normal Play Time) which can be derivable from the timestamp information in the header part of RTP packet generated for the transport of video and audio streams. With the proposed method, we do not need to send and process any RTCP SR (sender report) packet which is required for conventional media synchronization scheme, and accordingly could reduce the number of required UDP ports and the amount of control traffic injected into the network.

  • PDF

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF