• Title/Summary/Keyword: Network Convergence IP

Search Result 218, Processing Time 0.028 seconds

A Study on the Optimal All-IP Network Design for Adopting IPTV Traffic (All-IP 네트워크에서 IPTV 트래픽 수용을 위한 최적의 설계 방안 연구)

  • Kim, Hyoung-Soo;Cho, Sung-Soo;Seol, Soon-Uk;Jun, Yun-Chul
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.68-71
    • /
    • 2009
  • All-IP network requires change of the existing IP network engineering methods as the convergence service market between communication and broadcasting industries using IP network is growing rapidly. Especially the video services like IPTV require more strict transmission quality and higher bandwidth than the existing data services. So it is difficult to design All-IP network by the over-provisioning method which used to be used for the existing IP network design. It also requires a heavy investment which becomes one of big obstacles to the IPTV service expansion. In order to reduce the investment costs, it is required to design an optimized network by maximizing the utilization of the network resources and at the same time maintaining the customer satisfaction in terms of service quality. In this paper, we first analyze the effects of IPTV traffic on the existing internet. Then we compare two traffic engineering technologies, which are dimensioning without admission control and dimensioning with admission control, on the All-IP network design by simulation. Finally, we suggest cost effectiveness of traffic engineering technologies for designing the All-IP network.

  • PDF

Visualization of network traffic attack using time series radial axis and cylindrical coordinate system (시계열 방사축과 원통좌표계를 이용한 네트워크 트래픽 공격 시각화)

  • Chang, Beom-Hwan;Choi, Younsung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.17-22
    • /
    • 2019
  • Network attack analysis and visualization methods using network traffic session data detect network anomalies by visualizing the sender's and receiver's IP addresses and the relationship between them. The traffic flow is a critical feature in detecting anomalies, but simply visualizing the source and destination IP addresses symmetrically from up-down or left-right would become a problematic factor for the analysis. Also, there is a risk of losing timely security situation when designing a visualization interface without considering the temporal characteristics of time-series traffic sessions. In this paper, we propose a visualization interface and analysis method that visualizes time-series traffic data by using the radial axis, divide IP addresses into network and host portions which then projects on the cylindrical coordinate system that could effectively monitor network attacks. The proposed method has the advantage of intuitively recognizing network attacks and identifying attack activity over time.

Technical Trend of Mobile VoIP (Mobile VoIP 기술 동향 및 분석)

  • Lee, Young-Pyo;Park, Jun-Su;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.97-101
    • /
    • 2008
  • Voice over IP is a telephone service which sends and receives the voices through the Internet. Because the infrastructure of wireless and mobile communication networks such as 3G, Wi-Fi and WiMAX has expanded, the study about Mobile VoIP, which provides the voice service from wireless network, has been actively in progress. Since Rei 6 HSPA in 3GPP and Rev A lxEVDO in 3GPP2, VoIP through the data channel is more efficient than circuit switch. It is predicted that VoIP over 4G will be more effective and 4G mobile VoIP business will be vitalized in the future. In addition, there are businesses which offer VoWLAN by using software such as Skype and Fring. They provide services which cheapen the price of international calls and long distance calls. This paper will present the Korean and other countries' mobile VoIP trends, its classification along the network connection, the study on techniques, and conditions of mobile VoIP. It also will be described a view of terminal convergence and service convergence.

  • PDF

Preconfigured Multicast Delivery Tree in Mobile IP (Mobile IP에서 기설정된 전달 트리를 이용한 멀티캐스팅 방안)

  • C.B. Chun;C.H. Kang;Lee, J.H.;Kwon, K.H.;Kim, B.S.;Hong, J.P.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.76-78
    • /
    • 2002
  • Multicasting over mobile IP network becomes more important with the increasing needs of supporting multimedia services in mobile network. The IETF has suggested two approaches which are remote subscription and bidirectional tunneling for supporting mobility management in multicasting over mobile IP. But these protocols have problems - the frequent reconstruction of multicast delivery tree, packet less during handoff, convergence problem, and so on. In this paper, we propose to use preconfiguration of multicast delivery tree when mobile host enters the foreign network. It will decrease the frequency of multicast delivery tree reconstruction, and reduce the packet loss during handoff, Also the multicast delivery tree maintained by Keep Alive messages makes the signaling overload of networks diminished.

  • PDF

Active Routing Mechanism for Mobile IP Network (모바일 IP 네트워크를 위한 액티브 라우팅 매커니즘)

  • Soo-Hyun Park;Hani Jang;Lee-Sub Lee;Doo-Kwon Baik
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.3
    • /
    • pp.55-68
    • /
    • 2003
  • As mobile IP has been suggested only to support mobility of mobile station(MS) by which it dose nothing but guarantee MS's new connection to the network, it is for nothing in Quality of Service(QoS) after handoff of MS. QoS is very important factor in mobile IP network to provide multimedia applications and real-time services in mobile environment, and it is closely related to handoff delay Therefore as a main issue in mobile IP research area, handoff delay problem is actively studied to guarantee and promote QoS. In this paper, in order to resolve such a problem, we suggest Simple Network Management Network(SNMP) information-based routing that adds keyword management method to information-based routing in active network, and then propose QoS controlled handoff by SNMP information-based routing. After setting up routing convergence time, modeling of suggested method and existing handoff method is followed in order to evaluate the simulations that are carried out with NS-2. The result of simulation show the improvement of handoff delay, and consequently it turns off the QoS has been improved considerably.

  • PDF

Implementation of QoS-Measuring System for Voice over IP (VoIP(Voice over Internet Protocol) 품질 측정을 위한 UA(User Agent) 및 서버 기능 연구)

  • Kang, Hyun-Joong;Nam, Heung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.137-144
    • /
    • 2007
  • Advances in networking technology digital media, and codecs have made it possible for the Internet evolves into a Broadband convergence Network (BcN) and provides various services including Voice over Internet Protocol (VoIP) and IPTV over their high-speed IP networks. In order for the Internet to make a profit as traditional Public Switched Telephone Network (PSTN), it must provide high qualify VoIP services. Therefore, real time qualify measurement framework is the most important requisite to provide VoIP service. For this, IETF (Internet Engineering Task Force) defined RTCP-Extended Reports (RTCP-XR) that extend RTCP (Real-Time Transport Protocol Control Protocol). However, procedure and method tot actually VoIP qualify measurement did not recommended nothing but defined item to measure voice quality. Our objective in this paper is to describes a practical measuring framework for end-to-end QoS of switched voice packet in an IP environment. It includes concepts as well as step-by-step procedures for measuring packetized voice streams. It also proposes new formats that extend RTCP-XR's concept.

  • PDF

The Interoperability Issue in Broadband Convergence network Implementation (광대역통합망 구축에서 상호운용성 이슈)

  • Lee, Jae-Jeong;Ryu, Han-Yang;Nam, Ki-Dong;Kim, Chang-Bong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.57-64
    • /
    • 2011
  • The NGN (Next Generation Network) means the kernel infrastructure technology to provide information and communication services which are able to be used at present and future when a ubiquitous computing era has been realized. In other words, NGN can be the frame providing the same information and communication services anytime and anywhere regardless of wire and wireless. The broadband convergence network that has been built in the public institution has established a broadband multimedia communication network supporting voice telephone, task net, internet network, video conference network, voice over IP (VoIP) network and etc. It is possible for a requested bandwidth and services to be served, only if a broadband convergence network provide the interoperability between the various classes which include a transport network layer, network control layer, service control layer and other layers. In this paper, we analyzed the interoperability issues of the present broadband convergence network and propose a guideline for the future one.

A Study on General Network Framework for Service Mobility (서비스 이동성을 위한 일반적인 네트워크프레임워크 연구)

  • You, Tae-Wan;Lee, Seung-Yun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2069-2074
    • /
    • 2006
  • The Next generation network may describe one integrated network by IP (Internet Protocol) convergence and combining various access technologies. The IP version 6 (IPv6) becomes fundamental protocol and the terminal offered various services is having mobility, multihoming, and intelligent as well as smaller. In this convergence network, which integrate mobile network, broad cast network, and Internet as well as PSTN, can provide all of the service. In this context, we will briefly present that the end node should be required ubiquitous computing and networking. That is to say that we must guarantee the end node in any time, my place, my where, and offer continuously services to the node. As like this, Service Mobility is given if a user can obtain subscribed and personalized services consistently even if connected to a foreign network service provider. In other words, Service mobility allows users to maintain access to their services even while moving or changing devices and network service providers. In this paper, we have to refer technical consideration items to make the service mobility framework.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

A Study on the Network Access Control of a System in Real Time by Network Address Authentication Based on Policy in the VLAN Environments (VLAN 환경에서 네트워크 주소 인증을 통한 정책 기반 실시간 시스템 제어 기술 연구)

  • Choi, Won-Woo;Ahn, Seong-Jin;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.35-43
    • /
    • 2005
  • It is need to control network access that a user personally change own IP or network devices in managing network address. Also, When we use new network devices or assign network address, we do them by design, not arbitrarily. And then, we can immediately control network's problems. It could be used network management and security in low level. But most of managers do this works by hand not automatically. This paper propose the solutions that improve the security by network address authentication in VLAN environment, such as corporations and public offices.

  • PDF