• Title/Summary/Keyword: UDP/IP

Search Result 152, Processing Time 0.029 seconds

Evaluation of Security Protocols for the Session Initiation Protocol (SIP 보안 프로토콜의 성능 분석)

  • Cha, Eun-Chul;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.55-64
    • /
    • 2007
  • Behind the popularity of VoIP in these days, it may present significant security challenges in privacy and accounting. Authentication and message encryption are considered to be essential mechanisms in VoIP to be comparable to PSTN. SIP is responsible for setting up a secure call in VoIP. SIP employs TLS, DTLS or IPSec combined with TCP, UDP or SCTP as a security protocol in VoIP. These security mechanisms may introduce additional overheads into the SIP performance. However, this overhead has not been understood in detail by the community. In this paper we present the effect of the security protocol on the performance of SIP by comparing the call setup delays among security protocols. We implement a simulation of the various combinations of three security protocols and three transport layer protocols suggested for SIP. UDP with any combination of security protocols performs a lot better than the combination of TCP. TLS over SCTP may impose higher impact on the performance in average because TLS might have to open secure channels as the same number of streams in SCTP. The reasons for differences in the SIP performances are given.

Development of ETI Management System based on T-DMB (지상파 DMB기반의 ETI 관리시스템 개발)

  • Im, Kwan-Chul;Lee, Hyung;Kim, Jong-Moon;Jin, Sung-Il
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.845-848
    • /
    • 2006
  • In this paper, a ETI management system for a variety of media services based on Terrestrial-Digital Multimedia Broadcasting(T-DMB) is introduced. This system consists of DMB I/O board and DMB multiplexer. The system transforms media data stream over IP(TCP/IP or UDP/IP) for these services to ETI frame(G.703) pushed to T-DMB transmitter.

  • PDF

Development of The DCCP for Data Reliability in IP Traffic System (IP기반 교통시스템에서 데이터의 신뢰성을 위한 DCCP 개발)

  • Park, Hyun-Moon;Seo, Hae-Moon;Lee, Gil-Yong;Park, Soo-Hyun;Kim, Sung Dong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.7-17
    • /
    • 2010
  • ITS(Intelligent Transport System) as things are used for Broadcast service using TDMB/TPEG/NAVI rather than personal seamless service. It is attaching weight to Traffic information gathering, Charging, Settlement service. This research is applied to improve DCCP(Datagram Congestion Control Protocol) which has function as protecting data and preserving message boundary. The improving method is like that we solve data trust in UDP because Connection and Transmission overhead in UDP is less than in TCP. We fix the data loss which is generated from unordered delivery section of IP base wireless service by using DCCP protocol. We guarantee of connection with OBE(On-Board Equipment) and reliance about transmission of data by complement to mapping table and multi-hoping. Finally, We evaluate the performance about transmission of IP based data. We constructed a test-bed near research center for this test.

IPsec Support for NAT-PT in IPv6 Transition Mechanisms (IPv6 전환 기술 중 NAT-PT에서의 IPsec 적용 방안)

  • Choi Inseok;Kim Younghan;Park Yongseok;Jung Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.736-743
    • /
    • 2005
  • NAT-PT is one of the IPv6 transition mechanisms, as defined in RFC2766, allowing IPv6-only devices to communicate with IPv4-only devices and vice versa. In NAT-PT, sender fail to verify TCP/UDP checksum and authentication data due to IP translation in the NAT-PT server The NAT-PT, therefore, has a limit to applying the IPsec that provides the end-to-end security such as confidentiality, authentication, and integrity. This paper proposes a scheme to apply the IPsec using IP HTI in NAT-PT environment.

A Study for Vulnerability of Security of the UPnP Home-Networking (UPnP 홈네트워크 보안 취약점에 관한 연구)

  • Oh, Im-Geol;Lee, Jong-Il
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.2
    • /
    • pp.30-36
    • /
    • 2007
  • The UPnP uses the same standard protocol as SSDP and UDP based on standard internet and technology like the TCP/IP, and is independent of other physical networking product. But the structure of the UPnP has the of vulnerability to the security countermeasure for home-networking technology since it is operated on the same protocol as the SSDP and UDP. In this paper, we analyze and report against the DoS attack, where the worm virus, using the vulnerability to the UPnP, eliminates the attack of all equipments that are based on networking and eliminates the information belonging to the equipments of the home-networking or transmits the massive data.

  • PDF

Host Interface Design for TCP/IP Hardware Accelerator (TCP/IP Hardware Accelerator를 위한 Host Interface의 설계)

  • Jung, Yeo-Jin;Lim, Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.2B
    • /
    • pp.1-10
    • /
    • 2005
  • TCP/IP protocols have been implemented in software program running on CPU in end systems. As the increased demand of fast protocol processing, it is required to implement the protocols in hardware, and Host Interface is responsible for communication between external CPU and the hardware blocks of TCP/IP implementation. The Host Interface follows AMBA AHB specification for the communication with external world. For control flow, the Host Interface behaves as a slave of AMBA AHB. Using internal Command/status Registers, the Host Interface receives commands from CPU and transfers hardware status and header information to CPU. On the other hand, the Host Interface behaves as a master for data flow. Data flow has two directions, Receive Flow and Transmit Flow. In Receive Flow, using internal RxFIFO, the Host Interface reads data from UDP FIFO or TCP buffer and transfers data to external RAM for CPU to read. For Transmit Flow, the Host Interface reads data from external RAM and transfers data to UDP buffer or TCP buffer through internal TxFIFO. TCP/IP hardware blocks generate packets using the data and transmit. Buffer Descriptor is one of the Command/Status Registers, and the information stored in Buffer Descriptor is used for external RAM access. Several testcases are designed to verify TCP/IP functions. The Host Interface is synthesized using the 0.18 micron technology, and it results in 173 K gates including the Command/status Registers and internal FIFOs.

Implementation of Local Distribution Audio System Based on AoIP (AoIP 기반 지역분산형 오디오시스템의 구현)

  • Kang, Min-Soo;Lee, Sang-Wook;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2165-2170
    • /
    • 2008
  • In this parer, it is implemented a Local distribution Audio System, based on AoIP(Audio over Internet Protocol) of a part of TCP/IP Network which belongs to Internet transmission technology. The system is controlled based on SNMP(Simple Network Management Protocol) and it is transferred to UDP as packet after changing from Analog audio sources to Digital audio sources. The implemented Local distribution Audio System have presented practical possibilities in PA system transmitting various audio sources to several areas, dispersedly and using multichannel audio like Home theaters in the limelight, recently.

Evaluation of realtime communication over TCP/IP network for industrial automation (공장 자동화를 위한 TCP/IP 네트웍에서의 실시간 통신에 관한 연구)

  • 윤영찬;박재현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1032-1035
    • /
    • 1996
  • While Ethernet and TCP/IP are the most widely used protocol, for Real-time system, it is not applicable because it doesn't guarantee the deterministic transmission time. Furthermore, the TCP acknowledgement scheme and sliding window algorithm enforce to collide packets. Although various Collision-Free CSMA protocol was presented, it is very difficult to implement in well known OS(UNIX, WilidowsNT) because we have to modify network kernel. This paper presents another transmission protocol based on modified UDP. The colliding probability can be minimized by avoiding successive packet transmission and decreasing competition duration. The proposed algorithm can be used for the soft real-time industrial automation network.

  • PDF

Design and Implementation of tiny UDP/IPv6 Protocols for Sensor Networks (센서 네트워크를 위한 초소형 UDP/IPv6 프로토콜 설계 및 구현)

  • Jung, Ki-Jin;Lee, Jun-Seob;Kim, Yong-Woon;Sohn, Young-Ho;Lee, Wan-Jik;Heo, Seok-Yeol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.4
    • /
    • pp.73-82
    • /
    • 2008
  • Collecting and managing the sensor information through the Internet is critical to effectively manage and utilize the sensor information. The interworking technique of the sensor network and internet is required to realize the desirable condition for managing and utilizing the sensor information. Among many interworking techniques, the translation technique using the gateway had been widely studied. However, the technique which mounts IP-based Internet protocols directly on the sensor node is getting more attention recently. Particularly, IPv6 is suitable for the communication protocol for the sensor network, because its features, such as abundant address space or address auto-configuration, are well matched with the sensor network. In this paper, we design the tiny UDP/IPv6 protocol functions which are suitable for the sensor network environment, and we implemented the functions with TinyOS based nesC. After we examined the simulation results of by using TOSSIM and TinyViz, we carried out the experimental performance evaluation for the program by mounting the tiny UDP/IPv6 on the sensor node (Mote).

  • PDF

PVM Performance Enhancement over a High-Speed Myrinet (초고속 Myrinet 통신망에서의 PVM 성능 개선)

  • Kim, In-Soo;Shim, Jae-Hong;Choi, Kyung-Hee;Jung, Gi-Hyun;Moon, Kyeong-Deok;Kim, Tae-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.74-87
    • /
    • 2000
  • PVM (parallel virtual machine) provides a programming environment that allows a collection of networked workstations to appear as a single parallel computational resource. The performance of parallel applications in this environment depends on the performance of data transfers between tasks. In this paper, we present a new Myrinet-based communication model of PVM that improves PVM communication performance over a high-speed Myrinet LAN. The proposed PVM communication model adopts a communication mechanism that allows any user-level process to directly access the network interface board without going through UDP/IP protocol stacks in the kernel. This mechanism provides faster data transfers between PVM tasks over the Myrinet since it avoids data copy overhead from kernel (user space) to user space (kernel) and reduces communication latency due to network protocol software layers. We implemented EPVM (Enhanced PVM), our updated version of the traditional PVM using UDP/IP, that is based on the proposed communication model over the Myrinet. Performance results show EPVM achieves communication speed-up of one to two over the traditional PVM.

  • PDF