• Title/Summary/Keyword: VO

Search Result 1,951, Processing Time 0.029 seconds

Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environment (모바일 환경에서 적용 가능한 SIP기반 인터넷전화(VoIP) 보안 통신 프로토콜 성능 평가)

  • Yoon, Seok-Ung;Jung, Hyun-Cheol;Che, Xuemei;Chu, Gyeong-Ho;Park, Han;Baek, Jae-Jong;Song, Joo-Seok;Yoo, Hyeong-Seon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.143-150
    • /
    • 2011
  • The adoption of VoIP is continuously increasing in public institutions, private enterprises and households due to cheaper cost and various supplementary services. Also, it is expected to spread widely the use of VoIP in mobile environment through the increasing use of smartphone. With the growing concern over the incidents of VoIP service while the VoIP service has become increasingly. Especially eavesdropping, it is possible to invade user privacy and drain the secret of company. So, it is important to adopt the protocols for VoIP secure communication. VoIP security protocols are already adopted in public institutions, but it is not adopted in private enterprises and households. In addition, it is necessary to verify whether the VoIP security protocol could be adopted or not in mobile VoIP due to its limited computing power. This paper compared the VoIP security protocol under fixed network and mobile network through performance evaluation. Finally, we found that it is possible to adopt the VoIP security protocols in mobile network.

Photocatalytic Decomposition of Rhodamine B over BiVO4 Doped with Samarium Ion (Sm 이온이 도핑된 BiVO4에서 로다민 B의 광촉매 분해 반응)

  • Hong, Seong-Soo
    • Clean Technology
    • /
    • v.27 no.2
    • /
    • pp.146-151
    • /
    • 2021
  • Pure and Sm ion doped BiVO4 catalysts were synthesized using a conventional hydrothermal method and characterized by XRD, DRS, SEM, and PL. We also examined the activity of these materials on the photocatalytic decomposition of rhodamine B under visible light irradiation. The doping of Sm ion into BiVO4 catalyst changed the ms-BiVO4 crystal structure into the tz-BiVO4 crystal structure in the low synthesis temperature. Light absorption analysis using DRS showed that all the catalysts displayed strong absorption in the visible range of the electromagnetic spectrum regardless of Sm ion doping. In addition, an amorphous morphology was shown in the pure BiVO4 catalyst, but the morphology of the BiVO4 catalyst doped with Sm ion was changed into an ellipse shape and also the particle size decreased. In the photocatalytic decomposition of rhodamine B, Sm ion doped BiVO4 catalyst showed higher photocatalytic activity than the pure BiVO4 catalyst. In addition, the Sm3-BVO catalyst doped with 3% Sm ion showed the highest photocatalytic activity, as well as the highest formation rate of OH radicals (•OH) and the highest PL peak. This result suggests that the formation rate of OH radicals produced in the interface between the photocatalyst and water is well correlated with the photocatalytic activity.

QoS Guaranteed System for Multi-functional VoIP End Terminal (복합 기능 VoIP 단말을 위한 음성 품질 보장 시스템)

  • 김대호
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.153-156
    • /
    • 2003
  • In this paper, we propose QoS guarantee system fur multi-functional VoIP end Terminal. This system guarantees low delay of voice data for Internet telephony in VoIP end terminal that has various kinds of Internet dependant application. QoS system we propose support low delay transmission in VoIP terminal interface.

  • PDF

Spamtester using Spam Categorization in SIP-based VoIP Networks (VoIP 환경에서 스팸 유형 분석 및 Spamtester 구현)

  • Choi, Jae-Sic;Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.99-107
    • /
    • 2008
  • In this paper, we analyse the vulnerability of spam attacks and develop the Spamtester to confirm these spam attacks in SIP-based VoIP networks. Although there are several spam attacks on VoIP networks, the detail information for the SPIT is not enough to confirm the procedure and the result of spam attacks on VoIP networks. Specially, the spam attacks through abnormal process are difficult to trace the sender of spam. Also, it is not easy to impose the legal restriction to the spammer because of lack of information for the spam attack. Therefore, on VoIP networks, the possible scenario and detail procedure for VoIP spam is needed to be confirmed. This paper designes and implementes the spamtester, which is helpful to protect VoIP networks from the spam attacks.

The Effect of Sampling Intervals on VO2 Plateau and Reinvestigation of Other Criteria During VO2max Test. (최대산소섭취량 측정 시 측정간격에 따른 정체현상의 변화와 종료기준의 적용)

  • Yoon, Byung-Kon;Kwak, Yi-Sub
    • Journal of Life Science
    • /
    • v.17 no.9 s.89
    • /
    • pp.1255-1259
    • /
    • 2007
  • The purpose of this study was to elucidate incidence of $VO_2$ plateau by comparing data derived from different time averaging intervals during incremental cycling exercise to $VO_2max$. Seventeen subjects (age: $23.5{\pm}3.3$ years and $VO_2max$: $3.65{\pm}0.73$ L/min, respectively) completed $VO_2max$ tests on cycle ergometer which breath by breath gas ex-change data were obtained. These data were time-averaged into 11-breath, 15, 30 and 60 s sampling intervals. The incidence of plateau were 100, 35, 24 and 6% for the 11 breath, 15 s, 30 s and 60 s averaging, respectively. No correlation was between ${\Delta}$ $VO-2$ at $VO_2max$ and $VO_2max$ (r=0.008). 53% (maximal HR within 10 b/min) and 100% $(RER{\geq}1.15)$ of subjects met the criteria for attainment of $VO_2max$. This data indicate that shorter sampling intervals (11 breath) is the most suitable for de-tection of the $VO_2$ plateau and RER can be used for the criteria for attainment of $VO_2max$ but not maximal HR. Also, the incidence of a plateau is not related to training status or physical fitness of subjects.

An Analysis and modeling of Mobile IP network in VoIP Network (VoIP Network에서 Mobile IP 분석 및 설계)

  • Eom, Ki-Bok;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.414-418
    • /
    • 2003
  • VoIP is a core technology used to transmit both voice and data in an integrated packet' form. Within this technology, SIP is the signaling protocol used for 'real time' call services; particularly those where H323 is used. Yet, when considering the needs of mobile users, it is essential we integrate VoIp within the mobile technology so the mobile host is able to receive the 'packet' transported and by, and connected to, any available internet-address. For all this to occur, we need to improve Network Delay by reducing transmission problems associated with mobile services. If we are to obtain an optimal service then we must reduce any network delays which may arise from joining Mobile IP and VoIp services. This paper, therefore, considers how, unlike previous research, these delays may be improved through the use of the signaling technology\ulcorner SIP. It also considers how this research may be introduced into current wired and wireless integrated services enabling them to use the IP 'packet'.

  • PDF

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Industry Activation Scheme through mVoIP Technology Trends and Market Analysis (mVoIP 기술동향 및 시장분석을 통한 산업 활성화 방안)

  • Park, Se-Hwan;Park, Jong-Kyu;Kim, Cheong-Ghil
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.477-482
    • /
    • 2012
  • The mVoIP service is the technology which focuses on the wireless data service as the IP network having the transmission rate of 100 Mbps classes on the high-speed middle of movement through the WiFi, WiBro and 3G mobile radio communication network, and etc. and is developed. Since 2010, the mVoIP (mobile VoIP) service shows the rapid growth due to 4G-LTE service seriously disclosed from July with the Smart phone and 2,011 it begins to be rapidly popularized. In this research, additionally the mVoIP service industry activation plan is presented with the trends of technology development including the chip-set/module/terminal, etc. based upon local and foreign market trend searchlight through the market demand analysis. The mVoIP service downloads App to the mobile apparatus and or can provide the service as the software through the WiFi network. Therefore, the change which is large in the products development aspect is to be have no. Expected to is being provided as the added service in the case of 4G-LTE as a matter of course, the service deployment where it is based on the market principle and demand needs is needed.

Design and Implementation of Multipoint VoIP using End-point Mixing Model (단말혼합 방법을 이용하는 다자간 VoIP의 설계 및 구현)

  • Lee, Sung-Min;Lee, Keon-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.335-347
    • /
    • 2007
  • VoIP (Voice over IP) is a technology to transport video and voice traffic over IP networks such as Internet. Today, the VoIP technology is viewed as the right choice for providing voice, video, and data communication among various terminals over the next generation network. This paper discusses a multipoint VoIP implementation with end-point mixing model which can support multipoint conference without a conference bridge. The multipoint VoIP is implemented with SIP (Session Initiation Protocol), and supports STUN (Simple Traversal of UDP Through NATs) since it works in an asymmetric NAT (Network Address Translator) environment. The characteristics of this paper are as follows. It is possible that all terminals in the hierarchical conference don't receive the duplicated media information because we use the end-point mixing model with the new media processing module. And, the paper solves the problem that the hierarchical conference session should be separated into several sessions when a mixing terminal terminates the hierarchical conference session.

  • PDF

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF