• Title/Summary/Keyword: voice over internet protocol

Search Result 159, Processing Time 0.032 seconds

Implementation of VoIP Service in Hybrid Fiber Coaxial Network (Hybrid Fiber Coaxial망에서 VoIP 서비스 구현)

  • Ju, Jae-han
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.113-118
    • /
    • 2017
  • As interest in mobile devices and networks has increased recently, voice over internet protocol (VoIP) service, which is a technology for transmitting voice data using an existing internet protocol (IP) network, has rapidly spread, Cheap voice call service has become possible. As the digital broadcasting service becomes popular, hybrid fiber coaxial (HFC) network technology, which uses broadband cable network through fusion of broadcasting and communication, utilizes existing communication system and network equipment to provide various new services such as interactive broadcasting service. Therefore, if UGS-AD is applied to VoCM and RTPS is applied to MTA in order to guarantee the quality of voice data in actual HFC Internet service network, it is possible to smoothly perform voice data transmission in narrow upstream band which is a problem in actual commercial HFC network We also proposed a method to improve VoIP service by improving QoS of voice data in HFC Internet service network.

Implementation of QoS-Measuring System for Voice over IP (VoIP(Voice over Internet Protocol) 품질 측정을 위한 UA(User Agent) 및 서버 기능 연구)

  • Kang, Hyun-Joong;Nam, Heung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.137-144
    • /
    • 2007
  • Advances in networking technology digital media, and codecs have made it possible for the Internet evolves into a Broadband convergence Network (BcN) and provides various services including Voice over Internet Protocol (VoIP) and IPTV over their high-speed IP networks. In order for the Internet to make a profit as traditional Public Switched Telephone Network (PSTN), it must provide high qualify VoIP services. Therefore, real time qualify measurement framework is the most important requisite to provide VoIP service. For this, IETF (Internet Engineering Task Force) defined RTCP-Extended Reports (RTCP-XR) that extend RTCP (Real-Time Transport Protocol Control Protocol). However, procedure and method tot actually VoIP qualify measurement did not recommended nothing but defined item to measure voice quality. Our objective in this paper is to describes a practical measuring framework for end-to-end QoS of switched voice packet in an IP environment. It includes concepts as well as step-by-step procedures for measuring packetized voice streams. It also proposes new formats that extend RTCP-XR's concept.

  • PDF

A Study on Voice over Internet Protocol Security Response Model for Administrative Agency (행정기관 인터넷전화 보안 대응 모델 개발 연구)

  • Park, Dea-Woo;Yang, Jong-Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.237-240
    • /
    • 2011
  • Voice over Internet Protocol calls using administrative agency to build a national information and communication service, 'C' group, providers, the KT, SK Broadband, LG U+, Samsung SDS, as there are four operators. To prepare for an attack on Voice over Internet Protocol for administrative agency, security is a need for research to support the model. In this paper, the Internet telephone business of Administrative Agency to investigate and analyze the specific security measures to respond. Should set priorities around confidentiality about five security threats from NIS to Study of Voice over Internet Protocol Security Response Model for Administrative Agency. (1) Illegal wiretapping, (2) call interception, (3) service misuse, (4) denial of service attacks, (5) spam attacks, write about and analyze attack scenarios. In this paper, an analysis of protection by security threats and security breaches through a step-by-step system to address the research study is a step-by-step development of the corresponding model.

  • PDF

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

A Study of the Interworking Method between H.323 and SIP (H.323과 SIP간의 상호 연동 방법 관한 연구)

  • 김정석;김철규;김정호
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.342-347
    • /
    • 2004
  • The VoIP(Voice over Internet Protocol) technology which is able to use a voice service through internet is more cheaper then existing telephone charges, and is easily accept the various of multimedia services from internet. Previous connection method of VoIP used H.323 protocol, but it is very complex to connection establishment. so, the SIP(Session Initiation Protocol) protocol that propose in SIP-Working Group Is in use recently. Therefore, we need new interworking methodology between H.323 and SW products. In this thesis, the progress interworking method between H.323 and SIP are propose, then interpret unnecessary packet delay for call setup and improved feature of message exchange.

  • PDF

The Study on Internet Voice Conference using MGCP and IP-Multicast (MGCP와 IP-Multicast를 이용한 Internet Voice Conference에 관한 연구)

  • Lee, Song-Ho;Choe, Gyeong-Sam;Lee, Jong-Su
    • Proceedings of the KIEE Conference
    • /
    • 2001.11c
    • /
    • pp.130-133
    • /
    • 2001
  • VoIP(voice over internet protocol) technology is based on IP protocol. The IP protocol can be involved in two types of communication: unicasting and multicasting. Unicasting is the communication between one sender and one receiver. It is one-to-one communication. Multicasting is one-to-many communication. So that, many receivers can get same data from one sender simultaneously. and, the different protocol are proposed for VoIP; H.323, SIP and MGCP. MGCP is perfect server-client protocol, so MGCP is very attractive VoIP protocol to ISP. This paper uses MGCP and offers modified MGCP for conference call. So that, Modified MGCP is compatible to MGCP, and supports conference call using IP-multicast.

  • PDF

MKIPS: MKI-based protocol steganography method in SRTP

  • Alishavandi, Amir Mahmoud;Fakhredanesh, Mohammad
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.561-570
    • /
    • 2021
  • This paper presents master key identifier based protocol steganography (MKIPS), a new approach toward creating a covert channel within the Secure Real-time Transfer Protocol, also known as SRTP. This can be achieved using the ability of the sender of Voice-over-Internet Protocol packets to select a master key from a pre-shared list of available cryptographic keys. This list is handed to the SRTP sender and receiver by an external key management protocol during session initiation. In this work, by intelligent utilization of the master key identifier field in the SRTP packet creation process, a covert channel is created. The proposed covert channel can reach a relatively high transfer rate, and its capacity may vary based on the underlying SRTP channel properties. In comparison to existing data embedding methods in SRTP, MKIPS can convey a secret message without adding to the traffic overhead of the channel and packet loss in the destination. Additionally, the proposed covert channel is as robust as its underlying user datagram protocol channel.

Implementation of an Internet Telephony Service that Overcomes the Firewall Problem (방화벽 문제를 극복한 인터넷 전화 서비스의 구현)

  • 손주영
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.27 no.1
    • /
    • pp.65-75
    • /
    • 2003
  • The internet telephony service is one of the successful internet application services. VoIP is the key technology for the service to come true. VoIP uses H.323 or SIP as the standard protocol for the distributed multimedia services over the internet environment, in which QoS is not guaranteed. VoIP carries the packetized voice by using the RTP/UDP/IP protocol stack. The UDP-based internet services cause the data transmission problem to the users behind the internet firewall. So does the internet telephony service. The users are not able to listen the voices of the counter-parts on the public internet or PSTN. It makes the problem more difficult that the internet telephony service addressed in this paper uses only one UDP port number to send the voice data of all sessions from gateway to terminal node. In this paper, two schemes including the usage of dummy UDP datagrams, and the protocol conversion are suggested. The implementation of one of the schemes, the protocol conversion, and the performance evaluation are described in detail.