• Title/Summary/Keyword: INVITE message

Search Result 8, Processing Time 0.022 seconds

A Bypass Scheme for INVITE Messages With Priority in SIP Proxies (SIP 프록시에서 우선순위를 가지는 INVITE 메시지의 우회 방법)

  • Kwon, Oh-Jun;Jang, Hee-Suk;Lee, Jong-Min
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.51-58
    • /
    • 2010
  • SIP is a flexible and extensible call setup protocol that may be combined with other protocols used in the Internet to make various services like voice communication. Voice communication can be classified into normal calls used for communication between common users and emergency calls for 112, 119 and other services through public safety networks. It is required to research to process effectively these normal calls and emergency calls through public networks such as the Internet. In this paper, we propose a bypass scheme for emergency calls by giving priority to INVITE messages for them and processing them with priority in the SIP proxy queue. We perform simulation studies using the network simulator ns-2 for the performance evaluation. Simulation results show that the proposed scheme processes emergency calls faster than normal calls and thus it is expected to make a special purpose network like the national disaster network efficiently by using the existing Internet.

SIP protocol use Black Box automatic image transmission (SIP 프로토콜을 이용한 블랙박스 자동 영상 전송 구현)

  • Kim, Myoung-hoon;Kim, Young-gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.250-253
    • /
    • 2016
  • Car black box is saved in the video recording important to determine the cause of the accident caused a traffic accident occurred. Remote monitoring of the current black box may be monitored or transmitted to shock your smartphone as a yourself. It complements if the parties to an accident lost per injury due to an accident or mind when responding to spend the "INVITE" message using the SIP visual communication in messanger applications "Notify" to inform transferring video to a message acquaintances to check Video the accident to identify the location and check the contents and to implement and research that can respond quickly.

  • PDF

A Non-Linear Overload Control Scheme for SIP Proxy Queues (SIP 프록시 큐의 비선형적 과부하 제어 방법)

  • Lee, Jong-Min;Jeon, Heung-Jin;Kwon, Oh-Jun
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.43-50
    • /
    • 2010
  • Recently, the Internet telephony has been used rather than the traditional telephony by many Internet users, with low cost. Session Initiation Protocol(SIP) is the standard of application layer protocol for establishment and disconnection of the session for Internet telephony. SIP mainly runs over the UDP for transport. So in case of the loss of the INVITE request message, the message is retransmitted by an appropriate timer for reliable transmission of the UDP message. Though the retransmission is useful for ensuring the reliability of SIP messages sent by the users, it may cause the overload traffic in the SIP proxy server. The overload in SIP proxy servers results in the loss of many input messages. This paper presents a non-linear overload control algorithm to resolve the overload condition of the server. we simulate our proposed algorithm using the network simulator ns-2. The simulation results show that the throughput of the server with the proposed algorithm have been improved about 12% compared to the existing linear control algorithm.

The Overload Control Scheme Using a Delay Queue in the SIP Signalling Networks (SIP 시그널링 네트워크에서 지연 큐를 이용한 과부하 제어 방법)

  • Lee, Jong-Min;Jeon, Heung-Jin;Kwon, Oh-Jun
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1038-1047
    • /
    • 2012
  • The SIP(Session Initation Protocol) is an application layer protocol that is used to establish, release, and change the call session of the IP telephony. In the SIP signalling networks, when the number of the UA(User Agent) requested the call session increase, the number of messages to be processed by SIP proxy server increase. It often will be caused the overload of the SIP proxy server. In this paper, we proposed the overload control method with a normal queue and a delay queue in the SIP proxy server. When it is estimated the overload of the server by the excess of the high threshold in the normal queue, new INVITE messages will be put into the delay queue to reduce the load of the server. It results in some delay of the call session from the INVITE message. Subsequently when the number of messages in the normal queue is reduced below the low threshold, the INVITE messages in the delay queue is processed. The simulation results showed that the number of the retransmission messages by our proposed method was 45% less than the one by the method with single queue. The results also showed that the average call success rate by the proposed method was 2% higher than the one by the method with single queue.

Detection of SIP Flooding Attacks based on the Upper Bound of the Possible Number of SIP Messages

  • Ryu, Jea-Tek;Roh, Byeong-Hee;Ryu, Ki-Yeol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.507-526
    • /
    • 2009
  • Since SIP uses a text-based message format and is open to the public Internet, it provides a number of potential opportunities for Denial of Service (DoS) attacks in a similar manner to most Internet applications. In this paper, we propose an effective detection method for SIP flooding attacks in order to deal with the problems of conventional schemes. We derive the upper bound of the possible number of SIP messages, considering not only the network congestion status but also the different properties of individual SIP messages such as INVITE, BYE and CANCEL. The proposed method can be easily extended to detect flooding attacks by other SIP messages.

The significations of 'The absence' as an advertising creative (광고 크리에이티브로서의 '부재 (absence)' 의 의미작용에 관한 연구)

  • Park Young-Won
    • Journal of Science of Art and Design
    • /
    • v.4
    • /
    • pp.5-25
    • /
    • 2002
  • It is not easy to get more attention as a prominent advertising expression among various types of numerous advertisements. Due to the voluminous expansion of advertising communications and the change of the media, new advertising creatives must be needed for serving to differentiate the message , inviting audiences to participate more positively in advertising communications This thesis aims at reviewing the absence as an advertising creative. And this thesis is about the significations of the absence. Chapter I describes the aim of this thesis about the absence as an advertising creative And Chapter II introduces the general concept, perception of the absence and its possibilities as an advertising creative And also mentions about the absence as one of paradoxical expressions with rhetorical theories as well as semiotics. Chapter III deals with the signification of the absence with introducing semiotic methods such as the theory of R. Barthes Chapter IV discusses the signification of the absence as an advertising creative talking into consideration of semiotic theories. And I categorize the types of the absence in advertising expressions. The absence is categorized into 5 types in this thesis. Type (1) is the absence of product which is supposed to be advertised, type (2) is the absence of product and make product image located out of main image of an advertising expression for introducing features of a product itself. And type (3) is the absence of the imaginary audience to invite an audience to participate more spontaneously. Type (4) is the absence of headlines, and type (5) is the absence of almost all visual images and verbal message but a corporate symbol or brand logo. The signification of S types of the absence can be described on the basic of semiotic theories, especially the theory of R. Barthes. It's my hope that this thesis about the absence as an advertising creative will serve as the basic theory for the empirical research about advertising expressions containing images of the absence.

  • PDF

RDD with Follow-Up Texting: A New Attempt to Build a Probability-Based Online Panel in South Korea

  • Dong-Hoon Seol;Deok-Hyun Jang;Sarah Prusoff LoCascio
    • Asian Journal for Public Opinion Research
    • /
    • v.11 no.3
    • /
    • pp.257-273
    • /
    • 2023
  • Conducting face-to-face surveys is difficult and cost prohibitive, necessitating a new attempt to build a probability-based panel in South Korea. Since 99.9% of adult Koreans own a mobile phone, mobile phone numbers provide a viable sampling frame. Random digit dialing (RDD) surveys were conducted August-December 2021. Of the 288,056 valid phone numbers dialed, 13,655 respondents between the ages of 19 and 69 completed a phone survey. These respondents were later invited by text message to join a panel; 3,202 of these (23.4% or 1.2% based on the number initially contacted) joined the panel. When compared to official government statistics like resident registration data, the census, or the Social Survey, this new probability-based panel can be said to be representative of the Korean population on the basis of age, gender, location, marital status, and household size after weighting is applied. However, even after weighting, panel members are more educated than the general population, white-collar workers and self-employed people are overrepresented, and blue-collar workers are underrepresented. As of February 2023, this panel has grown to 10,471 participants with plans to continue to invite more panel members in the same way. Based on the comparisons in this paper, we can regard this panel as a cost-effective, probability-based panel that may be used for various kinds of public opinion research, by researchers both within and outside of Korea. As we continue to refine and grow this panel, we hope it will become more widely used by researchers as well as provide a model for those building similar panels in other countries.

E-Commerce in the Historical Approach to Usage and Practice of International Trade ("무역상무(貿易商務)에의 역사적(歷史的) 어프로치와 무역취인(貿易取引)의 전자화(電子化)")

  • Tsubaki, Koji
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.224-242
    • /
    • 2003
  • The author believes that the main task of study in international trade usage and practice is the management of transactional risks involved in international sale of goods. They are foreign exchange risks, transportation risks, credit risk, risk of miscommunication, etc. In most cases, these risks are more serious and enormous than those involved in domestic sales. Historically, the merchant adventurers organized the voyage abroad, secured trade finance, and went around the ocean with their own or consigned cargo until around the $mid-19^{th}$ century. They did business faceto-face at the trade fair or the open port where they maintained the local offices, so-called "Trading House"(商館). Thererfore, the transactional risks might have been one-sided either with the seller or the buyer. The bottomry seemed a typical arrangement for risk sharing among the interested parties to the adventure. In this way, such organizational arrangements coped with or bore the transactional risks. With the advent of ocean liner services and wireless communication across the national border in the $19^{th}$ century, the business of merchant adventurers developed toward the clear division of labor; sales by mercantile agents, and ocean transportation by the steam ship companies. The international banking helped the process to be accelerated. Then, bills of lading backed up by the statute made it possible to conduct documentary sales with a foreign partner in different country. Thus, FOB terms including ocean freight and CIF terms emerged gradually as standard trade terms in which transactional risks were allocated through negotiation between the seller and the buyer located in different countries. Both of them did not have to go abroad with their cargo. Instead, documentation in compliance with the terms of the contract(plus an L/C in some cases) must by 'strictly' fulfilled. In other words, the set of contractual documents must be tendered in advance of the arrival of the goods at port of discharge. Trust or reliance is placed on such contractual paper documents. However, the container transport services introduced as international intermodal transport since the late 1960s frequently caused the earlier arrival of the goods at the destination before the presentation of the set of paper documents, which may take 5 to 10% of the amount of transaction. In addition, the size of the container vessel required the speedy transport documentation before sailing from the port of loading. In these circumstances, computerized processing of transport related documents became essential for inexpensive transaction cost and uninterrupted distribution of the goods. Such computerization does not stop at the phase of transportation but extends to cover the whole process of international trade, transforming the documentary sales into less-paper trade and further into paperless trade, i.e., EDI or E-Commerce. Now we face the other side of the coin, which is data security and paperless transfer of legal rights and obligations. Unfortunately, these issues are not effectively covered by a set of contracts only. Obviously, EDI or E-Commerce is based on the common business process and harmonized system of various data codes as well as the standard message formats. This essential feature of E-Commerce needs effective coordination of different divisions of business and tight control over credit arrangements in addition to the standard contract of sales. In a few word, information does not alway invite "trust". Credit flows from people, or close organizational tie-ups. It is our common understanding that, without well-orchestrated organizational arrangements made by leading companies, E-Commerce does not work well for paperless trade. With such arrangements well in place, participating E-business members do not need to seriously care for credit risk. Finally, it is also clear that E-International Commerce must be linked up with a set of government EDIs such as NACCS, Port EDI, JETRAS, etc, in Japan. Therefore, there is still a long way before us to go for E-Commerce in practice, not on the top of information manager's desk.

  • PDF