• Title/Summary/Keyword: IP blocking

Search Result 61, Processing Time 0.035 seconds

Extended Service Filtering Technique for Overload Control of Televoting Service Required for the Specialized Resources of Intelligent Peripheral (지능형 정보제공 시스템의 특수 지원을 이용하여 제공되는 전화투표 서비스의 과부하 제어를 위한 확장된 서비스 필터링 기법)

  • Jeong, Gwang-Je
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1727-1738
    • /
    • 1996
  • This paper proposes a extended service filtering technique to solve overload control problems inService Con-trol Poin(SCP) due to Televoting (VOT) services with heavy traffic characteristics. Also, this paper compares this new technique with existing IN overload control lechniques, and calculate steady state call blocking probabilities in In under overload conditions. The proposed technique considers SCP overload and IN CS-1services such as VOT service that need to use the specialized resources of IP. This technique uses first an activating step which SCP sends service filtering request to SSP and IP for the start of service filtering. Then, in the filtering step SSP sendas filtering results to SCP periodically or each N-calls.Also,when filtering time-out timer expired or call counter value exceeded maximum number of calls,SSP stops service filtering,and sends ser-vice filteing response to SCP in the deactivating step. The application of this techique to VOT service defined in IN CS-1 service is investigated and analyzed by using an analytical VOT service model.In order to apply this technique to VOT service, this paper also discusses VOT service and the corresponding N architecture including Service Switching Point(SSP),SCP and IP. Then this paper also constructs an analytical VOT service model,and calculates SCP and SSP/IP(circuit)call blocking probablities.With the application of this new technique,this paper shows good performance enhancements in SCP call blocking probability.

  • PDF

MBAC Mechanism for blocking probability fairness guarantee (Blocking Probability Fairness 보장을 위한 MBAC 메커니즘)

  • Jin, Min-Sook;Kim, Ki-Il;Kim, Sang-Ha
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.491-494
    • /
    • 2001
  • IP 망에서 Qos(Quality of Service)를 보장하기 위하여 요구되는 것이 수락 제어이다. 기존의 수락 제어 메커니즘은 크게 RSVP(Resource Reservation Protocol) 시그널링 방법과 MBAC(Measurement Based Admission Control)로 분류된다. 첫번째 방법의 경우 코어 망에서 각 플로우마다 상태를 유지해야 하는 확장성 문제때문에 적용이 쉽지 않고, 두 번째 방법의 경우 긴 경로를 가진 플로우의 경우 짧은 경로를 가진 플로우에 비해 블록킹 확률이 높아지는 문제점이 있다. 본 논문에서는 IP 코어 망에서 사용자의 QoS 요구사항과 서로 다른 경로상의 플로우간 블록킹 확률의 공평성을 위한 TPED MBAC(Two-Phase Edge-to-Edge Distributed Measurement Based Admission Control) 메커니즘을 제안한다. 이 MBAC 메커니즘은 수락 제어를 Quantitative Provisioning 단계와 Qualitative Provisioning 단계로 나누어 수행하며 프로빙 패킷 전송을 위해 홉 카운터에 기반 한 WRR(Weighted Round-Robin) 스케쥴링을 적용함으로써 각 플로우간의 블록킹 확률의 공평성을 제어할 수 있는 메커니즘이다.

  • PDF

An Extended Service Filtering Technique for Mass Calling-Type Services Using Intelligent Peripheral in an SCP-Bound Network

  • Jeong, Kwang-Jae;Kim, Tae-Il;Choi, Go-Bong
    • ETRI Journal
    • /
    • v.20 no.2
    • /
    • pp.115-132
    • /
    • 1998
  • This paper proposes an extended service filtering technique to prevent overload in service control point (SCP) due to televoting (VOT) or mass calling (MAS) services with the heavy traffic characteristics. Also, this paper compares this extended technique with the existing overload control techniques, and calculates steady state call blocking probabilities in intelligent network (IN) under overload conditions. The proposed technique considers SCP overload and IN Capability Set (CS)-1 services (such as VOT or MAS service) that have to use the specialized resources of intelligent peripheral (IP). This technique uses first an activating step in which SCP requests service filtering to service switching point (SSP). Then, in the filtering step, SSP sends filtering results to SCP periodically or each N-calls. Also, when filtering time-out expires, SSP stops service filtering, and sends service filtering response to SCP in the deactivating step. This paper applies this technique to VOT/MAS service, and calculates SCP and SSP-IP (circuit) call blocking probabilities by using an analytical VOT/MAS service model. With the modeling and analyzing of this new technique, it shows that this technique reduces the traffic flow into SCP from SSP and IP prominently.

  • PDF

Performance Analysis of Wavelength Assignment Signaling Protocol with Priority (Priority를 제공하는 파장 할당 시그널링 프로토콜의 성능 분석)

  • Kim, Min-Sik;Jung, Jae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.4B
    • /
    • pp.351-360
    • /
    • 2003
  • All-optical network provede unlimited for bandwidth, the very low bit error rate, and the transparency to IP. Optical networks promise to be the next generation networks that can meet the higher bandwidth demands. However, the number of wavelengths is often not large enough to help a large amount of nodes. The blocking by wavelength contention can be reduced by wavelength conversion, which can't perfectly resolve all situations. Because of that, a lot of groups have proposed unique wavelength assingment algorithms and protocols. Most schemes don't support the priority concepts. This paper describes the unique priority scheme based on the throughput. In this paper, we apply our priority scheme to SWAP(Simple Wavelength Assignment Protocol) and show the performance of the proposed priority scheme. Our proposed priority scheme can be a better solution to solve an important problem about the blocking by wavelength contention into WDM optical networks.

A security method for Gatekeeper based on Digital Authentication by H.235

  • Hwang Seon Cheol;Han Seung Soo;Lee Jun Young;Choi Jun Rim
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.759-763
    • /
    • 2004
  • While the needs for VoIPs(Voice over IP) encourage the commercial trials for VoIP services, there are many problems such as user authentication, blocking of illegal user and eavesdropping. In this paper, a management algorithm of registration of VoIP terminals is explained and security methods for tolling and data encryption module is designed and built up. The module structure will have the advantages of the entire development of secured gatekeeper without whole modification of gatekeeper. In order to secure the ordinary gatekeeper based on H.323 standard, user authentication and data encryption technologies are developed based on the H.235 standard and simply located over the plain H.323 stacks. The data structures for secured communications are implemented according to ASN.1 structures by H.235.

  • PDF

Classification of Degradation Types Based on Distribution of Blocky Blocks for IP-Based Video Services

  • Min, Kyung-Yeon;Lee, Seon-Oh;Sim, Dong-Gyu;Lee, Hyun-Woo;Ryu, Won;Lee, Kyoung-Hee
    • ETRI Journal
    • /
    • v.33 no.3
    • /
    • pp.454-457
    • /
    • 2011
  • In this letter, we propose a new quality measurement method to identify the causes of video quality degradation for IP-based video services. This degradation mainly results from network performance issues and video compression. The proposed algorithm identifies the causes based on statistical feature values from blocky block distribution in degraded IP-based videos. We found that the sensitivity and specificity of the proposed algorithm are 93.63% and 91.99%, respectively, in comparison with real error types and subjective test data.

Performance Evaluation of the VoIP Services of the Cognitive Radio System, Based on DTMC

  • Habiba, Ummy;Islam, Md. Imdadul;Amin, M.R.
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.119-131
    • /
    • 2014
  • In recent literature on traffic scheduling, the combination of the two-dimensional discrete-time Markov chain (DTMC) and the Markov modulated Poisson process (MMPP) is used to analyze the capacity of VoIP traffic in the cognitive radio system. The performance of the cognitive radio system solely depends on the accuracy of spectrum sensing techniques, the minimization of false alarms, and the scheduling of traffic channels. In this paper, we only emphasize the scheduling of traffic channels (i.e., traffic handling techniques for the primary user [PU] and the secondary user [SU]). We consider the following three different traffic models: the cross-layer analytical model, M/G/1(m) traffic, and the IEEE 802.16e/m scheduling approach to evaluate the performance of the VoIP services of the cognitive radio system from the context of blocking probability and throughput.

A Study on Properties of OLEDs using $Zn(HPB)_2$ as hole blocking layer ($Zn(HPB)_2$를 Hole blocking layer로 이용한 OLEDs의 특성 연구)

  • Kim, Dong-Eun;Kim, Byoung-Sang;Kwon, Oh-Kwan;Lee, Burm-Jong;Kwon, Young-Soo
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2005.07a
    • /
    • pp.447-448
    • /
    • 2005
  • Recently, organic light emitting diodes(OLEDs) is widely used as one of the information display techniques. We synthesized 2-(2-hydroxyphenyl)benzoxazole($Zn(HPB)_2$). We studied the luminescent properties of OLEDs using $Zn(HPB)_2$. The ionization potential(IP) and the electron affinity(EA) of $Zn(HPB)_2$ investigated using cyclic-voltammetry(C-V). The JP, EA and Eg were 6.5eV, 3.0eV and 3.5eV, respectively. The PL and EL spectra of $Zn(HPB)_2$ were observed at the wavelength of 4S0nm. We used $Zn(HPB)_2$ as an emitting layer and hole blocking layer. At the experiment about hole blocking effect, we inserted $Zn(HPB)_2$ between emitting material layer(EML) and cathode, and hole transport layer(HTL) and emitting material layer(EML). We measured current density-voltage and luminance-voltage characteristics at room temperature.

  • PDF

Performance Analysis of Request Handling Schemes for Intelligent Peripherals (IP용 서비스 요청 처리방식의 성능 분석)

  • 최고봉;윤종호;권기호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.7
    • /
    • pp.1321-1334
    • /
    • 1994
  • This paper presents the service handling schemes of an intelligent peripheral(IP) which provides the service function as a physical entity in the intelligent network. Four service request handling scheme are compared for and IP which can handle both ordinary requests and prioritized requests on the blocked-call-delayed basis. Delayed requests are assumed to be stored in a finite storage buffer. Scheme-I exclusively allows prioritized requests be stored and to use a fixed number of reserved servers. The other three schemes without reserved servers(Scheme-II.III,and IV) allow both types of requests to be stored and prioritized requests pushout ordinary requests if the buffer is full. For these four schemes, the blocking probabilities and delay distributions of both types of requests are numerically obtained. From the numericall results, the schemes without reserved servers reduce the blocking probability of ordinary requists without a severe penalty on proritized requests. For three schemes without reserved servers, it is noted that prioritized requests should br served on the first-in, first-out basis, and ordinary requests should be served on the last-in, first-out basis.

  • PDF

Detection of Zombie PCs Based on Email Spam Analysis

  • Jeong, Hyun-Cheol;Kim, Huy-Kang;Lee, Sang-Jin;Kim, Eun-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1445-1462
    • /
    • 2012
  • While botnets are used for various malicious activities, it is well known that they are widely used for email spam. Though the spam filtering systems currently in use block IPs that send email spam, simply blocking the IPs of zombie PCs participating in a botnet is not enough to prevent the spamming activities of the botnet because these IPs can easily be changed or manipulated. This IP blocking is also insufficient to prevent crimes other than spamming, as the botnet can be simultaneously used for multiple purposes. For this reason, we propose a system that detects botnets and zombie PCs based on email spam analysis. This study introduces the concept of "group pollution level" - the degree to which a certain spam group is suspected of being a botnet - and "IP pollution level" - the degree to which a certain IP in the spam group is suspected of being a zombie PC. Such concepts are applied in our system that detects botnets and zombie PCs by grouping spam mails based on the URL links or attachments contained, and by assessing the pollution level of each group and each IP address. For empirical testing, we used email spam data collected in an "email spam trap system" - Korea's national spam collection system. Our proposed system detected 203 botnets and 18,283 zombie PCs in a day and these zombie PCs sent about 70% of all the spam messages in our analysis. This shows the effectiveness of detecting zombie PCs by email spam analysis, and the possibility of a dramatic reduction in email spam by taking countermeasure against these botnets and zombie PCs.