• Title/Summary/Keyword: network service provider

Search Result 327, Processing Time 0.023 seconds

International Roaming Service Management Methodology Based on Network Management Information (망관리 정보에 기반한 국제로밍 서비스 품질 관리 기법)

  • Kim Ji-Sun;Kim Sung;In Hyung-June
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.73-76
    • /
    • 2006
  • International Roaming is a kind of telecommunication service that enables subscribers use the same mobile number when they go abroad and access other service provider's network. International roaming call is made through three network parts-home (original service provider) network, intermediate network, and local (overseas service provider) network. It is not possible to monitor every section of whole roaming service network because service providers do not provide their network management information to other service providers. The limitation causes harsh problem when a service anomaly arises and operators have to confirm the reason of failure. To solve this problem, we propose a scheme that deduces roaming service status of each overseas service provider using internal network management information. SK telecom implemented a international roaming service management system based on the scheme using performance measurement of signaling points, roaming service nodes, and charging data from existing network management systems.

  • PDF

Consistent Distributed Lookup Service Architecture for Mobile Ad-hoc Networks

  • Malik Muhammad Ali;Kim Jai-Hoon
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.29-31
    • /
    • 2006
  • Mobile Ad hoc network is a self configuring network of mobile nodes. It allows mobile nodes to configure network spontaneously and share their services. In these networks, service discovery is very important because all nodes do not have same resources in term of memory and computing power. Nodes need to use different services offered by different servers. Some service discovery protocols have been proposed in last couple of years but they include significant traffic overhead and for small scale MANETS. In this paper, we present extensible lookup service scheme based on distributed mechanism. In our scheme neighboring nodes of service provider monitor service provider and send notification to lookup server when the service provider terminates its services unexpectedly. Lookup server can find other service provider or other alternative services in advance because of advance notification method and can provide consistent lookup services. In our scheme neighboring nodes also monitor lookup server and send notification to network when lookup server terminates unexpectedly. Simulation results show that our scheme can reduce up to 70% and 30% lookup failure as compare to centralize and simple distributed mechanism respectively.

  • PDF

EDS scenario Implementation for the Multiple Network and Multiple Service Environments

  • Kim, Dong-Il;Lee, Soong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.135-140
    • /
    • 2009
  • The wide deployment of wireless access technologies and the integration of various access network interfaces into a single terminal, allows mobile end-users to be always connected to the IP network, and to use those interface simultaneously. In this paper the CTE provides various access network interfaces capabilities, allowing reception of data over multiple service providers with different characteristics. Considerations for multiple network and service provider environments are regarded as essential for the successful deployment of convergence services in Next Generation Network (NGN). Event Driven Service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers. This paper first describes the deployment model of NGN convergence services for multiple service provider environments. It also covers the service scenario of EDS, a convergence service for multiple service provider environments in NGN. Multiple provider environments stimulates the unified identifier management, namely ubiquitous identification (U-ID), to enable users to be provided convergence services without awareness of multiple provides. Then the designed structure and procedures of U-ID based EDS are given. Finally, the implementation results tested on Korea Advanced Research Network (KOREN) are described.

Novel Pre-pushing & Downloading Model in Mobile Peer-assisted Streaming Network

  • Lin, Fuhong;Zhou, Xianewi;Chen, Changjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3135-3148
    • /
    • 2013
  • The popularization of streaming networks and mobile devices brings a new kind of network called mobile peer-assisted streaming network. In this network, service provider not only offers downloading services, but also pre-pushes resources to users for caching. Users can download their demanded resources while working as servers for uploading the cached data. Also the mobile characteristic makes high package losing probability in this network. So we study how the service provider pre-pushes or the user downloads resources efficiently and effectively while considering the package losing in this paper. We build utility models for service provider and user, and solve the models using Bellman's theory to achieve Nash Equilibrium which shows the service provider's optimal pre-pushing speed and user's optimal downloading speed. The numerical simulation demonstrates the efficiency and effectiveness of our proposed pre-pushing and downloading scheme by comparing to the traditional scheme.

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.

MPLS-VPN architectures and Transition Instances of Enterprise Network (MPLS-VPN 기술과 엔터프라이즈 망에서의 적용 사례)

  • 김철용;오석희;이성호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.112-114
    • /
    • 2003
  • 대부분 기업들의 본사와 지사처럼 위치상으로 멀리 떨어져 있는 소속 네트웍들의 연결은 Service Provider를 통한 VPN을 이용한다. 트래픽이 대용량화되고 서로 다른 네트웍간에 보안도 중요한 문제로 부상하는 상황에서 기존의 Layer 2 또는 Layer 3 VPN의 단정을 보안한 MPLS-VPN의 적용은 Service Provider로서는 한 가지 해결책이 될 수 있다. Service Provider측면에서 MPLS-VPN기술에 대해 요약하고, Service Provider로서 백본을 제공, 운영하는 LG CNS에서 기존 고객사 네트웍을 MPLS-VPN으로 전환한 사례를 들어 실제 적용 방법을 소개하고자 한다.

  • PDF

Analysis of Contributions to Broadband Universal Service of Platform Operator (플랫폼 사업자의 보편적 서비스 기여금 분담 효과 분석)

  • Jung, Choong-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.153-161
    • /
    • 2022
  • This paper analyzes the economic effects when platform provider including CP contributes to broadband universal service and uses broadband bandwidth providing high quality network service. In this model, the contribution rate of broadband universal service is determined by ISP and platform provider sets its price of contents. The main results are as follows. First, the traffic usages is less than social optimum when the market of contents is monopoly. The sum of contribution fee and network usage rate must be less than marginal cost of network operation to get social optimum traffic. Second, the rate set by ISP is equal to social optimum when the market of contents is competitive. Third, when platform provider does not charge contents provided, ISP sets social optimum prices and the network usage rate for contents user is decreasing as advertisement revenue becomes larger. These results suggest that the platform provider should contribute to universal service funding to encourage the network investment of ISP.

End-to-End Telecom Billing (완전한 통신사용 정보체계)

  • Ryu, Jeong-Mook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1137-1140
    • /
    • 2001
  • This thesis defines an end-to-end billing process model. The processes in the model can be mapped to the TMN(Telecommunications Management Network) model which is based on an international telecommunications management standard. We have identified two interfaces in this billing process model. Part 1 of this thesis provides a protocol-independent design of the UAI(Usage Accounting interface) between the service provider and the network provider. Part 2 of this thesis provides information modeling of the UMI(Usage Metering Interface) between the network provider and the equipment provider. This interface is applied to the B-ICI(Broadband ISDN Inter-Carrier Interface) environment.

  • PDF

Determinants and Optimum Modelling of Logistics Outsourcing Strategy (물류(物流) 아웃소싱 전략(戰略) 결정요인(決定要因) 및 최적(最適) 모델)

  • Song, Gye-Eui
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.13
    • /
    • pp.283-302
    • /
    • 2000
  • The firms aim to acquire services and costs advantage from logistics outsourcing strategy. But it is very important to select optimum service provider. A checklist of the criteria for the evaluation of service providers follows : service quality, low cost, logistics information system, service network, financial stability, investments in plant and equipment, management attitude and lookout for the future strategic fit, cultural and psychological barriers etc. Also, a 8-step implement of logistics outsourcing strategy will be of help for maximizing benefits of logistics outsourcing. It follows : 1-step : logistics environment analysis, 2-step : check service provider availability, 3-step : logistics outsourcing determinant analysis, 4-step : select of optimum service provider, 5-step : contract with optimum service provider, 6-step : identify of remaining barriers, 7-step : performance of logistics outsourcing, 8-step : evaluation.

  • PDF

A Study on INAP for Number portability (번호이동성 구현을 위한 INAP 연구)

  • 정영식;민재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.403-406
    • /
    • 2001
  • Number Portability means that one can use his original telephone number when he change telephone service provider, region and the kind of service. It is service provider portability which retain same number when changed the service provider. It is location portability which retain same number when changed the geographic location. It is service portability which retain same number when changed the service type. Revision of INAP(Intelligent Network Application Part) is essential part to provide number portability In this paper, we present the changed part of INAP to provide number part.

  • PDF