• Title/Summary/Keyword: 음성 트래픽

Search Result 282, Processing Time 0.036 seconds

Transmission Performance of Large Scale MANETs with IDS (IDS가 있는 대규모 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.642-645
    • /
    • 2012
  • MANET has disadvantage for information intrusion caused from non-infra structure. That is based on mixed problems caused from terminal devices has no capability of various resources using abilities to run intrusion prevention function, and also from difficulty of no easy using infra structural server like as firewall. In this paper, transmission performances, be effected from information intrusion and IDS(Intrusion Detection System), are analyzed for large scale MANET, and weakness from information intrusion of MANET are studied. This study is for large scale MANET which has some large communication area and lots of nodes, voice traffic, based on VoIP protocols, is considered as application services be transmitted over MANETs. Computer simulation using NS-2 is used to measure and show MOS and call connection ratios.

  • PDF

A Channel Allocation Method on Cellular Systems with Multimedia Traffic (멀티미디어 환경하의 계층구조 이동통신 시스템에서의 채널할당방법)

  • Kim, Jeong-Kee;Hur, Sun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.51
    • /
    • pp.89-97
    • /
    • 1999
  • Recently, due to the rapid technological progress, CDMA cellular system is widely used for voice, data and multimedia services. But the analysis for voice-data integrated traffic has not been done satisfactorily. Moreover, there is few research results for voice-data integrated traffic. In this paper, we propose an effective channel allocation algorithm for CDMA cellular system which serves voice-data integrated traffic. As for the proposed channel allocation algorithm, new calls and hand-off calls first attempt to connect micro-cell. We model the channel allocating scheme as a Birth-and-Death process. We reserve a few hand-off dedicated channels and calculate the blocking probability of hand-off calls varying the number of hand-off dedicated channels. Then we decide the number of hand-off dedicated channels satisfying the proper QoS(Quality of Service) and minimum blocking probability.

  • PDF

On Managing Mobility of Mobile Nodes using an Improved Mobile IP Regional Registration in Wireless Mobile Networks (무선 이동 망에서 개선된 Mobile IP 지역 위치등록을 이용한 이동 노드의 이동성 관리)

  • 한승진;이정현
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.3
    • /
    • pp.47-54
    • /
    • 2004
  • By using wireless terminal, the number of users who wish to use the multimedia service like the Internet as well as Short Message Services and voice service has increased dramatically over the last years. We propose the method that improves Mobile IPv4 (MIPv4) Regional Registration in wireless mobile networks to decrease traffic's transmission delay and message generation compared with an existing method We design the scheme in MIPv4 environments that a packet do not pass through the home agent transmitted from correspondent node to mobile node, if a mobile node moves to other mobility agent. Simulation results show that the proposed method significantly reduces the expenses for registration and delivering packet.

Transmission Performance of MANET under Multiple Blackhole Attacks (다중 블랙홀 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.783-786
    • /
    • 2015
  • Hole attack, which is disturbed transmission function through change of routing information, can cause critical results for MANET as non-infrastructure network. Backhole attack, as a typical hole attack, is one malicious attack which is disabled network transmission function by assumption of transmission data through modification of routing information. It is very important to evaluate transmission performance caused by blackhole attack, because transmission performance of MANET is affective with blackhole attack. In this paper, transmission performance is analyzed with MANET under multiple blackhole attacks caused multiple blackhole nodes. Computer simulation based on NS-2 is used as analysis tool and voice traffic is considered ad application service on MANET.

  • PDF

Method for Supporting Multiple Service in a Mobile Terminal (이동 단말기에서 다중 서비스 지원 방안)

  • Lee, Jong-Chan;Park, Sang-Joon;Lee, Jin-Kwan
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.79-85
    • /
    • 2008
  • Our paper deals with a method for supporting multiple call/sessions in a mobile terminal. The different identifier for each protocol layer is assigned to each session when a mobile terminal sets SDP for multimedia services. In particular, QoS based tasks are used for managing the traffics in radio interface. Also, queuing, admission control, load control, resource allocation and scheduling are done based on the priority of sessions. The various multimedia services which is different in the requirement of resource allocation are able to be serviced simultaneously because a mobile terminal can provide the various services based on this scheme.

  • PDF

Analysis of traffic control policies in the voice-date integrated cellular CDMA mobile network (음성 및 데이터가 혼합된 CDMA 셀룰러 망에서의 트래픽 제어 분석 방법)

  • Yoon, Bok-Sik;Lee, Nam-Jun;Lee, Dong-Kie;Lie, Chang-Hoon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.22 no.4
    • /
    • pp.771-788
    • /
    • 1996
  • A CDMA-based cellular mobile telecommunication system has already been developed and is expected to provide more stable mobile communication services for much more users than traditional analog mobile systems. As a natural course of development, the CDMA mobile system is expected to provide ISDN services in the near future. In this paper, we analyze several traffic control policies for the voice-data integrated traffic in the cellular CDMA system. We first select four admission control policies which take differences in traffic and QOS characteristics between voice and data into account, and then develop modelling and analysis techniques, which can be used directly to analyze the chosen control policies. Our approach is based on so-called threshold model. Numerical computation results obtained under the typical traffic situation are also given. Through these computation results we could tentatively conclude that the cutoff priority policy, which can provide the priority for handoff voice cells while effectively utilizing unused channels, seems to be most effective among the four policies.

  • PDF

PACS Data Transmission in Hospital Network Based on DDS Middleware (DDS 미들웨어 기반 병원 전산망 PACS 데이터의 전송)

  • Kim, Nam-Ho;Lee, Suk-Hwan;Choi, Chang Yeol;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.290-301
    • /
    • 2013
  • The hospital network requires the effective transmission of multimedia PCAS data for medical treatment. But the network traffic has happened frequently in consultation hours because of the limited resources of hospital network and high capacity of PACS data. This is major interruption for the medical treatment. This problem can be solved by the adaptive QoS. In this paper, we design the middleware based QoS architecture in hospital network for controlling the contribution system. Our virtual simulation verifies that our middleware assures QoS of the priority PACS data of audio and image compared with the conventional hospital network.

A Study on a Tester of the MEGACO Protocol Call Processing for the Next Generation Convergence Network (차세대 통합네트워크를 위한 MEGACO 프로토콜 호 처리 시험기 연구)

  • Lee, Kyou-Ho;Sung, Kil-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2265-2270
    • /
    • 2007
  • This paper discusses a tester of functionality and call processing performance, based on the MEGACO/H.248 protocol that both IETF and ITU-T recommend as a media gateway control protocol, of both a media gateway controller and an access gateway which constitute a next generation convergence network. Effective methods, a functional architecture and implementation for such testification are provided. Especially included are not only a virtual emulation function of analog subscriber lines connecting to an access gateway, but also a tester emulated as a counter system of the protocol for the testifying a media gateway controller and an access gateway system.

Study for the IMS/SIP based Lawful Interception Architecture (IMS/SIP 기반의 감청을 위한 아키텍처 연구)

  • Um, Tae-hoon;Kim, Do-Hoon;Lee, Jung-Been;Choi, Song-In;Lee, Myoung-Rak;In, Hoh Peter
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1130-1133
    • /
    • 2010
  • 전화와 같은 음성통신이 네트워크 트래픽의 주류를 이루었던 과거와는 달리 최근 다양한 멀티미디어 콘텐츠의 사용 증가와 함께 이를 효율적으로 제공할 수 있는 IP기반의 IMS(IP Multimedia Subsystem)기술이 도입되었다. 이러한 통신기술의 발달과 함께 다양한 수법을 이용한 범죄가 증가하고 있으며 이에 따른 감청의 필요성이 점점 커지고 있다. 감청에 관한 법률은 각 국가별로 시행되고 있으며 특히 미국과 유럽의 감청표준은 국제 감청표준의 근간이 되고 있다. 그러나 기존의 감청 아키텍처는 IMS 환경에 적절하지 않은 몇몇 한계점을 지니고 있기 때문에 새로운 환경에 적합한 아키텍처가 필요하다. 본 논문에서는 현재까지의 감청기술 및 동향을 다루고 IMS 환경에서의 개선된 감청 방안을 제시한다.

3G+ CDMA Wireless Network Technology Evolution: Application service QoS Performance Study (3G+ CDMA망에서의 기술 진화: 응용 서비스 QoS 성능 연구)

  • 김재현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.10
    • /
    • pp.1-9
    • /
    • 2004
  • User-Perceived application-level performance is a key to the adoption and success of CDMA 2000. To predict this performance in advance, a detailed end-to-end simulation model of a CDMA network was built to include application traffic characteristics, network architecture, network element details, and protocol features. We assess the user application performance when a Radio Access Network (RAN) and a Core Network (CN) adopt different transport architectures such as ATM and If. For voice Performance, we found that the vocoder bypass scenario shows 8% performance improvement over the others. For data packet performance, we found that HTTP v.1.1 shows better performance than that of HTTP v.1.0 due to the pipelining and TCP persistent connection. We also found that If transport technology is better solution for higher FER environment since the IP packet overhead is smaller than that of ATM for web browsing data traffic, while it shows opposite effect to small size voice packet in RAN architecture. Though simulation results we showed that the 3G-lX EV system gives much better packet delay performance than 3G-lX RTT, the main conclusion is that end-to-end application-level performance is affected by various elements and layers of the network and thus it must be considered in all phases of the technology evolution process.