• Title/Summary/Keyword: Call Number

Search Result 468, Processing Time 0.024 seconds

Mutual-Backup Architecture of SIP-Servers in Wireless Backbone based Networks (무선 백본 기반 통신망을 위한 상호 보완 SIP 서버 배치 구조)

  • Kim, Ki-Hun;Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.32-39
    • /
    • 2015
  • The voice communications with wireless backbone based networks are evolving into a packet switching VoIP systems. In those networks, a call processing scheme is required for management of subscribers and connection between them. A VoIP service scheme for those systems requires reliable subscriber management and connection establishment schemes, but the conventional call processing schemes based on the centralized server has lack of reliability. Thus, the mutual-backup architecture of SIP-servers is required to ensure efficient subscriber management and reliable VoIP call processing capability, and the synchronization and call processing schemes should be changed as the architecture is changed. In this paper, a mutual-backup architecture of SIP-servers is proposed for wireless backbone based networks. A message format for synchronization and information exchange between SIP servers is also proposed in the paper. This paper also proposes a FSM scheme for the fast call processing in unreliable networks to detect multiple servers at a time. The performance analysis results show that the mutual backup server architecture increases the call processing success rates than conventional centralized server architecture. Also, the FSM scheme provides the smaller call processing times than conventional SIP, and the time is not increased although the number of SIP servers in the networks is increased.

A Hand-off Technique for Cellular Networks Using Game Theory (셀룰라 네트워크에서 게임 이론을 이용한 핸드오프 기법)

  • Hong, Jin-Dae;Lee, Sin-Kyu;Kim, Hyun-Tae;Ra, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2399-2404
    • /
    • 2009
  • In cellular network systems one of the most significant quality metrics to measure quality of performance is the average number of call drops in a system. It ensures that the active calls in the system are successfully completed without being dropped in the mid communication for ultimate customer satisfaction. Hand-off mechanism increases cellular system reliability by seamless continuation of active calls by transferring active calls from one base station to another. In this paper, we study and propose a simple hand-off mechanism using game theory. We conclude that using the simple QoS utility function proposed in this paper, our optimal deterministic hand-off strategy is to transfer the active calls to the base station with greater signal-to-interference ratio (SIR) and greater number of available channels.

Dimensioning Next Generation Networks for QoS Guaranteed Voice Services (NGN에서의 품질보장형 음성서비스 제공을 위한 대역 설계 방법)

  • Kim, Yoon-Kee;Lee, Hoon;Lee, Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.9-17
    • /
    • 2003
  • In this paper we proposea method for estimating the bandwidth in next-generation If network. Especially, we concentrate on the edge routers accommodating the VoIP connections as well as a group of data connections. Bandwidth dimensioning is carried out at call level and packet level for voice traffic in the next-generation IP network. The model incorporates the statistical estimation approach at a call level for obtaining the number of voice connections simultaneously in the active mode. The call level model incorporates a statistical technique to compute the statistics of the number of active connections such as the mean and variance of the simultaneously connected calls in the network. The packet level model represents a load map for voice and data traffic by using non-preemptive M/G/1 queuing model with strict priority for voice over data buffer, From the proposed traffic model, we can derive a graph for upper bounds on the traffic load in terms of bandwidth for voice and data connections. Via numerical experiments we illustrate the implication of the work.

A Nonblocking $Multi-Log_2N$ Multiconnection Network : Theoretical Characterization and Design Example for a Photonic Switching System (넌블럭킹 $Multi-Log_2N$다중 접속망 : 이론적 특성 및 광 교환시스템을 위한 설계예)

  • Yeong Hwan TSCHA;Kyoon Ha LEE
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.7
    • /
    • pp.680-695
    • /
    • 1991
  • In this paper, the conditions on the number of required copies of a self-routing network with and without extra stages in back-to-back manner are presented respectively for a nonblocking $Multi-Log_2N$ multiconnection network. Actually the obained results hold regardless of connection patterns, i.e., whether a network deploys on-to-one connections or multiconnections. Thus open problems on the nonblocking condition for a multi $Multi-Log_2N$ multiconnection network are solved. Interestingly some of the given formulas comprise the Benes network and the Canto network as a special case repectively. A novel switching system architecture deploying a distributed calls-distribution algorithm is provided to design a nonblocking $Multi-Log_2N$ photonic switching network using a directional coupler. And a directional couplex based call holding demultiplexer is introduced to hold a call until blocking disappears in a switching network and let it enter to a network, provided that the number of switching networks is less than that of required switching networks for a nonblocking $Multi-Log_2N$ network.

  • PDF

AN APPROXIMATION FOR THE DISTRIBUTION OF THE NUMBER OF RETRYING CUSTOMERS IN AN M/G/1 RETRIAL QUEUE

  • Kim, Jeongsim;Kim, Jerim
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.27 no.3
    • /
    • pp.405-411
    • /
    • 2014
  • Queueing systems with retrials are widely used to model many problems in call centers, telecommunication networks, and in daily life. We present a very accurate but simple approximate formula for the distribution of the number of retrying customers in the M/G/1 retrial queue.

The Tunnel Number One Knot with Bridge Number Three is a (1, 1)-knot

  • Kim, Soo Hwan
    • Kyungpook Mathematical Journal
    • /
    • v.45 no.1
    • /
    • pp.67-71
    • /
    • 2005
  • We call K a (1, 1)-knot in M if M is a union of two solid tori $V_1\;and\;V_2$ glued along their boundary tori ${\partial}V_1\;and\;{\partial}V_2$ and if K intersects each solid torus $V_i$ in a trivial arc $t_i$ for i = 1 and 2. Note that every (1, 1)-knot is a tunnel number one knot. In this article, we determine when a tunnel number one knot is a (1, 1)-knot. In other words, we show that any tunnel number one knot with bridge number 3 is a (1, 1)-knot.

  • PDF

A Countermeasures on the Hacking for the Internet Shopping Mall (인터넷 쇼핑몰의 해킹 사고에 대한 대응방법)

  • Lee, Young Gyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.33-43
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the hacking to the internet shopping mall go on increasing. If the large shopping mall is attacked by the hacker, a number of user's information are exposed to the hacker. The private information as like a resident registration number, user's real name, the date of user's birth, the mobile phone number, the office phone number / address, the home phone number / address and so on include the information. These information are used in the phishing e-mails / call and spam. And them are selling and buying maliciously. The large internet shopping mall 'auction' was hacked in April, 2008. After the incident, this paper suggested a countermeasures on the hacking for the internet shopping mall. The technical item and political item are included among the countermeasures. The countermeasures can protect the hacking not only the internet shopping mall but also the web sites basically.

Implementation of Internet Telephone by SIP Server (SIP 서버를 통한 인터넷폰 구현)

  • 김진수;이찬우;양해권
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.75-82
    • /
    • 2003
  • We can foresee the rapidly growing of users by development of VoIP service what can transmit a audio traffic with low cost among a lots application using internet. VoIP needs a standardized protocol that is able to do signaling for offering high quality of services such as mobility, universal number, multiparty conference, voice mail, automatic call distribution. At the present time, a base composition elements of SIP(Session Intiation Protocol) are developing for offering VoIP based SIP in the inside and outside of the country, because SIP of IETF which has a strength from 'fast connection', 'parsing' & 'easy to compile' points of view. This paper suggests a type of Hybrid SIP Server for providing some services as 'a reducing load of SIP server that process a request method from users', 'efficiency of managing networks', 'offering services to many users'.

iCaMs: An Intelligent System for Anti Call Phishing and Message Scams (iCaMs: 안티 콜 피싱 및 메시지 사기를 위한 지능형 시스템)

  • Tran, Manh-Hung;Yang, Hui-Gyu;Dang, Thien-Binh;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.156-159
    • /
    • 2019
  • The damage from voice phishing reaches one trillion won in the past 5 years following report of Business Korea on August 28, 2018. Voice phishing and mobile phone scams are recognized as a top concern not only in Korea but also in over the world in recent years. In this paper, we propose an efficient system to identify the caller and alert or prevent of dangerous to users. Our system includes a mobile application and web server using client and server architecture. The main purpose of this system is to automatically display the information of unidentified callers when a user receives a call or message. A mobile application installs on a mobile phone to automatically get the caller phone number and send it to the server through web services to verify. The web server applies a machine learning to a global phone book with Blacklist and Whitelist to verify the phone number getting from the mobile application and returns the result.