• 제목/요약/키워드: internet service provider

Search Result 361, Processing Time 0.021 seconds

A Set-top Box with Virtual Platform Support for QoS Management in IMS Based Multiple Provider Networks

  • Siddiqui, Muhammad Shoaib;Hong, Choong-Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.886-905
    • /
    • 2012
  • Set-top Box (STB) has evolved from being a device just sitting on top of a TV shelf to a device providing a gateway to the Internet for a home network, receiving services from multiple content providers, and enabling and ensuring Quality of Service (QoS) for the streaming media. IP Multimedia Subsystem (IMS), with its promise to provide a converged access network for multimedia service delivery (such as Triple play & Quadruple play services), has to guarantee QoS support. To enable QoS in IMS-based networks, we have designed a set-top box which provides feedback to the service provider to ensure end-to-end QoS. Our set-top box is designed to provide virtual platforms such that it can support multiple service providers. Each service provider is able to manage its own multimedia streams and ensures the desired network performance for each flow. The set-top box also works as a Home Gateway and provides end-to-end QoS support to the client nodes.

Expected Asset Loss Estimation Considering Security Risks of ISPs’Networks (ISP(Internet Service Provider)의 네트워크 보안 위험을 고려한 예상 자산손실 모델링)

  • 문호건;이종필
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.121-127
    • /
    • 2003
  • 본 논문에서는 Internet Service Provider(이하 ISP)의 네트워크에 위험이 발생할 경우 위험의 출현으로 인한 ISP의 자산손실을 추정하는 방법을 제안한다. ISP의 네트워크를 구성하는 자산들의 가치를 서비스 측면에서 분석하고, 개별 자산이 생산하는 서비스 가치를 근사할 수 있는 방법론을 제시함으로써 네트워크의 장애로 인한 손실액을 추정 가능함을 보인다. 또한, 네트워크의 부하 분산, 우회 경로 및 백업 시스템 등 서비스 연속성을 확보를 위한 잉여 설계가 있을 경우, 자산가치 특성함수를 사용한 손실액 추정모델을 제안한다.

  • PDF

An Implementation of the Web Service for Authorization and Speech Recognition in the Mobile Environment (모바일 환경에서 인증과 음성인식을 위한 웹 서비스 구현)

  • Oh Jee-Young;Kim Yoon-Joong;Ko You-Jung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.225-232
    • /
    • 2005
  • A PDA has limitation of storage space and inconvenience of Pen-based equipment to input. To solve these problems, this paper implemented that previous Speech Recognition provides using XML(extensile Markup Language) Web Service and PDA Client is possible to use speech command by request Speech Recognition Web Service. This system consists of Mobile Client and Speech Recognition Web Service Provider. The Mobile Client transmits user information and speech data to the Speech Recognition Web Service Provider using DIME(Direct Internet Message Encapsulation). The Speech Recognition Web Service Provider returns recognition results and user name only to an authorized Mobile Client. So We are able to use speech service without installing Speech Recognition or Speech DB in PDA.

  • PDF

The Implementation of Web Services System for Realtime Finger Recognition in Mobile Environments (모바일 환경에서 실시간 지문인식을 위한 웹 서비스 시스템 구현)

  • Ko, You-Jung;Kim, Yoon-Joong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.483-487
    • /
    • 2006
  • In this paper implemented that PDA sends finger images and can finger recognition web service system in realtime. Finger recognition web service system received the finger images and return the recognition result as XML style. because of this it can offer the same service to using wireless PDA as well as using wire internet client. This system consist of mobile client and finger recognition web service provider. Mobile client request finger recognition web service provider using DIME with taken finger image. We can easily receive and see the result of finger recognition without mass finger database in limited storage space of PDA. Finger recognition web service provider offers that receiving finger images and calling finger recognition system after the recognition return the result.

  • PDF

Analysis of Inter-Domain Collaborative Routing: Provider Competition for Clients

  • Nicholes, Martin O;Chuah, Chen-Nee;Wu, Shyhtsun Felix;Mukherjee, Biswanath
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.499-510
    • /
    • 2011
  • Any server offering a routing service in the Internet would naturally be in competition for clients, and clients may need to utilize service from a specific server in order to achieve a desired result. We study the various properties of this competition, such as the fraction of route requests handled by a routing service provider and the fraction of total revenue obtained. As the routing service providers (i.e., servers or routers in this context) compete, they may alter behavior in order to optimize one of the above properties. For example, a service provider may lower the price charged for its service, in order to increase the number of clients served. Our models are based on servers offering a routing service to clients within representative network topologies based on actual Internet sub-graphs. These models provide, a framework for evaluating competition in the Internet. We monitor key aspects of the service, as several variables are introduced into the models. The first variable is the fraction of client requests that will pay more for a better quality route. The remaining requests are normal client requests that are satisfied by the most economical route. The second variable is the fraction of servers who choose to lower service prices in order to maximize the number of client requests served. As this fraction increases, it is more likely that a server will lower the price. Finally, there are some resource constraints applied to the model, to increase the difficulty in providing a routing solution, i.e., to simulate a realistic scenario. We seek to understand the effect on the overall network, as service providers compete. In simple cases, we show that this competition could have a negative impact on the overall efficiency of a service. We show that the routing variety present in the larger models is unable to mask this tendency and the routing service performance is decreased due to competition.

Internet Information Service using Telephony and Fax, ITC-CSCC’2000

  • Jang, Young-Gun;Cho, Kyoung-Hwan
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.691-694
    • /
    • 2000
  • This paper is addressed to Internet telephony based service implementation. It describes an implementation method which uses ARS as a gateway which combines Internet and traditional public switched telephone network for Internet information service using telephony and fax, is different to traditional Internet telephony which provide enhanced speech quality and low cost functionality. This method allows telephony and/or fax user to get Internet information without additional Internet bill, Internet infrastructure and low connection quality from low signal bandwidth connected him. Implemented system is useful to a special kind information service such as climate information of Korea etc and simpler than WAP based service as for wireless mobile telephony user. We implement job opportunity information and advertisement service supported by Home page of Choong Book Small & Medium Business Administration and e-mail service supported by Korean Society for Rehabilitation of persons with Disabilities to demonstrate the system ability. As a result of test implementation, this service system works good fur blind persons and graduated persons without job, is expected to apply for special Internet information provider via Voice and Fax.

  • PDF

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

Structural Equation Model for Korea Internet Infrastructure Customer Satisfaction Index(KIICSI) (구조방정식을 이용한 초고속 국가망 서비스의 고객만족도 평가체계 개발)

  • Shin Sun Young;Shin Sang-Chul;Moon Tae Hee;Sohn So Young
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.220-235
    • /
    • 2005
  • Internet Service Quality has been constantly the center of attention to Internet Service Providers. The KII project plan (Korea Information Infrastructure) aims to build broadband backbone networks mainly through optical fiber cables and ATM switches and to Provide the government ministries, local authorities and non-profit organizations with high-speed, highly capable broadband access to these networks at reasonable rates. The KB service model, however, is different from other Internet Service models much in the same way SP (Service Provider) and NP (Network Provider) differ from each other. In this paper, we evaluate KII service according to various customer satisfaction indicators under the methodologies and categories as put forth in both the ACSI (American Customer Satisfaction Index) and SEM (Structural Equation Model). We use a structural equation model (SEM) to demarcate the Korea Information Infrastructure Customer Satisfaction Index (KIICSI) in relation to network service quality. The results of our study suggest some strategies for the KII Project need to be modified and effectively implemented in order to increase the satisfaction level of the KII customers.

A New Online News Service Model, based on NewsML and UCI Systems (NewsML과 UCI를 적용한 뉴스 콘텐츠의 온라인 유통모델)

  • Park, Chang-Shin;Kil, Duke
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.641-645
    • /
    • 2007
  • News contents, produced for paper readers, are more and more being used online instead of offline. Internet sites, expecially portals(naver, daum, nate etc.) are dominant marketplaces, where news are exchanged and values are added. So, establishing a new online news service system, which can satisfy news provider(copyright owner) and internet service provider together, is a necessary task under current online-dominant news service environment. UCI(Universal & Ubiquitous Content Identifier) and IPTC NewsML(News Mark-up Language) are considered as useful standards to compromise protection of news-copyright and enhancement of online use of news contents. This study is based on a real case of 'NewsBank' in korea, We expect that this study can show an inspiration to obtain two contradictory goals of copyright protection and free online use of copyright.

  • PDF

Proposal for Service Model for Internet Identity Management (인터넷 ID관리를 위한 서비스 모델 제안)

  • Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • The incredible progress of information and communication technology has allowed various information and communication services to emerge in the Web environment. Such a service is initiated when the user provides his/her personal information to the service provider and is then given an identifier and authentication data. A series of the processes is inconvenient as it requires authentication by the service provider each time that the user requests the service. Furthermore, as the user subscribes to more services, the volume of ID and authentication information increases. This compels the users to use an ID that is easy to remember or to register the same ID over and over, increasing the risk of ID hacking. It is clear that such threats will become more serious as our lives become more dependent upon the Internet and as the Internet service environment advances. With the introduction of different services, the need to efficiently manage ID has been raised. In this paper, a Internet Identity Management Service that enables the control of the flow of the user’s personal information, which is used and stored for the Internet service, is proposed from the user's perspective.