The intelligent peripheral (IP) is one of the key central resources in the intelligent network concept, allowing user to network interaction for services such as credit card calling. User access to IPs is controlled by service control points (SCPs) and is typically gained via voice trunk groups from service switching points (SSPs), with many services sharing common SSP-IP trunk group facilities. This paper proposes and analyses a distributed overload control scheme for the fair allocation of these facilities. The algorithm is shown to be effective in protecting services from the detrimental effects of focused overloads (to one or more other services) while minimising the information passed from the SSPs/IPs to the SCP
Two novel expert dynamic buffer tuners/controllers, namely, the neural network controller (NNC) and ...
Overload control of call processors in telecom networks is used to protect the network of call proce...
In this chapter we present examples of application of the consensus-based algorithms introduced in C...
This paper deals with overload control algorithms that should see to that throughput in an service c...
This paper addresses overload control issues for distributed control systems, i.e. multiprocessor sy...
Current developments in technologies and markets stress the importance of exible and robust performa...
Heavy network load in the signaling system number 7 is an important source of customer dissatisfacti...
The Internet telephony employs a new type of Internet communication on which a mutual communication ...
Providing multimedia services to users assumes perfect quality of transfer and modern processing equ...
The Session Initiation Protocol (SIP) is an application-layer control protocol standardized by the I...
Abstract— The concept of IP Multimedia Subsystem (IMS) describes a new network architecture, the mai...
Abstract – During overloads in the mains, the load curtailment applied to interruptible loads is oft...
In this thesis, we develop and examine decision models intended for traffic engineering analysis of ...
Overload happens in Session Initiation Protocol (SIP) net-works when SIP servers have insufficient r...
Two novel expert dynamic buffer tuners/controllers, namely, the neural network controller (NNC) and ...
Two novel expert dynamic buffer tuners/controllers, namely, the neural network controller (NNC) and ...
Overload control of call processors in telecom networks is used to protect the network of call proce...
In this chapter we present examples of application of the consensus-based algorithms introduced in C...
This paper deals with overload control algorithms that should see to that throughput in an service c...
This paper addresses overload control issues for distributed control systems, i.e. multiprocessor sy...
Current developments in technologies and markets stress the importance of exible and robust performa...
Heavy network load in the signaling system number 7 is an important source of customer dissatisfacti...
The Internet telephony employs a new type of Internet communication on which a mutual communication ...
Providing multimedia services to users assumes perfect quality of transfer and modern processing equ...
The Session Initiation Protocol (SIP) is an application-layer control protocol standardized by the I...
Abstract— The concept of IP Multimedia Subsystem (IMS) describes a new network architecture, the mai...
Abstract – During overloads in the mains, the load curtailment applied to interruptible loads is oft...
In this thesis, we develop and examine decision models intended for traffic engineering analysis of ...
Overload happens in Session Initiation Protocol (SIP) net-works when SIP servers have insufficient r...
Two novel expert dynamic buffer tuners/controllers, namely, the neural network controller (NNC) and ...
Two novel expert dynamic buffer tuners/controllers, namely, the neural network controller (NNC) and ...
Overload control of call processors in telecom networks is used to protect the network of call proce...
In this chapter we present examples of application of the consensus-based algorithms introduced in C...