Congestion Control Using TFC and TFR In Common Channel Signaling System#7 (SS7) At Message Transfer Part-Level 3
DOI:
https://doi.org/10.61841/s511np05Keywords:
Congestion Control, Transfer Control, Transfer Restricted Mechanism, Signaling System Number 7, Common Chanel Signaling #7, Secured Tracking DevicesAbstract
Signalling refers to the exchange of information between the call components required to maintain and provide the call service. The communication between telephones-switches in public telephone networks with different set of protocols are known as Signalling System Number 7 (SS7 or CCS#7). The function of SS7 are call control, maintenance capabilities based on office telephone network and network management remotely. The telephone networks are vulnerable to attacks and congestion occurring in the telecommunication. In telecommunication network( BSNL concerning) a failure of links and exchanges i.e, out of service of links and outage of exchanges. In addition, congestion situations may cause failure of single links. Therefore, to avoid such problems, “Congestion Control at MTP-L3 (Message Transfer Part-Layer3)” is used for controlling the traffic occurring at the MTP-L3 layer using Transfer Control (TFCs) and transfer restricted mechanism (TFRs). The “Secured Tracking Devices (STD)” is used for secured transmission of voice and data in the telecommunication by identifying the attackers. Hence, the “CC at MTP-L3 STD” methodology provides better results by varying Number of nodes and energy consumption of existing “STD without TFCs/TFRs. The route reliability increases with decrease in network lifetime, end-to-end delay and Congestion Control.
Downloads
References
[1] Mishra, S. & Modi, N. (2014). GSM Mobile Authentication Based on User SIM. IJCST, 2, 121–125.
[2] Jøsang, A., Miralabé, L. & Dallot, L. (2015). Vulnerability by Design in Mobile Network Security. Journal of Information Warfare, 14(4), 85–111.
[3] Manoharan, Rajesh, et al. (2020). Selection of Intermediate Routes for Secure Data Communication Systems using Graph Theory Application and Grey Wolf Optimization Algorithm in MANETs. IET Networks.
[4] Rajesh, M. & Gnanasekar, J. M. (2017). Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks. Wireless Personal Communications, 97, 1267–1289. https://doi.org/10.1007/s11277-017-4565-9
[5] Rajesh, M. (2020). Streamlining Radio Network Organizing Enlargement Towards Microcellular Frameworks. Wireless Personal Communications. https://doi.org/10.1007/s11277-020-07336-9
[6] Kuhn, D. R. (1997). Sources of Failure in the Public Switched Telephone Network. Computer, 30(4), 31–36.
[7] Saxena, N. & Payal, A. (2011). Enhancing Security System of Short Message Service for M-Commerce in GSM. International Journal of Computer Science & Engineering Technology, 2(4), 126–133.
[8] Tarkaa, N. S. & Ani, C. I. Design of Cost-effective Synthetic IP Backbone Network Topology for a Developing Economy.
[9] Lam, D. N. (2011). Defining Quantiles for Estimating IP Packet Delay Variation in NGN Core Networks. REV Journal on Electronics and Communications, 1(03).
[10] Almughaless, A. A. & Alsaih, A. M. (2010). Next Generation Network Design, Dimensioning & Services Innovation. International Journal of Computer Science and Network Security, 10(6), 191–198.
[11] Syed, M. & Ambore, I. Y. PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 CODEC.
[12] Obiniyi, A. A., Soroyewun, M. B. & Abur, M. M. (2014). New Innovations in Performance Analysis of Computer Networks: A Review. International Journal of Applied Information Systems, 6.
[13] Joung, J., Choi, J., Min, S., Son, S., Kim, Y., Song, J., Kim, Y. B. & Kim, C. S. (2013). A Flow Admission Control in Next Generation Networks with Flow Aggregate Information Exchange. Telecommunication Systems, 52(2), 363–374.
[14] Von Solms, R. & Van Niekerk, J. (2013). From Information Security to Cyber Security. Computers & Security, 38, 97–102.
[15] Ahamed, S. S. (2009). Performance Analysis of Signaling System 7 (SS7) Network and Protocols to Provide Call Control, Remote Network Management and Maintenance Capabilities. Journal of Theoretical & Applied Information Technology, 5(2).
[16] Sharma, G. & Mittal, H. SS7 Signaling Protocol – Security.
[17] Rufa, G. (2007). Developments in Telecommunications with a Focus on SS7 Network Reliability. Springer. ISBN: 978-3-540-74985-1.
[18] Kumar, V. (2019). Nusselt Number and Friction Factor Correlations of Three Sides Concave Dimple Roughened Solar Air Heater. Renewable Energy, 135, 355–377.
[19] Kumar, V. & Prasad, L. (2017). Experimental Analysis of Heat Transfer and Friction for Three Sides Roughened Solar Air Heater. Annales de Chimie - Science des Matériaux, 41(1–2), 75–107.
[20] Buttler, M. A., Nasby, R. D. & Quinn, R. K. (1976). Solid State Communications, 19, 1011.
[21] Ravindranathan Thampi, K., Reddy, T. V., Ramakrishnan, V. & Kuriacose, J. C. (1981). Abstracts of X International Conference on Photochemistry, Greece; Published in J. Photochem., 17(1–2), 183.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
