Cost analysis of deep packet inspection in PCC architecture

Chuan Sheng Lin, Sok Ian Sou

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Along with being more popular of the mobile device, there are more and more mobile applications have been developed nowadays. However among these applications are 'Over-The-Top (OTT)' applications which have been provided by the vendor of applications holds the biggest amount of them. And OTT merely use bandwidth which is offered by operators and this has caused operator have to afford a big amount of money for bandwidth but with very less income in return. Hence, here are many operators trying their best to join the mechanism of Deep Packet Inspection (DPI), and then assign the packets with different Quality of Service (QoS) rules according to their different kinds of signature. However to the router and backbones this will be a heavy burden. Consequently, this research mainly analyze how the mechanism of the DPI affects the Policy Control and Charging (PCC) System, and moves forward a step to investigate the rate of identification of DPI at different detecting rate in order to get the high successful detection rate but with the lower cost. In conclusion, this research's main purpose is to build reference of DPI mechanism.

Original languageEnglish
Title of host publicationIntelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
EditorsWilliam Cheng-Chung Chu, Stephen Jenn-Hwa Yang, Han-Chieh Chao
PublisherIOS Press
Number of pages9
ISBN (Electronic)9781614994831
Publication statusPublished - 2015 Jan 1
EventInternational Computer Symposium, ICS 2014 - Taichung, Taiwan
Duration: 2014 Dec 122014 Dec 14

Publication series

NameFrontiers in Artificial Intelligence and Applications
ISSN (Print)0922-6389


OtherInternational Computer Symposium, ICS 2014

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence


Dive into the research topics of 'Cost analysis of deep packet inspection in PCC architecture'. Together they form a unique fingerprint.

Cite this