2018 International Conference on Advanced Communication Technologies and Networking (CommNet) 2018
DOI: 10.1109/commnet.2018.8360249
|View full text |Cite
|
Sign up to set email alerts
|

A new architecture for enhancing the QoS of IPTV video components in LTE systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…A straightforward approach to eliminate the negotiation procedure is achieved by an in-band signalling. As the name indicates, this approach allows the application to signal a desired TE behavior in a header field of the sending IP packet, such as a DSCP [17] and an IPv6 flow label [18]. At a network operator's edge router, the IP packet is adequately forwarded to an optimal TE path by examining the desired TE behavior signalled in the header field.…”
Section: Application-side Request-based Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…A straightforward approach to eliminate the negotiation procedure is achieved by an in-band signalling. As the name indicates, this approach allows the application to signal a desired TE behavior in a header field of the sending IP packet, such as a DSCP [17] and an IPv6 flow label [18]. At a network operator's edge router, the IP packet is adequately forwarded to an optimal TE path by examining the desired TE behavior signalled in the header field.…”
Section: Application-side Request-based Approachmentioning
confidence: 99%
“…Since the NetworkAPI framework exposes some of the packet control capabilities to applications, it is necessary to ensure that the request is from an authenticated application, especially when provided in a public environment such as the Internet. Regarding the application authentica- [11], [12] Network-side Classification-based Approach (ML) [13]- [16] Application-side Request-based Approach (out-band) [2]- [7] Application-side Request-based Approach (in-band) [17], [18] [19] provides HMAC TLV that contains a hashbased message authentication code (HMAC) calculated by a pre-shared key and an SRH message [37]. As shown in Fig.…”
Section: Application Authenticatonmentioning
confidence: 99%
“…The suggested PHB will make possible prioritization of sub traffics in accordance with the applied QoS network policy. We have previously tested our approach on a fixed network (Matoui et al, 2017a) and then on a mobile one in case of moving user in one cell (Matoui et al, 2017b) and in case of stable and moving users in three different cells (Matoui et al, 2018a;2018b). In this study, we start with a description of the IMS network and IPTV.…”
Section: Introductionmentioning
confidence: 99%