Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 2007
DOI: 10.1145/1282380.1282394
|View full text |Cite
|
Sign up to set email alerts
|

Accurate and efficient SLA compliance monitoring

Abstract: Service level agreements (SLAs) define performance guarantees made by service providers, e.g, in terms of packet loss, delay, delay variation, and network availability. In this paper, we describe a new active measurement methodology to accurately monitor whether measured network path characteristics are in compliance with performance targets specified in SLAs. Specifically, (1) we describe a new methodology for estimating packet loss rate that significantly improves accuracy over existing approaches; (2) we in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
60
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 76 publications
(61 citation statements)
references
References 33 publications
0
60
0
1
Order By: Relevance
“…One example of an iceberg is a network traffic flow (e.g., all the traffic coming from a particular source IP address or targeting a particular destination IP address) that has high aggregate volume across many different monitors, even if it does not appear large at any single monitor. Detecting this type of event is important for a number of applications, including detecting DDoS attacks [1], finding heavy-hitters in Content Delivery Networks [2], discovering worms and other anomalies [3], as well as ensuring SLA compliance [4]. Applications that detect DDoS attacks need to find destination IP addresses that occur frequently across multiple ingress points.…”
Section: Introductionmentioning
confidence: 99%
“…One example of an iceberg is a network traffic flow (e.g., all the traffic coming from a particular source IP address or targeting a particular destination IP address) that has high aggregate volume across many different monitors, even if it does not appear large at any single monitor. Detecting this type of event is important for a number of applications, including detecting DDoS attacks [1], finding heavy-hitters in Content Delivery Networks [2], discovering worms and other anomalies [3], as well as ensuring SLA compliance [4]. Applications that detect DDoS attacks need to find destination IP addresses that occur frequently across multiple ingress points.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, authors of [9] build an active measurement system to address the problem of spatially identifying faults in the network. Similarly, authors of [10] propose a complex multi-objective methodology based on a plethora of active measurements to specifically identify Service-level Agreement (SLA) violations. However, active measurement come at the cost of injecting artificial load into the network, and thus must be carefully designed to not overload the system.…”
Section: Related Workmentioning
confidence: 99%
“…Some important work has been performed by Sommers et al in [3], where the authors present SLAm, an active probing tool, which implements innovative packet loss, delay, and delay variation estimation techniques for SLA assessment. In this research, the authors stress the need of proper metric estimation in order to lead to correct SLA assessment.…”
Section: Related Workmentioning
confidence: 99%
“…Both ISP and customers want to know at any time the quality of the network services, and whether it is respecting the contracted SLA. For this purpose, classical approaches for SLA assessment [1], [2], [3] focused on accurately measuring (when possible) or estimating (most of the times) network QoS or performance parameters such as One Way Delay (OWD), Inter Packet Delay Variation (IPDV), Packet Loss Ratio (PLR), etc.…”
Section: Introductionmentioning
confidence: 99%