2006
DOI: 10.1109/tnet.2006.876199
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic inter-SLA resource sharing in path-oriented differentiated services networks

Abstract: Abstract-This paper proposes novel resource sharing schemes for differentiated services (DiffServ) networks, to achieve both high resource utilization and quality of service (QoS) guarantee. Service level agreements (SLAs) are negotiated at network boundaries and supported by path-oriented resource mapping within the network. The recently proposed SLA management scheme based on virtual partitioning (Bouillet et al., 2002) allows overloaded SLAs to exploit the spare capacity of underloaded SLAs for efficient re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0
2

Year Published

2006
2006
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 18 publications
(24 citation statements)
references
References 34 publications
0
22
0
2
Order By: Relevance
“…Each SLA may apply different policy rules to determine the protection bandwidth and the associated spare capacity. For example, if the SLA is negotiated to guarantee the call blocking probability, the Erlang-B formula can then be used to calculated the protection bandwidth [10]. For a stable SLA management system, sufficient protection bandwidth should be reserved so that the QoS performance of an underloaded SLA is better than or at least as good as the target QoS specification; otherwise, malicious overloading would be encouraged.…”
Section: Sla Definition and Resource-sharing Policiesmentioning
confidence: 99%
See 4 more Smart Citations
“…Each SLA may apply different policy rules to determine the protection bandwidth and the associated spare capacity. For example, if the SLA is negotiated to guarantee the call blocking probability, the Erlang-B formula can then be used to calculated the protection bandwidth [10]. For a stable SLA management system, sufficient protection bandwidth should be reserved so that the QoS performance of an underloaded SLA is better than or at least as good as the target QoS specification; otherwise, malicious overloading would be encouraged.…”
Section: Sla Definition and Resource-sharing Policiesmentioning
confidence: 99%
“…In [9,10], we refer to the inter-SLA resource sharing as bandwidth borrowing; both inter-SLA sharing and bandwidth borrowing are used interchangeably in the following for convenience. When bandwidth borrowing happens, the related unlendable and lendable SLAs are termed as borrower SLAs and lender SLAs, respectively.…”
Section: Network Status Record For Resource Sharingmentioning
confidence: 99%
See 3 more Smart Citations