2014
DOI: 10.1016/j.jnca.2013.10.017
|View full text |Cite
|
Sign up to set email alerts
|

Probe-based end-to-end overload control for networks of SIP servers

Abstract: The Session Initiation Protocol (SIP) has been adopted by the IETF as the control protocol for creating, modifying and terminating multimedia sessions. Overload occurs in SIP networks when SIP servers have insufficient resources to handle received messages. Under overload, SIP networks may suffer from congestion collapse due to current ineffective SIP overload control mechanisms. This paper introduces a probe-based end-to-end overload control (PEOC) mechanism, which is deployed at the edge servers of SIP netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 20 publications
(26 citation statements)
references
References 25 publications
0
26
0
Order By: Relevance
“…As in Liao et al, for each target server, one entity is created, following SIP requests and 503 responses to apply limitations to the destination. In Liao et al and Wang et al, if the network is overloaded, the 503 responses are delayed; then, the entity reacts with a lag. In Khazaei and Mozayani, a window‐based end‐to‐end mechanism is offered to control and manage overload in SIP networks.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…As in Liao et al, for each target server, one entity is created, following SIP requests and 503 responses to apply limitations to the destination. In Liao et al and Wang et al, if the network is overloaded, the 503 responses are delayed; then, the entity reacts with a lag. In Khazaei and Mozayani, a window‐based end‐to‐end mechanism is offered to control and manage overload in SIP networks.…”
Section: Related Workmentioning
confidence: 99%
“…The standard topology shown in Figure is selected for simulation. This topology has been used in recent research . The routing is implemented as described in section 4.1 based on the IMS model.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 3 more Smart Citations