QoS Design Consideration for Enterprise and Provider's Network at Ingress and Egress Router for VoIP Protocols

Kolhar, Manjur; Abualhaj, Mosleh M.; Rizwan, Faiza
February 2016
International Journal of Electrical & Computer Engineering (2088;Feb2016, Vol. 6 Issue 1, p235
Academic Journal
Compliance with the Service Level Agreement (SLA) metric is a major challenge in a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end service levels. The end-toend service of an MPLS VPN can be degraded owing to various issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that prevents congestion and differentiates between legitimate and illegitimate user traffic. In this study, we propose a centralized solution that uses a SLA Violation Detector (SLAVD) and intrusion detection to prevent SLA violation.


Related Articles

  • A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack. Kumar, Abhishek; Tilagam, P. Santhi // International Journal of Computer Applications;Jul2011, Vol. 26, p31 

    Voice over Internet protocol (VoIP) is continuously evolving and changing the face of business telephony. The Session Initiation Protocol (SIP) is a widely used standard in VoIP communications to setup and tear down phone calls. Low rate Denial-of Service (DoS) attack recently emerged as the...

  • A Closer Look At WAN SLAs. Farney, Sean // Business Communications Review;Oct2006, Vol. 36 Issue 10, p12 

    This article discusses round-trip delay service level agreements on a worldwide MPLS network. Researchers expected to find that data would either confirm or challenge the validity of service agreements. The service level agreements of a Data center in Boston, Massachusetts and its latency in...

  • SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy. Mahdizdeh Zargar, Reihaneh Haji; Yaghmaee Moghaddam, Mohammad Hossein // International Journal of Hybrid Information Technology;Sep2014, Vol. 7 Issue 5, p257 

    Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different...

  • Analysis of Conflict DoS Attacks Process and Counter Measure on SIP Based VoIP Network. Islam, Md. Ruhul; Ghosh, Smarajit; Ahmed, Nausrat Jahan // International Journal of Advanced Research in Computer Science;May/Jun2012, Vol. 3 Issue 3, p433 

    Voice over Internet protocol (VoIP) is continuously developing and changing the face of business telephony. The Session Initiation Protocol (SIP) is a generally used standard in VoIP communications to setup and tear down phone calls. Amongst various online attacks hampering IT security, Denial...

  • Negotiating And Implementing MPLS: What You Don't Know Can Hurt You. Beat, Gregory // Business Communications Review;Nov2007, Vol. 37 Issue 11, p28 

    The article discusses the implementation of multi-protocol label switching network protocols (MPLS). MPLS can assist in improving network service, lowering costs and can manage data transport to ensure necessary bandwidth for voice over Internet protocol (VOIP) and streaming video. The author...

  • A new way of working. Randery, Tanuja // Management Today;Sep2006, p107 

    The article focuses on the significance of voice over IP networks in the field of business. The levels of quality and service level agreements that one expects from data services are guaranteed by enterprise telephony using an IP network. IP telephony is simple technology which is less costly to...

  • Packeteer targets carriers for managed WAN optimization.  // MarketWatch: Technology;Sep2005, Vol. 4 Issue 9, p6 

    This article reports that Packeteer Inc. has begun to target telecom operators running MPLS networks with its WAN optimization technology, arguing that it enables them to offer application-specific service level agreements. The initiative is being led by Packeteer's operations in Europe, where...

  • Trust Based Approach to Detect and Prevent Distributed Denial of Service Attacks and Flash Crowds in VoIP Services. Jeyanthi, N.; Iyengar, N.Ch.S. N. // International Journal of Security & Its Applications;Jul2011, Vol. 5 Issue 3, p59 

    Voice-over-IP (VoIP) is being widely used to packetize and relay voice information over existing IP networks. Due to the cheaper costs involved in using VoIP as opposed to traditional PSTN networks it is quickly gaining momentum and has seen widespread use in both personal and business domains....

  • Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation. Krile, Srećko; Peraković, Dragan // International Journal of Communications, Network & System Scienc;Aug2009, Vol. 2 Issue 5, p422 

    In end-to-end QoS provisioning some bandwidth portions on the link may be reserved for certain traffic classes (and for particular set of users) so the congestion problem of concurrent flows (traversing the network simultaneously) can appear. It means that in overloaded and poorly connected...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics