All Title Author
Keywords Abstract


Admission Control Methods in IP Networks

DOI: 10.1155/2013/918930

Full-Text   Cite this paper   Add to My Lib

Abstract:

Telecommunications operators and research institutions pay close attention to the issue of quality of service. The paper deals with methods of admission control in IP networks, which is only one of the subsets of quality of service. There are two large groups of AC methods: parameter-based admission control and measurement-based admission control. The core of the paper is simulation of AC methods and algorithms for topology model in MATLAB. Our simulations are mainly focused on required bandwidth and loss rates. At the end of the paper there are compared results of simulations. 1. Introduction Nowadays we face the unstoppable development of information technology, which penetrate into various spheres of users activities and services. Technology make available to end users more and more information. One of the technological advances to which the term information technology is related is a computer network. It is used in many ways, but especially for the transmission of voice, video, and data (i.e., communication). Network provides conditions for Quality of Service (QoS), which lead to the satisfaction of the end user. The process, which significantly affects the QoS, is admission control methods [1, 2]. The present and future networks are a precondition for the satisfaction of user availability of needed bandwidth. In places where the replacement of infrastructure would be costly it is necessary to develop means for more efficient use of available bandwidth. One of the tools used in IP Multimedia Subsystem (IMS) technology is an element of Resource Admission Control Subsystem (RACS). RACS is an important logical network element that is used to communicate between the control layer and transmission management functions resource reservation, admission control, support for border gateway services, network address translation, networks aggregation, and QoS support. Between RACF (Resource Admission Control Function) element and RACS element there are some differences consisting in bandwidth reservation, sharing service addresses across the network. It could be said that RACS is in some way specification of RACF. It was designed by TISPAN organization. A network element is responsible for the implementation of procedures and mechanisms handling policy-based resource reservation and admission control for both unicast and multicast traffics in access networks, core networks, and customer premises networks [3]. RACS reserves appropriate resources and allow the requirement assuming policies, and required resources in the transport network are available. RACS

References

[1]  A. F. Atlasis, N. H. Loukas, and A. V. Vasilakos, “Use of learning algorithms in ATM networks call admission control problem: a methodology,” Computer Networks, vol. 34, no. 3, pp. 341–353, 2000.
[2]  M. Kavacky and I. Baroňák, “Evaluation of two statistical CAC methods for variable bit rate traffic sources,” Journal of Electrical Engineering, vol. 59, no. 4, pp. 178–186, 2008.
[3]  ETSI ES 282 001 v3. 4. 1: Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN), NGN Functional Architecture. September 2009.
[4]  T. Balogh and M. Medvecky, “Average bandwidth allocation model of WFQ,” Modelling and Simulation in Engineering, vol. 2012, Article ID 301012, 7 pages, 2012.
[5]  M. Halas and S. Klucik, “Modelling the probability density function of IPTV traffic packet delay variation,” Journal Advances in Electrical and Electronic Engineering, vol. 10, no. 4, pp. 225–263, 2012.
[6]  T. Misuth and I. Baronak, “Application of M/G/1/K model for aggregated VoIP traffic packet loss estimation,” in Proceedings of the 35th International Conference on Telecommunication and Signal Processing (TSP' 12), pp. 42–46, Prague Czech Republic, 2012.
[7]  R. Róka and F. ?ertík, “Modeling of environmental influences at the signal transmission in the optical transmission medium,” International Journal of Electrical Communication Networks and Information Security, vol. 4, no. 3, pp. 144–162, 2012.
[8]  R. Róka, “The designing of NG-PON networks using the HPON network configurator,” Journal of Communication and Computer, vol. 9, no. 6, pp. 669–678, 2012.
[9]  A. Vasilakos, C. Ricudis, K. Anagnostakis, W. Pedrycz, and A. Pitsillides, “Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks,” in Proceedings of the 1998 IEEE International Conference on Fuzzy Systems, pp. 1488–1493, May 1998.
[10]  J. Rozhon and M. Voznak, “Development of a speech quality monitoring tool based on ITU-T P. 862,” in Proceedings of the 34th International Conference on Telecommunications and Signal Processing (TSP' 11), pp. 62–66, Budapest, Hungary, August 2011.
[11]  M. Grossglauser and D. Tse, “Framework for robus measurement-based admission control,” in Proceedings of the Special Interest Group on Data Communication SIGCOMM is the flagship annual conference of the Special Interest Group on Data Communication (SIGCOMM '97), Cannes, France, 1997.
[12]  S. Yerima, “Implementation and evaluation of measurement-based admission control schemes within a converged networks QoS management framework,” International Journal of Computer Networks & Communications, vol. 3, no. 4, pp. 137–152, 2011.
[13]  E. Chromy, T. Behul, and M. Kovacik, “Admission control methods in IP networks,” in Proceedings of the 14th International Conference on Research in Telecommunication Technologies (ICACT '12), pp. 93–97, Bratislava, Slovakia, September 2012.
[14]  F. Brichet and A. Simonian, “Conservative gaussian models applied to measurement-based admission control,” in Proceedings of the 6th International Workshop on Quality of Service (IWQoS '98), pp. 68–71, San Francisco, Calif, USA.
[15]  J. Micuch and I. Baronak, “Admission control methods for ensuring quality of service in IP,” Posterus, vol. 3, no. 5.
[16]  E. Alipour and K. Mohammadi, “Adaptive admission control for QoS guarantee in differentiated services networks,” International Journal of Computer Science and Network Security, vol. 8, no. 6, pp. 93–98, 2008.
[17]  K. Frank, S. Zachary, and I. Ziedins, “Notes on effective bandwidths,” in Stochastic Networks: Theory and Applications, Royal Statistical Society Lecture Notes Series, pp. 141–168, Oxford University Press, New York, NY, USA, 1996.
[18]  Z. Turányi, A. Veres, and A. Oláh, A Family of Measurement-Based Admission Control Algorithms. Trafic Analysis and Network Performance Laboratory, Chapman & Hall, Budapest, Hungary, 1996.
[19]  R. J. Gibbens, F. P. Kelly, and P. B. Key, “Decision-theoretic approach to call admission control in ATM networks,” IEEE Journal on Selected Areas in Communications, vol. 13, no. 6, pp. 1101–1113, 1995.
[20]  G. Almes, S. Kalidindi, and M. Zekauskas, “A one-way packet loss metric for IPPM,” RFC 2680, 1999.
[21]  M. Voznak and F. Rezac, “Threats to voice over IP communications systems,” WSEAS Transactions on Computers, vol. 9, no. 11, pp. 1348–1358, 2010.
[22]  M. Voznak and J. Rozhon, “Methodology for SIP infrastructure performance testing,” WSEAS Transactions on Computers, vol. 9, no. 9, pp. 1012–1021, 2010.
[23]  M. Voznak and F. Rezac, “Web-based IP telephony penetration system evaluating level of protection from attacks and threats,” WSEAS Transactions on Communications, vol. 10, no. 2, pp. 66–76, 2011.
[24]  B. Kyrbashov, I. Baroňák, M. Ková?ik, and V. Janata, “Evaluation and investigation of the delay in voip networks,” Radioengineering, vol. 20, no. 2, pp. 540–547, 2011.
[25]  I. Baronak and L. Ko?kovi?, “Alternatives of providing IPTV using IMS,” International Journal of Computers & Technology, vol. 3, no. 2, pp. 188–192, 2012.

Full-Text

comments powered by Disqus