52nd IEEE Conference on Decision and Control 2013
DOI: 10.1109/cdc.2013.6760384
|View full text |Cite
|
Sign up to set email alerts
|

Local SIP overload control: Controller design and optimization by Extremum Seeking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Through the local overload control methods, the overloaded server itself has a consistent control over its resource usage without any need for interplay with other network servers. The criteria for identifying the overload in some of these methods are queue length and CPU usage level . An SIP server starts rejecting extra‐requests when becoming close to its capacity limit, which is carried out by sending a ‘503 Service Unavailable’ message in response to an ‘INVITE’.…”
Section: Related Workmentioning
confidence: 99%
“…Through the local overload control methods, the overloaded server itself has a consistent control over its resource usage without any need for interplay with other network servers. The criteria for identifying the overload in some of these methods are queue length and CPU usage level . An SIP server starts rejecting extra‐requests when becoming close to its capacity limit, which is carried out by sending a ‘503 Service Unavailable’ message in response to an ‘INVITE’.…”
Section: Related Workmentioning
confidence: 99%
“…The main drawback of this method is that the cost of call reject cannot be ignored, and when dealing with heavy overloads, the server must use its entire resources for rejecting the excess calls. Accordingly, the server will not be able to respond any services [9]. On the other hand, depending that the overloaded server whether notifies its status to the upstream servers or the upstream servers are themselves informed of the current status of the downstream (overloaded) server, the distributed methods are categorized into two explicit and implicit methods [3].…”
Section: Related Workmentioning
confidence: 99%
“…1. Call setup message or "INVITE" (briefly referred as Call Request) is the most important request message since its transaction has maximum process load on CPU server [7,9]. Once a session is created, media such as audio and video are exchanged between the parties without passing from the servers, so that the only load on the server would be signaling messages.…”
Section: Introductionmentioning
confidence: 99%
“…SIP uses UDP or TCP packets for different operations such as device registration and call setup/teardown. Call setup message or "INVITE" (briefly referred to as Call Request) is the most important request message, given that its transaction has a maximum process load on CPU server [4,5]. Once a session is created, media are exchanged without passing through the servers.…”
Section: Introductionmentioning
confidence: 99%
“…(3) We propose a mathematical model which optimizes resource usage and maximizes throughput; (4) We propose a novel autoscaling scheme at VM level, which sufficiently scales the resources, while attempting to maximize call admission rate; (5) We implemented the proposed work on a real twotier cloud computing [11].…”
mentioning
confidence: 99%