2008
DOI: 10.1504/ijipt.2008.019292
|View full text |Cite
|
Sign up to set email alerts
|

SLA-based dynamic resource management in wireless environments: an enterprise nomadism use case

Abstract: International audienceIn this paper, we contribute on the service-driven management of quality of service and user access in wireless corporate networks. We propose a Service-Level Agreement (SLA) oriented nomadism management architecture with a top-down vision starting by the specification of company objectives and going down to device-level configurations. We define an algorithm for the automatic translation of application-level quality assurance parameters into network-level configuration parameters. A prot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2008
2008
2010
2010

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…In this paper we provided a more elaborate policy-based framework for BIs with a link to SLA and service indicators. [19] uses a policy-based dynamic mapping of application QoS parameters to DiffServ classes to provide time and location based services access control and differentiation so as to maximize utilization and enforce differential service priorities in enterprise nomadism scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper we provided a more elaborate policy-based framework for BIs with a link to SLA and service indicators. [19] uses a policy-based dynamic mapping of application QoS parameters to DiffServ classes to provide time and location based services access control and differentiation so as to maximize utilization and enforce differential service priorities in enterprise nomadism scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…filter parameters) which are derived from user and application profiles [5]. In our design, these features are enabled thanks to the following architectural elements (see Fig.…”
Section: Session-based Qos Management Architecturementioning
confidence: 99%
“…We focus on the guarantee features of network QoS that differentiate it from the best-ef fort network services. In fact, the exact form of performance guarantee is a part of the service level agreement (SLA) [5], between network service providers and their customers, then to fulfill the agreement expectations and ensure customer experience we propose to downgrade VoIP calls for some users to guarantee VoIP calls for high-priority users. Our proposal consists of a session-level QoS control mechanism which guarantees QoS delivery according to users' priorities and providers' objectives.…”
Section: Introductionmentioning
confidence: 99%
“…In this work we have focused on the guarantee features of network QoS that differentiates it from the Best-Effort network services. In fact, the exact form of performance guarantee is a part of the service level agreement (SLA) [2], between the network service provider and its customers, then in order to fulfill the agreement expectations and ensure costumer experiences, we propose an integrated network-oriented QoS adaptive solution without MAC changes, which in case of a congestion event will guarantee VoIP sessions of users with high priority (from their SLA) by downgrading VoIP sessions of users with less priority. Our proposal consists of a session-level QoS control mechanism which guarantees QoS delivery according to users' priorities and providers' objectives.…”
Section: Introductionmentioning
confidence: 99%
“…), when congestion occurs our mechanism chooses the application session or a set of application sessions to be downgraded by switching on another audio codec. Moreover, the proposed mechanism has been developed over an efficient service provisioning and user session management system [2], [3], which enforces service access control, and ensures the dynamic network resource configurations that defines the network behavior.…”
Section: Introductionmentioning
confidence: 99%