Samsung AIT March 2011 NSIS Operation over IP Tunnels

نویسندگان

  • C. Shen
  • H. Schulzrinne
چکیده

NSIS Quality of Service (QoS) signaling enables applications to perform QoS reservation along a data flow path. When the data flow path contains IP tunnel segments, NSIS QoS signaling has no effect within those tunnel segments. Therefore, the resulting tunnel segments could become the weakest QoS link and invalidate the QoS efforts in the rest of the end-to-end path. The problem with NSIS signaling within the tunnel is caused by the tunnel encapsulation that masks packets’ original IP header fields. Those original IP header fields are needed to intercept NSIS signaling messages and classify QoS data packets. This document defines a solution to this problem by mapping end-to-end QoS session requests to corresponding QoS sessions in the tunnel, thus extending the end-to-end QoS signaling into the IP tunnel segments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rfc 5979 Nsis

NSIS Quality of Service (QoS) signaling enables applications to perform QoS reservation along a data flow path. When the data flow path contains IP tunnel segments, NSIS QoS signaling has no effect within those tunnel segments. Therefore, the resulting tunnel segments could become the weakest QoS link and invalidate the QoS efforts in the rest of the end-to-end path. The problem with NSIS signa...

متن کامل

Packet Fragmentation in IPv6 over IPv4 Tunnels

Nowadays IPv6 over IPv4 tunnels are widely used to form the global IPv6 Internet. This paper analyzes a packet fragmentation problem in IPv6 over IPv4 tunnels due to the MTU difference between IPv6 and IPv4 layers, which would greatly degrade the performance of the tunnels if ever happened. It also demonstrates an ICMP based attack that could induce the problem and gives some advice on how to d...

متن کامل

Can encrypted traffic be identified without port numbers, IP addresses and payload inspection?

Identifying encrypted application traffic represents an important issue for many network tasks including quality of service, firewall enforcement and security. Solutions should ideally be both simple – therefore efficient to deploy – and accurate. This paper presents a machine learning based approach employing simple Packet Header feature sets and statistical flow feature sets without using the...

متن کامل

RFC 4087 IP Tunnel MIB June 2005 3

This memo defines a Management Information Base (MIB) module for use with network management protocols in the Internet community. In particular, it describes managed objects used for managing tunnels of any type over IPv4 and IPv6 networks. Extension MIB modules may be designed for managing protocol-specific objects. Likewise, extension MIB modules may be designed for managing security-specific...

متن کامل

Title: Ubr Buffer Requirements for Tcp/ip over Satellite Networks Distribution: Atm Forum Technical Working Group Members (af-tm)

In this contribution we present simulation results to assess buffer requirements for TCP IP over satellite UBR networks We perform experiments with both LEO and GEO satellite delays for various buffer sizes and number of sources We conclude that with sufficiently large buffers RTT or more the performance of TCP SACK over UBR with per VC accounting is scalable with respect to the number of sourc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011