[sip-overload] Survey on SIP Overload Control Re: Proposal: Support for the restriction algorithms should be mandatory for clients
<yang.hong@inbaytech.com> Thu, 14 March 2013 22:02 UTC
Return-Path: <yang.hong@inbaytech.com>
X-Original-To: sip-overload@ietfa.amsl.com
Delivered-To: sip-overload@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
with ESMTP id D3A601F0D1A for <sip-overload@ietfa.amsl.com>;
Thu, 14 Mar 2013 15:02:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.141
X-Spam-Level:
X-Spam-Status: No, score=-1.141 tagged_above=-999 required=5
tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vmy8zwcS8LWE for
<sip-overload@ietfa.amsl.com>; Thu, 14 Mar 2013 15:02:52 -0700 (PDT)
Received: from p3plwbeout04-01.prod.phx3.secureserver.net
(p3plsmtp04-01-2.prod.phx3.secureserver.net [72.167.218.222]) by
ietfa.amsl.com (Postfix) with ESMTP id 58B111F0D16 for
<sip-overload@ietf.org>; Thu, 14 Mar 2013 15:02:52 -0700 (PDT)
Received: from localhost ([72.167.218.244]) by
p3plwbeout04-01.prod.phx3.secureserver.net with bizsmtp id
Ba2q1l0035GyNsw01a2q1V; Thu, 14 Mar 2013 15:02:51 -0700
X-SID: Ba2q1l0035GyNsw01
Received: (qmail 6496 invoked by uid 99); 14 Mar 2013 22:02:50 -0000
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="utf-8"
X-Originating-IP: 134.117.61.236
User-Agent: Workspace Webmail 5.6.34
Message-Id: <20130314150249.9b81bd31c6f0ac9074ffa0f6cc962602.48bfda6d97.wbe@email04.secureserver.net>
From: <yang.hong@inbaytech.com>
To: sip-overload@ietf.org
Date: Thu, 14 Mar 2013 15:02:49 -0700
Mime-Version: 1.0
Subject: [sip-overload] Survey on SIP Overload Control Re: Proposal: Support
for the restriction algorithms should be mandatory for clients
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sip-overload>,
<mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>,
<mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Mar 2013 22:08:10 -0000
http://arxiv.org/abs/1210.1505" rel="nofollow">http://arxiv.org/abs/1210.1505
http://www.igi-global.com/chapter/comparative-study-sip-overload-control/67496" rel="nofollow">http://www.igi-global.com/chapter/comparative-study-sip-overload-control/67496
http://www.researchgate.net/publication/221284946_Mitigating_SIP_Overload_Using_a_Control-Theoretic_Approach" rel="nofollow">http://www.researchgate.net/publication/221284946_Mitigating_SIP_Overload_Using_a_Control-Theoretic_Approach
http://link.springer.com/chapter/10.1007%2F978-3-642-23641-9_15" rel="nofollow">http://link.springer.com/chapter/10.1007%2F978-3-642-23641-9_15#
http://www.researchgate.net/publication/224249824_Design_of_a_PI_Rate_Controller_for_Mitigating_SIP_Overload" rel="nofollow">http://www.researchgate.net/publication/224249824_Design_of_a_PI_Rate_Controller_for_Mitigating_SIP_Overload
http://features.rr.com/article/01vBgtc8TR17z?q=Skype" rel="nofollow">http://features.rr.com/article/01vBgtc8TR17z?q=Skype
Software Engineer
InBay Technologies Inc.
Ottawa, Canada K2K 1Y3
http://www.inbaytech.com/" rel="nofollow">http://www.inbaytech.com/
- From: "NOEL, ERIC C (ERIC C)" <ecnoel at research.att.com>
- To: Volker Hilt <volker.hilt at alcatel-lucent.com>, "sip-overload at ietf.org" <sip-overload at ietf.org>
- Date: Fri, 29 Apr 2011 08:56:32 -0400
- In-reply-to: <4DBA1D11.7030001 at alcatel-lucent.com>
- References: <E4B3F0DC6D953D4EBEC223BC86FE322C4A42034FB7 at EMV04-UKBR.domain1.systemhost.net> <4DBA1D11.7030001 at alcatel-lucent.com>
Volker, Wrt Phil's comment on vulnerability to sudden increases on the offered load at client sources, I believe the paper from Arthur Berger in IEEE Transactions on Automatic Control Vol 36, No2, February 1991 titled "Overload Control Using Rate Control: Selecting Token Bank Capacity for Robustness to Arrival Rates" supports that observation. In that paper, Figure 3 compares rate control to call gapping and to percent blocking. As offered load increases, rate control is the only algorithm that controls load close to the target. Basically Phil's point. Because it is a copyrighted document, I do not think I can broadcast on distribution list. However, if you cannot get a copy of the paper let me know and I will assist you. Thanks, Eric Noel LMTS AT&T Labs, Inc. Rethink Possible Network Design and Performance Analysis 200 South Laurel Avenue, D5-3D19 Middletown, NJ 07748 P: 732.420.4174 ecnoel at http://att.com" rel="nofollow">att.com