OSPF-based adaptive and flexible security-enhanced QoS provisioning

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Networks with quality of service (QoS) provisioning rely on QoS routing schemes to select paths between end-to-end hosts that can satisfy the requested service requirements. In this paper, we focus on networks that use a new service paradigm as a nested DiffServ model, which has been described as service vectors in combination with the explicit end-point admission control (EEAC) scheme [1]. The main objectives of service vectors are to improve the QoS granularity and service routing flexibility. These improvements enhances both network utilization and user benefits. However, QoS routing schemes need to consider service vectors to achieve such improvements. In this paper, we discuss a new set of requirements that are added into QoS routing schemes to avoid false routing and low network utilization when using service vectors. The OSPF protocol, as the widely used protocol, guarantees feasible deployability of service vectors in existing networks. Furthermore, we introduce a network architecture that integrates security into the set of QoS parameters and show how security-enabled QoS (SQoS) can also use the OSPF protocol for SQoS routing.

Original languageEnglish (US)
Title of host publication2006 IEEE Sarnoff Symposium
DOIs
StatePublished - 2006
Event2006 IEEE Sarnoff Symposium - Princeton, NJ, United States
Duration: Mar 27 2006Mar 28 2006

Publication series

Name2006 IEEE Sarnoff Symposium

Other

Other2006 IEEE Sarnoff Symposium
CountryUnited States
CityPrinceton, NJ
Period3/27/063/28/06

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Communication

Keywords

  • Network security
  • OSPF
  • Quality of service
  • Service vector
  • k shortest paths

Fingerprint Dive into the research topics of 'OSPF-based adaptive and flexible security-enhanced QoS provisioning'. Together they form a unique fingerprint.

Cite this