SlideShare a Scribd company logo
1 of 12
EMERGING APPROACH FOR
RESOURCE OVER PROVISIONING
Presented by
Venkadesh R
2023614033
1
Introduction:
 It is able to integrate SDN and NFV for efficient resource over‐reservation control to support
differentiated QoS over the 5G Internet without undue signalling and related processing overhead.
 Network operator -1 is a mulitioperator network scenario encompassing network.
 Network operator -2 is considered as a cloud of clouds.
 The SDNC is responsible for granting or denying access to the network and the related resources in
such a way as to ensure that each admitted user receives the QoS contracted.
 Also, the SDNC’s functions include, among others, traffic load balancing to avoid unnecessary
congestion occurrence inside the network while inter‐domain connections are performed according
to pre‐defined Service Level Agreements (SLAs) between the operators for scalability reasons.
2
Introduction:
 The SDNC is enabled for defining appropriate control policies and dictating the enforcement on the transport elements
(e.g. switches and routers)
 Through appropriate signalling protocols (e.g. OpenFlow compliant protocol). This will ensure that every application is
effectively prevented from starving other applications of their resources inside the network.
 Therefore, the SDNC embeds a set of control components such as, but not limited to:
(i) Control Information Repository (CIR) as being a database for maintaining network topological information and
users’ profiles.
(ii) Service Admission Control Policies (SACP), as the entity responsible for defining appropriate control policies and
managing access to the network resources.
(iii) Network Resource Provisioning(NRP), which can be used for advanced resource allocation. Further details on
these components in terms of functions and interactions are provided in the following subsections.
3
4
Control Information Repository:
 CIR by the is exploited SDNC to maintain the network topology and related link resource statistics, including
communication paths that may be created inside the network along with the IDs of the outgoing interfaces that
belong to the paths.
 The CIR records the overall capacity of each network interface and the amount of bandwidth.
 Active session information includes, but is not limited to, the QoS requirements of the session (e.g. bandwidth,
delay, jitter and packets loss).
 The session ID, the IDs of the flows that make up the session, the ID of the CoS to which the session belongs, the
flows’ source and destination IDs (e.g. IP and Media Access Control – MAC – addresses).
 The ports’ IDs. The users’ other profile information, such as billing and personalisation parameters, may also be
stored in the CIR.
 In summary, the specific design and configurations of a SDNC would depend on the operators’ preferences, which
may vary from one operator to another.
5
Service Admission Control Policies:
 The SACP enables the SDNC to admit or deny service access to the network by dynamically taking into account
incoming service request QoS requirements (e.g. bandwidth).
 It provides an interface to allow interactions with end‐users to receive requests on one hand, and with the network
nodes (e.g. routers) for sending control instructions to be enforced throughout the network, on the other.
 Hence, upon admission, termination or readjustment of the QoS requirements of a session in a CoS on a
communication path, the session‐related information (e.g. resource usage) must be updated in the local CIR in a
real‐time manner.
 The SACP is able to admit, terminate or readjust the QoS demands without undue signalling overhead or waste of
resources.
 Since the network resource utilisation statistics are maintained in a real‐time manner in the CIR, the information
can be exploited to improve traffic load‐balancing functions in a flexible way without undesired path‐probing and
the related signalling overhead.
6
Network Resource Provisioning:
 The main role of the NRP component is to define the amount of resources to be over‐reserved and the
parameters, such as reservation thresholds, to be configured for each CoS on each interface inside the network
according to the local control policies.
 This component must be intelligent enough to allow the integration of existing over‐reservation algorithms and
policies, as in including future algorithms.
 This is important since the NRP is invoked dynamically by the admission control functions so that reservation
parameters can be readjusted upon need to prevent ineffective use of resources while reducing signalling
frequency.
 It turns out that this component can also be used to create and manage deterministic communication paths
inside the network (e.g. Label Switching Paths as in Multi‐protocol Label Switching – MPLS).
7
Network Configurations:
 The SDNC is able to discover the network topology dynamically as new nodes boot up inside the network. One
may use existing topology discovery mechanisms by importing the information from link‐state routing
protocols.
 Hence, by taking the network topology and appropriate algorithm as inputs, the SDNC is able to compute all
possible paths, especially the edge‐to‐edge paths inside the core network under its control.
 A combination of the paths may lead to all possible branched routes and the best paths can be filtered, for
example, based on the number of hops or bottleneck bandwidth.
 It is worth recalling that the use of deterministic paths is very important to improve network resource control.
8
Network Operations:
9
 To facilitate the understanding, let’s suppose that User A wants to enjoy a 3D video service from the provider of DC B
(Data Centre B) in the cloud. Hence, the user issues a service request, which is directed to the SDNC via a gateway,
BR1 (step 1).
 The service request contains the user’s QoS requirements (e.g. bandwidth) and the related traffic characteristics (e.g.
codec).
 Hence, based on the information received, SDNC I performs the admission control according to the pre‐defined local
control policies and books the best path with sufficient available bandwidth for connecting the gateway BR1 and
egress BR3 towards DC B.
 It is therefore very important to note that the SDNC is able to do so without any path probing or extra QoS signalling
into the network since we assume that it integrates the resource over‐reservation solution .
 In case these operations are successful, the server redirects the request to SDNC II (operator B’s network), as being
the next domain on the end‐to‐end path towards the DC B.
 When SDNC II receives the request, it also books the best path (BR5 to BR8) without any extra signalling overhead and
checks the requested service availability in the DC B. Then, upon receiving a successful response from the DC B, SDNC
II enforces the booked path by properly configuring the border routers on the path (BR5 and BR8).
10
 Examples of the configurations include the selected path’s multicast group (in multicast‐enabled domain) or MPLS
label (in MPLS domain), and traffic conditioning parameters (e.g. classification, shaping and policing).
 This will ensure that incoming media packets will be correctly encapsulated at the ingress edge routers to follow the
desired paths, so they enjoy the QoS reserved for them. The packets are decapsulated at the relevant egress edge
routers for delivery to the end‐user or the following domain.
 As we explained in 2.6.3, only the BRs are configured since it is assumed that the over‐reserved resources are still
available on the core/interior nodes on the path. As we detailed earlier, the core nodes are signalled to reconfigure
the reservation parameters only after the over‐reserved resource has exhausted and is not sufficient for the
incoming request.
 In this way, not only can the signalling frequency be significantly reduced, but also the session setup time will be
reduced. Afterwards, SDNC II replies to SDNC I and the latter also enforces the path that was booked for the service
(see step 7).
 Finally, SDNC I notifies user A about the operations success (see step 8). At the same time, SDNC I sends an
Acknowledgement (ACK) message to SDNC II, whose message is forwarded to DC B (see step 9) to trigger the media
streaming..
11
THANK YOU
12

More Related Content

Similar to WBN.pptx

QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
ijwmn
 
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
ijwmn
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
Mohammad Siraj
 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wi
Md.Akm Sahansha
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
Chandra Meena
 

Similar to WBN.pptx (20)

QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
QOS-BASED PACKET SCHEDULING ALGORITHMS FOR HETEROGENEOUS LTEADVANCED NETWORKS...
 
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
QoS-based Packet Scheduling Algorithms for Heterogeneous LTE-Advanced Network...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkAdaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network
 
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK
 
An improved radio_resource_management_wi
An improved radio_resource_management_wiAn improved radio_resource_management_wi
An improved radio_resource_management_wi
 
B010410411
B010410411B010410411
B010410411
 
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMSA STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKING
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKING
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKING
 
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular NetworkQoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
QoS -Aware Spectrum Sharing for Multi-Channel Vehicular Network
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Lab 10 manual
Lab 10 manualLab 10 manual
Lab 10 manual
 
Lab 10 manual(1)
Lab 10 manual(1)Lab 10 manual(1)
Lab 10 manual(1)
 
Ch7
Ch7Ch7
Ch7
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

WBN.pptx

  • 1. EMERGING APPROACH FOR RESOURCE OVER PROVISIONING Presented by Venkadesh R 2023614033 1
  • 2. Introduction:  It is able to integrate SDN and NFV for efficient resource over‐reservation control to support differentiated QoS over the 5G Internet without undue signalling and related processing overhead.  Network operator -1 is a mulitioperator network scenario encompassing network.  Network operator -2 is considered as a cloud of clouds.  The SDNC is responsible for granting or denying access to the network and the related resources in such a way as to ensure that each admitted user receives the QoS contracted.  Also, the SDNC’s functions include, among others, traffic load balancing to avoid unnecessary congestion occurrence inside the network while inter‐domain connections are performed according to pre‐defined Service Level Agreements (SLAs) between the operators for scalability reasons. 2
  • 3. Introduction:  The SDNC is enabled for defining appropriate control policies and dictating the enforcement on the transport elements (e.g. switches and routers)  Through appropriate signalling protocols (e.g. OpenFlow compliant protocol). This will ensure that every application is effectively prevented from starving other applications of their resources inside the network.  Therefore, the SDNC embeds a set of control components such as, but not limited to: (i) Control Information Repository (CIR) as being a database for maintaining network topological information and users’ profiles. (ii) Service Admission Control Policies (SACP), as the entity responsible for defining appropriate control policies and managing access to the network resources. (iii) Network Resource Provisioning(NRP), which can be used for advanced resource allocation. Further details on these components in terms of functions and interactions are provided in the following subsections. 3
  • 4. 4
  • 5. Control Information Repository:  CIR by the is exploited SDNC to maintain the network topology and related link resource statistics, including communication paths that may be created inside the network along with the IDs of the outgoing interfaces that belong to the paths.  The CIR records the overall capacity of each network interface and the amount of bandwidth.  Active session information includes, but is not limited to, the QoS requirements of the session (e.g. bandwidth, delay, jitter and packets loss).  The session ID, the IDs of the flows that make up the session, the ID of the CoS to which the session belongs, the flows’ source and destination IDs (e.g. IP and Media Access Control – MAC – addresses).  The ports’ IDs. The users’ other profile information, such as billing and personalisation parameters, may also be stored in the CIR.  In summary, the specific design and configurations of a SDNC would depend on the operators’ preferences, which may vary from one operator to another. 5
  • 6. Service Admission Control Policies:  The SACP enables the SDNC to admit or deny service access to the network by dynamically taking into account incoming service request QoS requirements (e.g. bandwidth).  It provides an interface to allow interactions with end‐users to receive requests on one hand, and with the network nodes (e.g. routers) for sending control instructions to be enforced throughout the network, on the other.  Hence, upon admission, termination or readjustment of the QoS requirements of a session in a CoS on a communication path, the session‐related information (e.g. resource usage) must be updated in the local CIR in a real‐time manner.  The SACP is able to admit, terminate or readjust the QoS demands without undue signalling overhead or waste of resources.  Since the network resource utilisation statistics are maintained in a real‐time manner in the CIR, the information can be exploited to improve traffic load‐balancing functions in a flexible way without undesired path‐probing and the related signalling overhead. 6
  • 7. Network Resource Provisioning:  The main role of the NRP component is to define the amount of resources to be over‐reserved and the parameters, such as reservation thresholds, to be configured for each CoS on each interface inside the network according to the local control policies.  This component must be intelligent enough to allow the integration of existing over‐reservation algorithms and policies, as in including future algorithms.  This is important since the NRP is invoked dynamically by the admission control functions so that reservation parameters can be readjusted upon need to prevent ineffective use of resources while reducing signalling frequency.  It turns out that this component can also be used to create and manage deterministic communication paths inside the network (e.g. Label Switching Paths as in Multi‐protocol Label Switching – MPLS). 7
  • 8. Network Configurations:  The SDNC is able to discover the network topology dynamically as new nodes boot up inside the network. One may use existing topology discovery mechanisms by importing the information from link‐state routing protocols.  Hence, by taking the network topology and appropriate algorithm as inputs, the SDNC is able to compute all possible paths, especially the edge‐to‐edge paths inside the core network under its control.  A combination of the paths may lead to all possible branched routes and the best paths can be filtered, for example, based on the number of hops or bottleneck bandwidth.  It is worth recalling that the use of deterministic paths is very important to improve network resource control. 8
  • 10.  To facilitate the understanding, let’s suppose that User A wants to enjoy a 3D video service from the provider of DC B (Data Centre B) in the cloud. Hence, the user issues a service request, which is directed to the SDNC via a gateway, BR1 (step 1).  The service request contains the user’s QoS requirements (e.g. bandwidth) and the related traffic characteristics (e.g. codec).  Hence, based on the information received, SDNC I performs the admission control according to the pre‐defined local control policies and books the best path with sufficient available bandwidth for connecting the gateway BR1 and egress BR3 towards DC B.  It is therefore very important to note that the SDNC is able to do so without any path probing or extra QoS signalling into the network since we assume that it integrates the resource over‐reservation solution .  In case these operations are successful, the server redirects the request to SDNC II (operator B’s network), as being the next domain on the end‐to‐end path towards the DC B.  When SDNC II receives the request, it also books the best path (BR5 to BR8) without any extra signalling overhead and checks the requested service availability in the DC B. Then, upon receiving a successful response from the DC B, SDNC II enforces the booked path by properly configuring the border routers on the path (BR5 and BR8). 10
  • 11.  Examples of the configurations include the selected path’s multicast group (in multicast‐enabled domain) or MPLS label (in MPLS domain), and traffic conditioning parameters (e.g. classification, shaping and policing).  This will ensure that incoming media packets will be correctly encapsulated at the ingress edge routers to follow the desired paths, so they enjoy the QoS reserved for them. The packets are decapsulated at the relevant egress edge routers for delivery to the end‐user or the following domain.  As we explained in 2.6.3, only the BRs are configured since it is assumed that the over‐reserved resources are still available on the core/interior nodes on the path. As we detailed earlier, the core nodes are signalled to reconfigure the reservation parameters only after the over‐reserved resource has exhausted and is not sufficient for the incoming request.  In this way, not only can the signalling frequency be significantly reduced, but also the session setup time will be reduced. Afterwards, SDNC II replies to SDNC I and the latter also enforces the path that was booked for the service (see step 7).  Finally, SDNC I notifies user A about the operations success (see step 8). At the same time, SDNC I sends an Acknowledgement (ACK) message to SDNC II, whose message is forwarded to DC B (see step 9) to trigger the media streaming.. 11