Christoph Egger

Christoph Egger
TU Wien | TU Wien

About

13
Publications
544
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
36
Citations

Publications

Publications (13)
Article
Last year's trend to migrate circuit-switched voice networks to packet switched Internet Protocol (IP) based networks has favored wide deployment of Session Initiation Protocol (SIP) based systems and networks. As a reaction to large-scale SIP deployment experiences in the field and the need to implement high availability and reliability within the...
Chapter
Last year’s trend to migrate circuit-switched voice networks to packet switched Internet Protocol (IP) based networks has favored wide deployment of Session Initiation Protocol (SIP) based systems and networks. As a reaction to large-scale SIP deployment experiences in the field and the need to implement high availability and reliability within the...
Article
The Session Initiation Protocol (SIP) relies on timer-based message retransmission for safeguarding reliable message transfer when deployed on top of the unreliable User Datagram Protocol (UDP) over IP. In this paper we present a detailed impact analysis of SIP timers onto the functionality of a system and its capabilities to recover from overload...
Article
With the upcoming introduction of the Session Initiation Protocol to carrier grade telecommunication infrastructures, the threat of attacks is increasing massively. Multiple types of unsolicited communication, like high and low rate Denial-of-Service attacks as well as Spam over Internet Telephony driven by Botnets will be an upcoming risk for all...
Conference Paper
We present sensing mechanisms that can be used for implicit high-load and overload detection in SIP networks. By means of measurements and simulations we highlight the characteristics of SIP proxy servers for different load situations and using different transport protocols. Each protocol yields to distinctive patterns that encourage deriving an al...
Conference Paper
The 3GPP has chosen the Session Initiation Protocol (SIP) as signalling protocol for the IP Multimedia Subsystem (IMS); therefore, it is expected that telecom operators will widely use it for their systems. SIP relies on an underlying transport protocol, like, e.g., TCP, UDP or SCTP. In the case of UDP, SIP has to ensure itself that messages will b...
Conference Paper
The 3GPP has chosen the Session Initiation Protocol as signalling protocol for the IP Multimedia Subsystem; therefore, it is expected that telecom operators will widely use it for their systems. SIP relies on an underlying transport protocol, like, e.g., TCP, UDP or SCTP. In the case of UDP, SIP has to ensure itself that messages will be reliably d...
Article
Detecting overload in telecommunication networks is an important goal, because it allows to react on it and to reduce traffic smartly to ensure constant user experienced quality of service. This applies not only to media as voice and video, but also to signaling, which is responsible for setting up these media. An overloaded signaling network incre...
Conference Paper
Cooperation in ad hoc networks cannot be taken for granted when nodes belong to distinct authoritative domains. In this paper we present Cashflow, a virtual currency system to motivate nodes to participate in ad hoc networks and to prevent selfishness. This system is different to previously proposed virtual currency systems in that it uses a channe...
Conference Paper
Full-text available
Novel mobile cellular access network technologies like Long Term Evolution (LTE) promise capacities exceeding the ones of existing 3G networks by at least one order of magnitude. This evolution will enable the deployment of services which, due to their capacity requirements, are currently restricted to fixed access networks. On the other hand, pack...
Conference Paper
SPIT is an upcoming threat for receiving unsolicited messages in Voice over IP systems. We assume, that future SPIT will be sent through the same infrastructure as SPAM today, namely through a network of compromised hosts. Therefore spammers will see SPIT as an additional business case. In this paper we show a viable way to increase the hit rate of...
Conference Paper
Evaluating the user satisfaction with Next Generation Network applications requires, amongst others, to carefully study the impact of various access networks with differing performance characteristics. This paper presents the concept and implementation of a network emulator for IP-based packet-switched wired and wireless access technologies based o...

Network

Cited By