Routing Strategies for Fault Recovery in Wide Area Packet Networks

Size: px
Start display at page:

Download "Routing Strategies for Fault Recovery in Wide Area Packet Networks"

Transcription

1 Routing Strategies for Fault Recovery in Wide Area Packet Networks Krishnan Balakrishnan David Tipper Deep Medhi* ECE Department Telecommunications Program Computer Science Telecommunications ( Iernson IJniversity University of Pittsburgh University of Missouri-Kansas (5ty Clemson, SC Pittsburgh, PA Kansas City, MO bknshn(qeng.clemson.edu tipper(@ t ele.pi t t.edu dniedhi@cstp.umkc.edu Abstract Iii this paper, we present the results of a study of routing algorithms for trafic restoration after a failure in d virtual circuit packet switched wide area network.,ytnndard routing algorithrns based on rniiiiinizing the steady state network delay may not be appropriate for rerouting the calls after a failure, in view of the transient congestion. Here we propose alternative routing schemes to reduce the congestion. The results of a simulation study of a 10 node network comparing the performance of the different routing algorithrns (i.e., Miiiiiriurri Delay, Miiiirriurri Hop, Load Distribution on Paths, Load Distribution on Links) are presented. 1 Introduction Due to the rapidly growing demand for information transfer, such as voice, data, and video across communication networks, the need for reliable communication service h+s become increasingly important. The potent,ially drastic effects of communication network failures has been demonstrated by several highly publicized failures, showing the need for survivable networks that provide service that, is robust to failures [5, 111. A network failure, such as the loss of a link or a node may occur due to several reasons such as accidental cahle cuts, hardware malfunctions, software errors, natural disasters (eg. floods) and human error (eg. incorrect repair). This has lead to a growing interest, in the design of survivable networks as well as studies of survivability techniques to be employed in the event of a failure. Several techniques [5, 113 have been discussed to minimize the effect of failures, cornmon ones being multiple ingressing/egressing of users, trunk diversity, digital cross connect systems, and self healing ring architectures. Although there has been some work on the role of routing in network performance after a link failure for circuit-switched networks [9, 81, little work seems to have been done to address failure recovery procedures and tfhe transient congestion in packet-switched networks. A weakness of virtually all of the literature on both survivable network design and traffic recovery procedures is that they are conducted using steady stat,e analysis even t,liough a transient or nonst,ationary congestion period will occur in the network after a failure. Our studies [lo] indicate that, for packet *Supported in part by IJMKC: Faculty Research (:rant K switched networks the dominant factor on network performance after a failure is in fact this transient or nonstationary congestion period. The importance of the transient con estion has been independently verified by Kobza k]. In [6] he develops a lower bound on the length of the transient following traffic restoration after a failure in a queueing model of a window flow control virtual circuit in a packet switched network. Kobza s results taken along with [lo] indicate several realistic situations where steady state assumptions are inappropriate. Hence, traffic restoration techniques designed and evaluated via steady state analysis may not make optimum use of network resources after a failure. Issues such as the call admission algorithm, the timing of the reconnection [3] and the routing algorithm used for the rerouting are crucial factors in determining network performance after a failure [lo]. In [I], the authors study the effect of failure recovery on a sample TENET packet switched network along the lines of the following three components: the locus of reroute, reroute timing and the number of retries. The locus of reroute determines the node which selects the new route and the constraints under which this new route is selected using minimum delay routing. Here the locus of rerouting is at the source node of the connection and we focus on different routing strategies for reconnecting virtual circuits after a failure and observe their impact on the transient network congestion. In the next section, we discuss the routing strategies followed by presentation of simulation results comparing the performance of the routing algorithrns tested on a ten-node network. 2 The Effect of Rerouting Strategies on Congestion Consider an arbitrary packet switched wide area network. We assume that the network uses virtual circuit service to transport packets and soiirce node routing of the virtual circuits as in IBM s planet network [4]. In soiirce node routing, each network node maintains a database of the nettwork topology and determines the route through the network for all virtual circuits originating at the node. After a link failure, in many virtual circuit based networks, the reconnection will be done on an individual virtual circuit hasis rather than attempting facility restoration of the entire lost bandwidth. Specifically, t,he source nodes $ IEEE

2 for tjhe virtual circuits that were traversing the link which failed are responsible for the restoration of the affectled virtual circuits. In the framework proposed in [lo] for studying link failures, such source nodes are c-alled primary nodes and links which emanate from a primary node are referred to as primary links. After a failure, congestion can occur at a primary node due to virtual circuits being rerouted across a particular link at, that node. Note that the reconnection of t,he virt,ual c:irciiits takes glace orily after a time delay which consists of the time taken to detect the link failure, plus the time for the affected source nodes to get the relevant information and the time taken to deterrnine the new route and set up the connection. During tjhis time delay, a backlog of packets will accumulatje at the source of each virtual circuit. As each virtual circuit is rerouted, it starts transmitting its entire backlog along its axess link into the primary node. The link buffer, being of a finite size, can quickly become congested. Any packet arriving at, the network link queue and finding the buffer fiill is dropped. These packets need to be retransmitted from the source. These retransmissions add a positive feedback to the source, further worsening the c-ongestion. Thus, the packet loss rate at the network node can hecome high, exceeding the grade of service (COS) level, possibly until the backlogs of each of the restforecl virtual circuits is conipletely transmitted. As rioted in [lo], congestion cont,rol schemes are not entirely effect,ive in preventing congestion after a failure since tjhe overload at the network node is mainly due to the rerouted virtual circuits needing to simultaneously work off t,heir backlogs. After a link failure, several primary nodes will occur each possibly having many circuits to restore and a critical issue in the restoration is the path chosen for rerouting. We classify other nodes affected by t,he t,rarisient, congest,ion into secondary and tertiary nodes, where secondary nodes are nodes which act as relay nodes for rerouted virtual circuits and tert,iary nodes are nodes which handle traffic that shares a common link with the rerouted traffic. Links emaiiating from these nodes are referred to as secondary aiid tertiary links respectively. (see [lo] for further details). The nurnher of secondary aiid tertiary nodes t,liat, occur aft,er a failure will depend largely on the restoration routling algorithm and network topology. As disciissed in [lo], the congestion afkr a failure will stjartj at) the primary nodes and spread t80 the secondary ancl tjertjiary nodes. The st,aridard routing algorit,hms are normally based on minirriizing the steady state network delay and such algoritjhms rnay be inappropriate for rerouting tjhe calls afkr a failure, since at, this t,imc, the congest>ion is t,he paramount, issue. Here, we investi gat,? tjwo alternat,ive routing approaches to solve the prol)lenis associat,ed with the congestion caused by a failiirr. Both of tjhese alternatives suggest a possible c-liange in the call srt,up/routing algorithm cliiring a t,raffic rest,orat,ion process. One approach is to nse a Miniiiirirri Hop rout)ing scheme to restore connections in order tjo ensiire tjliatj the niirnber of nodes ciirect,ly erectjecl hy the rerout>ing is lirnited to a minimum. The idea behind this scheme is to try and restrict the physical area of the congestion occurring due to the rerouting process from a primary node. The second alternative is to try to distribute the load caused by the rerouting among the various links in the network. Thus, the congestion is spread out over numerous links, each with potentially a large amount of residual capacity and no particular link suffers unduly due to the rerouting. This alternative of load distribution may itself be implemented either by spreading out the connections over all possible routes between source-destination nodes, known as Load Distribution Among Paths or by distributing the calls among the outgoing links. This last scheme is referred to as Load Distribution among Primary Links. The alternative routing schemes can be implemented using variations on standard cost optirnization algorithms. In the following we surnrriarize the algorithms used in our simulation studies. Note that the alternative routing schemes have been somewhat tailored to the call admission environment of the IRM planet network architecture [4], The planet network uses the equivalent bandwidth concept together with a predefined congestion level on link utilizations (i.e., maximum acceptable steady state link utilization) to determine call acceptance/denial in order to guarantee steady state grades of service. Algorithms for Connection Rerouting: 1. Minimum Hop (MH) Select the virtual circuits requiring reroutling For the first virtual circuit, select the pat#h with the least number of hops from the list, of feasible paths, ensuring that the additlion of the incoming call does not cause any of t,he network links to cross a stfeady state congestion threshold. Reroute the virtual circuit along this path. Add these links to a set X, which consists of links used in the rerouting process. For all further virtual circuits, - Select, a list of feasible pat,hs - IJsing Set X, select a patah from the above step which has the least, nurnber of paths that are different, from t,hose already in X. - Reroute the virtual c-irciiitj along t,he chosen path. - Add new links used in the reroutling tlo set x. 2. Load Distribution Among Paths (LDAP) 0 Select the virtual circuits requiring rerouting

3 llsing local flow information, select the list of feasible path6 ensuring that the addition of the incoming call does not cause any of the network links to cross a steady state congestion threshold. For each link i-j, calculate the cost using the equation where Ri is the residual capacity of link i- j, f;j is the present, flow across link i-j, and the normalized link capacity is considered to he one. ( :alc:ulate (70stllat,L as Select the path with the maximum Costpath (i.e., the maximum residual capacity path). 3. Load Distribution among Primary Links (LDPL) Select, t,he virtual circuits requiring rerouting Sort the list of feasible paths in a decreasing order of number of links used in the path. For each path, calculate the cost using the equat,ion C:OStpath = Rpri = I - fpri where Rpri is the residual capacity of the primary link for the path and ftjt; present flow across the link. Select path with maximum Costpath that does not cause any of the network links to cross a steady state congestion threshold. If the cost is equal for two or more paths, select the first occurrence of corresponding primary link from the set of feasible paths. The Minimurn Hop scheme tries to control the congestion within a small physical region around the source node. Thus, the number of links that get congested are kept to a minimum by this scheme. This scherne may be useful in cases where it is of paramount irnport,ance tlo not, disturb the other links due to the nature of the calls using those links. The Load distribution algorithms ensure that a circuitous route with tjhe largest residual capacity possible will be preferred. At the same t,ime, lightly loaded direct links will not lie discarded or discriminated against. 3 Performance Evaluation The 10 node network as shown in Figure 1 was chosen for study, primarily because of the large number of alternate paths to choose from when a call needed a path from any source node to any other destination node in the network. The main aim of this experirnerit was to compare the performance of various routing cost schemes defined above with the Minimum Ilelay (MD) scherqe of the IBM planet network. A detailed simulation rnodel of the network was implemented using SLAM. In the simulation model the capacit,y of each link is assumed to be one, and the packet size is assumed to be exponentially distributed with unit length; thus, the service rate of each link is one packet per second (pps). In the experiment, 50 virtual circuits between various origin-destination nodes were setup to bring the total load on the network to pps (for details see [a]). We model the packet, arrival rate for each virtual circuit under normal conditions (before failure) as independent Poisson processes with fixed mean rate. We then simulate the failure of link 2-4 and study the congestion at node 9 mainly because of the topology of the network providing four different outgoing links for this node. Before the failure, nine virtual circuits originating from Node 9 were using link 2-4 and the total flow on the link 2-4 was The input rates and the paths selected by the four rerouting schemes during the rerouting phase (after failure of 2-4) for the nine virtual circuits is given in the Table 1. From Table 1, one can see how the Minimum Iklay algorithm routes five virtual circuits along link 9-1 while two other virtual circuits are rerouted over link 9-7 and the remaining two use link 9-3 at the primary node. The Minimum Hop scheme tries to restrict the rerouting of the virtual circuits such that a rninimum number of secondary nodes are created. Thus, when the first virtual circuit gets rerouted along its minirnum hop path 9-1, all further reroutings tend to favor the same primary link. Hence, the minimum hop scherne routes eight virtual circuits along link 9-1, the rernaining one being routed along link 9-7. The Load Distribution algorithms try to spread out the rerouted calls among the paths in the network or among tjhe four outgoing links of node 9. Note tthat the algorithm for Load Distribution Among Paths routes the virtual circuits in such a fashion that all the outgoing links from Node 9 are utilized. It is found that all the paths chosen are three or four hop paths, four being the maximum allowed in the model setup. One (-an see that the algorithrn tends to favor the longest path with the maximum residual capacity. The algorithm for Load Distribution among Primary Links tends to reroute all the virtual circuits by spreading them out equally among all the outgoing links at Node 9. However, this algorithm does not seek to reduce or spread out the congestion among the other links in the network. Table 2 gives a comparative listing of the number of links at primary and secondary nodes that are used by t,he various schemes. It is seen that the Minimum Delay scheme routes the virtual circuits over three primary and eight secondary links. The Minimum Hop

4 scheme tries to restrict the number of links used and results in 2 links at primary nodes and 5 links at secondary nodes being utilized. Note that as expected the Load Distribution schemes result in the largest number of primary and secondary links. Table 2 also shows the number of links that were congested using the various schemes. The congestion in the network was studied by determining the number in the queueing system versus time for various links in the network using an ensemble average of 3000 simulation runs as discussed in [7]. A link was considered congested if the number in the queueing system at a link exceeded the steady state grade of service level. The steady state grade of service was determined by the link utilization threshold specified (85%), which resulted in a steady state grade of service number in systern of 5 ( see [2] and [4] for details). From Table 2 it is t,o be seen t,hat the MinimumHop scheme congests the least number of links while the Load Distribution among Paths scheme congests the largest number of links during the rerouting process. Looking at the break up of primary and secondary links that are congested, the Minimum Hop scheme results in the fewest primary and secondary links congested. Figure 2 shows the number in the system versus t,ime at link 9-1 after the link failure. From this figure, we see the amount of congestion that results from the rerouting of tjhe virtual circuits due to the four different, schemes. It is seen how the restrictive Minimum Hop scheme congests the link approximately 3000 seconds as opposed to the other schemes which congest the same link for a very short time ( seconds) before reaching steady state. Similarly one can examine the other links in the network and Table 3 gives a comparative listing of the amount of time that each scherne congests a given link after rerouting. Note, as expected, the Load Distribution schemes do not, congest the network for as long a duratlion as the Minimum Hop scheme. Considering Tables 2 and 3 together, one can see the the following. The Minimum Hop Scheme resulted in fewest number of links becorning congested. However, it resulted in t,he largest time period of congestion. In contrast, the Load Distribution schemes resulted in a greater number of links becoming congested but for a much shorter time period. Hence, there is a clear trade off between constricting the region effected by congestion versus congesting a larger region for a possibly smaller arriount of time. Also, the performance of the Minirnuni Delay scheme was in between the Minimum Hop and Load Distribution schemes. In general thr perforniancx of the Minimum Hop scheme as well as the Load Distribution schemes tend t,o depend on the net,work topology, the location of the failed link as well as the load in the network at tjhe t,ime of rerouting. Selecting which scheme is preferred will depend on the need to restrict the effects of failures locally to t,he region of the failure or the need to quickly recover from failures. Obviously, additional work needs to be conducted to precisely quantify the tradeoffs among the schemes. Also, since the Mininium Delay scheme is optirnal under steady state conditions, one may want tjo restructure the paths of the virtual circuits after the congestion period is over 4 Summary In this paper we have proposed alternate routing algorithms suitable for traffic restoration after a failure in a virtual circuit packet switched wide area network. Specifically, the Minimum Hop scheme - which ensures that the number of nodes directly effected by the rerouting is minimized, the Load Distribution Among Paths scheme - which picks the source-destination route that has the maximum residual capacity, and the Load Distribution among Primary Links scheme - which balances the load on the outgoing links of node that must reroute several connections. The relative transient performance of the routing algorithms (along with minimum delay routing) was studied using a simulation model of a 10 node sample network. It is shown that the routing algorithm used for traffic: restoration is an important criterion for controling the transient network congestion occurring after restorat,ion both spatially and in terms of duration. Ref er en c e s [I] A. Banerjea, (1:. J. Parris and D. Ferrari, Recovering Guaranteed Performance Service Connections from Single and Multiple Faults, Techriical Report TR , International Computer Science Institute, Berkeley, CA, [ I K. Balakrishnan, An Analysis of Routing Strategies for Traffic Restoration in Wide Area Networks, M.S.Thesis, Clemson IJniversity, [3] K. Balakrishnan, D. Tipper and J. Harrimond, An Analysis of the Timing of Traffic Restoration in Wide Area Communication Networks, Proceedings of 14th In teriia tiorial Tele trcific (;onyress, Antibes, France, [4] I. Cidon, I. Gopal, and R. Gu6rin, Bandwidth Management and Congestion Control in planet, IEEE Comm Mag. vol. 29( 10):59-64, C>c-tjoher [5] W. E, Falconer, Service Assurance in Motlern Telecommunications Networks, IEEE (:omm. Mag., vol. 28(6):32-39, June [SI J. Kobza, The,Significance of Traii.sient.s Follouiiug Failures and Repairs in Packet-,Suiitched Networks. PhD thesis, Virginia Polyt,echnic- Inst,it,ut,e and State IJniversity, February [7] W. Lovegrove, J. Hammond, and D. Tipper, Sirriulation Methods for Studying Nonstationary Behavior of Computer Networks, IEEE Jrnl.,Sel. Areas Coirim., vol. 8: , [8] D. Medhi and S. Sankarappan, Impact of atransmission Facility Link Failure on Dynamic Call Routing Circuit-Switched Networks under Various Circuit Layout Policies, Jriil. of Net. (i11d h ys. LUgTrit., Vol. 1, pp ,

5 Table 1: Comparison of paths selected for rerouting Tm , Table 2: Comparison of number of links used (congested) by the various schemes Primary Secondary Total Rerouting Links Links Links scheme used used used MD (congested) 3 (3) (congested) 8 (5 (congested) - 11 (8) MH 2 (2) 5 (31 7 (5) LDAP (9 LDPL (7 Figure 1: Model 10 Node network Table 3: Amount of time (seconds) for transient congestion to end [9] D. Mitra and J. B. Seery, (:omparative Evaluations of Randomized and Dynamic Routing Strategies for Circuit-Switched Networks, IEEE Trans. Co~ii~ri., Vol. 39, pp , [lo] D. Tipper, J. Hammond, S. Sharrna, A. Khetan, I<. Balakrishnan, and S. Menon, An Analysis of the Congestion Effects of Link Failures in Wide Area Networks, IEEE Jrnl. Sel. Areas Comm., vol. 12: , [ll] T. H. WU, Fiber Network.Service,Survivcibility. Artech House, Boston, Mass., I 0 i I

Effects of Rerouting After Service Disruption in MPLS based networks

Effects of Rerouting After Service Disruption in MPLS based networks Effects of Rerouting After Service Disruption in MPLS based networks BJØRN JÆGER, Bjorn.Jager@hiMolde.no KETIL DANIELSEN, Ketil.Danielsen@hiMolde.no Molde University College, Molde, NORWAY July 19, 2006

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Performance Analysis of Multicast and Priority-Based Routing under a Failure in Differentiated-Services Internet*

Performance Analysis of Multicast and Priority-Based Routing under a Failure in Differentiated-Services Internet* Performance Analysis of Multicast and Priority-Based Routing under a Failure in Differentiated-Services Internet* Gerald Rogers! Deep Medhif Wen-Jung Hsin, Suresh Muppala Department of Computer Networking

More information

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

William Stallings Data and Computer Communications. Chapter 10 Packet Switching William Stallings Data and Computer Communications Chapter 10 Packet Switching Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

Routing Strategies. Fixed Routing. Fixed Flooding Random Adaptive

Routing Strategies. Fixed Routing. Fixed Flooding Random Adaptive Routing Strategies Fixed Flooding Random Adaptive Fixed Routing Single permanent route for each source to destination pair Determine routes using a least cost algorithm Route fixed, at least until a change

More information

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing William Stallings Data and Computer Communications 7 th Edition Chapter 12 Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route

More information

Alternate Routing Diagram

Alternate Routing Diagram 68 0 Computer Networks Chapter Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone switches

More information

Resilient Networks. 3.1 Resilient Network Design - Intro. Mathias Fischer

Resilient Networks. 3.1 Resilient Network Design - Intro. Mathias Fischer Mathias Fischer Resilient Networks. Resilient Network Design - Intro Prepared along: Michal Pioro and Deepankar Medhi - Routing, Flow, and Capacity Design in Communication and Computer Networks, The Morgan

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

Chapter 12. Routing and Routing Protocols 12-1

Chapter 12. Routing and Routing Protocols 12-1 Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone

More information

CHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor

CHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor 1 CHAPTER I INTRODUCTION In Communication Networks, Survivability is an important factor to be considered in planning and designing of Survivable Fiber Optic Networks (SFON). Survivability depicts network

More information

Network Control and Signalling

Network Control and Signalling Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Abstract This thesis considers the problem of traffic restoration of individual connections in the presence of failures in high-speed, virtual circuit

Abstract This thesis considers the problem of traffic restoration of individual connections in the presence of failures in high-speed, virtual circuit Traffic Restoration in Survivable Wide Area Communication Networks Bjfirn Jρger Dr. Scient. Thesis June 27, 2000 Department of Informatics University of Bergen Abstract This thesis considers the problem

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Quality of Service. Traffic Descriptor Traffic Profiles. Figure 24.1 Traffic descriptors. Figure Three traffic profiles

Quality of Service. Traffic Descriptor Traffic Profiles. Figure 24.1 Traffic descriptors. Figure Three traffic profiles 24-1 DATA TRAFFIC Chapter 24 Congestion Control and Quality of Service The main focus of control and quality of service is data traffic. In control we try to avoid traffic. In quality of service, we try

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments 24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing

Layer 3: Network Layer. 9. Mar INF-3190: Switching and Routing Layer 3: Network Layer 9. Mar. 2005 1 INF-3190: Switching and Routing Network Layer Goal Enable data transfer from end system to end system End systems Several hops, (heterogeneous) subnetworks Compensate

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Dynamic Routing and Resource Allocation in WDM Transport Networks

Dynamic Routing and Resource Allocation in WDM Transport Networks Dynamic Routing and Resource Allocation in WDM Transport Networks Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering (IND), Germany Email: spaeth@ind.uni-stuttgart.de

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Fluid models for evaluating threshold-based control policies for survivability of a distributed network

Fluid models for evaluating threshold-based control policies for survivability of a distributed network Fluid models for evaluating threshold-based control policies for survivability of a distributed network Vineet Aggarwal ICF Consulting 9 Lee Highway, Fairfax, VA Nataraan Gautam Marcus Department of Industrial

More information

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 69-72 EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS Sushil Chaturvedi

More information

Neuro-fuzzy admission control in mobile communications systems

Neuro-fuzzy admission control in mobile communications systems University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 2005 Neuro-fuzzy admission control in mobile communications systems Raad Raad University

More information

TCP over ad hoc networks

TCP over ad hoc networks TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect that the TCP/IP suite of protocols be applicable to

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Flow and Congestion Control

Flow and Congestion Control Flow and Congestion Control Based on A. Mediano s lecture notes 1 Flow Control Flow control: end-to-end mechanism for regulating traffic between source and destination Congestion control: Mechanism used

More information

CS 218- QoS Routing + CAC Fall 2003

CS 218- QoS Routing + CAC Fall 2003 CS 218- QoS Routing + CAC Fall 2003 M. Gerla et al: Resource Allocation and Admission Control Styles in QoS DiffServ Networks, QoS-IP 2001, Rome, Italy. A. Dubrovsky, M. Gerla, S. S. Lee, and D. Cavendish,Internet

More information

C. M. Kwan, R. Xu, and L. Haynes

C. M. Kwan, R. Xu, and L. Haynes Fast Flow Control in High-Speed Communication Networks C. M. Kwan, R. Xu, and L. Haynes Intelligent Automation Inc. 2 Research Place Suite 202 Rockville, MD 20850 phone: (301) - 590-3 155 fax: (301) -

More information

Routing Algorithms. Review

Routing Algorithms. Review Routing Algorithms Today s topics: Deterministic, Oblivious Adaptive, & Adaptive models Problems: efficiency livelock deadlock 1 CS6810 Review Network properties are a combination topology topology dependent

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w) Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet

More information

Shared, Multi-Hop Networks and End-to-End Arguments

Shared, Multi-Hop Networks and End-to-End Arguments Shared, Multi-Hop Networks and End-to-End Arguments Stefano Vissicchio UCL Computer Science COMP0023 Outline Shared, Multi-hop Networks Sharing model Forwarding model Service model: Best-effort delivery

More information

TDM Backhaul Over Unlicensed Bands

TDM Backhaul Over Unlicensed Bands White Paper TDM Backhaul Over Unlicensed Bands advanced radio technology for native wireless tdm solution in sub-6 ghz Corporate Headquarters T. +972.3.766.2917 E. sales@radwin.com www.radwin.com PAGE

More information

CHAPTER-III WAVELENGTH ROUTING ALGORITHMS

CHAPTER-III WAVELENGTH ROUTING ALGORITHMS CHAPTER-III WAVELENGTH ROUTING ALGORITHMS Introduction A wavelength routing (WR) algorithm selects a good route and a wavelength to satisfy a connection request so as to improve the network performance.

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center Ecient Buer Sharing in Shared Memory ATM Systems With Space Priority Trac Rajarshi Roy and Shivendra S Panwar y Center for Advanced Technology in Telecommunications Polytechnic University 6 Metrotech Center

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Simple Layout Algorithms To Maintain Network Connectivity Under Faults

Simple Layout Algorithms To Maintain Network Connectivity Under Faults Simple Layout Algorithms To Maintain Network Connectivity Under Faults Galen H. Sasaki 1 Department of Electrical, University of Hawaii 2540 Dole Street, Honolulu, HI 96822 USA Ching-Fong Su and David

More information

Tunable Preemption Controls for a Cellular Emergency Network

Tunable Preemption Controls for a Cellular Emergency Network Tunable Preemption Controls for a Cellular Emergency Network Jiazhen Zhou and Cory Beard Department of Computer Science Electrical Engineering University of Missouri - Kansas City, Kansas City, MO 64 Abstract

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Large scale SPVC ATM network

Large scale SPVC ATM network Written by Paul Holland and Don Wells Large scale SPVC ATM network Introduction: Asynchronous Transfer Mode (ATM) Data Networks differ from Internet Protocol (IP) Data Networks in many ways, but one of

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Receiver-based adaptation mechanisms for real-time media delivery. Outline

Receiver-based adaptation mechanisms for real-time media delivery. Outline Receiver-based adaptation mechanisms for real-time media delivery Prof. Dr.-Ing. Eckehard Steinbach Institute of Communication Networks Media Technology Group Technische Universität München Steinbach@ei.tum.de

More information

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression, Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen

More information

Modified Packet Scheduling Algorithm using Real-time Service

Modified Packet Scheduling Algorithm using Real-time Service Modified Packet Scheduling Algorithm using Real-time Service Ha-sung Koo Department of Computer and Information Hanseo University 360 Daegok-ri, Haemi-myun, Seosan-si, Chungcheongnam-do South Korea hskoo@hanseo.ac.kr

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

DE62 TELECOMMUNICATION SWITCHING SYSTEMS JUN 2015

DE62 TELECOMMUNICATION SWITCHING SYSTEMS JUN 2015 Q.2 a. With neat diagrams explain the configuration of a step-by-step switching system. (8) b. List the basic functions of a switching system. (8) The switching office performs the following basic functions

More information

Retransmission schemes for Optical Burst Switching over star networks

Retransmission schemes for Optical Burst Switching over star networks Retransmission schemes for Optical Burst Switching over star networks Anna Agustí-Torra, Gregor v. Bochmann*, Cristina Cervelló-Pastor Escola Politècnica Superior de Castelldefels, Universitat Politècnica

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Supporting mobility only on lower layers up to the network layer is not

Supporting mobility only on lower layers up to the network layer is not Mobile transport layer Supporting mobility only on lower layers up to the network layer is not enough to provide mobility support for applications. Most applications rely on a transport layer, such as

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

CS519: Computer Networks

CS519: Computer Networks Lets start at the beginning : Computer Networks Lecture 1: Jan 26, 2004 Intro to Computer Networking What is a for? To allow two or more endpoints to communicate What is a? Nodes connected by links Lets

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

Randomization. Randomization used in many protocols We ll study examples:

Randomization. Randomization used in many protocols We ll study examples: Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling

Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling Randomization Randomization used in many protocols We ll study examples: Ethernet multiple access protocol Router (de)synchronization Switch scheduling 1 Ethernet Single shared broadcast channel 2+ simultaneous

More information

Adaptive QoS Platform in Multimedia Networks

Adaptive QoS Platform in Multimedia Networks Adaptive QoS Platform in Multimedia Networks Mahmoud Sherif, Ibrahim Habib, Mahmoud Naghshineh, and Parviz Kermani CUNY Graduate School and Department of Electrical Engineering The City College of New

More information

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks Jason P. Jue, Member, IEEE, and Biswanath Mukherjee, Member, IEEE Abstract Wavelength-division multiplexing

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Performance Study of a QoS scheduling algorithm over wireless networks

Performance Study of a QoS scheduling algorithm over wireless networks 1 Performance Study of a QoS scheduling algorithm over wireless networks Siew HuiPei Joanna, Student Member, IEEE Abstract With the proliferation of wireless networks, consumers are increasingly aware

More information

Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic

Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic Anupam Soni and Yatindra Nath Singh anusoni@iitk.ac.in,ynsingh@iitk.ac.in. Abstract In Optical Burst Switching

More information

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS

MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS MODERN RECOVERY MECHANISMS FOR DATA TRANSPORT NETWORKS IT Specialist Dorina LuminiŃa Copaci Gorj Court IT Expert Constantin Alin Copaci ANRCTI Bucharest Abstract: A large number of recovery mechanisms

More information

Chapter 3 : Topology basics

Chapter 3 : Topology basics 1 Chapter 3 : Topology basics What is the network topology Nomenclature Traffic pattern Performance Packaging cost Case study: the SGI Origin 2000 2 Network topology (1) It corresponds to the static arrangement

More information

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label

More information

Lecture 4 Wide Area Networks - Routing

Lecture 4 Wide Area Networks - Routing DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Routing Mei Yang Based on Lecture slides by William Stallings 1 ROUTING IN PACKET SWITCHED NETWORK key design issue for (packet) switched

More information

An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network

An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network Somchai Lekcharoen Faculty of Information Technology, Rangsit University, Thailand Email:s_lekcharoen@yahoo.com

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Routers: Forwarding EECS 122: Lecture 13

Routers: Forwarding EECS 122: Lecture 13 Input Port Functions Routers: Forwarding EECS 22: Lecture 3 epartment of Electrical Engineering and Computer Sciences University of California Berkeley Physical layer: bit-level reception ata link layer:

More information

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER CHAPTER 4 Revised: October 30, 2012, This chapter describes features that apply to all SIP system operations. It includes the following topics: SIP Timer Values, page 4-1 Limitations on Number of URLs,

More information

AMCP/4-WP/70. b) requirements and recommendations together with their rationale; and

AMCP/4-WP/70. b) requirements and recommendations together with their rationale; and Appendix A to the Report on Agenda Item 3 3A-1 APPENDIX A VHF DIGITAL LINK (VDL) DESIGN GUIDELINES 1. INTRODUCTION 1.1 In the absence of a comprehensive and detailed set of operational requirements, the

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

Comparison of Protection Cost at IP or WDM Layer

Comparison of Protection Cost at IP or WDM Layer Comparison of Protection Cost at IP or WDM Layer Mauro Cuna Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it Marco Mellia Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it

More information