Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures

Size: px
Start display at page:

Download "Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures"

Transcription

1 Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures Selvamani K 1, Kanimozhi S 2, Elakkiya R 3 and Kannan A 4 1,3 Department of Computer Science and Engineering, Anna University, Chennai, Tamilnadu, India 2,4 Department of Information Science and Technology, Anna University, Chennai, Tamilnadu, India Abstract - The usage of internet is highly increasing for mission-critical applications and hence internet is always expected to be available for the users. But unfortunately service disruptions happened even in well designed and managed networks due to link failures and most of the failures are transient. Existing works on multipath routing scheme has focused only on the heuristic methods. But in this proposed work, we focus on optimal congestion reduction schemes to minimize the congestion in a network. This deployed link state routing protocols react to link failures through the global link state and the routing table re-computation by causing significant discontinuity in forwarding after the failure. This paper aims in providing fast global re-routing called Failure Insensitive Routing (FIR) for handling these transient link failures and efficient multipath routing for congestion minimization. This proposed approach detects the link failures and forwards the packets using interface-specific forwarding technique and suppresses the link state advertisement and triggers the local re-routing using backward table. This approach also aims to formulate multipath routing to restrict the quality (length) of the selected paths and the number of routing paths per destination. Keywords: Fast Rerouting; Transient Failures; Multipath Routing; Congestion Avoidance; 1 Introduction Currently deployed protocols called Link-state protocols perform global routing table to route around the failures which usually takes few seconds. It also raises the congesting situation due to network link failures. Whenever a link fails in a network, the traffic is rerouted around the failure leading to congestion on a link, which will increase the traffic than ever before. In such cases, a mechanism called congestion control is used to maximize the throughput and to minimize the impact of the packet loss. In real-time applications, such as VoIP which has emerged in recent years requires a fast rerouting mechanism before all routers on the network update their routing tables. In addition to this fast rerouting is more appropriate than global routing the link when failures are transient. Moreover, to support time-sensitive applications, the network needs to survive failures with minimal disruption to the service. Hence it is necessary to develop a fast local routing protocol for link state protocols to handle transient link failures and efficient multipath routing algorithm for congestion minimization. 2 Related Works Multi-Protocol Label Switching (MPLS) based approaches to failure recovery [5] leverage explicit routing for fast rerouting. An explicitly routed protection LSP (Label Switched Path) is set up to provide a backup path for each vulnerable physical link and acts as a parallel virtual link. When the physical link fails, the upstream node switches traffic from the physical link to the virtual link. The label stacking capability of MPLS is used to re-route all the LSPs that used to go over the failed link by nesting them into the protection LSP. Since rerouting is done locally at the point of failure without the need to perform any signaling at the time of failure, MPLS can handle transient failures effectively with minimal disruption to forwarding of data. However, deployment of MPLS necessitates changes in the forwarding plane of traditional routers. Our objective is to provide fast local rerouting to deal with transient link failures with minimal changes to the current networking infrastructure. Previous studies and proposals on Multi-Path routing in the previous context have focused on heuristic methods. In [2], a Multi-Path routing scheme, termed Equal Cost Multi- Path (ECMP), has been proposed for balancing the load along multiple shortest paths using a simple round-robin distribution. By limiting itself to shortest paths, ECMP considerably reduces the load balancing capabilities of multipath routing; moreover, the equal partition of flows along the (shortest) paths (resulting from the round robin distribution) further limits the ability to decrease congestion through load balancing. OSPF-OMP [2] allows splitting traffic among paths unevenly; however, that often results in an inefficient flow distribution. Both [1] and [2] considered multipath routing as an optimization problem with an objective function that minimizes the congestion of the most utilized link in the network. In this paper, we focus on

2 multipath routing algorithms that both select the routing paths and split traffic among them. The pathology of link overload [9] in the network is studied and has proposed a deflection routing algorithm to alleviate overload by exploiting the highly meshed nature of the backbone and a judicious use of link weights. This proposal is based on the Sprint network which is built using a pure IP philosophy, though it can be applied to other networks, say those enabled with MPLS. In blacklist-based interface-specific [7] forwarding (BISF) is proposed that infers a blacklist, a list of links that might have failed, based on a packet s incoming interface and its destination, and determines the next-hop by excluding the blacklisted links. To enhance failure resiliency without jeopardizing routing stability, a local rerouting based approach [8] called failure insensitive routing is demonstrated. In Tabu-search heuristic [10] is proposed for choosing link weights which allow a network to function almost optimally during short link failures. The heuristic takes into account possible link failure scenarios when choosing weights, thereby mitigating the effect of such failures. 3 Proposed Methodology This paper aims in combining the enhanced FIR protocol for handling link failures and multipath algorithm for congestion minimization which provides better quality of source over link failures and network congestion. The proposed techniques for handling link failures and congestion minimization are explained as follows. 3.1 Handling Transient Link Failures In this proposed system, local rerouting called Enhanced Failure Insensitive Routing (EFIR) for handling the link failures and enhanced Multipath algorithms for congestion minimization are considered together to obtain better quality of service in case of network failure. Moreover, the idea is to calculate backup paths in advance before the network link fails. Whenever a failure is detected, the interrupted packets are immediately forwarded through the identified backup paths in order to minimize the service disruption. The two main key ideas that underpin this Proactive enhanced FIR approach based on local rerouting are interface-specific forwarding and Failure Inferencing. Under FIR, routers infer link failures based on packets and pre-compute interfacespecific forwarding tables (backup paths) in a distributed manner and trigger local rerouting without relying on network-wide link-state advertisements. Hence, this proposed EFIR enhances failure resiliency and routing stability by suppressing the advertisement of transient failures and locally rerouting packets along loop-free paths during the suppression period. 3.2 Congestion Minimization This second technique that performs enhanced Multipath routing called Restricted K-Path Routing (RKPR) for congestion minimization which combines the two algorithms called Restricted Multipath (RMP) and K-Path Routing (KPR). The main idea is to select paths based on quality of service and number of paths detected in the network. To minimize the route congestion and to minimize the service disruption, the packets are forwarded through multiple paths. In this work, two fundamental constraints are considered. First, each path that has been selected for routing should have adequate quality for sending the packets. Hence it is necessary to prohibit the substantially inferior paths which are considered as longer path. Second, practical restriction is on the number of routing paths per destination. Therefore, in practice, it is desirable to use few paths as possible to minimize the network congestion. Through comprehensive simulations, this system proves that Multipath solutions obtained by optimal congestion reduction schemes are fundamentally more efficient than solutions obtained by heuristics. This approach reduces the overheads and congestion resulted in earlier works. 4 Concept of Enhanced FIR In EFIR technique, when a link fails, the adjacent node to it locally reroute the packets to the affected destinations and all other nodes simply forward packets according to their pre-computed interface-specific forwarding tables without being explicitly aware of the failure. Once the failed link comes up again, forwarding resumes over the recovered link. Figure 1.1 shows the topology used for simulation of our technique EFIR which is considered in [7]. Figure 1.1 Topology used for simulation of EFIR The algorithm for the proposed EFIR technique is documented in figure 1.2.

3 EFIR Implementation Input : Transient Link Failure. Output: Local rerouting of packets during failure. Algorithm: i.start ii.identify the key links (set of links whose individual or combined failure causes the node to reroute the packet to its parent). iii.compute the shortest path by eliminating the key links with the help of fuzzy rules. iv.perform routing through the path found in step-iii. v.repeat the step-ii, iii and iv during each transient failure. vi.stop Figure 1.2 Algorithm for EFIR Using the conventional forwarding tables, local rerouting is not viable as it causes forwarding loops. Under enhanced technique of EFIR, forwarding loops are avoided by inferring a link s failure from packet s incoming interface. When the path 2 5 is down in the figure 1.1, node 2 locally reroutes packets from nodes 1 to 6 back to node 1 instead of dropping them. When a packet destined to 6 arrives at node 1 from node 2, then node 1 can infer that some link along its shortest path to 6 must have failed, as otherwise, 2 should never forward packets destined to 6 to node 1. The key links associated with the interface and destination 6 is 2 5, 5 6. It should be noted that these inferences about potential link failures are made not on the fly but in advance. 5 Multipath Algorithms The Paths for rerouting the packets from source to destination are selected based on these two main algorithms namely Restricted Multi-Path algorithm (RMP) and K-Path Routing algorithm. These two algorithms are illustrated as follows. 5.1 RMP (Restricted MultiPath) Consider a network G(V,E), two nodes s,t V, a length le>0, and a capacity for each link ce>0, a demand, and a length restriction L for each routing path. Find a feasible path flow that minimizes the network congestion factor such that, if P P(s, t) is the set of paths in P(s, t) that are assigned a positive flow, then, for each p P, it holds that L(p) L. Remark 1: For convenience, and without loss of generality, we assume that the length le of each link e E is not larger than the length restriction L. Clearly, links that are longer than L are erased. 5.2 KPR (K-Path Routing) In a given network G(V,E), the two nodes s, t V, a capacity ce>0 for each link e E, a demand > 0, and a restriction on the number of routing paths K. Find a feasible path flow that minimizes the network congestion factor, such that, if P P(s, t) is the set of paths in P(s, t) that are assigned a positive flow, then P K Input : Network traffic from network layer, length, flow rate. Output: Multipath routing with minimum number of path and reduced flow rate. Algorithm of the RKPR: i. Start ii. Create a traffic type of RMP and KPR. iii. Create the integrated traffic type that selects maximum of three paths to any destination in the network using c++. iv. Also, reduce the flow rate using the agent created using c++ for the path selected in step-iii. v. Multicast the packets using the traffic agent created to the destination. vi. Stop Figure 1.3 Algorithm for RKPR Remark 2: In both problems, the source to destination pair (s, t) is assumed to be connected, i.e., P(s, t) 1. Remark 3: In both problem formulations, it is possible to limit the link congestion factor fe/ce of each e E to any desired congestion level e by replacing the given capacity value ce with a new capacity value e ce. Clearly, the capacity constraint fe e ce (that both problems must satisfy) assures that the link congestion factor would be at most e. 6 Results and Performance Evaluation Our performance evaluations are based on the simulations of seven nodes as shown in figure 1.4 for handling link failure and 25 nodes for congestion minimization scenario that form a network with symmetric links over a rectangular (1500m * 500m) flat space in 100 sec of simulation time. The minimum speed for each node as 2ms except for the static case, and vary the maximum speed to 15ms to evaluate the impact of Transient Failure on our routing performance. Figure 1.5 shows the routing of enhanced FIR during failure of link 1-4. Figure 1.6 shows the ratio between the network congestion produced by an optimal Multipath routing assignment and the network congestion produced by ECMP using wax man topology.

4 Table 1.1 shows the implementation analysis of FIR that compares the throughput of OSPF with and without FIR. TABLE 1.1 ANALYSIS OF LINK FAILURE WITH AND WITHOUT FIR Time in sec OSPF without link failure No. of packets received in bytes During link link failure without FIR During link failure with FIR Figure 1.6 Congestion Rate for OMP and RKPR The following graphs shows the simulated results obtained from the implementation using NS-2 for the proposed method. This hybrid approach proves in considerable amount of performance over the existing individual methods. Fig 1.7 Simulation of RKPR in NS-2 Figure 1.4 Rerouting by EFIR in NS-2 Figure 1.5 Xgraph with and without EFIR 7 Conclusion and Future Work One fundamental challenge for IP Backbone network is to provide uninterrupted service availability during transient link failures and congestion. This proposed work explores a novel Pro-active approach for handling such transient link failures and an optimal congestion reduction scheme for congestion minimization. This algorithm can drastically reduce the network congestion at the price of routing along minimum number of paths that are slightly longer than the shortest path. In this work, we have presented a network layer routing solution that performs local rerouting and a Multipath routing in a unified framework. RMP-KPR algorithm restricts the number of path and flow rate to reduce the congestion along the path. We have also developed a formal model to analyze the routing stability and network availability under both Multipath and RMP-KPR approaches through simulations and graph comparison. Our results indicate that the improvement due to hybrid RMP-KPR algorithm is markedly better when the path and flow rate are restricted.

5 Our routing mechanism assumes a forwarding table per each interface and is applicable to links with symmetric weights. One possible extension is to deploy FIR in networks with asymmetric weights, broadcast LANs, and multiple areas. The distributed implementation of Algorithm RMP remains an open issue for future investigation. Also there is a possibility of providing security and energy efficient to make ease of the multipath routing that can minimize the network target. [10] S. Iyer, S. Bhattacharyya, N. Taft, and C. Diot, An Approach to Alleviate Link Overload as Observed on an IP Backbone, in Proceedings of IEEE INFOCOM, pp , References [1] Ron Banner, Ariel Orda, Multipath Routing Algorithms for Congestion Minimization, IEEE/ACM Transaction on Networking, Vol. 15, Issue 2, pp , Apr [2] H.Han, S.Shakkottai, C.V.Hollot, R.Srikanth, and D.Towsley, Multipath TCP: A Joint Congestion Control and Routing Scheme to Exploit Path Diversity in the Internet, IEEE/ACM Transaction on Networking, Vol. 14, Issue 6, pp , Dec [3] Merindol Pascal, Pansiot Jean-Jacques and Cateloin Stephane, Path Computation for Incoming Interface Multipath Routing in ECUMN 07: Proceedings of the Fourth European Conference on Universal MultiService Networks, [4] Kyeongia Lee, Armand Toguveni and Ahmed Rahmani, Hybrid Multipath Routing Algorithms for Load Balancing in MPLS Based IP Networks in AINA 06: Proceedings of the 20th International Conference on Advanced Information Networking and Application, [5] Wei Lin, Bin Liu and Yi Tang, Traffic Distribution over Equal-Costs-Multi- Paths using LRU-based Caching with Counting Scheme, in AINA 06: Proceedings of the 20th International Conference on Advanced Information Networking and Application, 2006 [6] Larry L.Peterson & Bruce S.Davie, Computer Networks A systems Approach, Morgan Kaufmann publishers, second edition, [7] S.Nelakuditi, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang and Chen-Nee Chuah, Fast Local Rerouting for Handling Transient Link Failures, IEEE/ACM Transactions on Networking, Vol. 15, Issue 2, pp: , April [8] "Handling Failures in IP Networks through Interface Specific forwarding [9] A. Nucci, B. Schroeder, S.Bhattacharyya, N. Taft, and C. Diot, IGP Link Weight Assignment for Transient Link Failures, Presented at the ITC18, Berlin, Germany, 2003.

Mitigating Link Failures and Implementing Security Mechanism in Multipath Flows for Data Plane Resources

Mitigating Link Failures and Implementing Security Mechanism in Multipath Flows for Data Plane Resources World Engineering & Applied Sciences Journal 7 (4): 212-219, 2016 ISSN 2079-2204 IDOSI Publications, 2016 DOI: 10.5829/idosi.weasj.2016.212.219 Mitigating Link Failures and Implementing Security Mechanism

More information

THE Internet has seen tremendous growth in the past decade

THE Internet has seen tremendous growth in the past decade IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 359 Fast Local Rerouting for Handling Transient Link Failures Srihari Nelakuditi, Member, IEEE, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang, Member,

More information

CURRENT routing schemes typically focus on discovering

CURRENT routing schemes typically focus on discovering IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 413 Multipath Routing Algorithms for Congestion Minimization Ron Banner, Senior Member, IEEE, and Ariel Orda, Fellow, IEEE Abstract Unlike

More information

OSPF with Deterministic Routing

OSPF with Deterministic Routing OSPF with Deterministic Routing Sachin Bojewar Associate Professor, Vidyalankar Institute of Technology, Wadala, Mumbai, India Dnyaneshwar Dhangar Vidyalankar Institute of Technology, Wadala, Mumbai, India

More information

Deterministic Routing in OSPF for Post Single Link Failure

Deterministic Routing in OSPF for Post Single Link Failure Deterministic Routing in OSPF for Post Single Link Failure Dnyaneshwar Dhangar 1, Sachin Bojewar 2 1 (Information Technology/ Mumbai, India) 1 (Information Technology/ Mumbai, India) ABSTRACT : In the

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 173 A Review of Various Approaches to Multipath Routing Maryada M.Tech. Student, Department of Computer Science

More information

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali

More information

Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources

Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources 2876 Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources Ramya M PG Scholar, Department of Computer Science, Klasalingam Institute of Technology,Krishnan

More information

Fast Local Rerouting for Handling Transient Link Failures

Fast Local Rerouting for Handling Transient Link Failures Fast Local Rerouting for Handling Transient Link Failures Srihari Nelakuditi, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang, and Chen-Nee Chuah Abstract Link failures are part of the day to day operation of a

More information

Physical-Layer Communication Recovery for Heterogeneous Network

Physical-Layer Communication Recovery for Heterogeneous Network Physical-Layer Communication Recovery for Heterogeneous Network Po-Kai Tseng 1, Wei-Ho Chung 1, Kate Ching-Ju Lin 1, Chi-Sheng Shih 2, and Ling-Jyh Chen 3 1 Research Center for Information Technology Innovation,

More information

Fast Local Rerouting for Handling Transient Link Failures

Fast Local Rerouting for Handling Transient Link Failures Fast Local Rerouting for Handling Transient Link Failures Srihari Nelakuditi, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang and Chen-Nee Chuah Univ. of South Carolina, Columbia Univ. of Minnesota, Minneapolis

More information

Fast IP Network Recovery using MRC

Fast IP Network Recovery using MRC International Journal of Research in Computer Science ISSN 2249-8257 Volume 1 Issue 1 (2011) pp. 75-88 White Globe Publications www.ijorcs.org Fast IP Network Recovery using MRC T.K Rajesh 1, N. Sreenivasulu

More information

Avoiding Transient Loops through Interface-Specific Forwarding

Avoiding Transient Loops through Interface-Specific Forwarding Avoiding Transient Loops through Interface-Specific Forwarding Zifei Zhong, Ram Keralapura 2, Srihari Nelakuditi, Yinzhe Yu 3, Junling Wang, Chen-Nee Chuah 2, and Sanghwan Lee 3 Department of Computer

More information

Failure Insensitive Routing for Ensuring Service Availability

Failure Insensitive Routing for Ensuring Service Availability Failure Insensitive Routing for Ensuring Service Availability Srihari Nelakuditi 1, Sanghwan Lee 2, Yinzhe Yu 2, and Zhi-Li Zhang 2 1 Dept. of Computer Science & Engineering, University of South Carolina,

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

IP Fast Reroute with Failure Inferencing

IP Fast Reroute with Failure Inferencing IP ast Reroute with ailure Inferencing Junling Wang Srihari Nelakuditi University of South arolina, olumbia Presenter: Sanghwan Lee Kookmin University, Seoul, Korea 1 Outline IP ast Reroute and xisting

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Modified ECMP Routing Using Adapted Cost Disjoint Multiple Paths ACDMP

Modified ECMP Routing Using Adapted Cost Disjoint Multiple Paths ACDMP Modified ECMP Routing Using Adapted Cost Disjoint Multiple Paths ACDMP Dr. Abbas A. Jasim Computer Engineering Department University of Basrah Basrah, Iraq abbas.a.jasim@ieee.org Abstract Computer network

More information

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Kang Xi and H. Jonathan Chao April 00 New York State CENTER FOR ADVANCED TECHNOLOGY IN TELECOMMUNICATIONS Supported by the New

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute

A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute International Journal of Networks and Communications 2012, 2(5): 123-131 DOI: 10.5923/j.ijnc.20120205.05 A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute Simon Tembo 1,*,

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Characterization of failures in n IP backbone. A. Markopolou, G. Iannacconne, S. Bhattacharyya, C-N Chuah and C. Diot INFOCOM 2004

Characterization of failures in n IP backbone. A. Markopolou, G. Iannacconne, S. Bhattacharyya, C-N Chuah and C. Diot INFOCOM 2004 Characterization of failures in n IP backbone A. Markopolou, G. Iannacconne, S. Bhattacharyya, C-N Chuah and C. Diot INFOCOM 2004 Failures in a backbone Little is known about failures in backbones Typically

More information

Failure Insensitive Routing for Ensuring Service Availability

Failure Insensitive Routing for Ensuring Service Availability Failure Insensitive Routing for Ensuring Service Availability Srihari Nelakuditi 1, Sanghwan Lee 2, Yinzhe Yu 2, and Zhi-Li Zhang 2 1 Dept. of Computer Science & Engineering, University of South Carolina,

More information

Introduction to Segment Routing

Introduction to Segment Routing Segment Routing (SR) is a flexible, scalable way of doing source routing. Overview of Segment Routing, page 1 How Segment Routing Works, page 2 Examples for Segment Routing, page 3 Benefits of Segment

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

I. INTRODUCTION PROPOSED ALGORITHM

I. INTRODUCTION PROPOSED ALGORITHM Performance Evaluation of MPLS Network with Failure Protection using OPNET Modeler Aamani Nemturand Mohamed El-Sharkawy Electrical and Computer Engineering, Purdue School of Engineering and Technology,

More information

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6

An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 An Approach to Efficient and Reliable design in Hierarchical Mobile IPv6 Taewan You 1, Seungyun Lee 1, Sangheon Pack 2, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajoung-dong, Yusong-gu,

More information

Deploying MPLS & DiffServ

Deploying MPLS & DiffServ Deploying MPLS & DiffServ Thomas Telkamp Director, Data Architecture & Technology Global Crossing Telecommunications, Inc. telkamp@gblx.net MPLS and DiffServ technologies are getting a lot of attention

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

A Fast Rerouting Scheme for OSPF/IS-IS Networks

A Fast Rerouting Scheme for OSPF/IS-IS Networks A Fast Rerouting Scheme for OSPF/IS-IS Networks Yong Liu, A. L. Narasimha Reddy ELEN Department, TAMU, College Station, TX 77843 Email: {yongliu,reddy}@ee.tamu.edu Abstract Most current backbone networks

More information

Multipath Routing Algorithms for Congestion Minimization

Multipath Routing Algorithms for Congestion Minimization 1292 Multipath Routing Algorithms for Congestion Minimization B. Sasthiri Department of Computer Science and Engineering, CSI College of Engineering, Ketti, The Nilgiris, 643215. Email: sasthirib@yahoo.co.in

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

BW Protection. 2002, Cisco Systems, Inc. All rights reserved.

BW Protection. 2002, Cisco Systems, Inc. All rights reserved. BW Protection 2002, Cisco Systems, Inc. All rights reserved. 1 Cisco MPLS - Traffic Engineering for VPNs Amrit Hanspal Sr. Product Manager MPLS & QoS Internet Technologies Division 2 Agenda MPLS Fundamentals

More information

Failure Insensitive Routing for Ensuring Service Availability

Failure Insensitive Routing for Ensuring Service Availability Failure Insensitive Routing for Ensuring Service Availability Srihari Nelauditi, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang Dept. of Computer Science & Engineering Dept. of Computer Science & Engineering University

More information

Evaluation of Performance for Optimized Routing in MPLS Network

Evaluation of Performance for Optimized Routing in MPLS Network Evaluation of Performance for Optimized Routing in MPLS Network Neethu T U Student,Dept. of Electronics and Communication The Oxford College of Engineering Bangalore, India Reema Sharma Assistant Professor,Dept.of

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label

More information

Link/Node Failure Recovery through Backup Path Lengths

Link/Node Failure Recovery through Backup Path Lengths Link/Node Failure Recovery through Backup Path Lengths Ravula Prathap Kumar, Banothu Balaji, Dasari Yakobu, N Sai Bala Kishore Department of Computer Science and Engineering, Vignan University, Guntur,

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Incorporation of TCP Proxy Service for improving TCP throughput

Incorporation of TCP Proxy Service for improving TCP throughput Vol. 3, 98 Incorporation of Proxy Service for improving throughput G.P. Bhole and S.A. Patekar Abstract-- slow start algorithm works well for short distance between sending and receiving host. However

More information

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA) 103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA

More information

Advanced Topics in Routing

Advanced Topics in Routing Advanced Topics in Routing EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

Techniques and Protocols for Improving Network Availability

Techniques and Protocols for Improving Network Availability Techniques and Protocols for Improving Network Availability Don Troshynski dtroshynski@avici.com February 26th, 2004 Outline of Talk The Problem Common Convergence Solutions An Advanced Solution: RAPID

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Traffic Engineering System Based on Adaptive Multipath Routing

Traffic Engineering System Based on Adaptive Multipath Routing Traffic Engineering System Based on Adaptive Multipath Routing Karthiga. S 1, Balamurugan. M. S 2 1 PG Scholar & Sri Shakthi Institute of Engineering and Technology, Chinniampalayam, Coimbatore-641062,

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

SYSC 5801 Protection and Restoration

SYSC 5801 Protection and Restoration SYSC 5801 Protection and Restoration Introduction Fact: Networks fail. Types of failures: Link failures Node failures Results: packet losses, waste of resources, and higher delay. What IGP does in the

More information

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering Hema T. Kaur, Shivkumar Kalyanaraman ECSE Department, Rensselaer Polytechnic Institute, Troy, NY-12180 {hema,shivkuma}@networks.ecse.rpi.edu

More information

Enhancing TCP performance in IP fast reroute

Enhancing TCP performance in IP fast reroute Title Enhancing TCP performance in IP fast reroute Author(s) Mao, M; Wen, Z; Yeung, LK Citation The IEEE International Conference on Communications (ICC 2012), Ottawa, ON., 10-15 June 2012. In IEEE International

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

World Journal of Engineering Research and Technology WJERT

World Journal of Engineering Research and Technology WJERT wjert, 2018, Vol. 4, Issue 4, 527-537. Original Article ISSN 2454-695X Mukhtiar et al. WJERT www.wjert.org SJIF Impact Factor: 5.218 RPD: RELIABLE PACKETS DELIVERY CONGESTION CONTROL SCHEME IN WIRELESS

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Convergence Routing Analysis in IPv6 Networks

Convergence Routing Analysis in IPv6 Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735 PP 18-24 www.iosrjournals.org Convergence Routing Analysis in IPv6 Networks S.Arun Kumar 1 and

More information

MPLS/Tag Switching. Background. Chapter Goals CHAPTER

MPLS/Tag Switching. Background. Chapter Goals CHAPTER 28 CHAPTER Chapter Goals Understand the advantages of MPLS. Learn the components of an MPLS system. Compare and contrast MPLS and hop-by-hop routing. Describe the two methods of label distribution. Explain

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers

Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers School of Computer Science & IT Devi Ahilya University, Indore ABSTRACT The work in this paper is the extension of

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

Load Balancing for Multiple Traffic Matrices Using SDN Hybrid Routing

Load Balancing for Multiple Traffic Matrices Using SDN Hybrid Routing 204 IEEE 5th International Conference on High Performance Switching and Routing (HPSR) Load Balancing for Multiple Traffic Matrices Using SDN Hybrid Routing Junjie Zhang, Kang Xi, Min Luo, H. Jonathan

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Progress Report No. 3. A Case Study on Simulation Scenario

Progress Report No. 3. A Case Study on Simulation Scenario NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 3 A Case Study on Simulation Scenario The University of Canterbury Team 21 December 2005 Progress Report This report

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

Fast Rerouting Algorithms for Routing Protocols in IP Networks

Fast Rerouting Algorithms for Routing Protocols in IP Networks Fast Rerouting Algorithms for Routing Protocols in IP Networks Depavath Harinath 1, M.V.Ramana Murthy2, Mrs.Kata Swathi3 Department of Computer Science, HRD Degree and PG College, Hyderabad, Telangana,

More information

Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes

Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes Yu Guo, Ning Wang, Kin-Hon Ho, Michael Howarth, and George Pavlou 2 Centre for Communication Systems Research, University

More information

Interface Split Routing for Finer-Grained Traffic Engineering

Interface Split Routing for Finer-Grained Traffic Engineering Interface Split Routing for Finer-Grained Traffic Engineering Saqib Raza, Department of Computer Science University of California, Davis Chen-Nee Chuah Department of Computer and Electrical Engineering

More information

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless

More information

Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks

Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks Differentiating Link State Advertizements to Optimize Control Overhead in Overlay Networks Mathieu Bouet, Julien Boite, Jérémie Leguay and Vania Conan Thales Communications & Security, Paris, France Abstract

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

Flow-Based Routing Architecture for Valiant Load-Balanced Networks

Flow-Based Routing Architecture for Valiant Load-Balanced Networks Flow-Based Routing Architecture for Valiant Load-Balanced Networks Imad Khazali and Anjali Agarwal Electrical and Computer Engineering Department Concordia University Montreal, Quebec, Canada Email: {ikhazali,

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

Intelligent Routing Platform

Intelligent Routing Platform WHITE PAPER Bring Intelligence to your Network Copyright 2018 Noction Inc. Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

Load Balancing for Multiple Traffic Matrices Using SDN Hybrid Routing

Load Balancing for Multiple Traffic Matrices Using SDN Hybrid Routing Load Balancing for Multiple Traffic Matrices Using SDN Hybrid Routing Junjie Zhang, Kang Xi, Min Luo, H. Jonathan Chao New York University Huawei Technologies junjie.zhang@nyu.edu, kang.xi@nyu.edu, min.ch.luo@huawei.com,

More information

ROBUST ROUTING INFORMATION UPDATING IN IPV6 NETWORKS. Cosmin Adomnicăi, Viorel Mînzu

ROBUST ROUTING INFORMATION UPDATING IN IPV6 NETWORKS. Cosmin Adomnicăi, Viorel Mînzu ELECTROTECHNICS, ELECTRONICS, AUTOMATIC CONTROL, INFORMATICS ROBUST ROUTING INFORMATION UPDATING IN IPV6 NETWORKS Cosmin Adomnicăi, Viorel Mînzu Faculty of Automatics, Computer science, Electrical and

More information

MMPLS: Modified Multi Protocol Label Switching

MMPLS: Modified Multi Protocol Label Switching MMPLS: Modified Multi Protocol Label Switching Kanupriya 1 and Vikas Nandal 2 1 Electronics and Communication Department, U.I.E.T, MDU Rohtak, Haryana (India) priya.kanu846@gmail.com 2 Electronics and

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information

Syed Mehar Ali Shah 1 and Bhaskar Reddy Muvva Vijay 2* 1-

Syed Mehar Ali Shah 1 and Bhaskar Reddy Muvva Vijay 2* 1- International Journal of Basic and Applied Sciences Vol. 3. No. 4 2014. Pp. 163-169 Copyright by CRDEEP. All Rights Reserved. Full Length Research Paper Improving Quality of Service in Multimedia Applications

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013 CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements

More information

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL SEIFEDDINE KADRY 1, ISSA KAMAR 1, ALI KALAKECH 2, MOHAMAD SMAILI 1 1 Lebanese University - Faculty of Science, Lebanon 1 Lebanese University - Faculty of Business,

More information

Cisco I/O Accelerator Deployment Guide

Cisco I/O Accelerator Deployment Guide Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves

More information

MPLS опорни мрежи MPLS core networks

MPLS опорни мрежи MPLS core networks MPLS опорни мрежи MPLS core networks Николай Милованов/Nikolay Milovanov http://niau.org Objectives Identify the drawbacks of traditional IP routing Describe basic MPLS concepts and LSR types. MPLS Labels

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014

More information

WIRELESS broadband networks are being increasingly

WIRELESS broadband networks are being increasingly 1960 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 11, NOVEMBER 2006 Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks Mansoor Alicherry,

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

Cisco Service Advertisement Framework Deployment Guide

Cisco Service Advertisement Framework Deployment Guide Cisco Service Advertisement Framework Deployment Guide What You Will Learn Cisco Service Advertisement Framework (SAF) is a network-based, scalable, bandwidth-efficient approach to service advertisement

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information