Bandwidth Protection in MPLS Networks Using p-cycle Structure

Size: px
Start display at page:

Download "Bandwidth Protection in MPLS Networks Using p-cycle Structure"

Transcription

1 Bandwidth Protection in MPLS Networks Using p-cycle Structure Jianghui Kang, Martin J. Reed Department of Electronic System Engineering University of Essex Colchester, CO4 3SQ, United Kingdom {jkangf, Abstruct- This paper addresses the routing of backup tunnels with bandwidth guarantee in MPLS networks. Backup tunnels implemented by the packet layer in MPLS are seen as a useful alternative (or addition) to the schemes offered by a SONETBDH layer in particular for providing protection for real time packet services such as voice over IP. Many schemes have been proposed, working with MPLS, to provide the switching architecture for backup tunnels. However, the routing of the tunnels in these schemes is not clearly defined and hence the motivation for this work. This paper investigates the use of the p-cycle scheme to route the bandwidthguaranteed backup tunnels, a scheme that was originally devised for optical transport networks and IPlMPLS networks as well. We demonstrate that the problem (as for all but trivial p-cycle schemes) is too large to solve optimally and propose a relaxation method that pre-selects candidate cycles that are likely to provide a good solution. Furthermore, we show that working load distributions can significantly affect the performance of a p-cycle scheme and compare two routing algorithms to show how good distribution of working load can help increase the efficiency of the system. Index Terms-MPLS, facility backup, p-cycle, capacity planning, heuristic I. INTRODUCTION Fast backup protection in the order of 50 ms has long been a feature of circuit oriented networks such as SONETlSDH optical transport networks and is widely used and specified for carrying communications traffic such as voice. Packet networks working at a higher layer, in particular Internet protocol networks, have often resorted to slower restoration schemes that provide low-cost solutions to failure but with much slower time frames (usually measured in minutes). However, there is increasing interest in using packet based systems to provide real-time service transport working with quality of service techniques, for example voice over IP. For these systems to provide features comparable with a circuit oriented transport network, fast backup in the order of tens of milliseconds (i.e. protection or fast restoration) is required [l]. One solution to this is This work is supported by the EPSRC under the project GR/R05413/01 Audio over next generation Internet protocol networks to use MPLS or Multi Protocol Label Switching as the switching mechanism as it provides an efficient way to overlay connectionless IP traffic over a connection oriented layer. In practice, MPLS networks may be enabled over SONET using Packet-over-SONET technology. While, the SONETlSDH layer can provide reliable and fast protection in the occurrence of faults, at a cost, recent work has suggested that protection in the MPLS layer may be more cost effective. In addition, some envisage that the various layers existing today will be replaced by a simplified integrated IP over optical architecture using MPLS as an enabling technology. Consequently, the functions provided by the disappearing middle layers must be implemented in these two layers. This makes the investigation of the protectiodrestoration function in MPLS layer very important and routing of backup paths within the MPLS layer is the subject of this paper. In [l], a facility backup scheme for MPLS is proposed that uses one backup label switched path (LSP) tunnel to protect a set of LSPs. The former LSP is called a labelstacked bypass tunnel, which can protect all the LSPs passing its two end nodes (local repair points) by label stacking. When a fault occurs, all affected packets will be pushed in an additional label representing the bypass tunnel and redirected to the bypass tunnel at the local repair points. At the penultimate node, the additional label will be popped off the stack and the packets will be switched along the original LSPs. As the local repair points and detection points are very near to the fault, this scheme has fast rerouting speed. However, the design and management of these bypass tunnels are still not very clear although constrained shortest path first (CSPF) has been proposed to compute the tunnels. The p-cycle scheme has been proposed for protection in WDM or SONET networking and for the IP layer as well [2]. Here, we adapt the pcycle concept to the MPLS layer where it controls bypass tunnels engineered using label stacking under the assumption that all the LSPs in the network have certain bandwidth requirements and a backup tunnel must provide guaranteed bandwidth to the LSPs protected by it. Although the facility backup using /03/$ IEEE 356

2 p-cycle scheme can provide both node and link protection, in this paper we will concentrate on link protection. The scheme proposed in this paper only provides protection to the traffic in the occurrence of a link failure as the fast part of the whole restoration process. It should cooperate with an interior gateway routing protocol that should continue to act according to its own protocol to be the slower part of the whole restoration process [2]. This two-part scheme should be able to achieve both the reduction of interference to the traffic and good capacity efficiency. This paper first describes MPLS and the pcycle scheme. Our original studies are presented in Section I11 and IV. In Section 111, the paper states the constraint formulation used in this work to route the bandwidth-guaranteed backup tunnels, followed by descriptions of how the solution search space is reduced and the results of investigation into routing and subsequent load distribution. Section IV investigates the work applied to a realistic network and the scalability of the relaxation method is also discussed. Note that the MPLS-layer pcycles have been first proposed in [2] and our work is thereby motivated to pursue aspects of that approach further. 11. OVERVIEW OF MPLS AND p-cycle SCHEME MPLS integrates the advantages of both layer 2 and layer 3 and has better support for QoS and traffic engineering than traditional IP networking. In MPLS networks, packets will be assigned labels at ingress points. Then these packets with a same label will be forwarded along the same labelswitching path (LSP). These LSPs can be thought of as traffic trunks that carry aggregated traffic according to forwarding equivalence classes (FEC). Service providers can use explicit routing to create bandwidth guaranteed LSPs and use them to provision bandwidth guaranteed services to their customers. In order to provide certain guarantee to these customers, the service providers need to provide certain protection mechanisms to ensure these bandwidth guaranteed LSPs are quickly protected upon failures. Here we deploy the pcycle structure to manage label-stacked bypass tunnels to provide bandwidth guaranteed, quick protection to LSPs. The pcycle scheme was originally proposed for fault restoration in transport networks (WDM or SONET) [3]. The essence of this scheme is that pre-configuring the spare capacity of a network into certain patterns can achieve better restoration performance than others and in [41,[6] it is proven that pre-configured cycles have the best performance among trees, linear segments, closed cycles and the arbitrary mixtures of all these patterns. Furthermore, in [3] it is found that pcycles scheme can achieve 100% restorability with no or little increase of the spare capacity in meshbased restorable networks while remaining the BLSR-like restoration speed. In fact in [4] it is proven that pcycles have the same lower bound on the ratio of spare to working capacity as a span-restorable mesh network, which is =&, where 2 is the average span degree of the nodes in the network. It also shows that larger pcycles tend to provide higher capacity efficiency, from which we derive a heuristic algorithm for pre-selecting the candidate cycles in Section 111. Then in [2] it is demonstrated that this scheme can also be used in IPIMPLS networks to provide restoration in IP layer, still achieving full restoration almost without more spare capacity than optimised span restorable mesh networks. In order to make the difference between the spare capacity design problems in transport networks and MPLS networks with bandwidth guarantee clear, a MIP formulation (1)-(4) for spare capacity design in transport networks is presented below, which has been developed in [2] for the deployment of p-cycle in a SONET or WDM span restoration context. We can compare it with the formulation (5)-(9), which is adapted from a formulation for the spare capacity design problem of packet switching networks in [2]. First a set of all elementary cycles is generated from the network graph. Each elementary cycle can have certain number of copies of p-cycles that have one unit of capacity, e.g., an add-drop or cross-connection signal unit. The MIP will generate an optimal pcycie plan by determining the number of pcycle copies of each elementary cycle. Where the set of all the elementary cycles of the network graph is denoted as P, E is the set of all network spans, S = IEJ is the number of network spans. sj and wj are number of spare and working links on span j, respectively. ni is the number of unit capacity copies of elementary cycle i, pi,j is the number of spare links required on span j to build a copy of cycle i. xi,j is the number of paths that a single copy of p-cycle i provides for restoration of span j, cj is the cost or length of span j. The coefficients pi,j and zi,j can be determined in advance for each cycle in P. Then the formulation will be solved to determine the value of each ni, which will provide an optimal pcycle spare capacity design for the given network. p-cycles can be used to provide bandwidth-guaranteed 357

3 fast restoration in packet based MPLS networks as proposed in [2] in the same logical way as in SONET and WDM networks since we can manage the bandwidth of a packet MPLS network explicitly by using explicit routing and setting up bandwidth-guaranteed LSPs. But, unlike SONET or WDM networks, there is no distinct concept of unit spare capacity. This means that we cannot set up a certain number of copies of unit capacity p-cycle to provide restoration for the links with exactly the same capacity. Therefore we cannot directly use the above formulation designed for WDM or SONET networks to solve the pcycle optimisation problem in MPLS context. A method to adapt the circuit-switched p-cycle solution to design problems in IP networks is proposed in [2]. This considers the effects of restoration as an over-subscription on a link when affected traffic is moved onto new paths after a failure occurs, which follows naturally from the statistical multiplexing properties of IP networks and that sources will back-off in presence of over-subscription with reduced throughput but not total failure. Consequently, the objective function, which is to be minimised, measures the maximum over-subscription ratio on any link during a restoration event. As we need to provide bandwidthguaranteed protection here, this formulation also cannot be used directly and will be adapted in next section PROVISION OF BANDWIDTH PROTECTION IN MPLS NETWORKS USING p-cycles A. Spare Bandwidth Design Problem In order to provide bandwidth guaranteed restoration for the LSPs with certain bandwidth requirement, the formulation in [2] is adapted as following: NC min 2 ci si i= 1 ai,jlbj Vi=1,2,..., Ns,j=1,2,..., Nc i=l NC j=1 NC si 2 x,&,j,k * wj. aj,k k=l Vi = 1,2,..., Ns,j = 1,2,..., Ns,i # j Where Nc is the number of elementary cycles of the network graph, NS is the number of links of the network, bj is 1 if cycle j is selected in the design and 0 otherwise, ai,j is 1 if cycle j is used to protect link i and 0 otherwise, Pi,j,k is the link load ratio on link i when cycle k is used to protect link j. Pi,j,k is 1 if link j is on cycle k and 0.5 if link j is straddling cycle IC, it will be 0 otherwise. The different values of &,k for on-cycle links and straddling links imply the different protection schemes for these two kinds of links. Here we assume that an on-cycle link is protected by only one bypass tunnel formed by the remaining part of the cycle while a straddling link is able to utilize both parts of the cycle as the bypass tunnels and the traffic of the failed link can be evenly diverted into these two tunnels. Si and Wi are the total amounts of spare capacity reserved for restoration and working traffic on link i, respectively. ci is the cost of link i. (6) ensures that link i uses cycle j only when cycle j is selected in the design. (7) requires cycle j to be selected in the design only if it is used to protect any link. (8) ensures that each link will be protected by only one cycle and (9) ensures link i can provide enough guaranteed bandwidth even in the worst situation. The objective function is to minimise the weighted backup capacity for protection. Here we consider only single link failure, as it is assumed that the probability of multi-link failures is small with fast restoration in operation. Furthermore, we assume that the LSPs and pcycles are all bi-directional and have equal priority. As discussed above, all the LSPs passing a link will be protected as a single entity in the bypass tunnel formed by a pcycle, which leads to a relatively coarse protection granularity. Finer protection granularity is likely to improve the capacity efficiency further and provides more flexible protection service, e.g., more protection priority classes and different LSPs passing the same link can be protected by different cycles. This certainly will make the problem much more difficult to solve. However, as our main aim is to investigate the capacity efficiency of the pcycle scheme in the management of bandwidth-guaranteed bypass tunnels, this paper concentrates on the spare capacity design problem under the assumption of single priority, link-based protection. As the pcycle optimisation design is an NP-hard combinatorial optimisation problem [2], some relaxation or offline pre-selection of cycles is necessary in order to make its application practical. In this paper we consider the preselection of elementary cycles to reduce the size of the problem. In Section III.B, a pre-selection method to find an effective subset of cycles from all elementary cycles is proposed. All the work presented here was conducted by solving the above formulation (5)-(9) using linear program solver GLPK3.1, given the network topology, the traffic demand matrix and the allowed size or size range of the candidate elementary cycles. The output is the selected optimal set of cycles that will be used as pcycles and the corresponding links protected by them. It is worth noting that although all the work in this study was conducted 358

4 - I I I I I 1.6 Topology 1- Topology Topology Topology ROIJWX D"lrrpp E r m i Size of Cycles Figure 1 - BCR of Different Size of Cycles of 7 Topologies. ROWER 0 Figure 2 - Effect of Cycle Size with Unbalanced Load. by solving MIP, the proposed scheme is not restricted to the MIP method, especially for large networks. Other algorithms, e.g., genetic algorithm (GA) may be more suitable than the MIP method when the network is large. This will be considered in detail in Section IV. B. Reduction in search space through cycle selection We performed our first set of experiments on seven randomly generated networks with a uniform traffic demand and the results obtained from the experiments are shown in Figure 1. The randomly generated networks have an average size of 9 nodes and the average node degree varies between 3.8 and 4.2. The objective of this set of experiments is to investigate the relationship between the BCR (Backup Capacity Ratio), which is the ratio of backup capacity for restoration and working capacity of the network, and the size (in hops) of candidate cycles. For this set of experiments, the link capacities were set to infinity and we assumed there was unit bandwidth LSP between each pair of nodes. Then we used the formulation mentioned above to obtain the optimal pcycle design within certain hop limit, i.e., the cycles with certain hop number. Here the range of the size of cycles is from 3 to 9 hops except for network 3, where the largest cycle has 8 hops. As shown in Figure 1, in most cases the BCR will decrease with the increase of the size of the candidate cycles. This means that large cycles have higher efficiency in these cases, which has been substantiated theoretically in [4]. However, in two of the seven networks there are contrary results, the BCR increases when larger cycles are deployed. After careful analysis we found that it was because of the following reasons. The first reason is that too much working traffic passes the same link in these two networks because of the routing algorithm (pure shortest path routing) that we deployed in the experiments. This means the working load is not distributed evenly. So if we deploy larger cycles to protect the heavily loaded link, more backup capacity will have to be reserved than using smaller cycles in this case. Figure 2 depicts this. Let us assume link Router A, Router C is heavily loaded. If we use cycle A, B, D, C, A to protect link A, C, we only need reserve the same amount of capacities on three links. But if we select cycle A, B, E, F, G, D, C, A to protect link A, C, we will have to reserve the same amount of capacities on six other links. And as the link A, C is much more loaded that any other link, the large amount of backup bandwidth reserved for it on the cycle can not be shared fully by other links. This will degrade the capacity efficiency of pcycle scheme greatly. There will be overloading in some parts of the network while under-utilization in other parts of the network. This can be avoided in MPLS networks by traffic engineering and by deploying more efficient routing algorithms that can balance the working traffic distribution. The second reason is that the number of candidate large cycles is small for these two networks. The limited number of candidate cycles will lead to less flexibility thus decreasing the efficiency of the solution. These two problems will be considered carefully later in this section. Following the arguments above, we conjecture that larger cycles, as a general trend (but not always), have better capacity efficiency performance overall than smaller ones. Consequently, in the ideal case, the pcycle design problem can be simplified by reducing the number of candidate cycles (searching space) to just that of large cycles while not decreasing the overall capacity efficiency. Having established that large pcycles are optimum in the ideal case of uniform traffic distribution across all links, but, that in the non-ideal case of non-uniform traffic distribution this may not be true, we investigate the effect of the routing algorithm (and the subsequent traffic distribution) on the capacity efficiency. Consider a fully connected network with N nodes as shown in Figure 3. In order to make the analysis simpler, without loss of generality assume that one of the on-cycle links has working traffic of z while all of the other 359

5 BCR of Different a CL Figure 4 - BCR of Different Load Ratio a. Figure 3 - Relationship between BCR and Working Traffic Distribution. N- 1 on-cycle links carry working traffic of y where x > y. Furthermore, assume that all the - N straddlingcycle links have working capacity of 2y. In this case, the protected working capacity C can be derived as N(N - 1) c = x + y(n - 1) + 2y[ -NI (10) while the reserved backup capacity B will be B = z(n - 1) + y (11) Thus after simplifying (10) and (ll), the BCR can be derived as BCR B x(n - 1) + y = - (12) c z+y(n2-2n-l) Let a = f then N-l+a BCR = 1 + a(n2-2n - 1) (13) We plot the computed result for BCR in Figure 4 for N = 9,15,21 with a from 0.1 to 1. The figure shows that for a fixed N, the BCR will decrease with an increase of a and for a fixed cy the BCR will decrease with increased N. This implies that the capacity efficiency of the pcycle will decrease when the difference between x and y becomes bigger and will increase when the size of cycle becomes larger. This result confirms that the general trend is for large cycles to have improved capacity efficiency but that nonuniform traffic distribution limits this. In order to diminish the efficiency degradation caused by reducing the number of candidate cycles (searching space) to just that of the largest cycles in the cases where the traffic distribution is non-uniform, some smallest cycles should also be deployed to mop up the working traffic of heavily loaded links in localized points. Based on above analysis, the heuristic for the pre-selection of elementary cycles can be described as following. Let M be the number of sizes of the elementary cycles in the network, the cycles will have one of the following sizes: SI, 5 2,..., SM, where SI < S2 <... < SM. The set of cycles with size S is represented by Cs. So there are M sets of cycles: Csl, Cs,,..., Cs,. According to above analysis, we can reduce the searching space of the problem to the set of the largest cycles plus the set of smallest cycles, i.e., Csl U CsM. While this heuristic chooses the largest available cycles in networks, in practice large cycles may be a poor design due to practical implementation. For example, a large cycle is more susceptible to multiple failures, may introduce unacceptable delay (on the unacceptable number of nodes in the bypass path) and/or may result in signal degradation in optical transmission system. Clearly, for a practice implementation, the largest allowable cycle size may be set from the network policy. In this paper we ignore this. The simple heuristic presented here provides part of a solution to an unbalanced network load. An unbalanced traffic distribution is highly likely in a practical network as the traffic demand across network ingresdegress could differ and links could be deployed with differing capacities. However, the routing algorithm used in the network can also affect traffic distribution. Consequently the effect of routing together with the improvement of using the described cycle selection heuristic will be described together in the next section. C. The effects of routing algorithm on eflciency Here we investigate the effect of the simple cycle selection heuristic and the effect of the routing on the capacity efficiency measured using BCR. Two different routing algorithms were investigated: pure shortest path routing algorithm and a dynamic weight shortest path routing algorithm. The former is here simply termed shortest path (SP) algorithm. In this case, when a demand pair appears the shortest path between the source and destination nodes will 3 60

6 Network 1 TABLE I THE EFFECT OF ROUTING ALGORITHM ON BCR sc LC SLC SP I DWSP SP I DWSP SP I DWSP I I I I I I I I I I I I I SC = Smallest Cycles, LC = Largest Cycles SLC = Smallest + Largest Cycles be computed using Dijkstra algorithm, where the weights of links are fixed values. The second routing algorithm is termed here dynamic weight shortest path (DWSP), where the weights of the links are dynamically determined according to the working load of the links. In [5] a new LSP computing algorithm is proposed to keep the interference to demand routing of later demand pairs minimum. Thus it can achieve better load balancing than the shortest path algorithm. But this routing algorithm requires intensively solving Max-flow problem. So in 171 a new algorithm is proposed based on the one in [5] to reduce computation complexity and bound the lengths of the solutions as well. Here in our experiment, we adapted the algorithm in [7] to make it suitable for routing the demand pairs in an incapacitated network with complete working traffic information. This routing algorithm can achieve better working load balancing to improve the capacity efficiency of p-cycle further. In this experiment, four randomly generated network topologies with average node degree of 4 were deployed with randomly-generated traffic demand of uniform distribution. In addition, in order to test our conclusion about the size of pcycle, the experiment used different pre-selected candidate cycle sets, i.e., candidate cycle sets consisting of only the smallest elementary cycles Cs, (SC), only the largest cycles Cs, (LC) and the smallest plus the largest cycles Cs, U Cs, (SLC) respectively. Table I shows the results of the experiment regarding the above conclusions. From Table I we can see that in all the networks, DWSP algorithm has better performance (lower BCR) than SP algorithm regarding capacity efficiency for different sizes of cycles. For example, in Topology 1, the BCR can be reduced from to in the SLC case (our proposed algorithm), which can lead to a significant cost reduction. This is entirely consistent with our earlier conjecture. The table also provides the capacity efficiency of candidate cycle sets of SC and LC and SLC. It shows that large cycles indeed have better performance than their smaller counterparts and largest plus smallest cycles can achieve the best performance. For example, with same routing algorithm DWSP, the BCR of Topology 4 is decreased from to Figure 5 - CN Core Network of Project Cost when SC is replaced by LC and is reduced further to when LC is replaced by SLC. IV. REALISTIC NETWORK EXAMPLE In this part of this paper we will deploy the conclusions obtained from above experiments and analysis to test the performance of this scheme with a realistic network topology and traffic demand. The network topology that we used here is proposed by CN Core Network of project Cost 266 as shown in Figure 5. The traffic demand is the average Internet traffic of year 2002 on this network and given in a form of Source, Destination, and Bandwidth. The first thing to do is to route these working demands on the network as working flows with certain bandwidth requirements. As discussed above, in order to implement p cycle scheme more efficiently, we need a routing algorithm with good load balancing ability. So in our experiment we adopted the idea in [9] to control the weights of links. In [9] in order to optimise the weight setting for an AT&T World backbone with projected demands, the authors use a local search heuristic to solve the optimisation problem and get the weight settings for links that are very near to the values of optimal general routing method. The method has excellent performance in improving the network utilization and reducing congestion and link overloading by deciding the weights of links according to load and giving more penalties to higher loaded links. We modified the parameters of this method according to our own demand and network capacity. First let us see how our method can reduce the complexity of the optimisation problem. Table I1 is the distribution of cycles of all sizes existing in this network topology. Using the notation given in Section III.B, Table I1 gives M = 12 (there are 12 sizes of cycles), S1 = 4 (the minimum cycle size), 5 12 = 15 (the maximum cycle size). Without 361

7 TABLE I1 THE DISTRIBUTION OF ELEMENTARY CYCLES IN FIGURE 5 (TOTAL NUMBER OF CYCLES IS 118) appropriate measures, the solution space of the optimization problem is the combination of all 12 sets of cycles, which have 118 cycles altogether and thus all of them will make Z118 possible combinations. This will make the application computationally intensive. But, if our proposed method of reducing the solution space is used, we need only consider the cycles of set Csl U Cslz, which has only 8 cycles in this case. Clearly, the cycle selection heuristic proposed in Section 1II.B reduces the searching space to a size that is implementable and following our methodology the smaller candidate cycles will only be included if they form an advantage, hence, it will not degrade performance compared to a simple large cycle selection scheme. The capacity efficiency is depicted by the ratio of spare capacity reserved for backup and the working load, which is about 93% in this case. Further work being carried out at the moment is to investigate the optimisation of the routing algorithm such that the capacity efficiency can be further increased. For the design problem of even larger networks of several tens of nodes, there is more to consider. Firstly, as mentioned in Section III.B, the term the largest cycles have to be replaced by the largest allowable cycles to avoid utilizing cycles of too many hops. From our analysis it is obvious that in this case the proposed method can still achieve relatively high capacity efficiency. Secondly, as having been found in our experiments, for some large networks, even after relaxation using our pre-selection heuristic, the search space may still be too large to be solved by an MIP solver. In this case, other effective algorithms can be deployed to solve the design problem and the pre-selection heuristic can still provide an effectively reduced search space to speed up the solving of the problem. Because of the complexity of the pre-selection algorithm is determined only by the complexity of the algorithm that is used to enumerate all the elementary cycles in the network and polynomial time cycle-enumeration algorithms are available, the proposed method is scalable. bandwidth-guaranteed bypass tunnels in packet MPLS networks. In order to reduce the complexity of the problem, we investigated the reduction of the solution space using a cycle pre-selection scheme that produces good results. The paper investigated the application of this scheme to a realistic network scenario that has demonstrated that our scheme can achieve very good performance without intensive computation. The relation of capacity efficiency and load distribution has been further investigated and it was found that load balancing (a feature of MPLS traffic engineering) can further improve the efficiency of this scheme. Finally, we conclude that using adapted pcycle scheme with the proposed relaxation method provides an excellent scheme for the routing of bandwidth-guaranteed bypass tunnels in MPLS networks. REFERENCES Ping Pan et al., [Online], Fast reroute extensions to RSVP-TE for LSP tunnels, IETF Intemet Draft, Available: 15 August 2002 [date accessed]. D. Stamatelakis and W.D. Grover, IP layer restoration and network planning based on virtual protection cycles, IEEE Journal on Selected Areas in Communications, vol. 18, pp , October W.D. Grover and D. Stamatelakis, Cycle-oriented distributed preconfiguration: Ring-lie speed with mesh-lie capacity for self-planning network restoration, in Proceedings of ICC 98, pp , Atlanta, Georgia, June 07-11, D. Stamatelakis and W.D. Grover, Theoretical underpinnings for the efficiency of restorable networks using pre-configured cycles, IEEE Transactions on Communications, vol. 48, pp , August M. Kodialam and T. Lakshman, Minimum interference routing with applications to MPLS traffic engineering, Proceedings of IEEE IN- FOCOM 2000, vol. 2, pp , Tel Aviv, Israel, March 26-30, D. Stamatelakis and W.D. Grover, Network restorability design using pre-configured trees, cycles and mixtures of pattem types, TRLabs Canada, Technical Report TR , Issue 1.0, October 20, G. Baneqee and D. Sidhu, Path computation for traffic engineering in MPLS networks, in Proceeding of First Intemtional Conference on Nefworking (ICN ZOOI), Part 11, pp , Colmar, France, July 09-13, G. Hjalmtysson, P. Sebos, G. Smith, and J. Yates, Simple IP restoration for IP/GbWlOGbE optical networks, OFC 2000, Baltimore, MD, March B. Fortz, M. Thorup, Intemet traffic engineering by optimising OSPF weights, Proceedings of IEEE INFOCOM 2000, vol. 2, pp , Tel Aviv, Israel, March 26-30, V. CONCLUSION In this paper, using p-cycles to manage and control the bandwidth-guaranteed backup bypass tunnels in MPLS networks has been investigated. The study is based on the p-cycle scheme proposed originally for transport networks and IPMPLS networks but here is adapted for use with 362

Dynamic Routing of Restorable Bandwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information

Dynamic Routing of Restorable Bandwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 3, JUNE 2003 399 Dynamic Routing of Restorable Bwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information Murali Kodialam, Associate

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

Multi Protocol Label Switching

Multi Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 MPLS: introduction

More information

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,

More information

MPLS Multi-Protocol Label Switching

MPLS Multi-Protocol Label Switching MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - 1 MPLS: introduction

More information

Protection Switching and Rerouting in MPLS

Protection Switching and Rerouting in MPLS Protection Switching and Rerouting in MPLS S. Veni Dr.G.M.Kadhar Nawaz Research Scholar, Director, Dept. of MCA Bharathiar University Sona College of Technology Coimbatore, India Salem, India venii_k@yahoo.com

More information

SYSC 5801 Protection and Restoration

SYSC 5801 Protection and Restoration SYSC 5801 Protection and Restoration Introduction Fact: Networks fail. Types of failures: Link failures Node failures Results: packet losses, waste of resources, and higher delay. What IGP does in the

More information

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering Hema T. Kaur, Shivkumar Kalyanaraman ECSE Department, Rensselaer Polytechnic Institute, Troy, NY-12180 {hema,shivkuma}@networks.ecse.rpi.edu

More information

BW Protection. 2002, Cisco Systems, Inc. All rights reserved.

BW Protection. 2002, Cisco Systems, Inc. All rights reserved. BW Protection 2002, Cisco Systems, Inc. All rights reserved. 1 Cisco MPLS - Traffic Engineering for VPNs Amrit Hanspal Sr. Product Manager MPLS & QoS Internet Technologies Division 2 Agenda MPLS Fundamentals

More information

Evaluation of Performance for Optimized Routing in MPLS Network

Evaluation of Performance for Optimized Routing in MPLS Network Evaluation of Performance for Optimized Routing in MPLS Network Neethu T U Student,Dept. of Electronics and Communication The Oxford College of Engineering Bangalore, India Reema Sharma Assistant Professor,Dept.of

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES

OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES th GI/ITG CONFERENCE ON MEASURING, MODELLING AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS 3rd POLISH-GERMAN TELETRAFFIC SYMPOSIUM OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING

More information

Dynamic Routing of Bandwidth Guaranteed Tunnels with Restoration

Dynamic Routing of Bandwidth Guaranteed Tunnels with Restoration Dynamic Routing of Bandwidth Guaranteed Tunnels with Restoration Murali Kodialam T. V. Lakshman Bell Laboratories Lucent Technologies 101 Crawfords Corner Road Holmdel, NJ 033, USA muralik, lakshman @bell-labs.com

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

Design of Large-Scale Optical Networks Λ

Design of Large-Scale Optical Networks Λ Design of Large-Scale Optical Networks Λ Yufeng Xin, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University, Raleigh NC 27695 E-mail: fyxin,rouskas,hpg@eos.ncsu.edu

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information

Techniques and Protocols for Improving Network Availability

Techniques and Protocols for Improving Network Availability Techniques and Protocols for Improving Network Availability Don Troshynski dtroshynski@avici.com February 26th, 2004 Outline of Talk The Problem Common Convergence Solutions An Advanced Solution: RAPID

More information

Advanced Telecommunications

Advanced Telecommunications ternet Routing - MPLS By Richard Harris MPLS Presentation line troduction Problems of ternet size Methods for overcoming potential problems What is MPLS? Overview MPLS terminology MPLS Architecture The

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation

David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation Survivable Network Design David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh Telcom 2110 Slides 12 Motivation Communications networks need to be survivable? Communication

More information

Bridging the Ring-Mesh Dichotomy with p-cycles:

Bridging the Ring-Mesh Dichotomy with p-cycles: Bridging the Ring-Mesh Dichotomy with p-cycles: Ring-like speed with mesh-like capacity Wayne D. Grover, Demetrios Stamatelakis TRLabs, University of Alberta, Edmonton, Alberta, Canada DRCN 2000 April

More information

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering

More information

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

ECE442 Communications Lecture 4. Optical Networks

ECE442 Communications Lecture 4. Optical Networks ECE442 Communications Lecture 4. Optical Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Network Elements 1 WDM networks provide circuit switched end-to-end optical

More information

Improving the usage of Network Resources using MPLS Traffic Engineering (TE)

Improving the usage of Network Resources using MPLS Traffic Engineering (TE) International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Improving

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576

More information

A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism

A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism Akiko Okamura, Koji Nakamichi, Hitoshi Yamada and Akira Chugo Fujitsu Laboratories Ltd. 4-1-1, Kamikodanaka, Nakahara, Kawasaki,

More information

IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004

IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004 IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks Dr. Greg M. Bernstein Grotto Networking Page - 1 Problem Scope Bandwidth on Demand Medium to high speed bandwidth demands

More information

Simple Layout Algorithms To Maintain Network Connectivity Under Faults

Simple Layout Algorithms To Maintain Network Connectivity Under Faults Simple Layout Algorithms To Maintain Network Connectivity Under Faults Galen H. Sasaki 1 Department of Electrical, University of Hawaii 2540 Dole Street, Honolulu, HI 96822 USA Ching-Fong Su and David

More information

P Cycles: Design and Applications

P Cycles: Design and Applications P Cycles: Design and Applications -Aman Nijhawan Abstract Survivability is becoming an increasingly important goal in network design. An important aspect of network design today is designing networks with

More information

Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications

Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications 2566 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 12, DECEMBER 2000 Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications Koushik Kar,

More information

MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino)

MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino) MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino) http://staff.polito.it/mario.baldi MPLS - 1 From MPLS Forum Documents MPLS is the enabling technology

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY 2010 67 1+NNetwork Protection for Mesh Networks: Network Coding-Based Protection Using p-cycles Ahmed E. Kamal, Senior Member, IEEE Abstract

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Core Networks Evolution

Core Networks Evolution Core Networks Evolution Prof. Daniel Kofman daniel.kofman@enst.fr Telecom Paris - ENST Content Any Service, Any Time, Everywhere, Everyone Towards the triple play and beyond Main trends in Core Networks

More information

Internet Routing - MPLS. By Richard Harris

Internet Routing - MPLS. By Richard Harris Internet Routing - MPLS By Richard Harris MPLS Presentation Outline Introduction Problems of Internet size Methods for overcoming potential problems What is MPLS? Overview MPLS terminology MPLS Architecture

More information

Optimising OSPF Routing for Link Failure Scenarios

Optimising OSPF Routing for Link Failure Scenarios Optimising OSPF Routing for Link Failure Scenarios Sadiq M. Sait, Mohammed H. Sqalli, Syed Asadullah Computer Engineering Department King Fahd University of Petroleum & Minerals Dhahran 31261, Saudi Arabia

More information

Progress Report No. 13. P-Cycles and Quality of Recovery

Progress Report No. 13. P-Cycles and Quality of Recovery NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 13 P-Cycles and Quality of Recovery The University of Canterbury Team 12 April 2006 Abstract Since the p-cycle resilience

More information

Trafffic Engineering 2015/16 1

Trafffic Engineering 2015/16 1 Traffic Engineering 2015/2016 Traffic Engineering: from ATM to MPLS fernando.silva@tecnico.ulisboa.pt Instituto Superior Técnico Trafffic Engineering 2015/16 1 Outline Traffic Engineering revisited Traffic

More information

Network Control and Signalling

Network Control and Signalling Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches

More information

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),

More information

On Optimal Traffic Grooming in WDM Rings

On Optimal Traffic Grooming in WDM Rings 110 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 On Optimal Traffic Grooming in WDM Rings Rudra Dutta, Student Member, IEEE, and George N. Rouskas, Senior Member, IEEE

More information

MPLS Networks: Design and Routing Functions

MPLS Networks: Design and Routing Functions MPLS Networks: Design and Routing Functions Course Description This course provides an understanding of how MPLS works its advantages and limitations and how it can be deployed to provide effective services

More information

Converged Communication Networks

Converged Communication Networks Converged Communication Networks Dr. Associate Professor Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai - 400076 girishs@ee.iitb.ac.in Outline Convergence in core

More information

An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation

An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation Telecommunication Systems 19:3,4, 481 495, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation GAEIL

More information

University of Cape Town

University of Cape Town The copyright of this thesis vests in the author. No quotation from it or information derived from it is to be published without full acknowledgement of the source. The thesis is to be used for private

More information

THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS. Sangeeta Anand Vice President Product Management Cisco Systems.

THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS. Sangeeta Anand Vice President Product Management Cisco Systems. THE MPLS JOURNEY FROM CONNECTIVITY TO FULL SERVICE NETWORKS Sangeeta Anand Vice President Product Management Cisco Systems October 20, 2003 1 Agenda Introducing the Full Service Network The MPLS Journey

More information

A Comparative Study on Protection Methods in MPLS-TP Networks

A Comparative Study on Protection Methods in MPLS-TP Networks A Comparative Study on Protection Methods in MPLS-TP Networks Jiji Soman 1, Devi Murali 2 Semester II, M.Tech Communication Engineering, Sree Buddha College of Engineering for Women, Elavumthitta, Pathanamthitta,

More information

Survivability Design for Multiple Link Failures in MPLS Networks with Bandwidth Guarantees to Minimize Spare Capacity Allocation

Survivability Design for Multiple Link Failures in MPLS Networks with Bandwidth Guarantees to Minimize Spare Capacity Allocation Survivability Design for Multiple Link Failures in MPLS Networks with Bandwidth Guarantees to Minimize Spare Capacity Allocation Deepa Srinivasan North Carolina State University dsriniv@unity.ncsu.edu

More information

Designing Multiprotocol Label Switching Networks

Designing Multiprotocol Label Switching Networks TOPICS IN INTERNET TECHNOLOGY Designing Multiprotocol Label Switching Networks Jeremy Lawrence, Cisco Systems 1 s are also known as label edge routers. Most commercially available LSRs have at least limited

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

MPLS Traffic Engineering Traffic Protection using Fast Re-route (FRR)

MPLS Traffic Engineering Traffic Protection using Fast Re-route (FRR) MPLS Traffic Engineering Traffic Protection using Fast Re-route (FRR) Santiago Álvarez August 2008 2007 Cisco Systems, Inc. All rights reserved. 1 MPLS TE Use Cases Strategic Bandwidth Optimization Tactical

More information

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Call Admission Control: QoS Issue for VoIP

Call Admission Control: QoS Issue for VoIP Call Admission Control: QoS Issue for VoIP Mohammad Asadul Hoque Database Administrator, IT Division TM International Bangladesh Limited (AKTEL) Dhaka, Bangladesh asad1752@ieee.org Farhana Afroz Department

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

Features, Inputs/outputs for most frequent tools: Exel, PLANITU

Features, Inputs/outputs for most frequent tools: Exel, PLANITU ITU / BDT- COE workshop Nairobi, Kenya, 7 11 October 2002 Network Planning Lecture NP-5.2 Features, Inputs/outputs for most frequent tools: Exel, PLANITU ITU COE Network Planning Workshop, Nairobi, Kenya,

More information

Information and Communication Networks. Communication

Information and Communication Networks. Communication Information Technology Communication Information and Communication Networks Integrating IP and : Delivering QoS in an IP Environment Multiservice Platforms G One infrastructure supporting voice, video

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E- mail: sj ko h @ pcc.c t ri.rc.k Abstract In this paper, we propose a simple

More information

FlexE Router Card. 5G Ready. HUAWEI 50GE Flex Ethernet Card. Introduction. About EANTC. Table of Contents

FlexE Router Card. 5G Ready. HUAWEI 50GE Flex Ethernet Card. Introduction. About EANTC. Table of Contents About EANTC EANTC (European Advanced Networking Test Center) is internationally recognized as one of the world's leading independent test centers for telecommunication technologies. Based in Berlin, the

More information

MPLS-TE Configuration Application

MPLS-TE Configuration Application CHAPTER 6 The contains the following tabs and subtabs: Global Tab, page 6-53 Labels Tab, page 6-54 Links Tab, page 6-55 General Subtab, page 6-56 Backup Tunnels Subtab, page 6-57 Tunnel Head Tab, page

More information

On Routing Performance of MENTOR Algorithm

On Routing Performance of MENTOR Algorithm 1769 On Routing Performance of MENTOR Algorithm KAIRAT JAROENRAT, PISIT CHARNKEITKONG Faculty of Information Technology Rangsit University 52/347 Muang-Ake, Phaholyothin Rd., Lak-Hok, Pathumtani, THAILAND

More information

سوي يچينگ و مسيريابي در شبكه

سوي يچينگ و مسيريابي در شبكه سوي يچينگ و مسيريابي در شبكه دكتر فرهاد فغاني استاديار دانشكده مهندسي برق قسمت ششم : Multi-Protocol Label Switching (MPLS) 1 One of the many ways of getting from A to B: BROADCAST: Go everywhere, stop

More information

Resilient IP Backbones. Debanjan Saha Tellium, Inc.

Resilient IP Backbones. Debanjan Saha Tellium, Inc. Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research

More information

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe

More information

LSP Setup Arrival Reordering Approach for MPLS-TE Routing

LSP Setup Arrival Reordering Approach for MPLS-TE Routing LSP Setup Arrival Reordering Approach for MPLS-TE Routing Imène Chaieb and Jean-Louis Le Roux France Telecom R&D, Lannion 37, France Email: {imene.chaieb, jeanlouis.leroux}@orange-ftgroup.com Bernard Cousin

More information

for Metropolitan Area Networks MPLS No. 106 Technology White Paper Abstract

for Metropolitan Area Networks MPLS No. 106 Technology White Paper Abstract No. 106 Technology White Paper Page: 1 of 7 MPLS for Metropolitan Area Networks Abstract The demand for bandwidth in Metropolitan Area Networks (MANs) and the increased availability of fiber has created

More information

THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS

THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS VOLUME: 9 NUMBER: 5 SPECIAL ISSUE THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS Martin MEDVECKY Department of Telecommunications, Faculty of Electrical Engineering and Information Technology,

More information

Simulation of Energy Efficiency in Virtual Topology

Simulation of Energy Efficiency in Virtual Topology Simulation of Energy Efficiency in Virtual Topology 1 Nanda Kumar. S, 2 Selva Ra. P Department. of Information Technology, SRM University, Chennai, India 1 nanda6488@gmail.com, 2 selvara.p@ktr.srmuniv.ac.in

More information

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label

More information

Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET

Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Suhail Ahmad Wajid Ali Hamdani Mohsin Hassan Magray ABSTRACT Over the last two decades, we have witnessed a rapid deployment of real-time applications

More information

MPLS/RSVP-TE-BASED FUTURE UMTS RADIO ACCESS NETWORK

MPLS/RSVP-TE-BASED FUTURE UMTS RADIO ACCESS NETWORK 12th GI/ITG CONFERENCE ON MEASURING, MODELLING AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS 3rd POLISH-GERMAN TELETRAFFIC SYMPOSIUM MPLS/RSVP-TE-BASED FUTURE UMTS RADIO ACCESS NETWORK René Böringer*,

More information

End-To-End Signaling and Routing for Optical IP Networks

End-To-End Signaling and Routing for Optical IP Networks End-To-End Signaling and Routing for Optical IP Networks Mark Joseph Francisco, Lambros Pezoulas, Changcheng Huang, Ioannis Lambadaris Carleton University Department of Systems and Computer Engineering

More information

Modeling MPLS Networks

Modeling MPLS Networks Course 34350:Broad B and Netw orks. M andatory Lab Report. Modeling MPLS Networks Martin Nord (studienr 020725 PHD) Accronyms ATM - Asynchronous Transfer Mode FEC - Forward Equivalency Class FR - Frame

More information

Multiprotocol Label Switching (MPLS) on Cisco Routers

Multiprotocol Label Switching (MPLS) on Cisco Routers Multiprotocol Label Switching (MPLS) on Cisco Routers Feature History Release 11.1CT 12.1(3)T 12.1(5)T 12.0(14)ST 12.0(21)ST 12.0(22)S Modification The document introduced MPLS and was titled Tag Switching

More information

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Jeong-Mi Kim 1, Oh-Han Kang 2, Jae-Il Jung 3, and Sung-Un Kim 1,4 1 Pukyong National University, 599-1 Daeyeon 3-Dong Nam-Gu, Busan,

More information

Survivability with P-Cycle in WDM Networks

Survivability with P-Cycle in WDM Networks Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network

More information

Hierarchical Traffic Grooming Formulations

Hierarchical Traffic Grooming Formulations Hierarchical Traffic Grooming Formulations Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh, NC 27695-8206 USA Abstract Hierarchical

More information

A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects

A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER 2003 1081 A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects Xiaojun Cao, Student Member, IEEE,

More information

198 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005

198 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 198 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 Approximating Optimal Spare Capacity Allocation by Successive Survivable Routing Yu Liu, Member, IEEE, David Tipper, Senior Member,

More information

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications

More information

LDP Fast Reroute using LDP Downstream On Demand. 1. Problem: 2. Summary: 3. Description:

LDP Fast Reroute using LDP Downstream On Demand. 1. Problem: 2. Summary: 3. Description: LDP Fast Reroute using LDP Downstream On Demand 1. Problem: LDP is a widely used label distribution protocol used for building end-to-end IP/MPLS LSPs across provider network. Many times critical IP applications

More information

6 MPLS Model User Guide

6 MPLS Model User Guide 6 MPLS Model User Guide Multi-Protocol Label Switching (MPLS) is a multi-layer switching technology that uses labels to determine how packets are forwarded through a network. The first part of this document

More information

Backup segments. Path after failure recovery. Fault. Primary channel. Initial path D1 D2. Primary channel 1. Backup channel 1.

Backup segments. Path after failure recovery. Fault. Primary channel. Initial path D1 D2. Primary channel 1. Backup channel 1. A Segmented Backup Scheme for Dependable Real Time Communication in Multihop Networks Gummadi P. Krishna M. Jnana Pradeep and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Institute

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Video Streaming Over the Internet

Video Streaming Over the Internet Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality

More information

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction Areas for Discussion Packet Switching - Asynchronous Transfer Mode 3.3 Cell Switching (ATM) Introduction Cells Joseph Spring School of Computer Science BSc - Computer Network Protocols & Arch s Based on

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Introduction to Segment Routing

Introduction to Segment Routing Segment Routing (SR) is a flexible, scalable way of doing source routing. Overview of Segment Routing, page 1 How Segment Routing Works, page 2 Examples for Segment Routing, page 3 Benefits of Segment

More information

A Flow Label Based QoS Scheme for End-to-End Mobile Services

A Flow Label Based QoS Scheme for End-to-End Mobile Services A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract

More information

Efficient Distributed Restoration Path Selection for Shared Mesh Restoration

Efficient Distributed Restoration Path Selection for Shared Mesh Restoration IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 5, OCTOBER 2003 761 Efficient Distributed Restoration Path Selection for Shared Mesh Restoration Guangzhi Li, Member, IEEE, Dongmei Wang, Member, IEEE,

More information

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS Nizar Bouabdallah^'^, Emannuel Dotaro^ and Guy Pujolle^ ^Alcatel Research & Innovation, Route de Nozay, F-91460 Marcoussis, France

More information

MPLS/Tag Switching. Background. Chapter Goals CHAPTER

MPLS/Tag Switching. Background. Chapter Goals CHAPTER 28 CHAPTER Chapter Goals Understand the advantages of MPLS. Learn the components of an MPLS system. Compare and contrast MPLS and hop-by-hop routing. Describe the two methods of label distribution. Explain

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information