Survivability Design for Multiple Link Failures in MPLS Networks with Bandwidth Guarantees to Minimize Spare Capacity Allocation
|
|
- Hillary Walters
- 5 years ago
- Views:
Transcription
1 Survivability Design for Multiple Link Failures in MPLS Networks with Bandwidth Guarantees to Minimize Spare Capacity Allocation Deepa Srinivasan North Carolina State University (Advisor: Dr. Rudra Dutta) Abstract Survivability is an important design consideration for high-speed backbone networks and gains even more significance in the context of delay-sensitive applications that require bandwidth guarantees. Spare capacity allocation is a primary component of survivability design. Extensive research has been done to address the problem of a single link failure in such networks and several algorithms exist in current literature. However, these algorithms do not address the problem of simultaneous multiple link failures in such networks. This paper provides a formal definition for the multiple link failure problem, explores various approaches to handling multiple link failure and presents an algorithm to solve a sub-problem: i.e. to determine which multiple link failures the survivability design needs to handle. 1. Introduction Multiprotocol Label Switching (MPLS) networks [1] have several advantages over conventional IP networks for use in high-speed Internet backbones. The primary function in MPLS is to perform flow-aggregation when there is a large amount of traffic between the same source and destination in the network, such flows are grouped and assigned a label. Label Switch Routers (LSRs) in the network route the packets based on this label rather than by examining each individual packet s header, thus enabling high-speed routing and also providing the ability to guarantee bandwidth. Emerging commercially important applications that are delay-sensitive, such as Voice over IP (VoIP), audio/video streaming, Virtual Leased lines etc., necessitate the requirement that there are end-end protection planning mechanisms in the network. Furthermore, the restoration time in case of failures in the network should be within an acceptable limit such that the end-end quality of service is not affected. With optical network technology being deployed in backbones, such mechanisms gain even more significance since, in the absence of backup mechanisms, a single or multiple failures in the network will lead to disruption of service to a large number of users. Thus, survivability is an important characteristic and design consideration for high-speed Internet backbone networks, which provide users with Service Level Agreement (SLA) guarantees. Aggregated flows in MPLS networks are called traffic trunks and are routed through specific Label Switch Paths (LSPs). This is illustrated in Figure 1 (from [2]). Typically, such LSPs are used for big trunks in backbone networks. Label Edge Routers (LERs) handle the entrance and exit of all traffic to and from the MPLS network, i.e. they are responsible for assigning and removing labels to aggregated flows. Label Edge Router (LER) Label Switch Router (LSR) Label Switch Router (LSR) Label Switch Path Label Edge Router (LER) Figure 1. Label Switch Path (from [2]) In optical networks, a light path corresponds to a LSP. Since LSPs typically represent big trunks in the backbone networks, that require bandwidth guarantees, a backup path is also setup when the LSP is initially setup. The
2 backup path is used to route traffic in case there is a failure on the original path. The basic approach to setting up the backup is: whenever an LSP is setup, a similar path with equivalent bandwidth is also reserved solely for the LSP being setup that is guaranteed to be available in case of failure on the primary path. This backup path is reserved from the spare capacity that is available in the network. However, consider the case where two LSPs in the network are independent i.e. do not share any common network elements. In this case, a single path can be setup that is reserved as the backup for both these LSPs, thus reducing the spare capacity that is allocated in the network. This problem of minimizing spare capacity allocation (SCA) is significant in protection planning algorithms design. [7] presents a survey of existing approaches and algorithms for SCA using MPLS-related techniques and presents in detail some of these ([3], [4], [5], [6]). Networks that require restoration time guarantees are considered in this context and [7] also explores existing algorithms that handle this. While extensive research has been done and several algorithms/approaches exist in current literature to address the problem of single link failures within the context of SCA, there has not been much work done in the same area to address the case where multiple links in a network fail simultaneously. Depending on the failure probabilities of individual links in a network, a multiple link failure probability may exist in the network that violates the guaranteed SLA of the network. In such cases, survivability design and SCA for the network need to handle the occurrence of multiple link failures. Also, if the network does not address the probable multiple link failures, this also introduces the problem of possible contention for shared backup paths. We briefly discuss the concept of Shared Risk Groups (SRGs) [3] now. When two or more paths share a common network element (e.g. a node or link) of failure, they belong to the same SRG. SRGs are defined based on the physical relation of nodes or links. For example, links that belong physically to a single conduit belong to a single SRG because if that conduit gets damaged, then all the links in that conduit are likely to get damaged. It is a well-known idea that paths that contain links that belong to the same SRG should not share the same backup path. A more detailed explanation of this concept is given in [3]. Thus, SRGs provide a limited mechanism for protecting against multiple link failures. However, SRGs do not include the case where two links that do not belong to a single physical element fail simultaneously. Some prior work exists to address multiple link failures in a limited fashion. [8] defines multiple link failures (in the context of its work) as that which occurs when a conduit that accommodates two or more links has been cut. Specifically, it considers the case where two failed links connected to one node fail simultaneously. Similarly, [9] addresses the case of any two links failing simultaneously in a network by allocating two backup paths for every working path. However, these approaches cannot be generalized for more than two simultaneous link failures as it would lead to an explosion in the amount of spare capacity required. This goes against the goal of SCA which is to minimize the spare capacity required. This paper focuses on the generic problem of multiple link failure problem, presents a formal definition for the problem, presents an interesting sub-problem and presents three different algorithms to address the sub-problem. It also lists future work items to be completed to address the overall problem of multiple link failures. For the purpose of this paper, we define multiple link failures as the failure of any two or more links, that do not necessarily belong to the same SRG, that occur simultaneously. We define the term simultaneously as the two or more failures occurring before the network has recovered from the previous failures i.e. the backup path for one failure is still being used when another failure occurs. Also, for purposes of this paper, we assume that the given link failure probabilities are independent. The rest of this paper is organized as follows. Section 2 presents a detailed problem definition for SCA in the context of multiple link failures and the sub-problem of determining the set of multiple link failures to be handled. Three different algorithms are presented and analyzed in Section 3. Section 4 lists the future work items that need to be completed to address the overall problem of multiple link failures. 2. Problem Definition This section first presents a formal definition for the problem of multiple link failures in SCA/survivability design. It then presents a formal definition of the subproblem of determining the set of multiple link failures that the algorithm needs to handle. Various SCA terminology and concepts are defined in Table 1. We slightly modify the problem definition previously presented (in [5] and [7]) as follows, to address the multiple link failure scenario in the network. The SCA problem can be formulated as an Integer Linear Programming problem as below (from [4]). Assume the following notation: The network is formulated as (N, L) N: Set of nodes. L: Set of directional links. D: Set of flows. M: is the set of identified simultaneous multiple link failures that need to be handled. M is of the form { (l a, l b, l c..l n ), (l x,l y l z ) } where each element represents a
3 multiple link failure scenario and each la, lb, is an element of L. n = N is number of nodes in the network. l = L is number of links in the network. m r : Traffic demand of flow r, r in D. w l : unit cost of bandwidth along link l. s l : spare capacity required along link l. x r,p : binary decision variable which is 1 if flow r uses p for backup. y r,p l : binary decision variable which is 1 if path p uses link l. P r : candidate set of loop-free backup paths that are linkdisjointed from a given working path. D f : set of flows affected by a multiple-link failure F, where F is an element of M. Term Failure scenario Linkoriented vs. pathoriented schemes Survivability level Network redundancy Failure dependency Table 1. SCA Terminology Description Represents all the simultaneously failed network devices or components. Restoration schemes can either handle restoration for individual links or for the entire end-end working path. Also related to this is the concept of path-oriented vs. spanoriented schemes for choosing the spare capacity to be allocated. The percentage of restorable network traffic upon a failure. The ratio of total spare capacity over total working capacity. In the naïve case, this is 1. The goal of protection planning algorithms is to minimize this ratio. In failure-dependent mechanisms, a different backup path can be chosen for different failures on a single working path. In failure-independent mechanism, only one backup path exists for a given working path and that path is always used irrespective of the failure in the working path. The latter requires a backup path that is link-disjoint from the working path. The objective of SCA is to minimize the total cost of spare capacity in the network this is given in equation (1). w l.s l min (1) s l, x r,p l in L This objective is subject to two constraints. Constraint (2) ensures that only one link-disjoint backup path is chosen for each flow, i.e. considering all candidate backup paths for flow r, the sum of all x r,p is 1. Since x r,p is a binary decision variable, this means exactly one instance is true and all others all false. p in P r x r,p = 1 V r in D (2) ( m s l >= r y r,p l.x r,p ) (3) r in D F p in P r V l in L, F c L, l not in F The second constraint is given in (3). It ensures that the spare capacity allocated for each link is the maximum bandwidth required under a previously identified simultaneous multiple link failure scenario. An interesting sub-problem arises which is the procedure for determining which multiple link failures the SCA algorithm must handle. Given a network topology and the flows in the network, it may be prohibitive in terms of network resources to be able to handle every combination of multiple link failures. Hence, we consider a new parameter that comes into play here the SLA guarantee provided by the network to its customers. This can be specified in terms of minimum percentage up-time for example, 80% or 99.99%. Depending on this, we can calculate the maximum failure probability in the network, that can be tolerated to meet the SLA. This probability is calculated as the reciprocal of the percentage up-time (given by SLA min ) - i.e. P max = 1/SLA min. For example, in case of 80% SLA guarantee up-time, P max is ; in case of 99.99% SLA guaranteed up-time, P max is Thus, the higher the SLA guarantee, the lower the maximum failure probability that can be tolerated in the network. We define the sub-problem as follows: Input: the network (N,L, F, SLA min ) where N is the set of nodes and L is the set of links, F is the set of failure probabilities for links in L, SLA min for the network. Output: the set M, each element of which is a set of links belonging to L which have a combined probability > P max for the network - i.e. each element in M represents a multiple link failure scenario that needs to be addressed by the SCA algorithm. The set M is of the form { (l a, l b, l c..l n ), (l x,l y l z ) } where each element represents a multiple link failure scenario and each la, lb, are elements of L. Solving this sub-problem is a significant step towards solving the overall problem of addressing multiple-link failures in a network. Since this sub-problem will output the network-specific set of multiple link failures,
4 dependent on the guaranteed SLA, the SCA algorithm will only need to address those specific failures and not all 3-link or all 4-link or all n-link failures which can be prohibitively expensive in terms of resources required. 3. Algorithms This section presents three different algorithms, each improving on the previous one in terms of computational complexity. Since failure probabilities of individual links are considered to be independent, the probability of multiple links failing simultaneously is given by calculating the product of the individual probabilities Algorithm 1 This section presents the straightforward naïve algorithm (ALGO1) to find the set M. Basically, it generates the P(F) the power set of F and computes the product (of failure probabilities) for each subset of P(F). 1. M ( the maximum number of simultaneous link failures) and M (the set of specific multiple link failures that need to be handled) are the outputs. 2. Let k range from 1 to l. 3. For each k, repeat the steps 4 to Generate the combinatorial set C which contains elements f F grouped together in k-member groups. Then C = lc k. For example, when k = 2, C is the set { (f 1, f 2 ), (f 1, f 3 ).. (f 1,f l ), (f 2, f 3 ), (f 2, f 4 ).. (f 2, f l ),... (f l-1, f l ) } In general, C = { (f i1, f i2.. f ik ) i 1 i 2 i 3 i k } V f i F Let each element in C be represented by c j. 5. Let j range from 1 to lc k. For each j, repeat steps 6 & For each cj = (f 1, f 2.. f k ), find its product P cj = f 1 x f 2 x x f k. This gives the probability of the links in set cj failing simultaneously. 7. If P cj > P max, then: o add c j to set M. M = M U {cj} o assign true -> max_hit 8. End of j loop. 9. If max_hit is false, then exit k loop. 10. End of k loop. 11. Output M and M. Figure 2. Naïve algorithm (ALGO1) It then compares this to the P max value of the network to build the set M. The algorithm is listed in Figure 2. The drawback for this naïve approach is that the space and time complexity for this algorithm is O(2 l ), or it requires exponential time and space. One optimization that could be done is as follows: When, for some value of i, there are no combinations of failures found such that its product is > P max, exit the k-loop. However, this still has worst-case complexity of O(2 l ) Algorithm 2 This algorithm is more sophisticated and intelligent than the one presented in 3.1 in terms of using the property of failure probabilities being < 1. If a set of link failure probabilities is less than P max, then multiplying it by any other link s failure probability will produce a value that is less than P max. 1. M (the set of specific multiple link failures that need to be handled) and M (the maximum number of simultaneous link failures) are output variables. 2. Assign F -> R. 3. Divide R into 2 subsets R1 and R2 such that elements in R1 are >= Pmax. Discard elements in R2 from R. i.e. R = R R2 or R = R1. 4. Empty R1 and R2. 5. Copy R into G. 6. Let k range from 2 to l. 7. For each k, repeat the steps 5 to R is a set with elements of the form (x1, x2 xk), i.e. the number of elements in this is k. 9. Let j range from 1 to R. 10. For each j, repeat steps 10 to 11. Let i range from 1 to G. 12. Take the element rj in R, gi in G, such that ri gi, form the set (x1, x2, xk, gi). If x1.x2 xk.gi >= Pmax, add it to R1. (Note: remember the previous product, so the entire product doesn t have to be computed everytime) 13. End of i-loop. 14. If R1 is empty, go to step End of j loop. 16. Add R1 to M. Assign R1 to R. 17. End of k-loop. 18. Output M and M. Figure 3. Algorithm 2 (ALGO2) Hence, once we have determined that a set of links do not need to be protected against, any superset of such
5 links also need not be protected. Figure 2 presents this algorithm (ALGO2). While this algorithm performs better than ALGO1 in the average case, its worst case performance is still O(2 l ) Algorithm 3 This algorithm builds on the idea presented in 3.2 using the fact that failure probabilities are less than Procedure Generate_Nodes (start: used for recursion, n: Number of elements in set, k: number of elements taken at one time, maxk: used for recursion, Input links set ). 2. If k > maxk, return ret_set. 3. For i = start to n 4. ret_set = ret_set U Generate_Nodes(i+1, n, k+1, maxk, set) 5. End of i-loop 6. End Procedure Generate_Nodes Procedure Check_Nodes (Upper end height u, Lower End height e, Height mid_row, Root node). 9. Nodes = Generate_Nodes( node, mid_row, node) 10. For i = 1 to lcmid_row, repeat steps Calculate H(node mid_row,i ). If node mid_row,i is marked, go to step Calculate combined failure probability pi of nodei. 13. If pi > Pmax, Mark H(node mid_row,i ) = vulnerable ; add node mid_row,i to M; tmp = mid_row; mid_row = (u+ i/2)/2; u = tmp. 14. If pi <=Pmax, Mark H(node mid_row,i ) = invulnerable ; tmp = mid_row; mid_row = (e + i/2)/2; e = tmp. 15. Call Check_Nodes(u, e, mid_row, mid_row, node mid_row,i ) 16. End of i-loop 17. End Procedure Check_Nodes Procedure Main 20. Call Check_Nodes(l, 1, l/2, L) 21. Output M and M. 22. End Procedure Main Figure 4. Algorithm 3 (ALGO3) i.e. Accordingly, we define the following terms: Vulnerable subset - a subset of links belonging to L is termed as vulnerable if the product of the failure probabilities of its individual links > Pmax; Invulnerable subset - a subset of links belonging to L is termed as invulnerable if the product of the failure probabilities of its individual links <= Pmax. It then follows that: all supersets of an invulnerable set are also invulnerable; all subsets of a vulnerable set are also vulnerable. Algorithm 3 (ALGO3) works on this basic observation. The algorithm is listed in Figure 4. It follows a dynamic programming [10] approach where the powerset P(L) is not generated up-front, but portions of it are methodically and selectively generated to determine the vulnerable subsets at each step that are incrementally added to set M. The algorithm works by processing selected nodes in a digraph where each node represents a subset of L. If a node at a given height in the digraph is found to be vulnerable, it is marked and added to the set M and all its progeny are ignored since they are also vulnerable. Then, the node s ancestors are examined by starting with the nodes in the middle row of its ancestry graph. A similar process is followed if the node is found invulnerable and its progeny nodes are examined. Thus at each step, half of the ancestor or progeny nodes are marked or ignored and only the other half is examined further. This is done recursively until a node that is already marked is encountered. When a node is marked as either vulnerable or invulnerable, a unique hash value is calculated for that node (by taking the individual link numbers represented in that node) and the decision is recorded in a hash table. Next time this node is encountered by the algorithm, the hash value is first calculated and the table is looked up to see if this node is already marked, indicating that its ancestor and progeny trees have been marked. If so, the algorithm does not further examine this node and moves on to the next node at the same height, thus optimizing the algorithm. H(node) in Figure 4 represents the hash value for node. As an optimization, subsets of vulnerable sets are not generated. If the multiple-link failure represented by a vulnerable subset is protected by the SCA algorithm, then the multiple-link failures represented by every subset of that vulnerable set are also protected. To better explain the algorithm, we use a digraph for illustration as shown in Figure 5. (The entire digraph is not generated upfront). The height of this digraph is l. At each level i (representing the height of a node), the nodes are generated by taking l elements i at a time i.e. the lc i. Bi-directed edges connect a node at level i to its subsets at height i-1 and to its supersets at height i+1. Hence, the following are true: At height i, the number of nodes = lc i. For a node at height i, the number of child nodes = i. For a node at height i, the number of parent nodes = l i. For a node at height i, the number of ancestor nodes = (l-i)c1 + (l-i)c2 + + (l-i)cl-i = 2 (l-i) - 1.
6 (i = 7) (i = 6) (i = 5) (i = 4) For a node at height i, the number of progeny nodes = ic(i-1) + ic(i-2) +. ic1 = 2 i Figure 4. Example (partial) digraph to illustrate ALGO3 The algorithm then works as follows. Taking the example of l = 7, we calculate mid_row =(7+1)/2 = 4. Hence, we first generate the 7C 4 = 35 nodes at height 4 in the digraph. For each of these 35 nodes, we repeat the loop shown in Figure. Taking the example of the first node at this height = ( ), we calculate its product of failure probabilities. If this is greater than Pmax, this node is marked Vulnerable. Assuming that this node is vulnerable, we ignore its progeny nodes from further examination since they are known to be vulnerable. We add the set ( ) to M and then start examining its ancestor tree. We calculate the next mid_row = ( )/2 = 6. Now, we generate the (l - i)c6 nodes at height 6 in the digraph that are. And for each node, we repeat the loop in Figure. Take the first node at height 6 ( ) and calculate its product of failure probabilities. If this is <= Pmax, this node is marked Invulnerable. Assuming that this node is invulnerable, we ignore its ancestors from further examination since they are known to be invulnerable. We then start examining its progeny tree by calculating mid_row = (6+4)/2 = 5 and generating the nodes at height 5 that are progeny of node ( ) Depending on whether this is vulnerable or invulnerable, we calculate the next mid_row = (6 + 5)/2. However, since this row has already been examined, we exit from the loop for this node and go on to the next node at height 4. Thus, at each jump, we either eliminate 2(l-i) or 2i nodes. 4. Future work This section lists the work items that need to be completed in order to address the overall problem of addressing multiple link failures in a network. First, the algorithm (ALGO3) presented in section 3.3 needs to be thoroughly tested (possibly by implementing) and its computational complexity needs to be precisely defined. The work that we have done so far suggests that the algorithm has a polylogarithmic time complexity. However, it needs to be analyzed in detail to accurately define this. Also, M may contain sets of links that are subsets of other sets in M. In such cases, the subsets can be coalesced into the larger supersets since protecting against multiple link failures represented by the superset will automatically protect against those represented by the subset. ALGO3 needs to be extended for this. Then, an existing algorithm needs to be found that is suitable for modification to address specific multiple link failures and the modifications need to be implemented. If such an algorithm cannot be found, a new algorithm that addresses specific multiple link failures needs to be formulated. Finally, the computational complexity of the resultant algorithm needs to be determined and if needed, further optimizations should be done. 5. Conclusion Spare Capacity Allocation is an important component of survivability design in networks. Survivability is especially significant in high-speed backbone networks employing MPLS technology which offer bandwidthguaranteed traffic. This paper has presented a brief survey of some existing approaches in current literature. It has then described open problems related to SCA and survivability and where possible, listed some possible solution approaches. 6. References [1] The MPLS Resource Center, [2] MPLS Beginner s Guide, [3] P.-H. Ho and H.T. Mouftah, A Framework for Service-Guaranteed Shared Protection in WDM Mesh Networks, IEEE Communication Magazine, February 2002, pp
7 [4] Y.Liu, D.Tipper, and P. Siripongwutikorn, Approximating optimal spare capacity allocation by successive survivable routing, Proceedings of IEEE INFOCOM, April 2001, pp [5] P.-H. Ho and H. T. Mouftah, "Reconfiguration of Spare Capacity for MPLS-Based Recovery in the Internet Backbone Networks", IEEE/ACM Transactions on Networking, February 2004, pp [6] M. Kodialam and T. Lakshman, "Dynamic Routing of Bandwidth Guaranteed Tunnels with Restoration", Proceedings of IEEE INFOCOM, April 2000, pp [7] D. Srinivasan, Design of Protection Planning Algorithms in MPLS Networks with Bandwidth Guarantees to Minimize Spare Capacity Allocation, North Carolina State University, [8] K. Miyazaki, T. Chujo, H. Komine, T. Ogura, Spare Capacity Assignment for Multiple-Link Failures, Proceedings of International Workshop on Advanced Communications and Applications for High Speed Networks, March 1992, pp [9] B. G. Jozsa, D. Orincsay and A. Kern, Surviving Multiple Network Failures Using Shared Backup Path Protection, Proceedings of IEEE International Symposium on Computers and Communications, June 2003, pp [10] T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein, Introduction to Algorithms, 2 nd Edition, Published by MIT Press, 2001, ISBN
8 This document was created with Win2PDF available at The unregistered version of Win2PDF is for evaluation or non-commercial use only.
Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection
Spare Capacity Allocation Using Partially Disjoint Paths for Dual Link Failure Protection Victor Yu Liu Network Advanced Research, Huawei Technologies Santa Clara, California, USA yuliu@ieee.org Abstract
More informationNetwork Protection Design for MPLS Networks
Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science
More informationNetwork Topology Control and Routing under Interface Constraints by Link Evaluation
Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu
More informationDynamic Routing of Restorable Bandwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 3, JUNE 2003 399 Dynamic Routing of Restorable Bwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information Murali Kodialam, Associate
More informationOutline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006
EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering
More informationA Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks
A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland
More informationA Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT
More informationProgress Report No. 15. Shared Segments Protection
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury
More informationAn Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation
Telecommunication Systems 19:3,4, 481 495, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation GAEIL
More informationAhmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54
MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering
More informationDiversity Coded 5G Fronthaul Wireless Networks
IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University
More informationEvaluation of Performance for Optimized Routing in MPLS Network
Evaluation of Performance for Optimized Routing in MPLS Network Neethu T U Student,Dept. of Electronics and Communication The Oxford College of Engineering Bangalore, India Reema Sharma Assistant Professor,Dept.of
More informationTree-Based Minimization of TCAM Entries for Packet Classification
Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.
More information254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007
254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe
More informationDYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS *
DYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS * Murari Sridharan, R. Srinivasan and Arun K. Somani Dependable Computing & Networking Laboratory Department of Electrical and
More informationNetwork Survivability
Network Survivability Bernard Cousin Outline Introduction to Network Survivability Types of Network Failures Reliability Requirements and Schemes Principles of Network Recovery Performance of Recovery
More informationHeuristic Algorithms for Multiconstrained Quality-of-Service Routing
244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service
More informationUNIT- 2 Physical Layer and Overview of PL Switching
UNIT- 2 Physical Layer and Overview of PL Switching 2.1 MULTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. Figure
More informationDavid Tipper Graduate Telecommunications and Networking Program University of Pittsburgh. Motivation
Survivable Network Design David Tipper Graduate Telecommunications and Networking Program University of Pittsburgh Telcom 2110 Slides 12 Motivation Communications networks need to be survivable? Communication
More informationNetwork Routing Protocol using Genetic Algorithms
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a
More informationBW Protection. 2002, Cisco Systems, Inc. All rights reserved.
BW Protection 2002, Cisco Systems, Inc. All rights reserved. 1 Cisco MPLS - Traffic Engineering for VPNs Amrit Hanspal Sr. Product Manager MPLS & QoS Internet Technologies Division 2 Agenda MPLS Fundamentals
More informationToward the joint design of electronic and optical layer protection
Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS
More information10 Optical Network Engineering
10 Optical Network Engineering George N. Rouskas Department of Computer Science North Carolina State University Raleigh, NC 27695-7534 Email: rouskas@csc.ncsu.edu 10.1 INTRODUCTION Over the last few years
More informationA Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks
A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,
More informationTrees. Chapter 6. strings. 3 Both position and Enumerator are similar in concept to C++ iterators, although the details are quite different.
Chapter 6 Trees In a hash table, the items are not stored in any particular order in the table. This is fine for implementing Sets and Maps, since for those abstract data types, the only thing that matters
More informationTopology basics. Constraints and measures. Butterfly networks.
EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April
More informationIEEE LANGUAGE REFERENCE MANUAL Std P1076a /D3
LANGUAGE REFERENCE MANUAL Std P1076a-1999 2000/D3 Clause 10 Scope and visibility The rules defining the scope of declarations and the rules defining which identifiers are visible at various points in the
More informationMultiprotocol Label Switching (MPLS) on Cisco Routers
Multiprotocol Label Switching (MPLS) on Cisco Routers Feature History Release 11.1CT 12.1(3)T 12.1(5)T 12.0(14)ST 12.0(21)ST 12.0(22)S Modification The document introduced MPLS and was titled Tag Switching
More informationSPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS
SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,
More informationDistributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks
Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry
More informationA Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing
A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,
More informationProtection Switching and Rerouting in MPLS
Protection Switching and Rerouting in MPLS S. Veni Dr.G.M.Kadhar Nawaz Research Scholar, Director, Dept. of MCA Bharathiar University Sona College of Technology Coimbatore, India Salem, India venii_k@yahoo.com
More informationOptical Communications and Networking 朱祖勍. Nov. 27, 2017
Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationIP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004
IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks Dr. Greg M. Bernstein Grotto Networking Page - 1 Problem Scope Bandwidth on Demand Medium to high speed bandwidth demands
More informationMinimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications
2566 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 12, DECEMBER 2000 Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications Koushik Kar,
More informationMaster s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems
Master s Thesis Title A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems Supervisor Professor Masayuki Murata Author Hideto Horiuchi February 14th, 2007 Department
More informationDYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS
DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043
More informationDIVERSION: A Trade-Off Between Link and Path Protection Strategies
DIVERSION: A Trade-Off Between Link and Path Protection Strategies Srinivasan Ramasubramanian and Avinash S. Harjani Department of Electrical and Computer Engineering University of Arizona, Tucson, AZ
More informationOPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 6, DECEMBER
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 6, DECEMBER 2004 1119 Loopback Recovery From Double-Link Failures in Optical Mesh Networks Hongsik Choi, Member, IEEE, Suresh Subramaniam, Member, IEEE,
More informationFault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee
DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical
More informationMulti-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures
Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona
More informationDynamic Routing of Bandwidth Guaranteed Tunnels with Restoration
Dynamic Routing of Bandwidth Guaranteed Tunnels with Restoration Murali Kodialam T. V. Lakshman Bell Laboratories Lucent Technologies 101 Crawfords Corner Road Holmdel, NJ 033, USA muralik, lakshman @bell-labs.com
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationFeatures, Inputs/outputs for most frequent tools: Exel, PLANITU
ITU / BDT- COE workshop Nairobi, Kenya, 7 11 October 2002 Network Planning Lecture NP-5.2 Features, Inputs/outputs for most frequent tools: Exel, PLANITU ITU COE Network Planning Workshop, Nairobi, Kenya,
More informationWhy Are You Still Using Shortest Path? - Path Selection Strategy Utilizing High-functional Nodes -
Why Are You Still Using Shortest Path? - Path Selection Strategy Utilizing High-functional Nodes - Taro HASHIMOTO, Katsunori YAMAOKA and Yoshinori SAKAI Tokyo Institute of Technology Live streaming media
More informationConfiguring CRS-1 Series Virtual Interfaces
Configuring CRS-1 Series Virtual Interfaces A virtual interface is defined as representing a logical packet switching entity within the Cisco CRS-1 Series router. Virtual Interfaces have a global scope
More informationLecture 8. Dynamic Programming
Lecture 8. Dynamic Programming T. H. Cormen, C. E. Leiserson and R. L. Rivest Introduction to Algorithms, 3rd Edition, MIT Press, 2009 Sungkyunkwan University Hyunseung Choo choo@skku.edu Copyright 2000-2018
More informationPerformance Evaluation of IPv4 and IPv6 over MPLS using OPNET
Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Suhail Ahmad Wajid Ali Hamdani Mohsin Hassan Magray ABSTRACT Over the last two decades, we have witnessed a rapid deployment of real-time applications
More information198 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005
198 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 Approximating Optimal Spare Capacity Allocation by Successive Survivable Routing Yu Liu, Member, IEEE, David Tipper, Senior Member,
More informationEfficient Bandwidth Guaranteed Restoration Algorithms for Multicast Connections
Efficient Bandwidth Guaranteed Restoration Algorithms for Multicast Connections William Lau 1,SanjayJha 1, and Suman Banerjee 2 1 University of New South Wales, Sydney, NSW 2052, Australia {wlau, sjha}@cse.unsw.edu.au
More informationTrees. Q: Why study trees? A: Many advance ADTs are implemented using tree-based data structures.
Trees Q: Why study trees? : Many advance DTs are implemented using tree-based data structures. Recursive Definition of (Rooted) Tree: Let T be a set with n 0 elements. (i) If n = 0, T is an empty tree,
More informationWavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks
Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute
More informationA Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications
More informationEfficient and Agile 1+N Protection
1 Efficient and Agile 1+N Protection Ahmed E. Kamal Osameh Al-Kofahi Abstract This paper introduces an efficient implementation of the network coding-based 1+N protection. The strategy provides proactive
More informationAlgorithm Analysis and Design
Algorithm Analysis and Design Dr. Truong Tuan Anh Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology VNU- Ho Chi Minh City 1 References [1] Cormen, T. H., Leiserson,
More informationof optimization problems. In this chapter, it is explained that what network design
CHAPTER 2 Network Design Network design is one of the most important and most frequently encountered classes of optimization problems. In this chapter, it is explained that what network design is? The
More informationComparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures
Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label
More informationAnalysis of Dynamic QoS Routing Algorithms for MPLS Networks
Analysis of Dynamic QoS Routing Algorithms for MPLS Networks Antonio Capone, Luigi Fratta, Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano Pzza L Da Vinci 32, 2133 Milano
More informationUNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING
1 UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING Syllabus: Physical layer and overview of PL Switching: Multiplexing: frequency division multiplexing, wave length division multiplexing, synchronous
More informationEvaluation MCDM Multi-disjoint Paths Selection Algorithms Using Fuzzy-Copeland Ranking Method
59 Evaluation MCDM Multi-disjoint Paths Selection Algorithms Using Fuzzy-Copeland Ranking Method Hamid Naderi 1, H.S.Shahhoseini 2 and A.H.Jafari 3 1 Elearning Center, Iran University of science and Technology,
More informationNetwork Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol
Network Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol Abdur Chowdhury 1,, Ophir Frieder 1, Paul Luse, Peng-Jun Wan 1 {abdur, wan, ophir}@cs.iit.edu, pluse@iitri.org
More informationImproving the usage of Network Resources using MPLS Traffic Engineering (TE)
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Improving
More informationCommunication Redundancy User s Manual
User s Manual Fifth Edition, June 2015 www.moxa.com/product 2015 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More informationRedundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)
Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet
More informationDefining QoS for Multiple Policy Levels
CHAPTER 13 In releases prior to Cisco IOS Release 12.0(22)S, you can specify QoS behavior at only one level. For example, to shape two outbound queues of an interface, you must configure each queue separately,
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Technical Report, April 2011 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu
More informationBacktracking. Chapter 5
1 Backtracking Chapter 5 2 Objectives Describe the backtrack programming technique Determine when the backtracking technique is an appropriate approach to solving a problem Define a state space tree for
More informationPreserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks
Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Hwajung Lee, Hongsik hoi, Suresh Subramaniam, and Hyeong-Ah hoi Department of omputer Science and Electrical and omputer
More informationTechniques and Protocols for Improving Network Availability
Techniques and Protocols for Improving Network Availability Don Troshynski dtroshynski@avici.com February 26th, 2004 Outline of Talk The Problem Common Convergence Solutions An Advanced Solution: RAPID
More informationModule 2: Classical Algorithm Design Techniques
Module 2: Classical Algorithm Design Techniques Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu Module
More informationResilient IP Backbones. Debanjan Saha Tellium, Inc.
Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research
More informationLecture 22 Tuesday, April 10
CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,
More information1. INTRODUCTION light tree First Generation Second Generation Third Generation
1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical
More informationMidterm Review. Congestion Mgt, CIDR addresses,tcp processing, TCP close. Routing. hierarchical networks. Routing with OSPF, IS-IS, BGP-4
Midterm Review Week 1 Congestion Mgt, CIDR addresses,tcp processing, TCP close Week 2 Routing. hierarchical networks Week 3 Routing with OSPF, IS-IS, BGP-4 Week 4 IBGP, Prefix lookup, Tries, Non-stop routers,
More information218 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006
218 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 14, NO 1, FEBRUARY 2006 Survivable Virtual Concatenation for Data Over SONET/SDH in Optical Transport Networks Canhui (Sam) Ou, Student Member, IEEE, Laxman
More informationReview on Fault Tolerance Strategies in MPLS Network
Review on Fault Tolerance Strategies in MPLS Network Ravi Yadav Mrs. Laxmi Prasanna Anil Vadhwa M.Tech. student in Shekawati Asst. Prof. in Shekawati Asst. Prof. in RPS College of Engineering Dundlod College
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationComputer Networks Technologies and Services January 31 st, Question 11
Computer Networks Technologies and Services January 31 st, 2014 First and last name... Student ID...... Answers to multiple choice questions 1 2 3 4 5 6 7 8 9 10 Answers to essay questions Question 11
More informationMaximum Density Still Life
The Hebrew University of Jerusalem Computer Science department Maximum Density Still Life Project in course AI 67842 Mohammad Moamen Table of Contents Problem description:... 3 Description:... 3 Objective
More informationThreshold-Based Policy for LSP and Lightpath Setup in GMPLS Networks
Threshold-Based Policy for LSP and Lightpath Setup in GMPLS Networks Tricha Anjali and Caterina Scoglio Broadband and Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia
More informationNETWORK ARCHITECTURE
GLOBAL MPLS NETWORK ARCHITECTURE The IP backbone is designed to service connectivity for IP and IP VPN services. The backbone network provides IP connectivity between Points of Presence (POPs). The design
More informationComputer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationThe LSP Protection/Restoration Mechanism in GMPLS. Ziying Chen
The LSP Protection/Restoration Mechanism in GMPLS by Ziying Chen The LSP Protection/Restoration Mechanism in GMPLS by Ziying Chen A graduation project submitted to the Faculty of Graduate and Postdoctoral
More information15.4 Longest common subsequence
15.4 Longest common subsequence Biological applications often need to compare the DNA of two (or more) different organisms A strand of DNA consists of a string of molecules called bases, where the possible
More informationIT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview
IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate
More informationCONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department
More informationConnectivity-aware Virtual Network Embedding
Connectivity-aware Virtual Network Embedding Nashid Shahriar, Reaz Ahmed, Shihabur R. Chowdhury, Md Mashrur Alam Khan, Raouf Boutaba Jeebak Mitra, Feng Zeng Outline Survivability in Virtual Network Embedding
More informationFUTURE communication networks are expected to support
1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,
More informationCategory: Standards Track. Cisco N. Sprecher. Nokia Siemens Networks. A. Fulignoli, Ed. Ericsson October 2011
Internet Engineering Task Force (IETF) Request for Comments: 6378 Category: Standards Track ISSN: 2070-1721 Y. Weingarten, Ed. Nokia Siemens Networks S. Bryant E. Osborne Cisco N. Sprecher Nokia Siemens
More informationValue Added Services (VAS) Traffic Forwarding
CHAPTER 12 Revised: June 27, 2011, Introduction This chapter provides an overview of VAS traffic forwarding, explaining what is it and how it works. It also explains the various procedures for configuring
More informationTraffic Grooming for Survivable WDM Networks Shared Protection
Traffic Grooming for Survivable WDM Networks Shared Protection Canhui (Sam) Ou, Keyao Zhu, Hui Zang, Laxman H. Sahasrabuddhe, and Biswanath Mukherjee Abstract This paper investigates the survivable trafficgrooming
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY /$ IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY 2010 67 1+NNetwork Protection for Mesh Networks: Network Coding-Based Protection Using p-cycles Ahmed E. Kamal, Senior Member, IEEE Abstract
More informationLecture 3. Recurrences / Heapsort
Lecture 3. Recurrences / Heapsort T. H. Cormen, C. E. Leiserson and R. L. Rivest Introduction to Algorithms, 3rd Edition, MIT Press, 2009 Sungkyunkwan University Hyunseung Choo choo@skku.edu Copyright
More informationEfficient Distributed Restoration Path Selection for Shared Mesh Restoration
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 5, OCTOBER 2003 761 Efficient Distributed Restoration Path Selection for Shared Mesh Restoration Guangzhi Li, Member, IEEE, Dongmei Wang, Member, IEEE,
More information1 The range query problem
CS268: Geometric Algorithms Handout #12 Design and Analysis Original Handout #12 Stanford University Thursday, 19 May 1994 Original Lecture #12: Thursday, May 19, 1994 Topics: Range Searching with Partition
More informationarxiv: v3 [cs.ds] 18 Apr 2011
A tight bound on the worst-case number of comparisons for Floyd s heap construction algorithm Ioannis K. Paparrizos School of Computer and Communication Sciences Ècole Polytechnique Fèdèrale de Lausanne
More informationEfficient Access to Non-Sequential Elements of a Search Tree
Efficient Access to Non-Sequential Elements of a Search Tree Lubomir Stanchev Computer Science Department Indiana University - Purdue University Fort Wayne Fort Wayne, IN, USA stanchel@ipfw.edu Abstract
More information