Traffic Engineering based on Experimentation in On-chip Virtual Network on Dyamically Reconfigurable Processor
|
|
- Oscar Dickerson
- 5 years ago
- Views:
Transcription
1 Traffic Engineering based on Experimentation in On-chip Virtual Network on Dyamically Reconfigurable Processor Shan GAO, Taku KIHARA, Sho SHIMIZU, Yutaka ARAKAWA, Naoaki YAMANAKA, Kosuke SHIA Department of Information and omputer Science, Faculty of Science and Technology, Keio University, Hiyoshi, Kohoku-ku, Yokohama, , Japan gao@yamanaka.ics.keio.ac.jp IPFlex Inc. Kamiosaki , Sun felista Meguro 6F, Shinagawa-ku, Tokyo, Japan Abstract In recent years, traffic engineering has widely researched to guarantee QoS. It is important that not only link cost, but also several metrics should be considered in next generation traffic engineering. A high-speed traffic engineering method is required, because the complexity increases when more than one metric is considered. In this paper, different from conventional mathematical approach, we describe an experimental traffic engineering method using on-chip virtual network implemented on reconfigurable processor. Links and nodes in virtual network are constructed by several (processor elements) in DAPDNA- 2. We obtain the realistic traffic fluctuation through the behavior of packets that is in the on-chip virtual network. In this paper, as first trial to achieve our goal, we implemented virtual network construction method and confirmed basic path calculation algorithm on the constructed virtual network. I. INTRODUTION In these years, some new internet service has been developed such as video meeting, VoIP(Voice over Internet Protocol) and Internet radio based on high-speed optical network. The optical network can transfer bulk data in high-speed, and it is indispensable on backbone network. However, the next generation internet service in optical network inquire the more high-speed packet forwarding technology, high reliability and quality of service (QoS) technologies [1]. Therefore, it is important that secure the high reliability using traffic engineering [2] [5] which includes survivability, bandwidth control and so on. There are several core technologies in traffic engineering(te), which includes TE routing, TE load balancing and protection, etc. In this paper, we focus TE routing. In existing routing algorithm the shortest path [6] which has minimum cost is always selected for efficient data transfer. However, because the shortest path is always selected, the traffic load on certain links in shortest path will increase, hence congestion will occur. To avoid congestion, several metrics such as the traffic flow, the physical bandwidth and the link usage rate should be considered in routing approach. onventional TE routing algorithms calculate link cost uses mathematical approach with these metrics and the smallest cost route will be selected. TE algorithm can avoid the debasement of communication quality when congestion was occurred. However, frequent iterative calculation [7] is required for the conventional TE routing to distribute traffic. Therefore, a new traffic distribute method for TE routing is required for reduce the iterative calculation times. To solve this problem, we propose an experimental method that emulates each traffic flow which is sending in network and monitor packet to decide the path for distributing traffic. However, it is difficult to monitoring packet appropriately in real network. Therefore, we construct an on-chip virtual network based on a real network and emulate the data transfer for monitoring the packet flow. We propose an on-chip virtual network construction method using reconfigurable processor. We send packets in the constructed virtual network and monitor packet flow. y changing the link cost according to the number of passed packets, we achieve the traffic distribution dynamically. Rest of this paper is organized as follows. In Section II, we describe several important steps to achieve our goal. In section III, we explain our virtual network construction method basic path search algorithms. Simulation results are provided to evaluate the performance of the proposed algorithm is Section IV. Finally, Section V concludes this paper. II. STEPS TO AHIEVE OUR GOAL For our traffic engineering approach in on-chip virtual network, some important steps is required to achieve our final goal, the detail of these steps are shown below. 1. How to construct the virtual node and virtual link The node and the link are two main components of real network. To emulate a node and link behavior in a real network, we use several in DAPDNA-2 to construct the virtual node and the virtual link. We add some original functions in virtual node and virtual link for implement our traffic engineering approach. 2. How to construction method of virtual network
2 We connect several virtual network and virtual link appropriately to construct virtual network base on real network. 3. How to collect network flow with virtual packet We have to decide the data format of virtual packet sent on the chip for recording the route information. 4. How to create virtual network based on the real network automatically To trace the topology change of real network flexibly, to automate the function that rearrange the link and node is needed. We make the program that automatically generates the description file of configuration, to realize automation of the PE arrangement. 5. Hardware resource assignment 5.1 network division method To construct larger network, the network division method is required. We divide the large network to several subnetworks and construct virtual network base on each smaller sub-network. 5.2 ontrol sub-network After dividing the large network, we have to control the packet flow between each sub-network. The virtual subnetwork that was constructed on processor should change at proper timing and transmit the virtual packets to another subnetwork. The dynamic reconfiguration technique and multichip technique of DAPDNA- was used to control changing subnetwork. 6. Entertain effectiveness of our experimental method We implement our traffic engineering in virtual network. We send virtual packets from several source nodes and then the link cost will be changed with the number of passed packets. Moreover, we record the route information in virtual packet. If the route was converged automatically, then the effectiveness of our proposed method is proved. In this paper, we describe about step 1, 2, 3 as the first trial. We also explain an example of step 5 which divide a 10 nodes network to 3 sub-networks. Moreover, we implement two basic routing algorithms, the shortest path algorithm and the disjoint path search algorithm. At last we show the effectiveness of our experimental route search method implemented in on-chip virtual network. III. PROPOSED SHEME In this section, we explain our experimental shortest path search algorithm and disjoint path search algorithm in onchip virtual network. We also explain about implementation of these twor algorithm and virtual network construction which are describe in previous section as step 1, 2 and 3. These are important and basic step to achieve our traffic engineering approach. A. Algorithm Summary 1) Shortest path search algorithm: We proposed a parallel shortest path search algorithm which use experimental approach. The algorithm summary shows below. step 1 We assign a link number and a node number to each link and node. step 2 Send a virtual packet from source node, and broadcast this packet into each branch of the source node. step 3 When the virtual packet pass through the link, the link number is recorded in the virtual packet. When the virtual packet arrived at a new branch node, the virtual packet will be broadcasted. step 4 Repeat step 3, until one packet arrived at destination node. step 5 Finally, the information of first arrived virtual packet shows the shortest path. 2) Disjoint path search algorithm: The basic idea of this algorithm is similar to our shortest path algorithm. In disjoint path search, we should collect all path information at the destination node. The algorithm summary is shown below. Step 1 and 2 is same as the shortest path search algorithm. step 3 When the virtual packet pass through the link, the link number and the link cost is recorded in the virtual packet. When the virtual packet arrived at a new branch node, the virtual packet will be broadcasted. For preventing loop, once a packet passed a link, the packet never sent at that link. step 4 Repeated step 3, until all packets arrived at destination node. We monitor all packets in the network. If no data transmit in any link, packet collection is finished. step 5 Finally, we collect all virtual packets. We calculate the disjoint path pair based on route information which recorded in virtual packet. The disjoint path pair of minimum cost is selected as a optimal solution.. Implementation on DAPDNA-2 Virtual Packet Memory Fig. 1. Virtual network DAPDNA-2 Memory construction a virtual network We construct a virtual network in dynamically reconfigurable processor DAPDNA-2 [8] developed by IPFlex Inc [9]. DAPDNA-2 consists of DAP(Digital Application Processor), a high-performance RIS core DNA(Digital Network Architecture). The DNA is embedded in an array of 376 PE(Processing Elements), which are comprised of computation units, memory, synchronizers and counters. The DNA has several memory banks to store configuration. There are 3 banks memory in background memory and a bank in foreground. These 4 banks
3 store 4 configurations, but just foreground memory is active. DNA can change configuration by load other configuration from 3 background memories. We construct a virtual network by configuring several in DNA. We set parameters of each PE to emulate various functions which real nodes and real links have. For search the route from source node to destination node, we send virtual packet which transmit in the processor. Figure 1 shows an example of virtual network construction. There are 6 nodes and 10 links in real network, so we construct 6 virtual node and 10 virtual link use several in parallel processor, and connect them. Then we read a 32-bit data as a virtual packet from main memory, and transmit this data in the processor. The virtual packets are broadcasted from the source node. Finally, we collect data at destination node and write it in mian memory. When we want to use this data, we can read it from main memory. We implement the shortest path search algorithm and the disjoint path search algorithm on DAPDNA-2. First, we explain how to implement the shortest path search algorithm. 1) Implementation of Shortest Path Search Algorithm: In implementation of shortest path algorithm, we design the virtual node and the virtual link. The design of virtual node and the virtual link is shown below. a) Virtual Node: We define that the virtual node has input port and output port, because links are bidirectional. Figure 2 shows an example of node design whose node degree is three. The virtual node has three input ports and three output ports when the real node s degree is three. For execute our algorithm, many function of the virtual node are shown below. Prevent loop. We use three to construct a loop prevention function. Figure 3(b) shows an example of loop preventing. When data came into link NO.1, we first calculate AND operation of and (the link number). Then, we compare the result to 0. If the result equals 0, we send forward to next node, but in this example, the result is not 0, so we do not send the data. Generate delay. We define the link cost as delay. For example, if the link cost of real network is three, we should generate three clocks delay in virtual link. So, the packet pass through different path, will take different clocks. The virtual packet which passed minimum costs path will first arrive at destination node OR Virtual link No.1 a) Record the link number AND Virtual link No.1 b) Prevent loop Fig. 3. Functions of virtual link No.1. (a)record the link number in data (b) loop preventing function Figure 4 shows an example of our shortest path search algorithm Source node A No.1 No.4 No.2 No.3 D No.7 No.6 F Destination node in1 dix nx do diy gexe U1 cix SEL co ciy ny out1 No.5 E No.8 A PE A in2 in3 dix nx do diy gexe U2 cix SEL co ciy ny dix nx do diy gexe U3 cix SEL co ciy ny out2 out Source node No.1 A No.4 No No.3 D No.7 No.6 F Destination node Fig. 2. Example of node degree which is three opy the virtual packet from input port. Send the virtual packet to other output port except the output port corresponding the input port that virtual packet come from. In our algorithm, the virtual packet will be broadcasted in each branch node. So, the virtual packet should be sent to each output port. b) Virtual Link: The basic virtual link functions are shown below. Record the link number to the input data. Figure 3(a) shows an example of virtual link design. In this example we show the lower 8 bits of virtual packet only. When data pass through the link No.1, rightmost bit will be change to 1. Then, the output data is Fig. 4. No.5 E No.8 construction a virtual network The network shown in figure4 has six nodes. At first, we assign the link number to all links and node number to all nodes. In this example, the network has 8 links, so the link number should be defined from No.1 to No.8. The virtual packet is initialized by 0x and the all 32 bits of virtual packet is used to record link information. step 1 At the source node, we broadcast virtual packets (In this example, we only show the lower 8 bits). The virtual packet will be sent forward to link 1 and link 2. step 2 The virtual packet pass through the link No.1 and No.2, and the link number is recorded to the virtual
4 packet. The output of link 1 and link 2 are and Then, we focus on node 1. Node 1 have 2 branches, so we send to link No.3 and link No.4 in the same way, and record link No.3 and No.4. The output data will be or step 3 When the data arrived at other nodes, step 2 will be repeated until the virtual packet arrive at the destination node. step 4 The first arrived packet will show the shortest path information. In the network shown in figure 4, the first data which arrived at the destination node is 0x The data passed through link No.1, link No.3 and link No.6. So, the shortest path is A--D-F. 2) Implementation of Disjoint Path Search: In disjoint path search, we collect all of the route information in the virtual network and we find the minimum cost disjoint path pair among these information. We first describe the virtual packet format of disjoint path search. Figure 5 shows an example of the format of virtual packet for searching disjoint path. In this example, the virtual packets arrived in a virtual node in same time. We prepare a two path in one port, one path has larger delay than another one. When two data arrive at this port at same time, one data will be sent to the path which has smaller delay, and another one is sent to a bigger path. DAPDNA-2 has 376 PE. We use a lot of to emulate some complicated function. When the network expands, PE becomes insufficient. Therefore we use dynamic reconfiguration technique to solve this problem. Figure 6 shows the example of path collection in a 10 nodes network. In this example, we divide the real network into three parts at first. We use three memory banks to store the virtual network configurations based on each network block. Then we decide how change memory bank using event rotation. Division the original network in 3 parts 0 No.1 No.2 1 RAM No No.4 2 No.5 EX 2 RAM 6 3 No.6 No.7 3 No.8 No No.10 RAM 3 EX RAM No.11 No No.13 9 No.14 1 Memory bank1 Memory bank2 Memory bank ost Node information Fig bits data Link information Example of format of virtual packet packet is divided into three field. Lower 16 bits of data is a field where the link information is recorded. The link information means the link number that the data passed. Next 10 bits which are 16th bit to 25th bit, is a field that the node information is recorded. Node information means the node number that the data passed. The upper 6 bits is a field that the cost of the passed route is recorded. The data format of this example can be used in 10 nodes or less 10 nodes network. If network expand, we should use more virtual packet to collect route information. For example, if we want to implement our proposed algorithm on the NSF network, we can use two 32 bits virtual packets to collect route information. (We define this two packets is a one set.) At every branch point, we broadcast the set of virtual packets. When we calculate the disjoint path pair, we look the set of two virtual packets. Next, We should remove or add some functions in virtual node and virtual link. In order to execute this algorithm faster, we remove delay generate function from virtual link. We add a calculation function in link. When the virtual packet passed through the link, the link cost will added in the cost filed of the virtual packet. Add conflict avoidance function in virtual node to prevent conflicting of virtual packets when two or more virtual Fig. 6. construction a virtual network The summary of implementation is shown below. step 1 We divide the network topology into three parts. step 2 At the source node, we broadcast virtual packets. step 3 When the virtual packet pass through the link, the link number is recorded to the virtual packet. When the virtual packet arrived in a new branch node, the virtual packet will be broadcasted. step 4 To transmit virtual packet to next configuration, we use RAM element to save packets. The change of memory bank will occurred when each RAM stored four virtual packets. We monitor all virtual packets in network. If no virtual packet transmit in currently configuration, we change configuration to configuration which stored in memory bank 2. step 5 Repeat step 3 and 4, until no virtual packets transmit in configuration which stored in memory bank 3. We collect all virtual packets which arrived at the destination node.. Automation of Virtual Network onstruction In Section II, we described several steps to achieve our goal. In the step 1 3, we use a GUI tool which is called DNAdesigner to design the configuration of the DNA. To achieve the step 4, we should use the PEL programing language. PEL is a special language which can describe the arrangement, parameter, and hard-wiring of in the DNA. The grammar of PEL is similar to c++. An example of PEL is shown in figure 7. The example of flow chart of automatic virtual network construction is shown in figure 8. We write a program using c++
5 ALU a, b; /* Arrangement of PE a and b */ a.alu = 0; /* Setup the parameter*/ a.dix = b.do; /* onnecte the PE*/ Fig. 7. An example of PEL TALE II SIMULATION RESULT OF THE READTH FIRST SEARH ALGORITHM AND OUR PROPOSED ALGORITHM Execution time: (µs) readth First Search algorithm Proposed algorithm which generates the PEL cord automatically when a network topology file was input. This program is called automation progrom. Then, the PEL source will be compiled by DNA compiler and execution file is created. Network Topology Fig. 8. Automation Program by c++ PEL source cord DAN compiler Execute file Flow chart of automatic virtual network construction IV. PERFORMANE EVALUATION In this section, we compare our algorithms and the Dijkstra s algorithm and readth first search. We execute these conventional two algorithm use 3GHz processor of Intel Pentium 4 PU. A. Simulation Result of Dijkstra s algorithm and our proposed In this section, we evaluate the calculation clocks of Dijkstra s algorithm [6], [10] and our proposed algorithm. The network topology is same as Figure 6. We execute Dijstra s algorithm and our proposed algorithm 100 times and we obtain the average of execution time. The simulation result is shown in table I. TALE I SIMULATION RESULT OF DIJKSTRA S ALGORITHM AND OUR PROPOSED ALGORITHM Execution time: (µs) Dijkstra s algorithm Proposed algorithm The execution time of our algorithm is faster than the execution time of Dijkstra s algorithm because our algorithm independent on the number of nodes. The Dijkstra s algorithm needs labeling all nodes in network, but our algorithm only depend the total cost of the shortest path. So, our algorithm can search shortest path faster even if the network is large.. Simulation result of the reath First Search algorithm and our proposed We compare execution time of collecting all route information between the breadth first search algorithm and our proposed algorithm. The simulation result shown in table II. We can see that our algorithm collects all route information faster than the breadth first search algorithm, because our algorithm broadcasts virtual packets and collects link informations at each route at the same time. V. ONLUSION In this paper, we proposed a novel approach for traffic engineering which use experimental method. In conventional approach of traffic engineering, frequent iterative calculation is needed to distribute traffic since traffic oscillation exiting in real network. If we monitor packet flow in each link, we can distribute the traffic easily. So, we send virtual packets in on-chip virtual network for monitor packets flow. The final goal of our approach is to distribute traffic dynamically. We explain several important steps to achieve our final goal and proposed a novel method to construct a on-chip virtual network in reconfigurable parallel processor DAPDNA-2. The automation of configuration construction was also explained in this paper. In performance evaluation, We show that both of the calculation time of our shortest path search algorithm and disjoint path algorithm faster than conventional method. Our algorithm can execution faster even when the network is large. So we prove that the experimental method based on on-chip virtual network is effectiveness. In this paper, several basic steps of our approach was completed, the next goal is step 4 and 6 which is described in section II. If we complete these two steps, we can achieve the final goal of our approach, that is to distribute traffic dynamically. It will becomes a great progress of traffic engineering. AKNOWLEDGMENT The authors thank Tomomi Sato and other staff for helping with implementation on DAPDNA-2 (IPFlex Inc). This work was supported by Global OE Program High-Level Global ooperation for Leading-Edge Platform on Access Spaces (12) and by the Japan Society for the Promotion of Science s (JSPS) Grant-in-aid for Scientific Research() ( ). REFERENES [1] D. Awduche, A. hiu, A. Elwalid, I. Widjaja, and X. Xiao, Overview and Principles of Internet Traffic Engineering, IETF, RF 3272, May [2] emard Fortz, Jennifer Rexford and Mikkel Thorup, Traffic Engineering with Traditional IP Routing Protocols,, IEEE ommunications Magazine, October 2002, pp [3] onstantion M.Lagoa, Hao he, and ernardo A. Movsichoff, Adaptive ontrol Algorithms for Decentralized Optimal Traffic Engineering in the Internet IEEE/AM Transactions on Networking, Vol.12,NO.3,June 2004, pp [4] Lu Ruan, Haibo Luo, and hang Liu, A Dynamic Routing Algorithm With Load alancing Heuristics for Restorable onnections in WDM Networks, IEEE Journal on selected areas in communications, Vol.22,No.9,November 2004, pp [5] Murali Kodialam, T. V. Lakshman, Dynamic Routing of andwidth Guaranteed Tunnels with Restoration, IEEE INFOOM, 2000,pp
6 [6] oris V.herkassky, Andrew V.Goldberg, and Tomasz Radzik, Shortest Paths Algorithms: Theory and Experimental Evaluation Mathematical Programming Volume 73, Number 2, May 1996, pp [7] Aradhana Narula-Tam and Eytan Modiano, Senior Member, IEEE, Dynamic Load alancing in WDM Packet Networks With and Without Wavelength onstraints, IEEE JOURNAL ON SELETED AREAS IN OMMUNIATIONS, VOL. 18, NO. 10, OTOER 2000, pp [8] Toshinori SUEYOSHI, Hideharu AMANO, Reconfigurable system, Ohmsha, Tokyo, [9] IPFlex Inc ( [10] E.W.Dijkstra, A Note on Two Problems in onnection with Graphs, Number.Math.,1: , 1959.
Fast Link-Disjoint Path Algorithm on Parallel Reconfigurable Processor DAPDNA-2
Fast Link-Disjoint Path Algorithm on Parallel Reconfigurable Processor DAPDNA-2 Taku KIHARA, Sho SHIMIZU, Yutaka ARAKAWA, Naoaki YAMANAKA, Kosuke SHIBA Department of Information and Computer Science, Faculty
More informationA Prototype of a Dynamically Reconfigurable Processor Based Off-loading Engine for Accelerating the Shortest Path Calculation with GNU Zebra
A Prototype of a Dynamically Reconfigurable Processor Based Off-loading Engine for Accelerating the Shortest Path Calculation with GNU Zebra Sho SHIMIZU, Taku KIHARA, Yutaka ARAKAWA, Naoaki YAMANAKA Keio
More informationRecover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet
Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Midori Terasawa, Masahiro Nishida, Sho Shimizu, Yutaka Arakawa, Satoru Okamoto and Naoaki Yamanaka Department
More informationPerformance/Cost trade-off evaluation for the DCT implementation on the Dynamically Reconfigurable Processor
Performance/Cost trade-off evaluation for the DCT implementation on the Dynamically Reconfigurable Processor Vu Manh Tuan, Yohei Hasegawa, Naohiro Katsura and Hideharu Amano Graduate School of Science
More informationPreserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks
Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Hwajung Lee, Hongsik hoi, Suresh Subramaniam, and Hyeong-Ah hoi Department of omputer Science and Electrical and omputer
More informationACEAIT On IP Network Traffic Engineering Performance of Modified Branch Exchange and Interior Point Method
ACEAIT-5239 On IP Network Traffic Engineering Performance of Modified Branch Exchange and Interior Point Method Kairat Jaroenrat *, Tichakon Sumrongsub, Thanachot Thitivichienlert and Natdanai Suksaeng
More informationToward the joint design of electronic and optical layer protection
Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS
More informationDesign and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture
Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Robert D. allaway and Michael Devetsikiotis Department of Electrical
More informationDesign and Implementation of GMPLS-basd Optical Slot Switching Network with PLZT High-speed Optical Switch
Design and Implementation of GMPLS-basd Optical Switching Network with PLZT High-speed Optical Switch Teruo Kasahara, Masahiro Hayashitani, Yutaka rakawa, Satoru Okamoto and Naoaki Yamanaka Dept. of Information
More informationWAVELENGTH-DIVISION multiplexed (WDM) optical
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1823 A Dynamic Routing Algorithm With Load Balancing Heuristics for Restorable Connections in WDM Networks Lu Ruan, Member,
More informationDYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS
DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043
More informationGMPLS-based optical slot switching access-distribution network with a 10 ns high-speed PLZT optical switch
Vol. 7, No. 8 / August 2008 / JOURNAL OF OPTICAL NETWORKING 744 GMPLS-based optical slot switching access-distribution network with a 10 ns high-speed PLZT optical switch Masahiro Hayashitani, 1, * Teruo
More informationOptical Communications and Networking 朱祖勍. Nov. 27, 2017
Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by
More informationExperimental evaluation of fault recovery methods in Elastic Lambda Aggregation Network
Experimental evaluation of fault recovery methods in Elastic Lambda Aggregation Network Takehiro Sato a), Yoshihiro Isaji, Yusuke Nakajima, Satoru Okamoto, and Naoaki Yamanaka Graduate School of Science
More informationPhotonic MPLS Network Architecture Based on Hikari-Router [Invited]
Photonic MPLS Network Architecture Based on Hikari-Router [Invited] Naoaki Yamanaka, Member, IEEE "IT Network Innovation Laboratories, 3-9-1 1 Midori-cho, Musashino-shi, Tokyo, 180-8585 Japan E-mail: yamanaka.naoaki@lab.ntt.co.jp
More informationPAPER Resource Minimization Method Satisfying Delay Constraint for Replicating Large Contents
3102 PAPER Resource Minimization Method Satisfying Delay Constraint for Replicating Large Contents Sho SHIMIZU a), Student Member, Hiroyuki ISHIKAWA, Nonmember, Yutaka ARAKAWA, Naoaki YAMANAKA, and Kosuke
More informationAutomatic Service and Protection Path Computation - A Multiplexing Approach
Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd
More informationA New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization
A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization Víctor M. Aragón, Ignacio de Miguel, Ramón J. Durán, Noemí Merayo, Juan Carlos Aguado, Patricia Fernández,
More informationEfficient Singlecast / Multicast Method For Active Optical Access Network Using PLZT High-speed Optical Switches
Efficient Singlecast / Multicast Method For Active Optical Access Network Using PLZT High-speed Optical Switches Kunitaka Ashizawa, Kazumasa Tokuhashi, Daisuke Ishii, Satoru Okamoto, Naoaki Yamanaka and
More informationOutline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006
EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering
More informationLayer-Wise Topology Design for Cost Effective IP-Optical Networks
Communications and Networ, 2012, 4, 88-92 http://dx.doi.org/10.4236/cn.2012.41012 Published Online February 2012 (http://www.scirp.org/journal/cn) Layer-Wise Topology Design for Cost Effective IP-Optical
More informationDynamic service Allocation with Protection Path
www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path
More informationExpected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction
Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction Shu Sekigawa, Satoru Okamoto, and Naoaki Yamanaka Department of Information and Computer Science, Faculty of Science and Technology,
More informationNetwork Topology Control and Routing under Interface Constraints by Link Evaluation
Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT
More informationA Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks
A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland
More informationCost-Effective Traffic Grooming in WDM Rings
618 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 5, OCTOBER 2000 Cost-Effective Traffic Grooming in WDM Rings Ornan Gerstel, Member, IEEE, Rajiv Ramaswami, Fellow, IEEE, and Galen H. Sasaki, Member,
More informationEfficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks
Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks P. Venkataravikumar 1, Prof. Bachala Sathyanarayana 2 Research Scholar 1, Department of Computer Science
More informationA Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing
A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,
More informationDistributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks
Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry
More informationProtection in Multi-Granular Waveband Networks
Protection in Multi-Granular Waveand Networks Saket Varma and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 svarma@student.utdallas.edu, jjue@utdallas.edu Astract As the numer
More informationClassification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering
Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576
More informationBranch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks
Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Franz Rambach Student of the TUM Telephone: 0049 89 12308564 Email: rambach@in.tum.de
More informationDynamic Wavelength Assignment for WDM All-Optical Tree Networks
Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of
More informationInternational Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, ISSN
International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, www.ijcea.com ISSN 2321-3469 MULTICAST ROUTING: CONVENTIONAL ALGORITHMS VS ANT COLONY SYSTEM ABSTRACT
More informationMaster s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006
Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology
More informationSurvivability with P-Cycle in WDM Networks
Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network
More informationExploring Multiple Paths using Link Utilization in Computer Networks
7 Exploring Multiple Paths using Link Utilization in Computer Networks 1 Shalini Aggarwal, 2 Shuchita Upadhyaya 1 Teacher Fellow, Department of Computer Science & Applications, Kurukshetra University Kurukshetra,
More informationEXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 69-72 EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS Sushil Chaturvedi
More informationSurvivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks
University of Nebraska - Lincoln Digitalommons@University of Nebraska - Lincoln SE onference and Workshop Papers omputer Science and Engineering, Department of 24 Survivable Virtual Topology Routing under
More informationAdmission Control in Time-Slotted Multihop Mobile Networks
dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai
More informationSimple Layout Algorithms To Maintain Network Connectivity Under Faults
Simple Layout Algorithms To Maintain Network Connectivity Under Faults Galen H. Sasaki 1 Department of Electrical, University of Hawaii 2540 Dole Street, Honolulu, HI 96822 USA Ching-Fong Su and David
More informationGlobal Adaptive Routing Algorithm Without Additional Congestion Propagation Network
1 Global Adaptive Routing Algorithm Without Additional Congestion ropagation Network Shaoli Liu, Yunji Chen, Tianshi Chen, Ling Li, Chao Lu Institute of Computing Technology, Chinese Academy of Sciences
More informationDynamic Routing of Restorable Bandwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 3, JUNE 2003 399 Dynamic Routing of Restorable Bwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information Murali Kodialam, Associate
More informationUsing the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches
Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Prof. Shie-Yuan Wang Department of Computer Science National Chiao Tung University Network and System Laboratory Introduction
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Technical Report, April 2011 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu
More informationResearch on Control Routing Technology in Communication Network
Appl. Math. Inf. Sci. 6 No. 1S pp. 129S-133S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Research on Control Routing Technology
More informationSurvivable Lightpath Routing: A New Approach to the Design of WDM-Based Networks
800 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 4, MAY 2002 Survivable Lightpath Routing: A New Approach to the Design of WDM-Based Networks Eytan Modiano, Senior Member, IEEE and Aradhana
More informationDelay Time Analysis of Reconfigurable. Firewall Unit
Delay Time Analysis of Reconfigurable Unit Tomoaki SATO C&C Systems Center, Hirosaki University Hirosaki 036-8561 Japan Phichet MOUNGNOUL Faculty of Engineering, King Mongkut's Institute of Technology
More informationPAPER A Disjoint Path Selection Scheme with Shared Risk Link Group Constraints in GMPLS Networks
IEICE TRANS. COMMUN., VOL.E86 B, NO.8 AUGUST 2003 2455 PAPER A Disjoint Path Selection Scheme with Shared Risk Link Group Constraints in GMPLS Networks Eiji OKI a), Nobuaki MATSUURA,KoheiSHIOMOTO, and
More informationA Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks
A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,
More informationDevelopment of Transport Systems for Dedicated Service Provision Using Packet Transport Technologies
Development of Transport Systems for Dedicated Service Provision Using Transport Technologies Hidetoshi Onda, Masaki Shinkai, Takaaki Hisashima, Sachio Suda, Takeru Sakairi, Hidenori Iwashita, Masaya Ogawa,
More informationOn Routing Performance of MENTOR Algorithm
1769 On Routing Performance of MENTOR Algorithm KAIRAT JAROENRAT, PISIT CHARNKEITKONG Faculty of Information Technology Rangsit University 52/347 Muang-Ake, Phaholyothin Rd., Lak-Hok, Pathumtani, THAILAND
More informationReport on the successful demonstration of innovative basic technologies for future optical access network Elastic Lambda Aggregation Network
April 25, 2017 Nippon Telegraph and Telephone Corporation Hitachi, Ltd. Oki Electric Industry Co., Ltd. Keio University KDDI Research, Inc. Furukawa Electric Co., Ltd. Report on the successful demonstration
More informationSplitter Placement in All-Optical WDM Networks
plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National
More informationSimulation of Energy Efficiency in Virtual Topology
Simulation of Energy Efficiency in Virtual Topology 1 Nanda Kumar. S, 2 Selva Ra. P Department. of Information Technology, SRM University, Chennai, India 1 nanda6488@gmail.com, 2 selvara.p@ktr.srmuniv.ac.in
More informationA QoS-based ONU Group Planning Algorithm for Smart Grid Communication Networks
The 19th Asia-Pacific Network Operations and Management Symposium A QoS-based ONU Group Planning Algorithm for Smart Grid Communication Networks Reporter: Ying Li Affiliation: State Key Laboratory of Networking
More informationAn Experimental Analysis on OSPF-TE Convergence Time
An Experimental Analysis on OSPF-TE Convergence Time S. Huang* a, K. Kitayama a, F. Cugini b, F. Paolucci c, A. Giorgetti c, L. Valcarenghi c, P. Castoldi c a Osaka University, Osaka, Japan; b CNIT, Pisa,
More informationSuccessful High-precision QoS Measurement in Widely Deployed 10-Gbit/s Networks Based on General-purpose Personal Computers
Successful High-precision QoS Measurement in Widely Deployed 10-Gbit/s Networks Based on General-purpose Personal Computers Kenji Shimizu, Katsuhiro Sebayashi, and Mitsuru Maruyama Abstract In this article,
More informationMulticast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM
Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Jeong-Mi Kim 1, Oh-Han Kang 2, Jae-Il Jung 3, and Sung-Un Kim 1,4 1 Pukyong National University, 599-1 Daeyeon 3-Dong Nam-Gu, Busan,
More informationShared vs. Snoop: Evaluation of Cache Structure for Single-chip Multiprocessors
vs. : Evaluation of Structure for Single-chip Multiprocessors Toru Kisuki,Masaki Wakabayashi,Junji Yamamoto,Keisuke Inoue, Hideharu Amano Department of Computer Science, Keio University 3-14-1, Hiyoshi
More informationLook-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka
Look-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka Abstract We describe a look-ahead type detour path specification method that can specify in advance detour
More informationMulti-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures
Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona
More informationPerformance Evaluation of IPv4 and IPv6 over MPLS using OPNET
Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Suhail Ahmad Wajid Ali Hamdani Mohsin Hassan Magray ABSTRACT Over the last two decades, we have witnessed a rapid deployment of real-time applications
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationProposal of cooperative operation framework for M2M systems
Proposal of cooperative operation framework for M2M systems Fumihito Sugihara, Katsuhiro Naito, Hidekazu Suzuki, Akira Watanabe, Kazuo Mori, Hideo Kobayashi Department of Electrical and Electronic Engineering,
More informationIP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004
IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks Dr. Greg M. Bernstein Grotto Networking Page - 1 Problem Scope Bandwidth on Demand Medium to high speed bandwidth demands
More informationA Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications
More informationTowards Decentralized and Adaptive Network Resource Management
Towards Decentralized and Adaptive Network Resource Management D.Tuncer, M.Charalambides, G.Pavlou Department of Electronic & Electrical Engineering University College London London, UK N.Wang Centre for
More informationEfficient Distributed Restoration Path Selection for Shared Mesh Restoration
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 5, OCTOBER 2003 761 Efficient Distributed Restoration Path Selection for Shared Mesh Restoration Guangzhi Li, Member, IEEE, Dongmei Wang, Member, IEEE,
More informationKRUSKAL AIDED FLOYD WARSHALL ALGORITHM FOR SHORTEST PATH IDENTIFICATION IN MICROGRIDS
KRUSKAL AIDED FLOYD WARSHALL ALGORITHM FOR SHORTEST PATH IDENTIFICATION IN MICROGRIDS O. V. Gnana Swathika and S. Hemamalini VIT University, Chennai Campus, Chennai, India ABSTRACT Microgrids are indispensable
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
1 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman, Student Member, IEEE, Eytan Modiano, Fellow, IEEE, and Aradhana Narula-Tam, Member, IEEE Abstract This paper develops a novel
More informationUnreserved Resource Information Advertisement Method in GMPLS
OECC 2007 Unreserved Resource Information Advertisement Method in GMPLS Masahiro Nishida Keio University No.1 Outline Background Conventional Advertisement method Proposed Advertisement method Performance
More informationSimulation of All Optical Networks
Simulation of All Optical Networks Raul Valls Aranda Communication Department Polytechnic University of Valencia (UPV) C/ Camino de Vera s/n Valencia, Spain Pablo A. Beneit Mayordomo Communication Department
More informationA Novel Semi-Adaptive Routing Algorithm for Delay Reduction in Networks on Chip
Research Journal of Applied Sciences, Engineering and Technology 4(19): 3641-3645, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: February 13, 212 Accepted: March 24, 212 Published:
More informationA GENETIC ALGORITHM SOLUTION TO SOLVE THE SHORTEST PATH PROBLEM IN OSPF AND MPLS
Malaysian Journal of Computer Science, Vol. 16 No. 1, June 2003, pp. 58-67 A GENETIC ALGORITHM SOLUTION TO SOLVE THE SHORTEST PATH PROBLEM IN OSPF AND MPLS N. Selvanathan and Wee Jing Tee Faculty of Computer
More informationFault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue
Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Sandip R. Shinde Research Scholar, Sathyabama University, Chennai & Assistant Professor, Vishwakarma
More informationOptimising OSPF Routing for Link Failure Scenarios
Optimising OSPF Routing for Link Failure Scenarios Sadiq M. Sait, Mohammed H. Sqalli, Syed Asadullah Computer Engineering Department King Fahd University of Petroleum & Minerals Dhahran 31261, Saudi Arabia
More informationA Study of Protection Switching: Wrapping or Steering
Study of Protection Switching: Wrapping or Steering Jason Fan Luminous Networks, Inc. March 2001, IEEE 802.17 Luminous Networks/Jason Fan 1 Wrapped Protection Wrapped protection is analogous to LSR Wrapping
More informationPerformance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming
Proc. of Int. Conf. on Emerging Trends in Engineering and Technology Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming Vikas Kaushik 1, R.S Chauhan 2 1 JMIT Radaur/ECE
More informationDynamic Routing of Bandwidth Guaranteed Tunnels with Restoration
Dynamic Routing of Bandwidth Guaranteed Tunnels with Restoration Murali Kodialam T. V. Lakshman Bell Laboratories Lucent Technologies 101 Crawfords Corner Road Holmdel, NJ 033, USA muralik, lakshman @bell-labs.com
More informationSubnet Multicast for Delivery of One-to-Many Multicast Applications
Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationClustering-Based Distributed Precomputation for Quality-of-Service Routing*
Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,
More informationA Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking
A Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking Dongjin Hong, Jinyong Kim, and Jaehoon (Paul) Jeong Department of Electrical and Computer Engineering, Sungkyunkwan
More informationQoS routing in DWDM Optical Packet Networks
QoS routing in DWDM Optical Packet Networks W. Cerroni CNIT Bologna Research Unit, ITALY F. Callegati, G. Muretto, C. Raffaelli, P. Zaffoni DEIS University of Bologna, ITALY Optical Packet Switching (OPS)
More informationSparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms
Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical
More informationA QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism
A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism Akiko Okamura, Koji Nakamichi, Hitoshi Yamada and Akira Chugo Fujitsu Laboratories Ltd. 4-1-1, Kamikodanaka, Nakahara, Kawasaki,
More informationInternet Architecture. Network Layer Overview. Fundamental Network Layer Function. Protocol Layering and Data. Computer Networks 9/23/2009
omputer Networks 9//9 Network Layer Overview Kai Shen Internet rchitecture ottom-up: : electromagnetic signals on the wire : data transfer between neighboring elements encoding, framing, error correction,
More informationAn Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2
International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 INC-BEAT 2016 An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M.
More informationSurvivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation
Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Muhammad S. Javed, Krishnaiyan Thulasiraman, Matthew A. Gaines School of Computer Science, University
More informationDeadlock-free XY-YX router for on-chip interconnection network
LETTER IEICE Electronics Express, Vol.10, No.20, 1 5 Deadlock-free XY-YX router for on-chip interconnection network Yeong Seob Jeong and Seung Eun Lee a) Dept of Electronic Engineering Seoul National Univ
More informationEstablishment of Point-to-Multi-Point path in GMPLS controlled Wide Area
Establishment of Point-to-Multi-Point path in GMPLS controlled Wide Area Ethernet Ko Kikuta, Daisuke Ishii, Satoru Okamoto and Naoaki Yamanaka KEIO University, JAPAN kikuta@yamanaka.ics.keio.ac.jp www.mpls2009.com
More informationNetwork-on-Chip Architecture
Multiple Processor Systems(CMPE-655) Network-on-Chip Architecture Performance aspect and Firefly network architecture By Siva Shankar Chandrasekaran and SreeGowri Shankar Agenda (Enhancing performance)
More information2017/2/21. Retrieving Information with Autonomously-Flying Routers in ICN
1 26th May 2016 I in Kuala Lumpur Retrieving Information with utonomously-flying Routers in IN Taku Kitagawa Shingo ta Masayuki Murata Graduate School of Information Science and Technology,, Japan Graduate
More informationA New Platform NIDS Based On WEMA
I.J. Information Technology and Computer Science, 2015, 06, 52-58 Published Online May 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.06.07 A New Platform NIDS Based On WEMA Adnan A.
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationDISJOINT PATH ROUTING FOR MULTI-CHANNEL MULTI-INTERFACE WIRELESS MESH NETWORK
DISJOINT PATH ROUTING FOR MULTI-CHANNEL MULTI-INTERFACE WIRELESS MESH NETWORK Takeshi Ikenaga 1, Koji Tsubouchi 1, Daiki Nobayashi 1, Yutaka Fukuda 2 1 Graduate School of Engineering, Kyushu Institute
More informationZarządzanie sieciami telekomunikacyjnymi
Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are
More informationCourse Routing Classification Properties Routing Protocols 1/39
Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent
More information