Traffic Engineering based on Experimentation in On-chip Virtual Network on Dyamically Reconfigurable Processor

Size: px
Start display at page:

Download "Traffic Engineering based on Experimentation in On-chip Virtual Network on Dyamically Reconfigurable Processor"

Transcription

1 Traffic Engineering based on Experimentation in On-chip Virtual Network on Dyamically Reconfigurable Processor Shan GAO, Taku KIHARA, Sho SHIMIZU, Yutaka ARAKAWA, Naoaki YAMANAKA, Kosuke SHIA Department of Information and omputer Science, Faculty of Science and Technology, Keio University, Hiyoshi, Kohoku-ku, Yokohama, , Japan gao@yamanaka.ics.keio.ac.jp IPFlex Inc. Kamiosaki , Sun felista Meguro 6F, Shinagawa-ku, Tokyo, Japan Abstract In recent years, traffic engineering has widely researched to guarantee QoS. It is important that not only link cost, but also several metrics should be considered in next generation traffic engineering. A high-speed traffic engineering method is required, because the complexity increases when more than one metric is considered. In this paper, different from conventional mathematical approach, we describe an experimental traffic engineering method using on-chip virtual network implemented on reconfigurable processor. Links and nodes in virtual network are constructed by several (processor elements) in DAPDNA- 2. We obtain the realistic traffic fluctuation through the behavior of packets that is in the on-chip virtual network. In this paper, as first trial to achieve our goal, we implemented virtual network construction method and confirmed basic path calculation algorithm on the constructed virtual network. I. INTRODUTION In these years, some new internet service has been developed such as video meeting, VoIP(Voice over Internet Protocol) and Internet radio based on high-speed optical network. The optical network can transfer bulk data in high-speed, and it is indispensable on backbone network. However, the next generation internet service in optical network inquire the more high-speed packet forwarding technology, high reliability and quality of service (QoS) technologies [1]. Therefore, it is important that secure the high reliability using traffic engineering [2] [5] which includes survivability, bandwidth control and so on. There are several core technologies in traffic engineering(te), which includes TE routing, TE load balancing and protection, etc. In this paper, we focus TE routing. In existing routing algorithm the shortest path [6] which has minimum cost is always selected for efficient data transfer. However, because the shortest path is always selected, the traffic load on certain links in shortest path will increase, hence congestion will occur. To avoid congestion, several metrics such as the traffic flow, the physical bandwidth and the link usage rate should be considered in routing approach. onventional TE routing algorithms calculate link cost uses mathematical approach with these metrics and the smallest cost route will be selected. TE algorithm can avoid the debasement of communication quality when congestion was occurred. However, frequent iterative calculation [7] is required for the conventional TE routing to distribute traffic. Therefore, a new traffic distribute method for TE routing is required for reduce the iterative calculation times. To solve this problem, we propose an experimental method that emulates each traffic flow which is sending in network and monitor packet to decide the path for distributing traffic. However, it is difficult to monitoring packet appropriately in real network. Therefore, we construct an on-chip virtual network based on a real network and emulate the data transfer for monitoring the packet flow. We propose an on-chip virtual network construction method using reconfigurable processor. We send packets in the constructed virtual network and monitor packet flow. y changing the link cost according to the number of passed packets, we achieve the traffic distribution dynamically. Rest of this paper is organized as follows. In Section II, we describe several important steps to achieve our goal. In section III, we explain our virtual network construction method basic path search algorithms. Simulation results are provided to evaluate the performance of the proposed algorithm is Section IV. Finally, Section V concludes this paper. II. STEPS TO AHIEVE OUR GOAL For our traffic engineering approach in on-chip virtual network, some important steps is required to achieve our final goal, the detail of these steps are shown below. 1. How to construct the virtual node and virtual link The node and the link are two main components of real network. To emulate a node and link behavior in a real network, we use several in DAPDNA-2 to construct the virtual node and the virtual link. We add some original functions in virtual node and virtual link for implement our traffic engineering approach. 2. How to construction method of virtual network

2 We connect several virtual network and virtual link appropriately to construct virtual network base on real network. 3. How to collect network flow with virtual packet We have to decide the data format of virtual packet sent on the chip for recording the route information. 4. How to create virtual network based on the real network automatically To trace the topology change of real network flexibly, to automate the function that rearrange the link and node is needed. We make the program that automatically generates the description file of configuration, to realize automation of the PE arrangement. 5. Hardware resource assignment 5.1 network division method To construct larger network, the network division method is required. We divide the large network to several subnetworks and construct virtual network base on each smaller sub-network. 5.2 ontrol sub-network After dividing the large network, we have to control the packet flow between each sub-network. The virtual subnetwork that was constructed on processor should change at proper timing and transmit the virtual packets to another subnetwork. The dynamic reconfiguration technique and multichip technique of DAPDNA- was used to control changing subnetwork. 6. Entertain effectiveness of our experimental method We implement our traffic engineering in virtual network. We send virtual packets from several source nodes and then the link cost will be changed with the number of passed packets. Moreover, we record the route information in virtual packet. If the route was converged automatically, then the effectiveness of our proposed method is proved. In this paper, we describe about step 1, 2, 3 as the first trial. We also explain an example of step 5 which divide a 10 nodes network to 3 sub-networks. Moreover, we implement two basic routing algorithms, the shortest path algorithm and the disjoint path search algorithm. At last we show the effectiveness of our experimental route search method implemented in on-chip virtual network. III. PROPOSED SHEME In this section, we explain our experimental shortest path search algorithm and disjoint path search algorithm in onchip virtual network. We also explain about implementation of these twor algorithm and virtual network construction which are describe in previous section as step 1, 2 and 3. These are important and basic step to achieve our traffic engineering approach. A. Algorithm Summary 1) Shortest path search algorithm: We proposed a parallel shortest path search algorithm which use experimental approach. The algorithm summary shows below. step 1 We assign a link number and a node number to each link and node. step 2 Send a virtual packet from source node, and broadcast this packet into each branch of the source node. step 3 When the virtual packet pass through the link, the link number is recorded in the virtual packet. When the virtual packet arrived at a new branch node, the virtual packet will be broadcasted. step 4 Repeat step 3, until one packet arrived at destination node. step 5 Finally, the information of first arrived virtual packet shows the shortest path. 2) Disjoint path search algorithm: The basic idea of this algorithm is similar to our shortest path algorithm. In disjoint path search, we should collect all path information at the destination node. The algorithm summary is shown below. Step 1 and 2 is same as the shortest path search algorithm. step 3 When the virtual packet pass through the link, the link number and the link cost is recorded in the virtual packet. When the virtual packet arrived at a new branch node, the virtual packet will be broadcasted. For preventing loop, once a packet passed a link, the packet never sent at that link. step 4 Repeated step 3, until all packets arrived at destination node. We monitor all packets in the network. If no data transmit in any link, packet collection is finished. step 5 Finally, we collect all virtual packets. We calculate the disjoint path pair based on route information which recorded in virtual packet. The disjoint path pair of minimum cost is selected as a optimal solution.. Implementation on DAPDNA-2 Virtual Packet Memory Fig. 1. Virtual network DAPDNA-2 Memory construction a virtual network We construct a virtual network in dynamically reconfigurable processor DAPDNA-2 [8] developed by IPFlex Inc [9]. DAPDNA-2 consists of DAP(Digital Application Processor), a high-performance RIS core DNA(Digital Network Architecture). The DNA is embedded in an array of 376 PE(Processing Elements), which are comprised of computation units, memory, synchronizers and counters. The DNA has several memory banks to store configuration. There are 3 banks memory in background memory and a bank in foreground. These 4 banks

3 store 4 configurations, but just foreground memory is active. DNA can change configuration by load other configuration from 3 background memories. We construct a virtual network by configuring several in DNA. We set parameters of each PE to emulate various functions which real nodes and real links have. For search the route from source node to destination node, we send virtual packet which transmit in the processor. Figure 1 shows an example of virtual network construction. There are 6 nodes and 10 links in real network, so we construct 6 virtual node and 10 virtual link use several in parallel processor, and connect them. Then we read a 32-bit data as a virtual packet from main memory, and transmit this data in the processor. The virtual packets are broadcasted from the source node. Finally, we collect data at destination node and write it in mian memory. When we want to use this data, we can read it from main memory. We implement the shortest path search algorithm and the disjoint path search algorithm on DAPDNA-2. First, we explain how to implement the shortest path search algorithm. 1) Implementation of Shortest Path Search Algorithm: In implementation of shortest path algorithm, we design the virtual node and the virtual link. The design of virtual node and the virtual link is shown below. a) Virtual Node: We define that the virtual node has input port and output port, because links are bidirectional. Figure 2 shows an example of node design whose node degree is three. The virtual node has three input ports and three output ports when the real node s degree is three. For execute our algorithm, many function of the virtual node are shown below. Prevent loop. We use three to construct a loop prevention function. Figure 3(b) shows an example of loop preventing. When data came into link NO.1, we first calculate AND operation of and (the link number). Then, we compare the result to 0. If the result equals 0, we send forward to next node, but in this example, the result is not 0, so we do not send the data. Generate delay. We define the link cost as delay. For example, if the link cost of real network is three, we should generate three clocks delay in virtual link. So, the packet pass through different path, will take different clocks. The virtual packet which passed minimum costs path will first arrive at destination node OR Virtual link No.1 a) Record the link number AND Virtual link No.1 b) Prevent loop Fig. 3. Functions of virtual link No.1. (a)record the link number in data (b) loop preventing function Figure 4 shows an example of our shortest path search algorithm Source node A No.1 No.4 No.2 No.3 D No.7 No.6 F Destination node in1 dix nx do diy gexe U1 cix SEL co ciy ny out1 No.5 E No.8 A PE A in2 in3 dix nx do diy gexe U2 cix SEL co ciy ny dix nx do diy gexe U3 cix SEL co ciy ny out2 out Source node No.1 A No.4 No No.3 D No.7 No.6 F Destination node Fig. 2. Example of node degree which is three opy the virtual packet from input port. Send the virtual packet to other output port except the output port corresponding the input port that virtual packet come from. In our algorithm, the virtual packet will be broadcasted in each branch node. So, the virtual packet should be sent to each output port. b) Virtual Link: The basic virtual link functions are shown below. Record the link number to the input data. Figure 3(a) shows an example of virtual link design. In this example we show the lower 8 bits of virtual packet only. When data pass through the link No.1, rightmost bit will be change to 1. Then, the output data is Fig. 4. No.5 E No.8 construction a virtual network The network shown in figure4 has six nodes. At first, we assign the link number to all links and node number to all nodes. In this example, the network has 8 links, so the link number should be defined from No.1 to No.8. The virtual packet is initialized by 0x and the all 32 bits of virtual packet is used to record link information. step 1 At the source node, we broadcast virtual packets (In this example, we only show the lower 8 bits). The virtual packet will be sent forward to link 1 and link 2. step 2 The virtual packet pass through the link No.1 and No.2, and the link number is recorded to the virtual

4 packet. The output of link 1 and link 2 are and Then, we focus on node 1. Node 1 have 2 branches, so we send to link No.3 and link No.4 in the same way, and record link No.3 and No.4. The output data will be or step 3 When the data arrived at other nodes, step 2 will be repeated until the virtual packet arrive at the destination node. step 4 The first arrived packet will show the shortest path information. In the network shown in figure 4, the first data which arrived at the destination node is 0x The data passed through link No.1, link No.3 and link No.6. So, the shortest path is A--D-F. 2) Implementation of Disjoint Path Search: In disjoint path search, we collect all of the route information in the virtual network and we find the minimum cost disjoint path pair among these information. We first describe the virtual packet format of disjoint path search. Figure 5 shows an example of the format of virtual packet for searching disjoint path. In this example, the virtual packets arrived in a virtual node in same time. We prepare a two path in one port, one path has larger delay than another one. When two data arrive at this port at same time, one data will be sent to the path which has smaller delay, and another one is sent to a bigger path. DAPDNA-2 has 376 PE. We use a lot of to emulate some complicated function. When the network expands, PE becomes insufficient. Therefore we use dynamic reconfiguration technique to solve this problem. Figure 6 shows the example of path collection in a 10 nodes network. In this example, we divide the real network into three parts at first. We use three memory banks to store the virtual network configurations based on each network block. Then we decide how change memory bank using event rotation. Division the original network in 3 parts 0 No.1 No.2 1 RAM No No.4 2 No.5 EX 2 RAM 6 3 No.6 No.7 3 No.8 No No.10 RAM 3 EX RAM No.11 No No.13 9 No.14 1 Memory bank1 Memory bank2 Memory bank ost Node information Fig bits data Link information Example of format of virtual packet packet is divided into three field. Lower 16 bits of data is a field where the link information is recorded. The link information means the link number that the data passed. Next 10 bits which are 16th bit to 25th bit, is a field that the node information is recorded. Node information means the node number that the data passed. The upper 6 bits is a field that the cost of the passed route is recorded. The data format of this example can be used in 10 nodes or less 10 nodes network. If network expand, we should use more virtual packet to collect route information. For example, if we want to implement our proposed algorithm on the NSF network, we can use two 32 bits virtual packets to collect route information. (We define this two packets is a one set.) At every branch point, we broadcast the set of virtual packets. When we calculate the disjoint path pair, we look the set of two virtual packets. Next, We should remove or add some functions in virtual node and virtual link. In order to execute this algorithm faster, we remove delay generate function from virtual link. We add a calculation function in link. When the virtual packet passed through the link, the link cost will added in the cost filed of the virtual packet. Add conflict avoidance function in virtual node to prevent conflicting of virtual packets when two or more virtual Fig. 6. construction a virtual network The summary of implementation is shown below. step 1 We divide the network topology into three parts. step 2 At the source node, we broadcast virtual packets. step 3 When the virtual packet pass through the link, the link number is recorded to the virtual packet. When the virtual packet arrived in a new branch node, the virtual packet will be broadcasted. step 4 To transmit virtual packet to next configuration, we use RAM element to save packets. The change of memory bank will occurred when each RAM stored four virtual packets. We monitor all virtual packets in network. If no virtual packet transmit in currently configuration, we change configuration to configuration which stored in memory bank 2. step 5 Repeat step 3 and 4, until no virtual packets transmit in configuration which stored in memory bank 3. We collect all virtual packets which arrived at the destination node.. Automation of Virtual Network onstruction In Section II, we described several steps to achieve our goal. In the step 1 3, we use a GUI tool which is called DNAdesigner to design the configuration of the DNA. To achieve the step 4, we should use the PEL programing language. PEL is a special language which can describe the arrangement, parameter, and hard-wiring of in the DNA. The grammar of PEL is similar to c++. An example of PEL is shown in figure 7. The example of flow chart of automatic virtual network construction is shown in figure 8. We write a program using c++

5 ALU a, b; /* Arrangement of PE a and b */ a.alu = 0; /* Setup the parameter*/ a.dix = b.do; /* onnecte the PE*/ Fig. 7. An example of PEL TALE II SIMULATION RESULT OF THE READTH FIRST SEARH ALGORITHM AND OUR PROPOSED ALGORITHM Execution time: (µs) readth First Search algorithm Proposed algorithm which generates the PEL cord automatically when a network topology file was input. This program is called automation progrom. Then, the PEL source will be compiled by DNA compiler and execution file is created. Network Topology Fig. 8. Automation Program by c++ PEL source cord DAN compiler Execute file Flow chart of automatic virtual network construction IV. PERFORMANE EVALUATION In this section, we compare our algorithms and the Dijkstra s algorithm and readth first search. We execute these conventional two algorithm use 3GHz processor of Intel Pentium 4 PU. A. Simulation Result of Dijkstra s algorithm and our proposed In this section, we evaluate the calculation clocks of Dijkstra s algorithm [6], [10] and our proposed algorithm. The network topology is same as Figure 6. We execute Dijstra s algorithm and our proposed algorithm 100 times and we obtain the average of execution time. The simulation result is shown in table I. TALE I SIMULATION RESULT OF DIJKSTRA S ALGORITHM AND OUR PROPOSED ALGORITHM Execution time: (µs) Dijkstra s algorithm Proposed algorithm The execution time of our algorithm is faster than the execution time of Dijkstra s algorithm because our algorithm independent on the number of nodes. The Dijkstra s algorithm needs labeling all nodes in network, but our algorithm only depend the total cost of the shortest path. So, our algorithm can search shortest path faster even if the network is large.. Simulation result of the reath First Search algorithm and our proposed We compare execution time of collecting all route information between the breadth first search algorithm and our proposed algorithm. The simulation result shown in table II. We can see that our algorithm collects all route information faster than the breadth first search algorithm, because our algorithm broadcasts virtual packets and collects link informations at each route at the same time. V. ONLUSION In this paper, we proposed a novel approach for traffic engineering which use experimental method. In conventional approach of traffic engineering, frequent iterative calculation is needed to distribute traffic since traffic oscillation exiting in real network. If we monitor packet flow in each link, we can distribute the traffic easily. So, we send virtual packets in on-chip virtual network for monitor packets flow. The final goal of our approach is to distribute traffic dynamically. We explain several important steps to achieve our final goal and proposed a novel method to construct a on-chip virtual network in reconfigurable parallel processor DAPDNA-2. The automation of configuration construction was also explained in this paper. In performance evaluation, We show that both of the calculation time of our shortest path search algorithm and disjoint path algorithm faster than conventional method. Our algorithm can execution faster even when the network is large. So we prove that the experimental method based on on-chip virtual network is effectiveness. In this paper, several basic steps of our approach was completed, the next goal is step 4 and 6 which is described in section II. If we complete these two steps, we can achieve the final goal of our approach, that is to distribute traffic dynamically. It will becomes a great progress of traffic engineering. AKNOWLEDGMENT The authors thank Tomomi Sato and other staff for helping with implementation on DAPDNA-2 (IPFlex Inc). This work was supported by Global OE Program High-Level Global ooperation for Leading-Edge Platform on Access Spaces (12) and by the Japan Society for the Promotion of Science s (JSPS) Grant-in-aid for Scientific Research() ( ). REFERENES [1] D. Awduche, A. hiu, A. Elwalid, I. Widjaja, and X. Xiao, Overview and Principles of Internet Traffic Engineering, IETF, RF 3272, May [2] emard Fortz, Jennifer Rexford and Mikkel Thorup, Traffic Engineering with Traditional IP Routing Protocols,, IEEE ommunications Magazine, October 2002, pp [3] onstantion M.Lagoa, Hao he, and ernardo A. Movsichoff, Adaptive ontrol Algorithms for Decentralized Optimal Traffic Engineering in the Internet IEEE/AM Transactions on Networking, Vol.12,NO.3,June 2004, pp [4] Lu Ruan, Haibo Luo, and hang Liu, A Dynamic Routing Algorithm With Load alancing Heuristics for Restorable onnections in WDM Networks, IEEE Journal on selected areas in communications, Vol.22,No.9,November 2004, pp [5] Murali Kodialam, T. V. Lakshman, Dynamic Routing of andwidth Guaranteed Tunnels with Restoration, IEEE INFOOM, 2000,pp

6 [6] oris V.herkassky, Andrew V.Goldberg, and Tomasz Radzik, Shortest Paths Algorithms: Theory and Experimental Evaluation Mathematical Programming Volume 73, Number 2, May 1996, pp [7] Aradhana Narula-Tam and Eytan Modiano, Senior Member, IEEE, Dynamic Load alancing in WDM Packet Networks With and Without Wavelength onstraints, IEEE JOURNAL ON SELETED AREAS IN OMMUNIATIONS, VOL. 18, NO. 10, OTOER 2000, pp [8] Toshinori SUEYOSHI, Hideharu AMANO, Reconfigurable system, Ohmsha, Tokyo, [9] IPFlex Inc ( [10] E.W.Dijkstra, A Note on Two Problems in onnection with Graphs, Number.Math.,1: , 1959.

Fast Link-Disjoint Path Algorithm on Parallel Reconfigurable Processor DAPDNA-2

Fast Link-Disjoint Path Algorithm on Parallel Reconfigurable Processor DAPDNA-2 Fast Link-Disjoint Path Algorithm on Parallel Reconfigurable Processor DAPDNA-2 Taku KIHARA, Sho SHIMIZU, Yutaka ARAKAWA, Naoaki YAMANAKA, Kosuke SHIBA Department of Information and Computer Science, Faculty

More information

A Prototype of a Dynamically Reconfigurable Processor Based Off-loading Engine for Accelerating the Shortest Path Calculation with GNU Zebra

A Prototype of a Dynamically Reconfigurable Processor Based Off-loading Engine for Accelerating the Shortest Path Calculation with GNU Zebra A Prototype of a Dynamically Reconfigurable Processor Based Off-loading Engine for Accelerating the Shortest Path Calculation with GNU Zebra Sho SHIMIZU, Taku KIHARA, Yutaka ARAKAWA, Naoaki YAMANAKA Keio

More information

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet Midori Terasawa, Masahiro Nishida, Sho Shimizu, Yutaka Arakawa, Satoru Okamoto and Naoaki Yamanaka Department

More information

Performance/Cost trade-off evaluation for the DCT implementation on the Dynamically Reconfigurable Processor

Performance/Cost trade-off evaluation for the DCT implementation on the Dynamically Reconfigurable Processor Performance/Cost trade-off evaluation for the DCT implementation on the Dynamically Reconfigurable Processor Vu Manh Tuan, Yohei Hasegawa, Naohiro Katsura and Hideharu Amano Graduate School of Science

More information

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks Hwajung Lee, Hongsik hoi, Suresh Subramaniam, and Hyeong-Ah hoi Department of omputer Science and Electrical and omputer

More information

ACEAIT On IP Network Traffic Engineering Performance of Modified Branch Exchange and Interior Point Method

ACEAIT On IP Network Traffic Engineering Performance of Modified Branch Exchange and Interior Point Method ACEAIT-5239 On IP Network Traffic Engineering Performance of Modified Branch Exchange and Interior Point Method Kairat Jaroenrat *, Tichakon Sumrongsub, Thanachot Thitivichienlert and Natdanai Suksaeng

More information

Toward the joint design of electronic and optical layer protection

Toward the joint design of electronic and optical layer protection Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS

More information

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Robert D. allaway and Michael Devetsikiotis Department of Electrical

More information

Design and Implementation of GMPLS-basd Optical Slot Switching Network with PLZT High-speed Optical Switch

Design and Implementation of GMPLS-basd Optical Slot Switching Network with PLZT High-speed Optical Switch Design and Implementation of GMPLS-basd Optical Switching Network with PLZT High-speed Optical Switch Teruo Kasahara, Masahiro Hayashitani, Yutaka rakawa, Satoru Okamoto and Naoaki Yamanaka Dept. of Information

More information

WAVELENGTH-DIVISION multiplexed (WDM) optical

WAVELENGTH-DIVISION multiplexed (WDM) optical IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1823 A Dynamic Routing Algorithm With Load Balancing Heuristics for Restorable Connections in WDM Networks Lu Ruan, Member,

More information

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043

More information

GMPLS-based optical slot switching access-distribution network with a 10 ns high-speed PLZT optical switch

GMPLS-based optical slot switching access-distribution network with a 10 ns high-speed PLZT optical switch Vol. 7, No. 8 / August 2008 / JOURNAL OF OPTICAL NETWORKING 744 GMPLS-based optical slot switching access-distribution network with a 10 ns high-speed PLZT optical switch Masahiro Hayashitani, 1, * Teruo

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

Experimental evaluation of fault recovery methods in Elastic Lambda Aggregation Network

Experimental evaluation of fault recovery methods in Elastic Lambda Aggregation Network Experimental evaluation of fault recovery methods in Elastic Lambda Aggregation Network Takehiro Sato a), Yoshihiro Isaji, Yusuke Nakajima, Satoru Okamoto, and Naoaki Yamanaka Graduate School of Science

More information

Photonic MPLS Network Architecture Based on Hikari-Router [Invited]

Photonic MPLS Network Architecture Based on Hikari-Router [Invited] Photonic MPLS Network Architecture Based on Hikari-Router [Invited] Naoaki Yamanaka, Member, IEEE "IT Network Innovation Laboratories, 3-9-1 1 Midori-cho, Musashino-shi, Tokyo, 180-8585 Japan E-mail: yamanaka.naoaki@lab.ntt.co.jp

More information

PAPER Resource Minimization Method Satisfying Delay Constraint for Replicating Large Contents

PAPER Resource Minimization Method Satisfying Delay Constraint for Replicating Large Contents 3102 PAPER Resource Minimization Method Satisfying Delay Constraint for Replicating Large Contents Sho SHIMIZU a), Student Member, Hiroyuki ISHIKAWA, Nonmember, Yutaka ARAKAWA, Naoaki YAMANAKA, and Kosuke

More information

Automatic Service and Protection Path Computation - A Multiplexing Approach

Automatic Service and Protection Path Computation - A Multiplexing Approach Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd

More information

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization Víctor M. Aragón, Ignacio de Miguel, Ramón J. Durán, Noemí Merayo, Juan Carlos Aguado, Patricia Fernández,

More information

Efficient Singlecast / Multicast Method For Active Optical Access Network Using PLZT High-speed Optical Switches

Efficient Singlecast / Multicast Method For Active Optical Access Network Using PLZT High-speed Optical Switches Efficient Singlecast / Multicast Method For Active Optical Access Network Using PLZT High-speed Optical Switches Kunitaka Ashizawa, Kazumasa Tokuhashi, Daisuke Ishii, Satoru Okamoto, Naoaki Yamanaka and

More information

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering

More information

Layer-Wise Topology Design for Cost Effective IP-Optical Networks

Layer-Wise Topology Design for Cost Effective IP-Optical Networks Communications and Networ, 2012, 4, 88-92 http://dx.doi.org/10.4236/cn.2012.41012 Published Online February 2012 (http://www.scirp.org/journal/cn) Layer-Wise Topology Design for Cost Effective IP-Optical

More information

Dynamic service Allocation with Protection Path

Dynamic service Allocation with Protection Path www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path

More information

Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction

Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction Shu Sekigawa, Satoru Okamoto, and Naoaki Yamanaka Department of Information and Computer Science, Faculty of Science and Technology,

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

Cost-Effective Traffic Grooming in WDM Rings

Cost-Effective Traffic Grooming in WDM Rings 618 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 5, OCTOBER 2000 Cost-Effective Traffic Grooming in WDM Rings Ornan Gerstel, Member, IEEE, Rajiv Ramaswami, Fellow, IEEE, and Galen H. Sasaki, Member,

More information

Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks

Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks P. Venkataravikumar 1, Prof. Bachala Sathyanarayana 2 Research Scholar 1, Department of Computer Science

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

Protection in Multi-Granular Waveband Networks

Protection in Multi-Granular Waveband Networks Protection in Multi-Granular Waveand Networks Saket Varma and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 svarma@student.utdallas.edu, jjue@utdallas.edu Astract As the numer

More information

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576

More information

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks

Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Branch-and-Bound Algorithms for Constrained Paths and Path Pairs and Their Application to Transparent WDM Networks Franz Rambach Student of the TUM Telephone: 0049 89 12308564 Email: rambach@in.tum.de

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18,  ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, www.ijcea.com ISSN 2321-3469 MULTICAST ROUTING: CONVENTIONAL ALGORITHMS VS ANT COLONY SYSTEM ABSTRACT

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

Survivability with P-Cycle in WDM Networks

Survivability with P-Cycle in WDM Networks Survivability with P-Cycle in WDM Networks K. Aparna 1, P. Ramya Krishna 2 JNTUA College of Engineering, Pulivendula Abstract: In this paper we discuss about the Pre-Configured survivability schemes. Network

More information

Exploring Multiple Paths using Link Utilization in Computer Networks

Exploring Multiple Paths using Link Utilization in Computer Networks 7 Exploring Multiple Paths using Link Utilization in Computer Networks 1 Shalini Aggarwal, 2 Shuchita Upadhyaya 1 Teacher Fellow, Department of Computer Science & Applications, Kurukshetra University Kurukshetra,

More information

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 69-72 EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS Sushil Chaturvedi

More information

Survivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks

Survivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks University of Nebraska - Lincoln Digitalommons@University of Nebraska - Lincoln SE onference and Workshop Papers omputer Science and Engineering, Department of 24 Survivable Virtual Topology Routing under

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Simple Layout Algorithms To Maintain Network Connectivity Under Faults

Simple Layout Algorithms To Maintain Network Connectivity Under Faults Simple Layout Algorithms To Maintain Network Connectivity Under Faults Galen H. Sasaki 1 Department of Electrical, University of Hawaii 2540 Dole Street, Honolulu, HI 96822 USA Ching-Fong Su and David

More information

Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network

Global Adaptive Routing Algorithm Without Additional Congestion Propagation Network 1 Global Adaptive Routing Algorithm Without Additional Congestion ropagation Network Shaoli Liu, Yunji Chen, Tianshi Chen, Ling Li, Chao Lu Institute of Computing Technology, Chinese Academy of Sciences

More information

Dynamic Routing of Restorable Bandwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information

Dynamic Routing of Restorable Bandwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 3, JUNE 2003 399 Dynamic Routing of Restorable Bwidth-Guaranteed Tunnels Using Aggregated Network Resource Usage Information Murali Kodialam, Associate

More information

Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches

Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Using the NCTUns 2.0 Network Simulator/Emulator to Facilitate Network Researches Prof. Shie-Yuan Wang Department of Computer Science National Chiao Tung University Network and System Laboratory Introduction

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Technical Report, April 2011 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu

More information

Research on Control Routing Technology in Communication Network

Research on Control Routing Technology in Communication Network Appl. Math. Inf. Sci. 6 No. 1S pp. 129S-133S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Research on Control Routing Technology

More information

Survivable Lightpath Routing: A New Approach to the Design of WDM-Based Networks

Survivable Lightpath Routing: A New Approach to the Design of WDM-Based Networks 800 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 4, MAY 2002 Survivable Lightpath Routing: A New Approach to the Design of WDM-Based Networks Eytan Modiano, Senior Member, IEEE and Aradhana

More information

Delay Time Analysis of Reconfigurable. Firewall Unit

Delay Time Analysis of Reconfigurable. Firewall Unit Delay Time Analysis of Reconfigurable Unit Tomoaki SATO C&C Systems Center, Hirosaki University Hirosaki 036-8561 Japan Phichet MOUNGNOUL Faculty of Engineering, King Mongkut's Institute of Technology

More information

PAPER A Disjoint Path Selection Scheme with Shared Risk Link Group Constraints in GMPLS Networks

PAPER A Disjoint Path Selection Scheme with Shared Risk Link Group Constraints in GMPLS Networks IEICE TRANS. COMMUN., VOL.E86 B, NO.8 AUGUST 2003 2455 PAPER A Disjoint Path Selection Scheme with Shared Risk Link Group Constraints in GMPLS Networks Eiji OKI a), Nobuaki MATSUURA,KoheiSHIOMOTO, and

More information

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks Iyad Katib and Deep Medhi Computer Science & Electrical Engineering Department University of Missouri-Kansas City, USA {IyadKatib,

More information

Development of Transport Systems for Dedicated Service Provision Using Packet Transport Technologies

Development of Transport Systems for Dedicated Service Provision Using Packet Transport Technologies Development of Transport Systems for Dedicated Service Provision Using Transport Technologies Hidetoshi Onda, Masaki Shinkai, Takaaki Hisashima, Sachio Suda, Takeru Sakairi, Hidenori Iwashita, Masaya Ogawa,

More information

On Routing Performance of MENTOR Algorithm

On Routing Performance of MENTOR Algorithm 1769 On Routing Performance of MENTOR Algorithm KAIRAT JAROENRAT, PISIT CHARNKEITKONG Faculty of Information Technology Rangsit University 52/347 Muang-Ake, Phaholyothin Rd., Lak-Hok, Pathumtani, THAILAND

More information

Report on the successful demonstration of innovative basic technologies for future optical access network Elastic Lambda Aggregation Network

Report on the successful demonstration of innovative basic technologies for future optical access network Elastic Lambda Aggregation Network April 25, 2017 Nippon Telegraph and Telephone Corporation Hitachi, Ltd. Oki Electric Industry Co., Ltd. Keio University KDDI Research, Inc. Furukawa Electric Co., Ltd. Report on the successful demonstration

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Simulation of Energy Efficiency in Virtual Topology

Simulation of Energy Efficiency in Virtual Topology Simulation of Energy Efficiency in Virtual Topology 1 Nanda Kumar. S, 2 Selva Ra. P Department. of Information Technology, SRM University, Chennai, India 1 nanda6488@gmail.com, 2 selvara.p@ktr.srmuniv.ac.in

More information

A QoS-based ONU Group Planning Algorithm for Smart Grid Communication Networks

A QoS-based ONU Group Planning Algorithm for Smart Grid Communication Networks The 19th Asia-Pacific Network Operations and Management Symposium A QoS-based ONU Group Planning Algorithm for Smart Grid Communication Networks Reporter: Ying Li Affiliation: State Key Laboratory of Networking

More information

An Experimental Analysis on OSPF-TE Convergence Time

An Experimental Analysis on OSPF-TE Convergence Time An Experimental Analysis on OSPF-TE Convergence Time S. Huang* a, K. Kitayama a, F. Cugini b, F. Paolucci c, A. Giorgetti c, L. Valcarenghi c, P. Castoldi c a Osaka University, Osaka, Japan; b CNIT, Pisa,

More information

Successful High-precision QoS Measurement in Widely Deployed 10-Gbit/s Networks Based on General-purpose Personal Computers

Successful High-precision QoS Measurement in Widely Deployed 10-Gbit/s Networks Based on General-purpose Personal Computers Successful High-precision QoS Measurement in Widely Deployed 10-Gbit/s Networks Based on General-purpose Personal Computers Kenji Shimizu, Katsuhiro Sebayashi, and Mitsuru Maruyama Abstract In this article,

More information

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Jeong-Mi Kim 1, Oh-Han Kang 2, Jae-Il Jung 3, and Sung-Un Kim 1,4 1 Pukyong National University, 599-1 Daeyeon 3-Dong Nam-Gu, Busan,

More information

Shared vs. Snoop: Evaluation of Cache Structure for Single-chip Multiprocessors

Shared vs. Snoop: Evaluation of Cache Structure for Single-chip Multiprocessors vs. : Evaluation of Structure for Single-chip Multiprocessors Toru Kisuki,Masaki Wakabayashi,Junji Yamamoto,Keisuke Inoue, Hideharu Amano Department of Computer Science, Keio University 3-14-1, Hiyoshi

More information

Look-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka

Look-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka Look-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka Abstract We describe a look-ahead type detour path specification method that can specify in advance detour

More information

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona

More information

Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET

Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET Suhail Ahmad Wajid Ali Hamdani Mohsin Hassan Magray ABSTRACT Over the last two decades, we have witnessed a rapid deployment of real-time applications

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

Proposal of cooperative operation framework for M2M systems

Proposal of cooperative operation framework for M2M systems Proposal of cooperative operation framework for M2M systems Fumihito Sugihara, Katsuhiro Naito, Hidekazu Suzuki, Akira Watanabe, Kazuo Mori, Hideo Kobayashi Department of Electrical and Electronic Engineering,

More information

IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004

IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks. Dr. Greg M. Bernstein Grotto Networking 2004 IP Bandwidth on Demand and Traffic Engineering via Multi-Layer Transport Networks Dr. Greg M. Bernstein Grotto Networking Page - 1 Problem Scope Bandwidth on Demand Medium to high speed bandwidth demands

More information

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications

More information

Towards Decentralized and Adaptive Network Resource Management

Towards Decentralized and Adaptive Network Resource Management Towards Decentralized and Adaptive Network Resource Management D.Tuncer, M.Charalambides, G.Pavlou Department of Electronic & Electrical Engineering University College London London, UK N.Wang Centre for

More information

Efficient Distributed Restoration Path Selection for Shared Mesh Restoration

Efficient Distributed Restoration Path Selection for Shared Mesh Restoration IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 5, OCTOBER 2003 761 Efficient Distributed Restoration Path Selection for Shared Mesh Restoration Guangzhi Li, Member, IEEE, Dongmei Wang, Member, IEEE,

More information

KRUSKAL AIDED FLOYD WARSHALL ALGORITHM FOR SHORTEST PATH IDENTIFICATION IN MICROGRIDS

KRUSKAL AIDED FLOYD WARSHALL ALGORITHM FOR SHORTEST PATH IDENTIFICATION IN MICROGRIDS KRUSKAL AIDED FLOYD WARSHALL ALGORITHM FOR SHORTEST PATH IDENTIFICATION IN MICROGRIDS O. V. Gnana Swathika and S. Hemamalini VIT University, Chennai Campus, Chennai, India ABSTRACT Microgrids are indispensable

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks 1 Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman, Student Member, IEEE, Eytan Modiano, Fellow, IEEE, and Aradhana Narula-Tam, Member, IEEE Abstract This paper develops a novel

More information

Unreserved Resource Information Advertisement Method in GMPLS

Unreserved Resource Information Advertisement Method in GMPLS OECC 2007 Unreserved Resource Information Advertisement Method in GMPLS Masahiro Nishida Keio University No.1 Outline Background Conventional Advertisement method Proposed Advertisement method Performance

More information

Simulation of All Optical Networks

Simulation of All Optical Networks Simulation of All Optical Networks Raul Valls Aranda Communication Department Polytechnic University of Valencia (UPV) C/ Camino de Vera s/n Valencia, Spain Pablo A. Beneit Mayordomo Communication Department

More information

A Novel Semi-Adaptive Routing Algorithm for Delay Reduction in Networks on Chip

A Novel Semi-Adaptive Routing Algorithm for Delay Reduction in Networks on Chip Research Journal of Applied Sciences, Engineering and Technology 4(19): 3641-3645, 212 ISSN: 24-7467 Maxwell Scientific Organization, 212 Submitted: February 13, 212 Accepted: March 24, 212 Published:

More information

A GENETIC ALGORITHM SOLUTION TO SOLVE THE SHORTEST PATH PROBLEM IN OSPF AND MPLS

A GENETIC ALGORITHM SOLUTION TO SOLVE THE SHORTEST PATH PROBLEM IN OSPF AND MPLS Malaysian Journal of Computer Science, Vol. 16 No. 1, June 2003, pp. 58-67 A GENETIC ALGORITHM SOLUTION TO SOLVE THE SHORTEST PATH PROBLEM IN OSPF AND MPLS N. Selvanathan and Wee Jing Tee Faculty of Computer

More information

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Sandip R. Shinde Research Scholar, Sathyabama University, Chennai & Assistant Professor, Vishwakarma

More information

Optimising OSPF Routing for Link Failure Scenarios

Optimising OSPF Routing for Link Failure Scenarios Optimising OSPF Routing for Link Failure Scenarios Sadiq M. Sait, Mohammed H. Sqalli, Syed Asadullah Computer Engineering Department King Fahd University of Petroleum & Minerals Dhahran 31261, Saudi Arabia

More information

A Study of Protection Switching: Wrapping or Steering

A Study of Protection Switching: Wrapping or Steering Study of Protection Switching: Wrapping or Steering Jason Fan Luminous Networks, Inc. March 2001, IEEE 802.17 Luminous Networks/Jason Fan 1 Wrapped Protection Wrapped protection is analogous to LSR Wrapping

More information

Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming

Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming Proc. of Int. Conf. on Emerging Trends in Engineering and Technology Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming Vikas Kaushik 1, R.S Chauhan 2 1 JMIT Radaur/ECE

More information

Dynamic Routing of Bandwidth Guaranteed Tunnels with Restoration

Dynamic Routing of Bandwidth Guaranteed Tunnels with Restoration Dynamic Routing of Bandwidth Guaranteed Tunnels with Restoration Murali Kodialam T. V. Lakshman Bell Laboratories Lucent Technologies 101 Crawfords Corner Road Holmdel, NJ 033, USA muralik, lakshman @bell-labs.com

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

A Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking

A Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking A Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking Dongjin Hong, Jinyong Kim, and Jaehoon (Paul) Jeong Department of Electrical and Computer Engineering, Sungkyunkwan

More information

QoS routing in DWDM Optical Packet Networks

QoS routing in DWDM Optical Packet Networks QoS routing in DWDM Optical Packet Networks W. Cerroni CNIT Bologna Research Unit, ITALY F. Callegati, G. Muretto, C. Raffaelli, P. Zaffoni DEIS University of Bologna, ITALY Optical Packet Switching (OPS)

More information

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical

More information

A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism

A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism A QoS Control Method Cooperating with a Dynamic Load Balancing Mechanism Akiko Okamura, Koji Nakamichi, Hitoshi Yamada and Akira Chugo Fujitsu Laboratories Ltd. 4-1-1, Kamikodanaka, Nakahara, Kawasaki,

More information

Internet Architecture. Network Layer Overview. Fundamental Network Layer Function. Protocol Layering and Data. Computer Networks 9/23/2009

Internet Architecture. Network Layer Overview. Fundamental Network Layer Function. Protocol Layering and Data. Computer Networks 9/23/2009 omputer Networks 9//9 Network Layer Overview Kai Shen Internet rchitecture ottom-up: : electromagnetic signals on the wire : data transfer between neighboring elements encoding, framing, error correction,

More information

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2 International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 INC-BEAT 2016 An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M.

More information

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Muhammad S. Javed, Krishnaiyan Thulasiraman, Matthew A. Gaines School of Computer Science, University

More information

Deadlock-free XY-YX router for on-chip interconnection network

Deadlock-free XY-YX router for on-chip interconnection network LETTER IEICE Electronics Express, Vol.10, No.20, 1 5 Deadlock-free XY-YX router for on-chip interconnection network Yeong Seob Jeong and Seung Eun Lee a) Dept of Electronic Engineering Seoul National Univ

More information

Establishment of Point-to-Multi-Point path in GMPLS controlled Wide Area

Establishment of Point-to-Multi-Point path in GMPLS controlled Wide Area Establishment of Point-to-Multi-Point path in GMPLS controlled Wide Area Ethernet Ko Kikuta, Daisuke Ishii, Satoru Okamoto and Naoaki Yamanaka KEIO University, JAPAN kikuta@yamanaka.ics.keio.ac.jp www.mpls2009.com

More information

Network-on-Chip Architecture

Network-on-Chip Architecture Multiple Processor Systems(CMPE-655) Network-on-Chip Architecture Performance aspect and Firefly network architecture By Siva Shankar Chandrasekaran and SreeGowri Shankar Agenda (Enhancing performance)

More information

2017/2/21. Retrieving Information with Autonomously-Flying Routers in ICN

2017/2/21. Retrieving Information with Autonomously-Flying Routers in ICN 1 26th May 2016 I in Kuala Lumpur Retrieving Information with utonomously-flying Routers in IN Taku Kitagawa Shingo ta Masayuki Murata Graduate School of Information Science and Technology,, Japan Graduate

More information

A New Platform NIDS Based On WEMA

A New Platform NIDS Based On WEMA I.J. Information Technology and Computer Science, 2015, 06, 52-58 Published Online May 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.06.07 A New Platform NIDS Based On WEMA Adnan A.

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

DISJOINT PATH ROUTING FOR MULTI-CHANNEL MULTI-INTERFACE WIRELESS MESH NETWORK

DISJOINT PATH ROUTING FOR MULTI-CHANNEL MULTI-INTERFACE WIRELESS MESH NETWORK DISJOINT PATH ROUTING FOR MULTI-CHANNEL MULTI-INTERFACE WIRELESS MESH NETWORK Takeshi Ikenaga 1, Koji Tsubouchi 1, Daiki Nobayashi 1, Yutaka Fukuda 2 1 Graduate School of Engineering, Kyushu Institute

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information