Routing Multicast Streams in Clos Networks

Size: px
Start display at page:

Download "Routing Multicast Streams in Clos Networks"

Transcription

1 Routing Multicast Streams in Clos Networks De-Ron Liang Institute of Information Science Academia Sinica Taipei Taiwan59 R.O.C. Chen-Liang Fang Jin-Wen College of Business and Technology Taipei Taiwan 3 R.O.C. fang@jwc.edu.tw Keywords: Multicast routing routing algorithms Clos networks ATM networks performance evaluation simulation. Abstract Multicast routing in high speed networks is one of the key issues in the design and implementation of applications such as video conferencing. Traditionally the problems are formalized as either the shortest path problem or Steiner tree problem where the objective function is either the shortest path or the minimum costs associated with the path. In this paper we study an on-line multicast routing problem in Clos network with minimizing internal blocking ratio. We propose three families of heuristics: Least busy LB) First t FF) and Minimal bandwidth MB). Our simulation shows LB and FF families perform well with unicast streams but they are not good enough to deal with multicast streams. The MB family has signicant performance on multicast streams. The MB family can be reduced to set covering problem which is well known NP-complete problem. We also propose heuristic minimal bandwidth HMB) family which are derived from greedy set covering algorithm to trade o computing time and routing performance. These algorithms perform almost as good as the expensive MB family and as simple as FF family. Therefore the HMB is the best algorithms we proposed for multicast routing. Introduction Multicasting is the simultaneous transmission of data to multiple destinations. The problem of multicast routing in high speed networks such as ATM networks has been recognized an important problem because of its application to video conferencing[?] and HDTV broadcasting[?]. The multicast routing problem has usually been formalized as an o-line allocation problem where the network is normally modeled by the graph representation and the set of multicast streams to be considered is known in prior. When a multicast stream arrives at the network the multicast routing algorithm is responsible for nding routes from the source to each of the destination; each route should have enough free bandwidth to support the stream. If multiple routes exist for a given multicast the routing algorithm will choose one so as to optimize a certain objective function. The existing algorithms can be classied into two categories in terms of objective functions: the Shortest- Path Algorithms and the Minimum Cost Algorithms. For the Shortest-Path Algorithms the routes are computed independently form the source to each of destination using Dijkstra's shortest path algorithms [?] then the multicast route is merged to form a multicast tree. For the algorithms in the second category the multicast routes is constructed in such as way that the sum of the costs associated with the used links is minimized. This problem is usually cited as the Steiner tree problem which is known to be NP-complete[??]. Numerous heuristic algorithms have been proposed to study this problem[??]. Kompella et al propose an extension to the Steiner tree problem where the minimum cost is searched with delay constraints[?]. Previous algorithms can handle a single multicast stream at a time Noronha and Tobagi study a routing problem with batch arrivals and propose an optimal algorithm using integer programming approach[?]. We study the on-line problem of multicast routing in Clos network with maximizing network throughput. In contrast to the o-line problems the arrival of the multicast streams to the Clos network is assumed to form a random process with known statistics. Furthermore the active duration of the multicast streams is characterized by a probability distribution. It is dicult to nd the optimal routing algorithms for the on-line problem. The objective of this problem is to develop ecient algorithms that can nd multicast routing trees to maximize the network throughput. We propose three families of routing algorithms each of which corresponds to a system measure using as the routing index; namely rst-t FF) leastbusy LB) minimal-bandwidth MB). The denitions

2 of these routing algorithms are given in Section 3. We show that the problem to nd an optimal routing for a stream request according to each of these system measures can be formulated as an o-line routing problem. Our simulation shows that FF and LB families are both good enough for unicast streams. The MB family which can be reduced into set covering problem with complexity ON!) are the best one for multicast routing. We also propose a Heuristic Minimal Bandwith HMB) family which are derived from greedy set covering algorithm and can just loss limited performance to decrease most computing time. Problem Statement A multicast stream is specied by the quadruple: s k ; O k ; I k ; k ). We notice that s k is the switch input O k = fo ; :::; o nk g is the set of the switch outputs and n k is the multicast degree. I k = [t kb ; t ke ] is the active period starting from time t kb to time t ke. Finally k is the bandwidth requirement. Furthermore the switch inputs and switch outputs are assumed to be requested uniformly by the incoming streams and bandwidth requirement is characterized by a probability distribution. The route used to establish the multicast stream on the network is called multicast path. Thus a multicast path for stream S k can be viewed as the merge of n k point-to point path for s k to each of O k. We are interested in the design of ecient multicast routing algorithms capable of addressing the performance issues namely network throughput. The network throughput are contributed by individual multicast streams. The throughput of an active stream S k is dened as XS k ) = O k k. Suppose St) = fs k g K k= is the set of active streams at time t; the instantaneous throughput of the Clos network at time t is dened as XS k) = P s kst) XS k). The expected throughput of the network under given trac; E[X] =. As discussed the characteristics of the multicast streams are assumed statistically indistinguishable. To maximize the network throughput is equivalent to maximize the call acceptance rate. If the stream blocking is caused by the bandwidth shortage of external links then it is called external blocking. If the routing algorithm can not nd any feasible routing tree for current status of Clos network then it is callled internal blocking. In this paper we only discuss internal blocking. The problem of this research is to nd ecient routing algorithms to construct multicast path in Clos network based on the on-line information i.e. the existing active streams provided the topology of the Clos network and the statistic of the multicast streams are given. R T 0 lim Xt)dt T! T 3 The Routing Algorithms We dene the link residual capacity of link to be the available bandwidth of the link and denote it by x ij ; x i+k )). The residual capacity of the path P is dened as the minimum link residual capacity of the two links and we denote it as P ). The I/O residual capacity of [s o] is dened as the maximum path residual capacity among all paths in the path set of [s o]. The least busy path of [s; o]is a path which is in path set of [s; o] with maximal residual capacity. Furthermore the residual capacity of the switch is dened as the minimum of the I/O residual capacities among all [so]. The reachable third stage SE set of second stage SE i ROi) is a set of third stage SEs there is a destination outport on this third stage SE and there exists a path with enough residual capacity passing second stage SE i. In order to deploy the load balance eect of LB we also dene reachable least busy third stage SE set of second stage SE i ROLBi) as set of third stage SEs there is a destination outport j on this third stage SE and there exists a least busy path of [s; j]passing second stage SE i. The least-busy LB) routing algorithm is to nd a multicast routing tree in such a way that the residual capacity of the multicast tree is maximized. The rst- t FF) algorithm is to nd a multicast routing tree in such a way every path pass the lowest numbered SE in second stage for every outport. The minimumbandwidth MB) algorithm is to nd a multicast routing tree in such a way that total bandwidth of the multicast tree is minimized. The HMB family is basically derived from well known greedy set covering algorithm [?]. We also deploy two second selection criteria least-busy and rst-t to form two new routing algorithms named heuristic minimal-bandwidth least busy HMBLB) and heuristic minimal-bandwidth rst- t HMBFF). Consider a partial topology of the Clos network and the path residual capacities of all involved path as shown in Figure??a). Suppose there is a new arrival stream with s k = ; f; ; 3g; I k ; 0:). The randomly choose one available second stage SE for each of the outports f 3g and construct the routing tree as shown in Figure??b). The I/O residual capacity of [ ] [ ] and [ 3] are and respectively. The LB algorithm randomly choose SE x from two feasible second stage SEs for the Outport and choose x 3 for the Outport and 3. Such that routing tree has minimal I/O residual capacity for these I/O pairs. See Figure??c). The LB is trying to balance the load of all internal links. The FF chooses the rst feasible second stage SE x ; x 3 ; and x for the Outport and 3 respectively to construct the FF routing tree. The FF could use switch bandwidth as much as do. See Figure??d). That is why the FF is not good enough under multicast routing. Each

3 x x 0. x x3 3 x3 x3 x3 x33 RO) = RO) = RO3) = a) x x3 x 0. x x x x x x x x x x x3 P ) ) ) ) ) ) ) ) x x x x3 x3 x3 x33 x3 x3 x33 x3 x x3 x3 x3 x x3) x3 x33 x3 x3 x3 x33 b) 0. x 0. x3 0. SE x x and x 3 can not cover all Outports and 3 alone; that means we must choose at least two of them to build up the routing tree. There are two possible solutions fx ; x 3 g and fx ; x 3 g for MB the example shows it randomly chooses the rst solution. See Figure??e). The jroj of the second stage SE x x and x 3 are and respectively. The HMB randomly chooses x to cover third stage SE x 3 and x 33 for rst run. The uncover set U becomes fx 3 g. The current jroj of x and x 3 are 0 and respectively. The HMB chooses x 3 to nish the routing process and forms the routing tree shown in Figure??f). Th jrolbj of x x and x 3 are 0 and respectively. The HMBLB chooses x 3 to cover third stage SE x 3 and x 33 for rst run. The uncover set U becomes fx 3 g. The current jroj of x and x are 0 and respectively. The HMB chooses x to nish the routing process and forms the routing tree shown in Figure??g). There are two candidates x and x 3 in rst run of HMB. The HMB just randomly choose one. In contrast the HMBFF applies second criteria rst-t can choose x in rst run. The current jroj of x and x 3 are 0 and respectively. The HMB chooses x 3 to nish the routing process and forms the routing tree shown in Figure??h). x x3 x x3 4 Simulation study x x x3 x33 x c) 0. x3 x3 x3 x33 e) x3 x33 g) x3 x3 0. First Run RO) =0 RO) = RO3) = Second Run RO) =0 RO) = x x3 x33 d) x3 x3 x x3 x33 f) x3 x3 x3 x33 h) First Run RO) = RO) = RO3) = Second Run RO3) = First Run RO) = RO) = RO3) = Second Run RO3) = Figure : Example for illustrating all routing algorithms' solutions; a) all feasible paths b) 's c) LB's d)ff's e)mb's f)hmb's g)hmblb and h)hmbff's solutions The simulation experiment consists of two parts: the unicast routing and the multicast routing; where the former concerns routing the point to point and is a special case of the multicast routing. As discussed later the performance of the routing algorithms varies from the unicast routing to the multicast routing. A random algorithm ) is also implemented to serve as the benchmark algorithm. is to nd a multicast routing tree in such way every path is randomly chosen from all feasible paths of each outport and then merge them together. We have designed a simulator to compare the performance of those on-line routing algorithms we have discussed in the previous sections. The simulator is implemented using C++ with a general propose simulation package called CSIM[?]. All the simulation are obtained within 95% of the condence interval with % in halfwidth. In the simulation we study N N Clos networks for N= and 44 with expansion factor f set to. The bandwidth of the external and internal links are 50 Mbps. All streams request the same bandwidth or homogeneous streams) in the simulation i.e. k = ; 8k. We dene the link capacity k to be the total number of streams can be carried in a link. For example a 50 Mbps link can carry at most 3 of 50 Mbps streams thus k=3. The steam arrives are assumed to be Poisson and the life time is exponentially distributed with

4 mean set to 00 minutes. The system load is calculated as output port load and set from 0% to 00%. For the performance comparison we dene the performance metrics internal blocking ratio B i and performance gain for homogeneous simulation. The internal blocking ratio B i is calculated as b B i = i S total?b e where b i is the total number of internal blocking S total is the total number of arrival streams and b e is the total number external blocking. We deploy algorithm as our benchmark algorithm. The performance gain to benchmark algorithm is dened as b 0 = b r bi where b r is the internal blocking rate of Sensitivity Analysis of Link Stream Capacity N=64 M= L=.0) LB FF a) Sensitivity Analysis of Link Stream Capacity N=64 M= L=.0) /LB /FF 4. Unicast We notice that MB and HMB are both identical to under the unicast condition. Similarly HMBLB is equivalent to LB. Therefore only results of LB FF and are reported in this section. We vary the link stream capacity k from to 0 under varies system load. The Figure?? and?? show the results of unicast routing. Figure?? depicts the impact of the link stream capacity k to the system performance of the routing algorithms with N=64 and L=.0. As shown in Figure??a) the impact of k to the internal blocking ratio is signicant in particular the internal blocking ratio drops dramatically from k= to k=4 for all algorithms. Furthermore the internal blocking ratio remains relatively stable for FF when k 5 where it decreases continuously for LB as k increases. See Figure??b)).The similar results are obtained for all other tested cases with various system loads L) and network sizes N). The Figure?? shows the sensitivity analysis of network size. Figure??a) shows that the network size have signicant impact over the internal blocking ratio for all algorithms. Furtheremore the performance gain of FF over ) improves steadily as N increase as shown in Figure??b). Though the performance improvement of N is not as signicant as the other system parameters such as k. 4. Multicast In order to get more precise comparison on multicast degree we redene the multicast degree as the number of third-stage SEs involved and only one destination outport in each involved third-stage SE for all arrival streams. We set multicast degree M from to 5 and vary the link stream capacity k from to 6. The Figure???? and?? show the sensitivity analysis of link stream capacity k multicast degree M and network size N respectively. Notice that all Y-axes are in log scale. The condence interval is worse when the internal blocking ratio < 0?6. The Figure?? shows b) Figure : The sensitivity analysis of streams capacity k against the routing algorithms for N=64 and L=.0; a) internal blocking b) performance gain Sensitivity Analysis of Network Size M= k=3 L=.0) LB FF a) Sensitivity Analysis of Network Size M= k=3 L=.0) /LB /FF b) Figure 3: The sensitivity analysis of network size N against the routing algorithms with k=3; a) internal blocking b) performance gain.

5 0 Sensitivity Analysis of Network Size M=3 k=3 L=.0) e-05 e-06 Sensitivity Analysis of Link Stream Capacity N=64 M=3 L=.0) LB FF MB HMB HMBLB HMBFF e a) Sensitivity Analysis of Link Stream Capacity N=64 M=3 L=.0) /LB /FF /MB /HMB /HMBLB /HMBFF b) Figure 4: The sensitivity analysis of streams capacity k against the routing algorithms for N=64 M=3 and L=.0; a) internal blocking b) performance gain e-05 e-06 Sensitivity Analysis of Multicast Degree N=64 k=3 L=.0) MB HMB HMBLB HMBFF e Multicast Degree M a) Sensitivity Analysis of Multicast Degree N=64 k=3 L=.0) /MB /HMB /HMBLB /HMBFF Multicast Degree M b) Figure 5: The sensitivity analysis of multicast degree M against the routing algorithms for N=64 k=3 and L=.0; a) internal blocking b) performance gain. 00 e-05 e-06 MB HMB HMBLB HMBFF e a) Sensitivity Analysis of Network Size M=3 k=3 L=.0) /MB /HMB /HMBLB /HMBFF b) Figure 6: The sensitivity analysis of network size N against the routing algorithms for M=3 k=3 and L=.0; a) internal blocking b) performance gain. that LB and FF can only have at most 50% of the MB and HMB families' performace improvement when stream link capacity k=. The larger k is the performance of FF and LB are more incomparable to MB and HMB's. Therefore we will not discuss the FF and LB families under multicast routing cases furthere. Figure?? depicts the performance of the routing algorithms with N=64 M=3 and L=.0. The Y-axis of Figure??a) is raw internal blocking ratio and Figure??b)'s is performance gain. All algorithms perform better than the benchmark algorithm under all k. It clearly demonstrated that MB and HMB families are the clear winners and they follow by FF and LB. It also shows that the linear-complexity HMBLB performs even better than simple MB does. The Figure?? also demonstrates that the link stream capacity k) has major impact on the performance of all algorithms. For example the internal blocking ratio is below 0?5 when the link stream capacity is greater than 4 for N=64 M=3 Load=.0 as shown in Figure??. The Figure?? shows the sensitivity analysis of multicast degree M with N=64 k=3 and L=.0. The Figure?? shows the performance of the MB and HMB increases as the multicast degree increases. For example the internal blocking ratio of the HMB decreases from 00 to 0?5 as the multicast degree varies from to 4 as shown in Figure??a). The Figure?? also points out the fact that MB and HMB are both very eective in avoiding internal blocking as M 4. Figure?? shows the impact of the network size N on the performance of various algorithms with N=6 to 44 k=3 and L=.0. The internal blocking ratio

6 decreases as N increases for both MB and HMB families. We observe that both MB and HMB families are in eective decreasing rates when N increases. Their internal blocking ratio become almost negligible 0?5 for N 00). The HMB performs also as good as the expensive MB family for all network size. 4.3 Summary When the arrival streams are all heavy chunk request link stream capacity is below 5 the simplest heuristic FF is the best method to handle streams with high bandwidth requirement. The linear-time algorithm LB have better performance over FF when the arrival streams are small. That is the LB is the best routing algorithm for high speed network with tiny unicast stream request. Based on above observations the qualitative and quantitative eect of network size and link stream capacity are similar in both unicast and multicast routing. The LB has similar performance improvement over the even when the multicast degree increases. That is the LB can not help in multicast routing. The expansive MB is the best one in our simulations. Though the three linear-complexity HMB family can not beat MB's performance HMB can performs almost as good as MB does for all the cases we simulated. If we can stand the slight performance lost the HMB family is our best routing algorithm for multicast routing. 5 Conclusion This paper has focused on the on-line multicast routing problem where the call requests arrive and depart in random fashion. We study the multicast routing problem in Clos network with optimizing criteria network call acceptance rate. It is usually dicult to nd the optimal solution for real-life online problem such as multicast routing problem. The objective of this problem is to develop ecient algorithms that can nd multicast routing trees to maximize the network throughput. We propose three families of algorithms LB FF and MB. The simulation results show that the LB and the FF are good under unicast problem; the MB group are the best for multicast cases but very expensive. The performance of both MB and HMB are vary close; the HMB family are our best routing algorithm for multicast cases due to the advantage of their linear complexity. None of the proposed algorithms can be the best for both unicast and multicast routing in our simulation. Therefore the LB and HMB can be used together depended on whether the arrival stream is unicast or multicast. It has been recommended to use backpressure mechanism to alleviate the trac congestion at the output of SE[?]. It has been shown that the cell loss ratio signicantly decreases when the backpressure mechanism is deployed in point-to-point communication. It is not clear whether this remains the same in the case of multicast communication. Our routing algorithms can be extended to solve wide-area network routing problem. Multicast applications such as MBone have grown rapidly in recent years. We are currently working on this area. References [] J. Moy. \Multicast Routing Extensions for OSPF." Communication of ACM 378): [] S. E. Deering and D. R. Cheriton. \Multicast Routing In Datagram Internetworks and Extended LANs". IEEE transaction on Computers 8): [3] E. W. Dijkstra. \ A note on two problems in connexion with graphs". Numerische Mathemtik : [4] P. Winter. \Steiner problem in networks: A survey." Networks 7: [5] T. S. Yum and M. S. Chen. \Multicast Source Routing in Packet-Switched networks.\ IEEE Transaction on Communication 4/3/4): [6] B. K. Kadaba and J. M. Jae. \ Routing to multiple destinations in computer networks." IEEE Transactions on Communications. Com-33):343: [7] S.C. Liew. \Multicast Routing in 3-Stage Clos ATM Switching Networks." IEEE Transaction on Communication 4/3/4): [8] V. P. Kompella J. C. Pasquale and G. C. Ployzos. \Multicast Routing for Multimedia Communication." IEEE Transaction on Networking vol. no.3 pp [9] Ciro A. Noronha Jr. and Fouad A. Tobagi. \Optimum routing of multicast streams." In Proc. of IN- FOCOMM pp [0] V. Chvatal \A greedy heuristic for the setcovering problem." Mathematics of Operating Research 43): [] H. Schwetmen CSIM Users' Guide. Microelectronics and Computer Technology Corporation Austin TX USA 990. [] Daniel Dais and J. R. Jump. \Analysis and Simulation of Buered Delta Network." IEEE Transaction on Computers C-30:73-8 April 98.

source3 Backbone s1 s2 R2 R3

source3 Backbone s1 s2 R2 R3 Fast and Optimal Multicast-Server Selection Based on Receivers' Preference Akihito Hiromori 1, Hirozumi Yamaguchi 1,Keiichi Yasumoto 2, Teruo Higashino 1, and Kenichi Taniguchi 1 1 Graduate School of Engineering

More information

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science MDP Routing in ATM Networks Using the Virtual Path Concept 1 Ren-Hung Hwang, James F. Kurose, and Don Towsley Department of Computer Science Department of Computer Science & Information Engineering University

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints

The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints Minying Sun*,Hua Wang* *Department of Computer Science and Technology, Shandong University, China Abstract

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois Dynamic Multi-Path Communication for Video Trac Hao-hua Chu, Klara Nahrstedt Department of Computer Science University of Illinois h-chu3@cs.uiuc.edu, klara@cs.uiuc.edu Abstract Video-on-Demand applications

More information

Routing in High Speed Networks. Technical Report Edition 1.0. John Crawford and Gill Waters.

Routing in High Speed Networks. Technical Report Edition 1.0. John Crawford and Gill Waters. Low Cost Quality of Service Multicast Routing in High Speed Networks Technical Report 13-97 - Edition 1.0 John Crawford and Gill Waters J.S.Crawford@ukc.ac.uk, A.G.Waters@ukc.ac.uk Computing Laboratory

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Cooperative Data Dissemination to Mission Sites

Cooperative Data Dissemination to Mission Sites Cooperative Data Dissemination to Mission Sites Fangfei Chen a, Matthew P. Johnson b, Amotz Bar-Noy b and Thomas F. La Porta a a Department of Computer Science and Engineering, the Pennsylvania State University

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

Simulation of an ATM{FDDI Gateway. Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar

Simulation of an ATM{FDDI Gateway. Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar Simulation of an ATM{FDDI Gateway Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar milind@dworkin.wustl.edu kapoor@dworkin.wustl.edu guru@flora.wustl.edu (314) 935-4203 (314) 935 4203 (314) 935-4621

More information

On the Use of Multicast Delivery to Provide. a Scalable and Interactive Video-on-Demand Service. Kevin C. Almeroth. Mostafa H.

On the Use of Multicast Delivery to Provide. a Scalable and Interactive Video-on-Demand Service. Kevin C. Almeroth. Mostafa H. On the Use of Multicast Delivery to Provide a Scalable and Interactive Video-on-Demand Service Kevin C. Almeroth Mostafa H. Ammar Networking and Telecommunications Group College of Computing Georgia Institute

More information

MC member other network node. Link used by the MC Link not used by the MC. Cell forwarding at X: cell forwarding. cell arrivial

MC member other network node. Link used by the MC Link not used by the MC. Cell forwarding at X: cell forwarding. cell arrivial Switch-Aided Flooding Operations in ATM Networks Yih Huang and Philip K. McKinley Department of Computer Science Michigan State University East Lansing, Michigan 48824 fhuangyih, mckinleyg@cps.msu.edu

More information

Multimedia Services. Shahab Baqai, Miae Woo, Arif Ghafoor. Purdue University. West Lafayette, Indiana

Multimedia Services. Shahab Baqai, Miae Woo, Arif Ghafoor. Purdue University. West Lafayette, Indiana Network Resource Management for Enterprise-wide Multimedia Services Shahab Baqai, Miae Woo, Arif Ghafoor Distributed Multimedia Systems Lab. School of Electrical Engineering Purdue University West Lafayette,

More information

A Fast Recursive Mapping Algorithm. Department of Computer and Information Science. New Jersey Institute of Technology.

A Fast Recursive Mapping Algorithm. Department of Computer and Information Science. New Jersey Institute of Technology. A Fast Recursive Mapping Algorithm Song Chen and Mary M. Eshaghian Department of Computer and Information Science New Jersey Institute of Technology Newark, NJ 7 Abstract This paper presents a generic

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E- mail: sj ko h @ pcc.c t ri.rc.k Abstract In this paper, we propose a simple

More information

Delivery Network on the Internet

Delivery Network on the Internet Optimal erver Placement for treaming Content Delivery Network on the Internet Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University of cience and Technology

More information

Connection Link Connection Member Intermediate Switch. Connection Link Receiver member Intermediate Switch Source member

Connection Link Connection Member Intermediate Switch. Connection Link Receiver member Intermediate Switch Source member Proceedings of the 996 IEEE International Conference on Distributed Computing Systems, pp 5-, Hong Kong, May 996 A Lightweight Protocol for Multipoint Connections under Link-State Routing Yih Huang and

More information

Process Allocation for Load Distribution in Fault-Tolerant. Jong Kim*, Heejo Lee*, and Sunggu Lee** *Dept. of Computer Science and Engineering

Process Allocation for Load Distribution in Fault-Tolerant. Jong Kim*, Heejo Lee*, and Sunggu Lee** *Dept. of Computer Science and Engineering Process Allocation for Load Distribution in Fault-Tolerant Multicomputers y Jong Kim*, Heejo Lee*, and Sunggu Lee** *Dept. of Computer Science and Engineering **Dept. of Electrical Engineering Pohang University

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Department of Computer Science. a vertex can communicate with a particular neighbor. succeeds if it shares no edge with other calls during

Department of Computer Science. a vertex can communicate with a particular neighbor. succeeds if it shares no edge with other calls during Sparse Hypercube A Minimal k-line Broadcast Graph Satoshi Fujita Department of Electrical Engineering Hiroshima University Email: fujita@se.hiroshima-u.ac.jp Arthur M. Farley Department of Computer Science

More information

GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks

GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks IEEE International Conference on Ad hoc and Sensor Systems 19-22 October 2015, Dallas, USA GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks Boutheina Dab Ilhem Fajjari,

More information

Multicast Communications. Tarik Čičić, 4. March. 2016

Multicast Communications. Tarik Čičić, 4. March. 2016 Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast

More information

TECHNICAL RESEARCH REPORT

TECHNICAL RESEARCH REPORT TECHNICAL RESEARCH REPORT A Resource Reservation Scheme for Synchronized Distributed Multimedia Sessions by W. Zhao, S.K. Tripathi T.R. 97-14 ISR INSTITUTE FOR SYSTEMS RESEARCH Sponsored by the National

More information

Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks

Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks Mobile Networks and Applications 6, 251 263, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks JEFFREY

More information

Numerical Evaluation of Hierarchical QoS Routing. Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar. Computer Science Department and UMIACS

Numerical Evaluation of Hierarchical QoS Routing. Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar. Computer Science Department and UMIACS Numerical Evaluation of Hierarchical QoS Routing Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar Computer Science Department and UMIACS University of Maryland, College Park CS-TR-395 April 3, 1998

More information

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center Ecient Buer Sharing in Shared Memory ATM Systems With Space Priority Trac Rajarshi Roy and Shivendra S Panwar y Center for Advanced Technology in Telecommunications Polytechnic University 6 Metrotech Center

More information

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of

More information

A Fuzzy System for Adaptive Network Routing

A Fuzzy System for Adaptive Network Routing A Fuzzy System for Adaptive Network Routing A. Pasupuleti *, A.V. Mathew*, N. Shenoy** and S. A. Dianat* Rochester Institute of Technology Rochester, NY 14623, USA E-mail: axp1014@rit.edu Abstract In this

More information

OPTIMIZATION PROBLEMS IN MULTICAST TREE CONSTRUCTION

OPTIMIZATION PROBLEMS IN MULTICAST TREE CONSTRUCTION OPTIMIZATION PROBLEMS IN MULTICAST TREE CONSTRUCTION C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Multicasting is a technique for data routing in networks that allows multiple destinations

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Configuring IGRP. The Cisco IGRP Implementation

Configuring IGRP. The Cisco IGRP Implementation Configuring IGRP This chapter describes how to configure the Interior Gateway Routing Protocol (IGRP). For a complete description of the IGRP commands in this chapter, refer to the IGRP s chapter of the

More information

Matrix Unit Cell Scheduler (MUCS) for. Input-Buered ATM Switches. Haoran Duan, John W. Lockwood, and Sung Mo Kang

Matrix Unit Cell Scheduler (MUCS) for. Input-Buered ATM Switches. Haoran Duan, John W. Lockwood, and Sung Mo Kang Matrix Unit Cell Scheduler (MUCS) for Input-Buered ATM Switches Haoran Duan, John W. Lockwood, and Sung Mo Kang University of Illinois at Urbana{Champaign Department of Electrical and Computer Engineering

More information

To Appear: Proc. IEEE ICC'96 Conference, Dallas, June A Bandwidth Control Scheme for Connectionless ATM

To Appear: Proc. IEEE ICC'96 Conference, Dallas, June A Bandwidth Control Scheme for Connectionless ATM To Appear: roc. IEEE ICC'96 Conference, Dallas, June 996. A Bandwidth Control Scheme for Connectionless ATM Trac with Multiple Trac Classes Jorg Liebeherr y Ian F. Akyildiz z Debapriya Sarkar? y Computer

More information

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Yunghsiang S. Han, Jing Deng and Zygmunt J. Haas Graduate Institute of Communication Engineering National Taipei University,

More information

Heap-on-Top Priority Queues. March Abstract. We introduce the heap-on-top (hot) priority queue data structure that combines the

Heap-on-Top Priority Queues. March Abstract. We introduce the heap-on-top (hot) priority queue data structure that combines the Heap-on-Top Priority Queues Boris V. Cherkassky Central Economics and Mathematics Institute Krasikova St. 32 117418, Moscow, Russia cher@cemi.msk.su Andrew V. Goldberg NEC Research Institute 4 Independence

More information

Comparative Study of blocking mechanisms for Packet Switched Omega Networks

Comparative Study of blocking mechanisms for Packet Switched Omega Networks Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 18 Comparative Study of blocking mechanisms for Packet

More information

Minimum Energy Paths for Reliable Communication in Multi-hop. Wireless Networks CS-TR December Introduction

Minimum Energy Paths for Reliable Communication in Multi-hop. Wireless Networks CS-TR December Introduction Minimum Energy Paths for Reliable Communication in Multi-hop Wireless Networks Suman Banerjee Department of Computer Science University of Maryland at College Park College Park, MD 20742, USA Archan Misra

More information

On-Line Routing in WDM-TDM Switched Optical Mesh Networks

On-Line Routing in WDM-TDM Switched Optical Mesh Networks On-Line Routing in WDM-TDM Switched Optical Mesh Networks Arun Vishwanath and Weifa Liang Department of Computer Science The Australian National University Canberra, ACT-0200, Australia Email: {arunv,wliang}@cs.anu.edu.au

More information

Implementations of Dijkstra's Algorithm. Based on Multi-Level Buckets. November Abstract

Implementations of Dijkstra's Algorithm. Based on Multi-Level Buckets. November Abstract Implementations of Dijkstra's Algorithm Based on Multi-Level Buckets Andrew V. Goldberg NEC Research Institute 4 Independence Way Princeton, NJ 08540 avg@research.nj.nec.com Craig Silverstein Computer

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

An ATM Network Planning Model. A. Farago, V.T. Hai, T. Cinkler, Z. Fekete, A. Arato. Dept. of Telecommunications and Telematics

An ATM Network Planning Model. A. Farago, V.T. Hai, T. Cinkler, Z. Fekete, A. Arato. Dept. of Telecommunications and Telematics An ATM Network Planning Model A. Farago, V.T. Hai, T. Cinkler, Z. Fekete, A. Arato Dept. of Telecommunications and Telematics Technical University of Budapest XI. Stoczek u. 2, Budapest, Hungary H-1111

More information

Role of Genetic Algorithm in Routing for Large Network

Role of Genetic Algorithm in Routing for Large Network Role of Genetic Algorithm in Routing for Large Network *Mr. Kuldeep Kumar, Computer Programmer, Krishi Vigyan Kendra, CCS Haryana Agriculture University, Hisar. Haryana, India verma1.kuldeep@gmail.com

More information

Performance of a Switched Ethernet: A Case Study

Performance of a Switched Ethernet: A Case Study Performance of a Switched Ethernet: A Case Study M. Aboelaze A Elnaggar Dept. of Computer Science Dept of Electrical Engineering York University Sultan Qaboos University Toronto Ontario Alkhod 123 Canada

More information

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Al-Baadani, Faris., Yousef, S., Tapaswi, S., Patnaik, K. K., and Cole, M Faculty

More information

The only known methods for solving this problem optimally are enumerative in nature, with branch-and-bound being the most ecient. However, such algori

The only known methods for solving this problem optimally are enumerative in nature, with branch-and-bound being the most ecient. However, such algori Use of K-Near Optimal Solutions to Improve Data Association in Multi-frame Processing Aubrey B. Poore a and in Yan a a Department of Mathematics, Colorado State University, Fort Collins, CO, USA ABSTRACT

More information

Reliable Video Broadcasting for the E-Learning Environment

Reliable Video Broadcasting for the E-Learning Environment Reliable Video Broadcasting for the E-Learning Environment Mahmood Abdul Hakeem Abbood 1, Prof. Dr. Nasser Nafe a Khamees 2 Master Students, The informatics Institute for Postgraduate Studies, Iraqi Commission

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

Uncontrollable. High Priority. Users. Multiplexer. Server. Low Priority. Controllable. Users. Queue

Uncontrollable. High Priority. Users. Multiplexer. Server. Low Priority. Controllable. Users. Queue Global Max-Min Fairness Guarantee for ABR Flow Control Qingyang Hu, David W. Petr Information and Telecommunication Technology Center Department of Electrical Engineering & Computer Science The University

More information

Lecture on Computer Networks

Lecture on Computer Networks Lecture on Computer Networks Historical Development Copyright (c) 28 Dr. Thomas Haenselmann (Saarland University, Germany). Permission is granted to copy, distribute and/or modify this document under the

More information

Channel Allocation for Averting the Exposed Terminal Problem in a Wireless Mesh Network

Channel Allocation for Averting the Exposed Terminal Problem in a Wireless Mesh Network Channel Allocation for Averting the Exposed Terminal Problem in a Wireless Mesh Network The wireless stations in a CSMA/CA wireless LAN access system connect directly to each other to form a wireless mesh

More information

Multicast Communications

Multicast Communications Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication

More information

Chapter. CAC & Routing Strategies

Chapter. CAC & Routing Strategies Chapter 5 CAC & Routing Strategies CONNECTION admission control and routing functions are key elements of resource management and trac control in broadband networks. They can inuence signicantly several

More information

R-D points Predicted R-D. R-D points Predicted R-D. Distortion (MSE) Distortion (MSE)

R-D points Predicted R-D. R-D points Predicted R-D. Distortion (MSE) Distortion (MSE) A SCENE ADAPTIVE BITRATE CONTROL METHOD IN MPEG VIDEO CODING Myeong-jin Lee, Soon-kak Kwon, and Jae-kyoon Kim Department of Electrical Engineering, KAIST 373-1 Kusong-dong Yusong-gu, Taejon, Korea ABSTRACT

More information

Routing and Traffic Engineering in Hybrid RF/FSO Networks*

Routing and Traffic Engineering in Hybrid RF/FSO Networks* Routing and Traffic Engineering in Hybrid RF/FSO Networks* Abhishek Kashyap and Mark Shayman Department of Electrical and Computer Engineering, University of Maryland, College Park MD 20742 Email: {kashyap,

More information

AN ABSTRACT OF THE THESIS OF. Arul Nambi Dhamodaran for the degree of Master of Science in

AN ABSTRACT OF THE THESIS OF. Arul Nambi Dhamodaran for the degree of Master of Science in AN ABSTRACT OF THE THESIS OF Arul Nambi Dhamodaran for the degree of Master of Science in Electrical and Computer Engineering presented on September 12, 2011. Title: Fast Data Replenishment in Peer to

More information

Expected Time: 90 min PART-A Max Marks: 42

Expected Time: 90 min PART-A Max Marks: 42 Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:

More information

Chunk Scheduling Strategies In Peer to Peer System-A Review

Chunk Scheduling Strategies In Peer to Peer System-A Review Chunk Scheduling Strategies In Peer to Peer System-A Review Sanu C, Deepa S S Abstract Peer-to-peer ( P2P) s t r e a m i n g systems have become popular in recent years. Several peer- to-peer systems for

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:

More information

Implementation of Multicast Routing on IPv4 and IPv6 Networks

Implementation of Multicast Routing on IPv4 and IPv6 Networks Implementation of Multicast Routing on IPv4 and IPv6 Networks Dr.Sridevi, Assistant Professor, Dept of Computer Science, Karnatak University, Dharwad. Abstract: Fast developing world of technology, multimedia

More information

This paper describes and evaluates the Dual Reinforcement Q-Routing algorithm (DRQ-Routing)

This paper describes and evaluates the Dual Reinforcement Q-Routing algorithm (DRQ-Routing) DUAL REINFORCEMENT Q-ROUTING: AN ON-LINE ADAPTIVE ROUTING ALGORITHM 1 Shailesh Kumar Risto Miikkulainen The University oftexas at Austin The University oftexas at Austin Dept. of Elec. and Comp. Engg.

More information

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Routing High-bandwidth Trac in Max-min Fair Share Networks. Qingming Ma Peter Steenkiste Hui Zhang. Carnegie Mellon University. Pittsburgh, PA 15213

Routing High-bandwidth Trac in Max-min Fair Share Networks. Qingming Ma Peter Steenkiste Hui Zhang. Carnegie Mellon University. Pittsburgh, PA 15213 Routing High-bandwidth Trac in Max-min Fair Share Networks Qingming Ma Peter Steenkiste Hui Zhang School of Computer Science Carnegie Mellon University Pittsburgh, PA 5 fqma, prs, hzhangg@cs.cmu.edu Abstract

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER Network Layer Network layer manages options pertaining to host and network addressing, managing subnetworks, and internetworking.

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

CQNCR: Optimal VM Migration Planning in Cloud Data Centers

CQNCR: Optimal VM Migration Planning in Cloud Data Centers CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,

More information

Expert Network. Expert. Network

Expert Network. Expert. Network ATM Connection Admission Control using Modular Neural s Chen-Khong Tham &Wee-Seng Soh Dept of Electrical Engineering, National University of Singapore, Singapore 9260. Tel. (65) 772 7959, Fax: (65) 779

More information

Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers

Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers Simulation Analysis of Linear Programming Based Load Balancing Algorithms for Routers School of Computer Science & IT Devi Ahilya University, Indore ABSTRACT The work in this paper is the extension of

More information

Multiple LAN Internet Protocol Converter (MLIC) for Multimedia Conferencing

Multiple LAN Internet Protocol Converter (MLIC) for Multimedia Conferencing Multiple LAN Internet Protocol Converter (MLIC) for Multimedia Conferencing Tat Chee Wan (tcwan@cs.usm.my) R. Sureswaran (sures@cs.usm.my) K. Saravanan (sara@network2.cs.usm.my) Network Research Group

More information

IV. PACKET SWITCH ARCHITECTURES

IV. PACKET SWITCH ARCHITECTURES IV. PACKET SWITCH ARCHITECTURES (a) General Concept - as packet arrives at switch, destination (and possibly source) field in packet header is used as index into routing tables specifying next switch in

More information

Predicting connection quality in peer-to-peer real-time video streaming systems

Predicting connection quality in peer-to-peer real-time video streaming systems Predicting connection quality in peer-to-peer real-time video streaming systems Alex Giladi Jeonghun Noh Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

General Algorithms for Construction of Broadcast and Multicast Trees with Applications to Wireless Networks

General Algorithms for Construction of Broadcast and Multicast Trees with Applications to Wireless Networks JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 7, NO. 3, SEPTEMBER 2005 1 General Algorithms for Construction of Broadcast and Multicast Trees with Applications to Wireless Networks Gam D. Nguyen Abstract:

More information

1 Introduction Multicast communication is an ecient method for disseminating data in a multicast group with a sender and a set of receivers. Many mult

1 Introduction Multicast communication is an ecient method for disseminating data in a multicast group with a sender and a set of receivers. Many mult GSGC: An Ecient Gossip-Style Garbage Collection Scheme for Scalable Reliable Multicast Katherine Guo, Mark Hayden, Robbert van Renesse, Werner Vogels and Kenneth P. Birman Department of Computer Science

More information

CS533 Modeling and Performance Evaluation of Network and Computer Systems

CS533 Modeling and Performance Evaluation of Network and Computer Systems CS533 Modeling and Performance Evaluation of Network and Computer Systems Selection of Techniques and Metrics (Chapter 3) 1 Overview One or more systems, real or hypothetical You want to evaluate their

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#2 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

Network Adaptability under Resource Crunch. Rafael Braz Rebouças Lourenço Networks Lab - UC Davis Friday Lab Meeting - April 7th, 2017

Network Adaptability under Resource Crunch. Rafael Braz Rebouças Lourenço Networks Lab - UC Davis Friday Lab Meeting - April 7th, 2017 Network Adaptability under Resource Crunch Rafael Braz Rebouças Lourenço Networks Lab - UC Davis Friday Lab Meeting - April 7th, 2017 Outline What is Resource Crunch Problem Statement Example 1 Connection

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

A Performance Evaluation Architecture for Hierarchical PNNI and Performance Evaluation of Different Aggregation Algorithms in Large ATM Networks

A Performance Evaluation Architecture for Hierarchical PNNI and Performance Evaluation of Different Aggregation Algorithms in Large ATM Networks A Performance Evaluation Architecture for Hierarchical PNNI and Performance Evaluation of Different Aggregation Algorithms in Large ATM Networks Gowri Dhandapani 07/17/2000 Organization PNNI Basics Motivation

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

CS533 Modeling and Performance Evaluation of Network and Computer Systems

CS533 Modeling and Performance Evaluation of Network and Computer Systems CS533 Modeling and Performance Evaluation of Network and Computer s Selection of Techniques and Metrics Overview One or more systems, real or hypothetical You want to evaluate their performance What technique

More information

A Centralized, Tree-Based Approach to Network Repair Service for. Multicast Streaming Media. Dan Rubenstein, Nicholas F. Maxemchuk, David Shur

A Centralized, Tree-Based Approach to Network Repair Service for. Multicast Streaming Media. Dan Rubenstein, Nicholas F. Maxemchuk, David Shur A Centralized, Tree-Based Approach to Network Repair Service for Multicast Streaming Media Dan Rubenstein, Nicholas F. Maxemchuk, David Shur AT&T Technical Memorandum TM HA1720000-991129-03 November, 1999

More information

Rate-Controlled Static-Priority. Hui Zhang. Domenico Ferrari. hzhang, Computer Science Division

Rate-Controlled Static-Priority. Hui Zhang. Domenico Ferrari. hzhang, Computer Science Division Rate-Controlled Static-Priority Queueing Hui Zhang Domenico Ferrari hzhang, ferrari@tenet.berkeley.edu Computer Science Division University of California at Berkeley Berkeley, CA 94720 TR-92-003 February

More information

\Classical" RSVP and IP over ATM. Steven Berson. April 10, Abstract

\Classical RSVP and IP over ATM. Steven Berson. April 10, Abstract \Classical" RSVP and IP over ATM Steven Berson USC Information Sciences Institute April 10, 1996 Abstract Integrated Services in the Internet is rapidly becoming a reality. Meanwhile, ATM technology is

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 21, minutes CS 421: COMPUTER NETWORKS SPRING 2015 FINAL May 21, 2015 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Distributed Quality-of-Service Routing in High-Speed Networks Based on. Selective Probing. Shigang Chen, Klara Nahrstedt.

Distributed Quality-of-Service Routing in High-Speed Networks Based on. Selective Probing. Shigang Chen, Klara Nahrstedt. Distributed Quality-of-Service Routing in High-Speed Networks Based on Selective Probing Shigang Chen, Klara Nahrstedt Department of Computer Science University of Illinois at Urbana-Champaign Urbana,

More information

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,

More information

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy ONE: The Ohio Network Emulator Mark Allman, Adam Caldwell, Shawn Ostermann mallman@lerc.nasa.gov, adam@eni.net ostermann@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University

More information