THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS

Similar documents
G BAM: A Generalized Bandwidth Allocation Model for IP/MPLS/DS-TE Networks

Progress Report No. 3. A Case Study on Simulation Scenario

Improving the usage of Network Resources using MPLS Traffic Engineering (TE)

QoS Performance Analysis in Deployment of DiffServ-aware MPLS Traffic Engineering

MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino)

Syed Mehar Ali Shah 1 and Bhaskar Reddy Muvva Vijay 2* 1-

An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation

MPLS Traffic Engineering DiffServ Aware (DS-TE)

Converged Networks. Objectives. References

Research Article Average Bandwidth Allocation Model of WFQ

Evaluation of Performance for Optimized Routing in MPLS Network

internet technologies and standards

MPLS Multi-Protocol Label Switching

Internetworking with Different QoS Mechanism Environments

Telematics Chapter 7: MPLS

Performance Evaluation of IPv4 and IPv6 over MPLS using OPNET

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL

Quality of Service II

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino)

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Multi Protocol Label Switching

Presentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015

H3C S9500 QoS Technology White Paper

International Workshop NGNT 31. DiffServ and MPLS. Tímea Dreilinger

6 MPLS Model User Guide

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

QoS Technology White Paper

A MPLS Simulation for Use in Design Networking for Multi Site Businesses

Towards an Adaptive and Intelligent MPLS Network

Improve the QoS by Applying Differentiated Service over MPLS Network

Performance Evaluation of Real Time Traffic over MPLS Networks under Different QoS Conditions

An Enhanced MPLS-TE For Transferring Multimedia packets

سوي يچينگ و مسيريابي در شبكه

University of Cape Town

Optimization of Network Redundant Technologies Collaboration in IMS Carrier Topology

Trafffic Engineering 2015/16 1

MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino)

Extending MPLS Traffic Engineering to deal with QoS

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Deploying MPLS & DiffServ

Advanced Computer Networks

Lecture 13. Quality of Service II CM0256

MPLS Intro. Cosmin Dumitru March 14, University of Amsterdam System and Network Engineering Research Group ...

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Advanced Fuzzy Class-Based Routing in MPLS-TE Networks

Configuring Quality of Service

DiffServ Architecture: Impact of scheduling on QoS

Design and Evaluation of Diffserv Functionalities in the MPLS Edge Router Architecture

MPLS DiffServ-aware Traffic Engineering

Performance Analysis of Frame Relay Network Using OSPF (Open Shortest Path First) and MPLS (Multi-Protocol Label Switching) based on GNS3

Multi-Protocol Label Switching

Configuring Quality of Service for MPLS Traffic

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning

DiffServ over MPLS: Tuning QOS parameters for Converged Traffic using Linux Traffic Control

Understanding SROS Priority Queuing, Class-Based WFQ, and QoS Maps

DiffServ over MPLS: Tuning QOS parameters for Converged Traffic using Linux Traffic Control

CS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

Converged Communication Networks

QoS Technology White Paper

QoS Services with Dynamic Packet State

Embedded MPLS Architecture

Diffserv over MPLS QoS Policy Management

MPLS Traffic Engineering -- DiffServ Aware (DS- TE)

QoS for Real Time Applications over Next Generation Data Networks

Configuring QoS CHAPTER

DIFFSERV BASED QOS PERFORMANCE STUDY OF VIDEO CONFERENCING APPLICATION USING TRADITIONAL IP AND MPLS-TE NETWORKS OVER IPV4 AND IPV6

Sections Describing Standard Software Features

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior

MultiProtocol Label Switching - MPLS ( RFC 3031 )

Session 2: MPLS Traffic Engineering and Constraint-Based Routing (CR)

Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

Configuring Modular QoS Congestion Avoidance

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Overview of the RSVP-TE Network Simulator: Design and Implementation

Implementing QOS Policy in MPLS Network

Performance Evaluation of MPLS TE Signal Protocols with Different Audio Codecs for Voice Application

RSVP-TE daemon for DiffServ over MPLS under Linux Features, Components and Architecture

Billing Schemes Evaluation for Different Network Scenarios

Grandstream Networks, Inc. GWN7000 QoS - VoIP Traffic Management

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

Lecture Outline. Bag of Tricks

Sections Describing Standard Software Features

Basics (cont.) Characteristics of data communication technologies OSI-Model

IP Differentiated Services

Measuring MPLS overhead

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Simulation-based examination of MPLS/RSVP-TE-based Radio Access Networks. Technical University of Ilmenau (Germany) Chair for Integrated HW/SW Systems

Differentiation of Services in IMS over MPLS Network Core

Cisco. Implementing Cisco Service Provider Next-Generation Core Network Services Version: Demo. Web:

Configuring Flow Aware QoS

Configuring Firewall Filters (J-Web Procedure)

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures

Routing and admission control issues for LSPs in MPLS networks

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services

ASSOCIATION OF MPLS_TE AND DIFFSERV TO AMELIORATE THE QOS IN MPLS ARCHITECTURE

Transcription:

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE THE EFFICIENCY OF CONSTRAINT BASED ROUTING IN MPLS NETWORKS Martin MEDVECKY Department of Telecommunications, Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Ilkovicova, 9 Bratislava, Slovakia martin.medvecky@stuba.sk Abstract. The paper presents the simulation results and evaluates the efficiency of constraint base routing algorithms used in MPLS network from the point of their usability in Next Generation Networks. The efficiency of constraint based routing is evaluated according following criteria: optimal path selection, routing priority of traffic flows selected for constraint routing and bandwidth allocation by MAM or RDM bandwidth constraints models. Keywords Constraint routing, maximum allocation model, Russian Doll Model, MPLS, QoS.. Introduction The MPLS (Multiprotocol Label Switching) [] is a connection oriented packet network technology originally proposed to simplify and speed up a packet processing in broadband network nodes. Today the MPLS is considered as a core transport technology for NGN (Next Generation Network), therefore it should support real-time QoS sensitive services like voice, video, etc. Real time services have a strict QoS requirement on delay, jitter, packet loss etc []. There were no implicit QoS mechanisms proposed in MPLS, the quality of service can be achieved by a combination of several individual mechanisms. The proposed paper investigates the traffic routing methods as a one of the Quality of Service supporting mechanism. There are three types of traffic routing used in MPLS: Hop-by-hop routing, Explicit routing, Constraint routing. The hop-by-hop routing use a plain IP routing algorithms and does not provide adequate QoS quality due to impossibility to distinguish routing of packets through the network according to QoS constraints. The Label Switched Path (LSP) is established according the route selected by routing algorithms, usually a shortest path is selected, and in the fault state (congestion, connection breakdown, etc.) the guaranteed bandwidth is not available even for packets with highest priority. Explicit routing uses LSPs explicitly selected by a network administrator. The routing can be considering QoS parameters and a real state of the network. The traffic can be classified into different QoS classis and for each Forwarding Equivalency Class (FEC) a different route can be selected. The explicit routing is not suitable for large networks. Constraint routing is a more sophisticated type of explicit routing. Constraint-based routing use a new generation of routing algorithms (e.g. OSPF-TE) taking in account more link parameters than traditional routing algorithms. Unfortunately the existing constraint routing algorithms route only single flows and does not consider the other flows routing. The constraint routing can be affected by bandwidth allocations as well.. Bandwidth Constraints Models There are three bandwidth constraints models proposed up today: Maximum Allocation Model (MAM) [] - the maximum allowable bandwidth usage of each class type (CT) is explicitly specified, Russian Doll Model (RDM) [] - the maximum allowable bandwidth usage is done cumulatively by grouping successive CTs according to priority ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 96

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE classes, Maximum Allocation with Reservation Model (MAR) [5] - it is similar to MAM in that a maximum bandwidth allocation is given to each CT. However, through the use of bandwidth reservation and protection mechanisms, CTs are allowed to exceed their bandwidth allocations under conditions of no congestion but revert to their allocated bandwidths when overload and congestion occurs. Although the comparison of different routing technique in MPLS has been investigated in [6] the bandwidth allocation model has not be considered... MAM Model Maximum Allocation Bandwidth Constraints Model is defined in the following manner: Assume that Maximum Number of Bandwidth Constraints Q is equal to Maximum Number of Class- Types Y: Q = Y =. () For each value of n in the range n (Y - ): and B RCTn Y - å n= BC B, () n MaxR B RCT B MaxR, () n where B RCTn is the Bandwidth Reserved for Class Type n, BC n is the Bandwidth Constraint for Class Type n a B MaxR is the Maximum Reservable Bandwidth. The sum of Bandwidth Constraints theoretically may exceed the B MaxR, so that the following relationship may hold true: Y - å n= BC >, () n B MaxR but usually the sum of Bandwidth Constraints will be equal to (or below) the Maximum Reservable Bandwidth Y - å n=.. RDM Model BC, (5) n B MaxR RDM model is defined in a similar manner. We expect condition (). ): Then for each value of b in the range b (Y - Let: then Y - å n= b B RCT n BC = Y - å B RCTn n= BC b. (6) B MaxR, () B. () MaxR. Simulation Experiments To investigate a performance of constraint based routing in MPLS from the point of QoS provisioning for QoS sensitive telecommunication services and efficiency of bandwidth utilization the special simulation model was proposed. All simulations have been done using ns-... Simulation Model All simulations use the same network architecture. A simulation network topology is shown in Fig.. All traffic flows are generated by Source node (node ) and they are routed to four destination nodes (nodes ). The MPLS network is composed of an Ingress Label Edge Router (I-LER), an Egress Label Edge Routers (E- LER) and five Label Switching Routers (s). The MPLS routers are interconnected with Mbps or Mbps links. The external link between Source node (node ) and I-LER (node ) is Mbps, the links between E-LER (node ) and destination nodes (nodes ) are Mbps. Ingress and egress Label Edge Routers (node and node ) are interconnected by two different network segments. The shorter upper segment contains only two Label Switch Routers ( and ) and it is preferred by classical hop-by-hop routing algorithms. Theoretically, in non congested situation, the packets routed through the upper segment have a smaller delay; therefore the upper segment should be preferred by real time services (e.g. voice). The upper segment throughput is Mbps. The longer bottom segment contains three s (, 5 and 6) and one additional line leading to higher delay and therefore it is less suitable for real time services. The bottom segment throughput is Mbps. The s in both segments are interconnected by intermediate Mbps links that can be used to create an alternative path. This path has a throughput up to Mbps. As queue management algorithms a CBQ is applied on MPLS nodes and a drop-tail on external nodes. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 9

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE Source Fig. : Tab.: I-LER 5 6 Network topology (bit rates are in Mbps). Traffic flows parameters. E-LER 9 Traffic Bit Rate (kbps) Packet Size (Bytes) Traffic Type Transport Protocol 95 CBR RTP 5 CBR RTP EXP UDP Unlimited 5 TCP time 5 seconds. As can be seen all flows are affected by congestion and no flow got the required bandwidth. Figure shows delays and jitters of voice, video, data and flows. Because the traffic is not classified by QoS classes all flows have approximately the same delay and jitter (see Tab. ).,,,6,5,,,,,9 5 5 5 There are four traffic flows generated in each simulation representing voice, video, raw data and traffic. The traffic parameters are shown in Tab..,, a).. Hop-by-Hop Routing The hop-by-hop routing does not provide adequate QoS guaranty. All traffic flows are routed by hop-by-hop routing (shortest path selected). Even there is an available bandwidth on the network, it is not used. All traffic flows compete to Mbps link LER-. The link is congested and many packets from all flows are discarded (see Tab. ). Throughput,,6,,,,6,, Fig. : 5 5 5 Throughput of voice, video, data and flows (hop-by-hop routing, WS=). Figure shows the throughput of voice, video, and data flows. The flow starts in time second and up to 5 seconds uses the whole bandwidth. The voice flow starts in time 5 seconds and competes with flow for bandwidth. Because the voice flow uses an UDP and the flow uses a TCP the flow slow down to the rest available bandwidth. The video flow starts in time seconds. Because the voice and video flows require more bandwidth then the link capacity there is no available bandwidth for the flow and the flow slowdown to zero. As the last one starts the data flow in,6,5,,,,,9,,,6,5,,,, 5 5 5,9,,,6,5,,,, b) 5 5 5 c) 5 5 5 d) Fig. : and jitter of voice, video, data and flows (hop-byhop routing, WS=). ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 9

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE Tab.: Packet loss (Hop-by-Hop Routing). Traffic Flow Sent Dropped / Retransmissions* 5 6, % 59,6 % 95 55,5 % 9 *, %* Source I-LER 5 6 E-LER 9 Tab.: and jitter (Hop-by-Hop Routing). Traffic [ms] [ms] Flow Mean Max Mean Max 5, 9,,6,95 59, 6,6,6, 6,6 9,,9, 55,,,,.. Explicit Routing The explicit routing allows optimal flow distribution. In proposed example the voice flow is optimally routed via upper segment (shortest delay guaranteed), the video flow via bottom segment (with the second shortest delay) and data and flows are routed via middle segment (the longest delay) marked as: I-LER 5 6_E-LER (noted as 5 6_ or 56). This path selection allows to reach required bandwidth, delay and jitter for all flows. Hence the same routing can be made by constraint routing (see Fig. ) the values of throughput, delay and jitter shown in Fig. 5 and Fig. 6 and values of packet loss, delay and jitter in Tab. and Tab. 5 are valid for explicit routing as well... Constraint Routing Constraint routing uses routing algorithms taking in account more link parameters than traditional routing algorithms. In optimal situation the constraint routing can select the same routes as optimal explicit routing. The performance of constraint routing was investigated from the point of: optimal path selection, flow priority routing, bandwidth constraint allocation. ) Optimal Path Selection The optimal routing from the point of bandwidth allocation and delay is shown in Fig.. The voice, as the high sensitive service uses the shortest path ( ), the video the longer path ( 5_6_) and the data and the longest path ( 5 6_). This proposed path selection prevents link congestion, quarantine required bandwidth for all flows (zero packet loss) and shorter delay for time sensitive services (see Tab. and Tab. 5). Fig. : Optimal traffic routing (constraint routing). Figure 5 shows a throughput of voice, video, data and flows with RDM constraints model implemented and window size (WS) set to. In this case all flows have enough bandwidth, therefore the courses of constant bit rate voice and video flows are flat. The throughput of the data flow is vibrant, while it is generated as a variable bit rate flow with exponential packet distribution. The throughput of the flow is oscillating due to TCP algorithm. The Fig. 6 shows delay and jitter for a) voice b) video c) data and d) flows. Figure shows the number of transmitted packets vs. window size. Throughput,,6,,,,6,, Fig. 5: Tab.: 5 5 5 Throughput of voice, video, data and flows (constraint routing, RDM, WS=). Packet loss (constraint routing, RDM, WS=). Traffic Flow Sent Dropped / Retransmissions* 5, %, %, % 95 *, % Tab.5: and jitter (constraint routing, RDM, WS=). Traffic [ms] [ms] Flow Mean Max Mean Max,6,,,6,9 5,,, 6,6 5,5,66,,5 5,,6,6 ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 99

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE,6,5,,,,,6,5,,,,,5,,,, 5 5 5,6,5,,,, a) 5 5 5,6 b) 5 5 5 c) 5 5 5 d) Fig. 6: and jitter of voice, video, data and flows (constraint routing, RDM, WS=). Transmittted packets [packet] Fig. : 6 6 6 Window size [packet] Number of transmitted packets vs. windows size - flow (constraint routing, RDM). ) Flow Routing Priority The results presented above have been achieved for optimal flow order routing i.e. - - (Note: the flows start in different order). To show how the routing priority/order and constraint parameters impact the routing, the following simulations have been done. The first simulation shows the selected path, packet loss, delay and jitter for reservation order - (Tab. 6). Although the low delay sensitive flows (data and ) are routed before a high delay sensitive flows (voice and video), due the setting of RDM and setting of bandwidth constraint for and flows reasonably high ( Mbps for ), the constraint routing select the same optimal routes as in previous experiment (see Fig. ). Figure 9 shows a throughput of voice, video, data and flows with RDM constraints model implemented and window size (WS) set to. The Fig. shows delay and jitter for a) voice b) video c) data and d) flows Source I-LER 5 6 E-LER 9 Fig. : Traffic routing (constraint routing, constraint bandwidth = Mbps, ---, RDM, WS=). Tab.6: Routing order --- (constraint routing, constraint bandwidth for = kbps, RDM, WS=). Reservation order Req. bandwidth [kbps] 95 Not lim. Constraint bandw. [kbps] Selected path [nodes] 56 56 56 ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE Througput,5, 6 5,, Fig. 9: 5 5 5 Throughput of voice, video, data and flows (constraint routing, constraint bandwidth = Mbps, ---, RDM, WS=). Tab.: Packet loss (constraint routing, constraint bandwidth = Mbps, ---, RDM, WS=). Tab.: Traffic Flow Sent Dropped / Retransmissions* 5, %, %, % 9 *, %* and jitter (constraint routing, constraint bandwidth = Mbps, ---, RDM, WS=). Traffic [ms] [ms] Flow Mean Max Mean Max,6,,,6,6,,,6, 9,9,69,5, 55,6,6 6,5,5,,,,,,,,,5 5 5 5 a),,6,5,,,, 5 5 5 c) 5 5 5 d) Fig. : and jitter of voice, video, data and flows (constraint routing, constraint bandwidth = Mbps, ---, RDM, WS=). In the next simulation the bandwidth constraint for flow was decreased to Mbps. This lead to situation that the flow was routed through the shortest path, the delay sensitive voice flow through the longer path 5_6_ and the video and data flows together via the longest path 5 6_ (see Fig. and Tab. 9). Although the different route selection does not lead to packet dropping (see Tab. ) it significantly decrease the throughput of TCP flow (from 9 packets to 6 packets see Fig. 9 and Fig. or/and Tab. and Tab. ) and increase the delay of voice and video flows. The throughputs of voice, video, data and flows are shown in Fig.. The delays and jitters of a) voice b) video c) data and d) flows are shown in Fig.. Source I-LER 5 6 E-LER 9 Fig. : Traffic routing (constraint routing, constraint bandwidth = Mbps, ---, RDM, WS=). 5 5 5 b) ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE,5 Througput,5,,5,,,,5 5 5 5 Fig. : Throughput of voice, video, data and flows (constraint routing, constraint bandwidth = Mbps, ---, RDM, WS=). Tab.9: Routing order --- (constraint routing, constraint bandwidth = Mbps, RDM, WS=). Parameter Rezervation order Req. bandwidth [kbps] 95 Not lim. Constraint bandw. [kbps] Selected path [nodes] 56 56 56 Tab.: Packet loss (constraint routing, constraint bandwidth = Mbps, ---, RDM, WS=). Traffic Flow Sent Dropped / Retransmissions* 5, %, %, % 6 *, %* Tab.: and jitter (constraint routing, constraint bandwidth = Mbps, ---, RDM, WS=). Traffic [ms] [ms] Flow Mean Max Mean Max,59,6,5,, 5,,66, 5, 5,9,,9 5,9 6,,9,,5,,,, 5 5 5,5,,,,,6,5,,,, 5 5 5 b) 5 5 5, c) 5 5 5 d) Fig. : and jitter of voice, video, data and flows (constraint routing, constraint bandwidth, = Mbps, ---, RDM, WS=). In the last simulation the order and constraints were changed. The flows were routed in order -- - Due to the bandwidth constraints for and flows were set only to,5 Mbps (see Tab. ). The flow was routed via the upper shortest path, data flow via the second shortest bottom path and delay sensitive voice and video via the longest path 5 6_ (see Fig. ). The throughputs of voice, video, data and flows are shown in Fig. 5. The delays and jitters of a) voice b) video c) data and d) flows are shown in Fig. 6 and Tab.. a) ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE Source I-LER 5 6 E-LER 9 Fig. : Traffic routing (constraint routing, constraint bandwidth =,5 Mbps, ---, RDM, WS=).,,,,,5 5 5 5,5 Througput,5 a),,5,,,5, 5 5 5 5 5 5 Fig. 5: Throughput of voice, video, data and flows (constraint routing, constraint bandwidth, =,5 Mbps, -- -, RDM, WS=).,5 b) Tab.: Routing order --- (constraint routing, constraint bandwidth =,5 Mbps, =,5 Mbps, RDM, WS=).,, Parameter Rezervation order Req. bandwidth [kbps] 95 Not lim. Constraint bandw. [kbps] 5 5 Selected path [nodes] 56 56 56 Tab.: Packet loss (constraint routing, constraint bandwidth =,5 Mbps, ---, RDM, WS=). Traffic Flow Dropped / Sent Retransmissions* 5, %, %, % 6 *, %* Tab.: and jitter (constraint routing, constraint bandwidth =,5 Mbps, ---, RDM, WS=). Traffic [ms] [ms] Flow Mean Max Mean Max,,,5,9,,5,9,,5,9,, 5, 6,,9,,, T EE, T J,,6,5,,,, 5 5 5 c) 5 5 5 d) Fig. 6: and jitter of voice, video, data and flows (constraint routing, constraint bandwidth =,5 Mbps, -- -, RDM, WS=). As can be seen from Fig. 6 and Tab. the routing of voice traffic over the longest path lead to highest end-to-end delay and jitter. Even in this experiment delay and jitter for voice (and video) traffic are acceptable, the non optimal routing can in some situations lead to non acceptable high values of delay or jitter. ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE ) Bandwidth Constraints Models The all previous simulations used a RDM bandwidth constraint model. RDM allows reuse of non allocated bandwidth from higher priority class types by traffic flow with lower priority class type. The disadvantage of RDM is a necessity to maintain preemption in all network nodes. MAM explicitly specify maximum allowable bandwidth usage of each class type and the bandwidth can not be shared among the different class types. This should be considered during network design process. Table 5 shows the MPLS path allocation proposed by constraint routing algorithm for different bandwidth allocations for specified class type (CT). As can be seen, if not enough bandwidth is allocated to the CT on the link, the constraint routing algorithm chose the less preferable link. If the process fails on all links, the traffic flow is routed by hop-by-hop routing. This can lead to congestion on most preferable link usually used by the most time critical services. Tab.5: Path selection (CR, MAM, WS=). CT Bandw. Allocation [%] 5 56 56 56 5 56 56 56 65 56 56 56 55 56 56 Hop-by-hop 5 56 56 56 Hop-by-hop 5 56 56 Hop-by-hop Hop-by-hop 5 56 56 Hop-by-hop Hop-by-hop 5 56 Hop-by-hop Hop-by-hop Hop-by-hop Figure to Fig. 9 show the throughput of voice, video, data and flows when the 5 %, 55 % or 5 % of the bandwidth is allocated to the CT used by traffic flows. As can be seen in Fig., when the bandwidth constraint is set to 55 %, the flow shares the Mbps link with the voice flow (see Tab. 5) that degrades the QoS parameters of both of them. The number of loss packet is depicted in Tab. 6 to Tab.. Tab.6: Packet loss (CR, MAM 5 %, WS=). Traffic Flow Sent Dropped / Retransmissions* 5, % 9,6 %, % 96 5*, % Throughput,,6,,,,6,, 5 5 5 Fig. : Throughput of voice, video, data and flows (constraint routing, MAM 55 %, WS=). Tab.: Packet loss (CR, MAM 55 %, WS=). Traffic Flow Sent Dropped / Retransmissions* 5 5, % 9, %, % 65 *, % Throughput,6,,,,6,, Throughput,5,5 5 5 5 Fig. 9: Throughput of voice, video, data and flows (constraint routing, MAM 5 %, WS=).,5,5 5 5 5 Fig. : Throughput of voice, video, data and flows (constraint routing, MAM 5 %, WS=). Tab.: Packet loss (CR, MAM 5 %, WS=). Traffic Flow Sent Dropped / Retransmissions* 5, %, % 6 6 6, % 66 *,6 % ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING

VOLUME: 9 NUMBER: 5 SPECIAL ISSUE. Conclusion The proposed experiments accomplished that constraints routing can be used as traffic engineering and QoS provisioning tool allowing providing QoS parameters for QoS sensitive services. Even its good performance, it has been shown that in some situations such as non optimal order of the routed flows selected or inadequate bandwidth allocation with MAM bandwidth constraints model implemented the routing can fail or non optimal routes leading to QoS parameter degradation can be proposed. Constraint-based routing should be implemented in conjunction with other QoS provisioning methods such as traffic flow differentiation according QoS requirements, different processing in network nodes (different Per-Hop Behaviors) or bandwidth reservation for different service classes. Acknowledgements This paper has been supported by the projects VEGA No. /565/9 and ITMS 69. References [] HALAS, Michal; KYRBASHOV Bakyt; VOZNAK Miroslav. Factors influencing voice quality in VoIP technology. In 9 th International Conference on Informatics, -. June, Bratislava, pp. -5. ISBN 9--969--. [] Le FAUCHEUR, F.; LAI, W. Maximum Allocation Bandwidth Constraints Model for Diffserv-aware MPLS Traffic Engineering, RFC 5, IETF, June 5. pp. - [] Le FAUCHEUR, F. Russian Dolls Bandwidth Constraints Model for Diffserv-aware MPLS Traffic Engineering, RFC, IETF, June 5. pp. - [5] ASH, J. Max Allocation with Reservation Bandwidth Constraints Model for Diffserv-aware MPLS Traffic Engineering & Performance Comparisons, RFC 6, IETF, June 5. pp. - [6] MEDVECKY, Martin. The Impact of Traffic Routing in MPLS Networks to QoS. In RTT - 9th International Conference Research in Telecommunication Technologies, Vyhne, Slovak Republic,.9.-.9.,. pp. -9. ISBN 9-- -99-. About Author Martin MEDVECKY was born in Trencianske Bohuslavice, Slovakia. He received his M.Sc. in Telecommunications Technology Telecommunications Systems in 99, Ph.D. in Telecommunications in 99 and Assoc Prof. in Telecommunications in from Slovak University of Technology in Bratislava, Slovakia. His research interests include broadband switching, QoS in broadband networks and telecommunication network management. [] ROSEN, E; VISWANATHAN, A; CALLOLN, A. Multiprotocol Label Switching Architecture, RFC, IETF, January. pp. -6 ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING 5