A Heuristic Algorithm for the Network Design Problem

Size: px
Start display at page:

Download "A Heuristic Algorithm for the Network Design Problem"

Transcription

1 A Heuristic Algorithm for the Network Design Problem MILAN TUBA Megatrend University Belgrade Faculty of Computer Science Bulevar umetnosti 29, Novi Beograd SERBIA Abstract: The network design problem (NDP) is a well known problem which can be applied to many different types of networks. It was well investigated applied to computer communications networks during the time of Internet development. Today it is again very actual applied mostly to the dynamic wireless networks (MANET - mobile ad hoc networks). The network design problem is an NP-hard problem which involves topology selection (subset of possible links) and routing determination (paths for the offered traffic). Capacity assignment is usually treated as a 0-1 problem and as such included it in the topology problem. This does not make the network design problem easier, just the opposite, it moves optimization from continuous to integer. The goal is to minimize the cost which can be a combination of the link costs and delay penalties, under possible additional constraints. Such hard combinatorial graph problems are often treated by evolutionary metaheuristics. In many cases better results and faster convergence are achieved by hybrid algorithms where some local searcher that utilizes particular knowledge about the corresponding problem is included. Here we propose and analyze a computationally feasible heuristic algorithm which excludes underutilized links by a version of flow-deviation method. A simplified queuing model is developed for cost function estimate. Some theoretical results are also established that direct initial approximation. Proposed algorithm can dynamically be adjusted for faster or better results. It is implemented and computes a good solution that is robust with respect to often required dynamic changes of the cost function. Key Words: Network design problem (NDP), Network routing, Computer network topology, Optimization, Modeling 1 Introduction Computer networks consist of computers, called nodes, and communication lines, called links, that interconnect them. The network design problem is: For given locations of nodes, traffic matrix (offered traffic for each pair of nodes) and cost matrix (cost to transfer a message for each pair of nodes) With performance constraints: reliability, delay (time that a message spend in the network), throughput Find values for variables: topology (which nodes will be connected directly with a line and which will have to communicate indirectly, using other nodes as intermediate stations), line capacities (how much traffic will each link be able to carry), flow assignment - routing (which paths messages between any pair of nodes will follow) Minimize the cost (of building and maintaining the whole network). Other formulations of the problem are: minimize delay for the given cost or maximize throughput for given cost and delay. It has been shown that all these problems are similar and that the same techniques can be applied. Different aspects of the network design problem, particularly routing and link capacity were investigated, more recent results are in [1] and [2] and the latest survey [3]. The network design problem, that was for many decades investigated with emphasis on wide area networks, is recently revitalized with application to mobile ad hoc networks [4], [5], [6]. This problem is intractable if full and exact solution is required. Networks can have many thousands of nodes (computers). Fortunately, experience has shown that network design can be done hierarchically and still be near optimal. An example is a network for a country. First, we can decide where to put trunks between major cities, then connect small cities to nearest major cities, then make local networks inside the cities. This approach allows us to work with networks of at most 50 nodes at a time. This is a great help, but the problem is still intractable. Mathematical programming, network flow and ISSN: ISBN:

2 queueing theory were used to solve the distributed, packet-switching network design problem. Many algorithms from graph theory were also used. They include Dijkstra s algorithm for the single source shortest paths problem, Floyd s algorithm for the allpairs shortest paths problem, Prim s algorithm and Kruskal s algorithm for minimum cost spanning tree. Depending on assumptions on some of the three subproblems, different methods were used: Solving for capacity assignment when topology and routing policy are given. If the costs are linear, LaGrange multipliers are good enough. For nonlinear costs, dynamic programming is used. Solving for routing when topology and channel capacities are given. The Minimum Link and The Flow Deviation Algorithm are used; both are heuristic. Solving for capacity and flow assignment when topology is given is a more general problem. This problem has many local minima and only suboptimal solutions exist. There are algorithms for linear, concave and discrete costs. For topological design, two algorithms, both heuristic, are used. One is The Branch X-Change Method; the other is Concave Branch Elimination. Another approach is to use graph theory to find the suboptimal topology. A cut between two nodes is a set of arcs whose removal disconnects two nodes. A minimal cut is one in which replacement of any of its members reconnects the graph. There is a theorem that states that the maximum flow between any two arbitrary nodes in any graph cannot exceed the capacity of the minimum cut separating those two nodes. There is the stronger result that maximum flow is equal to the capacity of the minimal cut. This Max-Flow Min- Cut Theorem helps to optimize networks but some systematic way of searching for the minimum cut is needed. 2 NDP Constrains The algorithm we propose will be used for a NDP with some assumptions and constrains. 2.1 Capacity Assignment Elimination In the clasical Network Design Problem it was assumed that line capacity is a continuous variable. Even if after the analysis only discrete values were required, it was assumed that rounding the continuous solution to the nearest discrete value would give a good discrete solution. This approach is sensible when lines come in a wide range of bandwidths, but even when ARPANET was designed there was a distinct cost advantage in using 56 kb lines to the exclusion of other bandwidths. Later the situation has moved even more in the direction of favoring a very few standard bandwidths, especially T1 (1.544 Mbps) and T3 ( Mbps) lines. This makes methods that provide capacity assignments using continuous values inapplicable. We have to decide for each pair of locations if there will or will not be a line present. The problem becomes 0-1 programming problem or, if there is a lot of traffic, an integer programming problem (there can be more then one line between two nodes). The whole design process is similar to the one that was used before, only the emphasis is on different parts. There are three problems to be addressed in network design: topology, capacity assignment and routing. Optimal routing is the easiest problem and it can be solved in a reasonable time (for static routing). For a fixed topology and line-capacities both, the cost function (delays) and the constraints (feasibility) are convex and any down-hill search technique will find the unique minimum. Most efficient method that is used is a variation of Frank-Wolfe method for nonlinear programming. It is known as flow-deviation method. With continuous line capacities the main optimization was done by assigning capacities to the lines, topology was not very important. Starting topology was selected not so much with optimization on mind, but rather some other criteria, like two-connectivity. Now, without different capacities, the problem is to determine network topology. This problem apears easier then the previous one, we have to worry only about topology and routing and not about capacity assignment. Unfortunately, it is still untractable. 2.2 Routing Feasibility Among all possible topologies and associated routings we want to select one that is optimal in some sense (cost or delay or combination of both). The main constraint for this constrained optimization problem is the feasibility of the routing. The offered load matrix, which determines how much traffic has to be transferred between any two pairs of nodes, is given in advance and it can not be changed. If we assume that a line of an arbitrary capacity can be placed between any two nodes the remaining constraint is that all traffic, according to the offered load matrix, has to be carried along some feasible routing. The routing can be described by a system of equations over a set of fourindex variables. Variable T MS,ME,LS,LE determines how much of the messages that go from MS (mes- ISSN: ISBN:

3 sage start) to ME (message end) are carried over line LS-LE (line start to line end). For a network of n nodes there are n(n 1) possible pairs of nodes and each message can be on any line what gives the total number of variables to ben 2 (n 1) 2. The next problem is to determine the number of equations. For each node we have to make sure that each message type is handled properly. There are n nodes and n(n 1) message types. This gives n 2 (n 1) equations. The equations are of three types. If the node for which the equation is written is neither source nor sink for particular message type, the equation should state that the total flow (for that particular message type) that goes to that node is equal to the total flow that goes out of that node. If the node is source for the particular message type, the flow from that node should be greater then the flow to that node exactly for the amount of the offered load for that message type. The opposite is true for nodes that are sinks. 2.3 Queuing Delays If we consider only interactive transactions (not transfers of large files) it allows us to use queueing theory in a very simple form: all we have to worry about is not to drive any line to more then some fixed percentage of its capacity (usually we can drive a line to more then 99% of its capacity). The explanation is simple. By increasing the line capacity the queueing system behaves differently. However, the human that uses the network interactively does not change. Human always allows some fixed delay D (normally about half of a second). The delay in M/M/1 system is D = 1 µ λ and we want to keep it constant. That means that λ = µ 1 D Line utilization ρ is, for the constant delay D : ρ = λ µ = 1 1 Dµ (1) (2) (3) From the last equation we see that by increasing the line capacity we increase the line utilization while keeping the delay constant. As the capacity increases towards infinity, utilization approaches 1. This property of the queues is intuitively clear: as the utilization increases, the queue increases. However, if the server is very fast, long queues will not introduce long delays. We do not care if there are 1000 customers in front of us if each of them can be served in one micro second. When the utilization is 0.5 the queue length is 1, for utilization 0.9 the queue length raises to 9, for utilization 0.99 the average queue length is 99 etc. The other types of messages have different requirements. For interactive transactions (where humans are involved) we wanted only average delay not to exceed some relatively large constant (half of a second, for example) and a reasonable variance. For digitized voice and, even more, for video or remote automation, the average delay should be some very small constant. This brings us back to the situation where we can not utilize lines by more then 50% or something of that order. The transfer of large files is different. From the table above we know the average queue length for any possible line utilization. Since large file consists of many packets, the information about average queue length translates to this: if average queue length is n then a transfer of a file will last n times longer then on an empty line. On a T1 line one half megabyte file would take about three seconds without queueing. If we drive a line to 99% utilization, average queue length will be 999 and the transfer will take about fifty minutes. This means that large file transfer is usually the bottleneck and not the interactive transactions. There are three regions for the total traffic. Two extremes are clear. If we have very small offered load everywhere, the best network is a minimum cost spanning tree. It connects all nodes and no lines will be heavily utilized which results in negligible delay. If the offered load is very large we use direct connections. When there is 1.5 Mbps that needs to be transferred between two nodes, it pays to put a T1 line there. The only interesting case is when the offered load is in between: not too small and not bigger then the T1 capacity. 2.4 Cost Function The first problem that has to be solved is to find an appropriate cost function. There is no unique best cost function because the network can be viewed from at least two different points: network manager s and user s. From the network manager s point of view a line that is expensive to install is expensive but from the user s point of view a line that is introducing long delays is expensive. This two criteria are usually contradictory. The best solution is usually some compromise between these two extreme positions. We will define a line cost as a weighted sum of installation cost and total delay on that line. The network cost is the sum of line costs. The weight coefficient is an input parameter. When this coefficient is set to one, ISSN: ISBN:

4 delays are ignored and when it is set to zero only delays are considered. The second cost component, total delay, is a dynamic component and it has to be recalculated after each rerouting. It is easy to see that two extremes do not give reasonable results. If only delays are considered, the best network will always be totally interconnected network. Removing any line will increase delays. But some very expensive line may carry very little traffic and the removal of such line would significantly decrease line costs and only marginally increase delays. Such solution would be overlooked if line costs are not considered. The other extreme is when only line costs are considered. The best network in that case is the minimum spanning tree. Interesting case is a network that forms a ring when costs are considered. Each node has two neighbors to which it can be connected by inexpensive lines. Connections to any other node is considerably more expensive. The minimum spanning tree for such a network is an open ring. That is the solution if only line-costs are considered. It is easy to see that a closed ring is much better solution. By adding that last line that will close the ring, the cost will not increase dramatically, but the average path length will be almost halved and delay will be much smaller. If delay is included, even with a small weight coefficient, in the cost function, the line that closes the ring would not be dropped. 3 Proposed Heuristic Algorithm An algorithm is presented here that tries to solve the problems of topology and routing simultaneously. It is a heuristic that starts with totally connected network and direct routing and eliminates lines, one by one, rerouting the traffic from eliminated lines along other paths. The other alternative is to start with a minimal network. It would be more computational effective, but then the problem of initial feasible routing has to be solved. The basic structure of the algorithm is: repeat select a line (expensive one); eliminate selected line by rerouting its traffic; until no line can be eliminated. Offered load (four-dimension matrix), line costs (two-dimensional matrix) and line capacity (same for all lines) are given. The algorithm decreases the cost at each iteration by eliminating one line. It terminates when there are no lines that can be eliminated. Next version will allow for adding lines. This algorithm does not find global minimum in general case, but all local minima should not be far apart from each other (how to prove this?). The questions that we have to answer are how to select a line for elimination and how to eliminate it. Depending on our choices the algorithm will be better or faster. The algorithm that always finds the global minimum is easy to describe and write but impossible to run. It is similar to perfect chess program. First, we examine all one-level moves (single line removals). Examining here means rerouting and finding optimal routing. For n-node network there about n 2 lines. On the next step we examine all possible two-level moves, that means for each one-level move we examine all possible one-level moves. We now have aboutn 4 possibilities and that number continues to grow exponentially. No move can be eliminated at the first stage because even the worst move from the first stage (and may be only that move) may lead to the best move on the second stage. This algorithm is complete search. The other extreme is an algorithm that does no checking at all. It selects a line that should be eliminated randomly (very fast) and reroutes the traffic from that line along other, randomly selected paths. It is easy to see that in certain cases this blindness may prevent even coming close to the good solution. Our heuristic will be an effort to find an algorithm between those two extremes that will have a reasonable running time and give reasonable results. We can start with some improvements of the fast but blind algorithm. It is not computationally very expensive to calculate for each line on each step the cost for the network when that line is removed and its traffic rerouted. The line whose removal gives the best cost improvement is then actually removed from the network. This algorithm is reasonably fast. The most we can do is to find optimal routing for each attempted removal. In that case we have something like perfect chess player that can see only one move ahead but makes no mistakes. This algorithm has much worse running time and usually gives improvement not better then 5% of the total cost. When adding lines is included improvement can become even smaller. When a line selected for elimination the traffic that was on that line has to be rerouted along different paths. We apply Dijkstra s algorithm for the shortest path. It may seem that distance between nodes could be used as a cost but some analysis shows that it requires not only more computation but also gives worse results. The folks theorem that a chain is as strong as its weakest link can be applied here and the shortest path is determined by minimum number of hops and then the quality of that rerouting is determined by a line on that path with minimal residual capacity. The next problem is that the total traffic that has to be rerouted can be greater than the minimal residual capacity of the selected shortest path. Even if that is not the case, it is possible that after rerouting that shortest path becomes overutilized. It would again ISSN: ISBN:

5 be computationally too expansive to determine how much of the traffic that has to be rerouted should be rerouted along selected shortest path. That is why we introduce rerouting granularity coefficient which determines how much of the residual capacity can be used. It was empirically determined that 50% for that coefficient gives good results. After a line elimination routing can be optimized or left as it is and and another line selected for elimination. The next Table 1 gives statistics about execution time for different number of nodes for versions of algorithm without and with optimization after each line elimination. Nodes Without With Table 1: Execution time (sec) We can see that the execution time approximately doubles if routing is optimized after each line elimination. It is interesting that experiments show that routing optimization on each step does not improve results. Somewhat better results are obtained if routing is optimized for each attempted line elimination. Experiments show that improvement is less that 5% while the execution time in incresed by the third degree. This may be acceptable for one time design of complex static networks but not for ad hoc networks. There are some advantages if the algorithm is implemented with integers. Execution time is not significantly decreased, there are even some problems with integer division, but the main advantage is possibility of direct comparison rather than using small absolute difference as has to be done with floating point numbers. Here is an example of the program output for randomly generated network with 4 nodes. Offered Load: [1] [2] [3] [4] [1] [2] [3] [4] Line costs: [1] [2] [3] [4] [1] [2] [3] [4] Iteration step is 50% of available capacity. Each line has capacity 373. Line-costs are 76% of the cost function. New total cost is New total traffic is 793. New average delay is 2.7. Line [3,1] eliminated. New cost Line [1,4] eliminated. New cost Line [2,3] eliminated. New cost Line [4,2] eliminated. New cost Line [3,2] eliminated. New cost No line was selected. New total cost is New total traffic is New average delay is 5.6. Routing: [1,2] [1,3] [2,1] [2,4] [3,4] [4,1] [4,3] [1,2] [1,3] [1,4] [2,1] [2,3] [2,4] [3,1] [3,2] [3,4] [4,1] [4,2] [4,3] Time for this algorithm is 0.0 seconds. 4 Conclusion Fast and flexible heuristic algorithm is developed which by variant of flow-deviation determines suboptimal topology and routing. This algorithm can be adjusted for different applications. Further improvement can include possibility of adding back lines to avoid trapping in local minima. The NDP is today mostly considered for dynamic ad hoc networks where it is necessary to quickly recalculate optimal topology ISSN: ISBN:

6 and routing for fast changes in mobile network conditions. Evolutionary metaheuritics like Ant Colony Optimization and Bee Colony Optimization are successfully used for NDP but they often give much better results when hybridized with some local searcher such as here developed algorithm. Acknowledgment: The research was supported by the Ministry of Science, Republic of Serbia, Project No References: [1] Tuba, Milan: Relation between Static and Dynamic Optimization in Computer Network Routing, Recent Advances in Artificial Intelligence, Knowledge Engineering and Data Bases, WSEAS Press 2009, pp [2] Tuba, Milan: Computer Network Routing Based on Imprecise Routing Tables, WSEAS Transactions on Communications, Issue 4, Volume 8, April 2009, pp [3] Abd-El-Barr M: Topological network design: A survey, Journal of Network and Computer Applications Vol. 32, Issue 3, 2009, pp [4] Karavetsios, P., Economides, A.: Performance Comparison of Distributed Routing Algorithms in Ad Hoc Mobile Networks, WSEAS Transactions on Communications, Vol. 3, Issue 1, 2004, pp [5] Sokullu, R., Karaca, O.: Comparative Performance Study of ADMR and ODMPR in the Context of Mobile Ad Hoc Networks and Wireless Sensor Networks, International Journal of Communications, Issue 1, Volume 2, 2008, pp [6] Kumar, D., Bhuvaneswaran, R.: ALRP: Scalability Study of Ant Based Local Repair Routing Protocol for Mobile Ad Hoc Networks, WSEAS Transactions on Computer Research, Vol. 3, Issue 4, Apr 2008, pp [7] Obreque C, Donoso M, Gutierrez G, Marianov V: A branch and cut algorithm for the hierarchical network design problem, EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, Vol. 200 Issue 1, Jan. 2010, pp [8] Mendes SP, Molina G, Vega-Rodriguez MA, Miguel A, Gomez-Pulido JA, Saez Y, Miranda G, Segura C, Alba E, Isasi P, Leon C, Sanchez- Perez JM: Benchmarking a Wide Spectrum of Metaheuristic Techniques for the Radio Network Design Problem, IEEE Transactions on Evolutionary Computation Vol. 13, Issue 5, Oct. 2005, pp [9] Awan I, Al-Begain K: An analytical study of quality of service provisioning for multi service mobile IP networks using adaptive buffer management, 11th International Conference on Analytical and Stochastic Modeling Techniques and Applications, 2004, Proceedings, pp [10] Watcharasitthiwat K, Wardkein P: Reliability optimization of topology communication network design using an improved ant colony optimization, Computers & Electrical Engineering Vol. 35, Issue 5, Sep. 2009, pp ISSN: ISBN:

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

Swarm Intelligence Algorithms Parameter Tuning

Swarm Intelligence Algorithms Parameter Tuning Swarm Intelligence Algorithms Parameter Tuning Milan TUBA Faculty of Computer Science Megatrend University of Belgrade Bulevar umetnosti 29, N. Belgrade SERBIA tuba@ieee.org Abstract: - Nature inspired

More information

Analyzing Mission Critical Voice over IP Networks. Michael Todd Gardner

Analyzing Mission Critical Voice over IP Networks. Michael Todd Gardner Analyzing Mission Critical Voice over IP Networks Michael Todd Gardner Organization What is Mission Critical Voice? Why Study Mission Critical Voice over IP? Approach to Analyze Mission Critical Voice

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM

A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM A NETWORK CONSTRUCTION METHOD FOR A SCALABLE P2P VIDEO CONFERENCING SYSTEM Hideto Horiuchi, Naoki Wakamiya and Masayuki Murata Graduate School of Information Science and Technology, Osaka University 1

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

Disjoint Path Algorithm for Load Balancing in MPLS network

Disjoint Path Algorithm for Load Balancing in MPLS network International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network

Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network Hyacinth An IEEE 802.11-based Multi-channel Wireless Mesh Network 1 Gliederung Einführung Vergleich und Problemstellung Algorithmen Evaluation 2 Aspects Backbone Last mile access stationary commodity equipment

More information

A SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS

A SIMULATOR FOR LOAD BALANCING ANALYSIS IN DISTRIBUTED SYSTEMS Mihai Horia Zaharia, Florin Leon, Dan Galea (3) A Simulator for Load Balancing Analysis in Distributed Systems in A. Valachi, D. Galea, A. M. Florea, M. Craus (eds.) - Tehnologii informationale, Editura

More information

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor normusliza@kuis.edu.my Abstract.

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models

INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is

More information

Prescriptive Analytics. A business guide

Prescriptive Analytics. A business guide Prescriptive Analytics A business guide May 2014 Contents 3 The Business Value of Prescriptive Analytics 4 What is Prescriptive Analytics? 6 Prescriptive Analytics Methods 7 Integration 8 Business Applications

More information

Research Article Average Bandwidth Allocation Model of WFQ

Research Article Average Bandwidth Allocation Model of WFQ Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

Chapter 10: Network Flow Programming

Chapter 10: Network Flow Programming Chapter 10: Network Flow Programming Linear programming, that amazingly useful technique, is about to resurface: many network problems are actually just special forms of linear programs! This includes,

More information

Factors to Consider When Designing a Network

Factors to Consider When Designing a Network Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT

More information

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality A Kazmierczak Computer Information Systems Northwest Arkansas Community College One College Dr. Bentonville,

More information

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Sarhan M. Musa Mahamadou Tembely Matthew N. O. Sadiku Pamela H. Obiomon

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information

Scalable Source Routing

Scalable Source Routing Scalable Source Routing January 2010 Thomas Fuhrmann Department of Informatics, Self-Organizing Systems Group, Technical University Munich, Germany Routing in Networks You re there. I m here. Scalable

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

A Survey on Load Balancing Techniques Using ACO Algorithm

A Survey on Load Balancing Techniques Using ACO Algorithm A Survey on Load Balancing Techniques Using ACO Algorithm Preeti Kushwah Department of Computer Science & Engineering, Acropolis Institute of Technology and Research Indore bypass road Mangliya square

More information

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP

More information

Research Paper Business Analytics. Applications for the Vehicle Routing Problem. Jelmer Blok

Research Paper Business Analytics. Applications for the Vehicle Routing Problem. Jelmer Blok Research Paper Business Analytics Applications for the Vehicle Routing Problem Jelmer Blok Applications for the Vehicle Routing Problem Jelmer Blok Research Paper Vrije Universiteit Amsterdam Faculteit

More information

NEW applications of wireless multi-hop networks, such

NEW applications of wireless multi-hop networks, such 870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed shf_ibrahim@yahoo.com Khaled M. F. Elsayed, senior member IEEE khaled@ieee.org Department

More information

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Ho Trong Viet, Yves Deville, Olivier Bonaventure, Pierre François ICTEAM, Université catholique de Louvain (UCL), Belgium.

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Path Selection Methods for Localized Quality of Service Routing

Path Selection Methods for Localized Quality of Service Routing Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service

More information

An Improved ACO Algorithm for Multicast Routing

An Improved ACO Algorithm for Multicast Routing An Improved ACO Algorithm for Multicast Routing Ziqiang Wang and Dexian Zhang School of Information Science and Engineering, Henan University of Technology, Zheng Zhou 450052,China wzqagent@xinhuanet.com

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Functional Optimization Models for Active Queue Management

Functional Optimization Models for Active Queue Management Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA chen@cse.wustl.edu

More information

Capacity planning and.

Capacity planning and. Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Assume users have

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Lecture 14: Data transfer in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday Data transfer over multiple wireless hops Many applications: TCP flow from a wireless node

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

Dynamic programming formulation

Dynamic programming formulation 1.24 Lecture 14 Dynamic programming: Job scheduling Dynamic programming formulation To formulate a problem as a dynamic program: Sort by a criterion that will allow infeasible combinations to be eli minated

More information

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age. Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement

More information

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

A Software Architecture for a Photonic Network Planning Tool

A Software Architecture for a Photonic Network Planning Tool A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart

More information

Analyzing Distribution of Traffic Capacity

Analyzing Distribution of Traffic Capacity Analyzing Distribution of Traffic Capacity D. Mancas, E. I. Manole, N. Enescu, S. Udristoiu Abstract In this paper, an evaluation of the network routing algorithms is made. In a real network, it is expected

More information

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy BMI Paper The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy Faculty of Sciences VU University Amsterdam De Boelelaan 1081 1081 HV Amsterdam Netherlands Author: R.D.R.

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications

Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233 IDOSI Publications, 2012 DOI: 10.5829/idosi.mejsr.2012.12.11.144 Performance Comparison of Mixed Protocols Based on EIGRP,

More information

Hybrid Passive and Active Surveillance Approach with Interchangeable Filters and a Time Window Mechanism for Performance Monitoring

Hybrid Passive and Active Surveillance Approach with Interchangeable Filters and a Time Window Mechanism for Performance Monitoring International Journal of Computer Sciences and Engineering Vol.-4(4), PP(25-29) April 2016, E-ISSN: 2347-2693 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4,

More information

Quality of Service Routing in Ad-Hoc Networks Using OLSR

Quality of Service Routing in Ad-Hoc Networks Using OLSR Quality of Service Routing in Ad-Hoc Networks Using OLSR Ying Ge Communications Research Centre ying.ge@crc.ca Thomas Kunz Carleton University tkunz@sce.carleton.ca Louise Lamont Communications Research

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches. Routing WAN Wide Area Networks WANs are made of store and forward switches. To there and back again COMP476 Networked Computer Systems A packet switch with two types of I/O connectors: one type is used

More information

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing Pietro Belotti, Antonio Capone, Giuliana Carello, Federico Malucelli Tepper School of Business, Carnegie Mellon University, Pittsburgh

More information

Moving Target Search. 204 Automated Reasoning

Moving Target Search. 204 Automated Reasoning Moving Target Search Toru Ishida NTT Communications and Information Processing Laboratories 1-2356, Take, Yokosuka, 238-03, JAPAN ishida%nttkb.ntt.jp@relay.cs.net Richard E. Korf Computer Science Department

More information

Static IP Routing and Aggregation Exercises

Static IP Routing and Aggregation Exercises Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts........................................

More information

Broadcasting in Wireless Networks

Broadcasting in Wireless Networks Université du Québec en Outaouais, Canada 1/46 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 2/46 Outline Intro Known Ad hoc

More information

Managing End-to-end Network performance via. Optimized Monitoring Strategies

Managing End-to-end Network performance via. Optimized Monitoring Strategies Managing End-to-end Network performance via Optimized Monitoring Strategies H. Cenk Ozmutlu hco@uludag.edu.tr Dept. of Industrial Engineering School of Engineering and Architecture Uludag University Gorukle,

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

[Sathish Kumar, 4(3): March, 2015] ISSN: 2277-9655 Scientific Journal Impact Factor: 3.449 (ISRA), Impact Factor: 2.114

[Sathish Kumar, 4(3): March, 2015] ISSN: 2277-9655 Scientific Journal Impact Factor: 3.449 (ISRA), Impact Factor: 2.114 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY HANDLING HEAVY-TAILED TRAFFIC IN QUEUEING NETWORKS USING MAX WEIGHT ALGORITHM M.Sathish Kumar *, G.Sathish Kumar * Department

More information

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and. Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February

More information

Path Selection Analysis in MPLS Network Based on QoS

Path Selection Analysis in MPLS Network Based on QoS Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special

More information

Oscillations of the Sending Window in Compound TCP

Oscillations of the Sending Window in Compound TCP Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

ENERGY EFFICIENT CONTROL OF VIRTUAL MACHINE CONSOLIDATION UNDER UNCERTAIN INPUT PARAMETERS FOR THE CLOUD

ENERGY EFFICIENT CONTROL OF VIRTUAL MACHINE CONSOLIDATION UNDER UNCERTAIN INPUT PARAMETERS FOR THE CLOUD ENERGY EFFICIENT CONTROL OF VIRTUAL MACHINE CONSOLIDATION UNDER UNCERTAIN INPUT PARAMETERS FOR THE CLOUD ENRICA ZOLA, KARLSTAD UNIVERSITY @IEEE.ORG ENGINEERING AND CONTROL FOR RELIABLE CLOUD SERVICES,

More information

Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing

Load Balancing in Ad Hoc Networks: Single-path Routing vs. Multi-path Routing Balancing in d Hoc Networks: Single-path Routing vs. Multi-path Routing Yashar Ganjali, btin Keshavarzian Department of Electrical Engineering Stanford University Stanford, C 9435 Email:{yganjali, abtink}@stanford.edu

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP

Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP Dahai Xu, Ph.D. Florham Park AT&T Labs - Research Joint work with Mung Chiang and Jennifer Rexford (Princeton University)

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005 Improving our Evaluation of Transport Protocols Sally Floyd Hamilton Institute July 29, 2005 Computer System Performance Modeling and Durable Nonsense A disconcertingly large portion of the literature

More information

Ring Protection: Wrapping vs. Steering

Ring Protection: Wrapping vs. Steering Ring Protection: Wrapping vs. Steering Necdet Uzun and Pinar Yilmaz March 13, 2001 Contents Objectives What are wrapping and steering Single/dual fiber cut Comparison of wrapping and steering Simulation

More information

CURRENT wireless personal communication systems are

CURRENT wireless personal communication systems are Efficient Radio Resource Allocation in a GSM and GPRS Cellular Network David E Vannucci & Peter J Chitamu Centre for Telecommunications Access and Services School of Electrical and Information Engineering

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

An optimisation framework for determination of capacity in railway networks

An optimisation framework for determination of capacity in railway networks CASPT 2015 An optimisation framework for determination of capacity in railway networks Lars Wittrup Jensen Abstract Within the railway industry, high quality estimates on railway capacity is crucial information,

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information