TECHNICAL PAPER. Traffic Engineering OCTOBER 2000
|
|
- Dorothy Carroll
- 4 years ago
- Views:
Transcription
1 TECHNICAL PAPER Traffic Engineering OCTOBER 2000
2
3 Traffic Engineering Introduction 1 Traffic Engineering Overview 1 Traffic Engineering with ATM 1 Current Framework for IP Traffic Engineering 1 Constraint-Based Routing Issues 4 The GRATE Algorithm as a Solution 4 From CBR to GRATE: Off-line Traffic Engineering 4 Algorithms Used for Off-line Optimization 6 Objectives and Constraints Taken into Account by GRATE 6 GRATE Takes QoS Requirements into Account 6 Results of the Off-line Traffic Engineering Approach Taken by GRATE 7 Traffic Engineering in a Complete OSS 7 Future Applications for Off-line Traffic Engineering 8 Link with Layer 2 and Layer 1 Traffic Engineering 8 Capacity Analyses and Disaster Risk Assessment with What-If Scenarios 8 Bandwidth Brokerage for IP Services 8 Further Reading 9
4
5 Introduction As the Internet evolves into a critical communications network at the heart of the new economy, the challenge for IP networks is to provide the dependability of the telephone networks we are used to. IP networks are also expected to integrate both voice and data communications. For real time applications such as voice, predictable service is a requirement. Currently, the answer to these challenges is overprovisioning costly resources. At the same time, providing Internet communication services is a highly competitive business in which large investments are constantly needed in order to keep pace with the increase in traffic. Consequently, performance optimization has become an important issue. Overdimensioning of network resources is not always a good solution for predictable service. Thus, there is a need to increase the efficiency of resource utilization while minimizing the possibility of congestion. The primary goal of traffic engineering is exactly that: to control traffic flow through a network offering services according to your customers specific requirements, while still utilizing network resources in an economical way. Efficient traffic engineering should take into account current and future traffic demand, as well as individual customer needs, such as bandwidth demand, quality of service (QoS), reliability, etc. Traffic engineering should also provide what-if scenarios that can be used for capacity and disaster risk analysis. When integrated into a complete operations support system (OSS), a traffic engineering tool is the key to providing bandwidth brokerage. It offers the ability to control whether a new customer can be served his required new connection (i.e., as part of a virtual private network [VPN], taking into account all QoS measures) and how this connection can be established. The following sections elaborate on how traffic engineering is implemented for IP networks. Alcatel s new approach to traffic engineering and current practices, the generic rate adaptation traffic engineering (GRATE) algorithm, is introduced, and its advantages over existing techniques are outlined. In conclusion, the future direction of the traffic engineering applications is addressed, as well as the integration of traffic engineering into a complete set of solutions for end-to-end IP operational support. Traffic Engineering Overview Traffic Engineering with ATM As the Internet became more popular in the early 1990s, routers began facing performance limits and became serious network bottlenecks. The routers in the core of the network were replaced by ATM switches, which demonstrated superior forwarding performance, but lacked the connectionless paradigm that was the success of the Internet. Thus, the architecture of the Internet backbones evolved into a set of low capacity edge routers interconnected by a set of permanent virtual circuits (PVCs) across an ATM network, which overcame the forwarding capacity limitations of routers. Moreover, this architecture provided Internet service providers (ISPs) with the ability to control traffic flow across their networks. The path of ATM PVCs across ATM networks can be controlled such that the traffic is equally distributed across the network and the transport resources are used in the most efficient way. Thus, traffic engineering for IP networks was born. Current Framework for IP Traffic Engineering The evolution of chip technology overcame the forwarding capacity limitations of IP routers. Today, application specific integrated circuits (ASICs) for IP address look-up can handle millions of packets per second, enabling terabit routers with interface capacities of up to OC-192. In this respect, routers began outperforming ATM switches and, gradually, the ATM core of IP backbones was replaced by a meshed network of IP terabit routers. However, traffic flow is still bound to shortest path routing decisions of IP routing protocols, leading to bottlenecks and underutilized network resources. ALCATEL 1
6 In order to overcome the limitations of shortest path routing, it was proposed to use multiprotocol label switching (MPLS). MPLS allows for the bypassing of shortest routes by means of label switched paths (LSPs) along non-shortest routes. MPLS is the convergence of connection-oriented forwarding techniques and the Internet s routing protocols. With MPLS, a virtual connection is established between two points on a pure datagram network. The efficiency and operation of a datagram network remain intact, while the advantage of a connection-oriented network can be achieved. This hybrid architecture can emulate connection-oriented services, while normal datagram mechanisms are used to deliver conventional datagram services. Since the overhead required for connection emulation is only needed for services that require it, the cost of running the network is minimized. Using MPLS incorporates four key steps: Path computation Path establishment Path selection Packet forwarding This paper focuses on the path computation process (which can be implemented by traffic engineering algorithms). However, path establishment, path selection and packet forwarding are discussed first. Path establishment: label distribution A path is first established using one of two standardized signaling protocols: resource reservation protocol (RSVP) with extensions, or constraint-based label distribution protocol (CR-LDP). During path setup, labels are exchanged between label switched routers (i.e., routers that support MPLS, LSRs), and these labels are used during packet forwarding (see section Path selection and packet forwarding). Two kinds of paths can be established: explicit paths and shortest paths. The latter form the normal IGP (internal gateway protocol) routes. An explicit path is one whose route is determined in advance and which can be different from the shortest path route. (In Figure 1, this is the thick line between the LSR in Los Angeles and the LSR in New York via the two other routers.) The ability to set up explicit paths is an important element in traffic engineering. Path selection and packet forwarding At an ingress LSR (i.e., the router where an LSP starts; in Figure 1, it is the LSR in Los Angeles), incoming packets are sent on the LSP, according to the forwarding equivalence class (FEC) they belong to. A FEC is a group of IP packets that is forwarded in the same manner, with the same destination and forwarding treatment. The assignment of a packet to a FEC can be based on parameters such as packet ingress point, fields in the IP header (destination address, forwarding treatment such as differentiated services code point [DSCP], etc.). The FEC is encoded in a label, a short, fixed-length identifier, which is attached to the packet. A transit LSR forwards packets based on the information contained in the label and the interface in which the packet came. The IP header is not consulted. The look-up in the label information base (LIB) determines the packet s outgoing interface and new outgoing label. This process is called label swapping. Finally, the egress LSR strips off the label, and the packet is forwarded as a regular IP packet (i.e., the outgoing interface is determined by a look-up of the destination address in the forwarding information base (FIB). Path protection: an extra value added by MPLS One of the advantages of the connection-oriented model of MPLS is that traffic can be quickly redirected from a broken connection to an alternative connection, and on to the same destination. This is in contrast to restoration times in datagram networks, where the routing protocols must converge before service is restored. MPLS allows users to choose between different protection strategies. One method is fast rerouting, which is a local repair action. If a repair can be made locally to the device that detects the failure, restoration can be made without serious service disruption and can happen in the same time frame as SONET restoration. However, fast restoration often creates nonoptimal paths. For that reason, there is a second protection technique: the head end of the LSP (the ingress LSR) is notified, which can nondisruptively redirect traffic to a more optimal path, using a make-before-break strategy (in which a new connection is established before the old one is torn down) or active standby. 2 ALCATEL
7 Path computation The route taken by an LSP through the network is determined by path computation. This can either be done online in real time in the network nodes themselves, or off-line on a workstation using a centralized application that determines routing plans on behalf of each router. Online computation typically uses a shortest path algorithm, or an adaptation generally denoted by constraint-based routing (CBR). CBR is a class of routing algorithms that computes shortest routes through a network subject to a set of constraints and requirements. Trunk constraints may include bandwidth, delay (expressed as a maximum number of hops), and policy instruments such as resource class attributes. Since CBR considers not only the topology, but also additional link properties (i.e., maximum link bandwidth, currently reserved bandwidth, link colors, etc.), additional network resource attributes are flooded using extensions to the link-state IGPs, such as open shortest path first (OSPF) and intermediate system-to-intermediate system (IS-IS). An example of using the CBR policy instruments is to first assign transatlantic links to the user-defined resource class Transatlantic, overprovisioned links to resource class Predictable, satellite links to resource class Satellite, etc. When a customer asks for a low delay connection between offices in Brussels and Rome, an LSP can be set up with the constraints exclude Transatlantic and Satellite and include Predictable. Figure 1: MPLS Path Setup and Label Switching Switch Labels Ingress LSR Los Angeles L1 IP Packet Egress LSR New York IP Packet L2 IP Packet IP Packet L3 IP Packet L1 Look-Up LSP via FEC ALCATEL 3
8 Constraint-Based Routing Issues The advantages of CBR stem mainly from the fact that it is simple and that it works in a dynamic fashion. Unfortunately, the advent of more complex services (such as DiffServ) and increasing performance and survivability demands reveal some of its drawbacks. The disadvantages of CBR are related to the optimization that takes into account all traffic trunks in sequence as they are proposed to the network. There is no way of ensuring that the order in which the trunks are set up leads to an optimal solution. In fact, in many cases, much traffic is blocked because of this system. Suppose, for instance, that a large trunk on a long path is routed first. Many resources will be attributed to this trunk. It is conceivable that subsequent trunks will have difficulty finding enough resources. In order to react appropriately to changing traffic patterns, it is necessary to be able to reroute previously established trunks if they obstruct a better routing configuration. The problem becomes even more serious when traffic needs to be protected with backup paths (see Figure 2). CBR algorithms can handle the combined constraints of both a primary and a protection path. However, this is limited to a 1:1 protection mode. It is clear that far more efficient solutions can be achieved if protection bandwidth can be shared among trunks that have working paths that are assumed to be exempt from simultaneous failure. Indeed, most protection schemes consider only single link and/or node failures, in which case fully node and link disjoint working paths cannot fail simultaneously. Sharing protection capacity (in a so-called shared protection scheme) leads to more efficiency in the network. This requires a view of all trunks and their paths through the network. In Figure 2, the upper picture shows a situation in which two 20 Mb/s trunks between the same pair of nodes are 1:1 protected. The working traffic of the trunks is normally carried on the upper and middle path. They both have the same backup path (i.e., the lower path). In the event of a link failure (such as the one shown in the figure), backup capacity is reserved for all trunks for which the primary path is affected by the failure. Since both trunks have the same backup path, they have to share the capacity of the backup path (assuming full protection and equal link capacities); thus, their working traffic can only receive a share of 50 percent or 10 Mb/s. For backup protection, backup capacity is provided only for those trunks for which the working path actually fails. This means that, in this example, only one trunk can be affected for any given failure. The backup capacity is reserved only once, which means that both trunks can have a share of 100 percent, or 20 Mb/s. Hence, the gain in fairness and throughput in this case is 100 percent, which indicates the possible benefits of a backup protection scheme. Finally, the use of CBR in QoS-aware networks is questionable. In such networks, some traffic flows need to be offered with low loss or low latency guarantees. Although CBR algorithms can, eventually, be extended so that these QoS requirements can be taken into account for each given trunk, a CBR algorithm will not be able to estimate the impact of this new trunk on the QoS characteristics of the existing trunks. This requires a view of all trunks, their paths, and the load changes along these paths when a new trunk is introduced. Indeed, delay and delay jitter are typically related to buffer occupancy, which in turn is related to the load at each given node. Therefore, CBR algorithms cannot be used for the QoS provisioning required in a DiffServ network, which must be able to offer low loss or low latency guarantees to the flows that require them. The GRATE Algorithm as a Solution From CBR to GRATE: Off-line Traffic Engineering The problems related to a distributed traffic engineering approach are solved if the network view of the edge nodes is expanded. Each node should know all trunks, their paths, and their QoS requirements. When configuring a new trunk, all other network nodes should be informed, requiring some additional extensions to the routing protocols. However, there is a more serious problem. Even if all routers have the same, complete view of the topology and the trunks, they must also use the same CBR algorithm. Otherwise, inconsistencies will arise. It is very unlikely that in a network with routers from multiple vendors, all edge nodes use the same CBR algorithm. Therefore, a distributed approach seems inappropriate to meet the needs addressed in the previous section. 4 ALCATEL
9 Consistent routing decisions require centralized control of the routing configuration. A centralized approach obviates the need for any routing protocol extensions, since the paths of the trunks and the load that they induce, are known to the centralized server. Yet, this centralized server needs to solve the complex problem of routing every trunk and respecting QoS parameters and protection levels, while at the same time minimizing the amount of spare capacity for restoration purposes. Figure 2: Shared Protection vs. 1:1 Protection Scheme 10 Mb/s A B 10 Mb/s C D 20 Mb/s E F 1:1 Protection Scheme Working capacity Backup capacity 20 Mb/s A B 20 Mb/s C D 20 Mb/s E F Shared Protection Scheme ALCATEL 5
10 Algorithms Used for Off-line Optimization Global optimization can be achieved through the use of linear programming-based algorithms or with heuristics. Heuristic algorithms have the advantage of being fast, because they tend to make intelligent assumptions about the problem that reduce the number of variables to be optimized. They provide excellent results for specific problems. However, they are less flexible to changes and may be incapable of dealing with complex problems when it is difficult to identify the assumptions for reducing the number of variables. Linear programming-based algorithms, on the other hand, provide a mathematical framework for solving a generic class of problems, which makes them far more flexible and reusable than heuristics. They can deal with the complicated optimization problems that arise from multiple path routing or shared protection schemes. Alcatel s linear programmingbased approach describes the traffic engineering problem by means of an objective function and a set of constraints. Objectives and Constraints Taken into Account by GRATE The objective function contains multiple objectives that can be maximized or minimized. The objectives are either resource-oriented or traffic-oriented. Resource-oriented objectives address network-related quantities, such as load balance and link utilization. Resource-oriented traffic engineering can be used to route the demands in the network while preserving (as much as possible) free resources for future increases or new demands, or for routing lower priority traffic. This is done by minimizing the utilization of the maximally used link, while honoring the demand for each traffic trunk. As a second objective, the total resource utilization in the network is minimized, which will generally reduce the total routing cost. Traffic-oriented objectives do not focus on the network, but rather on the traffic trunks. They are used to make sure that the amount of traffic served by the network is maximized, taking into account all individual customer service level agreements (SLAs), which maximizes revenues. The share of a traffic trunk is defined as the fraction of its demand that can be routed through the network. Note that this fraction must be one or higher to avoid partial blocking of a trunk. The extent to which it is larger than one indicates the margin of expansion for each trunk s bandwidth demand. Throughput is defined as the sum of all shares multiplied by their respective demands. Note that there is no guarantee that all traffic will fit into the network, even if that is a requirement. The algorithm provides the fraction of the demand that can be accepted (see Figure 2). Arbitrary starvation of trunks is avoided by maximizing the minimum share in the network. As a second objective, throughput is maximized. This will generally increase the total revenue that can be obtained from the network. The constraints typically express physical limitations of the network, such as limited link capacity and conservation constraints. They may also be used to force a single path for each trunk, or to implement various protection schemes. GRATE Takes QoS Requirements into Account As far as QoS requirements are concerned, the algorithms allow different traffic types to be treated differently. Traffic with stringent bandwidth constraints requiring low loss and latency, such as the expedited forwarding per hop behavior (EF-PHB) in DiffServ, can be routed through load balancing. This enables a lower overall load of EF, which is beneficial to latency, while preserving resources for other PHBs. The best effort (BE) PHB is typically treated using traffic-oriented objectives. The bandwidth requirements for this traffic are far looser, which means that fairness is provided by maximizing the minimum share and maximizing throughput for future expansion or revenue optimization. In addition, the off-line approach allows implementation of a shared protection mechanism for restoration. With this mechanism, backup capacity is reserved on links only when the corresponding primary path fails. Excluding all failures except single link failures, allows the sharing of protection capacity between primary paths that are node and link disjoint. Obviously, the fairness and throughput of the primary paths in a shared protection scheme are higher than that for a 1:1 protection scheme. The difference depends on the number of protected trunks and the protection capacity. If all trunks are protected for 50 percent of their capacity, the throughput of the primary paths increases on average by 16 percent, while the backup capacity on the links is decreased by 25 percent, compared to a 1:1 protection scheme (Figure 2). 6 ALCATEL
11 Results of the Off-line Traffic Engineering Approach Taken by GRATE The use of a preplanned off-line approach such as the GRATE algorithm allows for the optimal selection of explicit paths for the traffic trunks, while taking into account protection and QoS for each trunk or customer separately. For single path traffic engineering, in which a single path must be chosen for each trunk, the traffic handling capacity of the network (Figure 1) has been considerably increased. With the LSP path placement obtained from the Alcatel traffic engineering tool, the OSPF routing increase averages approximately 20 percent to 25 percent for fairness and throughput. This means that the throughput of the least served trunk, as well as the total throughput in the network, is increased by 20 percent to 25 percent. A comparison between GRATE and a conventional constraint-based routing algorithm is best explained using an example. For this purpose, we applied both algorithms to a set of randomly generated networks, exhibiting an Internet-like topology. The networks were carefully dimensioned to avoid underprovisioning and to limit overprovisioning. For all networks, GRATE achieved an LSP configuration that allowed the routing of all trunks. The constraint-based routing algorithm, on the other hand, never succeeded in routing all trunks. Depending on the order in which the trunks were set up, the average blocking rate (the percentage of trunks that could not be routed) ranged from 12 percent to 15 percent, with peaks of up to 70 percent. The average blocked demand percentage (the ratio of the sum of the demand of all blocked trunks over the sum of all demands) ranged from 7 percent to 21 percent. In some cases, however, it could be as high as 40 percent. Clearly, the constraint-based routing algorithm is outperformed by GRATE. In addition, the quality of its solution heavily depends on the order of the inputs. Ordering the trunks beforehand can establish a compromise between reducing the blocking rate, which leads to more fairness in the network, and increasing the throughput through a reduction of the blocked demand percentage. This explicit trade-off is implicitly present in GRATE. In conclusion, when compared to constraint-based routing, the linear programming-based single path traffic engineering algorithm significantly reduces the blocking probability of a trunk (note that the blocking probability is 0 percent for GRATE) and increases the total demand that can be supported by the network. In addition, a preplanned off-line tool allows the optimization of protection capacity and the introduction of QoS guarantees in the network. Traffic Engineering in a Complete OSS Off-line traffic engineering solutions can be used as a basis for a set of value-added applications for IP service providers. An IP OSS is generally broken down into three major functional areas: service provisioning and activation, service assurance, and customer care and billing. Traffic engineering is implemented in the areas of service provisioning and service assurance. For service provisioning, traffic engineering plays an important role in the bandwidth brokerage function. It can calculate whether the network can meet a certain traffic demand with a promised QoS. As such, it is an integral part of customer-oriented service activation. In service assurance, traffic engineering is used in a selftriggering mode. A performance management tool predicts when the network will be congested. When certain links in the network reach congestion, the performance management tool triggers the traffic-engineering tool to reoptimize and reconfigure the MPLS network. Traffic engineering is a key component in a complete IP OSS solution. It is a means to control the network s performance and, therefore, a way to achieve predictable services on the network. ALCATEL 7
12 Future Applications for Off-line Traffic Engineering Link with Layer 2 and Layer 1 Traffic Engineering A clear migration towards network architectures, where the IP layer runs directly on top of the optical layer, is perceived. Evolutions in optical transmission networks show that in the near future optical paths (lambdas) can be dynamically set up or broken down. This will enable traffic engineering to dynamically change the physical links between routers and as such introduce a new degree of freedom. Although this degree of freedom is quite new for the physical layer, the link layer (e.g. ATM) can already provide dynamic setup or teardown of links (virtual paths/virtual connections). Typically, the calculation of an optimal lambda or an optimal VP/VC will be done by traffic engineering algorithms introduced in the respective layers of the OSI stack. However, traffic engineering tools that run on Layer 3 have to take into account the new degrees of freedom introduced by extra capabilities on the underlying layers. For MPLS networks, traffic engineering will have to take into account that part of the network s topology that can be changed by reconfiguring the links on Layer 2, or on the optical layer. This will enable even more optimal sets of LSPs. Capacity Analyses and Disaster Risk Assessment with What-If Scenarios What-if scenarios give operators the ability to simulate a network s behavior if a network error occurs (i.e., a router outage occurs or a link goes down). A primary class of what-if scenarios uses the off-line traffic engineering tool to recalculate the network s optimized configuration, taking into account the network s changed configuration. They can be used for network planning purposes. By using this type of scenario, the benefit of an addition or removal of a router or a link can be calculated. It is also possible to see the effect on customers and services when traffic changes. A secondary class of what-if scenarios simulates the network s actual behavior (i.e., MPLS, constraint-based routing, etc.). They can be used for disaster risk assessment. By using this type of scenario, one can calculate which customers or services will be affected when a router goes down or a link breaks. Bandwidth Brokerage for IP Services Essentially, a bandwidth broker is a domain-based network resource management scheme that dynamically binds policies and resource usage situations to the allocation of network resources. Dynamic policy enforcement introduces more sensitivity to available resources and provides a mechanism for dynamic allocation of the resources based on sets of rules. Two factors are used to distinguish different types of bandwidth brokerage: whether the bandwidth is offered from a provider s own domain (intra-domain) or rented from another provider in a wholesale business model (inter-domain), and whether or not negotiation is possible on the type of QoS offered and the price. With intra-domain bandwidth brokerage, the main question is: Can I give a certain customer the bandwidth and QoS requested or not? Do I have to reoptimize the network s configuration for this? This should not only involve bandwidth on IP, but also the transmission layer (ATM, synchronous digital hierarchy [SDH]) and the physical layer (i.e., dense wave division multiplexing [DWDM]) which can be traffic engineered. Future solutions will take all layers into account when optimizing the network s configuration. Inter-domain bandwidth brokerage extends intra-domain bandwidth brokerage with the ability to use bandwidth from peer providers or transmission network providers (i.e., SDH, ATM, DWDM, etc.). Basic traffic engineering algorithms offer all network and resource utilization information needed to take decisions in a bandwidth broker. This information comes for free, as a byproduct of the algorithms calculations. It is, for example, possible to know each link s usage or each queue s state as a result of the traffic engineering calculations, because these metrics are used in the algorithm s cost function. This makes traffic engineering the optimal stepping stone for bandwidth broker functionality. 8 ALCATEL
13 Further Reading 1. ALMA Vision IP white paper, Carl Rijsbrack, Robert Mathonet, Alcatel Telecommunications Review 2Q ALMA Vision IP Traffic Engineering, Product Description, 3. ALMA Vision IP Traffic Engineering, Product Leaflet, 4. ALMA Vision IP, Product Description, 5. Multi-Objective Traffic Engineering of IP Networks Using Label Switched Paths, S. Van den Bosch, F. Poppe, H. De Neve and G. Petit, accepted for presentation at Networks 2000, September 2000, Toronto, Canada 6. Choosing the Objectives for Traffic Engineering in IP Backbone Networks based on Quality-of-Service Requirements, S. Van den Bosch, F. Poppe, H. De Neve and G. Petit, submitted to QofIS 2000, September 2000, Berlin, Germany ALCATEL 9
14
15
16 For more information Alcatel and the Alcatel logo are registered trademarks of Alcatel. All other trademarks are the property of their respective owners. Alcatel assumes no responsibility for the accuracy of the information presented, which is subject to change without notice Alcatel. All rights reserved CL TQZCA Ed.01
Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26
Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next
More informationHow To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
More informationCourse Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
More informationMulti Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
More informationMPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic Mario.Baldi@polito.it www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
More informationMPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
More informationPART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
More informationMulti-Protocol Label Switching To Support Quality of Service Needs
Technical Report, IDE1008, February 2010 Multi-Protocol Label Switching To Support Quality of Service Needs Master s Thesis in Computer Network Engineering - 15hp AMJAD IFTIKHAR AOON MUHAMMAD SHAH & FOWAD
More informationMPLS. Packet switching vs. circuit switching Virtual circuits
MPLS Circuit switching Packet switching vs. circuit switching Virtual circuits MPLS Labels and label-switching Forwarding Equivalence Classes Label distribution MPLS applications Packet switching vs. circuit
More informationAnalysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
More informationProject Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
More informationMultiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. anan.p@ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
More informationImplementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
More informationMPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.
Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationRecovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
More informationfor guaranteed IP datagram routing
Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation
More informationMPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
More informationWAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
More informationIntroduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
More informationQoS Strategy in DiffServ aware MPLS environment
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,
More informationDESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com
More informationIntroducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
More informationPerformance Evaluation of Voice Traffic over MPLS Network with TE and QoS Implementation
Master Thesis Electrical Engineering November 2011 Performance Evaluation of Voice Traffic over MPLS Network with TE and QoS Implementation Jeevan Kharel Deepak Adhikari School of Computing Blekinge Institute
More informationQuality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
More informationMigrating to MPLS Technology and Applications
Migrating to MPLS Technology and Applications Serge-Paul Carrasco June 2003 asiliconvalleyinsider.com Table Of Content Why to migrate to MPLS? Congestion on the Internet Traffic Engineering MPLS Fundamentals
More informationWhite paper. Reliable and Scalable TETRA networks
Abstract The evolution of TETRA networks towards an all- IP architecture is now a reality and has been accepted by even the most demanding users of TETRA technology. Although circuit switch based TETRA
More informationLesson 13: MPLS Networks
Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP
More informationA New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir
More informationWAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
More informationHow To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
More informationMPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
More informationThe Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions
The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone
More informationFast Re-Route in IP/MPLS networks using Ericsson s IP Operating System
Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds
More informationA Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
More informationUsing OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
More informationBlue 102. IP Service Architecture Futures. Geoff Huston May 2000
Blue 102 IP Service Architecture Futures Geoff Huston May 2000 Next Wave IP Services Service Requirements Connectivity service for customer-operated routers Service payload is IP packet High peak carriage
More informationAPPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
More informationPROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER
More informationEnterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,
More informationICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
More informationOPNET simulation of voice over MPLS With Considering Traffic Engineering
Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing
More informationHPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
More informationMikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
More informationQuality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationNetwork management and QoS provisioning - QoS in the Internet
QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets
More informationMPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
More informationA Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman
A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline
More information4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
More information20. Switched Local Area Networks
20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on
More informationIP Traffic Engineering over OMP technique
IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,
More informationQuality of Service for VoIP
Quality of Service for VoIP WCS November 29, 2000 John T. Chapman Cisco Distinguished Engineer Broadband Products and Solutions Course Number Presentation_ID 1999, Cisco Systems, Inc. 1 The QoS Matrix
More informationInvestigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
More informationMENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001
MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an
More informationMPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
More informationThe Keys for Campus Networking: Integration, Integration, and Integration
The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,
More informationIndustry s First QoS- Enhanced MPLS TE Solution
Industry s First QoS- Enhanced MPLS TE Solution Azhar Sayeed Manager, IOS Product Management, asayeed@cisco.com Contact Info: Kim Gibbons, kgibbons@cisco.com,, 408-525 525-4909 1 Agenda MPLS Traffic Engineering
More informationQoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationMPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
More informationFigure 1: Network Topology
Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,
More informationTraffic Engineering Management Concepts
3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page
More informationMPLS Multiprotocol Label Switching
MPLS Multiprotocol Label Switching José Ruela, Manuel Ricardo FEUP Fac. Eng. Univ. Porto, Rua Dr. Roberto Frias, 4200-465 Porto, Portugal INESC Porto, Campus da FEUP, Rua Dr. Roberto Frias, 378, 4200-465
More informationMPLS Traffic Engineering in ISP Network
MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications
More informationMPLS Architecture for evaluating end-to-end delivery
International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012 1 MPLS Architecture for evaluating end-to-end delivery Nikita Wadhera Lovely Professional University Abstract-
More informationAsynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)
Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport
More informationMPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationVoIP versus VoMPLS Performance Evaluation
www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,
More informationRSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
More informationEvolution of QoS routing in the Internet
Evolution of QoS routing in the Internet Olivier Bonaventure Dept. Computing Science and Engineering Université catholique de Louvain http://www.info.ucl.ac.be/people/obo June 4th, 2004 Page 1 Agenda Routing
More informationQoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
More informationPART II. OPS-based metro area networks
PART II OPS-based metro area networks Chapter 3 Introduction to the OPS-based metro area networks Some traffic estimates for the UK network over the next few years [39] indicate that when access is primarily
More informationVoIP network planning guide
VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead
More informationQuality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir
More informationCS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE
CS/ECE 438: Communication Networks Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE Introduction The Internet only provides a best effort service
More informationInternet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol
More informationEVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
More informationComputer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationService Assurance Tools
Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as
More informationData Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
More informationCisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
More informationImplementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
More informationThree Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
More informationA Review on Quality of Service Architectures for Internet Network Service Provider (INSP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia
More informationMPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
More informationDesigning Reliable IP/MPLS Core Transport Networks
Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture
More informationTraffic Engineering for the New Public Network
Traffic Engineering for the New Public Network Chuck Semeria Marketing Engineer Juniper Networks January 25, 1999 Contents Introduction 2 Traffic Engineering 2 Applications for Traffic Engineering 3 Looking
More informationMPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
More informationAT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
More informationMultiprotocol Label Switching Architecture & LDP. Introduction MPLS Basics LDP Procedures LDP Specification
Multiprotocol Label Switching Architecture & LDP Introduction MPLS Basics LDP Procedures LDP Specification 1 MPLS&LDP->Introduction Conventional network forwarding Each router analyzes the coming packet
More informationA Wheeling and Steering based route reconstruction approach in congested MPLS network
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7959-7965 A Wheeling and Steering based route reconstruction approach in congested
More informationTE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
More informationRouting with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
More informationResearch on Video Traffic Control Technology Based on SDN. Ziyan Lin
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing
More informationPerformance Evaluation for VOIP over IP and MPLS
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information
More informationQuality of Service (QoS)) in IP networks
Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T
More informationInternet Protocol (IP)/Intelligent Network (IN) Integration
Internet Protocol (IP)/Intelligent Network (IN) Integration Definition The convergence of the public switched telephone network (PSTN) and Internet protocol (IP) data networks promises exciting opportunities
More informationQoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
More informationCorporate Network Services of Tomorrow Business-Aware VPNs
Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution
More informationEnhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
More information