The multilayer complex network design with use of the arbiter
|
|
|
- Derick Webster
- 10 years ago
- Views:
Transcription
1 The multilayer complex network design with use of the arbiter 1 Marek Bolanowski, 1 Andrzej Paszkiewicz, 2 Tadeusz Kwater, Bogdan Kwiatkowski 1 Department of Distributed Systems Rzeszow University of Technology [email protected] 2 Centre of Innovation and Transfer of Natural Sciences and Engineering Knowledge University of Rzeszow {tkwater, bkwiat}@ur.edu.pl Abstract. In the paper the methods and means of designing modern network structures are presented, in the first part the authors shows the classical approach to designing logical and physical topology and introduce a new concept of topology layer defined by routing protocol called the protocol topology. Nowadays, most of the mechanisms and communication paths is determined precisely by routing protocols. The authors propose its own structure with the arbiter that allows to change the protocol topology, reactively, according to the load of each router interfaces. The authors also presents an example of using the proposed model for implementing new functionalities such as: network anomaly traffic detection. The proposed architecture can be considered as a universal framework to implement new algorithms (created and tested by the network administrator) for network management. Is especially important that all of the proposed topology can be implemented using well-known, open network management protocols. Keywords: computer network, protocol layer, routing algorithms, computer network design. 1 Introduction Today's networking systems are becoming more complex environment under which we have to deal with the growing convergence of various services. The size of this class network system forces the use of automated synthesis algorithms to scale systems and algorithms for topology changes (reconfiguration) during normal operation. Currently more and more attention is paid to the efficient management of this class of systems. In the first part of the article a classical approach to the design of physical networks, and logical topology selection method will be presented. In the next part, architecture of the new topology layer will be presented which is created by the traffic routing protocols. Currently this particular layer is in the spotlight because it has influence on the flows in the network and consequently on the network topologies. 116
2 2 Classic methods and means for physical and logical topology design A modern systems, because of the multiplicity of tasks, are described with the use of hierarchical structures. However, in previous studies [1, 2, 3] considerations are limited to the analysis of two-level hierarchical structures. If the system has a multilevel structure, for the purpose of analysis, it is recommended to decompose it to twolayer structures that will be analyzed using existing methods. Existing models of hierarchical systems have a special character, i.e. are applicable only to specific systems. In addition, the models transforms the solution of the optimal hierarchical structure search to the discrete optimization tasks characterized by a very high computational complexity. There are two main types of hierarchical structures of communication systems: a functional hierarchy and a topological hierarchy of connection network. Using the assumptions of the layer systems theory [4] functional hierarchy can be represented by a system mutually corelated layer [4,5]. With this approach the task of network system synthesis is decomposed into smaller tasks solved in shorter time using dedicated methods and applications. The layered structure is hierarchically associated system of interdependent functional levels. If the level in the stratified system is associated only with the master (up level) and slave (down level), such a system is called layered system. Stratified scheme of complex large-scale communication system is presented in Fig1. Fig. 1. Stratified scheme of complex, large-scale communication system. Decomposition of communication layer into two closely related topological layer: physical topology and logical topology allows the use of new methods of synthesis and topology reconfigurations. However, the current adjustment of logical layer (typically constructed using Frame Relay, etc. WDM.) to the requirements of the communication network is limited because of the technology and administration restriction. The conclusions: one of the methods to improve the capacity of modern communication systems is to improve and reorganize of connection dependence in the protocol topology. 117
3 In the connection network synthesis the topology, the number of communication channels, their capacity and distribution of the system components are searched. Optimization methods developed for this model, assume the existence of several levels of communication and functional hierarchy [2, 6]. Methods for optimal and accurate network design has been carefully developed, but there is need for constant updating due to the low flexibility of their use in the environment of continually evolving network technologies. Often the algorithms are affected by numerous restrictions and initial assumptions that prevent their use for synthesis of the real connection networks. Often, these methods are characterized by high computational complexity and they are considered as NP-complete problems [7], and ability to parallelize computations is usually impossible. Fig. 2 presents the classification of conventional network design tasks. Fig. 2. The classification of conventional network design tasks. Letter G denotes that the task can be modeled using a graph, and T denotes modeling with a tree. Variable r is a matrix with bandwidth requirements between nodes; c is a matrix determining the unit cost of communication between nodes, wherein r 0 and c 0. The color gray is NP-hard task to solve, while the white color highlights the polynomial complexity of task. In addition, in the figure the names of the selected design tasks was placed: OCSTP (Optimal communication spanning tree problem), OLCSTP (Optimal Link Cost STP), ORSTP (Optimal Route STP) Most of algorithms for design the physical and logical topology is well known. The rest of this article focus on the methods and means to design and reconfiguration the protocol topology with use of routing protocol and arbiter. 118
4 3 Computer networks in terms of complex systems The most basic and natural classification of complex networks models, is to divide them into deterministic and random networks. Models based on random networks do not apply to any specific network, but to the set of networks with various probability of appear. The edges of random networks are distributed completely random. Therefore, to this type of network can be included the real networks and its theoretical models, in which the randomness factor is their inherent feature in case of creation and evolution processes. In contrast, deterministic network in its evolution and construction procedures do not allow for any randomness. Static nets can be compared to the equilibrium state, as the main characteristics of this type of systems, such as the number of nodes, number of links, the bunch factor and distribution of vertices degrees does not depend on time (are constant). However, in evolving networks characteristics such as number of nodes and edges, or even interconnection patterns are dependent on time although changes over time, usually are stationary processes. Therefore, static and evolutionary networks are also called respectively equilibrium and non-equilibrium networks [8]. In the article [9] a new model of computer networks was proposed, which take into account self-organization and self-adaptation as mechanisms defining network performance. Conclusions of modern research on the computer network, and in particular the phenomena occurring in them, clearly show the need to treat them as complex systems with particular attention to the impact of forwarded traffic on control, threats detection and also the selection of infrastructure elements. This would imply a total redesign of existing network infrastructure with simultaneous change the currently used algorithms. Due to the cost and organizational issues such revolutionary action becomes impossible. Instead, it is necessary to implement evolutionary mechanisms in to the network constructed according to the classical model presented in chapter two. This architecture allows to use of non-extensive statistics, self-adaptation and self-organization to manage networks. In chapter four such a network architecture will be proposed. 4 A new complex network architecture The next layer in the process of creating the network is routing layer. In fact, this layer creates a separate topologies in dimension of routing connection protocol. In this layer the load balancing of routes is the main objective of management. In the article [9] the authors also show that the mismatch between router hardware resources and current task load can lead to critical system organization and consequently to its failure. Currently one of the most widely used open routing protocol is OSPF. Load balancing in OSPF is implemented using trivial algorithm which based on the static metrics and SPF algorithm. Metric determining the cumulative value is mostly determined on the basis of values taken from a static interface parameter called bandwidth. During normal operation of the network, this parameter is not change. Fig. 3a is shown an example of a network with five routers. For simplicity let s assume that the 119
5 routers R1, R2, R3, R4 have the same network interfaces and its capacity is equal x. Routers R1, R5, R4, on the alternate path have also interface with the same speed equal to y, wherein x > y. Fig. 3. a. Routing without load balancing; b. Routing with load balancing. This configuration is often implemented: Route R1, R2, R3, R4 is considered as the main route and route R1, R5, R4 is considered as an alternative route used only in case of failure. In such a case as a result of the SPF algorithm run for the flow f the OSPF route R1, R2, R3, R4 will be selected. To balance the load between the two routes cumulative cost for R1, R2, R3, R4 and R1, R5, R4 has to be identical. Then the Equal Cost Multipath algorithm would be used. Unfortunately, under normal conditions, this situation is relatively rare. The use of asymmetric load balancing (Fig. 3.b) may be implemented through the OSPF algorithm modification, but in a commercial environment (modification of router firmware) such action is impossible. However, from the viewpoint of complex systems load balancing of resources is a key element. Later the algorithm is proposed to modify the routes in routing table depending on the current flow analysis f. 120
6 4.1 System architecture As already mentioned, OSPF protocol will be adapt to asymmetric load balancing by introducing arbiter into the network. Architecture arbiter may take various forms. The architecture of arbiter can be different between the specific implementation. Tests that have been made were implemented based on linux system, C++, and scripting language (using commands expect). It is also possible to use Network Management System (e.g. Zabix). Arbiter has the ability to log on to each of the routers in the network and retrieve sample data from: Command Line Interface, sflow and RMON probes. Thus collected data allows arbiter to modify the routes to each network. Diagram of such a network is shown in Fig. 4. Fig. 4. Network with arbiter. Let the flow f consists of n flows addressed according to the network. For the router R1 simplified routing table will look like this: Where AD OSFP means the administrative distance for a given route installed in the routing table. The arbiter based on flow and load analysis for various routes, transform the routing table of the router R1 to the fallowing sample form: This can be done by use the static float route mechanism [10], where and AD Static < AD OSFP. This will allow to asymmetric load balance according to a number of parameters including: delay, interface load, routers load, etc. 121
7 4.2 Load balancing alghoritm As already mentioned, to adapt OSPF network to asymmetric load balancing the new algorithm to switch routes has to be used. In Fig. 5 a diagram of such an algorithm is presented. The authors tested a lot of different boundary conditions for routes exchange. Algorithm diagram shown below is basically an open framework within which administrator can creates its own control algorithms depending on the specifics of the network. Fig. 5. Diagram of the algorithm The algorithm resides in the memory of the arbiter, which connects to the device and in the first step collects statistical data from probes operating on the device interfaces. The system administrator pre-defines the parameters or set of parameters that will be taken into account optimizing (load balance) the flow. The order of their selection is also important. In Fig. 5 first, the load of output router interfaces are tested. If the maximum interface load Ei difference delta C is greater than a specified value (e.g. E1 = 70%, E2 = 20% E3 = 50% then C = 50) then the algorithm searches for a minimum of (x), and maximally loaded (s) interface. The algorithm searches the topology table (not routing tables) to find all the routes that share a common value next hop = x = y. Found routes are saved in the matrix A from which the route is selected (eg. with the maximum or minimum load), and a new static route are created for it with administrative distance equal to AD Static, where AD Static < AD OSFP. Then this route is installed in the router's routing table, and interface load marked u decrease in the value of flow transferred to the interface x. Of course, a decision criteria and the boundary conditions can be chosen in a much more sophisticated way. After checking the condition 1 algorithm goes to check the next condition (2) in an analogous manner. In Fig. 5. next examined parameter is delay on each interface. Off course the number of checked parameters can be larger. It should be noted that this approach to modification of routes does not require from algorithm to start the SPF (placed on 122
8 each router) for each route exchange, which greatly stabilizes the operation of the network. Earlier attempts, based on OSPF protocol itself led to run the SFP algorithm on routers at intervals and significantly destabilizing (network interruptions, momentary delay) the work of devices. Another problem that has been identified during testing solutions is related to the stability of network flows in the time domain. At this stage, two aspects have been identified: 1. What time tc should the algorithm wait before another iteration, to stabilize the operation of the network before the next step? 2. Some of the flows relevant to the route have significant variation of band saturation during the test and their transfer between interfaces did not give satisfactory results. To estimate the flow characteristics it can be present in the form of time series. Most of the time series structure can be described using two basic classes of components: trend and seasonality. The first represents the long-term tendency to unidirectional changes (increase or decrease) the value of analyzed variable. The second may formally have a similar nature (e.g. the stabilization period, followed by exponential growth), but repeated at regular time intervals. These two general classes of time series data components may coexist in real data series [11, 12]. Particularly important from the point of view of the algorithm stability are stationarity and Hurst exponent. In the Fig. 7 a real computer data network flow was presented. As you can see it is stationary at certain intervals. The average bandwidth usage for all traffic is about 9%. However, there are time periods in which traffic is growing strongly. Measurement the traffic level at this point is not representative for whole traffic. Therefore, advisable is to make measurements of bandwidth saturation in a certain period of time instead in one point of time. H factor for this movement is 0.57 which leads to the conclusion that the time series maintains a positive correlation between a changes (memory effect) and in the long term should behave stably. The coefficients of determination indicate the presence of a weak trend. This flow should be treated as a stable and a good candidate for possible use in load balancing. Unfortunately, the execution of the current statistical analysis on the routers is impossible. However, it is possible to collect data using sflow and RMON protocol and transfer them to arbiter that will perform ongoing analysis and identification of streams dedicated to migration. Determination of the time tc value is possible only during experiments with the current network configuration. If tc will be to short the route can flapping between router interfaces, this results in significantly adversely the performance of computer networks. Too long tc time leads to limiting the impact of the algorithm to improve network performance. Time tc must correlate with the time needed to establish that the time series representing the flow within the route is stable. Load balancing of communication channels is one way that we can use to modify the protocol topology in the proposed architecture. The proposed architecture also allows to implement a number of other algorithms based for example on adjusting the load of network nodes to their hardware resources. This method is described in detail in [13] and algorithms presented there can be implemented in resources of the arbiter. 123
9 100 Interface utilization % [minute] Fig. 6. Router interface utilization of real network flow for one of the routes. 5 Possibilities of using the proposed architecture In complex network environments often there is a need to separate data plane of network devices from a control plane. This model is called Software Defined Network and has been dedicated for a complex networks. Unfortunately, support for this type of processing is implemented in new devices and does not include all currently used solutions. The proposed architecture can complement SDN networks and fits in to new philosophy of reactive networks with interface for programmer to develop code directly for the physical network devices control. At present, tests on devices is performed using SSH, sflow, Netflow, RMON but in the long term, a functionality called RestFull API will be used. In this chapter, the example of detecting anomalies in network traffic will be presented as the possibility of using the proposed architecture to implement new, original algorithms. In complex networks because of the large traffic intensity and its complexity it is not possible to perform ongoing analysis of all network traffic (Deep Packet Inspection) to threat detection. The proposed architecture allows rough traffic analysis in order to detect anomalies in traffic and then redirects only suspected flow to DPI. Copy of the traffic from the port of the router is redirected to the arbiter using port mirroring technique (Fig. 7). This does not introduce any delays and does not interfere with traffic sent to the router R2 and R5. After detecting and analyzing anomalies (up to 7 layer ISO/OSI model) flow, which is a potential attack is blocked. 124
10 To rough detection of anomalies, Anomaly Detection Module uses a statistical signature [14]. Fig. 7. AD module - operating diagram. In Fig. 8 the flow registered in real network was presented (solid line). Then when the traffic was recreated on the router interface (using traffic generator) the attack was performed (Internet Explorer "Aurora exploit) and system compared which traffic statistical values have changed. Table 1. Statisticla parameters changes durign the attack Statistical parameters Before attack Under attack Average 629,37 620,33 Median 352,00 62,00 Standard deviation 632,88 653,73 Kurtosis -1,54-1,60 Slant 0,48 0,50 Table 1 shows a change the statistical parameters for traffic with anomaly. The value of H parameter also change form 0.56 before attack to 0,3 during the attack. Based on the analysis of these parameters, the arbiter may decide to send traffic to the DPI module. 125
11 p/s Time [s] 300 Fig. 8. Solid line: traffic without attack, dotted line - traffic with Internet Explorer "Aurora exploit. 6 Summary Modern computer networks are multilayer structure. The general classification proposed in the work identifies three main layers: physical topology, logical topology and protocol topology. Methods and means of design the first two layers are known and authors shows them in second section. Physical topology is a static structure within which there no possibility to quick reconfiguration. The logical topology realized with different technology (eg. WDM, MPLS, FR) make reconfiguration possible, but it cannot be proceeded in real time in response to traffic demands. The authors focused on a protocol topology and the possibility of its reconfiguration, in particular on load balancing. The further work will focus on use of policy based routing to implement the holistic approach to manage the traffic and QOS in the network. 7 Bibliography 1. Yang Y., Wang J.: Optimal all-to-all personalized exchange in a class of optical multistage networks; IEEE Computer Society, Parallel and Distributed Systems, IEEE Transactions on, Vol. 12, Issue 6, pp , New York Hajder M., Bolanowski M., Paszkiewicz A.: Projektowanie topologiczne sieci WDM; Wydawnictwo Politechniki Łódzkiej, X Konferencja Sieci i Systemy Infor-matyczne, t. 1, ss , Łódź Hajder M., Bolanowski M., Paszkiewicz A.: Problems and perspective of telecommunications systems development; Kremenchuk State Polytechnical University, International Con- 126
12 ference of Science and Technology Scalnet'04, Scalable Systems and Computer Networks Design and Aplications, pp , Kremenchuk Т. Саати: Принятие решений Метод анализа иерархий; Радио и связь, Москва M.D. Maserovic, D. Macko, Y. Takabara: Theory of hierarchical miltilevel systems; Academic Press, New York and London, M. Hajder, M. Bolanowski, P. Dymora: Models of designing interconnection systems problem; Wydawnictwo Politechniki Łódzkiej, XII Konferencja Sieci i Systemy Informatyczne, ss , Łódź M. Hajder, M. Bolanowski, A. Hanus: The topological design of optical interconnection systems selected problems; Kremenchuk State Polytechnical University, International Conference of Science and Technology Scalnet'04, Scalable Systems and Computer Networks Design and Aplications, pp , Kremenchuk Fronczak A., Fronczak P.: Świat sieci złożonych Od fizyki do Internetu, Wydawnictwo naukowe PWN Grabowski F., Paszkiewicz A., Bolanowski M.: Computer networks as complex systems in nonextensive approach t.21, s.31-44, Journal Of Applied Computer Science, z.2, Wendell O.: CCNA Routing and Switching Official Cert Guide Library, Cisco Press Misiorek A., Weron R.: Modelowanie sezonowości a prognozowanie zapotrzebowania na energię elektryczną, Centrum im. H. Steinhausa, Politechnika Wrocławska, Wrocław Sobczyk M.: Statystyka: aspekty praktyczne i teoretyczne, Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej, Lublin Grabowski F., Paszkiewicz A., Bolanowski M.: Load Balncing of Communication Channels with the use of routing protocols t.14, s.77-85, Uniwersytet Marii Curie - Skłodowskiej W Lublinie, Annales Universitatis Mariae Curie-Skłodowska Sectio AI Informatica, z.3, Bolanowski M., Paszkiewicz A.: Nowy model detekcji zagrożeń w sieci komputerowej t.89, s , Wydawnictwo Sigma-Not Sp. Z O.O., Przegląd Elektrotechniczny, Z.11,
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
Software Defined Networking & Openflow
Software Defined Networking & Openflow Autonomic Computer Systems, HS 2015 Christopher Scherb, 01.10.2015 Overview What is Software Defined Networks? Brief summary on routing and forwarding Introduction
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Ethernet Fabrics: An Architecture for Cloud Networking
WHITE PAPER www.brocade.com Data Center Ethernet Fabrics: An Architecture for Cloud Networking As data centers evolve to a world where information and applications can move anywhere in the cloud, classic
Network Virtualization Server for Adaptive Network Control
Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,
A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
From Active & Programmable Networks to.. OpenFlow & Software Defined Networks. Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S.
From Active & Programmable Networks to.. OpenFlow & Software Defined Networks Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S. Braun University of Basel Cs321 - HS 2012 (Slides material from www.bigswitch.com)
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.
(MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:
ASON for Optical Networks
1/287 01-FGC1010609 Rev B ASON for Optical Networks Ericsson Control Plane for DWDM Optically Switched Networks ASON for MHL3000 Introduction The growing demand for multiple service is changing the network
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
Performance test of network devices
Annales UMCS Informatica AI XIII, 2 (2013) 29 36 DOI: 10.2478/v10065-012-0044-9 Performance test of network devices Marek Bolanowski 1, Andrzej Paszkiewicz 1 1 Department of Distributed Systems, Rzeszów
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators
An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]
A Software Architecture for a Photonic Network Planning Tool
A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart
VMDC 3.0 Design Overview
CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated
A New Forwarding Policy for Load Balancing in Communication Networks
A New Forwarding Policy for Load Balancing in Communication Networks Martin Heusse Yvon Kermarrec ENST de Bretagne BP 83, 985 Brest Cedex, France [email protected] Abstract We present in this
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Testing Challenges for Modern Networks Built Using SDN and OpenFlow
Using SDN and OpenFlow July 2013 Rev. A 07/13 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: [email protected] www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683 [email protected]
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Multiple Layer Traffic Engineering in NTT Network Service
Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY
ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect
Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches
Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches February, 2009 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1
System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect
Technical White Paper for Multi-Layer Network Planning
Technical White Paper for Multi-Layer Network Planning Technical White Paper for Multi-Layer Network Planning 1 Overview...1 2 Requirement Scenarios...2 2.1 Sharp Increase in Network Construction CapEx...3
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
Optical interconnection networks for data centers
Optical interconnection networks for data centers The 17th International Conference on Optical Network Design and Modeling Brest, France, April 2013 Christoforos Kachris and Ioannis Tomkos Athens Information
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks Tiago Fioreze, Remco van de Meent, and Aiko Pras University of Twente, Enschede, the Netherlands {t.fioreze, r.vandemeent,
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
Contents. Load balancing and high availability
White Paper Load Balancing in GateDefender Performa The information contained in this document represents the current view of Panda Software International, S.L on the issues discussed herein as of the
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
Cisco Certified Network Professional - Routing & Switching
Cisco Certified Network Professional - Routing & Switching Information Course Price 5,265 No. Vouchers: Course Code 0 Vouchers CCNP-RS No. Courses: 3 1/9 Implementing Cisco IP Routing Information Length:
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing
Cisco s Massively Scalable Data Center
Cisco s Massively Scalable Data Center Network Fabric for Warehouse Scale Computer At-A-Glance Datacenter is the Computer MSDC is the Network Cisco s Massively Scalable Data Center (MSDC) is a framework
SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION. 1 st September 2014
SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION st September 04 Aaron Tong Senior Manager High IQ Networking Centre of Excellence JUNIPER S AUTOMATION HORIZON SDN IS A JOURNEY NOT
QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
Relationship between SMP, ASON, GMPLS and SDN
Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center
A Framework for End-to-End Proactive Network Management
A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu
White Paper. Requirements of Network Virtualization
White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction
OpenFlow and Software Defined Networking presented by Greg Ferro. Software Defined Networking (SDN)
OpenFlow and Software Defined Networking presented by Greg Ferro Software Defined Networking (SDN) would like to thank Greg Ferro and Ivan Pepelnjak for giving us the opportunity to sponsor to this educational
ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL
R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE
Enhancing Network Monitoring with Route Analytics
with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments
OPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
LOGICAL TOPOLOGY DESIGN Practical tools to configure networks
LOGICAL TOPOLOGY DESIGN Practical tools to configure networks Guido. A. Gavilanes February, 2010 1 Introduction to LTD " Design a topology for specific requirements " A service provider must optimize its
TD 271 Rev.1 (PLEN/15)
INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
ISOM3380 Advanced Network Management. Spring 2014 15. Course Description
ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop
Computer Networks as Complex Systems in Nonextensive Approach
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 21 No. 2 (2013), pp. 31-44 Computer Networks as Complex Systems in Nonextensive Approach Franciszek Grabowski, Andrzej Paszkiewicz, Marek Bolanowski Rzeszow University
Networking Systems (10102)
Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career
TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical
TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical
Software Defined Networking
Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:
ICTTEN4215A Install and configure internet protocol TV in a service provider network
ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History
Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management
Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
On the effect of forwarding table size on SDN network utilization
IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz
Software Defined Network Application in Hospital
InImpact: The Journal of Innovation Impact: ISSN 2051-6002 : http://www.inimpact.org Special Edition on Innovation in Medicine and Healthcare : Vol. 6. No. 1 : pp.1-11 : imed13-011 Software Defined Network
software networking Jithesh TJ, Santhosh Karipur QuEST Global
software defined networking Software Defined Networking is an emerging trend in the networking and communication industry and it promises to deliver enormous benefits, from reduced costs to more efficient
Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers
Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers s Executive Summary Cloud computing, video streaming, and social media are contributing to a dramatic rise in metro
Net Optics and Cisco NAM
When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
Interconnecting Data Centers Using VPLS
Interconnecting Data Centers Using VPLS Nash Darukhanawalla, CCIE No. 10332 Patrice Bellagamba Cisco Press 800 East 96th Street Indianapolis, IN 46240 viii Interconnecting Data Centers Using VPLS Contents
BATTLEFIELD NETWORK APPLICATIONS OF THE SHAMAN MANAGEMENT SYSTEM
BATTLEFIELD NETWORK APPLICATIONS OF THE SHAMAN MANAGEMENT SYSTEM Adarshpal S. Sethi Dong Zhu Vasil Hnatyshin Prasanth Kokati Department of Computer and Information Sciences University of Delaware, Newark,
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture
A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture Hyeon seok O, Namgi Kim1, Byoung-Dai Lee dept. of Computer Science. Kyonggi University, Suwon,
a new sdn-based control plane architecture for 5G
a new sdn-based control plane architecture for 5G With a Case Study on Connectivity Management m. outline what is sdn? 5G proposed control plane connectivity control software-defined networking The needs
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Juniper Networks QFabric: Scaling for the Modern Data Center
Juniper Networks QFabric: Scaling for the Modern Data Center Executive Summary The modern data center has undergone a series of changes that have significantly impacted business operations. Applications
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
SDN/Virtualization and Cloud Computing
SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer
CORPORATE NETWORKING
CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham [email protected] Typical example of Ethernet local networks Mostly based
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
Performance of Cisco IPS 4500 and 4300 Series Sensors
White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
