The multilayer complex network design with use of the arbiter

Size: px
Start display at page:

Download "The multilayer complex network design with use of the arbiter"

Transcription

1 The multilayer complex network design with use of the arbiter 1 Marek Bolanowski, 1 Andrzej Paszkiewicz, 2 Tadeusz Kwater, Bogdan Kwiatkowski 1 Department of Distributed Systems Rzeszow University of Technology [email protected] 2 Centre of Innovation and Transfer of Natural Sciences and Engineering Knowledge University of Rzeszow {tkwater, bkwiat}@ur.edu.pl Abstract. In the paper the methods and means of designing modern network structures are presented, in the first part the authors shows the classical approach to designing logical and physical topology and introduce a new concept of topology layer defined by routing protocol called the protocol topology. Nowadays, most of the mechanisms and communication paths is determined precisely by routing protocols. The authors propose its own structure with the arbiter that allows to change the protocol topology, reactively, according to the load of each router interfaces. The authors also presents an example of using the proposed model for implementing new functionalities such as: network anomaly traffic detection. The proposed architecture can be considered as a universal framework to implement new algorithms (created and tested by the network administrator) for network management. Is especially important that all of the proposed topology can be implemented using well-known, open network management protocols. Keywords: computer network, protocol layer, routing algorithms, computer network design. 1 Introduction Today's networking systems are becoming more complex environment under which we have to deal with the growing convergence of various services. The size of this class network system forces the use of automated synthesis algorithms to scale systems and algorithms for topology changes (reconfiguration) during normal operation. Currently more and more attention is paid to the efficient management of this class of systems. In the first part of the article a classical approach to the design of physical networks, and logical topology selection method will be presented. In the next part, architecture of the new topology layer will be presented which is created by the traffic routing protocols. Currently this particular layer is in the spotlight because it has influence on the flows in the network and consequently on the network topologies. 116

2 2 Classic methods and means for physical and logical topology design A modern systems, because of the multiplicity of tasks, are described with the use of hierarchical structures. However, in previous studies [1, 2, 3] considerations are limited to the analysis of two-level hierarchical structures. If the system has a multilevel structure, for the purpose of analysis, it is recommended to decompose it to twolayer structures that will be analyzed using existing methods. Existing models of hierarchical systems have a special character, i.e. are applicable only to specific systems. In addition, the models transforms the solution of the optimal hierarchical structure search to the discrete optimization tasks characterized by a very high computational complexity. There are two main types of hierarchical structures of communication systems: a functional hierarchy and a topological hierarchy of connection network. Using the assumptions of the layer systems theory [4] functional hierarchy can be represented by a system mutually corelated layer [4,5]. With this approach the task of network system synthesis is decomposed into smaller tasks solved in shorter time using dedicated methods and applications. The layered structure is hierarchically associated system of interdependent functional levels. If the level in the stratified system is associated only with the master (up level) and slave (down level), such a system is called layered system. Stratified scheme of complex large-scale communication system is presented in Fig1. Fig. 1. Stratified scheme of complex, large-scale communication system. Decomposition of communication layer into two closely related topological layer: physical topology and logical topology allows the use of new methods of synthesis and topology reconfigurations. However, the current adjustment of logical layer (typically constructed using Frame Relay, etc. WDM.) to the requirements of the communication network is limited because of the technology and administration restriction. The conclusions: one of the methods to improve the capacity of modern communication systems is to improve and reorganize of connection dependence in the protocol topology. 117

3 In the connection network synthesis the topology, the number of communication channels, their capacity and distribution of the system components are searched. Optimization methods developed for this model, assume the existence of several levels of communication and functional hierarchy [2, 6]. Methods for optimal and accurate network design has been carefully developed, but there is need for constant updating due to the low flexibility of their use in the environment of continually evolving network technologies. Often the algorithms are affected by numerous restrictions and initial assumptions that prevent their use for synthesis of the real connection networks. Often, these methods are characterized by high computational complexity and they are considered as NP-complete problems [7], and ability to parallelize computations is usually impossible. Fig. 2 presents the classification of conventional network design tasks. Fig. 2. The classification of conventional network design tasks. Letter G denotes that the task can be modeled using a graph, and T denotes modeling with a tree. Variable r is a matrix with bandwidth requirements between nodes; c is a matrix determining the unit cost of communication between nodes, wherein r 0 and c 0. The color gray is NP-hard task to solve, while the white color highlights the polynomial complexity of task. In addition, in the figure the names of the selected design tasks was placed: OCSTP (Optimal communication spanning tree problem), OLCSTP (Optimal Link Cost STP), ORSTP (Optimal Route STP) Most of algorithms for design the physical and logical topology is well known. The rest of this article focus on the methods and means to design and reconfiguration the protocol topology with use of routing protocol and arbiter. 118

4 3 Computer networks in terms of complex systems The most basic and natural classification of complex networks models, is to divide them into deterministic and random networks. Models based on random networks do not apply to any specific network, but to the set of networks with various probability of appear. The edges of random networks are distributed completely random. Therefore, to this type of network can be included the real networks and its theoretical models, in which the randomness factor is their inherent feature in case of creation and evolution processes. In contrast, deterministic network in its evolution and construction procedures do not allow for any randomness. Static nets can be compared to the equilibrium state, as the main characteristics of this type of systems, such as the number of nodes, number of links, the bunch factor and distribution of vertices degrees does not depend on time (are constant). However, in evolving networks characteristics such as number of nodes and edges, or even interconnection patterns are dependent on time although changes over time, usually are stationary processes. Therefore, static and evolutionary networks are also called respectively equilibrium and non-equilibrium networks [8]. In the article [9] a new model of computer networks was proposed, which take into account self-organization and self-adaptation as mechanisms defining network performance. Conclusions of modern research on the computer network, and in particular the phenomena occurring in them, clearly show the need to treat them as complex systems with particular attention to the impact of forwarded traffic on control, threats detection and also the selection of infrastructure elements. This would imply a total redesign of existing network infrastructure with simultaneous change the currently used algorithms. Due to the cost and organizational issues such revolutionary action becomes impossible. Instead, it is necessary to implement evolutionary mechanisms in to the network constructed according to the classical model presented in chapter two. This architecture allows to use of non-extensive statistics, self-adaptation and self-organization to manage networks. In chapter four such a network architecture will be proposed. 4 A new complex network architecture The next layer in the process of creating the network is routing layer. In fact, this layer creates a separate topologies in dimension of routing connection protocol. In this layer the load balancing of routes is the main objective of management. In the article [9] the authors also show that the mismatch between router hardware resources and current task load can lead to critical system organization and consequently to its failure. Currently one of the most widely used open routing protocol is OSPF. Load balancing in OSPF is implemented using trivial algorithm which based on the static metrics and SPF algorithm. Metric determining the cumulative value is mostly determined on the basis of values taken from a static interface parameter called bandwidth. During normal operation of the network, this parameter is not change. Fig. 3a is shown an example of a network with five routers. For simplicity let s assume that the 119

5 routers R1, R2, R3, R4 have the same network interfaces and its capacity is equal x. Routers R1, R5, R4, on the alternate path have also interface with the same speed equal to y, wherein x > y. Fig. 3. a. Routing without load balancing; b. Routing with load balancing. This configuration is often implemented: Route R1, R2, R3, R4 is considered as the main route and route R1, R5, R4 is considered as an alternative route used only in case of failure. In such a case as a result of the SPF algorithm run for the flow f the OSPF route R1, R2, R3, R4 will be selected. To balance the load between the two routes cumulative cost for R1, R2, R3, R4 and R1, R5, R4 has to be identical. Then the Equal Cost Multipath algorithm would be used. Unfortunately, under normal conditions, this situation is relatively rare. The use of asymmetric load balancing (Fig. 3.b) may be implemented through the OSPF algorithm modification, but in a commercial environment (modification of router firmware) such action is impossible. However, from the viewpoint of complex systems load balancing of resources is a key element. Later the algorithm is proposed to modify the routes in routing table depending on the current flow analysis f. 120

6 4.1 System architecture As already mentioned, OSPF protocol will be adapt to asymmetric load balancing by introducing arbiter into the network. Architecture arbiter may take various forms. The architecture of arbiter can be different between the specific implementation. Tests that have been made were implemented based on linux system, C++, and scripting language (using commands expect). It is also possible to use Network Management System (e.g. Zabix). Arbiter has the ability to log on to each of the routers in the network and retrieve sample data from: Command Line Interface, sflow and RMON probes. Thus collected data allows arbiter to modify the routes to each network. Diagram of such a network is shown in Fig. 4. Fig. 4. Network with arbiter. Let the flow f consists of n flows addressed according to the network. For the router R1 simplified routing table will look like this: Where AD OSFP means the administrative distance for a given route installed in the routing table. The arbiter based on flow and load analysis for various routes, transform the routing table of the router R1 to the fallowing sample form: This can be done by use the static float route mechanism [10], where and AD Static < AD OSFP. This will allow to asymmetric load balance according to a number of parameters including: delay, interface load, routers load, etc. 121

7 4.2 Load balancing alghoritm As already mentioned, to adapt OSPF network to asymmetric load balancing the new algorithm to switch routes has to be used. In Fig. 5 a diagram of such an algorithm is presented. The authors tested a lot of different boundary conditions for routes exchange. Algorithm diagram shown below is basically an open framework within which administrator can creates its own control algorithms depending on the specifics of the network. Fig. 5. Diagram of the algorithm The algorithm resides in the memory of the arbiter, which connects to the device and in the first step collects statistical data from probes operating on the device interfaces. The system administrator pre-defines the parameters or set of parameters that will be taken into account optimizing (load balance) the flow. The order of their selection is also important. In Fig. 5 first, the load of output router interfaces are tested. If the maximum interface load Ei difference delta C is greater than a specified value (e.g. E1 = 70%, E2 = 20% E3 = 50% then C = 50) then the algorithm searches for a minimum of (x), and maximally loaded (s) interface. The algorithm searches the topology table (not routing tables) to find all the routes that share a common value next hop = x = y. Found routes are saved in the matrix A from which the route is selected (eg. with the maximum or minimum load), and a new static route are created for it with administrative distance equal to AD Static, where AD Static < AD OSFP. Then this route is installed in the router's routing table, and interface load marked u decrease in the value of flow transferred to the interface x. Of course, a decision criteria and the boundary conditions can be chosen in a much more sophisticated way. After checking the condition 1 algorithm goes to check the next condition (2) in an analogous manner. In Fig. 5. next examined parameter is delay on each interface. Off course the number of checked parameters can be larger. It should be noted that this approach to modification of routes does not require from algorithm to start the SPF (placed on 122

8 each router) for each route exchange, which greatly stabilizes the operation of the network. Earlier attempts, based on OSPF protocol itself led to run the SFP algorithm on routers at intervals and significantly destabilizing (network interruptions, momentary delay) the work of devices. Another problem that has been identified during testing solutions is related to the stability of network flows in the time domain. At this stage, two aspects have been identified: 1. What time tc should the algorithm wait before another iteration, to stabilize the operation of the network before the next step? 2. Some of the flows relevant to the route have significant variation of band saturation during the test and their transfer between interfaces did not give satisfactory results. To estimate the flow characteristics it can be present in the form of time series. Most of the time series structure can be described using two basic classes of components: trend and seasonality. The first represents the long-term tendency to unidirectional changes (increase or decrease) the value of analyzed variable. The second may formally have a similar nature (e.g. the stabilization period, followed by exponential growth), but repeated at regular time intervals. These two general classes of time series data components may coexist in real data series [11, 12]. Particularly important from the point of view of the algorithm stability are stationarity and Hurst exponent. In the Fig. 7 a real computer data network flow was presented. As you can see it is stationary at certain intervals. The average bandwidth usage for all traffic is about 9%. However, there are time periods in which traffic is growing strongly. Measurement the traffic level at this point is not representative for whole traffic. Therefore, advisable is to make measurements of bandwidth saturation in a certain period of time instead in one point of time. H factor for this movement is 0.57 which leads to the conclusion that the time series maintains a positive correlation between a changes (memory effect) and in the long term should behave stably. The coefficients of determination indicate the presence of a weak trend. This flow should be treated as a stable and a good candidate for possible use in load balancing. Unfortunately, the execution of the current statistical analysis on the routers is impossible. However, it is possible to collect data using sflow and RMON protocol and transfer them to arbiter that will perform ongoing analysis and identification of streams dedicated to migration. Determination of the time tc value is possible only during experiments with the current network configuration. If tc will be to short the route can flapping between router interfaces, this results in significantly adversely the performance of computer networks. Too long tc time leads to limiting the impact of the algorithm to improve network performance. Time tc must correlate with the time needed to establish that the time series representing the flow within the route is stable. Load balancing of communication channels is one way that we can use to modify the protocol topology in the proposed architecture. The proposed architecture also allows to implement a number of other algorithms based for example on adjusting the load of network nodes to their hardware resources. This method is described in detail in [13] and algorithms presented there can be implemented in resources of the arbiter. 123

9 100 Interface utilization % [minute] Fig. 6. Router interface utilization of real network flow for one of the routes. 5 Possibilities of using the proposed architecture In complex network environments often there is a need to separate data plane of network devices from a control plane. This model is called Software Defined Network and has been dedicated for a complex networks. Unfortunately, support for this type of processing is implemented in new devices and does not include all currently used solutions. The proposed architecture can complement SDN networks and fits in to new philosophy of reactive networks with interface for programmer to develop code directly for the physical network devices control. At present, tests on devices is performed using SSH, sflow, Netflow, RMON but in the long term, a functionality called RestFull API will be used. In this chapter, the example of detecting anomalies in network traffic will be presented as the possibility of using the proposed architecture to implement new, original algorithms. In complex networks because of the large traffic intensity and its complexity it is not possible to perform ongoing analysis of all network traffic (Deep Packet Inspection) to threat detection. The proposed architecture allows rough traffic analysis in order to detect anomalies in traffic and then redirects only suspected flow to DPI. Copy of the traffic from the port of the router is redirected to the arbiter using port mirroring technique (Fig. 7). This does not introduce any delays and does not interfere with traffic sent to the router R2 and R5. After detecting and analyzing anomalies (up to 7 layer ISO/OSI model) flow, which is a potential attack is blocked. 124

10 To rough detection of anomalies, Anomaly Detection Module uses a statistical signature [14]. Fig. 7. AD module - operating diagram. In Fig. 8 the flow registered in real network was presented (solid line). Then when the traffic was recreated on the router interface (using traffic generator) the attack was performed (Internet Explorer "Aurora exploit) and system compared which traffic statistical values have changed. Table 1. Statisticla parameters changes durign the attack Statistical parameters Before attack Under attack Average 629,37 620,33 Median 352,00 62,00 Standard deviation 632,88 653,73 Kurtosis -1,54-1,60 Slant 0,48 0,50 Table 1 shows a change the statistical parameters for traffic with anomaly. The value of H parameter also change form 0.56 before attack to 0,3 during the attack. Based on the analysis of these parameters, the arbiter may decide to send traffic to the DPI module. 125

11 p/s Time [s] 300 Fig. 8. Solid line: traffic without attack, dotted line - traffic with Internet Explorer "Aurora exploit. 6 Summary Modern computer networks are multilayer structure. The general classification proposed in the work identifies three main layers: physical topology, logical topology and protocol topology. Methods and means of design the first two layers are known and authors shows them in second section. Physical topology is a static structure within which there no possibility to quick reconfiguration. The logical topology realized with different technology (eg. WDM, MPLS, FR) make reconfiguration possible, but it cannot be proceeded in real time in response to traffic demands. The authors focused on a protocol topology and the possibility of its reconfiguration, in particular on load balancing. The further work will focus on use of policy based routing to implement the holistic approach to manage the traffic and QOS in the network. 7 Bibliography 1. Yang Y., Wang J.: Optimal all-to-all personalized exchange in a class of optical multistage networks; IEEE Computer Society, Parallel and Distributed Systems, IEEE Transactions on, Vol. 12, Issue 6, pp , New York Hajder M., Bolanowski M., Paszkiewicz A.: Projektowanie topologiczne sieci WDM; Wydawnictwo Politechniki Łódzkiej, X Konferencja Sieci i Systemy Infor-matyczne, t. 1, ss , Łódź Hajder M., Bolanowski M., Paszkiewicz A.: Problems and perspective of telecommunications systems development; Kremenchuk State Polytechnical University, International Con- 126

12 ference of Science and Technology Scalnet'04, Scalable Systems and Computer Networks Design and Aplications, pp , Kremenchuk Т. Саати: Принятие решений Метод анализа иерархий; Радио и связь, Москва M.D. Maserovic, D. Macko, Y. Takabara: Theory of hierarchical miltilevel systems; Academic Press, New York and London, M. Hajder, M. Bolanowski, P. Dymora: Models of designing interconnection systems problem; Wydawnictwo Politechniki Łódzkiej, XII Konferencja Sieci i Systemy Informatyczne, ss , Łódź M. Hajder, M. Bolanowski, A. Hanus: The topological design of optical interconnection systems selected problems; Kremenchuk State Polytechnical University, International Conference of Science and Technology Scalnet'04, Scalable Systems and Computer Networks Design and Aplications, pp , Kremenchuk Fronczak A., Fronczak P.: Świat sieci złożonych Od fizyki do Internetu, Wydawnictwo naukowe PWN Grabowski F., Paszkiewicz A., Bolanowski M.: Computer networks as complex systems in nonextensive approach t.21, s.31-44, Journal Of Applied Computer Science, z.2, Wendell O.: CCNA Routing and Switching Official Cert Guide Library, Cisco Press Misiorek A., Weron R.: Modelowanie sezonowości a prognozowanie zapotrzebowania na energię elektryczną, Centrum im. H. Steinhausa, Politechnika Wrocławska, Wrocław Sobczyk M.: Statystyka: aspekty praktyczne i teoretyczne, Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej, Lublin Grabowski F., Paszkiewicz A., Bolanowski M.: Load Balncing of Communication Channels with the use of routing protocols t.14, s.77-85, Uniwersytet Marii Curie - Skłodowskiej W Lublinie, Annales Universitatis Mariae Curie-Skłodowska Sectio AI Informatica, z.3, Bolanowski M., Paszkiewicz A.: Nowy model detekcji zagrożeń w sieci komputerowej t.89, s , Wydawnictwo Sigma-Not Sp. Z O.O., Przegląd Elektrotechniczny, Z.11,

Comprehensive IP Traffic Monitoring with FTAS System

Comprehensive IP Traffic Monitoring with FTAS System Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous

More information

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------

More information

Software Defined Networking & Openflow

Software Defined Networking & Openflow Software Defined Networking & Openflow Autonomic Computer Systems, HS 2015 Christopher Scherb, 01.10.2015 Overview What is Software Defined Networks? Brief summary on routing and forwarding Introduction

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Ethernet Fabrics: An Architecture for Cloud Networking

Ethernet Fabrics: An Architecture for Cloud Networking WHITE PAPER www.brocade.com Data Center Ethernet Fabrics: An Architecture for Cloud Networking As data centers evolve to a world where information and applications can move anywhere in the cloud, classic

More information

Network Virtualization Server for Adaptive Network Control

Network Virtualization Server for Adaptive Network Control Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,

More information

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

From Active & Programmable Networks to.. OpenFlow & Software Defined Networks. Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S.

From Active & Programmable Networks to.. OpenFlow & Software Defined Networks. Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S. From Active & Programmable Networks to.. OpenFlow & Software Defined Networks Prof. C. Tschudin, M. Sifalakis, T. Meyer, M. Monti, S. Braun University of Basel Cs321 - HS 2012 (Slides material from www.bigswitch.com)

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

A Look at the New Converged Data Center

A Look at the New Converged Data Center Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers

More information

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

Table of Contents. Cisco How Does Load Balancing Work?

Table of Contents. Cisco How Does Load Balancing Work? Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]

More information

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.

(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004. (MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:

More information

ASON for Optical Networks

ASON for Optical Networks 1/287 01-FGC1010609 Rev B ASON for Optical Networks Ericsson Control Plane for DWDM Optically Switched Networks ASON for MHL3000 Introduction The growing demand for multiple service is changing the network

More information

Leveraging SDN and NFV in the WAN

Leveraging SDN and NFV in the WAN Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined

More information

Performance test of network devices

Performance test of network devices Annales UMCS Informatica AI XIII, 2 (2013) 29 36 DOI: 10.2478/v10065-012-0044-9 Performance test of network devices Marek Bolanowski 1, Andrzej Paszkiewicz 1 1 Department of Distributed Systems, Rzeszów

More information

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia [email protected] Tianfu Fu [email protected] Cheng He Danping He [email protected]

More information

A Software Architecture for a Photonic Network Planning Tool

A Software Architecture for a Photonic Network Planning Tool A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart

More information

VMDC 3.0 Design Overview

VMDC 3.0 Design Overview CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated

More information

A New Forwarding Policy for Load Balancing in Communication Networks

A New Forwarding Policy for Load Balancing in Communication Networks A New Forwarding Policy for Load Balancing in Communication Networks Martin Heusse Yvon Kermarrec ENST de Bretagne BP 83, 985 Brest Cedex, France [email protected] Abstract We present in this

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Testing Challenges for Modern Networks Built Using SDN and OpenFlow

Testing Challenges for Modern Networks Built Using SDN and OpenFlow Using SDN and OpenFlow July 2013 Rev. A 07/13 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: [email protected] www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683 [email protected]

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Multiple Layer Traffic Engineering in NTT Network Service

Multiple Layer Traffic Engineering in NTT Network Service Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service

More information

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect

More information

Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches

Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches February, 2009 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1 System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect

More information

Technical White Paper for Multi-Layer Network Planning

Technical White Paper for Multi-Layer Network Planning Technical White Paper for Multi-Layer Network Planning Technical White Paper for Multi-Layer Network Planning 1 Overview...1 2 Requirement Scenarios...2 2.1 Sharp Increase in Network Construction CapEx...3

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Optical interconnection networks for data centers

Optical interconnection networks for data centers Optical interconnection networks for data centers The 17th International Conference on Optical Network Design and Modeling Brest, France, April 2013 Christoforos Kachris and Ioannis Tomkos Athens Information

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

An Architecture for the Self-management of Lambda-Connections in Hybrid Networks

An Architecture for the Self-management of Lambda-Connections in Hybrid Networks An Architecture for the Self-management of Lambda-Connections in Hybrid Networks Tiago Fioreze, Remco van de Meent, and Aiko Pras University of Twente, Enschede, the Netherlands {t.fioreze, r.vandemeent,

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,

More information

Contents. Load balancing and high availability

Contents. Load balancing and high availability White Paper Load Balancing in GateDefender Performa The information contained in this document represents the current view of Panda Software International, S.L on the issues discussed herein as of the

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Cisco Certified Network Professional - Routing & Switching

Cisco Certified Network Professional - Routing & Switching Cisco Certified Network Professional - Routing & Switching Information Course Price 5,265 No. Vouchers: Course Code 0 Vouchers CCNP-RS No. Courses: 3 1/9 Implementing Cisco IP Routing Information Length:

More information

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing

More information

Cisco s Massively Scalable Data Center

Cisco s Massively Scalable Data Center Cisco s Massively Scalable Data Center Network Fabric for Warehouse Scale Computer At-A-Glance Datacenter is the Computer MSDC is the Network Cisco s Massively Scalable Data Center (MSDC) is a framework

More information

SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION. 1 st September 2014

SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION. 1 st September 2014 SDN IN WAN NETWORK PROGRAMMABILITY THROUGH CENTRALIZED PATH COMPUTATION st September 04 Aaron Tong Senior Manager High IQ Networking Centre of Excellence JUNIPER S AUTOMATION HORIZON SDN IS A JOURNEY NOT

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,

More information

Relationship between SMP, ASON, GMPLS and SDN

Relationship between SMP, ASON, GMPLS and SDN Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction

More information

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana

More information

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013 Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center

More information

A Framework for End-to-End Proactive Network Management

A Framework for End-to-End Proactive Network Management A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

OpenFlow and Software Defined Networking presented by Greg Ferro. Software Defined Networking (SDN)

OpenFlow and Software Defined Networking presented by Greg Ferro. Software Defined Networking (SDN) OpenFlow and Software Defined Networking presented by Greg Ferro Software Defined Networking (SDN) would like to thank Greg Ferro and Ivan Pepelnjak for giving us the opportunity to sponsor to this educational

More information

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE

More information

Enhancing Network Monitoring with Route Analytics

Enhancing Network Monitoring with Route Analytics with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks LOGICAL TOPOLOGY DESIGN Practical tools to configure networks Guido. A. Gavilanes February, 2010 1 Introduction to LTD " Design a topology for specific requirements " A service provider must optimize its

More information

TD 271 Rev.1 (PLEN/15)

TD 271 Rev.1 (PLEN/15) INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:

More information

Path Selection Analysis in MPLS Network Based on QoS

Path Selection Analysis in MPLS Network Based on QoS Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special

More information

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description

ISOM3380 Advanced Network Management. Spring 2014 15. Course Description ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop

More information

Computer Networks as Complex Systems in Nonextensive Approach

Computer Networks as Complex Systems in Nonextensive Approach JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 21 No. 2 (2013), pp. 31-44 Computer Networks as Complex Systems in Nonextensive Approach Franciszek Grabowski, Andrzej Paszkiewicz, Marek Bolanowski Rzeszow University

More information

Networking Systems (10102)

Networking Systems (10102) Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical

More information

Software Defined Networking

Software Defined Networking Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:

More information

ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN4215A Install and configure internet protocol TV in a service provider network ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History

More information

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management

Routing & Traffic Analysis for Converged Networks. Filling the Layer 3 Gap in VoIP Management Routing & Traffic Analysis for Converged Networks Filling the Layer 3 Gap in VoIP Management Executive Summary Voice over Internet Protocol (VoIP) is transforming corporate and consumer communications

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

Software Defined Network Application in Hospital

Software Defined Network Application in Hospital InImpact: The Journal of Innovation Impact: ISSN 2051-6002 : http://www.inimpact.org Special Edition on Innovation in Medicine and Healthcare : Vol. 6. No. 1 : pp.1-11 : imed13-011 Software Defined Network

More information

software networking Jithesh TJ, Santhosh Karipur QuEST Global

software networking Jithesh TJ, Santhosh Karipur QuEST Global software defined networking Software Defined Networking is an emerging trend in the networking and communication industry and it promises to deliver enormous benefits, from reduced costs to more efficient

More information

Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers

Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers s Executive Summary Cloud computing, video streaming, and social media are contributing to a dramatic rise in metro

More information

Net Optics and Cisco NAM

Net Optics and Cisco NAM When Cisco decided to break its Network Analysis Module (NAM) out of the box and into a stand-alone appliance, they turned to Net Optics for monitoring access connectivity. Cisco NAM 2200 Series Cisco

More information

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory

More information

Interconnecting Data Centers Using VPLS

Interconnecting Data Centers Using VPLS Interconnecting Data Centers Using VPLS Nash Darukhanawalla, CCIE No. 10332 Patrice Bellagamba Cisco Press 800 East 96th Street Indianapolis, IN 46240 viii Interconnecting Data Centers Using VPLS Contents

More information

BATTLEFIELD NETWORK APPLICATIONS OF THE SHAMAN MANAGEMENT SYSTEM

BATTLEFIELD NETWORK APPLICATIONS OF THE SHAMAN MANAGEMENT SYSTEM BATTLEFIELD NETWORK APPLICATIONS OF THE SHAMAN MANAGEMENT SYSTEM Adarshpal S. Sethi Dong Zhu Vasil Hnatyshin Prasanth Kokati Department of Computer and Information Sciences University of Delaware, Newark,

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture

A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture A Virtual Machine Searching Method in Networks using a Vector Space Model and Routing Table Tree Architecture Hyeon seok O, Namgi Kim1, Byoung-Dai Lee dept. of Computer Science. Kyonggi University, Suwon,

More information

a new sdn-based control plane architecture for 5G

a new sdn-based control plane architecture for 5G a new sdn-based control plane architecture for 5G With a Case Study on Connectivity Management m. outline what is sdn? 5G proposed control plane connectivity control software-defined networking The needs

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

Juniper Networks QFabric: Scaling for the Modern Data Center

Juniper Networks QFabric: Scaling for the Modern Data Center Juniper Networks QFabric: Scaling for the Modern Data Center Executive Summary The modern data center has undergone a series of changes that have significantly impacted business operations. Applications

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

SDN/Virtualization and Cloud Computing

SDN/Virtualization and Cloud Computing SDN/Virtualization and Cloud Computing Agenda Software Define Network (SDN) Virtualization Cloud Computing Software Defined Network (SDN) What is SDN? Traditional Network and Limitations Traditional Computer

More information

CORPORATE NETWORKING

CORPORATE NETWORKING CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham [email protected] Typical example of Ethernet local networks Mostly based

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Performance of Cisco IPS 4500 and 4300 Series Sensors

Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information