Cost Efficient Overflow Routing for Outbound ISP Traffic
|
|
|
- Erica Phillips
- 10 years ago
- Views:
Transcription
1 Cost Efficient Overflow Routing for Outbound ISP Traffic Alexander A. Kist and Richard J. Harris RMIT University, BOX 476V, Victoria 00, Australia Abstract Multihomed Internet Service Providers (ISPs) are typically connected to several transit ISPs. If cost is assigned to interconnecting resources, multihomed ISPs face the problem of cost efficient outbound traffic routing. In particular, this is relevant if the ISPs form customer to provider relationships and alternative billing schemes are used, i.e. volume or time based. The Border Gateway Protocol (BGP) is the de facto standard for inter-domain IP routing on the Internet but its traffic engineering capabilities are limited. This paper proposes a local overflow methodology that allows cost efficient outbound packet routing and is based on the Scheme for Alternative Packet Overflow Routing (SAPOR). The paper identifies the underlying optimisation problem, introduces the modified SAPOR methodology and presents simulation results that verify the operation of the scheme.. Introduction The Internet consists of a vast number of interconnected domains or networks. A domain is usually associated with a company, an organisation or an Internet Service Provider (ISP). Two principal ISP types are common, stub ISPs and transit ISPs. Stub ISPs resell Internet connectivity to third parties such as home users and businesses, as well as service hosts, content and web space providers etc. Generally, stub ISPs provide no transit services. Transit ISPs provide connectivity to other ISPs and organisations. Stub ISPs require transit ISPs to gain connectivity to the global Internet. Whereas the main purpose of transit ISPs is to transport traffic, stub ISPs consume and/or generate traffic. Two common business relationships exist: customer-to-provider or peer-to-peer relationships. Where providers sell resources, peers make resources available to each other s customers. The Internet hierarchy and its characterisation is discussed in [] in more detail. To route IP packets between domains, inter-domain routing protocols are used. The Border Gateway Protocol (BGP) [] is the de facto inter-domain routing standard on the Internet. In BGP jargon, domains are called Autonomous Systems (ASs). BGP is a path vector protocol that propagates reachability information of networks and distributes paths to all reachable ASs. Due to the massive growth of the Internet, BGP faces a number of known problems: Route instabilities, convergence, scalability and routing inefficiencies. These issues are well known by the research community and are not the immediate focus of this work. However, in this paper, it is assumed that gateway routers use BGP. BGP provides certain rules that influence traffic flows and their routing. The article [] by B. Quoitin et al. and the book [4] by I. van Beijnum (Chapter 6: Traffic Engineering) are examples that address this topic. These works discuss methods for influencing the network exit strategy for outbound traffic, but these schemes are not load sensitive and most of the methods rely on the manipulation of prefix matching and routing tables. Inbound traffic routing depends, to a large extent, on policies that are implemented by upstream ISPs. To some extent this can be influenced by the advertised routes. Recent research addresses this topic. For example, B. Quoitin et al. propose in [5] redistribution communities to control inbound traffic. Internet backbones and transit networks are often operated by commercial service providers. ISPs that connect to these domains require commercial Service Level Agreements (SLAs). If dollar-costs are associated with usage, optimisation techniques can be used to minimise operational costs. These techniques result in the choice of the most cost efficient path for given settings. A recent paper by Uhlig et al. [6] addresses the problem of intra-domain traffic engineering by using an evolutionary algorithm to find near optimal BGP filters that balance the load over several interfaces. Another possible traffic engineering method is overflow routing. The concept of overflow routing is a well known method that is widely used in legacy systems and current Public Switched Telephone Networks (PSTNs). Gerald Ash s book [7] presents a comprehensive discussion of this topic. It includes examples such as Dynamic Non-Hierarchical Rout-
2 ing (DNHR) which uses different path sets for different times of the day for voice carriers and was initially developed by AT&T. In a recent paper [8], a Scheme for Alternative Packet Overflow Routing (SAPOR) has been introduced which provides a mechanism for overflow routing in IP networks. SAPOR mainly targets interior gateway routing. This paper proposes an adaptation of the SAPOR scheme to address the problem of cost efficient stub AS outbound traffic routing in BGP contexts. The discussions in this paper use the notion of flows to discuss the network traffic. Microflows are defined as a collection of packets with the same source and destination address, the same source and destination ports and are separated by interarrival times that are below a maximum threshold. Flows are the aggregation of microflows. Both are measured in bytes per second. The contributions of this work can be summarised as follows: Firstly, it outlines the optimisation problem of efficient traffic routing for outbound ISP traffic; secondly, it proposes a modified SAPOR scheme that allows cost efficient overflow routing in IP networks; and thirdly, it provides simulation results that verify the operation of this scheme. The paper is organised as follows: The next section discusses the general optimisation problem and its relevance, Section introduces the modified SAPOR scheme in detail. Section 4 discusses the proposed scheme and Section 5 gives simulation results and a performance analysis of the scheme.. The Optimisation Problem ISPs with client to (service) provider relationships face the problem of cost efficient outbound traffic routing. This is particularly important for ISPs when alternative costing methods are available. Two billing schemes (and their combination) are widely used to account for costs applicable to connecting networks to upstream providers: A time based (monthly/weekly/daily) rate for fixed capacity connections or volume based charges as in dollars per GB (MB). The case where both subscription types are available to ISPs simultaneously, results in an optimisation problem: Minimise the cost of routing a given traffic volume via a set of outbound links. Figure depicts an example of such a setup. The stub ISP, ISP, is multihomed. It has a customer-to-provider relationship with ISP and ISP. Both, ISP and ISP, provide connectivity to the remaining Internet. It is assumed that most destinations are reachable via both providers, but limitations in connectivity can be resolved by BGP. The connection of ISP to ISP is billed on a time basis and the connection of ISP to ISP is billed on a volume basis. Operater ISP ASN 00 $ per Month $ per GB Operater ISP ASN 00 Operater ISP ASN 00 Figure. ISP Example Internet This situation can be formulated as a Mixed Integer Linear Program (LP) with the following variables: Link indices i, microflow indices j, capacity of link i - u i, the volume proportional cost of link i per unit flow - α i, the fixed cost of link i - β i, the flow size on link i - f i, flow on link i that incurs no cost - g i, size of microflow j - d j, the traffic volume V, the decision variable x ij - is, if flow j is routed on link i otherwise it is 0 and the decision variable y i - is if link i is used otherwise it is 0. The LP formulation with the linear cost function c i (f i ) is: Minimise: C = i Where the cost function is defined as: y i c i (f i ) () c i (f i ) = max{βi, βi + α i (f i g i )} i =... i max () Subject to the following constraints: Flow on link i does not exceed the link capacity. f i = j d j x ij u i i =... i max () All flows have to be routed. y i f i V (4) Flows can not be split. i x ij = (5) i Zero-one variables, demands and cost are positive. x ij, y i {0, }; f i, g i, b i, c i 0 (6) If microflows have to be routed on certain links, the capacity of these links is reduced and the LP formulation uses the remaining bandwidth. This LP problem can be solved for piecewise linear cost functions: To minimise the cost, as much traffic as possible has to be routed on the fixed capacity links, excess traffic
3 Time sec 0 sec 40 sec 60 sec 80 sec Link Bytes Flows Link Bytes Flows Cost $ Table. LP Results - BWY Time sec 0 sec 40 sec 60 sec 80 sec Link Bytes Flows Link Bytes Flows Cost Table. LP Results - COS should be routed via the variable rate link. Practical problem formulations might have additional constraints producing an extended LP. As an example, the above LP was solved for two links with the following parameters: Link had a time based cost of b = $0.05/sec associated with it and link had a volume based cost of c = $0/GByte associated with it. The available capacity of both links was set to 4, 860, 000Bytes/sec. Publicly available IP trace data [9] was used to generate the flow information. Two data sets were used: One trace was collected at the Columbia University gateway in New York (BWY) the other one was collected at the Colorado State University gateway (COS). Both traces involve about 90 seconds worth of data and were collected commencing at /0/0-0::7 and at 5//0-4:0: respectively. The optimal flow allocations were calculated for microflow samples that were accumulated over one second. Table and Table depict selected sample LP results for the BWY and the COS trace, respectively. The column present the data at time index sec, 0 sec, etc., the rows indicate flow size, the number of microflow flows and the overall cost. The BWY trace consist of lager microflows and almost use the full capacity of both links, the COS trace consists of more, smaller size, microflows and uses only a fraction of the overflow capacity of link. The results show for both traces that the available capacity on link (time based cost) is used in all cases up to its capacity limit (4, 860, 000Bytes/sec). Additional microflows are routed on link with a volume based cost. These results confirm the expectation that the solution in this situation resembles an overflow case for minimum cost routing: The fixed cost path is used as much as possible. Note that the LP formulation addresses only a static case at one point in time and that it is also assumed that all the demands are known beforehand. In particular, flows arrive and depart and are of different and variable size. However, the principal problem formulation and solution remains also for the dynamic case. It results in a dynamic overflow situation: Use the fixed cost resources for as much traffic as possible The used traces are of high-bandwidth links that were not fully utilised. Therefore, the traffic was determined by bottlenecks in other parts of the network. As long as the traffic flows are only redirected on links with similar characteristics and no additional packets are dropped, this trace driven observations provide relevant results. and overflow additional traffic to variable cost paths. Where the theoretical formulation and the solution of the problem appear to be straight forward, the practical implementations of these results with BGP is non trivial. A number of BGP based traffic engineering initiatives rely on the tuning of BGP s decision process. These efforts can be only executed in limited time intervals and are static between these updates. If, for a given gateway the demands are known, the flow assignment can be calculated by the LP and BGP filters can be changed to take the LP results into account. This strategy has two problems: firstly it is difficult to measure and predict the traffic on a microflow level and secondly the problem size scales badly for many frequently changing flows. Several aggregations can be used but, in any case, traffic directing relies on prefix matching. An alternative to this that overcomes the problems is a scheme that assigns microflows according to the constraints and simultaneously minimises cost on the fly. The overflow scheme that is introduced in the next section relies on BGP to find the appropriate destinations, but it extends routers by a dynamic traffic routing capability.. Adapted SAPOR Scheme The scheme for alternative packet routing originally targeted overflow routing in Interior Gateway Protocol (IGP) environments, this section describes an adapted scheme that suit the problem of outbound AS traffic overflow routing. SAPOR implements three principles: Firstly it ensures that packets that belong to the same microflow are routed on the same interface, even in the overflow case. Secondly it determines how many additional microflows can be accommodated by the default link before it s target bandwidth is reached. And thirdly, if the target bandwidth is reached, additional flows are routed on alternative interfaces. Figure (a) depicts the modules that are required in a SAPOR enabled router. The light shading indicates functions that belong to the BGP module and the darkly shaded boxes indicate functions that are part of the SAPOR module. BGP operation generates the BGP routing tables by filtering the route advertisements of neighbouring routers. The tables reflect the local knowledge of the global network state in terms of reachability. For some destinations, BGP
4 Router Modules SAPOR Module BGP routing table Token Management Adapt Tokens BGP decission process Hash Function Hash Space Monitor Forwarding table Forwarding Table (BGP) Build Tables Alternative SAPOR Forwarding Table Figure. (a) Router - (b) SAPOR Scheme function has to yield hash values H(.) that are unique and evenly distributed over the hash space. The hash function points to one unique element in the non-overlapping hash space. Elements are associated with given microflows and hold tokens that identify the interface where packets of to this microflow should exit the router. To detect flows that are no longer active, elements have timer values that indicate if the element was visited during a certain period. Tokens are used to identify the interface and also determine the maximum number of flows on a given link. will have alternative paths, in particular, if the AS is multihomed. BGP s decision process builds the forwarding table by the use of policies. Factors that have an impact on this process include Multi Exit Discriminator (MED), local preference, shorter autonomous system paths, etc. (e.g. [0]). Forwarding tables have usually one entry per destination. If BGP multipath is supported, alternative paths to one destination are possible. If more than one path is used, the load is balanced between alternative destinations. SAPOR facilitates BGP s forwarding and original routing tables as inputs. The operation of SAPOR can be summarised as follows: Packets are classified to identify microflows and if packets belong to microflows that already exist, they are forwarded on the same interface that the first packet saw in the scheme. If packets belong to a new flow and tokens are available for this destination, the outgoing interface is chosen on the basis of the original forwarding table. If no tokens are available the overflow-forwarding table is consulted and packets are forwarded on alternative interfaces. All subsequent packets that belong to the same microflow will use the same interface for the duration of the microflow. The number of tokens that are available for one interface determines the number of microflows that are allowed. SAPOR uses the original BGP routing table to determine the default routing and uses alternative routing tables for overflow traffic. Figure (b) depicts the function blocks of such a SAPOR module. These are: hash function, hash space, token management, adapt token, monitor, forwarding tables and buildtables function. The modules have to execute two major tasks: Identify microflows and determine available capacity, i.e. the number of additonal microflows on a link... Identifying Microflows To ensure that packets that belong to the same microflow are routed on the same link, microflows have to be identified. This is done by the hash function. It calculates hash values on the origin/destination address/port. The hash.. Token Management The number of tokens defines the number of microflows that are allowed on one interface and the token management function accounts for the number of tokens. Every interface has a token buffer associated with it. The number of available tokens in the buffer is the estimated number of additional flows that the associated interface can accommodate, before it reaches the target bandwidth. This number has to be adapted during each measurement/update interval. If new microflows arrive, the token number of the interface is reduced by one for each microflow. To detect flows that are no longer active, a token scheduler has to return expired tokens to the appropriate buffers. The size of microflows differs between active flows. Large flows consist of many packets and can be persistent for long periods (Elephants) and small flows consist of a few small packets (Mice). To account for this, the number of tokens has to be adapted. The adapt token function adjusts the number of available tokens and the monitor function measures the number of bytes that were transmitted via a interface since the last measurement. The accumulated flow size [bytes per adaptation interval] and the number of active flows are used to calculated the current average flow size. By using available bandwidth and average flow size, the remaining number of tokens can be estimated. This is shown in Equation (7) ui t i a i = t i (7) f i where a i is the new number of available tokens for interface i, u i is the target bandwidth, t i is the current token number and f i is the current aggregated flow size that is provided by the monitor function. Note that available bandwidth refers to the remainder of the target bandwidth or the usable capacity. It is also important to note that the number of tokens in a token buffer If the hash function used allows duplicates, collisions have to be accounted for by a secondary data structure such as a linked list. Alternatively a perfect hash function can be used. This technique of identifying microflows is also used by several Internet load balancing schemes [] and load sharing for network processors [].
5 can be negative. If the buffer size is changed on the fly and there are more tokens to be returned than the new buffer size indicates, the number of tokens is negative. Tokens are unavailable from such a buffer as long as the number of tokens is less than or equal to zero... Building Routing Tables The build table function generates forwarding tables based on locally available information and is not a realtime function. It is executed when BGP routing tables are changed and local forwarding tables have to be adapted. The first table is a match of the original BGP forwarding table. The overflow table can be generated from the BGP routing table by the BGP decision process where paths that originally used the first interface, are ignored. 4. Remarks on the Overflow Scheme This section discusses remarks that are relevant for the overflow scheme and that are not directly related to the other discussions in this paper. These include a microflow definition, comments on performance requirements and possible failure scenarios. 4.. Interarrival Times and Microflow Definition The adapt token function can only adapt at the speed that new flows arrive or depart. If the flow definition interarrival time t s uses shorter time intervals, the target bandwidth is matched more easily than if the interarrival period is defined to be too long. To define a microflow for this scheme it is assumed that if packets arrive with larger interarrival times than sec the interarrival time jitter is no major concern for this flow and the packets can be routed on alternative paths. To see how many microflows fall into this category the interarrival time of packets was investigated. Figure depicts a histogram for packet interarrival times for the COS trace that is used in this paper (See Sections & 5). The y-axis shows the message count, the x-axis depicts the interarrival time bins in seconds using a logarithmic scale. The interarrival time was measured for two consecutive packets that had the same addresses and port numbers. 9% of the recorded interarrival events fall into the microflow definition. Analysis for the BWY trace (See Section 5) yields that 95% of the recorded events are below the one second threshold. In both cases most microflows are captured by a one second threshold. 4.. Requirements and Performance The complexity of this scheme has to be analysed for two parts: Operations that are required for packet routing Frequency E-06 9.E E E E Bin Figure. Histogram: Packet Interarrival Time and functions that operate in an offline mode. All former functions are of the order of one: O(). This includes the hash function, the test for tokens, the changes in the token buffer, etc. Therefore, all packets are routed in O() time. Forwarding table lookups might require additional time, but this is also required in conventional routing. If a tokenspace has a assigned token, less O() steps are required. The offline operation is more complex but it is less frequently required. This includes the update of the tokens where all active hash spaces have to be traversed and the calculation of the overall token number. The complexity of this process is bounded O(l), where l indicates the size of the hash space. Additional memory and intelligent data structures can reduce this requirement. Memory requirements for routing tables etc. are equivalent to requirements for tables of legacy systems. Token buffers require only several bytes per buffer and the hash space is of size l. The next section discusses simulation results that verify the operation of the scheme. 4.. Failure Scenario If interfaces or their associated resources become unavailable, the scheme has to respond to this situation. It has to react by immediately flushing the token buffer that is associated with the failing interface and by deleting all tokens in the hash space that belong to this interface. In this way, all flows are rerouted via the remaining interfaces and traffic disruption is kept at a minimum level. 5. Simulation Results This section introduces simulation results that show the operation of the scheme with the same IP trace data that was already used for the LP example calculation. A customised open loop real-time event simulator was used and the network topology used in the simulation was similar to the network depicted in Figure. The overflow routing scheme was located in the gateway node of ISP s network. The simulated server had two outbound connections: a default OC link and an overflow OC link. The target bandwidth
6 000.0E+0 6.0E+6 Outbound Traffic.0E+6 Outbound Traffic Flow [bytes/sec] 4.0E+6.0E+6 0.0E+6 8.0E+6 6.0E+6 Default Link Overflow Link 0 per. Mov. Avg. (Outbound Traffic) 0 per. Mov. Avg. (Overflow Link) 0 per. Mov. Avg. (Default Link) Flow [bytes/sec] 0.0E+6 8.0E+6 6.0E+6 4.0E+6 Default Link Overflow Link 0 per. Mov. Avg. (Outbound Traffic) 0 per. Mov. Avg. (Overflow Link) 0 per. Mov. Avg. (Default Link) 4.0E+6.0E+6.0E Figure 4. Traffic Flows BWY 000.0E Figure 6. Traffic Flows COS Outbound Overflow Link Default Link 0 per. Mov. Avg. (Outbound) 0 per. Mov. Avg. (Overflow Link) 0 per. Mov. Avg. (Default Link) 4000 Outbound Default Link Overflow Link 0 per. Mov. Avg. (Outbound) 0 per. Mov. Avg. (Default Link) 0 per. Mov. Avg. (Overflow Link) Tokens Tokens Figure 5. Token Numbers BWY Figure 7. Token Numbers COS of the default link was set to 4,860,000 bytes/sec (5% utilisation). The simulation use the BWY trace and the COS trace that are described in Section The simulation results are depicted in two graphs per trace: A graph that shows the measured traffic on the links and another graph that depicts the number of active tokens for the measured flows. The data was measured every 00 ms and the maximum microflow packet interarrival time was specified to be sec. The colouring (shading) of the links in the graphs is in all examples the same. The continuous lines indicate the moving averages for ten measurements. Figure 4 depicts the measured flows of the BWY trace. The trace in the background depicts the outbound traffic that arrives at the gateway (), the trace in the middle shows the flows on the default link () and the trace that is shown in the foreground depicts the flows on the overflow link (). The senario on this case shows the overall outbound traffic () is routed on the default link () and the overflow link (). The bursty outbound traffic of this trace shows the occurrence of mice and elephant flows. Around the -second mark, an elephant flow arrives and is routed on the default link. Since the load rises above the target bandwidth the scheme reduces the number of tokens that are available on this link (Figure 5) but since there are about 00 flows that are persistent for the burst period (about 5 seconds), the load on the default link is only minimally reduced. When the elephant departs, the number of tokens on the default link increases and the traffic load returns to the target bandwidth with minimal fluctuations. At approx. /7//6/44/5/6/86 seconds further elephant flows arrive, but these are routed on the overflow link. For the elephant flows at 5/70/78 seconds a behaviour can be observed that is similar to the first peak. In these instances, the flows are routed on the default link. A second observation stands out concerning this trace: The number of active flows on the default link is far less than the number of active flows on the overflow link. This indicates that many persistent large flows are routed on this link. Figure 6 depicts the traffic flow and Figure 7 depicts the token number for the second trace. In this instance, the traffic bursts are not as severe and the overflow scheme is able to adjust to changes in due time. The traffic fluctuations around the target bandwidth on the default link () are minimal. An interesting observation in this simulation run concerns the number of tokens. The overall number of tokens () is fairly constant around 000 to 500 over the observation period. But the token numbers on the two outgoing links (), () shows strong variations. It can be seen that if the number of flows on the default link increases, the number of flows on the overflow link decreases and vice versa. In principle, this is similar to the behaviour that was described for the first case, but here enough small and short living flows occur that enable flow balancing and the adaptation of the traffic load.
7 6. Conclusions This paper address cost efficient outbound traffic routing in ISP networks that use the BGP protocol. It introduced an LP formulation and a corresponding overflow routing scheme. The LP outlined the theoretical solution and the overflow scheme gave a practical implementation. The scheme is a function that has to be located in BGP enabled routers, however it requires no changes to the existing BGP protocol. The benefits can be summarised as follows: Microflows are routed independently and in an overflow manner. Under normal operating conditions (no failures) flows are routed on the same interface for their entire duration. Such active flows are not reassigned. Existing flows are not affected by the arrival or departure of other flows, neither microflows that are routed on the default link nor microflows that are routed on the overflow link. The operation was demonstrated by simulations that used packet trace data. The simulation showed that the ability to adjust the traffic to the target bandwidth on default links is limited by the occurrence of large persistent flows - an expected result. Target bandwidth dimensioning has to take these bursts into account, as it is also required for static link dimensioning. If the size and number of elephant flows is limited, the scheme adapts better to the set target bandwidth. Further work has to address how load fluctuations can be incorporated in the LP model and how the LP results can be used to fine tune the overflow scheme. Further more, an extended overflow scheme can incorporate Quality of Service (QoS) information as well as address QoS routing issues and different traffic classes. The main emphasis of this paper was on cost efficient routing, but overflow routing can be also motivated by other factors. The SAPOR scheme can be used for backup purposes or in failure scenarios, for load and performance management. Future work has to address some of these issues and the possible implementation of the SAPOR scheme in edge routers. 7. Acknowledgements The authors would like to thank the National Laboratory for Applied Network Research (NLANR) for making their traffic traces publicly available to the research community. The financial assistance for this work by the Australian Telecommunications Cooperative Research Centre (ATcrc) also is gratefully acknowledged. References [] L. Subramanian, S. Agarwal, J. Rexford, and R.H. Katz. Characterizing the internet hierarchy from multiple vantage points. In Proc. of IEEE INFOCOM 00, New York, NY, Jun 00. [] Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP4). IETF, March 995. RFC 77. [] B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen, and O. Bonaventure. Interdomain traffic engineering with BGP. IEEE Communications Magazine, 4(5): 8, May 00. [4] I. Van Beijnum. BGP: Building Reliable Networks with the Border Gateway Protocol. O Reilly, September 00. [5] B. Quoitin, S. Uhlig, and O. Bonaventure. Using redistribution communities for interdomain traffic engineering. In COST6 Workshop of Quality of future Internet Services, number 5 in LNCS, 00. [6] S. Uhlig, O. Bonaventure, and B. Quoitin. Interdomain traffic engineering with minimal BGP configurations. In Proc. of 8th International Teletraffic Congress (ITC), Berlin, Germany, September 00. [7] G. R. Ash. Dynamic Routing in Telecommunication Networks. McGraw-Hill, 997. [8] A.A. Kist and R.J. Harris. Scheme for alternative packet overflow routing (SAPOR). In Workshop on High Performance Switching and Routing (HPSR 00), Turin, Italy, June 00. [9] National Laboratory for Applied Network Research (NLANR). NLANR network traffic packet header traces, November [0] Cisco. BGP Best Path Selection Algorithm, November [] Z. Cao, Z. Wang, and E. Zegura. Performance of hashing-based schemes for internet load balancing. In Proc. of IEEE INFOCOM 000, volume, pages 4, 000. [] L. Kencl and J. Y. Le Boudec. Adaptive load sharing for network processors. In Proc. of IEEE INFOCOM 00, New York, NY, June 00.
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Border Gateway Protocol BGP4 (2)
Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning
B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure
Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better
How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)
Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia
B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure
Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
IP Traffic Engineering over OMP technique
IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,
Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks
Routing in Small Networks Internet Routing Overview AS, IGP,, BGP in small networks distance vector or link state protocols like RIP or OSPF can be used for dynamic routing it is possible that every router
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
Inter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small
A Link Load Balancing Solution for Multi-Homed Networks
A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only
Week 4 / Paper 1. Open issues in Interdomain Routing: a survey
Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many
Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
HTS: A Hierarchical Method for Load Balancing in Autonomous Networks
74 HTS: A Hierarchical Method for Load Balancing in Autonomous Networks MohammadReza HeidariNezhad, Zuriati Ahmad Zukarnain, Nur Izura Udzir and Mohamed Othman Faculty of Computer Science & Information
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
Border Gateway Protocol (BGP-4)
Vanguard Applications Ware IP and LAN Feature Protocols Border Gateway Protocol (BGP-4) Notice 2008 Vanguard Networks 25 Forbes Blvd Foxboro, MA 02035 Phone: (508) 964 6200 Fax: (508) 543 0237 All rights
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
Border Gateway Protocols
Paper 106, ENG 104 Border Gateway Protocols Sadeta Krijestorac, Marc Beck, Jonathan Bagby Morehead State University University of Louisville Florida Atlanic University [email protected] [email protected]
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
The Case for Source Address Routing in Multihoming Sites
The Case for Source Address Dependent Routing in Multihoming Marcelo Bagnulo, Alberto García-Martínez, Juan Rodríguez, Arturo Azcorra. Universidad Carlos III de Madrid Av. Universidad, 30. Leganés. Madrid.
BGP: Border Gateway Protocol
LAB 8 BGP: Border Gateway Protocol An Interdomain Routing Protocol OBJECTIVES The objective of this lab is to simulate and study the basic features of an interdomain routing protocol called Border Gateway
EQ-BGP: an efficient inter-domain QoS routing protocol
EQ-BGP: an efficient inter-domain QoS routing protocol Andrzej Beben Institute of Telecommunications Warsaw University of Technology Nowowiejska 15/19, 00-665 Warsaw, Poland [email protected] Abstract
Inter-domain Routing
Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?
Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing? Simon Balon and Guy Leduc Research Unit in Networking EECS Department- University of Liège (ULg) Institut Montefiore, B28 - B-4000
CLASSLESS INTER DOMAIN ROUTING - CIDR
CLASSLESS INTER DOMAIN ROUTING - CIDR Marko Luoma Helsinki University of Technology Laboratory of Telecommunications Technology [email protected] ABSTRACT As the Internet evolved and become more familiar
Dynamics of Prefix Usage at an Edge Router
Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, [email protected]}
Advanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
Simple Multihoming. ISP/IXP Workshops
Simple Multihoming ISP/IXP Workshops 1 Why Multihome? Redundancy One connection to internet means the network is dependent on: Local router (configuration, software, hardware) WAN media (physical failure,
Chapter 49 Border Gateway Protocol version 4 (BGP-4)
Chapter 49 Border Gateway Protocol version 4 (BGP-4) Introduction... 1-3 Overview of BGP-4... 1-3 BGP Operation... 1-5 BGP Attributes... 1-6 BGP Route Selection... 1-8 Classless Inter-domain Routing (CIDR)
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
Lecture 18: Border Gateway Protocol"
Lecture 18: Border Gateway Protocol" CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday! Some figures courtesy Mike Freedman Lecture 18 Overview" Path-vector Routing Allows scalable, informed
Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.
Active measurements: networks Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D. Outline Organization of Internet routing Types of domains Intra- and inter-domain routing Intra-domain
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] ABSTRACT
Introduction to Routing
Introduction to Routing How traffic flows on the Internet Philip Smith [email protected] RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,
Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1
IP Routing Primer Paul C. Huang, Ph.D. ITRI / / N300 /N300; Paul Huang 1999/6/2 1 Basic Addressing / Subnetting Class A 0 Network Host Host Host 127 networks / 16,777,216 hosts Class A natural mask 255.0.0.0
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Module 12 Multihoming to the Same ISP
Module 12 Multihoming to the Same ISP Objective: To investigate various methods for multihoming onto the same upstream s backbone Prerequisites: Module 11 and Multihoming Presentation The following will
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
Chapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
BT Internet Connect Global - Annex to the General Service Schedule
1. Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the General Services Schedule. ARP means Address Resolution Protocol. Border Gateway Protocol
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran [email protected]
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics
Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics WHITE PAPER Table of Contents Introduction 3 Route-Flow Fusion 4 BGP Policy Visibility 5 Traffic Visibility
Internet inter-as routing: BGP
Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability
Simple Multihoming. ISP Workshops. Last updated 30 th March 2015
Simple Multihoming ISP Workshops Last updated 30 th March 2015 1 Why Multihome? p Redundancy n One connection to internet means the network is dependent on: p Local router (configuration, software, hardware)
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
Redundancy & the Netnod Internet Exchange Points
Redundancy & the Netnod Internet Exchange Points The extent to which businesses and consumers use the Internet for critical communication has been recognised for over a decade. Since the rise of the commercial
How To Understand Bg
Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and
How To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip
Globally Distributed Content (Using BGP to Take Over the World) Horms (Simon Horman) [email protected] November 2001 http://supersparrow.org/ 1 Introduction Electronic content is becoming increasingly
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Using the Border Gateway Protocol for Interdomain Routing
CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks
MPLS/BGP Network Simulation Techniques for Business Enterprise Networks Nagaselvam M Computer Science and Engineering, Nehru Institute of Technology, Coimbatore, Abstract Business Enterprises used VSAT
APNIC elearning: BGP Attributes
APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Table of Contents. Cisco How Does Load Balancing Work?
Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and
Traffic Engineering With Traditional IP Routing Protocols
Traffic Engineering With Traditional IP Routing Protocols Bernard Fortz Jennifer Rexford Mikkel Thorup Institut d Administration et de Gestion Internet and Networking Systems Universite Catholique de Louvain
Quantifying the BGP routes diversity inside a tier-1 network
Quantifying the BGP routes diversity inside a tier-1 network Steve Uhlig, Sébastien Tandel Department of Computing Science and Engineering Université catholique de Louvain, Louvain-la-neuve, B-1348, Belgium
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP
Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations
BGP. 1. Internet Routing
BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is
Distributed Out-bound Load Balancing in Inter-AS Routing by Random Matchings
Distributed Out-bound Load Balancing in Inter-AS Routing by Random Matchings Ravi Musunuri Jorge A. Cobb Department of Computer Science The University of Texas at Dallas Richardson, TX-75083-0688 Email:
Building MPLS VPNs with QoS Routing Capability i
Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
BGP Routing Stability of Popular Destinations
BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs Research; Florham Park, NJ Abstract The Border Gateway Protocol (BGP) plays a crucial role in
TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 [email protected]
Border Gateway Protocol Best Practices
Border Gateway Protocol Best Practices By Clifton Funakura The Internet has grown into a worldwide network supporting a wide range of business applications. Many companies depend on the Internet for day-to-day
Understanding Large Internet Service Provider Backbone Networks
Understanding Large Internet Service Provider Backbone Networks Joel M. Gottlieb IP Network Management & Performance Department AT&T Labs Research Florham Park, New Jersey [email protected] Purpose
DEGREE THESIS. Improving Network Performance by Implementing the Path Control Tools. Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim
Network Design and Computer Management, 120 HP DEGREE THESIS Improving Network Performance by Implementing the Path Control Tools Derick Kolle Nduge, Augustine Chika, Mohammednur Ibrahim Network Project
BGP Attributes and Path Selection
BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor [email protected] Abstract.
A Simple Model for Calculating SIP Signalling Flows in 3GPP IP Multimedia Subsystems
A Simple Model for Calculating SIP Signalling Flows in 3GPP IP Multimedia Subsystems Alexander A. Kist and Richard J. Harris RMIT University, BOX 2476V, Victoria 3001, Australia {kist,richard}@catt.rmit.edu.au
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Evaluation And Implementation Of The Open Shortest Path First (OSPF) Routing Protocol
Evaluation And Implementation Of The Open Shortest Path First (OSPF) Routing Protocol G.C NWALOZIE 1, V.N OKOROGU 2, A.C OKAFOR 3, A.O UMEH 4 1, 2, 3,4 Electronic and Computer Engineering Department, Nnamdi
Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning
Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks Tiago Fioreze, Remco van de Meent, and Aiko Pras University of Twente, Enschede, the Netherlands {t.fioreze, r.vandemeent,
Impact of BGP Dynamics on Router CPU Utilization
Impact of BGP Dynamics on Router CPU Utilization Sharad Agarwal 1, Chen-Nee Chuah 2, Supratik Bhattacharyya 3, and Christophe Diot 4 1 University of California, Berkeley, USA, [email protected]
for guaranteed IP datagram routing
Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation
Distributed Out-bound Load Balancing in Inter-AS Routing by Random Matchings
Distributed Out-bound Load Balancing in Inter-AS Routing by Random Matchings Ravi Musunuri Jorge A. Cobb Department of Computer Science The University of Texas at Dallas Richardson, TX-75083-0688 Email:
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
