Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming

Size: px
Start display at page:

Download "Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming"

Transcription

1 Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura Guraduate School of Information Science, Nara Institute of Science and Technology, Takayama cho 896 5, Ikoma, Nara, 63 92, Japan Katsuyoshi Iida Global Scientific Information and Computing Center, Tokyo Institute of Technology, Tokyo, Japan Hiroyuki Koga Department of Information and Media Sciences, University of Kitakyushu, Fukuoka, Japan Youki Kadobayashi Guraduate School of Information Science, Nara Institute of Science and Technology, Nara, Japan Suguru Yamaguchi Guraduate School of Information Science, Nara Institute of Science and Technology, Nara, Japan Abstract The traditional virtual private network (VPN), which provides best effort or static bandwidth allocation services, does not support bursty Internet traffic well As a way of supporting bursty traffic, a VPN provider can offer minimum throughput assurance (MTA) service to customers MTA service provides higher throughput predictability than best effort VPN service Although there are many proposed network architectures for MTA service, certain parameters should be decided offline as provisioning The difficulty in such provisioning is to meet the minimum throughput requirements in any active state matrices We propose a provisioning algorithm that uses nonlinear programming for MTA service We also quantitatively evaluate our algorithm and its performance Introduction Virtual private networks (VPNs) are used by many organizations as private information networks connecting distant sites at costs lower than those possible with a network of leased lines However, VPNs have difficulty meeting quality of service (QoS) requirements because they must share resources among all users To overcome this problem and satisfy some of the QoS requirements, a framework called provider provisioned VPNs (PPVPNs) was developed by VPN providers The current PPVPN does not support bursty Internet traffic well because it only allocates network resources statically If VPN providers guarantee customers a static amount of This work of K Iida was supported in part by the Ministry of Education, Science, Sports and Culture, Japan, Grant-in-Aid for Young Scientists, 8754, 26 bandwidth, to the result is low bandwidth utilization One way of supporting bursty Internet traffic is to assure minimum throughput to customers With minimum throughput assurance (MTA) service, a customer can obtain much more throughput than the minimum agreed throughput during periods of non-congestion During periods of congestion, the minimum agreed throughput is provided as an average in a certain period Therefore, MTA service can provide higher throughput predictability than best effort VPN service To explain MTA service, we illustrate throughput allocation scenarios in the MTA service in Fig In the figure, aggregated traffic from site A to site A2 and that from site B to site B2 is assigned 5 Mb/s as a minimum throughput Note that hereafter we denote as macro flow the aggregated traffic Fig (a) depicts a no congestion scenario, ie, the macro flow from site B to site B2 is idle In this case, the macro flow from site A to site A2 can obtain a larger throughput than the minimum throughput On the other hand, the throughput for the macro flow from site A to site A2 is only 5 Mb/s in a congestion scenario, as illustrated in Fig (b) However, even in the congestion scenario, MTA service can provide the minimum throughput for any macro flows A lot of research has been done on MTA service Clark et al proposed random early drop routers with in/out bit (RIO) to allocate capacity for best effort service [] According to their performance evaluation, RIO can allocate capacity independent of the effect of RTT This research is considered an important milestone in MTA service provision Fàbrega et al proposed a guaranteed minimum throughput service for TCP flows using measurement-based admission control [2] Methods have also been proposed for MTA service using the idea of ATM s ABR service Li et al proposed the corestateless congestion avoidance scheme for IP networks [5] Lee

2 (a) No congestion scenario (b) Congestion scenario Figure : Throughput allocation in MTA service et al proposed the weighted proportional fair rate allocation (WPFRA) method for differentiated service (DiffServ) in the Internet [4] Yokoyama et al proposed a one-way version of the WPFRA method to improve its performance [7] Shimamura et al proposed a hose model extension of the WPFRA method [6] To put these proposed methods into practice, certain parameters should be decided offline as a provisioning For example, RIO requires a target rate for each TCP micro/macro flow and the WPFRA method requires the weight for each macro flow However, no such provisioning algorithm has been proposed The difficulty with such provisioning algorithm is to meet the minimum throughput requirements in any active state matrices, in which each element of the matrix represents an active/idle state of traffic from a source to a destination site Since the MTA service must support bursty traffic, some elements of the active state matrix may be idle and may frequently switch from active to idle states We propose a provisioning algorithm that uses mathematical programming, especially nonlinear programming (NLP), to provide MTA service in PPVPNs Mathematical programming is widely and effectively used for network provisioning [3] We describe our algorithm in detail, investigate whether it can meet the throughput requirements in any active state matrix, and evaluate the bandwidth utilization throughout the network The rest of the paper is organized as follows Sect 2 presents our proposed provisioning algorithm for MTA service We evaluate the effectiveness of our approach with quantitative results in Sect 3 and conclude the paper in Sect 4 2 Weight determination algorithm In the Introduction, we argued that MTA service improves the throughput predictability of bursty traffic To implement MTA service, we set three requirements: ) meet the minimum throughput requirement from customers in any active state matrices; 2) fairly distribute the spare bandwidth; and 3) utilize network resources efficiently The WPFRA method and its variants are approaches Formal definition of active state matrix will be described in Fig 3, Sect 22 to MTA service that meet these three requirements The WPFRA method can distribute spare bandwidth based on weight value, therefore it can provide weighted proportional fairness Before using the WPFRA method, the VPN provider must decide the weight values for all combinations of source and destination sites Deciding the weight values to satisfy the minimum throughput requirement of the first requirement is still a challenge The difficulty in deciding the weight values lies in finding a common matrix of weight values that satisfies the minimum throughput requirement for all active state matrices In this section, we first briefly explain the WPFRA method Then we propose a common weight matrix determination algorithm to satisfy the minimum throughput requirements for all elements of the active state matrix 2 WPFRA method and weight matrix determination algorithm We first summarize the WPFRA method The WPFRA method can distribute bandwidth in proportion to the weight value of each macro flow In the WPFRA method, edge and core routers form a VPN providers network and provide a feedback-driven traffic control to utilize the network bandwidth efficiently Ingress and core routers periodically measure the amount of arriving traffic and calculate a fair share rate r f that indicates the amount of allocated capacity for a macro flow with the weight of one A fair share rate is calculated for each output link in a router Egress edge routers periodically send a notification packet to each ingress edge router, and core routers update the value of r f inside the notification packet if it is smaller than the current value stored in the packet Ingress routers obtain the value of r f from the received notification packet and set the value to the explicit rate ER, which indicates that the allocated throughput for a macro flow has a weight of one Finally, they calculate the allocated throughput as ER multiplied by the customer s weight To illustrate how the WPFRA method decides the allocated throughput, we show the following algorithm based on [4] in the following Initialization Let C be the link capacity and S be the spare bandwidth in the current iteration, which is set to where (s, t) is a link S (s,t) C (s,t), Step Let W (s,t) be the sum of each weight value corresponding to all macro flows passing through a link (s, t) and r f(s,t) be the allocated capacity for a macro flow with the weight of one in the link Then, undetermined r f(s,t) is given by r f(s,t) S (s,t) W (s,t) Step 2 After r f(s,t) is calculated, explicit rate ER (i,e) is calculated by ER (i,e) min(r f(s,t) ), 2

3 Table : Throughput calculation results in Fig 2 Active state B (A,A2) B (B,B2) A A2 B B2 (ER (I,E) ) (ER (I2,E) ) () 5 (25) () (5) () 6 (3) () (6) Figure 2: Example of throughput calculation: Network topology Objective function * Maximize the average of the link utilization rate where (i, e) is a path between ingress and egress routers that contains link (s, t) Step 3 Let w be the previously assigned weight and B be the allocated capacity of each customer given by B (m,n) ER (i,e) w (m,n), () where (m, n) is a path between source and destination sites that contains path (i, e) Step 4 Then, S (s,t) and W (s,t) are updated by S (s,t) S (s,t) B (m,n), (2) W (s,t) W (s,t) w (m,n), where path (m, n) also contains link (s, t) Step 5 Finally, the calculation is terminated if all W (s,t) become zero, ie, all r f(s,t), ER (i,e), and B (m,n) are determined If not, go back to Step To give readers a better understanding, we provide the example depicted in Fig 2 In this example, there are four sites: customer A has two sites, A and A2, and customer B has two sites, B and B2 The traffic of customer A (B) originates at A (B) and is destined for A2 (B2), respectively As described in the figure, the values w (A,A2) and w (B,B2) are respectively assigned weights of one and two The numbers attached with a link indicates the amount of bandwidth for each link in Fig 2 If C (I,C) is larger than 2, B (A,A2) and B (B,B2) become 2 and 4, respectively The fact that C (I,C) is limited to makes throughput calculation difficult Suppose the traffic of customer A and B are both active Then, r f(i,c), r f(i2,c) and r f(c,e) converge, respectively, at, 45 and 25 based on the above algorithm As a result, ER (I,E) becomes and ER (I2,E) becomes 25 Since w (A,A2) and w (B,B2) are one and two, B (A,A2) becomes and B (B,B2) becomes 5 This result is also included in Table Next we develop an algorithm to calculate weight values based on topology, minimum throughput matrix, and active state matrix Since the allocated throughput and spare bandwidth can be calculated using () and (2), we can now formulate the following mathematical programming: Constraints * Allocated throughput Required throughput * Bandwidth usage Link capacity * Weights Note that the allocated throughput, spare bandwidth, and utilization are all represented by polynomials of weights Thus, this mathematical programming can be classified into nonlinear programming (NLP) Table 2 shows an example of calculated weights in a simple NLP In this example, three customers (X, Y, Z) share a single bottlenecked link The required minimum throughput of (X, Y, Z) is (, 2, 6); the bandwidth of the bottlenecked link is The calculated weight values are listed for all active state matrices, ie, (X, Y, Z) = (,, ), (X, Y, Z) = (,, ) and so on All resulting allocated throughputs are grater than the minimum throughput requirement 22 Common weight matrix determination algorithm As we saw in Tables and 2, the allocated throughput is affected by the active state matrix A general illustration of this effect is given by Fig 3 The active state matrix represents an active/idle state of traffic from a source to a destination site, ie, the values of and are idle and active states, respectively The minimum throughput matrix is used to describe the amount of customers minimum throughput requirements from a source site i to a destination site j The zero element of the active state matrix results in zero value in the minimum throughput matrix at the same element in the active state matrix The weight matrix is a weight value used by the WPFRA method When we fix the active state matrix, we can calculate a weight matrix using NLP However, if we change the active state matrix, the weight matrix W k also changes Since dynamically changing the weight value is very difficult to be implemented, we wish to find a common weight matrix that meets the minimum throughput requirement in any active state matrix Therefore, we need a strategy to find a common weight matrix to meet these minimum throughput requirements We then try to derive a common weight matrix Since NLP requires an initial weight matrix, the previously derived weight matrix for an active state matrix can be used as the initial NLP 3

4 Table 2: Example of weights calculated by NLP Active state Calculated weights Allocated bandwidth Util X Y Z X Y Z X Y Z % % % 5 5 % Single bottlenecked link: Required minimum throughput: (X, Y, Z) = (, 2, 6) Active state matrix Minimum throughput matrix Weight matrix j j m 2 m 2j w 2 w Calculated by NLP 2j = W m i m ij w i w ij m m 2j Calculated by NLP w w j w 2 w 2j = W k w i w ij Figure 3: Common weight matrix weight matrix with the input of another active state matrix We hypothesize that this iteration of NLP will converge on the common weight matrix and meet the minimum throughput requirements Based on this hypothesis, we create a basic strategy to obtain the common weight matrix Iteration Previously output values (ie, the weight matrix calculated by NLP) are utilized as an initial weight matrix in the next step Normalization The weights represent a proportional ratio of the allocated bandwidth, ie, the calculated weight matrix (a, b, c) is equivalent to (ka, kb, kc), where k is a variable To avoid this effect, we divide the weight matrix into collision groups, and then we normalize the grouped elements of the weight matrix, such as (ka, kb, kc)/k (a, b, c), in each collision group Stabilization An element of the weight matrix corresponding to the zero element in the active state matrix can be selected for any value To avoid needless change in weight values, we make constraints for such elements, ie, we simply choose the value obtained in the previous iteration We construct our common weight determination algorithm based on this strategy and illustrate it in Fig 4 as a pseudocode Users of our provisioning algorithm must specify the required minimum throughput for each customer site so that the weight matrix satisfying the minimum throughput can be obtained The fundamental calculation complexity will be l u k= 2v k(v k ), where u, v and l is the number of customers, sites per customer, and calculation cycles, respectively 3 Quantitative evaluation In the previous section, we presented our common weight matrix determination algorithm, which is based on the hypothesis that elements converges through the iteration of NLP In this section, we demonstrate that our algorithm converges on a common weight matrix that meets the minimum throughput requirement We also investigate the impact of the imbalanced amount of minimum throughput requirements and whether there is spare bandwidth We use the simple topology illustrated in Fig 5 There are one core and three edge routers, and they form a star topology with a link capacity of 8 in all links All edge routers behave as both ingress and egress routers, ie, traffic is bidirectional between each of a particular customer s sites There are two customers (A, B); each of whom has three sites (A, A2, A3) and (B, B2, B3) Each of customers A and Bs sites is connected to its respective edge router We vary the required minimum throughput to investigate the impact of imbalance ratio and the amount of the minimum throughput as follows: (a) A (x,y) : A (x,z) : B (x,y) : B (x,z) = 2 : 2 : 2 : 2 (b) A (x,y) : A (x,z) : B (x,y) : B (x,z) = : : : 4

5 LoopNLP(iteration){ InitAllWeights(weights); SetInputValue(topology, reqbw); for ( i=; i<iteration; i++ ) { foreach (pattern) { weights = RunNLP(topology, pattern, reqbw, weights); normalization(pattern, weights); RunNLP(t, p, b, w){ foreach (p) { if( active[i] == ){ # Stabilize value of w[i] SetConstraint(w[i]); ans = SolveNLP(t, p, b, w); return ans; InitAllWeights(weights){ weights = (,,, ); normalization(pattern, weights){ group = divide_group(pattern); foreach (group) { normalized_w[i] = weights/min(weights); return normalized_w[i]; Figure 4: Pseudocode of weight determination algorithm (c) A (x,y) : A (x,z) : B (x,y) : B (x,z) = 3 : : : 3 (d) A (x,y) : A (x,z) : B (x,y) : B (x,z) = 5 : 5 : 5 : 5 There is spare capacity in both scenarios (b) and (d), and the amount of requests are imbalanced in (c) and (d) In this evaluation, we determine the representative weight matrix among a large number of calculated weight matrices in order to utilize a convergence index, which is defined as the maximum ratio of the number of common weight matrices to the number of all weight matrices Using the convergence index, we evaluate our proposed algorithm using the following two convergence indices The first is an average of the highest distributions of each element of the weigh matrix; the second is the highest distribution of a set of all calculated weight values in a weight matrix Here we call the former independent convergence index and the latter dependent (means batched) convergence index We show an example in the context of Table 2 In the independent convergence index, the average of the highest distributions of each site is 83 (= ( + + 5)/3) In the dependent convergence index, the highest distribution of batched tuples of (,, 8) is 5 Both indices adopt (,, 8) as the representative weight matrix in the first processing cycle of our iterative algorithm Figs 6 and 7 show results for the four required minimum throughputs with two convergence indices The x-axis repre- Figure 5: Experimental topology sents the amount of processing from to 3 iterations; the y-axis represents the convergence index, success rate, and average link utilization for each curve Average link utilization is always unchanged at approximately 85 even though the number of iterations increases This shows that our algorithm retains the fundamental advantage of mathematical programming, ie, it maximizes utilization under constraints, even if the iterations increase We found that the success rate progressively converges to for all required throughputs except that shown in Fig 7(d) in the independent convergence index The success rate in Fig 7(d) is low because all convergence indices for each site are independent, ie, not appropriate for the whole network However, the independent indices are always higher than the dependent one because they are determined in the absence of other factors We conclude that the dependent convergence index is more applicable Next we describe the impact of spare capacity on the success rate Under spare capacity scenarios (b) and (d), the difference between the success rate and convergence index is higher than that in scenarios (a) and (c) The convergence index is low because the calculated weights vary over a wide range due to the high latitude of the values Finally, we discuss the impact on the success rate of imbalanced required throughput among sites Our algorithm requires a large number of iterations to make the success rate converge in imbalanced request scenarios (c) and (d) This is due to the complicated topology and requests, though it also demonstrates the effectiveness of our iterative algorithm 4 Conclusion To satisfy customers required minimum throughput, we proposed a provisioning algorithm for MTA service First, we created an NLP to find a weight matrix for each active state matrix Then we proposed a common weight matrix determination algorithm based on the hypothesis of convergence in elements of the iteration of the NLP Through performance evaluations, we showed that our algorithm can converge on a common weight matrix using the convergence indices We also evaluated the impact on convergence of the imbalanced amount of required throughput and the presence of spare bandwidth In future work, to converge these indices more precisely 5

6 (a) Balanced requests/no spare capacity (b) Balanced requests/spare capacity (c) Imbalanced requests/no spare capacity (d) Imbalanced requests/spare capacity Figure 6: of independent convergence index (a) Balanced requests/no spare capacity (b) Balanced requests/spare capacity (c) Imbalanced requests/no spare capacity (d) Imbalanced requests / Spare capacity Figure 7: of dependent convergence index 6

7 and rapidly, we will focus on a pruning algorithm and consider highly correlated convergence indices References [] D D Clark and W Fang Explicit allocation of best-effort packet delivery service IEEE/ACM Trans Networking, 6(4): , August 998 [2] L Fàbrega, T Jové, P Vilà, and J Marzo A guaranteed minimum throughput service for TCP flows using measurement-based admission control International Journal of Communication Systems, 2():43 63, January 27 [3] J L Kenningtona, E V Olinicka, and G Spirideb Basic mathematical programming models for capacity allocation in mesh-based survivable networks to appear in Omega, Special Issue on Telecommunications Applications, 35(6): , December 27 [4] C L Lee, C W Chen, and Y C Chen Weighted proportional fair rate allocations in a differentiated services network IEICE Trans Communications, E85-B():6 28, January 22 [5] J S Li and J S Li A novel core-stateless ABR-like congestion avoidance scheme in IP networks International Journal of Communication Systems, 8(5): , June 25 [6] M Shimamura, K Iida, H Koga, Y Kadobayashi, and S Yamaguchi Performance evaluation of hose bandwidth allocation method using feedback control and class-based queueing for VPNs In Proc IEEE Int l Conference on Pacific Rim 25, pages , August 25 [7] T Yokoyama, K Iida, H Koga, and S Yamaguchi Adaptive bandwidth allocation using one-way feedback control for MPLS networks to appear in IEICE Trans Communications, 27 7

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Course Description. Students Will Learn

Course Description. Students Will Learn Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user

More information

Active Queue Management (AQM) based Internet Congestion Control

Active Queue Management (AQM) based Internet Congestion Control Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu ([email protected]) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control

More information

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ)

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ) QoS in IP networks Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001 IETF Integrated Services (IntServ) Connection-oriented solution (end-to-end) QoS guarantees

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland

More information

for guaranteed IP datagram routing

for guaranteed IP datagram routing Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation

More information

PART II. OPS-based metro area networks

PART II. OPS-based metro area networks PART II OPS-based metro area networks Chapter 3 Introduction to the OPS-based metro area networks Some traffic estimates for the UK network over the next few years [39] indicate that when access is primarily

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

Performance advantages of resource sharing in polymorphic optical networks

Performance advantages of resource sharing in polymorphic optical networks R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])

More information

A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds q

A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds q Computer Networs xxx (007) xxx xxx www.elsevier.com/locate/comnet A new approach to dynamic bandwidth allocation in Quality of Service networs: Performance and bounds q J. Elias a, F. Martignon b, *, A.

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Differentiated Services

Differentiated Services March 19, 1998 Gordon Chaffee Berkeley Multimedia Research Center University of California, Berkeley Email: [email protected] URL: http://bmrc.berkeley.edu/people/chaffee 1 Outline Architecture

More information

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

17: Queue Management. Queuing. Mark Handley

17: Queue Management. Queuing. Mark Handley 17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Multipath TCP in Data Centres (work in progress)

Multipath TCP in Data Centres (work in progress) Multipath TCP in Data Centres (work in progress) Costin Raiciu Joint work with Christopher Pluntke, Adam Greenhalgh, Sebastien Barre, Mark Handley, Damon Wischik Data Centre Trends Cloud services are driving

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

CS 268: Lecture 13. QoS: DiffServ and IntServ

CS 268: Lecture 13. QoS: DiffServ and IntServ CS 268: Lecture 13 QoS: DiffServ and IntServ Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 1

More information

IP Traffic Engineering over OMP technique

IP Traffic Engineering over OMP technique IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Sizing Internet Router Buffers, Active Queue Management, and the Lur e Problem

Sizing Internet Router Buffers, Active Queue Management, and the Lur e Problem Sizing Internet Router Buffers, Active Queue Management, and the Lur e Problem Christopher M. Kellett, Robert N. Shorten, and Douglas J. Leith Abstract Recent work in sizing Internet router buffers has

More information

Multiple Layer Traffic Engineering in NTT Network Service

Multiple Layer Traffic Engineering in NTT Network Service Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

A Policy-Based Admission Control Scheme for Voice over IP Networks

A Policy-Based Admission Control Scheme for Voice over IP Networks Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department

More information

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]

More information

A Fuzzy Algorithm for QoS-Based Routing in MPLS Network

A Fuzzy Algorithm for QoS-Based Routing in MPLS Network A Fuzzy Algorithm for QoS-Based Routing in MPLS Network Nahid Ebrahimi Majd, Mohammad Hossien Yaghmaee Communication and Computer Research Lab.,Ferdowsi University of Mashhad Mashhad, Iran e-mails: {[email protected],

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Internet Quality of Service

Internet Quality of Service Internet Quality of Service Weibin Zhao [email protected] 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS Masaki Aida, Keisuke Ishibashi, and Toshiyuki Kanazawa NTT Information Sharing Platform Laboratories,

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Functional Optimization Models for Active Queue Management

Functional Optimization Models for Active Queue Management Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA [email protected]

More information

How To Share Bandwidth On A Diffserv Network

How To Share Bandwidth On A Diffserv Network Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia Bandwidth Sharing Scheme in DiffServ-aware

More information

Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints

Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran [email protected]

More information

Optimization of IP Load-Balanced Routing for Hose Model

Optimization of IP Load-Balanced Routing for Hose Model 2009 21st IEEE International Conference on Tools with Artificial Intelligence Optimization of IP Load-Balanced Routing for Hose Model Invited Paper Eiji Oki Ayako Iwaki The University of Electro-Communications,

More information

MPLS is the enabling technology for the New Broadband (IP) Public Network

MPLS is the enabling technology for the New Broadband (IP) Public Network From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public

More information

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics: Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged

More information

Performance improvement of active queue management with per-flow scheduling

Performance improvement of active queue management with per-flow scheduling Performance improvement of active queue management with per-flow scheduling Masayoshi Nabeshima, Kouji Yata NTT Cyber Solutions Laboratories, NTT Corporation 1-1 Hikari-no-oka Yokosuka-shi Kanagawa 239

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Network-Wide Capacity Planning with Route Analytics

Network-Wide Capacity Planning with Route Analytics with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]

More information

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Lyapunov Stability Analysis of Energy Constraint for Intelligent Home Energy Management System

Lyapunov Stability Analysis of Energy Constraint for Intelligent Home Energy Management System JAIST Reposi https://dspace.j Title Lyapunov stability analysis for intelligent home energy of energ manageme Author(s)Umer, Saher; Tan, Yasuo; Lim, Azman Citation IEICE Technical Report on Ubiquitous

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Maximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p.

Maximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p. Title Maximizing the number of users in an interactive video-ondemand system Author(s) Bakiras, S; Li, VOK Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p. 281-292 Issued Date 2002 URL

More information

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage Lecture 16: Quality of Service CSE 123: Computer Networks Stefan Savage Final Next week (trust Blink wrt time/location) Will cover entire class Style similar to midterm I ll post a sample (i.e. old) final

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

The QoS of the Edge Router based on DiffServ

The QoS of the Edge Router based on DiffServ The QoS of the Edge Router based on DiffServ Zhang Nan 1, Mao Pengxuan 1, Xiao Yang 1, Kiseon Kim 2 1 Institute of Information and Science, Beijing Jiaotong University, Beijing 100044, China 2 Dept. of

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

TD 271 Rev.1 (PLEN/15)

TD 271 Rev.1 (PLEN/15) INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:

More information

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]

More information

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

XCP-i : explicit Control Protocol for heterogeneous inter-networking of high-speed networks

XCP-i : explicit Control Protocol for heterogeneous inter-networking of high-speed networks : explicit Control Protocol for heterogeneous inter-networking of high-speed networks D. M. Lopez-Pacheco INRIA RESO/LIP, France Email: [email protected] C. Pham, Member, IEEE LIUPPA, University of

More information

Passive Queue Management

Passive Queue Management , 2013 Performance Evaluation of Computer Networks Objectives Explain the role of active queue management in performance optimization of TCP/IP networks Learn a range of active queue management algorithms

More information

6.6 Scheduling and Policing Mechanisms

6.6 Scheduling and Policing Mechanisms 02-068 C06 pp4 6/14/02 3:11 PM Page 572 572 CHAPTER 6 Multimedia Networking 6.6 Scheduling and Policing Mechanisms In the previous section, we identified the important underlying principles in providing

More information

Path Selection Analysis in MPLS Network Based on QoS

Path Selection Analysis in MPLS Network Based on QoS Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special

More information

Performance Evaluation of Quality of Service Assurance in MPLS Networks

Performance Evaluation of Quality of Service Assurance in MPLS Networks 114 Performance Evaluation of Quality of Service Assurance in MPLS Networks Karol Molnar, Jiri Hosek, Lukas Rucka, Dan Komosny and Martin Vlcek Brno University of Technology, Communication, Purkynova 118,

More information

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and. Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing

More information

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE

More information

Technical Bulletin. Enabling Arista Advanced Monitoring. Overview

Technical Bulletin. Enabling Arista Advanced Monitoring. Overview Technical Bulletin Enabling Arista Advanced Monitoring Overview Highlights: Independent observation networks are costly and can t keep pace with the production network speed increase EOS eapi allows programmatic

More information

DESIGN OF ACTIVE QUEUE MANAGEMENT BASED ON THE CORRELATIONS IN INTERNET TRAFFIC

DESIGN OF ACTIVE QUEUE MANAGEMENT BASED ON THE CORRELATIONS IN INTERNET TRAFFIC DESIGN OF ACTIVE QUEUE MANAGEMENT BASED ON THE CORRELATIONS IN INTERNET TRAFFIC KHALID S. AL-AWFI AND MICHAEL E. WOODWARD { k.s.r.alawf, m.e.woodward }@bradford.ac.uk Department of Computing, University

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

Quality of Service (QoS)) in IP networks

Quality of Service (QoS)) in IP networks Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

Using median filtering in active queue management for telecommunication networks

Using median filtering in active queue management for telecommunication networks Using median filtering in active queue management for telecommunication networks Sorin ZOICAN *, Ph.D. Cuvinte cheie. Managementul cozilor de aşteptare, filtru median, probabilitate de rejectare, întârziere.

More information

An Adaptive RIO (A-RIO) Queue Management Algorithm

An Adaptive RIO (A-RIO) Queue Management Algorithm An Adaptive RIO (A-RIO) Queue Management Algorithm Julio Orozco 1,2 and David Ros 1 1 GET/ENST Bretagne, Rue de la Châtaigneraie, CS 1767, 35576 Cesson Sévigné Cedex, France 2 IRISA/INRIA Rennes, Campus

More information

Building MPLS VPNs with QoS Routing Capability i

Building MPLS VPNs with QoS Routing Capability i Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358

More information

Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks

Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Jerry Chou, Bill Lin University of California, San Diego Subhabrata Sen, Oliver Spatscheck AT&T Labs-Research USENIX Security

More information

PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS

PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS James E Burns and Teunis J Ott Telcordia Technologies Inc, 445 South Street, Morristown NJ 07960-6438, USA Anthony E Krzesinski and Karen E Müller

More information