Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming
|
|
|
- Agnes Benson
- 9 years ago
- Views:
Transcription
1 Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura Guraduate School of Information Science, Nara Institute of Science and Technology, Takayama cho 896 5, Ikoma, Nara, 63 92, Japan Katsuyoshi Iida Global Scientific Information and Computing Center, Tokyo Institute of Technology, Tokyo, Japan Hiroyuki Koga Department of Information and Media Sciences, University of Kitakyushu, Fukuoka, Japan Youki Kadobayashi Guraduate School of Information Science, Nara Institute of Science and Technology, Nara, Japan Suguru Yamaguchi Guraduate School of Information Science, Nara Institute of Science and Technology, Nara, Japan Abstract The traditional virtual private network (VPN), which provides best effort or static bandwidth allocation services, does not support bursty Internet traffic well As a way of supporting bursty traffic, a VPN provider can offer minimum throughput assurance (MTA) service to customers MTA service provides higher throughput predictability than best effort VPN service Although there are many proposed network architectures for MTA service, certain parameters should be decided offline as provisioning The difficulty in such provisioning is to meet the minimum throughput requirements in any active state matrices We propose a provisioning algorithm that uses nonlinear programming for MTA service We also quantitatively evaluate our algorithm and its performance Introduction Virtual private networks (VPNs) are used by many organizations as private information networks connecting distant sites at costs lower than those possible with a network of leased lines However, VPNs have difficulty meeting quality of service (QoS) requirements because they must share resources among all users To overcome this problem and satisfy some of the QoS requirements, a framework called provider provisioned VPNs (PPVPNs) was developed by VPN providers The current PPVPN does not support bursty Internet traffic well because it only allocates network resources statically If VPN providers guarantee customers a static amount of This work of K Iida was supported in part by the Ministry of Education, Science, Sports and Culture, Japan, Grant-in-Aid for Young Scientists, 8754, 26 bandwidth, to the result is low bandwidth utilization One way of supporting bursty Internet traffic is to assure minimum throughput to customers With minimum throughput assurance (MTA) service, a customer can obtain much more throughput than the minimum agreed throughput during periods of non-congestion During periods of congestion, the minimum agreed throughput is provided as an average in a certain period Therefore, MTA service can provide higher throughput predictability than best effort VPN service To explain MTA service, we illustrate throughput allocation scenarios in the MTA service in Fig In the figure, aggregated traffic from site A to site A2 and that from site B to site B2 is assigned 5 Mb/s as a minimum throughput Note that hereafter we denote as macro flow the aggregated traffic Fig (a) depicts a no congestion scenario, ie, the macro flow from site B to site B2 is idle In this case, the macro flow from site A to site A2 can obtain a larger throughput than the minimum throughput On the other hand, the throughput for the macro flow from site A to site A2 is only 5 Mb/s in a congestion scenario, as illustrated in Fig (b) However, even in the congestion scenario, MTA service can provide the minimum throughput for any macro flows A lot of research has been done on MTA service Clark et al proposed random early drop routers with in/out bit (RIO) to allocate capacity for best effort service [] According to their performance evaluation, RIO can allocate capacity independent of the effect of RTT This research is considered an important milestone in MTA service provision Fàbrega et al proposed a guaranteed minimum throughput service for TCP flows using measurement-based admission control [2] Methods have also been proposed for MTA service using the idea of ATM s ABR service Li et al proposed the corestateless congestion avoidance scheme for IP networks [5] Lee
2 (a) No congestion scenario (b) Congestion scenario Figure : Throughput allocation in MTA service et al proposed the weighted proportional fair rate allocation (WPFRA) method for differentiated service (DiffServ) in the Internet [4] Yokoyama et al proposed a one-way version of the WPFRA method to improve its performance [7] Shimamura et al proposed a hose model extension of the WPFRA method [6] To put these proposed methods into practice, certain parameters should be decided offline as a provisioning For example, RIO requires a target rate for each TCP micro/macro flow and the WPFRA method requires the weight for each macro flow However, no such provisioning algorithm has been proposed The difficulty with such provisioning algorithm is to meet the minimum throughput requirements in any active state matrices, in which each element of the matrix represents an active/idle state of traffic from a source to a destination site Since the MTA service must support bursty traffic, some elements of the active state matrix may be idle and may frequently switch from active to idle states We propose a provisioning algorithm that uses mathematical programming, especially nonlinear programming (NLP), to provide MTA service in PPVPNs Mathematical programming is widely and effectively used for network provisioning [3] We describe our algorithm in detail, investigate whether it can meet the throughput requirements in any active state matrix, and evaluate the bandwidth utilization throughout the network The rest of the paper is organized as follows Sect 2 presents our proposed provisioning algorithm for MTA service We evaluate the effectiveness of our approach with quantitative results in Sect 3 and conclude the paper in Sect 4 2 Weight determination algorithm In the Introduction, we argued that MTA service improves the throughput predictability of bursty traffic To implement MTA service, we set three requirements: ) meet the minimum throughput requirement from customers in any active state matrices; 2) fairly distribute the spare bandwidth; and 3) utilize network resources efficiently The WPFRA method and its variants are approaches Formal definition of active state matrix will be described in Fig 3, Sect 22 to MTA service that meet these three requirements The WPFRA method can distribute spare bandwidth based on weight value, therefore it can provide weighted proportional fairness Before using the WPFRA method, the VPN provider must decide the weight values for all combinations of source and destination sites Deciding the weight values to satisfy the minimum throughput requirement of the first requirement is still a challenge The difficulty in deciding the weight values lies in finding a common matrix of weight values that satisfies the minimum throughput requirement for all active state matrices In this section, we first briefly explain the WPFRA method Then we propose a common weight matrix determination algorithm to satisfy the minimum throughput requirements for all elements of the active state matrix 2 WPFRA method and weight matrix determination algorithm We first summarize the WPFRA method The WPFRA method can distribute bandwidth in proportion to the weight value of each macro flow In the WPFRA method, edge and core routers form a VPN providers network and provide a feedback-driven traffic control to utilize the network bandwidth efficiently Ingress and core routers periodically measure the amount of arriving traffic and calculate a fair share rate r f that indicates the amount of allocated capacity for a macro flow with the weight of one A fair share rate is calculated for each output link in a router Egress edge routers periodically send a notification packet to each ingress edge router, and core routers update the value of r f inside the notification packet if it is smaller than the current value stored in the packet Ingress routers obtain the value of r f from the received notification packet and set the value to the explicit rate ER, which indicates that the allocated throughput for a macro flow has a weight of one Finally, they calculate the allocated throughput as ER multiplied by the customer s weight To illustrate how the WPFRA method decides the allocated throughput, we show the following algorithm based on [4] in the following Initialization Let C be the link capacity and S be the spare bandwidth in the current iteration, which is set to where (s, t) is a link S (s,t) C (s,t), Step Let W (s,t) be the sum of each weight value corresponding to all macro flows passing through a link (s, t) and r f(s,t) be the allocated capacity for a macro flow with the weight of one in the link Then, undetermined r f(s,t) is given by r f(s,t) S (s,t) W (s,t) Step 2 After r f(s,t) is calculated, explicit rate ER (i,e) is calculated by ER (i,e) min(r f(s,t) ), 2
3 Table : Throughput calculation results in Fig 2 Active state B (A,A2) B (B,B2) A A2 B B2 (ER (I,E) ) (ER (I2,E) ) () 5 (25) () (5) () 6 (3) () (6) Figure 2: Example of throughput calculation: Network topology Objective function * Maximize the average of the link utilization rate where (i, e) is a path between ingress and egress routers that contains link (s, t) Step 3 Let w be the previously assigned weight and B be the allocated capacity of each customer given by B (m,n) ER (i,e) w (m,n), () where (m, n) is a path between source and destination sites that contains path (i, e) Step 4 Then, S (s,t) and W (s,t) are updated by S (s,t) S (s,t) B (m,n), (2) W (s,t) W (s,t) w (m,n), where path (m, n) also contains link (s, t) Step 5 Finally, the calculation is terminated if all W (s,t) become zero, ie, all r f(s,t), ER (i,e), and B (m,n) are determined If not, go back to Step To give readers a better understanding, we provide the example depicted in Fig 2 In this example, there are four sites: customer A has two sites, A and A2, and customer B has two sites, B and B2 The traffic of customer A (B) originates at A (B) and is destined for A2 (B2), respectively As described in the figure, the values w (A,A2) and w (B,B2) are respectively assigned weights of one and two The numbers attached with a link indicates the amount of bandwidth for each link in Fig 2 If C (I,C) is larger than 2, B (A,A2) and B (B,B2) become 2 and 4, respectively The fact that C (I,C) is limited to makes throughput calculation difficult Suppose the traffic of customer A and B are both active Then, r f(i,c), r f(i2,c) and r f(c,e) converge, respectively, at, 45 and 25 based on the above algorithm As a result, ER (I,E) becomes and ER (I2,E) becomes 25 Since w (A,A2) and w (B,B2) are one and two, B (A,A2) becomes and B (B,B2) becomes 5 This result is also included in Table Next we develop an algorithm to calculate weight values based on topology, minimum throughput matrix, and active state matrix Since the allocated throughput and spare bandwidth can be calculated using () and (2), we can now formulate the following mathematical programming: Constraints * Allocated throughput Required throughput * Bandwidth usage Link capacity * Weights Note that the allocated throughput, spare bandwidth, and utilization are all represented by polynomials of weights Thus, this mathematical programming can be classified into nonlinear programming (NLP) Table 2 shows an example of calculated weights in a simple NLP In this example, three customers (X, Y, Z) share a single bottlenecked link The required minimum throughput of (X, Y, Z) is (, 2, 6); the bandwidth of the bottlenecked link is The calculated weight values are listed for all active state matrices, ie, (X, Y, Z) = (,, ), (X, Y, Z) = (,, ) and so on All resulting allocated throughputs are grater than the minimum throughput requirement 22 Common weight matrix determination algorithm As we saw in Tables and 2, the allocated throughput is affected by the active state matrix A general illustration of this effect is given by Fig 3 The active state matrix represents an active/idle state of traffic from a source to a destination site, ie, the values of and are idle and active states, respectively The minimum throughput matrix is used to describe the amount of customers minimum throughput requirements from a source site i to a destination site j The zero element of the active state matrix results in zero value in the minimum throughput matrix at the same element in the active state matrix The weight matrix is a weight value used by the WPFRA method When we fix the active state matrix, we can calculate a weight matrix using NLP However, if we change the active state matrix, the weight matrix W k also changes Since dynamically changing the weight value is very difficult to be implemented, we wish to find a common weight matrix that meets the minimum throughput requirement in any active state matrix Therefore, we need a strategy to find a common weight matrix to meet these minimum throughput requirements We then try to derive a common weight matrix Since NLP requires an initial weight matrix, the previously derived weight matrix for an active state matrix can be used as the initial NLP 3
4 Table 2: Example of weights calculated by NLP Active state Calculated weights Allocated bandwidth Util X Y Z X Y Z X Y Z % % % 5 5 % Single bottlenecked link: Required minimum throughput: (X, Y, Z) = (, 2, 6) Active state matrix Minimum throughput matrix Weight matrix j j m 2 m 2j w 2 w Calculated by NLP 2j = W m i m ij w i w ij m m 2j Calculated by NLP w w j w 2 w 2j = W k w i w ij Figure 3: Common weight matrix weight matrix with the input of another active state matrix We hypothesize that this iteration of NLP will converge on the common weight matrix and meet the minimum throughput requirements Based on this hypothesis, we create a basic strategy to obtain the common weight matrix Iteration Previously output values (ie, the weight matrix calculated by NLP) are utilized as an initial weight matrix in the next step Normalization The weights represent a proportional ratio of the allocated bandwidth, ie, the calculated weight matrix (a, b, c) is equivalent to (ka, kb, kc), where k is a variable To avoid this effect, we divide the weight matrix into collision groups, and then we normalize the grouped elements of the weight matrix, such as (ka, kb, kc)/k (a, b, c), in each collision group Stabilization An element of the weight matrix corresponding to the zero element in the active state matrix can be selected for any value To avoid needless change in weight values, we make constraints for such elements, ie, we simply choose the value obtained in the previous iteration We construct our common weight determination algorithm based on this strategy and illustrate it in Fig 4 as a pseudocode Users of our provisioning algorithm must specify the required minimum throughput for each customer site so that the weight matrix satisfying the minimum throughput can be obtained The fundamental calculation complexity will be l u k= 2v k(v k ), where u, v and l is the number of customers, sites per customer, and calculation cycles, respectively 3 Quantitative evaluation In the previous section, we presented our common weight matrix determination algorithm, which is based on the hypothesis that elements converges through the iteration of NLP In this section, we demonstrate that our algorithm converges on a common weight matrix that meets the minimum throughput requirement We also investigate the impact of the imbalanced amount of minimum throughput requirements and whether there is spare bandwidth We use the simple topology illustrated in Fig 5 There are one core and three edge routers, and they form a star topology with a link capacity of 8 in all links All edge routers behave as both ingress and egress routers, ie, traffic is bidirectional between each of a particular customer s sites There are two customers (A, B); each of whom has three sites (A, A2, A3) and (B, B2, B3) Each of customers A and Bs sites is connected to its respective edge router We vary the required minimum throughput to investigate the impact of imbalance ratio and the amount of the minimum throughput as follows: (a) A (x,y) : A (x,z) : B (x,y) : B (x,z) = 2 : 2 : 2 : 2 (b) A (x,y) : A (x,z) : B (x,y) : B (x,z) = : : : 4
5 LoopNLP(iteration){ InitAllWeights(weights); SetInputValue(topology, reqbw); for ( i=; i<iteration; i++ ) { foreach (pattern) { weights = RunNLP(topology, pattern, reqbw, weights); normalization(pattern, weights); RunNLP(t, p, b, w){ foreach (p) { if( active[i] == ){ # Stabilize value of w[i] SetConstraint(w[i]); ans = SolveNLP(t, p, b, w); return ans; InitAllWeights(weights){ weights = (,,, ); normalization(pattern, weights){ group = divide_group(pattern); foreach (group) { normalized_w[i] = weights/min(weights); return normalized_w[i]; Figure 4: Pseudocode of weight determination algorithm (c) A (x,y) : A (x,z) : B (x,y) : B (x,z) = 3 : : : 3 (d) A (x,y) : A (x,z) : B (x,y) : B (x,z) = 5 : 5 : 5 : 5 There is spare capacity in both scenarios (b) and (d), and the amount of requests are imbalanced in (c) and (d) In this evaluation, we determine the representative weight matrix among a large number of calculated weight matrices in order to utilize a convergence index, which is defined as the maximum ratio of the number of common weight matrices to the number of all weight matrices Using the convergence index, we evaluate our proposed algorithm using the following two convergence indices The first is an average of the highest distributions of each element of the weigh matrix; the second is the highest distribution of a set of all calculated weight values in a weight matrix Here we call the former independent convergence index and the latter dependent (means batched) convergence index We show an example in the context of Table 2 In the independent convergence index, the average of the highest distributions of each site is 83 (= ( + + 5)/3) In the dependent convergence index, the highest distribution of batched tuples of (,, 8) is 5 Both indices adopt (,, 8) as the representative weight matrix in the first processing cycle of our iterative algorithm Figs 6 and 7 show results for the four required minimum throughputs with two convergence indices The x-axis repre- Figure 5: Experimental topology sents the amount of processing from to 3 iterations; the y-axis represents the convergence index, success rate, and average link utilization for each curve Average link utilization is always unchanged at approximately 85 even though the number of iterations increases This shows that our algorithm retains the fundamental advantage of mathematical programming, ie, it maximizes utilization under constraints, even if the iterations increase We found that the success rate progressively converges to for all required throughputs except that shown in Fig 7(d) in the independent convergence index The success rate in Fig 7(d) is low because all convergence indices for each site are independent, ie, not appropriate for the whole network However, the independent indices are always higher than the dependent one because they are determined in the absence of other factors We conclude that the dependent convergence index is more applicable Next we describe the impact of spare capacity on the success rate Under spare capacity scenarios (b) and (d), the difference between the success rate and convergence index is higher than that in scenarios (a) and (c) The convergence index is low because the calculated weights vary over a wide range due to the high latitude of the values Finally, we discuss the impact on the success rate of imbalanced required throughput among sites Our algorithm requires a large number of iterations to make the success rate converge in imbalanced request scenarios (c) and (d) This is due to the complicated topology and requests, though it also demonstrates the effectiveness of our iterative algorithm 4 Conclusion To satisfy customers required minimum throughput, we proposed a provisioning algorithm for MTA service First, we created an NLP to find a weight matrix for each active state matrix Then we proposed a common weight matrix determination algorithm based on the hypothesis of convergence in elements of the iteration of the NLP Through performance evaluations, we showed that our algorithm can converge on a common weight matrix using the convergence indices We also evaluated the impact on convergence of the imbalanced amount of required throughput and the presence of spare bandwidth In future work, to converge these indices more precisely 5
6 (a) Balanced requests/no spare capacity (b) Balanced requests/spare capacity (c) Imbalanced requests/no spare capacity (d) Imbalanced requests/spare capacity Figure 6: of independent convergence index (a) Balanced requests/no spare capacity (b) Balanced requests/spare capacity (c) Imbalanced requests/no spare capacity (d) Imbalanced requests / Spare capacity Figure 7: of dependent convergence index 6
7 and rapidly, we will focus on a pruning algorithm and consider highly correlated convergence indices References [] D D Clark and W Fang Explicit allocation of best-effort packet delivery service IEEE/ACM Trans Networking, 6(4): , August 998 [2] L Fàbrega, T Jové, P Vilà, and J Marzo A guaranteed minimum throughput service for TCP flows using measurement-based admission control International Journal of Communication Systems, 2():43 63, January 27 [3] J L Kenningtona, E V Olinicka, and G Spirideb Basic mathematical programming models for capacity allocation in mesh-based survivable networks to appear in Omega, Special Issue on Telecommunications Applications, 35(6): , December 27 [4] C L Lee, C W Chen, and Y C Chen Weighted proportional fair rate allocations in a differentiated services network IEICE Trans Communications, E85-B():6 28, January 22 [5] J S Li and J S Li A novel core-stateless ABR-like congestion avoidance scheme in IP networks International Journal of Communication Systems, 8(5): , June 25 [6] M Shimamura, K Iida, H Koga, Y Kadobayashi, and S Yamaguchi Performance evaluation of hose bandwidth allocation method using feedback control and class-based queueing for VPNs In Proc IEEE Int l Conference on Pacific Rim 25, pages , August 25 [7] T Yokoyama, K Iida, H Koga, and S Yamaguchi Adaptive bandwidth allocation using one-way feedback control for MPLS networks to appear in IEICE Trans Communications, 27 7
Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network
Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Course Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
Active Queue Management (AQM) based Internet Congestion Control
Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu ([email protected]) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control
QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ)
QoS in IP networks Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001 IETF Integrated Services (IntServ) Connection-oriented solution (end-to-end) QoS guarantees
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
Load Balancing by MPLS in Differentiated Services Networks
Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland
for guaranteed IP datagram routing
Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation
PART II. OPS-based metro area networks
PART II OPS-based metro area networks Chapter 3 Introduction to the OPS-based metro area networks Some traffic estimates for the UK network over the next few years [39] indicate that when access is primarily
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
An Adaptive Load Balancing to Provide Quality of Service
An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,
Performance advantages of resource sharing in polymorphic optical networks
R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Smart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])
A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds q
Computer Networs xxx (007) xxx xxx www.elsevier.com/locate/comnet A new approach to dynamic bandwidth allocation in Quality of Service networs: Performance and bounds q J. Elias a, F. Martignon b, *, A.
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
Differentiated Services
March 19, 1998 Gordon Chaffee Berkeley Multimedia Research Center University of California, Berkeley Email: [email protected] URL: http://bmrc.berkeley.edu/people/chaffee 1 Outline Architecture
MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001
MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
17: Queue Management. Queuing. Mark Handley
17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Multipath TCP in Data Centres (work in progress)
Multipath TCP in Data Centres (work in progress) Costin Raiciu Joint work with Christopher Pluntke, Adam Greenhalgh, Sebastien Barre, Mark Handley, Damon Wischik Data Centre Trends Cloud services are driving
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
CS 268: Lecture 13. QoS: DiffServ and IntServ
CS 268: Lecture 13 QoS: DiffServ and IntServ Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 1
IP Traffic Engineering over OMP technique
IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
Sizing Internet Router Buffers, Active Queue Management, and the Lur e Problem
Sizing Internet Router Buffers, Active Queue Management, and the Lur e Problem Christopher M. Kellett, Robert N. Shorten, and Douglas J. Leith Abstract Recent work in sizing Internet router buffers has
Multiple Layer Traffic Engineering in NTT Network Service
Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service
Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
A Policy-Based Admission Control Scheme for Voice over IP Networks
Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS
NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
A Fuzzy Algorithm for QoS-Based Routing in MPLS Network
A Fuzzy Algorithm for QoS-Based Routing in MPLS Network Nahid Ebrahimi Majd, Mohammad Hossien Yaghmaee Communication and Computer Research Lab.,Ferdowsi University of Mashhad Mashhad, Iran e-mails: {[email protected],
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
CS268 Exam Solutions. 1) End-to-End (20 pts)
CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person
Internet Quality of Service
Internet Quality of Service Weibin Zhao [email protected] 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS
CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS Masaki Aida, Keisuke Ishibashi, and Toshiyuki Kanazawa NTT Information Sharing Platform Laboratories,
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Functional Optimization Models for Active Queue Management
Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA [email protected]
How To Share Bandwidth On A Diffserv Network
Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia Bandwidth Sharing Scheme in DiffServ-aware
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran [email protected]
Optimization of IP Load-Balanced Routing for Hose Model
2009 21st IEEE International Conference on Tools with Artificial Intelligence Optimization of IP Load-Balanced Routing for Hose Model Invited Paper Eiji Oki Ayako Iwaki The University of Electro-Communications,
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:
Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged
Performance improvement of active queue management with per-flow scheduling
Performance improvement of active queue management with per-flow scheduling Masayoshi Nabeshima, Kouji Yata NTT Cyber Solutions Laboratories, NTT Corporation 1-1 Hikari-no-oka Yokosuka-shi Kanagawa 239
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Network-Wide Capacity Planning with Route Analytics
with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK [email protected]
The need for bandwidth management and QoS control when using public or shared networks for disaster relief work
International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
Lyapunov Stability Analysis of Energy Constraint for Intelligent Home Energy Management System
JAIST Reposi https://dspace.j Title Lyapunov stability analysis for intelligent home energy of energ manageme Author(s)Umer, Saher; Tan, Yasuo; Lim, Azman Citation IEICE Technical Report on Ubiquitous
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Maximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p.
Title Maximizing the number of users in an interactive video-ondemand system Author(s) Bakiras, S; Li, VOK Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p. 281-292 Issued Date 2002 URL
Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage
Lecture 16: Quality of Service CSE 123: Computer Networks Stefan Savage Final Next week (trust Blink wrt time/location) Will cover entire class Style similar to midterm I ll post a sample (i.e. old) final
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
The QoS of the Edge Router based on DiffServ
The QoS of the Edge Router based on DiffServ Zhang Nan 1, Mao Pengxuan 1, Xiao Yang 1, Kiseon Kim 2 1 Institute of Information and Science, Beijing Jiaotong University, Beijing 100044, China 2 Dept. of
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
TD 271 Rev.1 (PLEN/15)
INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:
Experiences with Class of Service (CoS) Translations in IP/MPLS Networks
Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
XCP-i : explicit Control Protocol for heterogeneous inter-networking of high-speed networks
: explicit Control Protocol for heterogeneous inter-networking of high-speed networks D. M. Lopez-Pacheco INRIA RESO/LIP, France Email: [email protected] C. Pham, Member, IEEE LIUPPA, University of
Passive Queue Management
, 2013 Performance Evaluation of Computer Networks Objectives Explain the role of active queue management in performance optimization of TCP/IP networks Learn a range of active queue management algorithms
6.6 Scheduling and Policing Mechanisms
02-068 C06 pp4 6/14/02 3:11 PM Page 572 572 CHAPTER 6 Multimedia Networking 6.6 Scheduling and Policing Mechanisms In the previous section, we identified the important underlying principles in providing
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
Performance Evaluation of Quality of Service Assurance in MPLS Networks
114 Performance Evaluation of Quality of Service Assurance in MPLS Networks Karol Molnar, Jiri Hosek, Lukas Rucka, Dan Komosny and Martin Vlcek Brno University of Technology, Communication, Purkynova 118,
Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.
Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Research on Video Traffic Control Technology Based on SDN. Ziyan Lin
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing
ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL
R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE
Technical Bulletin. Enabling Arista Advanced Monitoring. Overview
Technical Bulletin Enabling Arista Advanced Monitoring Overview Highlights: Independent observation networks are costly and can t keep pace with the production network speed increase EOS eapi allows programmatic
DESIGN OF ACTIVE QUEUE MANAGEMENT BASED ON THE CORRELATIONS IN INTERNET TRAFFIC
DESIGN OF ACTIVE QUEUE MANAGEMENT BASED ON THE CORRELATIONS IN INTERNET TRAFFIC KHALID S. AL-AWFI AND MICHAEL E. WOODWARD { k.s.r.alawf, m.e.woodward }@bradford.ac.uk Department of Computing, University
Load Balancing Mechanisms in Data Center Networks
Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints
Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints Michael Bauer, Srinivasan Ravichandran University of Wisconsin-Madison Department of Computer Sciences {bauer, srini}@cs.wisc.edu
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
Quality of Service (QoS)) in IP networks
Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T
1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
Using median filtering in active queue management for telecommunication networks
Using median filtering in active queue management for telecommunication networks Sorin ZOICAN *, Ph.D. Cuvinte cheie. Managementul cozilor de aşteptare, filtru median, probabilitate de rejectare, întârziere.
An Adaptive RIO (A-RIO) Queue Management Algorithm
An Adaptive RIO (A-RIO) Queue Management Algorithm Julio Orozco 1,2 and David Ros 1 1 GET/ENST Bretagne, Rue de la Châtaigneraie, CS 1767, 35576 Cesson Sévigné Cedex, France 2 IRISA/INRIA Rennes, Campus
Building MPLS VPNs with QoS Routing Capability i
Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Jerry Chou, Bill Lin University of California, San Diego Subhabrata Sen, Oliver Spatscheck AT&T Labs-Research USENIX Security
PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS
PATH SELECTION AND BANDWIDTH ALLOCATION IN MPLS NETWORKS James E Burns and Teunis J Ott Telcordia Technologies Inc, 445 South Street, Morristown NJ 07960-6438, USA Anthony E Krzesinski and Karen E Müller
