Randomized Distance-Vector Routing Protocol
|
|
|
- Virgil Palmer
- 9 years ago
- Views:
Transcription
1 Randomized Distance-Vector Routing Protocol Sangman Bak Department of Computer Science University of Houston Houston, TX Jorge A. Cobb Department of Computer Science University of Texas at Dallas Dallas, TX , USA ABSTRACT The purpose of routing protocols in a computer network is to maximize throughput. Shortest-path routing protocols have the disadvantage of causing bottlenecks due to their single-path routing. That is, the shortest path between a source and a destination may become highly congested even when many other paths have low utilization. In this paper, we propose a routing scheme that randomly balances traffic over the whole network, therefore, it removes bottlenecks and increases network throughput. For each data message to be sent from a source s to a destination d, the proposed routing protocol randomly chooses an intermediate node e, and routes the data message along the shortest path from s to e. Then, it routes the data message via the shortest path from e to d. This increases the effective bandwidth between each pair of nodes. In our simulation results, we show that this proposed routing protocol distributes traffic evenly over the whole network and increases network throughput. 1.1 Keywords Shortest path routing, randomized distance-vector routing, network throughput, load balancing, effective bandwidth 2. INTRODUCTION In a wide-area store-and-forward computer network, such as Internet, routing protocols are essential. They are responsible for finding an efficient path between any pair of source and destination nodes in the network, and routing data messages along this path. The path must be chosen so that network throughput is maximized and message delay, message loss and other undesirable events are minimized. There are mainly two types of routing protocols: source routing and destination routing (next-hop routing). In source routing, a source node determines the path that a data message must take [4], [6]. In destination routing, each node uses its routing table to store a next hop for each destination. Thus, the routing table specifies only one hop along the path from the current node to a destination. In this paper, we deal with destination-based routing, due to its prevalence in the Internet. Destination routing protocols are classified into two types of routing protocols: distance-vector routing, used in the RIP Internet protocol [10], and link-state routing, used in the OSPF Internet protocol [13]. In a distance-vector routing protocol, each node maintains a routing table and a distance vector, which contains, respectively, a preferred neighbor for the shortest path to each destination in the network and the distance of the path to the destination. Each node has incomplete knowledge of the network topology, and knows only its neighboring nodes. From these neighbors, the node chooses a closest neighbor to each destination. At a stable state of the protocol, the path made by consecutive preferred neighbors to a given destination is the shortest path to the destination. Each node periodically sends its distance vector to each of its neighbors to inform it of any distance changes to any destinations. The node determines which neighbor is the closest to each destination by comparing the distance vectors of its neighbors [3], [7]. Link-state routing protocols require each node to maintain complete network topology information. Each node actively tests the status of the links between itself and
2 its neighbors. Then, it periodically broadcasts the local link status information to all other nodes. Since each node receives the local link status information from all other nodes, it is able to build a graph of the whole network topology and to compute the shortest path from itself to every other node [3], [8]. Unfortunately, destination routing protocols suffer performance degradation because all data messages are routed via the same shortest path to the destination until the routing tables have been updated. The problem with these routing protocols is that there are no mechanisms to alter the routing other than updating the routing tables. Routing table updates occur too slowly to respond to significant traffic fluctuations. Furthermore, increasing the frequency of routing table updates leads to unstable network behavior and an increase in network load due to routing state messages [14]. Note that the shortest path may be highly congested, even when many other paths to the destination are not congested. This congestion may trigger the loss of valuable messages [17]. Moreover, using the same path to the destination limits the maximum possible throughput to the destination to be at most the minimum capacity of the links along the shortest path to the destination. Maximizing network throughput is an important goal in the design of routing algorithms and networks. An analysis in network flow theory, known as the max-flow min-cut theorem [5], shows that the distribution of the traffic load over the available paths between a source and a destination in the network, instead of using only one path of the minimum cost, increases the maximum possible throughput up to the capacity of the minimum cut separating these two nodes. Figure 1: A Network Topology For example, let s consider Figure 1. The number beside each link represents its capacity. Suppose that node a (source) wants to send the data messages to node f (destination). Suppose that we use the hop count in order to calculate the cost of a path in the network. Then the effective bandwidth (i.e. the capacity of the minimum cut) between node a and node f is 30, while the effective bandwidth of the shortest path (a-h-g-f) from node a to node f is 5. So far, several techniques to increase the effective bandwidth between each pair of nodes and to improve performance have been proposed [2], [9], [14], [16]-[18]. These routing protocols improve performance by routing data messages via multiple paths to the destination. They maintain a stable routing table and meanwhile provide alternate paths to distribute data traffic when it is accumulating in some nodes of the network. When congestion and network failures do occur, instead of initiating route updating, the source temporarily forwards the traffic along the alternate paths and passes around the congested areas or failed areas. If the changes are persistent, the routing tables will be updated eventually when the next route updating time is due. Some techniques are Shortest Path First with Emergency Exits [17] based on link-state routing, multiple disjoint paths [16] based on distance-vector routing, and Dynamic Multi-path Routing [2] based on source routing. But these techniques require considerable processing overhead and non-negligible storage space, or increase the complexity of the routing algorithms. In this paper we propose a routing scheme based on randomization that distributes traffic load over the whole network, and therefore, it improves the network throughput by distributing the traffic load over all available paths to the destination. The rest of this paper is organized as follows. Section 3 presents the overview of the proposed routing protocol. Section 4 introduces the protocol notation to give a formal version of our routing protocol, which is given in Section 5. In Section 6 and 7 we present the simulation model and our results. In Section 8 and 9 we present future work and the conclusions, respectively. 3. OVERVIEW OF RANDOMIZED DISTANCE-VECTOR ROUTING PROTOCOL (RDVRP) In this section, we sketch how RDVRP routes data messages to the destination. Each node creates data messages and receives data messages from its neighbors. The node should forward these data messages to its neighbors so that the number of links traversed by each data message is as small as possible, while at the same time attempting to distribute these data messages evenly throughout the network to avoid congestion and increase network throughput. Our scheme is based on the distancevector routing algorithm. 3.2 Simple Randomized Distance-Vector Routing Protocol In this subsection, we present a simple version of RDVRP. For each data message to be sent from a source node s to a destination node d, the proposed routing
3 scheme randomly chooses an intermediate node e among all the network nodes. It then routes the message via the shortest path from s to e. Then, it routes the message via the shortest path from e to d. As an example, consider Figure 1 again. Suppose that node a (source) wants to send the data messages to node f (destination). For load balancing, node a should distribute the data messages evenly over the possible paths to node f. Node a may accomplish this by selecting randomly an intermediate node (say node c) among all the nodes in the network whenever node a sends a data message to node f, routing it to the intermediate node c via the shortest path between node a and node c and then routing it to destination f via the shortest path between node c and node f. To accomplish this, each message must carry at least three pieces of information: the destination d, the intermediate node e, and a bit b. Bit b indicates whether the message has not yet reached e (b = 0), or it has already passed through node e (b = 1). Therefore, the operation of the protocol is as follows. Initially, the source node s sends the message with b = 0, and routes it in the direction of node e. As long as b = 0, the message keeps being routed along the network until it reaches node e. At node e, b is updated to 1, and the message is routed towards node e. As long as b = 1, the message keeps being routed along the network until it reaches node d, and is delivered. 3.2 Bounding the Initial Routing Path The protocol of the previous subsection, however, has a shortcoming. It is possible that a data message is routed to the destination via a very long path, much larger than the shortest path between the source and the destination. For example, in Figure 1, suppose that node a wants to send a data message to node b, and it randomly chooses node f as the intermediate node. Then, the proposed algorithm routes the data message to node f via the shortest path (a-h-g-f) and then routes it to node b via the shortest path (f-e-c-b). Although there is a path of length 1 between node a and node b, the proposed algorithm may use the path of length 6. Therefore, routing paths that are excessively long will waste network resources and reduce network throughput. To remedy this problem, we introduce a parameter k, in order to exclude the nodes which are too far away from the source from being candidates for an intermediate node. The set of candidates is restricted to all those nodes whose distance to the source is at most k. The value chosen for k affects delay, the path length, load balancing, and network throughput. If k is zero, the length of traveled path is minimized because our routing protocol becomes the conventional distance-vector routing protocol, and thus the data message will be routed via a shortest path to the destination. On the other hand, if k is non-zero, a larger number of routing paths are available, which alleviates congestion and increases the effective bandwidth between these two nodes, but at the expense of increasing the length of the traveled path. Choosing the appropriate value for k is crucial for the performance of the algorithm. Choosing a small value will increase the likelihood of bottleneck. On the other hand, choosing a large value will waste network resources by routing packets via excessively long paths. To reach a compromise between these two extremes, we choose k to be the average of the distance to each node reachable from the source. 4. PROTOCOL NOTATION In this paper, we use a simple notation to define our routing protocol. A protocol is defined by a set of processes, p[0], p[1],..., p[n-1]. A process corresponds to a node in a computer network. A pair of neighboring processes is joined with a communications channel. Henceforth, we use the term process and node interchangeably. A process is defined by a set of constants, a set of inputs, a set of variables and a set of actions. The actions of a process are separated by the symbol [], as follows: begin action.1 [] action.2 []... [] action.m end An action has the following form: guard statement. A guard is a Boolean expression, which refers to constants, inputs, and variables of the process. A statement is defined recursively as one of the following:, assignment statement, conditional (if... fi), bounded loop (for... rof) and a sequence of two statements separated by ";". An action in a process is enabled if and only if the action's guard is true at the current state of the network. An execution step of a protocol consists of choosing any enabled action from any process, and executing the action s statement. Executions are maximal, i.e., either they consist of an infinite number of execution steps, or they terminate in a state in which no action is enabled. Executions are assumed to be fair, i.e., each action that remains continuously enabled is eventually executed. The communication between processes is based on a message-passing model. For every pair of neighboring processes p[i] and p[j], there are a FIFO channel from p[i] to p[j] and a FIFO channel from p[j] to p[i]. The statement send data(var) to p[j] in process p[i] appends a message of type data to the channel from p[i] to p[j], and the field in
4 the message is the current value of variable var in process p[i]. In addition to Boolean expressions, guards in each process p[i] are allowed to be of the form rcv data(var) from any p[j]. This guard is enabled iff there is a message of type data at the head of an incoming channel of p[i]. If an action with this receive guard is chosen for execution, then, before its command is executed, the data message is removed from the channel, and its field is copied into the local variable var. Furthermore, variable j is set to the identity of the neighbor from whom the message is received. Similar protocol notations are defined in [11] and [12]. 5. SPECIFICATION OF RANDOMIZED DISTANCE-VECTOR ROUTING PROTOCOL In this section, we present a formal version of the loadbalanced routing protocol. Each process has a constant n with the number of the processes in the network and an input set N with the identities of its neighbors. Each process p[i] has several variables. Variable inter stores candidates for intermediate nodes. That is, inter stores the process id s of processes which are at most k hops away from process p[i]. Variable rtb[j] stores the preferred neighbor to reach destination p[j], and hop[j] stores the distance to reach destination p[j]. The load-balanced routing protocol is defined as follows. process p [i: 0.. n-1] constants n : integer {number of nodes in the network} inputs N : set of {j p[j] is a neighbor of p[i]} variables k : 0.. n-1, {maximum length of 1 st routing path} inter : set of {0.. n-1} {possible intermediate nodes of routing paths} rtb : array [0.. n-1] of 0.. n, {routing table} hop : array [0.. n-1] of 0.. n, {hop count to each destination} h : array [0.. n-1] of 0.. n, {neighbor s hop count to each destination} e, d : 0.. n-1, {message s intermediate node and destination} b : 0.. 1, {status bit: b=0 on 1 st routing path, b=1 on 2 nd routing path} x : 0.. n-1, j : element of N begin true k := average{hop[x] 0 x < n 0 hop[x] < n}; inter := {x hop[x] k} [] true {create and route a new message to any destination} b := 0; d := any; e := random(inter); RTMSG [] rcv data(b, e, d) from any p[j] RTMSG [] true {send hop count to neighbors} for each j in N do send upd(hop) to p[j] rof [] rcv upd(h) from any p[j] UPDTBL end In the first action, process p[i] computes k as the average hop count to each reachable destination in the network. Then, the set of candidate nodes for intermediate routing nodes is computed. In the second action, the process creates a data message and chooses a destination for the message. Also, an intermediate node is chosen at random from the intermediate candidates set. Then, the created data message is routed to a neighboring process using statement RTMSG, defined below. In the third action, the process receives a data message and then routes the message to a neighbor using statement RTMSG. In the fourth action, the process sends a copy of its distance vector to each of its neighbors. In the last action, the process receives a copy of the distance vector from one of its neighbors, and updates its routing table and local distance vector using statement UPDTBL, which is defined below. Statement RTMSG is defined as follows. if d = i {arrived, deliver message} [] d i b = 0 hop[e] = n {unreachable intermediate node} [] d i b = 0 hop[e] < n e i {reachable intermediate node} send data(b, e, d) to rtb[e] [] d i b = 0 hop[e] < n e = i {end of first routing path} send data(1, e, d) to rtb[d] [] d i b = 1 hop[d] = n {unreachable destination} [] d i b = 1 hop[d] < n {reachable destination} send data(1, e, d) to rtb[d] fi In this statement, the process checks fields b, e, and d, of the message. If d = i, the message has reached its destination and is delivered. Otherwise, if b = 0, then the message is in its first routing path, and it is routed towards
5 process p[e]. If b = 1, the message is in its second routing path, and it is routed towards process p[d]. Statement UPDTBL is defined as follows. hop[i] := 0; for each x, where x i, do if rtb[x] = j ^ (h[x]+1) hop[x] {p[i] currently routes to p[x] via p[j],and p[j]'s distance to p[x] has changed.} hop[x] := min(h[x]+1, n) [] rtb[x] j ^ (h[x]+1) < hop[x] {found a shorter path} hop[x] := min(h[x]+1, n); rtb[x] := j [] rtb[x] j ^ (h[x]+1) hop[x] {keep the current path} [] rtb[x] N {p[rtb[x]] is down} hop[x] := min(h[x]+1, n); rtb[x] := j fi; rof In the first case of this statement, if process p[i] currently routes to a destination p[x] through the neighbor p[j], and p[j]'s distance to the destination changes, process p[i] updates its distance to p[x] accordingly. In the second case, if the neighbor p[j] uses a shorter path to reach a destination p[x], then process p[i] chooses p[j] as the next hop to destination p[x]. In the third case, process p[j] does not have a shorter path to p[x] than p[i] s path, and thus, p[i] does not update its tables. In the last case, the next hop neighbor to p[x] is no longer connected to p[i] due to a failure, and thus p[i] chooses p[j] as its next hop to p[x]. 6. SIMULATION MODEL Our simulation studies were done on the Maryland Routing Simulator(MaRS) [1], which is a network simulator developed at the University of Maryland. A Figure 2: NSFNET Topology: 14 nodes, 21 bi-directional links, average degree 3 network configuration consists of a physical network (nodes and links), a routing algorithm and a workload. 6.1 Physical Network In our simulation the physical network is the NSFNET topology in Figure 2. All links have the bandwidth, 1.5 Mbits/sec. There are no link or node failures. Each node has a buffer space of 50,000 bytes. The processing time of a data message at each node equals 1 µsec. In order to calculate the cost of a path in the network, we use the hop count. The cost of a link between any two neighbors is 1. The propagation delay of each link is 1 msec. 6.2 Routing Algorithm The Routing algorithms are SEGAL and RDVRP. SEGAL is a distance-vector and loop-free routing protocol. SEGAL uses a shortest-distance path for each pair of source and destination nodes. To get a better understanding of RDVRP, we compare the performance of RDVRP against SEGAL. 6.3 Workload The workload is file transfer protocol (FTP). All FTP connections have the following parameters: the data message length equals 512 bytes, the inter-message generation time is 1 or 10 msec, and the window size is 500 messages. Connections start when the simulation begins and they are never-ending. 6.4 Performance Measures We consider measures of throughput, message loss and link utilization. The measurement interval of each simulation is 50,000 msec. Throughput: Total number of data bytes acknowledged during the measurement interval divided by the length of the measurement interval. Message loss: Total number of the messages dropped during the measurement interval. Link Utilization: The data service rate divided by the link bandwidth. 7 SIMULATION RESULTS In this section, we present the simulation results and some observations about those results.
6 Throughput(bytes/msec) 1000 Figure 3 shows throughput versus the number of connections. The throughput first increases sharply, then levels off as network links reaches the saturation point. The saturation points in RDVRP are around 1, 10 and 14. The saturation points in SEGAL are around 1, 8 and 12. RDVRP is much better with respect to throughput. Message Loss Figure 3: Throughput vs. No of Connections Figure 4 shows message loss versus the number of connections. The message loss in the two routing protocols almost linearly increases as the number of connections increases. RDVRP has less message loss at almost all times during the measurement interval. Figure 5 shows throughput versus time for several Throughput(bytes/msec) RDVRP SEGAL RDVRP No of Connections SEGAL No of Connections Figure 4: Message Loss vs No. of Connections K=0 K=1 K=2 K=3 K=4 SEGAL Time(sec) Figure 5: Throughput vs time for parameter k (No of Connections = 7) values of parameter k. RDVRP has a much better throughput than SEGAL does when k is more than 0. Table 1 shows average link utilization for the measurement interval when the number of connections is 7. We can see that RDVRP more evenly distributes the data messages over the whole network than SEGAL does by investigating the link utilization over the whole network. And also, the total and the average of the link utilizations over the whole network indicate that RDVRP uses network resources more efficiently than SEGAL does. Link RDVRP SEGAL (1,2) 0 0 (2,1) (1,3) 0 0 (3,1) (2,3) (3,2) (2,4) (4,2) (1,8) (8,1) 0 0 (4,5) (5,4) (3,7) 1 0 (7,3) 0 0 (5,6) (6,5) (5,7) (7,5) (4,9) 1 1 (9,4) (6,8) (8,6) (7,14) (14,7) (7,11) (11,7) (10,11) 0 0 (11,10) (8,10) (10,8) (9,12) (12,9) (10,12) (12,10) 0 0 (9,13) (13,9) (12,14) (14,12) (10,13) 0 0 (13,10) 0 0 (13,14) (14,13) Total Average Variance Table 1: Link Utilization: (Measurement interval: 50,000 msec, Number of Connections: 7) 8 FUTURE WORK We have many possible directions for future work. The routing protocol proposed here is based on flat network architectures. But in the Internet the participating
7 nodes are partitioned according to a hierarchical structure. One direction for the future work is to apply our strategy to the hierarchical structure. In this paper we used the average of the distances to the destinations in the routing table as the value of parameter k in order to exclude the nodes that are too far away from the source from being candidates for an intermediate node. Another possible future work is to determine the best value of parameter k for both balancing load and using a path of a distance as short as the conventional routing protocols do. Our protocol uses an intermediate node even when the shortest path between source and destination are not congested. Using an intermediate node may increase the delay when the traffic load on every link along the shortest path is low. The third future work is to combine an adaptive routing and our strategy. 9 CONCLUSION In this paper, we presented a randomized distance vector routing protocol to distribute the data traffic randomly over all available paths to a destination in the network for data load balancing. Our simulation results show that the proposed routing protocol has an improved performance with respect to throughput, message loss and link utilization under both light and heavy loads. 10 ACKNOWLEDGMENTS It is our pleasure to thank the anonymous referees for their suggestion. 11 REFERENCES [1] Alaettinoglu, C., Dussa-Zieget, K., Matta, I., Gudmundsson, O., and Shankar, A. U. MaRS Maryland Routing Simulator Version 1.0. Department of Computer Science, University of Maryland, 1991 [2] Bahk, S. and Zarki, M. E., Dynamic Multi-path Routing and How it Compares with other Dynamic Routing Algorithms for High Speed Wide Area Networks, Proceedings of the 1992 ACM SIGCOMM Conference, Vol 22, Oct [3] Christian Huitema, ROUTING IN THE INTERNET, Prentice Hall PTR, New Jersey, [4] David R. Cheriton, Sirpent: A high-performance internetworking approach, Proceedings of the 1989 ACM SIGCOMM Conference, Sep [5] Dimitri P. Bertsekas, Linear Network Optimization: Algorithms and Codes, The MIT Press, [6] Dixon, R.C., Pitt, D.A., Addressing, bridging, and source routing (LAN interconnection), IEEE Network, Vol. 2, No. 1, Jan [7] J.J. Garcia-Luna-Aceves, A Minimum-Hop Routing Algorithm Based on Distributed Information, Computer Networks and ISDN Systems, Vol. 16, pp , May [8] J.M. McQuillan, Ira Richer and E.C. Rosen, The New Routing Algorithm for the ARPANET, IEEE Trans. On Communications, Vol. COM-28, No. 5, pp , May [9] Jorge A. Cobb and Gouda M. G., Balanced Routing, IEEE Proceedings of International Conference on Network Protocols, [10] G. Malkin, RIP Version 2, Internet Request for Comments 1723, Nov. 1994, Available from [11] Mohamed G. Gouda, Protocol verification made simple: a tutorial, Computer Networks and ISDN Systems, Vol. 25, pp , [12] Mohamed G. Gouda, The Elements of Network Protocol Design, A Wiley-Interscience Publication, John Wiley & Sons, Inc., [13] Moy J., Ospf Version 2, Internet Request for Comments 1583, March Available from [14] S. Murthy and J.J. Garcia-Luna-Aceves, Congestion- Oriented Shortest Multipath Routing, Proc. IEEE INFOCOM 96, San Francisco, California, March [15] A. Segall and M. Sidi, A failsafe distributed protocol for minimum delay routing, IEEE Trans. On Commun., COM-29(5), , May [16] Sidhu D., Nair R., Abdallah S., Finding Disjoint Paths in Networks, Proceedings of the 1991 ACM SIGCOMM Conference. [17] Wang Z., Crowcroft J., Shortest Path First with Emergency Exists, Proceedings of the 1990 ACM SIGCOMM Conference. [18] W.T. Zaumen and J.J. Garcia-Luna-Aceves, Loop- Free Multipath Routing Using Generalized Diffusing Computations, Proc. IEEE INFOCOM 98, San Francisco, California, March 29, 1998.
Load-Balanced Routing via Bounded Randomization. Abstract
Load-Balanced Routing via Bounded Randomization Sangman Bak Dept. of Computer Science University of Houston Houston, TX 77204-3475 713-743-3350 [email protected] Jorge A. Cobb Dept. of Computer Science University
Routing with OSPF. Introduction
Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
Analysis of QoS Routing Approach and the starvation`s evaluation in LAN
www.ijcsi.org 360 Analysis of QoS Routing Approach and the starvation`s evaluation in LAN 1 st Ariana Bejleri Polytechnic University of Tirana, Faculty of Information Technology, Computer Engineering Department,
Internet Control Message Protocol (ICMP)
SFWR 4C03: Computer Networks & Computer Security Jan 31-Feb 4, 2005 Lecturer: Kartik Krishnan Lecture 13-16 Internet Control Message Protocol (ICMP) The operation of the Internet is closely monitored by
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
An Overview of Solutions to Avoid Persistent BGP Divergence
An Overview of Solutions to Avoid Persistent BGP Divergence Ravi Musunuri Jorge A. Cobb Department of Computer Science The University of Texas at Dallas Email: musunuri, cobb @utdallas.edu Abstract The
Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna
Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Siuli Roy 1, Dola Saha 1, Somprakash Bandyopadhyay 1, Tetsuro Ueda 2, Shinsuke
Router and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
Factors to Consider When Designing a Network
Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
Route Discovery Protocols
Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF
Introduction to Dynamic Routing Protocols
CHAPTER 3 Introduction to Dynamic Routing Protocols Objectives Upon completion of this chapter, you should be able to answer the following questions: Can you describe the role of dynamic routing protocols
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Chapter 4. Distance Vector Routing Protocols
Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
Data Center Network Structure using Hybrid Optoelectronic Routers
Data Center Network Structure using Hybrid Optoelectronic Routers Yuichi Ohsita, and Masayuki Murata Graduate School of Information Science and Technology, Osaka University Osaka, Japan {y-ohsita, murata}@ist.osaka-u.ac.jp
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
A Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications
Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233 IDOSI Publications, 2012 DOI: 10.5829/idosi.mejsr.2012.12.11.144 Performance Comparison of Mixed Protocols Based on EIGRP,
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor [email protected] Abstract.
An Adaptive Load Balancing to Provide Quality of Service
An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,
Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage
Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing
6.263 Data Communication Networks
6.6 Data Communication Networks Lecture : Internet Routing (some slides are taken from I. Stoica and N. Mckewon & T. Griffin) Dina Katabi [email protected] www.nms.csail.mit.edu/~dina Books Text Book Data Communication
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Location Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
6.02 Practice Problems: Routing
1 of 9 6.02 Practice Problems: Routing IMPORTANT: IN ADDITION TO THESE PROBLEMS, PLEASE SOLVE THE PROBLEMS AT THE END OF CHAPTERS 17 AND 18. Problem 1. Consider the following networks: network I (containing
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Border Gateway Protocol (BGP)
Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,
O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1
1 Which two statements are true regarding the advantages of the use of static routes? (Choose increased security reduced effort in configuring routes the administrator maintains control over routing easier
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
Routing Protocols (RIP, OSPF, BGP)
Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to
Level 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
Dynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 [email protected] Abstract
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans
Chapter 1 1) p. 98: P-6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by single link
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
Routing with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh
Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Link-State Routing Protocols
Link-State Routing Protocols Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Link-state routing protocol Single-area OSPF concepts Single-area OSPF
Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms
Outline Internet Routing Venkat Padmanabhan Microsoft Research 9 pril 2001 Routing algorithms distance-vector (DV) link-state (LS) Internet Routing border gateway protocol (BGP) BGP convergence paper Venkat
Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network
International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction
LMPS: Localized Multi-Path Selection for QoS Routing in VoIP Networks Khaled M. F. Elsayed [email protected]
LMPS: Localized Multi-Path Selection for QoS Routing in VoIP Networks Khaled M F Elsayed khaled@ieeeorg Hassan Fadel Amin M Nassar anassar@engcuedueg hassanfadel@egticomeg Department of Electronics and
Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Comparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed [email protected] Khaled M. F. Elsayed, senior member IEEE [email protected] Department
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP
Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP Renato Lo Cigno Routing Algorithms: One or Many? Is there a single routing protocol in the Internet? How can different protocols and algorithms
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
A New Forwarding Policy for Load Balancing in Communication Networks
A New Forwarding Policy for Load Balancing in Communication Networks Martin Heusse Yvon Kermarrec ENST de Bretagne BP 83, 985 Brest Cedex, France [email protected] Abstract We present in this
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
II RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
Chapter 10 Link-State Routing Protocols
Chapter 10 Link-State Routing Protocols CCNA2-1 Chapter 10 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006
CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Optical interconnection networks with time slot routing
Theoretical and Applied Informatics ISSN 896 5 Vol. x 00x, no. x pp. x x Optical interconnection networks with time slot routing IRENEUSZ SZCZEŚNIAK AND ROMAN WYRZYKOWSKI a a Institute of Computer and
