Autonomous Fault Detection and Recovery System in Large-scale Networks

Size: px
Start display at page:

Download "Autonomous Fault Detection and Recovery System in Large-scale Networks"

Transcription

1 Autonomous Fault Detection and Recovery System in Large-scale Networks Raheel Ahmed Memon 1, Yeonseung Ryu, Abdul Qadir Rahimoo Abstract In networks like Combat ship data network, the Ethernet is required to provide fault tolerance to all of its constituents for smooth operations. The analysis in this paper is done on the basis of our already proposed scheme Recursive Scalable Autonomous Fault tolerant Ethernet. Where, the large scale network is divided into small subnets by limiting the number of nodes in each. The nodes in RSAFE contain two Network Interface Cards for dual connectivity in network. The results show that failure can be detected by missing of 2 consecutive Heartbeat Messages, which is acceptable performance in a network, along with failover, RSFAE is also cost effective solution, it is capable to even extend itself without interrupting the existing structure. Index Terms Network topology, Fault tolerant Ethernet, RSAFE, Fault detection in network, Fault recovery in network. I. INTRODUCTION The most important capability in any system is its robustness, how a system behaves in critical situations and how a system can prevent it from fault occurrence. Though Ethernet was not specially designed to provide such robustness, but scientists started thinking in that direction because several mission critical systems such as; Combat Ship data network, unmanned vehicles, military weapons are network based mission critical systems. In response to such needs Fault tolerant Ethernet (FTE) introduced [1]. FTE provides multiple paths to all the connected equipments in the network, so that if primary path would fail then standby path can recover that fault. The primary goals of FTE are: 1) No loss of communication on single failure 2) Fault must be recovered within specified time 3) Use of existing protocols and 4) No proprietary hardware should be used. The FTE can be achieved by two different approaches either software or hardware; in software approach it works quite fine with small network but as the network size grows, it starts consuming huge bandwidth. In the hardware approach a proprietary hardware (Multiport Network Interface Card) is needed. [3] In our previously proposed scheme Scalable Autonomous Fault Tolerant Ethernet (SAFE) [2], a software approach has been used, according to OSI Model SAFE lies in Data-Link Layer and Network Layer. In SAFE a large network is divided into several manageable subnets and one of those 1 Corresponding author, he is currently working with the Department of Computer Science at Sukkur Institute of Business Administration, Sindh, Pakistan ( raheelmemon@iba-suk.edu.pk). subnets would perform as central subnet. The limitation with that system is; if the central subnet will fail then all over the communication would become dead. Recursive Scalable Autonomous Fault tolerant Ethernet (RSAFE) is an enhanced version of SAFE, where all the subnets are connected recursively to form a FTE in which no failure can interrupt the communication of other nodes or subnets. This also works on same principles of SAFE, it lies in Data-link layer and network layer, it divides large network into several manageable subnets but it doesn t select any central subnet rather the architecture of RSAFE scheme has been build in recursive manner. Where if any failures will occur then no other subnet would get affected, all subnets are formed recursively. This work is about the theoretical analysis of RSAFE for fail-over functionality in RSAFE. As RSAFE works on Heartbeat mechanism [11], where every node broadcast a heartbeat to the all other nodes within a subnet, and if any node can t deliver heartbeat messages successfully then that node would be reported as faulty node and recovery algorithm will execute. The time consumed between the fault detection and fault recovery has been theoretically analyzed in this paper. Section 2, is about background where discussion is focused about some of popular fault tolerant network architectures, section 3 is about architecture details and building algorithm for scheme. Section 4 is about methodologies used to detect and recover the fault. II. BACKGROUND Apart from the performance and power, the reliability is utmost requirement in mission critical systems. A system must perform fault free without any interruption. Reliability of a system is defined as inverse of fault occurrence (very low or no failure). So to achieve reliability of networks in such systems, extensive research has been conducted by different scientist, but almost the research done for Fault tolerant Ethernet (FTE) is for small networks, FTE in large scale network is a bit harder than the FTE for a network where number of nodes is limited. In our previous work [2] SAFE was proposed, which uses the single network with redundant cables to form a subnet, those created subnets are further connected to central subnet as shown in Figure1. Each node in the subnet has two ports (i.e; Port A and Port B) and both ports are connected to two different switches in a subnet, it is then called as Dual Fault Tolerant Ethernet (DFTE). In SAFE architecture the large number of nodes is divided into several manageable subnets, as shown in Figure 1 that 5 subnets are created where one subnet is selected as central subnet, all other subnets are connecting to that central subnet.

2 Each node in subnet have two network interface cards (NICs) one named as Port A and other named as Port B, both are connected to two switches named as Switch A and Switch B respectively. There are four possible paths for routing the data packets if any undesirable condition will happen, one of these paths will work as primary path for data traveling, while others one will remain in standby. So that, in response of fault detection, the standby path can recover the faults. As shown in Figure 2, DCell is constructed by combining several low-level DCells and DCells at the same level are fully connected with one another. DCell have several good features, like; DCell is a fully fault tolerant approach, which doesn t contain a single point of failure, it uses shortest-path routing protocol, DCell have capacity to facilitate new servers with exponential growth these days, and also capable to provide them a robust system [5]. But the cabling cost in DCell is higher; as number of servers increases the overall cost also grows exponentially. A. Architecture: III. RSAFE RSAFE dare to survive in the situations where the network is large and also expected to expand. To detect the fault in RSFAE architecture Heartbeat Message (HBM) is used, and to report that fault to other subnets (inter-subnet communication) is achieved by using Primary Master Node method, one of the nodes from every subnet serves as PMN, which keeps the updates of whole network. The recursive architecture of RSAFE has several advantages: 1) Failover within specified time 2) Multiple routing paths 3) Easily Scalable 4) No dependant subnet 5) Use of TCP/IP Protocols 6) No Proprietary Hardware needed: Figure 1. SAFE Architecture The limitation of this system is the connectivity of all subnets to central subnet, in case if both switches (Switch A and Switch B) of center subnet will fail then whole the network will stop communicating. For exponentially growth in number of servers at data centers, Chaunxiong Guo [3] introduced a new structure and called it as DCell. DCell uses a recursively-defined structure to interconnect servers. Each server connects to different levels of DCell via multiple links. 1) Failover within specified time: RSAFE work on HBMs, and every HBM is sent and received in 1.8/sec, if any node is unable to successfully deliver 2 consecutive HBMs then it would be assumed that the current path for that node has got some issues, and standby path will replace it. 2) Multiple routing paths: Within the subnet there are four possible paths to transfer data from one node to another node. Let s suppose in Figure 3. node N 1 wants to send the data to N 2 then possible paths are: (PP 1 ) (PP 2 ) (PP 3 ) (PP 4 ) Figure 2. DCell The Data Center Network Architecture 3) Easily Scalable: Scalability in RSAFE is easier, because adding new subnets wouldn t disturb the existing system. 4) No dependant Subnet: As in SAFE there was central subnet where all the subnets were connected, therefore in some conditions if both switches of central subnet would fail then all over network will stop working. 5) Use of TCP/IP Protocols: RSAFE works on already existing protocols like TCP/IP. 6) No Proprietary Hardware needed: In hardware approach [4] the failover time is very low, but on the other side it requires implementing a

3 proprietary hardware, so it is very expensive approach to implement, or to update the existing network. Figure 3. Shows the single subnet construction, all nodes have 2 Network interface Cards named as Port A and Port B, both are connected to Switch A and Switch B respectively. One of the nodes is selected as primary node, which is used to spread the subnet fault to other all subnets. Figure 3. Single Subnet There are three basic building blocks of RSAFE as shown in Figure 4, 1) Subnets 2) Groups and 3) Levels. Together these components form RSAFE architecture. 7) Subnets: Figure 4 (a) Composed of limited number of nodes and two switches (Switch A and Switch B ), each node in a subnet contains 2 NICs to connect with these 2 switches. One node is selected as Primary Node (PMN), while others are treated as normal nodes in subnet. This dually connected subnet has 4 possible paths to send and receive data. Figure 4. RSAFE Architecture 1) Groups: A limited number of subnets can form a group, where all the subnets connected to each other. Figure 4 (b) shows that the connectivity is formed as Second Switch of Subnet 0 is connected to first Switch of Subnet 1 and Second Switch of Subnet 1 is connected to first Switch of Subnet 2, for last subnet the Second Switch of Subnet n is connected to first Switch of Subnet 0. 2) Levels: Is the higher level than groups, it combines all the constructed groups and forms the complete levels. As shown in example Figure 4 (C) this is the highest level where no subnets are remaining back; all groups are constructed; now those groups are combined here to form the level. This is the last level, and the highest level. All the highest levels are constructed recursively from the lower levels. Whole the connectivity is based on subnets, subnets are used to connect and form the groups, further selected subnets from groups connected to form levels after all required levels were created randomly selected subnets are combined to form a complete level which is a complete large scale network. B. Fault- tolerant in Network: There are two modules used for fault tolerance in network; first is Fault detection (FD) which helps to detect the fault within some specific time, second is Fault Recovery (FR), this is followed by fault detection, once a fault has been detected the recovery module will execute to activate one of the standby paths. Now, fault detection is further divided into two sub categories, 1) Subnet FD 2) Inter-subnet FD. 1) Subnet FD: Fault detection module is continuously monitoring systems Heartbeat messages (HBMs); those are frequently sent and received by each node within a subnet. The sending and receiving time of HBMs is 1.8/sec. If any node is unable to receive 2 consecutive HBMs from other node then FD would be assumed that the fault has been occurred on the primary path, and FD will activate FR which then update the routing table and activate the standby path. The reason for using 2 consecutive HBMs to detect the fault is to confirm the connection failure, because due to several reasons it is possible to experience some losses in data receiving. 2) Inter-subnet FD: The primary node is selected in every subnet to exchange the network status with the other subnets. The inter-subnet communication about status updates is achieved by PMN. On any fault detection within a subnet a data packet is released between subnets and PMN of all subnet are responsible to share that information with all over the networks. IV. ANALYSIS There are two main contributions of RSAFE. First one is; RSAFE brought a less expensive fault tolerant scheme for large-scale networks. Thus scheme supports available hardware in market, and less expensive in cabling. The Second contribution is its performance, as this is scheme for mission critical systems, so performance very important factor to analyze. RSAFE gives acceptable performance in large networks.

4 Eq. 1 The failover time is Time fo in a subnet, and Time HBM is heartbeat repetition interval and T LAT is delay latency. "#$ " = 2 "#$ "# + "#$ "# (1) Time marker show that on 45 seconds, where HBM 21 was not received but still there was no fall in communication. Thus the number of Nodes in a subnet is a big factor for poor performance in fault detection, that s why we give 64 as a predefined limit to the number of nodes in a subnet. Figure 5, shows the connections needed to create a subnet. Maximum 64 nodes can form a subnet. Equation 2 is for calculating requirements: Figure 6. Fault Detection & Recovery time That is only because missing of one HBM is not a parameter to measure fault occurrence. One packet loss can be caused by several reasons. Figure 5. Number of Connections required for building a subnet "#$%& = "#$ (2) Where N total is total number of nodes and each node contains two Network Interface Cards (NICs) that are connected to two switches using straight through cables. To connect two switches with each other one crossover cable is needed. The graph shown in Figure 5 is estimation of required cables to create a subnet with 4 to 64 nodes. Table 1. Comparison Table RSAFE SAFE DCell 4 Possible Paths 4 Possible Paths Only 1 route Recursive structure, no central failure point in network linear One subnet works as center of communication linear Large no of alternative paths because of direct connectivity. Quadratic V. CONCLUSION In this paper we have presented an approach to provide fault tolerance in large scale networks for perform smooth operation in critical conditions without any failure. Our proposed scheme RSAFE is analyzed for two effective factors 1) cost effectiveness and 2) failover time. The cost of effectiveness is achieved by minimizing number of cables required in building a subnet, comparison is shown in Table 1, it shows that RSAFE is reasonable approach which can be adopted to save huge required price for large number of cabling and proprietary hardware development. For failover in RSAFE consecutively two heartbeat messages are required to detect fault occurrence. And recovery process can be done within one heartbeat. Where, the interval between each heartbeat message is 1.8 second. This analysis shows the feasibility of RSAFE for several mission critical systems like Combat Ship Data Networks, Unmanned vehicles, military weapons. Where the failure of data transmission can leads to a big loss. So we can conclude that RSAFE is good scheme to provide fault tolerance in huge networks where expansion in existing structure is also expected, because RSAFE allows adding or eliminating any subnet/node at any time without interrupting the working network. Though the size of a subnet is limited to 64 nodes, because more nodes can reduce the quality of performance, delay time would increase by increasing number of nodes. The fault detection analysis is done in Figure 6. As already stated that, loss of two consecutive HBMs is the sign of link-down. So we can see that y-axis is representing number of HBMs and x-axis is the time line (Seconds). The interval in between HBMs is 1.8 second. For 0 to12.6 Seconds the communication worked fine because 5 heartbeats received successfully. But, as HB 6 and 7 were not received up to expected time that s why on time 16.2 activating the standby node restored the communication. REFERENCES [1] Honeywell Automation and Control Solutions rionpks/faulttolerantethernet/default.htm [2] K.Y Kim, Y.S Ryu, J.M Rhee, and D.H Lee, SAFE: Scalable Autonomous Fault-tolerant Ethernet, Proc. of the 11th International Conference on Advanced Communication Technology (ICACT 2009), pp , Feb [3] Chuanxiong Guo, Haito Wu, Kun Tan, Lei Shei, Yongguang Zhang, Songwu Lu. Dcell: a scalable and fault-tolerant network structure for data centers ACM SIGCOMM 2008.

5 [4] J. Huang, S. Song, L. Li, P. Kappler, R. Freimark, and T. Kozlik, An Open Solution to Fault-Tolerant Ethernet : Design, Prototyping, and Evaluation, Proc. IEEE International Performance, Computing, and Communications Conference, Feb. 1999, pp [5] C. Guo, H. Wu, K. Tan, L. Shi, Y. Zhang, and S. Lu, DCell: A Scalable and Fault-Tolerant Network Structure for Data Centers, Proc. ACM SIGCOMM 2008, Aug [6] G. Hector, Elections in a Distributed Computing System, IEEE Transaction on Computer, Vol. C-31, No. 1, 1982, pp [7] P. Stelling, I. Foster, C. Kesselman, C. Lee, and G. Laszewski, A Fault Detection Service for Wide Area Distributed Computations, Cluster Computing, Vol. 2, No. 2, 1999, pp [8] T.D. Chandra and S. Toueg, Unreliable Failure Detectors for Reliable Distributed Systems, Journal of the ACM, Vol. 43, No. 2, Mar [9] J.B. Dugan, S.J. Bavuso, and M.A. Boyd, Dynamic fault-tree models for fault-tolerant computer systems, IEEE Transactions on Reliability, Vol. 41, Issue. 3, Sep. 1992, pp [10] S. Varadarajan and T. Chiueh, Automatic Fault Detection and Recovery in Real Time Switched Ethernet Networks, Proc. IEEE INFOCOM '99, 1999, pp [11] Pham, H. A., Rhee, J. M., Ryu, Y., & Lee, D. H. (2010, November). An adaptive and reliable data-path determination for Fault-Tolerant Ethernet using heartbeat mechanism. In Computer Sciences and Convergence Information Technology (ICCIT), th International Conference on (pp ). IEEE. Raheel Ahmed Memon Mr. Memon received his Masters degree in Computer Engineering from Myongji University South Korea in year He is currently working as Assistant Professor with Sukkur Institute of Business Administration. His research interests includes, Fault tolerant networking, Android Mobile computers, Flash Memories.

A Reliability Analysis of Datacenter Topologies

A Reliability Analysis of Datacenter Topologies A Reliability Analysis of Datacenter Topologies Rodrigo S. Couto, Miguel Elias M. Campista, and Luís Henrique M. K. Costa Universidade Federal do Rio de Janeiro - PEE/COPPE/GTA - DEL/POLI Email:{souza,miguel,luish}@gta.ufrj.br

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11

More information

102 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 1, FEBRUARY 2011

102 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 1, FEBRUARY 2011 102 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 1, FEBRUARY 2011 Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports Dan Li, Member, IEEE, Chuanxiong Guo, Haitao

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

[Sathish Kumar, 4(3): March, 2015] ISSN: 2277-9655 Scientific Journal Impact Factor: 3.449 (ISRA), Impact Factor: 2.114

[Sathish Kumar, 4(3): March, 2015] ISSN: 2277-9655 Scientific Journal Impact Factor: 3.449 (ISRA), Impact Factor: 2.114 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY HANDLING HEAVY-TAILED TRAFFIC IN QUEUEING NETWORKS USING MAX WEIGHT ALGORITHM M.Sathish Kumar *, G.Sathish Kumar * Department

More information

Building a Highly Available and Scalable Web Farm

Building a Highly Available and Scalable Web Farm Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,

More information

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.

Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone. Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

AUTO DEFAULT GATEWAY SETTINGS FOR VIRTUAL MACHINES IN SERVERS USING DEFAULT GATEWAY WEIGHT SETTINGS PROTOCOL (DGW)

AUTO DEFAULT GATEWAY SETTINGS FOR VIRTUAL MACHINES IN SERVERS USING DEFAULT GATEWAY WEIGHT SETTINGS PROTOCOL (DGW) AUTO DEFAULT GATEWAY SETTINGS FOR VIRTUAL MACHINES IN SERVERS USING DEFAULT GATEWAY WEIGHT SETTINGS PROTOCOL (DGW) Suman Dutta 1, Shouman Barua 2 and Jishu Sen 3 1 IT Trainer, Logitrain.com.au 2 PhD research

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

ADVANCED NETWORK CONFIGURATION GUIDE

ADVANCED NETWORK CONFIGURATION GUIDE White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi

More information

Generalized DCell Structure for Load-Balanced Data Center Networks

Generalized DCell Structure for Load-Balanced Data Center Networks Generalized DCell Structure for Load-Balanced Data Center Networks Markus Kliegl, Jason Lee,JunLi, Xinchao Zhang, Chuanxiong Guo,DavidRincón Swarthmore College, Duke University, Fudan University, Shanghai

More information

Creating Web Farms with Linux (Linux High Availability and Scalability)

Creating Web Farms with Linux (Linux High Availability and Scalability) Creating Web Farms with Linux (Linux High Availability and Scalability) Horms (Simon Horman) horms@verge.net.au December 2001 For Presentation in Tokyo, Japan http://verge.net.au/linux/has/ http://ultramonkey.org/

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards Redundancy = Protection from Network Failure. Redundancy Standards WP-31-REV0-4708-1/5 Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards For a very

More information

SCALABILITY AND AVAILABILITY

SCALABILITY AND AVAILABILITY SCALABILITY AND AVAILABILITY Real Systems must be Scalable fast enough to handle the expected load and grow easily when the load grows Available available enough of the time Scalable Scale-up increase

More information

A New Approach to Developing High-Availability Server

A New Approach to Developing High-Availability Server A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University jyu@cs.depaul.edu ABSTRACT This paper

More information

Multi-layer Structure of Data Center Based on Steiner Triple System

Multi-layer Structure of Data Center Based on Steiner Triple System Journal of Computational Information Systems 9: 11 (2013) 4371 4378 Available at http://www.jofcis.com Multi-layer Structure of Data Center Based on Steiner Triple System Jianfei ZHANG 1, Zhiyi FANG 1,

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Non-blocking Switching in the Cloud Computing Era

Non-blocking Switching in the Cloud Computing Era Non-blocking Switching in the Cloud Computing Era Contents 1 Foreword... 3 2 Networks Must Go With the Flow in the Cloud Computing Era... 3 3 Fat-tree Architecture Achieves a Non-blocking Data Center Network...

More information

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Integration of PRIMECLUSTER and Mission- Critical IA Server PRIMEQUEST

Integration of PRIMECLUSTER and Mission- Critical IA Server PRIMEQUEST Integration of and Mission- Critical IA Server V Masaru Sakai (Manuscript received May 20, 2005) Information Technology (IT) systems for today s ubiquitous computing age must be able to flexibly accommodate

More information

Introduction to MPIO, MCS, Trunking, and LACP

Introduction to MPIO, MCS, Trunking, and LACP Introduction to MPIO, MCS, Trunking, and LACP Sam Lee Version 1.0 (JAN, 2010) - 1 - QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201002-P210C lntroduction Many users confuse the

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Design and Implementation of High Availability OSPF Router *

Design and Implementation of High Availability OSPF Router * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26, 2173-2198 (2010) Design and Implementation of High Availability OSPF Router * Department of Computer Science National Chiao Tung University Hsinchu, 300

More information

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research

More information

Data Center Network Topologies: FatTree

Data Center Network Topologies: FatTree Data Center Network Topologies: FatTree Hakim Weatherspoon Assistant Professor, Dept of Computer Science CS 5413: High Performance Systems and Networking September 22, 2014 Slides used and adapted judiciously

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Large-Scale Distributed Systems. Datacenter Networks. COMP6511A Spring 2014 HKUST. Lin Gu lingu@ieee.org

Large-Scale Distributed Systems. Datacenter Networks. COMP6511A Spring 2014 HKUST. Lin Gu lingu@ieee.org Large-Scale Distributed Systems Datacenter Networks COMP6511A Spring 2014 HKUST Lin Gu lingu@ieee.org Datacenter Networking Major Components of a Datacenter Computing hardware (equipment racks) Power supply

More information

Resolving Packet Loss in a Computer Centre Applications

Resolving Packet Loss in a Computer Centre Applications International Journal of Computer Applications (975 8887) olume 74 No., July 3 Resolving Packet Loss in a Computer Centre Applications M. Rajalakshmi C.Angel K. M. Brindha Shree ABSTRACT The modern data

More information

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN

Analysis of QoS Routing Approach and the starvation`s evaluation in LAN www.ijcsi.org 360 Analysis of QoS Routing Approach and the starvation`s evaluation in LAN 1 st Ariana Bejleri Polytechnic University of Tirana, Faculty of Information Technology, Computer Engineering Department,

More information

A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network

A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman

More information

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors 2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2009-2010 Projecto de Rede / Sistema - Network / System Design 1 Hierarchical Network Design 2 Hierarchical

More information

Exploring Resource Provisioning Cost Models in Cloud Computing

Exploring Resource Provisioning Cost Models in Cloud Computing Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

Autonomous Fast Rerouting for Software Defined Network

Autonomous Fast Rerouting for Software Defined Network Autonomous ast Rerouting for Software Defined Network 2012.10.29 NTT Network Service System Laboratories, NTT Corporation Shohei Kamamura, Akeo Masuda, Koji Sasayama Page 1 Outline 1. Background and Motivation

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin

More information

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like

More information

IP SAN Best Practices

IP SAN Best Practices IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding

Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar

More information

OPTIMIZING SERVER VIRTUALIZATION

OPTIMIZING SERVER VIRTUALIZATION OPTIMIZING SERVER VIRTUALIZATION HP MULTI-PORT SERVER ADAPTERS BASED ON INTEL ETHERNET TECHNOLOGY As enterprise-class server infrastructures adopt virtualization to improve total cost of ownership (TCO)

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

USING REPLICATED DATA TO REDUCE BACKUP COST IN DISTRIBUTED DATABASES

USING REPLICATED DATA TO REDUCE BACKUP COST IN DISTRIBUTED DATABASES USING REPLICATED DATA TO REDUCE BACKUP COST IN DISTRIBUTED DATABASES 1 ALIREZA POORDAVOODI, 2 MOHAMMADREZA KHAYYAMBASHI, 3 JAFAR HAMIN 1, 3 M.Sc. Student, Computer Department, University of Sheikhbahaee,

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 3 Due by 1:25 PM MT, Monday March 5 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 3 Due by 1:25 PM MT, Monday March 5 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 3 Due by 1:25 PM MT, Monday March 5 th 2012 Important: No cheating will be tolerated. No Late Submission will be allowed. Total points for 5480 = 37

More information

StreamStorage: High-throughput and Scalable Storage Technology for Streaming Data

StreamStorage: High-throughput and Scalable Storage Technology for Streaming Data : High-throughput and Scalable Storage Technology for Streaming Data Munenori Maeda Toshihiro Ozawa Real-time analytical processing (RTAP) of vast amounts of time-series data from sensors, server logs,

More information

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,

More information

How To Increase Network Performance With Segmentation

How To Increase Network Performance With Segmentation White Paper Intel Adapters Network Management Network Performance Using Segmentation to Increase Network Performance More network users, greater application complexity, larger file sizes all of these can

More information

LSI SAS inside 60% of servers. 21 million LSI SAS & MegaRAID solutions shipped over last 3 years. 9 out of 10 top server vendors use MegaRAID

LSI SAS inside 60% of servers. 21 million LSI SAS & MegaRAID solutions shipped over last 3 years. 9 out of 10 top server vendors use MegaRAID The vast majority of the world s servers count on LSI SAS & MegaRAID Trust us, build the LSI credibility in storage, SAS, RAID Server installed base = 36M LSI SAS inside 60% of servers 21 million LSI SAS

More information

Application Note Gigabit Ethernet Port Modes

Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Evaluating the Impact of Data Center Network Architectures on Application Performance in Virtualized Environments

Evaluating the Impact of Data Center Network Architectures on Application Performance in Virtualized Environments Evaluating the Impact of Data Center Network Architectures on Application Performance in Virtualized Environments Yueping Zhang NEC Labs America, Inc. Princeton, NJ 854, USA Email: yueping@nec-labs.com

More information

Using Multi-Port Intel Ethernet Server Adapters to Optimize Server Virtualization

Using Multi-Port Intel Ethernet Server Adapters to Optimize Server Virtualization White Paper Intel Ethernet Multi-Port Server Adapters Using Multi-Port Intel Ethernet Server Adapters to Optimize Server Virtualization Introduction As enterprise-class server infrastructures adopt virtualization

More information

Andrew McRae Megadata Pty Ltd. andrew@megadata.mega.oz.au

Andrew McRae Megadata Pty Ltd. andrew@megadata.mega.oz.au A UNIX Task Broker Andrew McRae Megadata Pty Ltd. andrew@megadata.mega.oz.au This abstract describes a UNIX Task Broker, an application which provides redundant processing configurations using multiple

More information

QuickStart Guide vcenter Server Heartbeat 5.5 Update 2

QuickStart Guide vcenter Server Heartbeat 5.5 Update 2 vcenter Server Heartbeat 5.5 Update 2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Exemplos de Projecto - Network Design Examples 1 Hierarchical Network Design 2 Hierarchical

More information

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE., AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore

More information

Diamond: An Improved Fat-tree Architecture for Largescale

Diamond: An Improved Fat-tree Architecture for Largescale Diamond: An Improved Fat-tree Architecture for Largescale Data Centers Yantao Sun, Jing Chen, Qiang Liu, and Weiwei Fang School of Computer and Information Technology, Beijing Jiaotong University, Beijng

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Efficient Data Replication Scheme based on Hadoop Distributed File System

Efficient Data Replication Scheme based on Hadoop Distributed File System , pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support

OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support OpenFlow based Load Balancing for Fat-Tree Networks with Multipath Support Yu Li and Deng Pan Florida International University Miami, FL Abstract Data center networks are designed for satisfying the data

More information

PortLand:! A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric

PortLand:! A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric PortLand:! A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric Radhika Niranjan Mysore, Andreas Pamboris, Nathan Farrington, Nelson Huang, Pardis Miri, Sivasankar Radhakrishnan, Vikram Subramanya,

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

DCell: A Scalable and Fault-Tolerant Network Structure for Data Centers

DCell: A Scalable and Fault-Tolerant Network Structure for Data Centers DCell: A Scalable and Fault-Tolerant etwork Structure for Data Centers Chuanxiong Guo, Haitao Wu, Kun Tan, Lei Shi, Yongguang Zhang, Songwu Lu Microsoft Research Asia, Tsinghua University, UCLA {chguo,

More information

BEST PRACTICES GUIDE: Nimble Storage Best Practices for Scale-Out

BEST PRACTICES GUIDE: Nimble Storage Best Practices for Scale-Out BEST PRACTICES GUIDE: Nimble Storage Best Practices for Scale-Out Contents Introduction... 3 Terminology... 3 Planning Scale-Out Clusters and Pools... 3 Cluster Arrays Based on Management Boundaries...

More information

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2) What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and

More information

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4

More information

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

CHAPTER 10 LAN REDUNDANCY. Scaling Networks CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

EXINDA NETWORKS. Deployment Topologies

EXINDA NETWORKS. Deployment Topologies EXINDA NETWORKS Deployment Topologies September 2005 :: Award Winning Application Traffic Management Solutions :: :: www.exinda.com :: Exinda Networks :: info@exinda.com :: 2005 Exinda Networks Pty Ltd.

More information

Exploiting peer group concept for adaptive and highly available services

Exploiting peer group concept for adaptive and highly available services Exploiting peer group concept for adaptive and highly available services Muhammad Asif Jan Centre for European Nuclear Research (CERN) Switzerland Fahd Ali Zahid, Mohammad Moazam Fraz Foundation University,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

PCube: Improving Power Efficiency in Data Center Networks

PCube: Improving Power Efficiency in Data Center Networks PCube: Improving Power Efficiency in Data Center Networks Lei Huang, Qin Jia, Xin Wang Fudan University Shanghai, China 08300240053@fudan.edu.cn 08300240080@fudan.edu.cn xinw@fudan.edu.cn Shuang Yang Stanford

More information