Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links).

Size: px
Start display at page:

Download "Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links)."

Transcription

1 Service Provisioning to Provide Per-Connection-Based Availability Guarantee in WDM Mesh Networks Jing Zhang, Keyao Zhu, Hui Zang, and Biswanath Mukherjee Abstract We present availability analysis for WDM-mesh-network protection schemes. We propose cost-effective provisioning approaches to provide differentiated per-connection-based services to carry connections by appropriate routes and to protect them according to their availability requirements. 1. Introduction Protection schemes for WDM mesh networks (dedicated-path, shared-path, etc.) are typically based on the single-failure scenario. When fiber-cut rate and network maintenance frequency are high, the network operator needs novel methods to handle multiple, near-simultaneous failures where different network components (including fiber spans) may have different failure rates. Service reliability determines (a) whether protection is needed, and (b) its effectiveness. In a wavelength-routed optical network, service reliability is represented by connection availability, which is the probability that the connection will be in operating state at a random time in future [1,2]. Connection availability is defined in Service-Level Agreement (SLA) along with revenue and penalty. How to provision customers' requests to satisfy their availability requirements so as to avoid penalty and minimize cost is a major concern to a service provider. We propose a new provisioning framework to provide availability-guaranteed service to each traffic demand. The framework contains two parts: (a) WDM mesh network service-availability analysis; and (b) connection-provisioning approaches based on the analysis. Using our approaches, each connection is routed and protected (if necessary) according to its SLA and network component failure characteristics. 2. Connection Availability Analysis in WDM Mesh Networks Availability of a system (network component, path, connection, etc.) is the fraction of time the system is "up" during its entire service time. It can be computed as follows: Network component: Availability of a network component is calculated based on the component's failure rate and average time to fix a failure. Path: Availability of path i can be computed as multiplication of availabilities of network components along path i since path i is available only when all network components along path i are available. Connection: If connection t is carried by a single path, its availability (A t ) is equal to the path availability. If t is dedicated-path protected, A t is shown in Eqn. (1) (where A p and A b denote availabilities of primary (p) and backup (b) paths, respectively) since t is "down" only when both p and b are unavailable. If t is sharedpath protected, let S p denote a set that contains all primary paths (except p) whose backup paths are sharing some resources with b; n is size of S p ; p i is probability that exactly i primary paths in S p are unavailable; and δ i is probability that p can get backup resource when both p and other i primary paths in S p failed. A t can be computed by Eqn. (2) since t will be available if p is available; or p is unavailable, b is available, and failure on p happens before failures to other primary paths in S p. We assume p and all other primary paths in S p fail independently; hence, δ i = 1/(i+1). (Note that two primary paths in S p might traverse the same fiber link so their path failures may not be independent. In this case, 1/(i+1) δ i 1/2 when i 1. δ i = 1/(i+1) will give the lower bound of A t.) A t = 1 - (1 - A p ) (1 - A b ) = A p + (1 A p ) A b (1) A t = A p + Σ i=0,n δ i (1 - A p ) A b p i (2) 3. Proposed Provisioning Approaches

2 3.1 General Problem Statement Given: physical network topology, availability for each link, number of free wavelengths on each link, and set of connection requests (source, destination, and availability requirement). Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links). 3.2 ILP-Based Approaches Suppose path p traverses links l 1, l 2,..., l n. Then, p is a reliable path for connection t only if: A p = A 1 A 2... A n A ' t (3) where A i is availability of link l i, and A ' t is availability requirement of connection t. Computing logarithm of both sides, noting that availabilities are between 0 and 1, and multiplying both sides by -1, we get: -loga p = -loga 1 - loga loga n -loga ' t (4) Now, if cost of link l i (C i ) is defined as a function of its availability (i.e., C i = - loga i ), the cost is additive and the path with minimum cost will be the path with maximum availability (such a path is called mostreliable path (MRP)). This Multiplication-to-Summation (MS) technique can be used to compute the MRP. If availability of a MRP is lower than A ' t, then protection is needed for connection t. Therefore, we classify connections into two groups: one-path-satisfiable connections (T 1 ), whose availability can be satisfied without any backup path, and protection-sensitive connections (T 2 ), otherwise. Our MS technique enables us to formulate the problem of provisioning connections in T 1 into an integer linear program (ILP) since (nonlinear) multiplication is converted into (linear) summation. For connections in T 2, due to nonlinearity of availability calculation for dedicated-path protection (Eqn. (1)), the problem is nonlinear; hence, we develop two approximation approaches [3]. 3.3 Heuristic Approaches We investigate several heuristics for instances where the ILP may have difficulty due to large network size and high volume of connection requests. Fixed-alternate routing is used, i.e., for each node pair, K candidate routes or link-disjoint route-pairs are pre-computed, and availability of each route is calculated. Therefore, a request t = <s, d> can pick routes (or route-pairs) which satisfy its requirement from K candidate routes from s to d. Let S t denote a set containing all routes (or route-pairs) that can satisfy availability requirement of request t. R best (RP best ) denotes route (route-pair) with highest availability in S t. Each request t can select its route using following approaches: Randomly pick one request t, and randomly pick one route (or route-pair) r from S t. Use r to carry t if replacing current route of t by r could reduce total cost (wavelength-links) without introducing additional wavelengths into the network, or Iteratively-select could reduce wavelength channels needed; otherwise, keep current route. Repeat above steps until no route replacement happens in a large number of continuous iterations (10 5 in our numerical simulations). Most-reliable Use R best for request t if there is a R best in S t ; use RP best otherwise. Just-above-threshold Route (or route-pairs) with minimal availability in S t is used to carry request t. Minimal-cost Route (or route-pairs) with minimal cost in S t is used to carry request t. After route selection, a connection can be either unprotected or dedicated-protected. In order to further improve network resource efficiency without scarifying service reliability, we can offer shared protection to connections so that availability requirement can still be met, as follows:

3 Examine sharing possibility among all connections, and assume they are shared protected if possible. Evaluate each connection's availability. Upgrade protection scheme of a connection from sharedprotection to dedicated-protection if required availability is not satisfied. Other more-intelligent optimization algorithms can also be developed based on reliability analysis, network configuration, and customers' requirements, and they may achieve better network performance. 4. Illustrative Numerical Examples Figure 1 shows the sample network used in our study. Let the network have full wavelength-conversion capability. For illustration purposes, availability of each link is a pre-assigned value (99%, 99.9%, or 99.99%); and cost of any link is unity. There are 1000 requests, randomly generated and uniformly distributed among all node pairs. Availability requirements of connection requests are uniformly distributed among five classes: 98%, 99%, 99.5%, 99.7%, and 99.9% (Class I to Class V). Table 1 compares performance of different provisioning schemes in terms of number of wavelength channels needed (W), connection availability satisfaction rate (ASR), and total wavelength-links (W-Links). W is equal to minimal number of wavelength channels through which the network can carry all connection requests. ASR represents fraction of connections whose availability requirements have been satisfied. W- Links denotes total number of consumed wavelength fiber links, which is optimized according to value of W in each ILP scheme. Schemes I, II, and III in Table 1 are ILP-based approaches. In Scheme I, all connections are provisioned without any protection; in Scheme II, all connections are provisioned with 1+1 protection; and network resources are optimized without any connection-availability consideration in both schemes. In Scheme III, connections are first classified into T 1 and T 2 groups. Connections of T 1 are provisioned using ILP approach in Section 3.2. Connections of T 2 are provisioned using an approximation approach [3]. We observe from Table 1 that Scheme I consumes least amount of resource but only provides 30.2% ASR. Scheme II can significantly improve ASR by providing 1+1 protection to all connections; however, it also consumes a large amount of resources. Through connection classification and traffic optimization, Scheme III jointly optimizes ASR and resource usage. It uses fewer wavelength-channels and around 17% less W- Links compared to Scheme II, and provides 99.9% ASR. Table 1 also shows performance of heuristics without sharing. All heuristics can provide 100% ASR because the route for request t is selected from S t, in which all routes can satisfy availability requirement of t. Note that Iteratively-select uses least amount of resources in both W and W-Links compared to other heuristics and its performance is comparable to that of Scheme III. This is because, in Iteratively-select, either W or W-Links will be reduced whenever replacing a request's current route by a new one. Figures 2 and 3 show results of heuristics without sharing for four different traffic distributions - Class I: Class II: Class III: Class IV: Class V = 2:2:2:2:2, 1:1:2:2:4, 4:2:2:1:1, and 1:2:4:2:1 (distributions 1 through 4, respectively). In both figures, observe that Iteratively-select consistently demonstrates better performance than other heuristics; and performance of Most-reliable is worst over all distributions since highly-reliable route is chosen while sacrificing resources. Notice that, in the third distribution, there are more requests with low availability requirement than those in other distributions. In this case, more requests can be provisioned by using a single route; consequently, the third traffic distribution utilizes less resource compared to other distributions (see Figs. 2 and 3). Figure 4 compares performance of heuristics with and without sharing for traffic distribution 1. Observe that resource-sharing further reduces wavelength-links used in all heuristics (number of wavelengths used is also reduced although not shown here). We find that around 45% requests are unprotected, 30% are dedicated protected, and 25% are shared protected in all heuristics. This percentage varies when traffic distribution changes. Note that resource sharing is achieved without scarifying service reliability. To conclude, our results indicate that our proposed provisioning framework can help network operators to differentiate network services, improve service reliabilities, and optimize resource efficiency.

4 References [1] M. Clouqueur and W. D. Grover, "Availability analysis of span-restorable mesh networks," IEEE J. on Selected Areas in Communications, vol. 20, no. 4, pp , May [2] K. C. Chu, M. Mezhoudi, and Y. Hu, "Comprehensive end-to-end reliability assessment of optical network transports, " Proc., OFC'2002, pp , March [3] J. Zhang, K. Zhu, H. Zang, and B. Mukherjee, "A new provisioning framework to provide availability-guaranteed service in WDM mesh networks," Technical Report No. CSE , CS Dept., UC Davis, Sept W ASR W-Links Scheme I Scheme II Scheme III Iteratively-select Most-reliable Just-above-threshold Minimal-cost Figure 1: Sample network topology. Table 1: Results from ILP formulations and heuristic algorithms.

5 Iteratively-select Most-reliable Just-above-threshold Minimal-cost Iteratively-select Most-reliable Just-above-threshold Minimal-cost Number of Wavelengths Traffic Distributions Number of Wavelength-Links Traffic Distributions Figure 2: Number of wavelength channels used by heuristic algorithms (without sharing) with different traffic distributions. Figure 3: Number of wavelength-links used by heuristic algorithms (without sharing) with different traffic distributions. without sharing with sharing Number of Wavelength-Links Heuristics Figure 4: Number of wavelength-links used by heuristics (Iteratively-select, Most-reliable, Just-above-threshold, Minimal-cost, illustrated as heuristics 1 through 4, respectively) with and without resource sharing.

Network Protection with Multiple Availability Guarantees

Network Protection with Multiple Availability Guarantees Network Protection with Multiple Availability Guarantees Greg Kuperman MIT LIDS Cambridge, MA 02139 [email protected] Eytan Modiano MIT LIDS Cambridge, MA 02139 [email protected] Aradhana Narula-Tam MIT Lincoln

More information

LOAD BALANCING IN WDM NETWORKS THROUGH DYNAMIC ROUTE CHANGES

LOAD BALANCING IN WDM NETWORKS THROUGH DYNAMIC ROUTE CHANGES LOAD BALANCING IN WDM NETWORKS THROUGH DYNAMIC ROUTE CHANGES S.Ramanathan 1, G.Karthik 1, Ms.G.Sumathi 2 1 Dept. of computer science Sri Venkateswara College of engineering, Sriperumbudur, 602 105. 2 Asst.professor,

More information

Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information

Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information 1 Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information Hungjen Wang, Eytan Modiano, Muriel Médard Abstract Path protection and link protection schemes are the main

More information

Dynamic Establishment of All-Optical Connections in Wavelength-Routed Optical Networks Using Genetic Algorithms

Dynamic Establishment of All-Optical Connections in Wavelength-Routed Optical Networks Using Genetic Algorithms D. Bisbal, F. González, I. de Miguel, J. Blas, J. C. Aguado, P. Fernández, R. M. Lorenzo, E. J. Abril, M. López, Dynamic establishment of alloptical connections in wavelength-routed optical networks using

More information

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information

Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information Hungjen Wang, Eytan Modiano, Muriel Médard Laboratory for Information and Decision Systems Massachusetts Institute

More information

Optical Layer Monitoring Schemes for Fast Link Failure Localization in All-Optical Networks

Optical Layer Monitoring Schemes for Fast Link Failure Localization in All-Optical Networks Optical Layer Monitoring Schemes for Fast Link Failure Localization in All-Optical Networks Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Abstract Optical layer monitoring and

More information

Performance advantages of resource sharing in polymorphic optical networks

Performance advantages of resource sharing in polymorphic optical networks R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference

More information

Policy-Based Fault Management for Integrating IP over Optical Networks

Policy-Based Fault Management for Integrating IP over Optical Networks Policy-Based Fault Management for Integrating IP over Optical Networks Cláudio Carvalho 1, Edmundo Madeira 1, Fábio Verdi 2, and Maurício Magalhães 2 1 Institute of Computing (IC-UNICAMP) 13084-971 Campinas,

More information

Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE

Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE 568 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE Abstract MPLS recovery

More information

A Software Architecture for a Photonic Network Planning Tool

A Software Architecture for a Photonic Network Planning Tool A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart

More information

Capacity Allocation and Contention Resolution in a Photonic Slot Routing All-Optical WDM Mesh Network

Capacity Allocation and Contention Resolution in a Photonic Slot Routing All-Optical WDM Mesh Network Capacity Allocation and Contention Resolution in a Photonic Slot Routing All-Optical WDM Mesh Network Hui Zang, Jason P. Jue 2, and Biswanath Mukherjee Department of Computer Science, University of California,

More information

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video

More information

Path Selection Methods for Localized Quality of Service Routing

Path Selection Methods for Localized Quality of Service Routing Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service

More information

Application-Aware Protection in DWDM Optical Networks

Application-Aware Protection in DWDM Optical Networks Application-Aware Protection in DWDM Optical Networks Hamza Drid, Bernard Cousin, Nasir Ghani To cite this version: Hamza Drid, Bernard Cousin, Nasir Ghani. Application-Aware Protection in DWDM Optical

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

How To Set Up A Network On A Wdm Network

How To Set Up A Network On A Wdm Network Instituto de Engenharia de Sistemas e Computadores de Coimbra Institute of Systems Engineering and Computers INESC - Coimbra Carlos Simões, Teresa Gomes, José Craveirinha, and João Clímaco A Bi-Objective

More information

A Quality of Service Scheduling Technique for Optical LANs

A Quality of Service Scheduling Technique for Optical LANs A Quality of Service Scheduling Technique for Optical LANs Panagiotis G. Sarigiannidis, Member, IEEE, Sophia G. Petridou, Member, IEEE, Georgios I. Papadimitriou, Senior Member, IEEE Department of Informatics

More information

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA

More information

End-to-End Dedicated Protection in Multi-Segment Optical Networks

End-to-End Dedicated Protection in Multi-Segment Optical Networks End-to-End Dedicated Protection in Multi-Segment Optical Networks Srinivasan Seetharaman, Admela Jukan and Mostafa Ammar Georgia Institute of Technology, Atlanta, GA Email: {srini, ajukan, ammar}@cc.gatech.edu

More information

Dynamic Load Balancing in WDM Packet Networks With and Without Wavelength Constraints

Dynamic Load Balancing in WDM Packet Networks With and Without Wavelength Constraints 1972 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 10, OCTOBER 2000 Dynamic Load Balancing in WDM Packet Networks With and Without Wavelength Constraints Aradhana Narula-Tam and Eytan

More information

Multiple Layer Traffic Engineering in NTT Network Service

Multiple Layer Traffic Engineering in NTT Network Service Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service

More information

TCP and UDP Performance for Internet over Optical Packet-Switched Networks

TCP and UDP Performance for Internet over Optical Packet-Switched Networks TCP and UDP Performance for Internet over Optical Packet-Switched Networks Jingyi He S-H Gary Chan Department of Electrical and Electronic Engineering Department of Computer Science Hong Kong University

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

How To Balance Network Load In A Wireless Sensor Network

How To Balance Network Load In A Wireless Sensor Network Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : [email protected],

More information

Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks

Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks David Coudert, Napoleão Nepomuceno, Hervé Rivano Projet Mascotte, I3S(CNRS-UNSA) INRIA Réunion Mascotte, March 2009 MASCOTTE

More information

Shared Backup Network Provision for Virtual Network Embedding

Shared Backup Network Provision for Virtual Network Embedding Shared Backup Network Provision for Virtual Network Embedding Tao Guo, Ning Wang, Klaus Moessner, and Rahim Tafazolli Centre for Communication Systems Research, University of Surrey Guildford, GU2 7XH,

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Design of Light-Tree Based Optical Inter-Datacenter Networks

Design of Light-Tree Based Optical Inter-Datacenter Networks Lin et al. VOL. 5, NO. 12/DECEMBER 2013/J. OPT. COMMUN. NETW. 1443 Design of Light-Tree Based Optical Inter-Datacenter Networks Rongping Lin, Moshe Zukerman, Gangxiang Shen, and Wen-De Zhong Abstract Nowadays,

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])

More information

Leveraging Multipath Routing and Traffic Grooming for an Efficient Load Balancing in Optical Networks

Leveraging Multipath Routing and Traffic Grooming for an Efficient Load Balancing in Optical Networks Leveraging ultipath Routing and Traffic Grooming for an Efficient Load Balancing in Optical Netorks Juliana de Santi, André C. Drummond* and Nelson L. S. da Fonseca University of Campinas, Brazil Email:

More information

Traceroute-Based Topology Inference without Network Coordinate Estimation

Traceroute-Based Topology Inference without Network Coordinate Estimation Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,

More information

Load Balancing in Structured Peer to Peer Systems

Load Balancing in Structured Peer to Peer Systems Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,

More information

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand

More information

Optical Network Traffic Control Algorithm under Variable Loop Delay: A Simulation Approach

Optical Network Traffic Control Algorithm under Variable Loop Delay: A Simulation Approach Int. J. Communications, Network and System Sciences, 2009, 7, 652-656 doi:10.4236/icns.2009.27074 Published Online October 2009 (http://www.scirp.org/ournal/icns/). Optical Network Traffic Control Algorithm

More information

Multiobjective Multicast Routing Algorithm

Multiobjective Multicast Routing Algorithm Multiobjective Multicast Routing Algorithm Jorge Crichigno, Benjamín Barán P. O. Box 9 - National University of Asunción Asunción Paraguay. Tel/Fax: (+9-) 89 {jcrichigno, bbaran}@cnc.una.py http://www.una.py

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Load balancing in a heterogeneous computer system by self-organizing Kohonen network

Load balancing in a heterogeneous computer system by self-organizing Kohonen network Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.

More information

An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks

An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 81 An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks Krishna Phani Gummadi, Madhavarapu

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]

More information

Virtual Network Topology Control with Oja and APEX Learning

Virtual Network Topology Control with Oja and APEX Learning Virtual Network Topology Control with Oja and Learning Y. Sinan Hanay, Yuki Koizumi, Shin ichi Arakawa and Masayuki Murata Graduate School of Information Sciences and Technology Osaka University Suita,

More information

Optimal Branch Exchange for Feeder Reconfiguration in Distribution Networks

Optimal Branch Exchange for Feeder Reconfiguration in Distribution Networks Optimal Branch Exchange for Feeder Reconfiguration in Distribution Networks Qiuyu Peng and Steven H. Low Engr. & App. Sci., Caltech, CA Abstract The feeder reconfiguration problem chooses the on/off status

More information

Performance Comparison of Protection Strategies in WDM Mesh Networks

Performance Comparison of Protection Strategies in WDM Mesh Networks Performance Comparison of Protection Strategies in WDM Mesh Networks Paper Hemant K. Singh, Shreya Aggarwal, Satendra Singh, Baibaswata Mohapatra, Rajendra K. Nagaria, and Sudarshan Tiwari Abstract Recent

More information

An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation

An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation 1 An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation Xiaomin Chen, Yuesheng Zhong, Admela Jukan Technische Universität Carolo-Wilhelmina zu Braunschweig Email: [email protected],[email protected],

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, [email protected]; Lili Qiu, Department of Computer Science, The Univ of

More information

Fast Heuristic Algorithm for Joint Topology Design and Load Balancing in FSO Networks

Fast Heuristic Algorithm for Joint Topology Design and Load Balancing in FSO Networks Fast Algorithm for Joint Topology Design and Load Balancing in FSO Networs In Keun Son and Shiwen Mao Department of Electrical and Computer Engineering, Auburn University, Auburn, AL Email: [email protected],

More information

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor [email protected] Abstract.

More information

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

Fig.1 PON Market View Architecture. Fig.2 EPON Bandwidth Access Methods

Fig.1 PON Market View Architecture. Fig.2 EPON Bandwidth Access Methods Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs) N. Moradpoor, G. Parr, S. McClean, B. Scotney and K. Sivalingam (IIT. Madras) India-UK

More information

Preserving Message Integrity in Dynamic Process Migration

Preserving Message Integrity in Dynamic Process Migration Preserving Message Integrity in Dynamic Process Migration E. Heymann, F. Tinetti, E. Luque Universidad Autónoma de Barcelona Departamento de Informática 8193 - Bellaterra, Barcelona, Spain e-mail: [email protected]

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

This paper introduces a new method for shift scheduling in multiskill call centers. The method consists of

This paper introduces a new method for shift scheduling in multiskill call centers. The method consists of MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol. 10, No. 3, Summer 2008, pp. 411 420 issn 1523-4614 eissn 1526-5498 08 1003 0411 informs doi 10.1287/msom.1070.0172 2008 INFORMS Simple Methods for Shift

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: [email protected] Illsoo Sohn Email: [email protected] Kwang Bok Lee Email: [email protected] Abstract

More information

Joint Optimization of Monitor Location and Network Anomaly Detection

Joint Optimization of Monitor Location and Network Anomaly Detection Joint Optimization of Monitor Location and Network Anomaly Detection Emna Salhi, Samer Lahoud, Bernard Cousin ATNET Research Team, IRISA University of Rennes I, France {emna.salhi, samer.lahoud, bernard.cousin}@irisa.fr

More information

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

What Applications Can be Deployed with Software Defined Elastic Optical Networks?

What Applications Can be Deployed with Software Defined Elastic Optical Networks? What Applications Can be Deployed with Software Defined Elastic Optical Networks? Yongli Zhao State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications

More information

OPNET SP GURU TRANSPORT PLANNER GRADUATE PROJECT WAN/ LAN PLANNIG AND DESIGN

OPNET SP GURU TRANSPORT PLANNER GRADUATE PROJECT WAN/ LAN PLANNIG AND DESIGN OPNET SP GURU TRANSPORT PLANNER GRADUATE PROJECT WAN/ LAN PLANNIG AND DESIGN ROHIT KARHU DATE 04/29/2013 TABLE OF CONTENTS 1. INTRODUCTION... 3 2. SCENARIO'S... 4 3. DESIGN... 5 4. TOPOLOGIES (UNPROTECTED)...

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

MAPPING OF ARBITRARY TRAFFIC DEMAND AND NETWORK TOPOLOGY ON A MESH OF RINGS NETWORK

MAPPING OF ARBITRARY TRAFFIC DEMAND AND NETWORK TOPOLOGY ON A MESH OF RINGS NETWORK MAPPING OF ARBITRARY TRAFFIC DEMAND AND NETWORK TOPOLOGY ON A MESH OF RINGS NETWORK Christian Mauz Communication Technology Laboratory ETH Zurich Switzerland [email protected] Abstract An efficient

More information