Comparison Analysis of Recovery Mechanism at MPLS Network
|
|
|
- Adele Harris
- 10 years ago
- Views:
Transcription
1 International Journal of Electrical and Computer Engineering (IJECE) Vol.1, No.2, December 2011, pp. 151~160 ISSN: Comparison Analysis of Recovery Mechanism at MPLS Network Mohammad Yanuar Hariyawan Politeknik Caltex Riau Jl. Umbansari 1, Rumbai, Pekanbaru, Riau, Abstract Multi-protocol Label Switching (MPLS) has become an attractive technology of choice for Internet backbone service providers. MPLS features the ability to perform traffic engineering and provides support for Quality of Service traffic provisioning. To deliver reliable service, MPLS requires a set of procedures to provide protection for the traffic carried on Label Switched Paths (LSP). In this case Lable Switched Routers (LSR) supports recovery mechanism when failure happened in the network.this paper studied about performance from usage of different techniques that can be used to reroute traffic faster then the current IP rerouting methods in the case of a failure in a network. Local rerouting, Fast Reroute one to one backs up, Haskin, PSL oriented path protection and 1+1 path protection recovery mechanism was compared by given of aggregate traffic which has self-similarity character. Packet drop, rejection probability, recovery time, service disruption time and pre-reserved resources backup will be made as comparator parameter with various bitrate and different position of link failure. Packet loss, rejection probability, recovery time and service disruption time at five recovery mechanisms influenced by position of link failure to ingress. 1+1 path protection mechanism has least packet drop, but costliest way to do recovery in the case of usage resources, as traffic is sent simultaneously in two paths which disjoint. Fast Reroute one to one backup is quickest way to operate protection switching recovery after 1+1 path protection mechanism. Keywords: MPLS, recovery, rerouting, self-similar traffic, protection switching 1. Introduction In the globalization era, the speed and quality of service in communication becomes an important factor. Some sources in the network may have failed. To provide high availibility appropriate network, network providers must be able to predict and plan for this failure. Link failure is a common cause service interruption in computer networks. When the channel on the network fails, all communication channels that fail to use it to temporarily be interrupted. When done in handling low-level communication layer, rerouting can be done quickly but are expensive because it requires additional hardware. On the other hand, it is possible to reroute traffic at a higher layer using software mechanisms, but results are slow. Internet is a datagram packet switching network where data is carried in IP packets. Multiprotocol Label Switching (MPLS) carry IP packets through a virtual circuit, which combines the advantages datagram packet switching and virtual circuit switching to meet the need for reliability, speed and efficiency in handling link failures. In terms of handling damage to the network, MPLS network has a method of protection against traffic, where the method of protection is part of the quality of services provided MPLS to provide certainty in the validity of transmitted data. The ability of a network protection in MPLS-TE requires recovery mechanisms to handle failure will occur so that the rate of traffic in fixed networks can be done without losing traffic data to be transmitted. Some recovery mechanism [1], [2], [3], [4], [5], [6], [7] has been developed to overcome the problem of sending data packets through the MPLS network, including the local rerouting [1], Haskin [6], Fast Reroute one-toone backup [3], [7], 1 +1 path protection [5] and the Path Switch LSR-Oriented Path protection [2], [3]. Each technique has advantages and disadvantages for each development priority on certain parameters. If the speed of recovery be given top priority, then the model of protection switching was to be used, while if the network efficiency less advanced than the speed for any reason, then the rerouting model with the scope of local recovery into a fairly logical choice for service providers. Some comparative analysis [8], [9], [10], [11], [20],[22],[23], have been made to see performance of recovery mechanisms in MPLS networks using a single source that has a constant bit rate (CBR). This paper will analyze comparative performance of Local Rerouting mechanism, Haskin, Fast Reroute One-to-One Backup, 1 +1 path protection and the Path Switch LSR-Oriented Path protection by giving aggregate traffic which has self-similarity character, using comparison criteria: Packet loss during recovery process Packets discarded by the router or lost when the way to the destination. Measurement of packet loss is used as a parameter reliability comparison. Rejection probability Rejection probability is the probability of a data packet having dropped when sent from source to destination. Service disruption time Received Sep 6 th, 2011; Revised Nov 11 th, 2011; Accepted Nov 21 th, 2011
2 152 ISSN: Long service interruption is the time between the last bit transmitted before the failure occurred and the event is received when the first bit of data using a back up the path to the receiver, is used as a parameter of the speed ratio. Recovery time Recovery time is the time it takes the backup path for the active and start carrying packets of data after the failure. Recovery time also marks the time between failure detection and the time when the packet is passed through the backup LSP. The calculation is done by comparing the recovery time between the time when a link failure occurs until the recovery process is completed. Mark with the transfer of packets from an upstream node that detects a link failure to the backup path that has been provided. Pre-reserved resources Total resources available for backup traffic on the network before the failure occurred. 2. Research Method Recovery mechanism simulation will be done by using the Network Simulator (NS) 2.26 version with MPLS Network Simulator (MNS). This simulation involves several stages: a. Aggregate traffic source modelling yielding pattern self-similar with clauses of parameter value hurst : b. MPLS network modelling c. Scheme of simulation Local Rerouting, Fastreroute One-to-One Backup, Haskin, 1+1 path protection, PSL- Oriented Path protection d. Giving of additional traffic at network MPLS Aggregate Traffic Source Modeling Self Similar traffic generated by performing aggregation of a number of sources, where each source release package with a fixed size, while the probability of occurrence time of these packages follow a Pareto distribution [18], where the variables contained there in is the shape parameter (α ), can be seen in Figure 1. Three variables that can affect characteristics of traffic generated, among others, shape parameters, the number of source and size of the package at [19] concluded that the addition of the source does not eliminate the bursty nature of self-similar traffic, therefore it is not absolutely require a large amount of source, design of traffic source used 15 sources. Shape parameter Changing shape parameter affects the shape of the resulting Pareto distribution, generally will affect mean and variance. There is a relationship between shape parameter and the Hurst parameter, namely: H = (3-α)/2 (1) Self-similar traffic has a Hurst parameter value requirements: 2 1. To meet these requirements, then the shape parameter 1 2 value ranges. Based on research that has been done [19], stated that traffic would have self-similar characteristic if has By looking at the equation of the relationship between shape parameter and the Hurst parameter (eq. 1), then the design of self-similar traffic source will be used an alpha value of 1.2 to produce H of 0.9. Figure 1. Aggregate Traffic Generation Topology IJECE Vol. 1, No.2, December 2011 :
3 IJECE ISSN: Number of Source Theoretically, the number of sources will affect self-similar bursty characteristic. The design of aggregate traffic sources will be used 15 sources, based on [19] Scheme of Recovery Mechanism Simulation at MPLS Network Mechanism simulationof Local Rerouting, Fast Reroute One-to-One Backup, Haskin, 1+1 Path Protection and PSL-Oriented Path Protection simulation by using network simulator version 2.26 has been installed MNS module is comprising modules MPLS using LDP and CR-LDP. Figure 2. Network Topology Partial mesh topology used to simulate the performance of recovery in MPLS as shown in Figure 2, where there are several MPLS routers that are connected to each other and there is also a normal IP router as the agent sender and receiver package Recovery Local Rerouting Mechanism Design Local rerouting is rerouting mechanism with a combination of local repair model [17]. Recovery LSP will be set up dynamically when there is fault on the LSP. Each LSR has the ability to detect errors ranging from up to form a new LSP. As was explained earlier that the rerouting model has the advantage of saving network resources but lacking in speed recovery, and that's why local rerouting mechanism is developed, to minimize recovery time by giving them the ability on each LSR to be able to quickly establish itself after the recovery LSP detected a fault, Figure 3 explains Local Rerouting mechanism. Figure 3. Local Rerouting Mechanisme [17] At local rerouting mechanism use simple-dynamic" routing model, meaning that from the beginning there was no formation of LSP for backup purposes, but dynamically. In the event of fault on the working LSP, the LSR that detect it (LSR upstream) will soon run the algorithm to find the shortest route from the leading to the egress LSR and then put the traffic from the working LSP to the new route, if the fault occurs on link 3-4, the protection given on LSR3. MPLS LSR will also enable the flow protection with intervals 0.01 seconds toward node Recovery Fastreroute One-to-One Backup Mechanism Design Fastreroute One-to-One Backup is a process whereby data recovery in MPLS networks can be directly transferred to the backup path without requiring the signaling process when the failure occurs [5]. No such protection switching, where it is the repair point is failure detection point. So there is no requirement to notify an error or disturbance to the repair point by using the signaling protocol. Figure 4 describes the Fastreroute One-to- One Backup mechanism. Fastreroute one-to-one mechanism back-up, uses dynamic routing protocols Distance Vector in simulation. This protocol will be used in the transfer of information between LSRs for updating to each other its routing table and make the process of transferring traffic if the recovery process have been accomplished. Initial process of the simulation is establish network topology including nodes, links, and the agent which used, then each agent such as UDP and IP routing will have to initialize. In handling a link failure that occurred on the network, then established an alternative route as a backup that will transfer data packets from the LSP which face a link failure, go back to the Comparison Analysis of Recovery Mechanism at MPLS Network (Mohammad Yanuar Hariyawan)
4 154 ISSN: LSP in different paths, in order to be sent back toward the destination. This alternative path is formed at each node that is on the LSP (One-to-One Backup) to overcome every possible link failure will happen in all the links on the LSP. Figure 4. Detour Fastreroute One-to-One Backup [5] 3.3. Haskin Mechanism Design Haskin mechanism is a method to do setting-up alternative LSP in handling fast rerouting traffic, at the time of the happening of failure in working LSP MPLS network [6]. Since it provide mechanism of protection fast rerouting, hence LSP alternative is made before the happening of failure. Figure 5. Haskin Recovery Mechanisme [17] At Haskin mechanism, method applied based on global of repair where protection of network is done in end-to-end by using protection switching method. Protection switching is a form of protection building recovery path before the happening of failure at working path. On the happening of failure at LSR, data package will be returned to part of ingress LSR applies reverse LSP. Ingress LSR will look for path to return to through alternative LSP as data delivery route, as shown in Error! Reference source not found.. Initial process in implementing simulation of this recovery equal to mechanism process before all is forming of network topologies covering node, link, and agent applied. Then each agent like UDP and protocol routing will do inisialisation. Message request sent from ingress LSR towards egress LSR. After the request message sent is received by the egress LSR, the egress LSR will send a reply to the ingress LSR which contains important information that will be delivered to each node that dialuinya as well as the information required in the establishment of an LSP PSL-Oriented Path Protection Mechanism Design PSL-Oriented Mechanism Path Protection was developed to support the 1:1 path protection mechanism is a mechanism whereby in normal condition, protected traffic passing through the working path will be moved to a recovery path when a fault occurs on the working path [20]. Switching action is performed by the PSL, and therefore this mechanism is also referred to as the PSL-oriented. Established recovery path is not specified as a backup, but still available for traffic with low priority. Protected traffic moved to the recovery path will occupy the low-priority traffic found on the recovery path. This method is slightly improved efficiency in resource usage, Figure 6 shows the mechanism of PSL-Oriented Path Protection. Procedure PSL-Oriented Path mechanism, similar protection with other recovery mechanisms procedures and the establishment of an MPLS LSP and additional modules have in common, which distinguishes it from others that is in the process of transferring traffic to the recovery LSP. When the PSL has received FIS is working LSP stated fault so that the process of moving traffic to the recovery LSP is immediately run. The procedure is called by functions that have been applied to the LDP agent for the case of FIS reception by a node. Type of recovery mechanism used is 'notify-prenegotiated' means that do is a notification signal transmission mechanism FIS and the IJECE Vol. 1, No.2, December 2011 :
5 IJECE ISSN: process of moving traffic from the working LSP to the recovery LSP. 'Notify-prenegotiated' is used for the case of fault on the links 2-3, 3-4, and 5-11, while for the case of fault on link 1-2 does not require the same mechanism as LSR1 is a PSL that does not require notification process again. Therefore, for the case of fault on link 1-2 notifyprenegotiated should be replaced with drop. Figure 6. PSL-Oriented Path Protection Mechanisme As with other mechanisms, initiall procedure is the process of formation of the working LSP, then the establishment of LSP recovery, after the occurrence of a fault in one of the links on the working LSP. Establishment of working LSP begins with a label-request process where LSR1 or ingress will send a signal LDP for label-request to LSR11 or egress. After receiving the signal-ldp label request, immediately send the signal egress LDP for labelmapping to the ingress where its function is to map the labels on each LSR that will be passed by the packages will use the working LSP. The second is the formation process of recovery LSPs are disjoint to the working LSPs. After receive the label request, the egress to do a label-mapping by sending a signal back through the LSR LDP. Thus has prepared a working LSP and backup when a fault current occurs on the working LSP Path Protection Mechanism Design The purpose of the use of path protection, or specifically in the 1 +1 path protection is to protect the working path of destruction a link or node on that path [1]. Because in this scheme a recovery path made a separate (not connected) with the protected working path, so if there is damage to either the node or link on the working path will not affect the employment recovery path, as shown in Figure 7. Figure 7. Recovery 1+1 Path protection Mechanism [1] 1 +1 path protection mechanism procedure similar to other procedures for recovery mechanisms and the establishment of an MPLS LSP and additional modules have in common, except that in this mechanism was raised two times the aggregate traffic sources (2 x 15 sources = 30 sources). This is due to MPLS node in NS2 simulator does not support packet duplication function. In 1 +1 path protection mechanism is formed of two LSP (working path and backup path), where the second LSP will submit the package are identical to each other to the same destination. So when there is a failure on the working path line, the destination still receive data packets in their entirety. 3. Result and Discussion In the following section will discuss the comparison of different mechanisms in the and packet delivery rate is different. Comparison Analysis of Recovery Mechanism at MPLS Network (Mohammad Yanuar Hariyawan)
6 156 ISSN: Packet Drop Comparison of packet drop in five mechanisms can be seen in Figure 8, the mechanism of 1 +1 path protection, traffic on the working path has a duplicate of which is always sent through the path to recovery regardless of whether an interruption in the delivery of traffic on the working path or not. With these conditions, then the packet drop in this mechanism does not indicate the number of packets discarded in the working path for any damage, because traffic on the working path is not protected by this recovery mechanism. Figure 8. Comparison of packet drop at the five mechanisms Packet data on the working path will be left is wasted because it already has a duplicate traffic sent through other channels that are not affected by damage to the link on the working path. Packages that are ignored by the receiver when not working path of damage was also not included in the category of packet drop. These packages are not categorized as a packet drop due to the loss of the package does not affect the reception of information by the receiver. On the local rerouting mechanism the packet drop tends to increase at the location of the link fault is increasingly distant from the ingress, while the Fast Reroute mechanisms drop packets at all positions relative link has the same amount, it is in because of the lack of backup path calculation mechanism to find the shortest path toward the egress LSR. In Haskin mechanism does not form a specific pattern in the packet being dropped, but the link failure has the most distant from the ingress packet drop at most. The amount of packet drop in the mechanism of PSL-Oriented Path Protection tended increasingly to the location of the link failure is increasingly distant from the PSL. This is caused by the FIS to be sent back to the PSL before traffic can be routed to the recovery LSP, so that the location of the link fault is increasingly distant from the PSL, the FIS delivery process will stay longer and cause more and more packets are still delivered on the working LSP before it is transferred to the recovery LSP Rejection Probability Rejection probability is the probability of a data packet having dropped when sent from source to destination. In the fifth recovery mechanism (can be seen in Figure 9), rejection probability does not form a specific pattern in cases where a link failure occurs, but tends to rise when a link failure away from the ingress. Rejection probability depends on the number of packets sent and the number of packets dropped, while the number of packets generated in each simulation is different, this will affect the number of packets dropped. PSL oriented on average have the highest probability of rejection at any rate that is used compared to other mechanisms. While the mechanism of 1 +1 path protection has 0% probability for all packets received at the destination. Figure 9. Comparison of rejection probability at the five mechanisms IJECE Vol. 1, No.2, December 2011 :
7 IJECE ISSN: Figure 10. Comparison of the service disruption time in the five mechanisms 3.3. Service Disruption Time Service disruption times, is the length of time of the package that arrived at the destination node is calculated based on the difference of time from last packet entering the destination node after a link failure occurs until the first packet into the destination node after recovery mechanism is complete. Basically the service disruption time calculation was done in order to see how long it took the arrival of the packet back to the destination node after an interruption in the network. In applications that are real time, such as voice applications over IP (VoIP) and video transmission, the time of this disturbance can only be tolerated for much less than 60 ms [5], so between the two mechanisms are compared in the task of recovery this end, it is known recovery mechanisms which are capable of serving applications that are real time. Figure 10 shows the rejection probability of the five mechanisms. In the Fast Reroute service disruption time is relatively constant as the node that detects a failure of nodes to switch traffic to the backup path and not take time to set up the backup path before failure occurs. Service disruption time on the PSL mechanism oreiented Haskin and will increase for both models when the link failure away from the ingress node, this is due to FIS or reversed traffic should be sent upstream to the ingress before it can be routed to the global recovery path, these results also occur when the MPLS network is loaded with CBR[8], [9], [10], [11], [21]. In 1 +1 path protection is needed the most rapid recovery compared with other mechanisms, where the average time required by s. The amount of service disruption time on a 1 +1 path protection is a time interval of receipt of successive packets from the working path and the recovery path, so that wherever the location of the damage link has same time, succesive packets interval from the working path and the recovery path will remain. Service disruption time on the Local Reroute mechanisms will decrease when a link failure occurs away from the ingress node, with different Haskin mechanisms and PSL oriented, this is due to the mechanism of local route, the distance between the site of a link failure with the destination node is very influential. Closer distance between the site of a link failure to the egress LSR mean length of backup paths are also shorter, then the recovery process is done faster Recovery Time The calculation is done by comparing the recovery time between the time when a link failure occurs until the recovery process was completed, which is marked by the transfer of packets from an upstream node that detects a link failure to the backup path that has been provided. Local rerouting requires an average recovery time is longer than the other mechanisms. On the Fast Reroute and Haskin mechanism, recovery time was not influenced by the, whereas the other mechanisms recovery time influenced by the position where the link failure occurs,, these results are similar when the MPLS network is loaded with CBR [8], [9], [10], [11], [21]. On the local rerouting and 1+1 path protection mechanism, when a link failure recovery time away from the ingress will increase, while during the recovery mechanism PSL oriented path protection, when link failure close to the ingress, then the recovery time needed will be more rapid. This is caused by the FIS to be sent back to the PSL, so that the location of the link fault is increasingly distant from the PSL, the FIS delivery process will stay longer. But the recovery time required by the three mechanisms above is still much faster recovery time period required by the mechanism of Fast Reroute and Haskin mechanism. In the Fast Reroute One to One Backup and Haskin mechanisms, recovery time is not affected where the occurs and both have almost the same recovery time of about seconds, Fast Reroute mechanism requires an average recovery time of about seconds, while the Haskin mechanism requires average recovery time of about seconds. Figure 11 shows the comparison of the five recovery mechanism. For CBR load, Haskin mechanism [8] need recovery time about seconds and Fast Reroute One to One Backup mechanism [9] about seconds. Comparison Analysis of Recovery Mechanism at MPLS Network (Mohammad Yanuar Hariyawan)
8 158 ISSN: Figure 11 Comparison of recovery time from the five mechanisms 3.5. Pre-reserved Resources Backup Figure 2.11 shows the amount of resources reserved for backup traffic on the network before the failure occurred. Local rerouting model setup the backup path on demand after the failure occurred. Fast rereoute one to one backup requires ten global resources reserved for backup paths. Haskin requires six global resources for backup paths and three reversed path, with a total ten resources reserved. PSL oriented path protection and 1 +1 path protection takes 6 reserved backups. The number of reserved resources depends on the topology of the network. Haskin and PSL oriented path protection depends on both the global recovery path, Haskin will always require more resources than the PSL oriented path protection because of the Haskin requires reverse backup path in addition to the global recovery path. Resources Back Up Local Reroute Fast reroute One to One Back Up Haskin Revcovery Mechanisms PSL Oriented Path Protection Figure 12. Pre-reserved Backup Resources 1+1 Path Protection From the results of discussions which have been carried out on all the mechanisms and performance parameters, obtained results on performance comparison table mechanism which can be seen in Table Conclusion Self-similar traffic, can be generated using aggregate traffic consisting of 15 distributed pareto traffic source with α=1.2, which produces an average Hurst parameter Rerouting mechanism will have the service disruption time is higher than the protection switching, since the time rerouting path computation and path setup and this is not needed on protection switching. The mechanisms that have the least service disruption time is 1 +1 path protection. With this mechanism, failure notification, the calculation of the recovery path or recovery path setup is not required. Fast Reroute one to one backup is the fastest way to perform the protection switching operation recovery after a 1 +1 path protection mechanism and more possible to be realized. Pre-reserved resources become attention when protection switching is used, because rerouting is not provided for a number of resources before starting the recovery process. Rerouting is the best option in terms of the use of pre-reserved resources. For high priority traffic, protection switching is the best mechanism to use. The quickest way to recovery with the fewest dropped packets on the network is through protection switching with 1+1 protection, but this approach is the most expensive way to do recovery in the use of resources, when the flow of traffic are sent simultaneously on two IJECE Vol. 1, No.2, December 2011 :
9 IJECE ISSN: disjoint paths. Haskin and Fast Reroute mechanism requires the which is briefest recovery time if it is compared to other mechanisms and does not depend on position of link failure. Refferences [1] Ahn G, et al., An efficient rerouting scheme for MPLS-Based Recovery and its Performance Evaluation, Telecommunication Systems, , [2] Owens, et al., A path protection/restoration mechanism for MPLS networks, Internet Draft, 2001 [3] Huang C et al., Building reliable mpls networks using a path protection mechanism, Communications Magazine, IEEE, 40(3): , [4] Pan P, et al., A. Fast Reroute Extensions to RSVP-TE for LSP Tunnels, Internet Draft, draft-ietf-mpls-rsvp-lspfastreroute-06.txt [5] Harrison, E, Protection and Restoration in MPLS Network, Data Connection White Paper [6] Haskin, D. and Krishnan, R, A Method for Setting an Alternative Label Switched Paths to Handle Fast Rerouter, Draft- Haskin-mpls-fast-reroute-05.txt [7] Nagarajan, et al., A packet 1+1 path protection service for MPLS networks, IETF Internet Draft [8] Afrinaldi, Z, Penggunaan Mekanisme Recovery Haskin pada Jaringan MPLS, Final Project, Surabaya: Teknik Telekomunikasi Multimedia, Teknik Elektro, Institut Teknologi Sepuluh Nopember; [9] Heriansyah, D, Penggunaan Mekanisme Recovery Fast Reoute One to One Backup pada Jaringan MPLS, Surabaya:Teknik Telekomunikasi Multimedia, Teknik Elektro, Institut Teknologi Sepuluh Nopember;2006. [10] Nugroho, H, Penggunaan Mekanisme Recovery 1+1 Path protection pada Jaringan MPLS, Surabaya: Teknik Telekomunikasi Multimedia, Teknik Elektro, Institut Teknologi Sepuluh Nopember; [11] Setiawan, W, Penggunaan Mekanisme PSL Path protection pada Jaringan MPLS, Surabaya: Teknik Telekomunikasi Multimedia, Teknik Elektro, Institut Teknologi Sepuluh Nopember; [12] Rosen, E et al., Multiprotocol Label Switching Architecture, RFC3031, IETF [13] Kuhn, R, Sources of failure in the public switched telephone network, IEEE Computer [14] Network Strategy Partners, LLC. Reliable IP Nodes, A Prerequisite To Profitable IP Services, Whitepaper [15] Sharma, V. and Hellstrand, F, Framework for MPLS-Based Recovery, IETF RFC [16] Bartos, R. and Raman, M, A heuristic approach to service restoration in MPLS networks, IEEE International Conference on ommunications (ICC), Helsinki, Finland [17] Yoon, S, An efficient recovery mechanism for MPLS-based protection LSP, Joint 4th IEEE Internat. Conf. on ATM (ICATM), 75 79, [18] Crovella, M.E. and Bestavros, A. Self-similarity in world wide web traffic: evidence and possible causes, ACM SIGMETRICS 96, Philadelphia, USA, , [19] Setijadi, Eko, Rancang Bangun Pembebanan Trafik Self Similar pada Testbed Jaingan MPLS over IP di Jaringan Telekomunikasi Elektro ITS, Tesis. Surabaya: Institut Teknologi Sepuluh Nopember; [20] Banerjee, A.et al., Generalized multiprotocol label switching: An overview of routing and management enhancements, IEEE Communications Magazine, vol. 39, no. 1, , [21] Johan M.O. Petersson, MPLS Based Recovery Mechanisms, Master Thesis. Oslo: University of Oslo; 2005 [22] Yimin Qiu, et al., MPLS-based Network Fault Recovery Research, International Journal of Intelligent Engineering and Systems, Vol.3, No.4, [23] El Kamel Ali and Youssef Habib, An efficient hybrid recovery mechanism for MPLS-based networks, Computers and Communications IEEE Symposium, ISCC Bibliography of authors Mohammad Yanuar Hariyawan received Bachelor and Magister degrees in Telecommunication Multimedia from the Sepuluh Nopember Institute of Technology Surabaya, Indonesia, in 2001 and 2007 respectively. He is Lecturer and Member of Wireless Communication Research Group at Telecommunication Department, Polytechnic of Caltex Riau. Comparison Analysis of Recovery Mechanism at MPLS Network (Mohammad Yanuar Hariyawan)
10 International Journal of Electrical and Computer Engineering (IJECE) Vol.1, No.2, December 2011, pp. 151~160 ISSN: Table 1 Recovery Mechanism Comparison Table Parameter Packet Drop Local Reroute increases when the and the farther from the ingress. increases when there is additional traffic load Fastreroute One to One backup does not depend on the position of a link failure. increases when there is additional traffic load. Recovery Mechanism Haskin increases when the and the farther from the ingress. increases when there is additional traffic load. PSL Oriented Path Protection increases when the and the farther from the ingress. increases when there is additional traffic load. 1+1 path protection there is no packet drop Rejection Probability Service Disruption Time does not depend on the position of a link failure. decreases on the rate of 2000k and 2500k. increases when there is additional traffic load more rapidly when the the farther from the ingress, max = s, min = s does not depend on the position of a link failure. decreases on the rate of 2000k and 2500k. increases when there is additional traffic load does not depend on the, average of s does not depend on the position of a link failure. decreases on the rate of 2000k and 2500k. increases when there is additional traffic load more slowly when the position further away from the ingress link, max = s, min = s does not depend on the position of a link failure. decreasases on the rate of 2000k and 2500k. increases when there is additional traffic load more slowly when the position further away from the ingress link, max = s, min = s 0% because there is duplication of packets sent through a recovery path does not depend on the, an average of s Recovery Time more rapidly when the the farther from the ingress, max = s, min = s does not depend on the, an average of s does not depend on the, an average of s more slowly when the and the farther from the ingress, max = s, min s more rapidly when the the farther from the ingress, max = s, min = s Pre-reserved backup Received Sep 6 th, 2011; Revised Nov 11 th, 2011; Accepted Nov 21 th, 2011
Recovery Modeling in MPLS Networks
Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks
An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks Arunkumar C K M.Tech student, Dept. of ECE, Dayananda Sagar College of Engineering, VTU, Banglore, India ABSTRACT: Increasing demand
MPLS Part II - Recovery
MPLS Part II - Recovery Outline Introduction MPLS Recovery Framework MPLS Mechanism for Protection/Restoration Shared Backup LSP Restoration Fast reroute RSVP-TE Recovery A Heuristic Restoration Approach
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator
Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator Muhammad Kamran 1 and Adnan Noor Mian 2 Department of Computer Sciences, FAST- National University of Computer & Emerging Sciences,
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
A Hybrid Fault-Tolerant Algorithm for MPLS Networks
A Hybrid Fault-Tolerant Algorithm for MPLS Networks Maria Hadjiona, Chryssis Georgiou, Maria Papa, Vasos Vassiliou Department of Computer Science, University of Cyprus, CY 1678, Nicosia, Cyprus {cs02cm1,chryssis,cs03pm,vasosv}@cs.usy.ac.cy
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks
Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation
Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology
VoIP versus VoMPLS Performance Evaluation
www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Path Selection Analysis in MPLS Network Based on QoS
Cumhuriyet Üniversitesi Fen Fakültesi Fen Bilimleri Dergisi (CFD), Cilt:36, No: 6 Özel Sayı (2015) ISSN: 1300-1949 Cumhuriyet University Faculty of Science Science Journal (CSJ), Vol. 36, No: 6 Special
MPLS - A Choice of Signaling Protocol
www.ijcsi.org 289 MPLS - A Choice of Signaling Protocol Muhammad Asif 1, Zahid Farid 2, Muhammad Lal 3, Junaid Qayyum 4 1 Department of Information Technology and Media (ITM), Mid Sweden University Sundsvall
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON
PROTECTION ALGORITHMS FOR BANDWIDTH GUARANTEED CONNECTIONS IN MPLS NETWORKS WONG SHEK YOON (B.Eng.(Hons), NUS) A THESIS SUBMITTED FOR THE DEGREE OF MASTER OF ENGINEERING DEPARTMENT OF ELECTRICAL & COMPUTER
A Hybrid Fault-Tolerant Algorithm for MPLS Networks. Maria Hadjiona, Chryssis Georgiou, Maria Papa, Vasos Vassiliou. University of Cyprus
Technical Report A Hybrid Fault-Tolerant Algorithm for MPLS Networks Maria Hadjiona, Chryssis Georgiou, Maria Papa, Vasos Vassiliou University of Cyprus Computer Science Department TR 07 06 December 2007
MPLS Based Recovery Mechanisms
MPLS Based Recovery Mechanisms Master Thesis Johan Martin Olof Petersson UNIVERSITY OF OSLO May 2005 2 Foreword This thesis is part of my Candidatus Scientiarum studies in communication systems at the
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru
Analysis of Link Utilization in MPLS Enabled Network using OPNET IT Guru Anupkumar M Bongale Assistant Professor Department of CSE MIT, Manipal Nithin N Assistant Professor Department of CSE MIT, Manipal
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
MULTIPLE FAULT TOLERANCE IN MPLS NETWORK USING OPEN SOURCE NETWORK SIMULATOR
MULTIPLE FAULT TOLERANCE IN MPLS NETWORK USING OPEN SOURCE NETWORK SIMULATOR Muhammad Kamran FAST National University of Computer and Emerging Sciences, Lahore, Pakistan. [email protected] ABSTRACT Multiprotocol
Implementing VPN over MPLS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over
Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network
Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Zuo-Po Huang, *Ji-Feng Chiu, Wen-Shyang Hwang and *Ce-Kuen Shieh [email protected], [email protected],
MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001
MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Protection And Restoration In MPLS Networks
Protection And Restoration In MPLS Networks An examination of the methods for protecting MPLS LSPs against failures of network resources Ed Harrison, [email protected] Ben Miller, [email protected] Adrian
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints
New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University
HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Course Description. Students Will Learn
Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user
MPLS Traffic Engineering in ISP Network
MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications
OPNET simulation of voice over MPLS With Considering Traffic Engineering
Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed [email protected] Khaled M. F. Elsayed, senior member IEEE [email protected] Department
How To Share Bandwidth On A Diffserv Network
Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia Bandwidth Sharing Scheme in DiffServ-aware
Object-Oriented Design and Implementation of Fault Management Function for MPLS network
Object-Oriented Design and Implementation of Fault Management Function for MPLS network Sung-Jin Lim, Ryung-Min Kim, and Young-Tak Kim Advanced Networking Technology Lab. Dept. of Information & Communication
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
QoS Strategy in DiffServ aware MPLS environment
QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,
Supporting End-to-End QoS in DiffServ/MPLS Networks
Supporting End-to-End QoS in DiffServ/MPLS Networks Ji-Feng Chiu, *Zuo-Po Huang, *Chi-Wen Lo, *Wen-Shyang Hwang and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University, Taiwan
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Relationship between SMP, ASON, GMPLS and SDN
Relationship between SMP, ASON, GMPLS and SDN With the introduction of a control plane in optical networks, this white paper describes the relationships between different protocols and architectures. Introduction
Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission
Integrating Internet Protocol (IP) Multicast over Multiprotocol Label Switching (MPLS) for Real Time Video Conferencing Data Transmission Majid Ashraf Derwesh Department of Electronics and Communication
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia
Designing Reliable IP/MPLS Core Transport Networks
Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture
MPLS Traffic Engineering - A Choice Of Signaling Protocols
MPLS Traffic Engineering - A Choice Of Signaling Protocols Analysis of the similarities and differences between the two primary MPLS label distribution protocols: RSVP and CR-LDP Paul Brittain, [email protected]
Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone
International Journal of Computer Science and Telecommunications [Volume 5, Issue 6, June 2014] 9 ISSN 2047-3338 Implementation of Traffic Engineering and Addressing QoS in MPLS VPN Based IP Backbone Mushtaq
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
Comparative Analysis of Mpls and Non -Mpls Network
Comparative Analysis of Mpls and Non -Mpls Network Madhulika Bhandure 1, Gaurang Deshmukh 2, Prof. Varshapriya J N 3 1, 2, 3 (Department of Computer Science and IT, VJTI, Mumbai-19 ABSTRACT A new standard
MPLS in Private Networks Is It a Good Idea?
MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints
Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran [email protected]
Traffic protection in MPLS networks using an off-line flow optimization model
Traffic protection in MPLS networks using an off-line flow optimization model A.E. Krzesinski and K.E. Müller Department of Computer Science University of Stellenbosch, 76 Stellenbosch, South Africa Phone:
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T
Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang [email protected] AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP
Performance Evaluation for VOIP over IP and MPLS
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 3, 110-114, 2012 Performance Evaluation for VOIP over IP and MPLS Dr. Reyadh Shaker Naoum Computer Information
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Evaluating performance on an ISP MPLS network
Evaluating performance on an ISP MPLS network Dilmohan Narula, Mauricio Rojasmartinez, Venkatachalapati Rayipati [email protected], [email protected], [email protected]
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) รศ.ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand
Experiences with Class of Service (CoS) Translations in IP/MPLS Networks
Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering
MPLS TE Technology Overview
C H A P T E R MPLS TE Technology Overview In this chapter, you review the following topics: MPLS TE Introduction Basic Operation of MPLS TE DiffServ-Aware Traffic Engineering Fast Reroute This chapter
A SURVEYON MPLS BASED TRAFFIC ENGINEERING MECHANISM
A SURVEYON MPLS BASED TRAFFIC ENGINEERING MECHANISM K.Naga Gopi 1, Riaz Shaik 2 Dept. of CSE, KL University, AP, India [email protected] 1,[email protected] 2 ABSTRACT Multiprotocol
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)
Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt) Jerry Ash AT&T [email protected] Bur Goode AT&T [email protected] Jim Hand AT&T [email protected] Raymond
Service Assurance Tools
Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as
Link Failure Recovery. for MPLS Networks with Multicasting
Link Failure Recovery for MPLS Networks with Multicasting A Thesis Presented to the faculty of the School of Engineering and Applied Science University of Virginia In Partial Fulfillment of the requirements
Quality of Service for VoIP
Quality of Service for VoIP WCS November 29, 2000 John T. Chapman Cisco Distinguished Engineer Broadband Products and Solutions Course Number Presentation_ID 1999, Cisco Systems, Inc. 1 The QoS Matrix
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Lesson 13: MPLS Networks
Slide supporting material Lesson 13: MPLS Networks Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved IP Over ATM Once defined IP
Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications
Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233 IDOSI Publications, 2012 DOI: 10.5829/idosi.mejsr.2012.12.11.144 Performance Comparison of Mixed Protocols Based on EIGRP,
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India [email protected] 2 Director, Dept. of MCA, Sona College
Project Report on Traffic Engineering and QoS with MPLS and its applications
Project Report on Traffic Engineering and QoS with MPLS and its applications Brief Overview Multiprotocol Label Switching (MPLS) is an Internet based technology that uses short, fixed-length labels to
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network Faisal Aslam, Saqib Raza and Zartash Afzal Uzmi Department of Computer Science Lahore University of Management Sciences, Pakistan
A Resilient Path Management for BGP/MPLS VPN
A Resilient Path Management for BGP/MPLS VPN APNOMS2003 1 Introduction APNOMS2003 2 APNOMS2003 3 BGP/MPLS VPN Configuration MPLS/MP-iBGP VPN 1 VPN 1 VPN 2 VPN 2 BGP/MPLS VPN Overview BGP/MPLS Virtual Private
1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
Dynamic Sizing of Label Switching Paths in MPLS Networks
Dynamic Sizing of Label Switching Paths in MPLS Networks Gustavo B. Figueiredo 1 José. Augusto. S. Monteiro 2 Nelson. L. S da Fonseca 1 Antônio. A. A. Rocha 3 1 State University of Campinas Institute of
Wireless Mesh Networks Impact on Voice over Internet Protocol. Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University
Wireless Mesh Networks Impact on Voice over Internet Protocol Mohammad Tariq Meeran PhD Student Institute of Informatics, Tallinn University Email: [email protected] February 2014 What is wireless mesh networks?
Network management and QoS provisioning - QoS in the Internet
QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets
Performance Evaluation of Quality of Service Assurance in MPLS Networks
114 Performance Evaluation of Quality of Service Assurance in MPLS Networks Karol Molnar, Jiri Hosek, Lukas Rucka, Dan Komosny and Martin Vlcek Brno University of Technology, Communication, Purkynova 118,
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Multiple Layer Traffic Engineering in NTT Network Service
Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
MPLS Multiprotocol Label Switching
MPLS Multiprotocol Label Switching José Ruela, Manuel Ricardo FEUP Fac. Eng. Univ. Porto, Rua Dr. Roberto Frias, 4200-465 Porto, Portugal INESC Porto, Campus da FEUP, Rua Dr. Roberto Frias, 378, 4200-465
(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.
(MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 10, October 2013 pp. 4139 4149 A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING
An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation
1 An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation Xiaomin Chen, Yuesheng Zhong, Admela Jukan Technische Universität Carolo-Wilhelmina zu Braunschweig Email: [email protected],[email protected],
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Figure 1: Network Topology
Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,
