SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011



      Performance Comparison of Rerouting Schemes of
           Multi Protocol Label Switching Network.
                                    Dr. Yogesh P Kosta 1, Minesh P Thaker 1,Bhaumik Nagar 2
                        1
                            VTP Dept of E&C Engg, Charotar Institute of Technology-Changa Gujarat, India
                                     Email: mineshthaker.ec@ecchanga.ac.in ypkosta@yahoo.com
                              2
                                IT Centre, National Institute of Design, Paldi ,Ahmedabad, Gujarat, India
                                                      Email : bhaumik_n@nid.edu


Abstract—In this paper, we attempt to present a comparison
through rigorous studies (existing conventional models)
following software based modeling and verifications through
simulations in terms of various traffic parameters such as
packet loss, Recovery Time (Latency), reordering of packets
including recovery time for various widely used path recovery
models for the purpose of end-to-end recovery of LSPs in
MPLS domains using NS2 simulator.

Index Terms—MPLS .path -recovery, software modeling
and simulations ,traffic engineering, LSP (Label Switch
Path), end-to-end delay, recovery time.

                             I.INTRODUCTION
           Traffic engineering is basically the process of                               Figure 1 Makam’s Model
optimizing the network(s) to maximize its overall performance
[10] that ultimately leads to improved efficiency. Multi Protocol               B . HASKIN’s Model(Global Path repair with RNT)
Label Switching (MPLS) being one such technology for                                              This scheme was introduced by Haskin
increasing the efficacy. This technology of forwarding data                     in the draft [2] and When global recovery is used as in
packets (of a fixed size labels) is based upon a pre-determined                 Makam’s model, the PSL has to be informed about a
path that the data packet needs to traverse, where thencoming                   failure in the working path before traffic can be switched
packet labels are examined to determine the next hop (or the                    over to the recovery path.
next part of the journey), the old label is then replaced with a
new one (label) and once again it is forwarded to the next hop,
and the journey continues till it reaches its destination.
           The rest of this paper is organized as follows. Under
section 2, we briefly describe various path recovery models
that we have evaluated. Under section 3, we discuss the
important issues relating to previous studies on the subject
and explaining our work. Section 4 presents the Simulation
environment used for evaluation of the said protocols.
Section 5 helps consolidate our simulation results and our
specific observation. Finally, section 6 concludes the paper.

      II. MPLS PATH RECOVERY AND REPAIRING MODELS
   In this section we have briefly described the path
recovery schemes that we investigated. A detailed discussion
and comparison of path recovery schemes are availed at [ 1].
                                                                                A different concern for Haskin’s model is the less
This work is being submitted in requirements against partial fulfillment
for the degree of ME in CSE of Gujarat University                               efficient use of resources, as the total length of the recovery
                                                                                path gets longer than the original working path.
 A. MAKAM’s Models (Global Path Repairing)
One of the first proposed models for MPLS recovery was                          C. Fast Reroute Model
presented by Makam in the draft [2].The model provides                              As shown in the fig 3 The fast reroute [4],[5],[6] shall
end- to-end protection for a LSP by setting up aglobal                          be used end-to-end then recovery paths needs to be pre-setup
recovery path between the ingress and egress LSR.

© 2011 ACEEE                                                               17
DOI: 01.IJCSI.02.01.49
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011

for each link or node in the working path. This is one-to-one                       IV.SIMULATION ENVIRONMENT
backup model without merging for local path protection. In
this technique switch over time can be increased but more                     We have used network simulator ns2 for simulation,
resources are required.                                              most widely used network simulator and freely
                                                                     downloadable. In order to compare the results we use
 D. Fast reroute one-to-one backup Model (Local Repair)              CBR traffic flow and a UDP agent with the following
         As shown in fig 4 the fast reroute [7],[8] one-to-          characteristics: packet size = 1500 bits, source rate=
one technique a separate backup LSP, called a detour                 512Kbps, burst time=0 and idle time =0, Tprop = 10msec,
LSP is computed for each LSR in a protected path.                    and BW(lsp)=BW(back)= BW( alt) = 10Mbps..
These detour LSPs are set up to use node recovery if
possible otherwise link recovery. To fully protect an LSP                     V. SIMULATION RESULTS AND OBSERVATION
that traverses N nodes, there could be as many as N-1
detours.                                                              A. . Packet Loss:
                                                                               The graph in figure 5 shows the number of dropped
                                                                     packets for the different models and depending on which
                                                                     link that breaks. In both Haskins model and the fast reroute
                                                                     model, traffic is switched onto a pre-setup backup path by
                                                                     the LSR that detects the failure, so for both of those models
                                                                     the only packets that are dropped are the ones dropped during
                                                                     the failure detection time.
                                                                         For Makam’s and the best effort model, the number
                                                                     of dropped packages increases the further away from the
                                                                     ingress LSR the failure occurs. This is because the FIS has
                                                                     to be sent back to the ingress before traffic can be switched
                                                                     to the backup path. In Makam’s model the number of
                                                                     dropped packages is the same as for Haskin and fast reroute
                                                                     only if the failure occurs on the link out from the ingress,
                                                                     this is because in this case no FIS has to be sent before
                                                                     traffic can be forwarded on the backup path. For the best
                                                                     effort model, the number of dropped packages is large
                                                                     because packages are dropped during the failure detection
                                                                     time, the time for the FIS to be sent to the ingress router.
                                                                      B.Full Restoration Time
                                                                          The graph in fig 6 shows the Full Restoration Time,
                                                                     measured from the last packet that was sent over the link
                                                                     before it breaks is received by node 10, until the first packet
                                                                     that is using the backup path is received by this node. The
                                                                     time for Haskin’s and Makam’s models are the same, this
                                                                     time is larger than fast reroute in all cases where the failure
                                                                     occurs on a different link then on the ingress node. The
                                                                     time increases for these models the further away from the
                                                                     ingress node the failure occurs, this is because the FIS or
                                                                     reversed traffic has to be sent upstream to the ingress before
                                                                     it can be switched over on the global recovery path. For the
                                                                     best effort model, the Full Restoration time is further
                                                                     increased by the time to calculate and setup the backup path.
                                                                     For the reroute model the Full Restoration time decreases
                                                                     the closer to the egress LSR the failure occurs. This is partly
                                                                     because the closer to the egress the failure occurs, the shorter
                    III. PREVIOUS WORK                               the new setup backup path can be.
           In this section we analyze the most relevant               C. Pre-reserved backup resources
previous studies concerning. Path recovery schemes for                        The chart in figure 7 shows the number of resources
MPLS network performance comparisons. Most of the                    reserved for backup traffic in the network before the failure
previous work is limited on performing simulations for               occurs. Both the best effort and rerouting model setup the
MPLS networks with Packet loss and end-to-end delay.In               backup path on demand after the failure has occurred, and
this paper, we observed and commented on the behavior                therefore no backup resources are reserved before the
of each path repairing schemes.                                      failure in those models. Makam’s models holds five

© 2011 ACEEE                                                    18
DOI: 01.IJCSI.02.01.49
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011

resources reserved for the global backup path.                        Having compared the performance of above four rerouting
Haskin’smodel holds five resources for the global backup              techniques Haskin model has got fast path recovery than
path and three for the reversed path, a total of eight. The           Makams’s model. But uses more resources ,also Haskin has
fast reroute holds eight resources reserved                           low packet loss ratio, less number of disordered packets than
for the backup path.                                                  Mkam’s model. As far as two Fast reroute with one-to-one
                                                                      techniques are concerned Fast reroute without merging was
 D. Packets Disordered:                                               much faster as far as restoration time is concerned with
         Figure 8 presents the packet disorder result for             respect to Fat reroute with merging. But as far as resources
the these schemes. Note that the packet disorder that we              utilizations are concerned Fast reroute with merging uses
consider here is the disorder produced during the restoration         less resources than Fast reroute without merging.
period which does not include the disorder produced by the            If we compare global Path repair and Local Path Repair
retransmission of lost packets by a high level protocol (i.e.,        techniques the local path repair is good at fast rerouting where
TCP).Makam’s and other schemes do not introduce more                  as Global path is poor at fast rerouting or at full restoration
packet disorder but cause more packet losses. It is evident           time.Similarly As far as Packet disordering is concern Haskin
from the figure that Fast reroute and Fast reroute 1to1 has           is very good .
low packet disorder than Haskin.
                                                                                             VII. FUTURE    WORK

                                                                                In this simulation study, we have not used large
                                                                      no of nodes and simulation time was 100s. Increasing both
                                                                      or either of them will increase computational time which
                                                                      was limited due to various reasons. Thus, in future we will
                                                                      try to carry out more vigorous simulation so as to
                                                                      gain     better understanding of such networks and
                                                                      subsequently helps in development of new protocols or
                                                                      modification in existing protocols.

                                                                                                 REFERENCES
                                                                      [1] S.Makam, V.Sharma, K.Owens, C.Huang “Protection/
                                                                      Restoration of MPLS Networks” draft-makam-mpls-protection-
                                                                      00.txt October 1999
                                                                      [2]D. Haskin, R.Krishnan
                                                                      “A Method for Setting an Alternative Label Switched Paths to
                                                                      Handle Fast Reroute” draft-haskin-mpls-fast-reroute-05.txt
                                                                      November 2000
                                                                      [3 E. Rosen, A.Vishwanathan, and R. Callon “Multi Protocol Label
                                                                      Switching architecture.” RFC 3031, January 2001
                                                                      [4]D. Haskin and R. Krishnan. “A Method for Setting an Alternative
                                                                      Label Switched Paths to Handle Fast Reroute. Internet draft <draft-
                                                                      haskin-mpls-fast-reroute-05.txt>, “ November 2000.
                                                                      [5] Makam, V. Sharma, K. Owens, and C. Huang.” Protection/
                                                                      Restoration of MPLS Networks. Internet draft <draft-makam-mpls-
                                                                      protection-00.txt>” October 1999
                                                                      [6 K. Owens, V. Sharma, S. Makam, and C. Huang. “A path
                                                                      protection/Restoration Mechanism for MPLS Networks. internet
                                                                      draft <draft-chang-mpls-protection-03.txt>” July 2001.
                                                                      [7] S Shew “Fast Restoration of MPLS Label Switched Paths.,
                                                                      Internet draft <draft-shew-lsp-restoration-00.txt>” October1999.
                                                                      [8]L. Hundessa and J. Domingo. “Reliable and Fast Rerouting
                                                                      mechanism for a protected label Switched Path.” Proceedings of
                                                                      the IEEE GLOBECOM ’02, November 2002
                                                                      [9] Nortel networks “introduction to multi protocol label switching”
                                                                      white paper April 2001

        Figure 9 Topology used for simulationVI. Conclusion




© 2011 ACEEE                                                     19
DOI: 01.IJCSI.02.01.49

Weitere ähnliche Inhalte

Was ist angesagt?

Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano GiordanoGoWireless
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Treegopi1985
 
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...EM Legacy
 
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...IDES Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ethernet Alliance Tech Exploration Forum Keynote
Ethernet Alliance Tech Exploration Forum KeynoteEthernet Alliance Tech Exploration Forum Keynote
Ethernet Alliance Tech Exploration Forum Keynotebkoley
 
Backbone nodes based stable routing for mobile ad hoc networks
Backbone nodes based stable routing for mobile ad hoc networksBackbone nodes based stable routing for mobile ad hoc networks
Backbone nodes based stable routing for mobile ad hoc networksambitlick
 
Extended summary of nonorthogonal random access for 5g mobile communication s...
Extended summary of nonorthogonal random access for 5g mobile communication s...Extended summary of nonorthogonal random access for 5g mobile communication s...
Extended summary of nonorthogonal random access for 5g mobile communication s...ChristianPoloDelVecc
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
 
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...IDES Editor
 
A Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer NetworksA Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer NetworksIDES Editor
 
A novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieeeA novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieeeambitlick
 

Was ist angesagt? (19)

Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
 
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
 
Gq2411921196
Gq2411921196Gq2411921196
Gq2411921196
 
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Ethernet Alliance Tech Exploration Forum Keynote
Ethernet Alliance Tech Exploration Forum KeynoteEthernet Alliance Tech Exploration Forum Keynote
Ethernet Alliance Tech Exploration Forum Keynote
 
Ak25214217
Ak25214217Ak25214217
Ak25214217
 
Evaluation aodv
Evaluation aodvEvaluation aodv
Evaluation aodv
 
Backbone nodes based stable routing for mobile ad hoc networks
Backbone nodes based stable routing for mobile ad hoc networksBackbone nodes based stable routing for mobile ad hoc networks
Backbone nodes based stable routing for mobile ad hoc networks
 
Bs24461465
Bs24461465Bs24461465
Bs24461465
 
Extended summary of nonorthogonal random access for 5g mobile communication s...
Extended summary of nonorthogonal random access for 5g mobile communication s...Extended summary of nonorthogonal random access for 5g mobile communication s...
Extended summary of nonorthogonal random access for 5g mobile communication s...
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...
 
Ijcta2011020605
Ijcta2011020605Ijcta2011020605
Ijcta2011020605
 
Hi3114131415
Hi3114131415Hi3114131415
Hi3114131415
 
Dq31784792
Dq31784792Dq31784792
Dq31784792
 
A Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer NetworksA Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer Networks
 
A novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieeeA novel estimation based backoff algorithm in the ieee
A novel estimation based backoff algorithm in the ieee
 

Andere mochten auch

Gravitational Based Hierarchical Clustering Algorithm
Gravitational Based Hierarchical Clustering AlgorithmGravitational Based Hierarchical Clustering Algorithm
Gravitational Based Hierarchical Clustering AlgorithmIDES Editor
 
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...IDES Editor
 
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...IDES Editor
 
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningIDES Editor
 
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...IDES Editor
 
Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...
Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...
Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...IDES Editor
 
Image Fusion of Video Images and Geo-localization for UAV Applications
Image Fusion of Video Images and Geo-localization for UAV ApplicationsImage Fusion of Video Images and Geo-localization for UAV Applications
Image Fusion of Video Images and Geo-localization for UAV ApplicationsIDES Editor
 
Physical Layer Technologies And Challenges In Mobile Satellite Communications
Physical Layer Technologies And Challenges In Mobile Satellite CommunicationsPhysical Layer Technologies And Challenges In Mobile Satellite Communications
Physical Layer Technologies And Challenges In Mobile Satellite CommunicationsIDES Editor
 
IEEE-Communications-Mag-CSDCYorkU
IEEE-Communications-Mag-CSDCYorkUIEEE-Communications-Mag-CSDCYorkU
IEEE-Communications-Mag-CSDCYorkUKeith Menezes
 
2020 Strategy Document_FinalExport_JA
2020 Strategy Document_FinalExport_JA2020 Strategy Document_FinalExport_JA
2020 Strategy Document_FinalExport_JANicholas Grear
 
Abcnews go com_international_inside_mysterious_underground_c
Abcnews go com_international_inside_mysterious_underground_cAbcnews go com_international_inside_mysterious_underground_c
Abcnews go com_international_inside_mysterious_underground_cEdy San
 
Water pollution 11
Water pollution 11Water pollution 11
Water pollution 11aneeshasasi
 
Le DPP devrait-il être obligatoire en Belgique
Le DPP devrait-il être obligatoire en BelgiqueLe DPP devrait-il être obligatoire en Belgique
Le DPP devrait-il être obligatoire en BelgiqueMedical Web Services
 
20160823 ww perspektif-baru-energy
20160823 ww perspektif-baru-energy20160823 ww perspektif-baru-energy
20160823 ww perspektif-baru-energyPanji Kharisma Jaya
 
Ssm lecture-14 (motivation of the sales force)
Ssm lecture-14 (motivation of the sales force)Ssm lecture-14 (motivation of the sales force)
Ssm lecture-14 (motivation of the sales force)Revisiting Strategy
 
New Testament Survey no.6 : John - His Gospel Account
New Testament Survey no.6 : John - His Gospel AccountNew Testament Survey no.6 : John - His Gospel Account
New Testament Survey no.6 : John - His Gospel AccountClive Ashby
 

Andere mochten auch (20)

Gravitational Based Hierarchical Clustering Algorithm
Gravitational Based Hierarchical Clustering AlgorithmGravitational Based Hierarchical Clustering Algorithm
Gravitational Based Hierarchical Clustering Algorithm
 
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...
 
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...
 
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity Mining
 
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
 
Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...
Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...
Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...
 
Image Fusion of Video Images and Geo-localization for UAV Applications
Image Fusion of Video Images and Geo-localization for UAV ApplicationsImage Fusion of Video Images and Geo-localization for UAV Applications
Image Fusion of Video Images and Geo-localization for UAV Applications
 
Physical Layer Technologies And Challenges In Mobile Satellite Communications
Physical Layer Technologies And Challenges In Mobile Satellite CommunicationsPhysical Layer Technologies And Challenges In Mobile Satellite Communications
Physical Layer Technologies And Challenges In Mobile Satellite Communications
 
IEEE-Communications-Mag-CSDCYorkU
IEEE-Communications-Mag-CSDCYorkUIEEE-Communications-Mag-CSDCYorkU
IEEE-Communications-Mag-CSDCYorkU
 
2020 Strategy Document_FinalExport_JA
2020 Strategy Document_FinalExport_JA2020 Strategy Document_FinalExport_JA
2020 Strategy Document_FinalExport_JA
 
Pamoja Tuwalee - 1
Pamoja Tuwalee - 1Pamoja Tuwalee - 1
Pamoja Tuwalee - 1
 
Abcnews go com_international_inside_mysterious_underground_c
Abcnews go com_international_inside_mysterious_underground_cAbcnews go com_international_inside_mysterious_underground_c
Abcnews go com_international_inside_mysterious_underground_c
 
Water pollution 11
Water pollution 11Water pollution 11
Water pollution 11
 
A Ti Mujer
A Ti MujerA Ti Mujer
A Ti Mujer
 
Le DPP devrait-il être obligatoire en Belgique
Le DPP devrait-il être obligatoire en BelgiqueLe DPP devrait-il être obligatoire en Belgique
Le DPP devrait-il être obligatoire en Belgique
 
pgyu
pgyupgyu
pgyu
 
20160823 ww perspektif-baru-energy
20160823 ww perspektif-baru-energy20160823 ww perspektif-baru-energy
20160823 ww perspektif-baru-energy
 
Ssm lecture-14 (motivation of the sales force)
Ssm lecture-14 (motivation of the sales force)Ssm lecture-14 (motivation of the sales force)
Ssm lecture-14 (motivation of the sales force)
 
New Testament Survey no.6 : John - His Gospel Account
New Testament Survey no.6 : John - His Gospel AccountNew Testament Survey no.6 : John - His Gospel Account
New Testament Survey no.6 : John - His Gospel Account
 
Cets 2015 shell buehlman systemmap challenge
Cets 2015 shell  buehlman systemmap challengeCets 2015 shell  buehlman systemmap challenge
Cets 2015 shell buehlman systemmap challenge
 

Ähnlich wie Performance Comparison of Rerouting Schemes of Multi Protocol Label Switching Network

2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospfAdi Nugroho
 
Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...IAEME Publication
 
Shared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleShared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleiaemedu
 
Exploiting cooperative relay for high performance communications in mimo ad h...
Exploiting cooperative relay for high performance communications in mimo ad h...Exploiting cooperative relay for high performance communications in mimo ad h...
Exploiting cooperative relay for high performance communications in mimo ad h...IEEEFINALYEARPROJECTS
 
Avoiding packet loss in gateway reallocation in mobile wimax networks
Avoiding packet loss in gateway reallocation in mobile wimax networksAvoiding packet loss in gateway reallocation in mobile wimax networks
Avoiding packet loss in gateway reallocation in mobile wimax networkseSAT Journals
 
Avoiding packet loss in gateway reallocation in mobile wimax networks
Avoiding packet loss in gateway reallocation in mobile wimax networksAvoiding packet loss in gateway reallocation in mobile wimax networks
Avoiding packet loss in gateway reallocation in mobile wimax networkseSAT Publishing House
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORSAFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORScscpconf
 
Affect of parallel computing on multicore processors
Affect of parallel computing on multicore processorsAffect of parallel computing on multicore processors
Affect of parallel computing on multicore processorscsandit
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
 
Energy efficiency in ieee 802.11 standard wlan through
Energy efficiency in ieee 802.11 standard wlan throughEnergy efficiency in ieee 802.11 standard wlan through
Energy efficiency in ieee 802.11 standard wlan througheSAT Publishing House
 
Energy efficiency in ieee 802.11 standard wlan through mwtdp
Energy efficiency in ieee 802.11 standard wlan through mwtdpEnergy efficiency in ieee 802.11 standard wlan through mwtdp
Energy efficiency in ieee 802.11 standard wlan through mwtdpeSAT Journals
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networksambitlick
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionVaideesh Ravi Shankar
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
 
Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...
Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...
Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...Dr. Amarjeet Singh
 

Ähnlich wie Performance Comparison of Rerouting Schemes of Multi Protocol Label Switching Network (20)

2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospf
 
Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...
 
Shared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleShared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multiple
 
shashank_hpca1995_00386533
shashank_hpca1995_00386533shashank_hpca1995_00386533
shashank_hpca1995_00386533
 
Exploiting cooperative relay for high performance communications in mimo ad h...
Exploiting cooperative relay for high performance communications in mimo ad h...Exploiting cooperative relay for high performance communications in mimo ad h...
Exploiting cooperative relay for high performance communications in mimo ad h...
 
Networks
NetworksNetworks
Networks
 
Avoiding packet loss in gateway reallocation in mobile wimax networks
Avoiding packet loss in gateway reallocation in mobile wimax networksAvoiding packet loss in gateway reallocation in mobile wimax networks
Avoiding packet loss in gateway reallocation in mobile wimax networks
 
Avoiding packet loss in gateway reallocation in mobile wimax networks
Avoiding packet loss in gateway reallocation in mobile wimax networksAvoiding packet loss in gateway reallocation in mobile wimax networks
Avoiding packet loss in gateway reallocation in mobile wimax networks
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
Mit6 02 f12_chap18
Mit6 02 f12_chap18Mit6 02 f12_chap18
Mit6 02 f12_chap18
 
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORSAFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
 
Affect of parallel computing on multicore processors
Affect of parallel computing on multicore processorsAffect of parallel computing on multicore processors
Affect of parallel computing on multicore processors
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 
Energy efficiency in ieee 802.11 standard wlan through
Energy efficiency in ieee 802.11 standard wlan throughEnergy efficiency in ieee 802.11 standard wlan through
Energy efficiency in ieee 802.11 standard wlan through
 
Energy efficiency in ieee 802.11 standard wlan through mwtdp
Energy efficiency in ieee 802.11 standard wlan through mwtdpEnergy efficiency in ieee 802.11 standard wlan through mwtdp
Energy efficiency in ieee 802.11 standard wlan through mwtdp
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
 
3
33
3
 
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...An Adaptive Routing Algorithm for Communication Networks  using Back Pressure...
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
 
Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...
Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...
Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Kürzlich hochgeladen (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Performance Comparison of Rerouting Schemes of Multi Protocol Label Switching Network

  • 1. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 Performance Comparison of Rerouting Schemes of Multi Protocol Label Switching Network. Dr. Yogesh P Kosta 1, Minesh P Thaker 1,Bhaumik Nagar 2 1 VTP Dept of E&C Engg, Charotar Institute of Technology-Changa Gujarat, India Email: mineshthaker.ec@ecchanga.ac.in ypkosta@yahoo.com 2 IT Centre, National Institute of Design, Paldi ,Ahmedabad, Gujarat, India Email : bhaumik_n@nid.edu Abstract—In this paper, we attempt to present a comparison through rigorous studies (existing conventional models) following software based modeling and verifications through simulations in terms of various traffic parameters such as packet loss, Recovery Time (Latency), reordering of packets including recovery time for various widely used path recovery models for the purpose of end-to-end recovery of LSPs in MPLS domains using NS2 simulator. Index Terms—MPLS .path -recovery, software modeling and simulations ,traffic engineering, LSP (Label Switch Path), end-to-end delay, recovery time. I.INTRODUCTION Traffic engineering is basically the process of Figure 1 Makam’s Model optimizing the network(s) to maximize its overall performance [10] that ultimately leads to improved efficiency. Multi Protocol B . HASKIN’s Model(Global Path repair with RNT) Label Switching (MPLS) being one such technology for This scheme was introduced by Haskin increasing the efficacy. This technology of forwarding data in the draft [2] and When global recovery is used as in packets (of a fixed size labels) is based upon a pre-determined Makam’s model, the PSL has to be informed about a path that the data packet needs to traverse, where thencoming failure in the working path before traffic can be switched packet labels are examined to determine the next hop (or the over to the recovery path. next part of the journey), the old label is then replaced with a new one (label) and once again it is forwarded to the next hop, and the journey continues till it reaches its destination. The rest of this paper is organized as follows. Under section 2, we briefly describe various path recovery models that we have evaluated. Under section 3, we discuss the important issues relating to previous studies on the subject and explaining our work. Section 4 presents the Simulation environment used for evaluation of the said protocols. Section 5 helps consolidate our simulation results and our specific observation. Finally, section 6 concludes the paper. II. MPLS PATH RECOVERY AND REPAIRING MODELS In this section we have briefly described the path recovery schemes that we investigated. A detailed discussion and comparison of path recovery schemes are availed at [ 1]. A different concern for Haskin’s model is the less This work is being submitted in requirements against partial fulfillment for the degree of ME in CSE of Gujarat University efficient use of resources, as the total length of the recovery path gets longer than the original working path. A. MAKAM’s Models (Global Path Repairing) One of the first proposed models for MPLS recovery was C. Fast Reroute Model presented by Makam in the draft [2].The model provides As shown in the fig 3 The fast reroute [4],[5],[6] shall end- to-end protection for a LSP by setting up aglobal be used end-to-end then recovery paths needs to be pre-setup recovery path between the ingress and egress LSR. © 2011 ACEEE 17 DOI: 01.IJCSI.02.01.49
  • 2. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 for each link or node in the working path. This is one-to-one IV.SIMULATION ENVIRONMENT backup model without merging for local path protection. In this technique switch over time can be increased but more We have used network simulator ns2 for simulation, resources are required. most widely used network simulator and freely downloadable. In order to compare the results we use D. Fast reroute one-to-one backup Model (Local Repair) CBR traffic flow and a UDP agent with the following As shown in fig 4 the fast reroute [7],[8] one-to- characteristics: packet size = 1500 bits, source rate= one technique a separate backup LSP, called a detour 512Kbps, burst time=0 and idle time =0, Tprop = 10msec, LSP is computed for each LSR in a protected path. and BW(lsp)=BW(back)= BW( alt) = 10Mbps.. These detour LSPs are set up to use node recovery if possible otherwise link recovery. To fully protect an LSP V. SIMULATION RESULTS AND OBSERVATION that traverses N nodes, there could be as many as N-1 detours. A. . Packet Loss: The graph in figure 5 shows the number of dropped packets for the different models and depending on which link that breaks. In both Haskins model and the fast reroute model, traffic is switched onto a pre-setup backup path by the LSR that detects the failure, so for both of those models the only packets that are dropped are the ones dropped during the failure detection time. For Makam’s and the best effort model, the number of dropped packages increases the further away from the ingress LSR the failure occurs. This is because the FIS has to be sent back to the ingress before traffic can be switched to the backup path. In Makam’s model the number of dropped packages is the same as for Haskin and fast reroute only if the failure occurs on the link out from the ingress, this is because in this case no FIS has to be sent before traffic can be forwarded on the backup path. For the best effort model, the number of dropped packages is large because packages are dropped during the failure detection time, the time for the FIS to be sent to the ingress router. B.Full Restoration Time The graph in fig 6 shows the Full Restoration Time, measured from the last packet that was sent over the link before it breaks is received by node 10, until the first packet that is using the backup path is received by this node. The time for Haskin’s and Makam’s models are the same, this time is larger than fast reroute in all cases where the failure occurs on a different link then on the ingress node. The time increases for these models the further away from the ingress node the failure occurs, this is because the FIS or reversed traffic has to be sent upstream to the ingress before it can be switched over on the global recovery path. For the best effort model, the Full Restoration time is further increased by the time to calculate and setup the backup path. For the reroute model the Full Restoration time decreases the closer to the egress LSR the failure occurs. This is partly because the closer to the egress the failure occurs, the shorter III. PREVIOUS WORK the new setup backup path can be. In this section we analyze the most relevant C. Pre-reserved backup resources previous studies concerning. Path recovery schemes for The chart in figure 7 shows the number of resources MPLS network performance comparisons. Most of the reserved for backup traffic in the network before the failure previous work is limited on performing simulations for occurs. Both the best effort and rerouting model setup the MPLS networks with Packet loss and end-to-end delay.In backup path on demand after the failure has occurred, and this paper, we observed and commented on the behavior therefore no backup resources are reserved before the of each path repairing schemes. failure in those models. Makam’s models holds five © 2011 ACEEE 18 DOI: 01.IJCSI.02.01.49
  • 3. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 resources reserved for the global backup path. Having compared the performance of above four rerouting Haskin’smodel holds five resources for the global backup techniques Haskin model has got fast path recovery than path and three for the reversed path, a total of eight. The Makams’s model. But uses more resources ,also Haskin has fast reroute holds eight resources reserved low packet loss ratio, less number of disordered packets than for the backup path. Mkam’s model. As far as two Fast reroute with one-to-one techniques are concerned Fast reroute without merging was D. Packets Disordered: much faster as far as restoration time is concerned with Figure 8 presents the packet disorder result for respect to Fat reroute with merging. But as far as resources the these schemes. Note that the packet disorder that we utilizations are concerned Fast reroute with merging uses consider here is the disorder produced during the restoration less resources than Fast reroute without merging. period which does not include the disorder produced by the If we compare global Path repair and Local Path Repair retransmission of lost packets by a high level protocol (i.e., techniques the local path repair is good at fast rerouting where TCP).Makam’s and other schemes do not introduce more as Global path is poor at fast rerouting or at full restoration packet disorder but cause more packet losses. It is evident time.Similarly As far as Packet disordering is concern Haskin from the figure that Fast reroute and Fast reroute 1to1 has is very good . low packet disorder than Haskin. VII. FUTURE WORK In this simulation study, we have not used large no of nodes and simulation time was 100s. Increasing both or either of them will increase computational time which was limited due to various reasons. Thus, in future we will try to carry out more vigorous simulation so as to gain better understanding of such networks and subsequently helps in development of new protocols or modification in existing protocols. REFERENCES [1] S.Makam, V.Sharma, K.Owens, C.Huang “Protection/ Restoration of MPLS Networks” draft-makam-mpls-protection- 00.txt October 1999 [2]D. Haskin, R.Krishnan “A Method for Setting an Alternative Label Switched Paths to Handle Fast Reroute” draft-haskin-mpls-fast-reroute-05.txt November 2000 [3 E. Rosen, A.Vishwanathan, and R. Callon “Multi Protocol Label Switching architecture.” RFC 3031, January 2001 [4]D. Haskin and R. Krishnan. “A Method for Setting an Alternative Label Switched Paths to Handle Fast Reroute. Internet draft <draft- haskin-mpls-fast-reroute-05.txt>, “ November 2000. [5] Makam, V. Sharma, K. Owens, and C. Huang.” Protection/ Restoration of MPLS Networks. Internet draft <draft-makam-mpls- protection-00.txt>” October 1999 [6 K. Owens, V. Sharma, S. Makam, and C. Huang. “A path protection/Restoration Mechanism for MPLS Networks. internet draft <draft-chang-mpls-protection-03.txt>” July 2001. [7] S Shew “Fast Restoration of MPLS Label Switched Paths., Internet draft <draft-shew-lsp-restoration-00.txt>” October1999. [8]L. Hundessa and J. Domingo. “Reliable and Fast Rerouting mechanism for a protected label Switched Path.” Proceedings of the IEEE GLOBECOM ’02, November 2002 [9] Nortel networks “introduction to multi protocol label switching” white paper April 2001 Figure 9 Topology used for simulationVI. Conclusion © 2011 ACEEE 19 DOI: 01.IJCSI.02.01.49