The self-protecting multipath (SPM) is a simple protection switching mechanism that can be implemented, e.g., by MPLS. We present a linear program to optimize the SPM load balancing parameters for network dimensioning...
详细信息
The self-protecting multipath (SPM) is a simple protection switching mechanism that can be implemented, e.g., by MPLS. We present a linear program to optimize the SPM load balancing parameters for network dimensioning. Our study shows that the SPM is a very efficient mechanism in the sense that it requires only little backup capacity since it outperforms the p-cycle approach and the shortest path rerouting by far. The investigation of the computation time and the memory consumption recommends the Simplex method as an LP solver rather than an interior point method (IPM). The computation time of the program depends mainly on the number of links in the network and it is well feasible for small and and medium size networks. For large networks, however, fast heuristics are required.
In this paper, we consider adaptive bandwidth allocation (ABA) for capacity tunnels as an effective means for multi-hour network design. Traffic engineering (TE) tunnels established in a network from border-to-border ...
详细信息
In this paper, we consider adaptive bandwidth allocation (ABA) for capacity tunnels as an effective means for multi-hour network design. Traffic engineering (TE) tunnels established in a network from border-to-border (b2b) can be used not only for route pinning between ingress/egress node pairs but also for efficient implementation of resilient network admission control. If static bandwidth allocation (SBA) based on peak-rate traffic assumptions is used to dimension the b2b tunnels, fluctuations of the network traffic can lead to under- or overprovisioning of network capacity in the tunnels. If ABA is used instead, the tunnel sizes are dynamically adapted to current traffic conditions. The efficient use of network capacity assigned to TE tunnels strongly depends on the structure of these tunnels. The contribution of this paper is an assessment of the bandwidth savings that are achievable with ABA in comparison to SBA for various tunnel structures with different path layouts and load balancing strategies. Our results show that the capacity savings due to ABA depend on the routing and load balancing schemes provisioned in the network and that these savings may be increased by appropriately chosen tunnel implementations
While unstructured P2P systems have been embraced widely in mobile ad-hoc networks (MANETs), the applicability of structured approaches like distributed hash tables (DHTs) to such settings remains controversial. Exist...
详细信息
While unstructured P2P systems have been embraced widely in mobile ad-hoc networks (MANETs), the applicability of structured approaches like distributed hash tables (DHTs) to such settings remains controversial. Existing research delivers promising empirical results addressing the concerns about performance, complexity, and reliability, but does not analyze the principles of combining DHTs and MANETs. This paper identifies and discusses the fundamental implications of non-infrastructural networks for DHTs and analyzes solutions to these challenges
Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes...
详细信息
Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes have to be done by an operator, especially when it comes to the adaption of a node to its environment, i.e., the cells surrounding its own. This is an expensive and inflexible method. Moreover, the required manual interference hampers the adaptivity of B3G networks towards topology changes. In this work, we present an architecture that allows for the detection of neighboring cells, thereby enabling an easy or even autonomic configuration of the access nodes. In addition to this, the presented Kademlia-based overlay network enables the storage of information needed for network management, such as configuration data or performance measures
Along with the increasing diversity of educational markup languages there is a strong need for flexible integration of such content into learning platforms. Therefore, we have identified four basic mechanisms: plain l...
详细信息
Along with the increasing diversity of educational markup languages there is a strong need for flexible integration of such content into learning platforms. Therefore, we have identified four basic mechanisms: plain linking from the platform to external content, conversion of content into the platforms native format, and service-based invocation of external content as well as specific functionality related to it. Architectural principles, benefits, and drawbacks of these concepts are compared, and exemplary realizations are described.
Some of the key issues in building services for large scale distributedsystems, realizing Vishwa, a peer-to-peer (P2P) middleware architecture for developing grid applications are discussed. Researchers are producing...
详细信息
Some of the key issues in building services for large scale distributedsystems, realizing Vishwa, a peer-to-peer (P2P) middleware architecture for developing grid applications are discussed. Researchers are producing large amounts of scientific data and believe that distributed computations on the data must be scheduled and available to a large number of scientists. It is suggested that the platform must scale up to a large number of nodes and data units in the system and must also be scalable geographically. A scalable, reconfigurable shared-object space over the two-layer architecture can be developed that incorporates mechanisms to maintain replicated data and must also provide a shared-object abstraction over a wide-area distributed system.
The Java messaging service (JMS) is a means to organize communication among distributed applications according to the publish/subscribe principle. If the subscribers install filter rules on the JMS server, JMS can be ...
详细信息
The Java messaging service (JMS) is a means to organize communication among distributed applications according to the publish/subscribe principle. If the subscribers install filter rules on the JMS server, JMS can be used as a message routing platform, but it is not clear whether its message throughput is sufficiently high to support large-scale systems. In this paper, we investigate the capacity of the high performance JMS server implementation by Fiorano. In contrast to other studies, we focus on the message throughput in the presence of filters and show that filtering reduces the performance significantly. We also present a model that describes the service time for a single message depending on the number of installed filters and validate it by measurements. This model helps to forecast the system throughput for specific application scenarios.
MPLS fast reroute (MPLS-FRR) mechanisms deviate the traffic in case of network failures at the router closest to the outage location to achieve an extremely fast reaction time. We review and compare the one-to-one bac...
详细信息
ISBN:
(纸本)9783800729593;3800729598
MPLS fast reroute (MPLS-FRR) mechanisms deviate the traffic in case of network failures at the router closest to the outage location to achieve an extremely fast reaction time. We review and compare the one-to-one backup and the facility backup concept that are options for MPLS-FRR to deviate the traffic via a detour or a bypass, respectively. Basically, the backup paths can take the shortest path that avoids the outage location from the point of local repair to the tail-end router or to the merge point. We then evaluate the backup capacity requirements and the configuration overhead in terms of the number of backup paths per primary path in a parametric study depending on the network characteristics. While the facility backup concept imposes clearly less configuration overhead than the one-to-one backup, its standard path layout requires more capacity. This can be reduced by a simple modification.
Structured peer-to-peer systems are designed for a highly scalable, self organizing, and efficient lookup for data. The key space of the so-called distributed hash tables (DHTs) is partitioned and each partition with ...
详细信息
Structured peer-to-peer systems are designed for a highly scalable, self organizing, and efficient lookup for data. The key space of the so-called distributed hash tables (DHTs) is partitioned and each partition with its keys and values is assigned to a node in the DHT. For data retrieval however, the very nature of hash tables allows only exact pattern matches. We propose Cerco, a simple solution for the problem of range queries by employing a hierarchically structured P2P approach based on the principles of distributed hash tables. We show that a dynamic hierarchy of DHTs with on-demand classification of items can positively influence the response time of queries while maintaining lookup correctness
When transacting and interacting through open computer networks, traditional methods used in the physical world for establishing trust can no longer be used. Creating virtual network substitutes with which people, org...
详细信息
暂无评论