On Robust Traffic Engineering in Core Networks

نویسندگان

  • Ali Tizghadam
  • Alberto Leon-Garcia
چکیده

This paper reports on a probabilistic method for traffic engineering (specifically routing and resource allocation) in backbone networks, where the transport is the main service and robustness to the unexpected changes in network parameters is required. We analyze the network using the probabilistic betweenness of the network nodes (or links). The theoretical results lead to the definition of ”criticality” for nodes and links. Link criticality is used as the main metric to model the risk of taking a specific path from a source to a destination node. Different paths will be ranked based on their criticality measure, and the best path will be selected to route the flow along the core network. The choice of the path is in the direction of preserving the robustness of the network to the unforeseen changes in topology and traffic demands. The proposed method is useful in situations like MPLS and Ethernet networks where path assignment is required.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fuzzy Based Three Color Meter/Marker for Diffserv Networks (RESEARCH NOTE)

Differentiated Services (Diffserv) which was proposed by Internet Engineering Task Force (IETF), is a scalable and robust model for providing the end-to-end QoS. In the Diffserv networks, metering mechanisms are used to measure traffic stream. The single rate Three Color Meter (srTCM) [1],which was proposed by IETF,‏ meters an IP packet stream and marks its packets either green, yellow, or red....

متن کامل

Protection Over Asymmetric Channels, S-MATE: Secure Multipath Adaptive Traffic Engineering

There have been several approaches to the problem of provisioning traffic engineering between core network nodes in Internet Service Provider (ISP) networks. Such approaches aim to minimize network delay, increase capacity, and enhance security services between two core (relay) network nodes, an ingress node and an egress node. MATE (Multipath Adaptive Traffic Engineering) has been proposed for...

متن کامل

A novel approach in robust group decision making for supply strategic planning

Long-term planning is a challenging process for dealing with problems in big industries. Quick and flexible process of responding to the existing variable requirements are considered in such problems. Some of important strategic decisions which should be made in this field are, namely the way that manufacturing facilities should be applied as well as assignment and design the system of delivery...

متن کامل

استراتژیهای کوتاهترین مسیر در هدایت پویای وسیله نقلیه مبتنی بر معیار سطح سرویس- رویکرد الگوریتم ژنتیک ترکیبی

  Dynamic route guidance system is an important section of intelligent transportation systems. The main core of this system is computation of shortest path based on the real-time information. In this research the formulation of dynamic guidance of vehicle has been presented based on characteristics of intelligent transportation systems and using the general level of service criteria which inclu...

متن کامل

A Systematic Method to Analyze Transport Networks: Considering Traffic Shifts

Current network modeling practices usually assess the network performance at specified time interval, i.e. every 5 or 10 years time horizon. Furthermore, they are usually based on partially predictable data, which are being generated through various stochastic procedures. In this research, a new quantitative based methodology which combines combinatorial optimization modeling and transportation...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009