Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.

Slides:



Advertisements
Similar presentations
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Advertisements

Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
1 Asian Institute of Technology May 2009 MULTI-CONSTRAINED OPTIMAL PATH QUALITY OF SERVICE (QoS) ROUTING WITH INACCURATE LINK STATE INFORMATION AIT Master.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Teknik Routing Pertemuan 20 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
MQ : An Integrated Mechanism for Multimedia Multicasting De-Nian Yang, Wanjiun Liao, Member, IEEE, and Yen-Ting Lin IEEE TRANSACTIONS ON MULTIMEDIA VOL.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 17/04/2007.
Routing and Routing Protocols
Routing.
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
A Preferred Link Based Multicast Protocol for Wireless Mobile Ad hoc Networks R. S. Sisodia, Karthigeyan. I, B. S. Manoj, and C. Siva Ram Murthy ICC 2003.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-1 Determining IP Routes Introducing Distance Vector Routing.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
Link State Routing Protocols Last Update Copyright Kenneth M. Chipps Ph.D.
SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks Authors: Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta, Lili Qiu Published:
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
Routing and Routing Protocols Routing Protocols Overview.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Aadil Zia Khan and Shahab Baqai LUMS School of Science and Engineering QoS Aware Path Selection in Content Centric Networks Fahad R. Dogar Carnegie Mellon.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Routing Protocols Brandon Wagner.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
7/11/0666th IETF1 QoS Enhancements to BGP in Support of Multiple Classes of Service Andreas Terzis Computer Science Department Johns Hopkins University.
2006 QoS Routing and Forwarding Benefits of QoS Routing  Without QoS routing: –must probe path & backtrack; non optimal path, control traffic and processing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
William Stallings Data and Computer Communications
Multi Protocol Label Switching (MPLS)
Author:Zarei.M.;Faez.K. ;Nya.J.M.
A Study of Group-Tree Matching in Large Scale Group Communications
Link-State Routing Protocols
THE NETWORK LAYER.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing.
ECE 544 Protocol Design Project 2016
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Link-State Routing Protocols
Viet Nguyen Jianqing Liu Yaqin Tang
Link-State Routing Protocols
Routing.
Routing.
QoS routing Finding a path that can satisfy the QoS requirement of a connection. Achieving high resource utilization.
Presentation transcript:

Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001

Outline Introduction Two-Level Approach Routing Table Maintenance Packet Forwarding Mechanism Experimental Results and Discussion Conclusion

Introduction (1/3) QoS routing Goal => To find a loop-less path satisfying a given set of constraints on parameter like bandwidth, delay, etc. (optimize the global network resource utilization) (RSVP + IP) v.s. (RSVP + Qos routing) Need a QoS routing algorithm in IP networks.

Introduction (2/3) Need of QoS Routing Design Minimal changes to the existing routing protocols. Tradeoff between the average number of messages exchanged and impreciseness of maintained global state. Source QoS routing Distributed QoS routing Maintain global state (source routing) Not Maintain global state (flooding)

Introduction (3/3) Maintain global state Specify the best next hop. Overhead in maintaining the global state and state impreciseness. No Maintain global state High overhead on establishing a connection. The paper s method complements this bounded flooding approach.

Two-Level approach (1/2)

Two-Level approach (2/2) The advantage of Two-Level: Message overhead and the impreciseness will not be as large as maintaining the global state. Using the information about the second-degree neighbors, forward intelligently instead blindly flooding. The approach could extend N th degree neighbor.

Example network

QoS Routing algorithm Table Maintenance Building the routing table Update Policies Packet Forwarding Bounded Two-Level forwarding

Routing Table Maintenance – building the routing table Building the Routing Table LTN table (Link-to-Node) Construct by exchanging Hello packets with neighbors. Forwarding table contains information about the metrics of all the links in E 1 (v) and E 2 (v). Routing table (two-level) First level entry => copy the LTN table of v Second level entry => updated by Hello2 packet

Routing Table Maintenance – Update Policies (1/2) The update policy used decides when these Hello2 packets are sent. Based on timers Based on Thresholding (adopt) Each node remembers the last advertised metric on each link. If the ration is above (or below) a threshold, an update is triggered.

Routing Table Maintenance – Update Policies (2/2) Advantage of threshold-based update policy the impreciseness could be easily modeled using probabilities. If bandwidth b is advertised on a link,and say is 2, cab be modeled as a uniform distribution in [b/2, 2b] There are some approaches[10],[12] to do efficient routing with such imprecise information. Ref: 1.INFOCOM 97, QoS routing in networks with inaccurate information: Theory and algorithms 2.INFOCOM 98, QoS routing in networks with uncertain parameters

Packet Forwarding Mechanism The connection setup process has three phases: probing, ack, failure Probe packet format [k, QoS(Bandwidth=B), s, t, cid, {l}.] K: the router that has forwarded to probe to v QoS(): QoS requirement function s : Source t :destination cid :unique identifier {l} :list of neighbors to which v should forward this probe

Fig. Packet forwarding at a node

Drawback of forwarding mechanism The destination sends an ack only to the first probe it receives and discard all the duplicates. Improve way: 1. Receiver can retain the best one of probe packet, besides the first arrive. 2. Failure happened, send failure message to receiver and sender in the same time.

Bounded Two-Level Forwarding(1/2) If the network load is light, it is not a wise idea to blindly flood the probes on all eligible links. The shortest eligible path is preferred. Each probe is assigned an age. Initially, age(p) =0

Bounded Two-Level Forwarding(2/2) Forward condition on link(i, j) at node i: bandwidth(i,j) B and (age(p) + d j,t +1 L ) Much less overhead when the network load is light. First, L = d s,t Second, L =, when network load heavily. Simulation: Unbounded – without the hop constraint (L = ) Bounded – with the hop constraint (L = d s,t )

Experimental Results and Discussion To have such a reduced overhead, additional information about the second-degree neighbors must be stored at each router. Prove: overhead of table maintenance is much less than the savings in probe forwarding. Summary The savings in the probe forwarding is dependent on resource availability and the network topology.

Simulation Network Topology

Compare manner First set: compare between the unbounded versions of flooding and two-level forwarding. (L = ) Second set: compare between the bounded versions of the two approaches. ( L = d s,t )

Fig5. Unbounded-flooding Overhead on Mesh-1 Fig7. Unbounded-flooding Overhead on ISP Compare Overhead per Call Admitted (L = )

Fig6. Unbounded-flooding Bandwidth admitted on Mesh-1 Fig8. Unbounded-flooding Bandwidth admitted on ISP Bandwidth admission ratio : the ratio of bandwidth admitted into the network to the total bandwidth requested. (L = )

Compare Overhead per Call Admitted ( L = d s,t )

Bandwidth admission ratio : the ratio of bandwidth admitted into the network to the total bandwidth requested. ( L = d s,t )

Conclusion Propose a new distributed QoS routing algorithm which has a very low call establishment overhead. Characters: Two-Level routing table maintain Threshold-based update policy The age of a probe is defined