SlideShare a Scribd company logo
1 of 14
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

EVALUATION OF SCALABILITY AND BANDWIDTH
EFFICIENCY OF MULTIPOINT TO MULTIPOINT
HIERARCHY FOR FAST RECOVERY IN MPLS
NETWORKS
Mohamad Chaitou1 and Hussein Charara1
1

Lebanese University, Faculty of Science, Lebanon

ABSTRACT
Multi-Point to Multi-Point Traffic Engineering (MP2MP-TE) leads to an important scalability in Multi
Protocol Label Switching-Traffic Engineering (MPLS-TE) networks. This paper emphasizes on the support
of Fast-reroute (FRR) in MPLS-TE networks by using MP2MP bypass TE-tunnels. Hence, one MP2MP
bypass TE-tunnel can be used to protect several primary TE-tunnels. During failure, the primary TE-tunnel
is encapsulated into the MP2MP bypass TE-tunnel which calls for defining a new type of MPLS hierarchy,
i.e. the multipoint to multipoint hierarchy. In this paper we present a simulation study that evaluates
several fast rerouting scenarios depending on the number of leaves of a MP2MP bypass TE-tunnel and on
the number of primary TE-tunnels that can be encapsulated into one MP2MP bypass TE-tunnel. In
particular, the scalability/bandwidth efficiency tradeoff between these schemes is analyzed and valuable
comparisons with the existing approaches are presented.

KEYWORDS
Simulations; MPLS; traffic engineering; fast reroute; multicast; multipoint-to-multipoint

1. INTRODUCTION
MP2MP MPLS-TE tunnels (Multi-Point to Multi-Point, Multi Protocol Label Switching-Traffic
Engineering tunnels), which have been defined in [1], lead to an important scalability in MPLSTE networks. This is due to the reduction in the number of TE-tunnels (a.k.a TE-LSP: TE-Label
Switched Path) needed to maintain multipoint connectivity between edge routers.
Reducing the number of TE-LSPs is of prime importance as it improves, in the control plane, the
scalability of the RSVP-TE (Resource reSerVation Protocol) signaling protocol by decreasing the
memory and CPU consumed on a router.
Indeed, the scalability in the control plane is defined by the number of states required in order to
establish the TE-LSPs. Each TE-LSP needs at least one state in each node it traverses. A state
denotes the data information that must be stored at a node in order to maintain a TE-LSP. These
states are of soft nature, that is, they should have to be refreshed at regular time intervals basis
which creates a heavy burden on the routers CPUs. In fact, control plane traffic is processed by
the CPU and not in hardware.

In addition, reducing the number of TE-LSPs reduces the length of MPLS tables in the data plane.
DOI : 10.5121/ijcnc.2014.6111

167
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

As an important application of MP2MP-TE tunnels is the support of Fast Reroute (FRR)
procedures in order to protect point-to-point and point-to-multipoint TE-LSPs because they are
particular cases of MP2MP TE-LSPs.
FRR is of prime importance for Multimedia applications such as VoIP, IPTV or video
conferencing which have strong resiliency requirements, with a target of sub-50ms recovery upon
link and/or node failure. However, a scalability problem arises when the traffic is of multicast
nature such as IPTV (point to multipoint) or video conferencing (multipoint to multipoint).
FRR has been firstly defined in order to protect point to point (P2P) TE-LSPs. A primary P2P
TE-LSP is protected by mean of a P2P TE-LSP, called bypass tunnel that encapsulates a backup
P2P TE-LSP [2]. This is denoted as point to point MPLS hierarchy. That is, a bypass TE-LSP
connecting the upstream node of the protected element, called Point of Local Repair (PLR), to the
downstream node of the protected element, called Merge Point (MP), is used to encapsulate the
backup P2P TE-LSP during failure.
To protect a primary point to multipoint (P2MP) TE-LSP, the use of point to point hierarchy is
proposed in [3]. This method consists of establishing as many P2P bypass tunnels as the number
of merge points downstream of the protected elements, which leads to a scalability problem. The
use of point to multipoint MPLS hierarchy [4][5][6][7], however, helps in relieving the scalability
problem since only one P2MP bypass tunnel is needed to protect an element.
Due to its bidirectional nature, the protection of an MP2MP primary TE-LSP by using point to
point and /or point to multipoint hierarchy would cause a scalability problem since a full mesh of
P2P or P2MP bypass TE-LSPs would have to be established between all nodes of the primary
MP2MP TE-LSP adjacent to the protected element.
To overcome the above limitations, [7] proposed the use of multipoint to multipoint hierarchy i.e.
the use of an MP2MP bypass TE-LSP to protect a link and/or a node of a primary MP2MP TELSP. Hence, one MP2MP bypass TE-LSP may encapsulate one or several MP2MP primary TELSPs, which is an important scalability improvement.
In addition, an MP2MP bypass tunnel can be used to encapsulate several primary P2P and/or
P2MP TE-LSP which leads to an additional improvement of the scalability compared to the point
to multipoint hierarchy.
Note that in [7] we focused on the signaling aspects, i.e. the control plane procedures, in order to
support the multipoint to multipoint hierarchy. Also, we provided some architecture examples and
presented a simple simulation study.
In this paper we present an extended simulation study in order to evaluate the performance of
multipoint to multipoint hierarchy. Several scenarios are illustrated and evaluated. Indeed, in one
of the scenarios we assume that the leaves of an MP2MP bypass TE-LSP cover all neighbors of a
protected element while in another scenario we assume that only a subset of these neighbors, that
is only the nodes of the primary MP2MP TE-LSP adjacent to the protected element, are covered.
Another important aspect reflected by the scenarios is the number of primary MP2MP TE-LSPs
that can be encapsulated into one MP2MP bypass tunnel. This aspect is impacted by the selection
of the node that constructs the MP2MP bypass tunnel, i.e. the node that calculates the path of the
MP2MP bypass tunnel and that signals it in the control plane. We call this node “Upstream
Protecting Node” (UPN). A detailed discussion about the determination of this node is given in
168
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

[7] and it is beyond the scope of this paper. Moreover, several heuristics that can be used in order
to calculate the path of the MP2MP bypass tunnel have been discussed in [1].
A scalability/bandwidth tradeoff exists between the different scenarios presented by this paper.
We compare such scenarios with the use of P2P and P2MP bypass TE-LSPs by means of
simulations.
Without loss of generality, the simulation model considers the protection of primary MP2MP TELSPs only. Indeed, primary P2P and P2MP TE-LSPs are particular cases of primary MP2MP TELSPs.
Our proposed model which incorporates traffic engineering in multi-point to multi-point
environments is a novel contribution in order to support real time applications such as audio
conferencing over IP networks [9].
This paper is organized as follows. Section 2 explains the scenarios that will be considered by the
simulation model. In Section 3 we present several numerical examples to evaluate our
propositions. Finally, Section 4 concludes the paper.

2. SIMULATION SCENARIOS AND ASSUMPTIONS
In this section we discuss the different scenarios and assumptions that will be evaluated by the
simulation model.
We consider l , l ≥ 1 primary MP2MP TE-LSPs to be protected as illustrated in Figure 1. These
LSPs are named respectively: primary TE-LSP1, primary TE-LSP2 ... primary TE-LSP l . They
cross a node named “P1”, which has N m , N m ≥ 2 neighbors. We assume that these LSPs have
the same characteristics (e.g. the same bandwidth requirements). Each of those primary LSPs
crosses the same number of nodes N l ,2 ≤ N l ≤ N m among the neighbors of "P1" but not
necessarily the same set of neighbors (for the sake of simplicity, Figure 1 shows that these
primary LSPs cross the same set of neighbors, N1 , N 2 ...N l . However, in the simulation model
we consider the case where each primary TE-LSP traverses a number N l of nodes randomly
uniformly distributed among the N m neighbors of "P1": N1 , N 2 ...N m ).

169
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

Figure 1 An example of the scenarios used in the simulation model

Figure 1 shows also a MP2MP bypass tunnel that is signaled such that it crosses a network
connected to the neighbors of "P1" without using any link between "P1" and any of its neighbors.
Hence, this bypass tunnel protects the traffic of all the primary TE-LSPs in the case of the failure
of “P1” or any of the links N1—P1, N2—P1 … Nl—P1.
Note that the MP2MP bypass TE-LSP can be used to protect P2P (Nl=2), P2MP (Nl>=2 with
only one source and several destinations) and MP2MP TE-LSPs (Nl>=2 with several sources and
several destinations).
Another important issue is the node that builds or selects the MP2MP bypass tunnel, i.e. the node
that calculates the path of the MP2MP bypass tunnel and that signals it in the control plane. A
detailed discussion about the determination of this node is given in [7] and it is beyond the scope
of this paper. However, it should be mentioned that this node is one of the neighbors of the node
to be protected, e.g. node P1 in Figure 1, and it is determined independently for each primary TELSP.
For instance, how this node is determined for primary TE-LSP1 in Figure 1 ?
This node is one of the neighbors of P1 that are members of primary TE-LSP1 which are the
nodes N1 , N 2 ...N l . We suppose that this node is randomly selected among these nodes.
Similarly, this node is determined independently for each primary TE-LSP.
In the following, this node is called Upstream Protecting Node (UPN).
In the simulation model we consider three cases for the MP2MP bypass tunnel. In addition, we
take into account the cases of protecting the primary TE-LSPs by P2P and P2MP bypass tunnels
respectively. Two performance criterions will be used in order to compare between these
scenarios: the bandwidth wastage and the number of states caused by signaling the bypass TELSPs through a network that is used to bypass the primary TE-LSPs (see Figure 1). In order to
simplify the simulation model and without loss of generality we can consider that this network is
170
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

reduced to one node "P2" as illustrated in Figure 2. That is, in the model we are interested by
calculating the number of states in "P2". Note that in the general case, these states are spread
among several nodes of the bypass network (Figure 1).

Figure 2 The bypass network is replaced by one node

2.1. MP2MP bypass tunnel: Case 1
In this case, we assume that regardless of the number of the primary TE-LSPs, only one MP2MP
bypass tunnel exists. This has two consequences. First, the MP2MP bypass tunnel should have as
leaves all the neighbors of the node to be protected, e.g. node P1 in
Figure 3. In the case of
Figure 3, the leaves are then the nodes N1 , N 2 ...N m . This is because it cannot be a priori
predicted which nodes of the neighbors of P1 will be crossed by a primary TE-LSP (recall from
the above discussion that each primary TE-LSP crosses a number N l of nodes randomly
uniformly distributed among the N m neighbors of "P1": N1 , N 2 ...N m ). Hence, we assume the
worst case where the group of all the primary TE-LSPs crosses all the neighbors of P1.
Second, since the UPN is selected randomly and independently for each primary TE-LSP as
described above, this means that it may exists several UPNs in the MP2MP bypass tunnel.
For the above two reasons, Case 1 is henceforth called Full Covering (FC) multi-UPN mode.

171
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

...

Figure 3 The full covering multi-UPN scenario

It can be observed from
Figure 3 that the bandwidth wastage occurs at nodes that do not belong to any of the primary TELSPs such as nodes N l +1 ,..., N m .

Figure 4 below shows an example where l = 3, N m = 4, N l = 3 . That is, there are three primary
TE-LSPs ( l = 3 ) and four neighbors for P1 ( N m = 4 ) and each primary TE-LSP crosses three
neighbors of P1 ( N l = 3 ). Note that there is only MP2MP bypass tunnel and that node N m
should drop the traffic of the three primary TE-LSPs.

Figure 4 An example of the full covering multi-UPN scenario
172
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

2.2. MP2MP bypass tunnel: Case 2
In this case, the full covering assumption of Case 1 is adopted. However, we suppose that one
MP2MP bypass tunnel encapsulates a subset of the primary LSPs crossing a subset of the
neighbors of "P1": those that have the same UPN. In other words, for each subset of primary TELSPs that have the same UPN there will be a separate MP2MP bypass tunnel.
Hence, Case 2 is called FC single-UPN mode.

Figure 5 An example of the full covering single-UPN scenario

Figure 5 shows an example where l = 3, N m = 4, N l = 3 . Both primary TE-LSP 1 and primary
TE-LSP2 in addition to primary TE-LSP3 pass through P1 and through the following subset of
nodes among its neighbors: N1, N2, N3. We assume that the UPN of both primary TE-LSP1 and
primary TE-LSP2 is node N1, while node N2 is the UPN of primary TE-LSP3. This implies that
primary TE-LSP1 and primary TE-LSP2 will be encapsulated by the same MP2MP bypass tunnel
while a second MP2MP bypass tunnel is required for primary TE-LSP3. Both bypass tunnel have
the set of nodes N1, N2, N3 and N4, i.e. all the neighbors of P1, as leaves. Hence, node Nm will
drop the traffic belonging to the three primary TE-LSPs

2.3. MP2MP bypass tunnel: Case 3
In this case, the full covering assumption of both Case 1 and Case 2 is no longer valid. However,
we consider that one MP2MP bypass tunnel should encapsulate those primary TE-LSPs which
cross exactly the same set of nodes among the neighbors of “P1”; in addition, these primary TELSPs should have the same UPN.

173
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

For instance, suppose that in Figure 6 below, we have 3 primary TE-LSPs and that node P1 has 4
neighbors N1, N2, N3 and N4. Suppose that: primary TE-LSP1 and primary TE-LSP2 cross P1,
N1, N2 and N3 while primary TE-LSP3 crosses P1, N2, N3 and N4.
Suppose that the UPNs are: N1 for primary TE-LSP1, N2 for primary TE-LSP2 and N3 for
primary TE-LSP3.
What should be the number of MP2MP bypass tunnels in this case?
The answer is three. Indeed, primary TE-LSP1 and primary TE-LSP2 cannot be encapsulated into
the same MP2MP bypass tunnel although they have the same set of nodes crossing P1 (nodes N1,
N2 and N3). This is because they have two different UPNs (N1 for primary TE-LSP1 and N2 for
primary TE-LSP2). In addition, since primary TE-LSP3 crosses a different set of nodes among
the neighbors of P1 (nodes N2, N3 and N4), it should be encapsulated into a separate MP2MP
bypass tunnel.
Case 3 is henceforth called Exact Covering (EC) scenario.
The advantage of the EC mode is that the bandwidth wastage observed in the full covering modes
(Case 1 and Case 2 above) is avoided. However, it incurs a control plane overhead burden which
is discussed in [7].

Figure 6 An example of the exact covering scenario

2.4. P2P bypass tunnels
If the protection by P2P bypass TE-LSPs is desired then we consider a full mesh of bypass TELSPs between the neighbors of "P1" crossed by a primary MP2MP TE-LSP. If each neighbor of
"P1" is crossed by at least one primary LSP then we will have N m ( N m − 1) P2P bypass TELSPs. Figure 7 illustrates an example where l = 1, N m = 4, N l = 3 . There are two P2P bypass
tunnels started from N1 (those in red), two P2P bypass tunnels started from N2 (those in white)
and two P2P bypass tunnels started from N3 (those in blue). To define the bandwidth loss observe
174
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

that in the particular case of Figure 7 (i.e. there exists one primary LSP), the two bypass TE-LSPs
started from "N1" use the link "N1—P2". By observing that these two bypass TE-LSPs transport
the same information, one may conclude that the proportion of data duplication on link "N1—P2"
is 1/2. In general, this proportion is equal to ( N l − 2) /( N l − 1), ∀ N l . The same proportion of
duplication exists on links “N2 – P2” and “N3—P2”. We define the bandwidth loss as the data
duplication proportion on such links. The bandwidth loss will occur on such a link if the neighbor
which it connects to "P2" belongs to at least one primary LSP.

RE

D

Figure 7 Protection using P2P bypass tunnels

2.5. P2MP bypass tunnels
Similarly for P2P bypass TE-LSPs, we consider a full mesh of P2MP bypass TE-LSPs between
the neighbors of "P1" crossed by a primary MP2MP TE-LSP. For instance, in order to protect
"P1" in
Figure 8, we will have a total of N l = 3 P2MP bypass TE-LSPs. It can be observed that there is
no bandwidth loss in this case.

175
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

Figure 8 Protection using P2MP bypass tunnels

3. NUMERICAL RESULTS
In this section we investigate some numerical results by using the simulation model in order to
illustrate the advantages of the MP2MP bypass TE-LSPs scenarios. Results are obtained by a
simulator written in C. We emphasize on scalability and bandwidth wastage.
The bandwidth wastage has been defined in Section 2 above.
The scalability denotes the number of TE-LSP states. Let us illustrate how to derive this
parameter for the different scenarios presented in Section 2.
For each segment of a bypass TE-LSP crossing a node we must add a state. For instance in
Figure 4, which depicts the MP2MP FC multi-UPN scenario, the number of states required at
node “P2” is equal to four. In Figure 5 (the MP2MP FC single-UPN scenario) eight states are
required, while in Figure 6 (the MP2MP EC scenario) nine states are necessary. In addition, in
Figure 7 (the P2P scenario) twelve states are added while in
Figure 8 (the P2MP scenario) nine states are needed.
As previously mentioned, we consider that for each primary LSP, the N l nodes that it traverses
are randomly uniformly distributed. Next we derive the number of states for the five scenarios:
P2P bypass TE-LSPs, P2MP bypass TE-LSPs, FC-multi UPN, FC-single UPN and EC. In
addition we estimate the traffic duplication in the P2P bypass TE-LSPs case and the bandwidth
loss in the MP2MP case (FC-multi and single UPN cases).

176
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

Figure 9 Number of states (z-axis) as function of N m and l for N l = 0 . 6 × N
of 0 . 6 × N m )

m

 (i.e. the integer part

In Figure 9 we plot the number of states as function of N m and the number of primary LSPs.

N l is chosen as the integer part of 0.6 × N m . Figure 9 can be used to know the difference between
the MP2MP scenarios and the P2P/P2MP scenarios as function of the degree (i.e. N m ) of a core
node. Such study may help operators to show which scenario is suitable for their networks
depending on the connectivity of the network and the number of edge nodes which is represented
by the number of LSPs (i.e. one should expect that the number of LSPs increases as the number of
edge nodes increases). Figure 9 shows also that MP2MP scenarios behave better in terms of
scalability than the P2P and P2MP bypass TE-LSPs scenarios. In particular, the MP2MP ECbypass TE-LSPs scenario enhances the scalability with respect to P2P and P2MP scenarios
without leading to bandwidth loss. One may remark that as the degree of "P1" increases as the
MP2MP scenarios become more interesting in terms of scalability. This better scalability
compared to the use of P2P and P2MP bypass TE-LSPs can be explained by observing that the
number of states in P2P case is in the order of N l

2

and in P2MP case is of the order of lN l

2

while it is proportional to N l or N m for the three MP2MP bypass TE-LSP scenarios. The
number of states for the case MP2MP FC-bypass TE-LSPs multi-UPN is simply N m .
The bandwidth loss is given in Figure 10. Since the difference between N l and N m is not severe
( N l is less than or equal to 0.6 × N m ) the bandwidth loss for the MP2MP scenarios is less than
the bandwidth loss for the P2P case. Figure 10 shows that as N m and the number of LSP increase,
the bandwidth loss for the P2P case becomes more and more unacceptable. Indeed, as
N m increases, N l will also increase (because N l is the integer part of 0.6 × N m ) and hence the
average number of nodes, neighbors of "P1", crossed by primary LSPs will increase and hence
177
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

the bandwidth loss increases. The increase in the number of LSPs will increase the bandwidth loss
for the same reason.
Surely, if the difference between N l and N m is high we should expect a high bandwidth loss for
the MP2MP FC-bypass TE-LSPs scenarios. This is shown in Figure 11 where we consider that
N l = 3 regardless of the value of N m . In this case the bandwidth loss for the MP2MP FC-bypass
TE-LSPs scenarios will continue increasing as N m increases.
However, Figure 11 shows that the bandwidth loss in the case of the P2P bypass TE-LSPs
remains greater than that of the MP2MP scenarios. One may notice (Figure 11) that even with
N l constant and for a given number of primary LSPs, the bandwidth loss in the case of P2P
bypass TE-LSPs increases as N m increases. This is because as N m increases, the probability that
the primary LSPs cross more nodes, neighbors of "P1", increases.

P2P

MP2MP( FC Bypass tunnels)

95

40

90
38
80

Bandwidth loss (%)

Bandwidth loss (%)

85

75
70
65

36
34
32

60
30
55
50

28

10

10
20
5

15

# of primary LSPs

10
0

5

Nm

20
5

15
10

# of primary LSPs
0

Figure 10 Bandwidth loss for N l = 0 . 6 × N

Nm

5

m



178
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014
P2P

MP2MP (FC Bypass tunnels)

80

85

75

80

70

Bandwidth loss (%)

85

90

Bandwidth loss (%)

95

75
70
65

65
60
55

60

50

55

45

50

40

10

10
20

5
# of primary LSPs

15
10
0

5

Nm

20
5

15

# of primary LSPs

10
0

Figure 11 Bandwidth loss for N l = 3 ∀ N

Nm

5

m

To conclude: the EC-bypass case, which does not lead to bandwidth loss, has shown good
performance also in terms of scalability. The FC-bypass multi-UPN case is the best in regards of
enhancing the scalability but it leads to bandwidth loss if N l < N m . However for many realistic
cases we have shown that this bandwidth loss is less than that of P2P bypass TE-LSPs. The FCbypass single-UPN has the same bandwidth loss as the FC-bypass multi-UPN but with more
number of states. Finally, in almost all cases the P2MP bypass TE-LSPs case has the worst
performance in terms of scalability because the number of states is of the order of lN l 2 . As one
may have observed, the reduction in the number states is caused by a reduction in the number of
bypass TE-LSPs, i.e. scalability in both control and data plane is enhanced by using MP2MP
bypass TE-LSPs.

4. CONCLUSIONS
In this paper we investigated a simulation model in order to evaluate the performance of fast
reroute using multipoint to multipoint hierarchy. We have evaluated several multipoint to
multipoint hierarchy scenarios depending on the number of leaves of a MP2MP bypass TE-tunnel
and on the number of primary MP2MP TE-tunnels that can be encapsulated into one MP2MP
bypass TE-tunnel. We demonstrated that multipoint to multipoint hierarchy leads to improve
networks’ scalability compared to existing P2P and P2MP fast reroute mechanisms. Also, we
studied the impact of nodes degree and the number of primary TE-LSPs on the data plane
bandwidth wastage. We concluded that in most cases the proposed MP2MP scenarios lead to a
good tradeoff between the scalability and bandwidth wastage when compared to P2P or P2MP
scenarios. In particular, the best performance is exhibited by the MP2MP exact covering scenario

179
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014

REFERENCES
[1]

Chaitou, M. and Le Roux, J.L. (2008) ‘Multi-Point to Multi-Point Traffic Engineering’, in
Proceedings of IEEE ISCC, Marrakech, Morocco, July 2008, Digital Object Identifier:
10.1109/ISCC.2008.4625646, www.ieeexplore.ieee.org

[2]

Pan, P., Swallow, G. and Atlas, A. (2005) ‘Fast Reroute Extensions to RSVP-TE for LSP Tunnels’
RFC 4090 http://www.ietf.org/rfc/rfc4090.txt?number=4090

[3]

Aggarwal, R., Papadimitriou, D. and Yasukawa, S. (2007) ‘Extensions to RSVP-TE for Point-toMultipoint TE-LSPs’ RFC 4875 http://www.ietf.org/rfc/rfc4875.txt?number=4875

[4]

Le Roux, J-L. (2008) ‘P2MP MPLS-TE Fast Reroute with P2MP bypass Tunnels’ Work in progress,
draft-ietf-mpls-p2mp-te-bypass-02.txt

[5]

Aggarwal, R. (2008) ‘MPLS Upstream Label Assignment and Context Specific Label Space’ RFC
5331, http://tools.ietf.org/html/rfc5331

[6]

Aggarwal, R., LeRoux, J-L. (2010) ‘MPLS Upstream Label Assignment for RSVP-TE’ Work in
progress, draft-ietf-mpls-rsvp-upstream-05.txt

[7]

Farrel, A., et al (2006) ‘Encoding of Attributes for MPLS Label Switched Path (LSP) Establishment
Using RSVP-TE’ RFC 4420, http://www.ietf.org/rfc/rfc4420.txt?number=4420

[8]

Chaitou, M., Le Roux, J.L. (2008) ‘Fast ReRoute Extensions for Multi-Point to Multi-Point MPLS
tunnels’, in Proceedings of IEEE HPSR, Shanghai, China, May 2008, www.ieeexplore.ieee.org

[9]

Carlton Andre Thompson, et al (2013) ‘A Distributed IP-Based Telecommunication System using
SIP’, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6,
November 2013

Authors
Mohamad Chaitou received an M.S. degree in computer and communications engineering from the
Lebanese University of Beirut, Lebanon in 2002, and an M.S. degree in networking from the University of
Pierre et Marie Curie (Paris 6), France, in 2003. In 2006, He obtained a Ph.D. degree in computer science
from Telecom SudParis (TSP), France. From 2007 to 2008 He worked at Orange labs as a R&D engineer
and He contributed to the development of the MPLS traffic engineering technology through several patents
and research papers. He also contributed to RFC 6006 at the IETF. From 2008 to 2010, He worked as a
consultant engineer for the account of Bouygues Telecom where He was involved in the convergence of IP
backbone networks. Since 2010, He is an assistant professor at the Lebanese university. He is working in
several research fields including: traffic engineering of enterprise networks, multicast, optical networks,
performance evaluation and probabilistic modeling, cloud computing and wireless sensor networks
Hussein CHARARA received an M.S. degree in Computer and Communications Engineering from the
Lebanese University, Lebanon in 2002, and an M.S. degree in Networking and Telecommunications from
the Institut National Polytechnique (INP-ENSEEIHT), France, in 2003. In 2007, He obtained a Ph.D.
degree in Network, Telecom, Systems and Architecture from INP - IRIT, France. From 2006 to 2009 He
worked for AIRBUS and THALES AV avionics as a R&D Engineer and PM. He contributed to the
implementation & development of the Real time embedded AFDX networks such as for A380, A400M and
Soukhoï RRJ programs. From 2009 to 2010, He worked for the ARECS GmbH - München where He was
involved in the GPS/Galileo receivers modeling and simulations. Since 2010, He is an assistant professor
at the Lebanese university. He is working in several research fields including: Traffic engineering of real
time network, Performance Evaluation and QoS, Avionics and wireless sensor networks.
180

More Related Content

What's hot

A New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksA New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksVishal Sharma, Ph.D.
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsSpiros Louvros
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACHEditor IJCATR
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...IDES Editor
 
IRJET-Route Optimization based on Dynamic Mobile Node Selection
IRJET-Route Optimization based on Dynamic Mobile Node SelectionIRJET-Route Optimization based on Dynamic Mobile Node Selection
IRJET-Route Optimization based on Dynamic Mobile Node SelectionIRJET Journal
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networksambitlick
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...IOSR Journals
 
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...Syeful Islam
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsIJCNCJournal
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
MFMP Vs ECMP Under RED Queue Management
MFMP Vs ECMP Under RED Queue ManagementMFMP Vs ECMP Under RED Queue Management
MFMP Vs ECMP Under RED Queue ManagementCSCJournals
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File MulticastYoss Cohen
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on bufferingenioustech
 
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...ijmnct
 

What's hot (19)

A New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksA New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM Networks
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Broadcast in Hypercube
Broadcast in HypercubeBroadcast in Hypercube
Broadcast in Hypercube
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACH
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...
 
IRJET-Route Optimization based on Dynamic Mobile Node Selection
IRJET-Route Optimization based on Dynamic Mobile Node SelectionIRJET-Route Optimization based on Dynamic Mobile Node Selection
IRJET-Route Optimization based on Dynamic Mobile Node Selection
 
19
1919
19
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
 
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...
 
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...Performance Evaluation of Finite Queue Switching  Under Two-Dimensional M/G/1...
Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1...
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
MFMP Vs ECMP Under RED Queue Management
MFMP Vs ECMP Under RED Queue ManagementMFMP Vs ECMP Under RED Queue Management
MFMP Vs ECMP Under RED Queue Management
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
Impact of le arrivals and departures on buffer
Impact of  le arrivals and departures on bufferImpact of  le arrivals and departures on buffer
Impact of le arrivals and departures on buffer
 
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
 

Viewers also liked

Regressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsRegressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsIJCNCJournal
 
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...IJCNCJournal
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousIJCNCJournal
 
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
 
Infrastructure of services for a smart city
Infrastructure of services for a smart cityInfrastructure of services for a smart city
Infrastructure of services for a smart cityIJCNCJournal
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...IJCNCJournal
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
 
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...IJCNCJournal
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet aIJCNCJournal
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devicesIJCNCJournal
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distanceIJCNCJournal
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocolIJCNCJournal
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
 
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...IJCNCJournal
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeoutIJCNCJournal
 
Priority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsPriority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
 

Viewers also liked (19)

Regressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsRegressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurements
 
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneous
 
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
 
Infrastructure of services for a smart city
Infrastructure of services for a smart cityInfrastructure of services for a smart city
Infrastructure of services for a smart city
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...
 
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devices
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distance
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocol
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
 
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeout
 
Priority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsPriority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsns
 

Similar to Evaluation of scalability and bandwidth

An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsAn Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsEM Legacy
 
2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospfAdi Nugroho
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMESOPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMESEM Legacy
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic EngineeringAPNIC
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACHEditor IJCATR
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicEricsson
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
 
Next generation-ptn-white-paper
Next generation-ptn-white-paperNext generation-ptn-white-paper
Next generation-ptn-white-paperslahiri00
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
 
fdocuments.in_lte-eutran-protocol-pdf.pdf
fdocuments.in_lte-eutran-protocol-pdf.pdffdocuments.in_lte-eutran-protocol-pdf.pdf
fdocuments.in_lte-eutran-protocol-pdf.pdfSaidHaman
 
A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksChandan Thakur
 

Similar to Evaluation of scalability and bandwidth (20)

An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsAn Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
 
2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospf
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMESOPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
V25112115
V25112115V25112115
V25112115
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACH
 
MPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - BasicMPLS Deployment Chapter 1 - Basic
MPLS Deployment Chapter 1 - Basic
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
 
Next generation-ptn-white-paper
Next generation-ptn-white-paperNext generation-ptn-white-paper
Next generation-ptn-white-paper
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 
10 fn s22
10 fn s2210 fn s22
10 fn s22
 
10 fn s22
10 fn s2210 fn s22
10 fn s22
 
A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...
A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...
A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...
 
135 bombay iitb presentation dec10
135 bombay iitb presentation dec10135 bombay iitb presentation dec10
135 bombay iitb presentation dec10
 
fdocuments.in_lte-eutran-protocol-pdf.pdf
fdocuments.in_lte-eutran-protocol-pdf.pdffdocuments.in_lte-eutran-protocol-pdf.pdf
fdocuments.in_lte-eutran-protocol-pdf.pdf
 
A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networks
 

More from IJCNCJournal

DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 

More from IJCNCJournal (20)

DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Evaluation of scalability and bandwidth

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 EVALUATION OF SCALABILITY AND BANDWIDTH EFFICIENCY OF MULTIPOINT TO MULTIPOINT HIERARCHY FOR FAST RECOVERY IN MPLS NETWORKS Mohamad Chaitou1 and Hussein Charara1 1 Lebanese University, Faculty of Science, Lebanon ABSTRACT Multi-Point to Multi-Point Traffic Engineering (MP2MP-TE) leads to an important scalability in Multi Protocol Label Switching-Traffic Engineering (MPLS-TE) networks. This paper emphasizes on the support of Fast-reroute (FRR) in MPLS-TE networks by using MP2MP bypass TE-tunnels. Hence, one MP2MP bypass TE-tunnel can be used to protect several primary TE-tunnels. During failure, the primary TE-tunnel is encapsulated into the MP2MP bypass TE-tunnel which calls for defining a new type of MPLS hierarchy, i.e. the multipoint to multipoint hierarchy. In this paper we present a simulation study that evaluates several fast rerouting scenarios depending on the number of leaves of a MP2MP bypass TE-tunnel and on the number of primary TE-tunnels that can be encapsulated into one MP2MP bypass TE-tunnel. In particular, the scalability/bandwidth efficiency tradeoff between these schemes is analyzed and valuable comparisons with the existing approaches are presented. KEYWORDS Simulations; MPLS; traffic engineering; fast reroute; multicast; multipoint-to-multipoint 1. INTRODUCTION MP2MP MPLS-TE tunnels (Multi-Point to Multi-Point, Multi Protocol Label Switching-Traffic Engineering tunnels), which have been defined in [1], lead to an important scalability in MPLSTE networks. This is due to the reduction in the number of TE-tunnels (a.k.a TE-LSP: TE-Label Switched Path) needed to maintain multipoint connectivity between edge routers. Reducing the number of TE-LSPs is of prime importance as it improves, in the control plane, the scalability of the RSVP-TE (Resource reSerVation Protocol) signaling protocol by decreasing the memory and CPU consumed on a router. Indeed, the scalability in the control plane is defined by the number of states required in order to establish the TE-LSPs. Each TE-LSP needs at least one state in each node it traverses. A state denotes the data information that must be stored at a node in order to maintain a TE-LSP. These states are of soft nature, that is, they should have to be refreshed at regular time intervals basis which creates a heavy burden on the routers CPUs. In fact, control plane traffic is processed by the CPU and not in hardware. In addition, reducing the number of TE-LSPs reduces the length of MPLS tables in the data plane. DOI : 10.5121/ijcnc.2014.6111 167
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 As an important application of MP2MP-TE tunnels is the support of Fast Reroute (FRR) procedures in order to protect point-to-point and point-to-multipoint TE-LSPs because they are particular cases of MP2MP TE-LSPs. FRR is of prime importance for Multimedia applications such as VoIP, IPTV or video conferencing which have strong resiliency requirements, with a target of sub-50ms recovery upon link and/or node failure. However, a scalability problem arises when the traffic is of multicast nature such as IPTV (point to multipoint) or video conferencing (multipoint to multipoint). FRR has been firstly defined in order to protect point to point (P2P) TE-LSPs. A primary P2P TE-LSP is protected by mean of a P2P TE-LSP, called bypass tunnel that encapsulates a backup P2P TE-LSP [2]. This is denoted as point to point MPLS hierarchy. That is, a bypass TE-LSP connecting the upstream node of the protected element, called Point of Local Repair (PLR), to the downstream node of the protected element, called Merge Point (MP), is used to encapsulate the backup P2P TE-LSP during failure. To protect a primary point to multipoint (P2MP) TE-LSP, the use of point to point hierarchy is proposed in [3]. This method consists of establishing as many P2P bypass tunnels as the number of merge points downstream of the protected elements, which leads to a scalability problem. The use of point to multipoint MPLS hierarchy [4][5][6][7], however, helps in relieving the scalability problem since only one P2MP bypass tunnel is needed to protect an element. Due to its bidirectional nature, the protection of an MP2MP primary TE-LSP by using point to point and /or point to multipoint hierarchy would cause a scalability problem since a full mesh of P2P or P2MP bypass TE-LSPs would have to be established between all nodes of the primary MP2MP TE-LSP adjacent to the protected element. To overcome the above limitations, [7] proposed the use of multipoint to multipoint hierarchy i.e. the use of an MP2MP bypass TE-LSP to protect a link and/or a node of a primary MP2MP TELSP. Hence, one MP2MP bypass TE-LSP may encapsulate one or several MP2MP primary TELSPs, which is an important scalability improvement. In addition, an MP2MP bypass tunnel can be used to encapsulate several primary P2P and/or P2MP TE-LSP which leads to an additional improvement of the scalability compared to the point to multipoint hierarchy. Note that in [7] we focused on the signaling aspects, i.e. the control plane procedures, in order to support the multipoint to multipoint hierarchy. Also, we provided some architecture examples and presented a simple simulation study. In this paper we present an extended simulation study in order to evaluate the performance of multipoint to multipoint hierarchy. Several scenarios are illustrated and evaluated. Indeed, in one of the scenarios we assume that the leaves of an MP2MP bypass TE-LSP cover all neighbors of a protected element while in another scenario we assume that only a subset of these neighbors, that is only the nodes of the primary MP2MP TE-LSP adjacent to the protected element, are covered. Another important aspect reflected by the scenarios is the number of primary MP2MP TE-LSPs that can be encapsulated into one MP2MP bypass tunnel. This aspect is impacted by the selection of the node that constructs the MP2MP bypass tunnel, i.e. the node that calculates the path of the MP2MP bypass tunnel and that signals it in the control plane. We call this node “Upstream Protecting Node” (UPN). A detailed discussion about the determination of this node is given in 168
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 [7] and it is beyond the scope of this paper. Moreover, several heuristics that can be used in order to calculate the path of the MP2MP bypass tunnel have been discussed in [1]. A scalability/bandwidth tradeoff exists between the different scenarios presented by this paper. We compare such scenarios with the use of P2P and P2MP bypass TE-LSPs by means of simulations. Without loss of generality, the simulation model considers the protection of primary MP2MP TELSPs only. Indeed, primary P2P and P2MP TE-LSPs are particular cases of primary MP2MP TELSPs. Our proposed model which incorporates traffic engineering in multi-point to multi-point environments is a novel contribution in order to support real time applications such as audio conferencing over IP networks [9]. This paper is organized as follows. Section 2 explains the scenarios that will be considered by the simulation model. In Section 3 we present several numerical examples to evaluate our propositions. Finally, Section 4 concludes the paper. 2. SIMULATION SCENARIOS AND ASSUMPTIONS In this section we discuss the different scenarios and assumptions that will be evaluated by the simulation model. We consider l , l ≥ 1 primary MP2MP TE-LSPs to be protected as illustrated in Figure 1. These LSPs are named respectively: primary TE-LSP1, primary TE-LSP2 ... primary TE-LSP l . They cross a node named “P1”, which has N m , N m ≥ 2 neighbors. We assume that these LSPs have the same characteristics (e.g. the same bandwidth requirements). Each of those primary LSPs crosses the same number of nodes N l ,2 ≤ N l ≤ N m among the neighbors of "P1" but not necessarily the same set of neighbors (for the sake of simplicity, Figure 1 shows that these primary LSPs cross the same set of neighbors, N1 , N 2 ...N l . However, in the simulation model we consider the case where each primary TE-LSP traverses a number N l of nodes randomly uniformly distributed among the N m neighbors of "P1": N1 , N 2 ...N m ). 169
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 Figure 1 An example of the scenarios used in the simulation model Figure 1 shows also a MP2MP bypass tunnel that is signaled such that it crosses a network connected to the neighbors of "P1" without using any link between "P1" and any of its neighbors. Hence, this bypass tunnel protects the traffic of all the primary TE-LSPs in the case of the failure of “P1” or any of the links N1—P1, N2—P1 … Nl—P1. Note that the MP2MP bypass TE-LSP can be used to protect P2P (Nl=2), P2MP (Nl>=2 with only one source and several destinations) and MP2MP TE-LSPs (Nl>=2 with several sources and several destinations). Another important issue is the node that builds or selects the MP2MP bypass tunnel, i.e. the node that calculates the path of the MP2MP bypass tunnel and that signals it in the control plane. A detailed discussion about the determination of this node is given in [7] and it is beyond the scope of this paper. However, it should be mentioned that this node is one of the neighbors of the node to be protected, e.g. node P1 in Figure 1, and it is determined independently for each primary TELSP. For instance, how this node is determined for primary TE-LSP1 in Figure 1 ? This node is one of the neighbors of P1 that are members of primary TE-LSP1 which are the nodes N1 , N 2 ...N l . We suppose that this node is randomly selected among these nodes. Similarly, this node is determined independently for each primary TE-LSP. In the following, this node is called Upstream Protecting Node (UPN). In the simulation model we consider three cases for the MP2MP bypass tunnel. In addition, we take into account the cases of protecting the primary TE-LSPs by P2P and P2MP bypass tunnels respectively. Two performance criterions will be used in order to compare between these scenarios: the bandwidth wastage and the number of states caused by signaling the bypass TELSPs through a network that is used to bypass the primary TE-LSPs (see Figure 1). In order to simplify the simulation model and without loss of generality we can consider that this network is 170
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 reduced to one node "P2" as illustrated in Figure 2. That is, in the model we are interested by calculating the number of states in "P2". Note that in the general case, these states are spread among several nodes of the bypass network (Figure 1). Figure 2 The bypass network is replaced by one node 2.1. MP2MP bypass tunnel: Case 1 In this case, we assume that regardless of the number of the primary TE-LSPs, only one MP2MP bypass tunnel exists. This has two consequences. First, the MP2MP bypass tunnel should have as leaves all the neighbors of the node to be protected, e.g. node P1 in Figure 3. In the case of Figure 3, the leaves are then the nodes N1 , N 2 ...N m . This is because it cannot be a priori predicted which nodes of the neighbors of P1 will be crossed by a primary TE-LSP (recall from the above discussion that each primary TE-LSP crosses a number N l of nodes randomly uniformly distributed among the N m neighbors of "P1": N1 , N 2 ...N m ). Hence, we assume the worst case where the group of all the primary TE-LSPs crosses all the neighbors of P1. Second, since the UPN is selected randomly and independently for each primary TE-LSP as described above, this means that it may exists several UPNs in the MP2MP bypass tunnel. For the above two reasons, Case 1 is henceforth called Full Covering (FC) multi-UPN mode. 171
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 ... Figure 3 The full covering multi-UPN scenario It can be observed from Figure 3 that the bandwidth wastage occurs at nodes that do not belong to any of the primary TELSPs such as nodes N l +1 ,..., N m . Figure 4 below shows an example where l = 3, N m = 4, N l = 3 . That is, there are three primary TE-LSPs ( l = 3 ) and four neighbors for P1 ( N m = 4 ) and each primary TE-LSP crosses three neighbors of P1 ( N l = 3 ). Note that there is only MP2MP bypass tunnel and that node N m should drop the traffic of the three primary TE-LSPs. Figure 4 An example of the full covering multi-UPN scenario 172
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 2.2. MP2MP bypass tunnel: Case 2 In this case, the full covering assumption of Case 1 is adopted. However, we suppose that one MP2MP bypass tunnel encapsulates a subset of the primary LSPs crossing a subset of the neighbors of "P1": those that have the same UPN. In other words, for each subset of primary TELSPs that have the same UPN there will be a separate MP2MP bypass tunnel. Hence, Case 2 is called FC single-UPN mode. Figure 5 An example of the full covering single-UPN scenario Figure 5 shows an example where l = 3, N m = 4, N l = 3 . Both primary TE-LSP 1 and primary TE-LSP2 in addition to primary TE-LSP3 pass through P1 and through the following subset of nodes among its neighbors: N1, N2, N3. We assume that the UPN of both primary TE-LSP1 and primary TE-LSP2 is node N1, while node N2 is the UPN of primary TE-LSP3. This implies that primary TE-LSP1 and primary TE-LSP2 will be encapsulated by the same MP2MP bypass tunnel while a second MP2MP bypass tunnel is required for primary TE-LSP3. Both bypass tunnel have the set of nodes N1, N2, N3 and N4, i.e. all the neighbors of P1, as leaves. Hence, node Nm will drop the traffic belonging to the three primary TE-LSPs 2.3. MP2MP bypass tunnel: Case 3 In this case, the full covering assumption of both Case 1 and Case 2 is no longer valid. However, we consider that one MP2MP bypass tunnel should encapsulate those primary TE-LSPs which cross exactly the same set of nodes among the neighbors of “P1”; in addition, these primary TELSPs should have the same UPN. 173
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 For instance, suppose that in Figure 6 below, we have 3 primary TE-LSPs and that node P1 has 4 neighbors N1, N2, N3 and N4. Suppose that: primary TE-LSP1 and primary TE-LSP2 cross P1, N1, N2 and N3 while primary TE-LSP3 crosses P1, N2, N3 and N4. Suppose that the UPNs are: N1 for primary TE-LSP1, N2 for primary TE-LSP2 and N3 for primary TE-LSP3. What should be the number of MP2MP bypass tunnels in this case? The answer is three. Indeed, primary TE-LSP1 and primary TE-LSP2 cannot be encapsulated into the same MP2MP bypass tunnel although they have the same set of nodes crossing P1 (nodes N1, N2 and N3). This is because they have two different UPNs (N1 for primary TE-LSP1 and N2 for primary TE-LSP2). In addition, since primary TE-LSP3 crosses a different set of nodes among the neighbors of P1 (nodes N2, N3 and N4), it should be encapsulated into a separate MP2MP bypass tunnel. Case 3 is henceforth called Exact Covering (EC) scenario. The advantage of the EC mode is that the bandwidth wastage observed in the full covering modes (Case 1 and Case 2 above) is avoided. However, it incurs a control plane overhead burden which is discussed in [7]. Figure 6 An example of the exact covering scenario 2.4. P2P bypass tunnels If the protection by P2P bypass TE-LSPs is desired then we consider a full mesh of bypass TELSPs between the neighbors of "P1" crossed by a primary MP2MP TE-LSP. If each neighbor of "P1" is crossed by at least one primary LSP then we will have N m ( N m − 1) P2P bypass TELSPs. Figure 7 illustrates an example where l = 1, N m = 4, N l = 3 . There are two P2P bypass tunnels started from N1 (those in red), two P2P bypass tunnels started from N2 (those in white) and two P2P bypass tunnels started from N3 (those in blue). To define the bandwidth loss observe 174
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 that in the particular case of Figure 7 (i.e. there exists one primary LSP), the two bypass TE-LSPs started from "N1" use the link "N1—P2". By observing that these two bypass TE-LSPs transport the same information, one may conclude that the proportion of data duplication on link "N1—P2" is 1/2. In general, this proportion is equal to ( N l − 2) /( N l − 1), ∀ N l . The same proportion of duplication exists on links “N2 – P2” and “N3—P2”. We define the bandwidth loss as the data duplication proportion on such links. The bandwidth loss will occur on such a link if the neighbor which it connects to "P2" belongs to at least one primary LSP. RE D Figure 7 Protection using P2P bypass tunnels 2.5. P2MP bypass tunnels Similarly for P2P bypass TE-LSPs, we consider a full mesh of P2MP bypass TE-LSPs between the neighbors of "P1" crossed by a primary MP2MP TE-LSP. For instance, in order to protect "P1" in Figure 8, we will have a total of N l = 3 P2MP bypass TE-LSPs. It can be observed that there is no bandwidth loss in this case. 175
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 Figure 8 Protection using P2MP bypass tunnels 3. NUMERICAL RESULTS In this section we investigate some numerical results by using the simulation model in order to illustrate the advantages of the MP2MP bypass TE-LSPs scenarios. Results are obtained by a simulator written in C. We emphasize on scalability and bandwidth wastage. The bandwidth wastage has been defined in Section 2 above. The scalability denotes the number of TE-LSP states. Let us illustrate how to derive this parameter for the different scenarios presented in Section 2. For each segment of a bypass TE-LSP crossing a node we must add a state. For instance in Figure 4, which depicts the MP2MP FC multi-UPN scenario, the number of states required at node “P2” is equal to four. In Figure 5 (the MP2MP FC single-UPN scenario) eight states are required, while in Figure 6 (the MP2MP EC scenario) nine states are necessary. In addition, in Figure 7 (the P2P scenario) twelve states are added while in Figure 8 (the P2MP scenario) nine states are needed. As previously mentioned, we consider that for each primary LSP, the N l nodes that it traverses are randomly uniformly distributed. Next we derive the number of states for the five scenarios: P2P bypass TE-LSPs, P2MP bypass TE-LSPs, FC-multi UPN, FC-single UPN and EC. In addition we estimate the traffic duplication in the P2P bypass TE-LSPs case and the bandwidth loss in the MP2MP case (FC-multi and single UPN cases). 176
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 Figure 9 Number of states (z-axis) as function of N m and l for N l = 0 . 6 × N of 0 . 6 × N m ) m  (i.e. the integer part In Figure 9 we plot the number of states as function of N m and the number of primary LSPs. N l is chosen as the integer part of 0.6 × N m . Figure 9 can be used to know the difference between the MP2MP scenarios and the P2P/P2MP scenarios as function of the degree (i.e. N m ) of a core node. Such study may help operators to show which scenario is suitable for their networks depending on the connectivity of the network and the number of edge nodes which is represented by the number of LSPs (i.e. one should expect that the number of LSPs increases as the number of edge nodes increases). Figure 9 shows also that MP2MP scenarios behave better in terms of scalability than the P2P and P2MP bypass TE-LSPs scenarios. In particular, the MP2MP ECbypass TE-LSPs scenario enhances the scalability with respect to P2P and P2MP scenarios without leading to bandwidth loss. One may remark that as the degree of "P1" increases as the MP2MP scenarios become more interesting in terms of scalability. This better scalability compared to the use of P2P and P2MP bypass TE-LSPs can be explained by observing that the number of states in P2P case is in the order of N l 2 and in P2MP case is of the order of lN l 2 while it is proportional to N l or N m for the three MP2MP bypass TE-LSP scenarios. The number of states for the case MP2MP FC-bypass TE-LSPs multi-UPN is simply N m . The bandwidth loss is given in Figure 10. Since the difference between N l and N m is not severe ( N l is less than or equal to 0.6 × N m ) the bandwidth loss for the MP2MP scenarios is less than the bandwidth loss for the P2P case. Figure 10 shows that as N m and the number of LSP increase, the bandwidth loss for the P2P case becomes more and more unacceptable. Indeed, as N m increases, N l will also increase (because N l is the integer part of 0.6 × N m ) and hence the average number of nodes, neighbors of "P1", crossed by primary LSPs will increase and hence 177
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 the bandwidth loss increases. The increase in the number of LSPs will increase the bandwidth loss for the same reason. Surely, if the difference between N l and N m is high we should expect a high bandwidth loss for the MP2MP FC-bypass TE-LSPs scenarios. This is shown in Figure 11 where we consider that N l = 3 regardless of the value of N m . In this case the bandwidth loss for the MP2MP FC-bypass TE-LSPs scenarios will continue increasing as N m increases. However, Figure 11 shows that the bandwidth loss in the case of the P2P bypass TE-LSPs remains greater than that of the MP2MP scenarios. One may notice (Figure 11) that even with N l constant and for a given number of primary LSPs, the bandwidth loss in the case of P2P bypass TE-LSPs increases as N m increases. This is because as N m increases, the probability that the primary LSPs cross more nodes, neighbors of "P1", increases. P2P MP2MP( FC Bypass tunnels) 95 40 90 38 80 Bandwidth loss (%) Bandwidth loss (%) 85 75 70 65 36 34 32 60 30 55 50 28 10 10 20 5 15 # of primary LSPs 10 0 5 Nm 20 5 15 10 # of primary LSPs 0 Figure 10 Bandwidth loss for N l = 0 . 6 × N Nm 5 m  178
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 P2P MP2MP (FC Bypass tunnels) 80 85 75 80 70 Bandwidth loss (%) 85 90 Bandwidth loss (%) 95 75 70 65 65 60 55 60 50 55 45 50 40 10 10 20 5 # of primary LSPs 15 10 0 5 Nm 20 5 15 # of primary LSPs 10 0 Figure 11 Bandwidth loss for N l = 3 ∀ N Nm 5 m To conclude: the EC-bypass case, which does not lead to bandwidth loss, has shown good performance also in terms of scalability. The FC-bypass multi-UPN case is the best in regards of enhancing the scalability but it leads to bandwidth loss if N l < N m . However for many realistic cases we have shown that this bandwidth loss is less than that of P2P bypass TE-LSPs. The FCbypass single-UPN has the same bandwidth loss as the FC-bypass multi-UPN but with more number of states. Finally, in almost all cases the P2MP bypass TE-LSPs case has the worst performance in terms of scalability because the number of states is of the order of lN l 2 . As one may have observed, the reduction in the number states is caused by a reduction in the number of bypass TE-LSPs, i.e. scalability in both control and data plane is enhanced by using MP2MP bypass TE-LSPs. 4. CONCLUSIONS In this paper we investigated a simulation model in order to evaluate the performance of fast reroute using multipoint to multipoint hierarchy. We have evaluated several multipoint to multipoint hierarchy scenarios depending on the number of leaves of a MP2MP bypass TE-tunnel and on the number of primary MP2MP TE-tunnels that can be encapsulated into one MP2MP bypass TE-tunnel. We demonstrated that multipoint to multipoint hierarchy leads to improve networks’ scalability compared to existing P2P and P2MP fast reroute mechanisms. Also, we studied the impact of nodes degree and the number of primary TE-LSPs on the data plane bandwidth wastage. We concluded that in most cases the proposed MP2MP scenarios lead to a good tradeoff between the scalability and bandwidth wastage when compared to P2P or P2MP scenarios. In particular, the best performance is exhibited by the MP2MP exact covering scenario 179
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, January 2014 REFERENCES [1] Chaitou, M. and Le Roux, J.L. (2008) ‘Multi-Point to Multi-Point Traffic Engineering’, in Proceedings of IEEE ISCC, Marrakech, Morocco, July 2008, Digital Object Identifier: 10.1109/ISCC.2008.4625646, www.ieeexplore.ieee.org [2] Pan, P., Swallow, G. and Atlas, A. (2005) ‘Fast Reroute Extensions to RSVP-TE for LSP Tunnels’ RFC 4090 http://www.ietf.org/rfc/rfc4090.txt?number=4090 [3] Aggarwal, R., Papadimitriou, D. and Yasukawa, S. (2007) ‘Extensions to RSVP-TE for Point-toMultipoint TE-LSPs’ RFC 4875 http://www.ietf.org/rfc/rfc4875.txt?number=4875 [4] Le Roux, J-L. (2008) ‘P2MP MPLS-TE Fast Reroute with P2MP bypass Tunnels’ Work in progress, draft-ietf-mpls-p2mp-te-bypass-02.txt [5] Aggarwal, R. (2008) ‘MPLS Upstream Label Assignment and Context Specific Label Space’ RFC 5331, http://tools.ietf.org/html/rfc5331 [6] Aggarwal, R., LeRoux, J-L. (2010) ‘MPLS Upstream Label Assignment for RSVP-TE’ Work in progress, draft-ietf-mpls-rsvp-upstream-05.txt [7] Farrel, A., et al (2006) ‘Encoding of Attributes for MPLS Label Switched Path (LSP) Establishment Using RSVP-TE’ RFC 4420, http://www.ietf.org/rfc/rfc4420.txt?number=4420 [8] Chaitou, M., Le Roux, J.L. (2008) ‘Fast ReRoute Extensions for Multi-Point to Multi-Point MPLS tunnels’, in Proceedings of IEEE HPSR, Shanghai, China, May 2008, www.ieeexplore.ieee.org [9] Carlton Andre Thompson, et al (2013) ‘A Distributed IP-Based Telecommunication System using SIP’, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013 Authors Mohamad Chaitou received an M.S. degree in computer and communications engineering from the Lebanese University of Beirut, Lebanon in 2002, and an M.S. degree in networking from the University of Pierre et Marie Curie (Paris 6), France, in 2003. In 2006, He obtained a Ph.D. degree in computer science from Telecom SudParis (TSP), France. From 2007 to 2008 He worked at Orange labs as a R&D engineer and He contributed to the development of the MPLS traffic engineering technology through several patents and research papers. He also contributed to RFC 6006 at the IETF. From 2008 to 2010, He worked as a consultant engineer for the account of Bouygues Telecom where He was involved in the convergence of IP backbone networks. Since 2010, He is an assistant professor at the Lebanese university. He is working in several research fields including: traffic engineering of enterprise networks, multicast, optical networks, performance evaluation and probabilistic modeling, cloud computing and wireless sensor networks Hussein CHARARA received an M.S. degree in Computer and Communications Engineering from the Lebanese University, Lebanon in 2002, and an M.S. degree in Networking and Telecommunications from the Institut National Polytechnique (INP-ENSEEIHT), France, in 2003. In 2007, He obtained a Ph.D. degree in Network, Telecom, Systems and Architecture from INP - IRIT, France. From 2006 to 2009 He worked for AIRBUS and THALES AV avionics as a R&D Engineer and PM. He contributed to the implementation & development of the Real time embedded AFDX networks such as for A380, A400M and Soukhoï RRJ programs. From 2009 to 2010, He worked for the ARECS GmbH - München where He was involved in the GPS/Galileo receivers modeling and simulations. Since 2010, He is an assistant professor at the Lebanese university. He is working in several research fields including: Traffic engineering of real time network, Performance Evaluation and QoS, Avionics and wireless sensor networks. 180