SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 4 (Jul. - Aug. 2013), PP 59-62
www.iosrjournals.org
www.iosrjournals.org 59 | Page
A way of managing data center networks
1
Shikha Soni, 2
Kreena Mehta, 3
Priyank Sanghavi,
1
be-Extc, Djscoe., 2
be-It, Spit., 3
be-Extc, Djscoe.
Abstract: Evolutionary changes have occurred throughout the various elements of the data centre, starting
with server and storage virtualization and also network virtualization. Motivations for server virtualization
were initially associated with massive cost reduction and redundancy but have now evolved to focus on greater
scalability and agility within the data centre. Data center focused LAN technologies have taken a similar path;
with a goal of redundancy and then to create a more scalable fabric within and between data centres. The
TCP’s congestion control opens the network to denial of service attacks and performance interference.. We
propose a natural evolution of data center transport from TCP to multipath TCP. We show that multipath TCP
can effectively and seamlessly use available bandwidth, providing improved throughput and better fairness in
these new topologies when compared to single path TCP and randomized flow-level load balancing.
I. Introduction
Multipath transport protocols have the potential to greatly improve the performance and resilience of
Internet traffic flows. The basic idea is that if flows are able to simultaneously use more than one path through
the network, then they will be more resilient to problems on particular paths (e.g. transient problems on a radio
interface), and they will be able to pool capacity across multiple links.
These multiple paths might be obtained for example by sending from multiple interfaces, or sending to
different IP addresses of the same host, or by some form of explicit path control. Multipath-capable flows should
be designed so that they shift their traffic from congested paths to uncongested paths, so that the Internet will be
better able to accommodate localized surges in traffic and use all available capacity. In effect, multipath
congestion control means that the end systems take on a role that is normally associated with routing, namely
moving traffic onto paths that avoid congestion hotspots, at least to whatever extent they can given the paths
they have available. When a flow shifts its traffic onto less congested paths, then the loss rate on the less
congested path will increase and that on the more congested path will decrease; the overall outcome with many
multipath flows is that the loss rates across an interconnected network of paths will tend to equalize. This is a
form of load balancing, or more generally resource pooling. Multipath congestion control should be designed to
achieve a fair allocation of resources. For example, if a multipath flow has four paths available and they all
happen to go through the same bottleneck link, and if we simply run TCP’s congestion avoidance independently
on each path, then this flow will grab four times as much bandwidth as it should. In fact, the very idea of
―shifting traffic from one path to another‖ there is some fair total traffic rate, and that extra traffic on one path
should be compensated for by less traffic on the other.
II. Data center networking
From a high-level perspective, there are four main components to a data center networking
architecture:
• Physical topology
• Routing over the topology
• Selection between the paths supplied by routing
• Congestion control of traffic on the selected paths
These are not independent; the performance of one will depend on the choices made by those preceding
it in the list, and in some cases by those after it in the list. We will discuss each in turn, but it is worth noting
now that MPTCP spans both path selection and congestion control, which is why it is able to offer benefits that
cannot otherwise be obtained.
2.1 Topology
Traditionally data centers have been built using hierarchical topologies: racks of hosts connect to a top-
of-rack switch; these switches connect to aggregation switches; in turn these are connected to a core switch.
Such topologies make sense if most of the traffic flows into or out of the data center. Uneven
distribution of bandwidth takes place if most of the traffic is intra-data center, as is increasingly the trend.
Recent proposals address these limitations. VL2 and FatTree are close [3] topologies that use multiple core
switches to provide full bandwidth between any pair of hosts in the network. They differ in that FatTree uses
larger quantities of lower speed (1 Gb/s) links between switches, whereas VL2 uses fewer faster (10Gb/s) links.
A way of managing data center networks
www.iosrjournals.org 60 | Page
In contrast, in BCube [6], the hierarchy is abandoned in favour a hypercube-like topology, using hosts
themselves to relay traffic. All three proposals solve the traffic concentration problem at the physical level —
there is enough capacity for every host to be able to transmit out to another randomly chosen host. However the
denseness of interconnection they provide poses its own problems when it comes to determining how traffic
should be routed.
2.2 Routing
Many parallel paths between each pair of hosts are provided by dense interconnection topologies. We
cannot expect the host itself to know which of these paths is the least loaded, so the routing system itself must
spread traffic across these paths. The simplest solution is to use randomized load balancing, where each flow is
assigned a random path from the set of possible paths. In practice there are multiple ways to implement
randomized load balancing in today’s switches. For example, if each switch uses a link-state routing protocol to
provide Easy Cost Multi-Path (ECMP) forwarding then, based on a hash of 5 tuple in each packet, flows will be
split roughly equally across equal length paths. VL2 provides just such a mechanism over a virtual layer 2
infrastructure. However, in topologies such as BCube, paths vary in length, and simple ECMP cannot access
many of these paths because it only hashes between the shortest paths. A simple alternative is to use multiple
static VLANs to provide multiple paths that expose all the underlying network paths [8]. Either the host or the
1st hop switch can then hash the 5 tuple to determine which path is used. In our simulations, we do not model
dynamic routing; instead we assume that all the paths between a pair of endpoints are available for selection,
whatever mechanism actually does the selection.
2.3 Path Selection
Randomised load balancing cannot achieve the full cross-sectional bandwidth in most topologies even
though solutions such as ECMP or multiple VLANs provide the basis for randomised load balancing as the
default path selection mechanism. The problem is that often a random selection causes hot-spots to develop,
where an unlucky combination of random path selection causes a few links to be under load and links elsewhere
to have little or no load. To address these issues, the use of a centralized flow scheduler has been proposed.
Large flows are assigned to lightly loaded paths and existing flows may be reassigned to maximize
overall throughput [2]. The scheduler does a good job if flows are network-limited, with exponentially
distributed sizes and Poisson arrivals, as shown in Hedera [2]. As dictated by the small number of flows we can
have a small scheduling cost, even if we only schedule the big flows we can fully utilize all the bandwidth.
However, data center traffic analysis shows that flow distributions are not Pareto distributed [5]. In such cases,
the scheduler has to run frequently (100ms or faster) to keep up with the flow arrivals. Yet, the scheduler is
fundamentally limited in its reaction time as it has to retrieve statistics, compute placements and instantiate
them, all in this scheduling period. We show through simulation that a scheduler running every 500ms has
similar performance to randomised load balancing when these assumptions do not hold.
2.4 Congestion Control
The job of matching offered load to available capacity on whichever path was selected is fairly done by
most applications which use single path TCP, and inherit TCP’s congestion control mechanism. Recent research
has shown there are benefits from tuning TCP for data center use, such as by reducing the minimum retransmit
makes MPTCP incrementally deployable, as it is designed to be fair to competing single path TCP traffic, unlike
simply running multiple regular TCP flows between the same endpoints. In addition it moves more traffic off
congested paths than multiple regular TCP flows would. Our hypothesis is that given sufficiently many
randomly chosen paths, MPTCP will find at least one good unloaded path, and move most of its traffic that way.
In doing so, it will relieve congestion on the links that got more than their fair share of RLB-balanced
flows. This in turn will allow those competing flows to achieve their full potential, maximizing the cross-
sectional bandwidth of the network and also improving fairness. Hence worst case performance matters
significantly.
III. Analysis
To validate our hypothesis, we must examine how MPTCP performs in a range of topologies and with
a varying number of sub flows. We must also show how well it performs against alternative systems. To
perform such an analysis is itself challenging - we really want to know how well such deployments will perform
at large scale with real-world transport protocol implementations and with reasonable traffic patterns. Lacking a
huge data center to play with, we have to address these issues independently, using different tools;
• Flow-level simulation to examine idealized large scale behaviour.
• Packet-level simulation to examine more detailed medium scale behaviour.
• Real-world implementation to examine practical limitations at small-scale.
A way of managing data center networks
www.iosrjournals.org 61 | Page
3.1 Large scale analysis
The potential benefits of MPTCP with respect to the three major topologies in the literature are:
FatTree, VL2 and BCube. The baseline for comparison is randomized load balancing RLB using single path
TCP. MPTCP adds additional randomly chosen paths, but then the linked congestion control moves the traffic
within each connection to the least congested sub flows. We use an iterative flow-level simulator to analyze
topologies of up to 10,000 servers. The simulator computes the loss rates for each link based on the offered load,
and adjusts the load accordingly. This simulator does not model flow start-up behaviour and other packet level
effects, but is scalable to very large topologies. Fig. 1 shows the total throughput of all flows when we use a
random permutation matrix where each host sends out (as determined by the TCP response function) to a single
other host. In all three topologies, with the right path selection this traffic pattern should just be able to load the
network to full capacity but not anything more than that. What we observe is that RLB is unable to fill any of
these networks. It performs best in the VL2 topology, where it achieves 77% throughput, but performs much
worse in FatTree and BCube. The intuition is simple: to achieve 100% capacity with RLB, no two flows should
ever traverse the same link. With FatTree, when two TCP flows that could potentially send at 1Gb/s end up on
the same 1Gb/s link, each backs off by 50%, leaving other links underutilized. With VL2, when eleven 1Gb/s
TCP flows end up on the same 10Gb/s link, the effect is much less drastic, hence the reduced performance
penalty. The benefits of MPTCP are clear; as additional sub flows are added, the overall throughput increases.
How many sub flows are needed depends on the topology; the intuition is as before - we need enough
sub flows to overcome the traffic concentration effects of the random path allocation. One might think that the
power of two choices [7] might apply here, providing good load balancing with very few sub flows. However it
does not because the paths are not disjoint. Each sub flow can encounter a congested bottleneck on a single link
along its path, causing the other links along the path to be underutilized. Although such bottleneck links are load
balanced, with FatTree in particular, other links cannot be fully utilized, and it takes more than two sub flows to
spread load across sufficient paths to fully utilize the network. This raises the question of how the number of sub
flows needed scales with the size of the network. 90% of the cross sectional bandwidth is chosen as an arbitrary
utilisation target, and then progressively the number of sub flows used are increased for different networks.. Fig.
2 shows the minimum number of sub flows that can achieve 90% utilization for each size of network. The result
is encouraging: beyond a certain size, the number of sub flows needed does not increase significantly with
network size. For VL2, two sub flows are needed.
(a) FatTree (b) VL2 (c)BCube
Figure 1
For FatTree, eight are needed. This might seem like quite a high number, but for an 8192-node FatTree
network there are 256 distinct paths between each host pair, so only a small fraction of the paths are needed to
achieve full utilization. From the host point of view, eight sub flows is not a great overhead. We also care that
the capacity is allocated fairly between connections, especially for applications where the final result can only be
returned when the last node running a part of a calculation returns its results. At very light load, there are few
collisions, so MPTCP gives little benefits over RLB on FatTree or VL2 topologies. However on BCube,
MPTCP excels because a single flow can use all the host interfaces simultaneously. At the other extreme, under
overload conditions even RLB manages to fill the network, but MPTCP still gives better fairness. FatTree show
substantial improvements over single-path RLB, even for very light or very heavy loads. This shows the
performance benefits of MPTCP are robust across a wide range of conditions. The improvements for BCube are
even greater at lower traffic loads. This is because BCube hosts have multiple interfaces, and MPTCP can use
them all for a single flow at light loads the bottlenecks are the hosts themselves. Many flows collide on either
the sending or receiving host, and MPTCP has no path diversity here. The 10Gb/s links are then not the
bottleneck for the remaining flows under these load levels.
A way of managing data center networks
www.iosrjournals.org 62 | Page
IV. Experimental evaluation
To test with our Linux implementation of MPTCP we used the topology below, which is essentially a
trimmed down FatTree with two paths between each pair of endpoints Our aim is not to verify the simulation
results (we don’t have access to enough machines), but rather to examine the potential downsides to MPTCP
that might arise through practical implementation issues.
Figure 2
V. Conclusions
The modern data centers need adequate efficiency to function, and here MPTCP is a simple solution
that can effectively utilize the dense parallel network topologies which significantly improves throughput and
fairness compared to single path TCP. MPTCP unites path selection and congestion control. This flexibility
allows the creation of cheaper and better network topologies: for instance, cheap multiport network interface
controller (NIC) can be used between hosts allowing much higher throughputs when the network core is
underutilized. For regular single path TCP to use such capacity it is very hard. As with any system, there may be
some costs too: under heavy load, per-packet latency may increase due to timeouts; a little more memory is
needed for receive buffers; and some complexity will be added to OS implementations. Our congestion control
scheme is designed to be compatible with existing TCP behaviour. However, existing TCP has well-known
limitations when coping with long high-speed paths. To this end, Microsoft incorporates Compound TCP in
Vista and Windows 7, although it is not enabled by default, and recent Linux kernels use Cubic TCP [9]. We
believe that Compound TCP should be a very good match for our congestion control algorithm. Compound TCP
kicks in when a link is underutilized to rapidly fill up the pipe, but it falls back to New Reno-like behaviour
once a queue starts to build. Such a delay-based mechanism would be complementary to the work described in
this paper, but would further improve a multipath TCP’s ability to switch to a previously congested path that
suddenly has spare capacity. We intend to investigate this in future work.
References
[1] M. Al-Fares, A. Loukissas, and A. Vahdat. A scalable, commodity data center network architecture. In Proc. SIGCOMM 2010.
[2] M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat. Hedera: Dynamic flow scheduling for data center networks.
In Proc. Usenix NSDI 2010.
[3] C. Clos. A study of non-blocking switching networks. Bell System Technical Journal, 32(5):406–424, 1952.
[4] A. Ford, C. Raiciu, M. Handley, and S. Barre. TCP Extensions for Multipath Operation with Multiple Addresses. Internet-draft,
IETF, 2009.
[5] A. Greenberg el al. VL2: a scalable and flexible data center network. In Proc. ACM Sigcomm 2009.
[6] C. Guo, G. Lu, D. Li, H. Wu, X. Zhang, Y. Shi, C. Tian, Y. Zhang, and S. Lu. Bcube: a high performance, server-centric network
architecture for modular data centers. In Proc. SIGCOMM 2009.
[7] M. Mitzenmacher. The power of two choices in randomized load balancing. IEEE Trans. Parallel Distrib. Syst., 12(10):1094–1104,
2001.
[8] J. Mudigonda, P. Yalagandula, M. Al-Fares, and J. C. Mogul. Spain: Cots data-center ethernet for multipathing over arbitrary
topologies. In Proc. NSDI 2010.
[9] C. Raiciu, D. Wischik, and M. Handley. htsim. http://nrg.cs.ucl.ac.uk/mptcp/implementation.html. [10] V. Vasudevan et al. Safe and
effective fine-grained tcp retransmissions for datacenter communication. In Proc. SIGCOMM 2009.

More Related Content

What's hot

Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmIJSRED
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
Fuessler wkmh03
Fuessler wkmh03Fuessler wkmh03
Fuessler wkmh03hinalala
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...JPINFOTECH JAYAPRAKASH
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETiosrjce
 

What's hot (18)

Authentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless RoutingAuthentication of Secure Data Transmission In Wireless Routing
Authentication of Secure Data Transmission In Wireless Routing
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
 
10
1010
10
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Fuessler wkmh03
Fuessler wkmh03Fuessler wkmh03
Fuessler wkmh03
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETS
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 

Viewers also liked

Color to Gray and back’ using normalization of color components with Cosine, ...
Color to Gray and back’ using normalization of color components with Cosine, ...Color to Gray and back’ using normalization of color components with Cosine, ...
Color to Gray and back’ using normalization of color components with Cosine, ...IOSR Journals
 
Diabetes - How sweet are you
Diabetes - How sweet are youDiabetes - How sweet are you
Diabetes - How sweet are youVASS Yukon
 
SM 435: MGoPro Combine
SM 435: MGoPro CombineSM 435: MGoPro Combine
SM 435: MGoPro CombineKeely Galgano
 
Implementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageImplementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageIOSR Journals
 
Distinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis TechniquesDistinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis TechniquesIOSR Journals
 
Web Mining Research Issues and Future Directions – A Survey
Web Mining Research Issues and Future Directions – A SurveyWeb Mining Research Issues and Future Directions – A Survey
Web Mining Research Issues and Future Directions – A SurveyIOSR Journals
 
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...IOSR Journals
 
Channel Fading Detection in Manets with Hand off Strategy
Channel Fading Detection in Manets with Hand off StrategyChannel Fading Detection in Manets with Hand off Strategy
Channel Fading Detection in Manets with Hand off StrategyIOSR Journals
 
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureIOSR Journals
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementIOSR Journals
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionIOSR Journals
 
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...IOSR Journals
 
Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodIOSR Journals
 
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel SpeakerThe NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speakerinvestnewwest
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 

Viewers also liked (20)

Color to Gray and back’ using normalization of color components with Cosine, ...
Color to Gray and back’ using normalization of color components with Cosine, ...Color to Gray and back’ using normalization of color components with Cosine, ...
Color to Gray and back’ using normalization of color components with Cosine, ...
 
A0610105
A0610105A0610105
A0610105
 
Diabetes - How sweet are you
Diabetes - How sweet are youDiabetes - How sweet are you
Diabetes - How sweet are you
 
SM 435: MGoPro Combine
SM 435: MGoPro CombineSM 435: MGoPro Combine
SM 435: MGoPro Combine
 
Implementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record LinkageImplementation of Matching Tree Technique for Online Record Linkage
Implementation of Matching Tree Technique for Online Record Linkage
 
Audition
AuditionAudition
Audition
 
Distinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis TechniquesDistinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis Techniques
 
Web Mining Research Issues and Future Directions – A Survey
Web Mining Research Issues and Future Directions – A SurveyWeb Mining Research Issues and Future Directions – A Survey
Web Mining Research Issues and Future Directions – A Survey
 
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
Design And Development of A Plug-In Type Wireless Data Logger for Energy Meas...
 
Channel Fading Detection in Manets with Hand off Strategy
Channel Fading Detection in Manets with Hand off StrategyChannel Fading Detection in Manets with Hand off Strategy
Channel Fading Detection in Manets with Hand off Strategy
 
User Identity Verification Using Mouse Signature
User Identity Verification Using Mouse SignatureUser Identity Verification Using Mouse Signature
User Identity Verification Using Mouse Signature
 
A0150106
A0150106A0150106
A0150106
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial Recognition
 
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
Assessment of Serum Gonadotrophins and Prolactin Hormone Levels in In Vitro F...
 
Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set Method
 
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel SpeakerThe NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
 
L0948892
L0948892L0948892
L0948892
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Shakira 4 1
Shakira 4 1Shakira 4 1
Shakira 4 1
 

Similar to A way of managing data center networks

Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...IEEEGLOBALSOFTTECHNOLOGIES
 
DISTRIBUTED TRAFFIC BY LOAD-BALANCING APPROACH FOR AOMDV IN AD-HOC NETWORKS
DISTRIBUTED TRAFFIC BY LOAD-BALANCING APPROACH FOR AOMDV IN AD-HOC NETWORKSDISTRIBUTED TRAFFIC BY LOAD-BALANCING APPROACH FOR AOMDV IN AD-HOC NETWORKS
DISTRIBUTED TRAFFIC BY LOAD-BALANCING APPROACH FOR AOMDV IN AD-HOC NETWORKScscpconf
 
Resource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksResource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksJPINFOTECH JAYAPRAKASH
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSNexgen Technology
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers acrossnexgentech15
 
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacentersnexgentechnology
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKScscpconf
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theKamal Spring
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 

Similar to A way of managing data center networks (20)

Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
C0351725
C0351725C0351725
C0351725
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
 
DISTRIBUTED TRAFFIC BY LOAD-BALANCING APPROACH FOR AOMDV IN AD-HOC NETWORKS
DISTRIBUTED TRAFFIC BY LOAD-BALANCING APPROACH FOR AOMDV IN AD-HOC NETWORKSDISTRIBUTED TRAFFIC BY LOAD-BALANCING APPROACH FOR AOMDV IN AD-HOC NETWORKS
DISTRIBUTED TRAFFIC BY LOAD-BALANCING APPROACH FOR AOMDV IN AD-HOC NETWORKS
 
Resource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksResource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networks
 
In3514801485
In3514801485In3514801485
In3514801485
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
 
Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
 
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networks
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

A way of managing data center networks

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 4 (Jul. - Aug. 2013), PP 59-62 www.iosrjournals.org www.iosrjournals.org 59 | Page A way of managing data center networks 1 Shikha Soni, 2 Kreena Mehta, 3 Priyank Sanghavi, 1 be-Extc, Djscoe., 2 be-It, Spit., 3 be-Extc, Djscoe. Abstract: Evolutionary changes have occurred throughout the various elements of the data centre, starting with server and storage virtualization and also network virtualization. Motivations for server virtualization were initially associated with massive cost reduction and redundancy but have now evolved to focus on greater scalability and agility within the data centre. Data center focused LAN technologies have taken a similar path; with a goal of redundancy and then to create a more scalable fabric within and between data centres. The TCP’s congestion control opens the network to denial of service attacks and performance interference.. We propose a natural evolution of data center transport from TCP to multipath TCP. We show that multipath TCP can effectively and seamlessly use available bandwidth, providing improved throughput and better fairness in these new topologies when compared to single path TCP and randomized flow-level load balancing. I. Introduction Multipath transport protocols have the potential to greatly improve the performance and resilience of Internet traffic flows. The basic idea is that if flows are able to simultaneously use more than one path through the network, then they will be more resilient to problems on particular paths (e.g. transient problems on a radio interface), and they will be able to pool capacity across multiple links. These multiple paths might be obtained for example by sending from multiple interfaces, or sending to different IP addresses of the same host, or by some form of explicit path control. Multipath-capable flows should be designed so that they shift their traffic from congested paths to uncongested paths, so that the Internet will be better able to accommodate localized surges in traffic and use all available capacity. In effect, multipath congestion control means that the end systems take on a role that is normally associated with routing, namely moving traffic onto paths that avoid congestion hotspots, at least to whatever extent they can given the paths they have available. When a flow shifts its traffic onto less congested paths, then the loss rate on the less congested path will increase and that on the more congested path will decrease; the overall outcome with many multipath flows is that the loss rates across an interconnected network of paths will tend to equalize. This is a form of load balancing, or more generally resource pooling. Multipath congestion control should be designed to achieve a fair allocation of resources. For example, if a multipath flow has four paths available and they all happen to go through the same bottleneck link, and if we simply run TCP’s congestion avoidance independently on each path, then this flow will grab four times as much bandwidth as it should. In fact, the very idea of ―shifting traffic from one path to another‖ there is some fair total traffic rate, and that extra traffic on one path should be compensated for by less traffic on the other. II. Data center networking From a high-level perspective, there are four main components to a data center networking architecture: • Physical topology • Routing over the topology • Selection between the paths supplied by routing • Congestion control of traffic on the selected paths These are not independent; the performance of one will depend on the choices made by those preceding it in the list, and in some cases by those after it in the list. We will discuss each in turn, but it is worth noting now that MPTCP spans both path selection and congestion control, which is why it is able to offer benefits that cannot otherwise be obtained. 2.1 Topology Traditionally data centers have been built using hierarchical topologies: racks of hosts connect to a top- of-rack switch; these switches connect to aggregation switches; in turn these are connected to a core switch. Such topologies make sense if most of the traffic flows into or out of the data center. Uneven distribution of bandwidth takes place if most of the traffic is intra-data center, as is increasingly the trend. Recent proposals address these limitations. VL2 and FatTree are close [3] topologies that use multiple core switches to provide full bandwidth between any pair of hosts in the network. They differ in that FatTree uses larger quantities of lower speed (1 Gb/s) links between switches, whereas VL2 uses fewer faster (10Gb/s) links.
  • 2. A way of managing data center networks www.iosrjournals.org 60 | Page In contrast, in BCube [6], the hierarchy is abandoned in favour a hypercube-like topology, using hosts themselves to relay traffic. All three proposals solve the traffic concentration problem at the physical level — there is enough capacity for every host to be able to transmit out to another randomly chosen host. However the denseness of interconnection they provide poses its own problems when it comes to determining how traffic should be routed. 2.2 Routing Many parallel paths between each pair of hosts are provided by dense interconnection topologies. We cannot expect the host itself to know which of these paths is the least loaded, so the routing system itself must spread traffic across these paths. The simplest solution is to use randomized load balancing, where each flow is assigned a random path from the set of possible paths. In practice there are multiple ways to implement randomized load balancing in today’s switches. For example, if each switch uses a link-state routing protocol to provide Easy Cost Multi-Path (ECMP) forwarding then, based on a hash of 5 tuple in each packet, flows will be split roughly equally across equal length paths. VL2 provides just such a mechanism over a virtual layer 2 infrastructure. However, in topologies such as BCube, paths vary in length, and simple ECMP cannot access many of these paths because it only hashes between the shortest paths. A simple alternative is to use multiple static VLANs to provide multiple paths that expose all the underlying network paths [8]. Either the host or the 1st hop switch can then hash the 5 tuple to determine which path is used. In our simulations, we do not model dynamic routing; instead we assume that all the paths between a pair of endpoints are available for selection, whatever mechanism actually does the selection. 2.3 Path Selection Randomised load balancing cannot achieve the full cross-sectional bandwidth in most topologies even though solutions such as ECMP or multiple VLANs provide the basis for randomised load balancing as the default path selection mechanism. The problem is that often a random selection causes hot-spots to develop, where an unlucky combination of random path selection causes a few links to be under load and links elsewhere to have little or no load. To address these issues, the use of a centralized flow scheduler has been proposed. Large flows are assigned to lightly loaded paths and existing flows may be reassigned to maximize overall throughput [2]. The scheduler does a good job if flows are network-limited, with exponentially distributed sizes and Poisson arrivals, as shown in Hedera [2]. As dictated by the small number of flows we can have a small scheduling cost, even if we only schedule the big flows we can fully utilize all the bandwidth. However, data center traffic analysis shows that flow distributions are not Pareto distributed [5]. In such cases, the scheduler has to run frequently (100ms or faster) to keep up with the flow arrivals. Yet, the scheduler is fundamentally limited in its reaction time as it has to retrieve statistics, compute placements and instantiate them, all in this scheduling period. We show through simulation that a scheduler running every 500ms has similar performance to randomised load balancing when these assumptions do not hold. 2.4 Congestion Control The job of matching offered load to available capacity on whichever path was selected is fairly done by most applications which use single path TCP, and inherit TCP’s congestion control mechanism. Recent research has shown there are benefits from tuning TCP for data center use, such as by reducing the minimum retransmit makes MPTCP incrementally deployable, as it is designed to be fair to competing single path TCP traffic, unlike simply running multiple regular TCP flows between the same endpoints. In addition it moves more traffic off congested paths than multiple regular TCP flows would. Our hypothesis is that given sufficiently many randomly chosen paths, MPTCP will find at least one good unloaded path, and move most of its traffic that way. In doing so, it will relieve congestion on the links that got more than their fair share of RLB-balanced flows. This in turn will allow those competing flows to achieve their full potential, maximizing the cross- sectional bandwidth of the network and also improving fairness. Hence worst case performance matters significantly. III. Analysis To validate our hypothesis, we must examine how MPTCP performs in a range of topologies and with a varying number of sub flows. We must also show how well it performs against alternative systems. To perform such an analysis is itself challenging - we really want to know how well such deployments will perform at large scale with real-world transport protocol implementations and with reasonable traffic patterns. Lacking a huge data center to play with, we have to address these issues independently, using different tools; • Flow-level simulation to examine idealized large scale behaviour. • Packet-level simulation to examine more detailed medium scale behaviour. • Real-world implementation to examine practical limitations at small-scale.
  • 3. A way of managing data center networks www.iosrjournals.org 61 | Page 3.1 Large scale analysis The potential benefits of MPTCP with respect to the three major topologies in the literature are: FatTree, VL2 and BCube. The baseline for comparison is randomized load balancing RLB using single path TCP. MPTCP adds additional randomly chosen paths, but then the linked congestion control moves the traffic within each connection to the least congested sub flows. We use an iterative flow-level simulator to analyze topologies of up to 10,000 servers. The simulator computes the loss rates for each link based on the offered load, and adjusts the load accordingly. This simulator does not model flow start-up behaviour and other packet level effects, but is scalable to very large topologies. Fig. 1 shows the total throughput of all flows when we use a random permutation matrix where each host sends out (as determined by the TCP response function) to a single other host. In all three topologies, with the right path selection this traffic pattern should just be able to load the network to full capacity but not anything more than that. What we observe is that RLB is unable to fill any of these networks. It performs best in the VL2 topology, where it achieves 77% throughput, but performs much worse in FatTree and BCube. The intuition is simple: to achieve 100% capacity with RLB, no two flows should ever traverse the same link. With FatTree, when two TCP flows that could potentially send at 1Gb/s end up on the same 1Gb/s link, each backs off by 50%, leaving other links underutilized. With VL2, when eleven 1Gb/s TCP flows end up on the same 10Gb/s link, the effect is much less drastic, hence the reduced performance penalty. The benefits of MPTCP are clear; as additional sub flows are added, the overall throughput increases. How many sub flows are needed depends on the topology; the intuition is as before - we need enough sub flows to overcome the traffic concentration effects of the random path allocation. One might think that the power of two choices [7] might apply here, providing good load balancing with very few sub flows. However it does not because the paths are not disjoint. Each sub flow can encounter a congested bottleneck on a single link along its path, causing the other links along the path to be underutilized. Although such bottleneck links are load balanced, with FatTree in particular, other links cannot be fully utilized, and it takes more than two sub flows to spread load across sufficient paths to fully utilize the network. This raises the question of how the number of sub flows needed scales with the size of the network. 90% of the cross sectional bandwidth is chosen as an arbitrary utilisation target, and then progressively the number of sub flows used are increased for different networks.. Fig. 2 shows the minimum number of sub flows that can achieve 90% utilization for each size of network. The result is encouraging: beyond a certain size, the number of sub flows needed does not increase significantly with network size. For VL2, two sub flows are needed. (a) FatTree (b) VL2 (c)BCube Figure 1 For FatTree, eight are needed. This might seem like quite a high number, but for an 8192-node FatTree network there are 256 distinct paths between each host pair, so only a small fraction of the paths are needed to achieve full utilization. From the host point of view, eight sub flows is not a great overhead. We also care that the capacity is allocated fairly between connections, especially for applications where the final result can only be returned when the last node running a part of a calculation returns its results. At very light load, there are few collisions, so MPTCP gives little benefits over RLB on FatTree or VL2 topologies. However on BCube, MPTCP excels because a single flow can use all the host interfaces simultaneously. At the other extreme, under overload conditions even RLB manages to fill the network, but MPTCP still gives better fairness. FatTree show substantial improvements over single-path RLB, even for very light or very heavy loads. This shows the performance benefits of MPTCP are robust across a wide range of conditions. The improvements for BCube are even greater at lower traffic loads. This is because BCube hosts have multiple interfaces, and MPTCP can use them all for a single flow at light loads the bottlenecks are the hosts themselves. Many flows collide on either the sending or receiving host, and MPTCP has no path diversity here. The 10Gb/s links are then not the bottleneck for the remaining flows under these load levels.
  • 4. A way of managing data center networks www.iosrjournals.org 62 | Page IV. Experimental evaluation To test with our Linux implementation of MPTCP we used the topology below, which is essentially a trimmed down FatTree with two paths between each pair of endpoints Our aim is not to verify the simulation results (we don’t have access to enough machines), but rather to examine the potential downsides to MPTCP that might arise through practical implementation issues. Figure 2 V. Conclusions The modern data centers need adequate efficiency to function, and here MPTCP is a simple solution that can effectively utilize the dense parallel network topologies which significantly improves throughput and fairness compared to single path TCP. MPTCP unites path selection and congestion control. This flexibility allows the creation of cheaper and better network topologies: for instance, cheap multiport network interface controller (NIC) can be used between hosts allowing much higher throughputs when the network core is underutilized. For regular single path TCP to use such capacity it is very hard. As with any system, there may be some costs too: under heavy load, per-packet latency may increase due to timeouts; a little more memory is needed for receive buffers; and some complexity will be added to OS implementations. Our congestion control scheme is designed to be compatible with existing TCP behaviour. However, existing TCP has well-known limitations when coping with long high-speed paths. To this end, Microsoft incorporates Compound TCP in Vista and Windows 7, although it is not enabled by default, and recent Linux kernels use Cubic TCP [9]. We believe that Compound TCP should be a very good match for our congestion control algorithm. Compound TCP kicks in when a link is underutilized to rapidly fill up the pipe, but it falls back to New Reno-like behaviour once a queue starts to build. Such a delay-based mechanism would be complementary to the work described in this paper, but would further improve a multipath TCP’s ability to switch to a previously congested path that suddenly has spare capacity. We intend to investigate this in future work. References [1] M. Al-Fares, A. Loukissas, and A. Vahdat. A scalable, commodity data center network architecture. In Proc. SIGCOMM 2010. [2] M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat. Hedera: Dynamic flow scheduling for data center networks. In Proc. Usenix NSDI 2010. [3] C. Clos. A study of non-blocking switching networks. Bell System Technical Journal, 32(5):406–424, 1952. [4] A. Ford, C. Raiciu, M. Handley, and S. Barre. TCP Extensions for Multipath Operation with Multiple Addresses. Internet-draft, IETF, 2009. [5] A. Greenberg el al. VL2: a scalable and flexible data center network. In Proc. ACM Sigcomm 2009. [6] C. Guo, G. Lu, D. Li, H. Wu, X. Zhang, Y. Shi, C. Tian, Y. Zhang, and S. Lu. Bcube: a high performance, server-centric network architecture for modular data centers. In Proc. SIGCOMM 2009. [7] M. Mitzenmacher. The power of two choices in randomized load balancing. IEEE Trans. Parallel Distrib. Syst., 12(10):1094–1104, 2001. [8] J. Mudigonda, P. Yalagandula, M. Al-Fares, and J. C. Mogul. Spain: Cots data-center ethernet for multipathing over arbitrary topologies. In Proc. NSDI 2010. [9] C. Raiciu, D. Wischik, and M. Handley. htsim. http://nrg.cs.ucl.ac.uk/mptcp/implementation.html. [10] V. Vasudevan et al. Safe and effective fine-grained tcp retransmissions for datacenter communication. In Proc. SIGCOMM 2009.