SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
DOI : 10.5121/ijcnc.2015.7505 57
BANDWIDTH GUARANTEED
MULTICAST ROUTING ALGORITHM
Tran Cong Hung1
, Huynh Thach Thao2
and Cao Thai Phuong Thanh3
1
Post & Telecommunications Institute of Technology, Vietnam
2
VP bank FE Credit, Vietnam
3
Saigon University, Vietnam
ABSTRACT
Computer network is becoming more popular and common, the need to use the broadband connection
services (e-learning - online training, video conferencing - online conference, IPTV - digital TV ...) of
organizations and individuals is increasing. Multicast is an effective mechanism for the transmission of
information and data to many recipients simultaneously. Multicast is a routing problem from a source node
to a receiver node set, also known as the routing from one point to multipoint. The advances in technology
and multimedia applications emerge quickly has provided great motivation for the application of new real-
time multi-point. Many multi-point applications will not function properly if the QoS (quality of service)
can not be guaranteed. Therefore, multi-point algorithms must be able to meet the QoS constraints (cost,
reliability, bandwidth, jitter, delay...). The objective of multicast routing algorithms guarantee QoS is to
provide routing algorithms have the ability to recognize the tree to satisfy the maximum of traffic streams
with QoS requirements. Most multicast algorithms on MPLS (MultiProtocol Label Switching) considered
the unique QoS constraint as bandwidth. The other QoS constraints can be converted into bandwidth
efficiency. Starting from this reality, this paper research multicast routing algorithms guarantee bandwidth
and propose new algorithm compares with existing ones.
KEYWORDS
multicast, quality of service (QoS), routing, guarantee QoS
1.INTRODUCTION
IP network models only provide "best effort", ie the network will try to exploit all possibilities
within the limits but not guaranteed delay and data loss. So when traffic on the network
transmissions exceed the capability of the network, services are not denied but reduced service
quality (delay increases, speed reduces, data loss). IP networks are not suitable for applications
that require real-time [1]. Today, with the explosion of Internet multimedia applications, IPTV
and other broadcast as broadcast TV, video-on-demand (VoD) and similar VoD generated
multicast requirements for core-network service providers. The core-network provides high
availability and QoS to reduce network congestion and use resource efficiency. MPLS multicast
(Figure 1) are best suited to these requirements. Studies on IP multicast over MPLS network (also
known as MPLS multicast) starting from 1999-2000 when only the drafts in the IETF and the
scientific paper is published in IEEE. By 2002, a framework was published in RFC 3353 by
D.Ooms shows an overview of IP multicast in MPLS environment. Currently MPLS multicast is the
big network providers prevail deployment [2], [3], [4].
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
58
MPLS multicast support Layer 2 forwarding on the explicit P2M LSP (point-to-multipoint label
switched path) rather than the conventional shortest path. MPLS multicast routing are described as
follows: (1) the packet is assigned to the difference FEC (Forwarding Equivalence Class) on the
path to an egress LSR (Label Switching Router); (2) the FEC then grouped into traffic trunks, this is
an routing object inside the LSP; (3) the P2M LSP is established between the ingress and egress
LSR. While MPLS provides flexibility in packet switching, but the problems persist when link the
multicast tree layer 3 with P2M LSP layer 2 as well as the integration of QoS for resources
reservation in MPLS multicast. The multicast routing protocols over MPLS recently [5], [6], [7] are
in place to try to overcome these problems.
Figure 1: MPLS Multicast
The paper is divided into four sections: section 1 introduces the MPLS multicast, section 2
presents the related multicast algorithms, section 3 introduces the proposed algorithm, section 4 is
experiment and evaluation, part 5 is conclusion and future development.
2. PROBLEM DEFINITION & RELATED WORK
Quality of Service (QoS) include bandwidth, delay, jitter...but most scientific studies use
bandwidth constrained for other QoS constraints can be converted into efficient bandwidth
requirement [8]. The proposed algorithm select multicast tree guaranteed bandwidth to settle for
multicast scenarios in multi-point applications.
2.1. PROBLEM DEFINITION
Given directed graph G(V,E,C). V is the set of all network nodes (includes switches, routers and
hosts…), v∈V is a node, N=|V| is the total number of nodes. E is the set of edges, (u,v)∈E is a
path (u,v)=u→v, L=|E| is the total number of edges. C is the set of link bandwidth, c(u,v)∈C is
capacity of link (u,v). Cr is the set of residual capacity, cr(u, v)∈Cr remaining bandwidth of link
(u,v). A multicast request guaranteed bandwidth is represented by req(s,R,b) with s is source
node, the R is set of receivers (which r∈R is a receiver node), b is the request bandwidth. Assume
that all receiver nodes in the multicast group with the same bandwidth requirements. This
scenario occurs in multicast applications such as video conference. Multicast tree T(s,R) which
satisfies b≤min(Cr) so max[Σ req(s,R,b)]. The aim of the problem is to satisfy as many routing
requests as possible and optimal use of network resources. Many heuristic methods are proposed
for this problem. In particular, the general method is weight the link and apply techniques to find
optimal multicast tree with lowest cost min[cost(T(s,R)] (eg SPT, MST or Steiner Tree). However
each algorithm has idea with various calculations. Table 1 shows the general steps of this
algorithm.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
59
Table 1: The general steps of the heuristic bandwidth guaranteed
multicast routing algorithm
Input
Network G (V,E,C)
Multicast routing request req(s,R,b)
Output
A muticast tree guarantee bandwidth for all or
some of the receivers
Or none of multicast tree
The
general
steps
1. Calculate weight of link
2. Eliminate links not satify bandwidth requirement
3. Find the optimal tree T(s,R)
2.2. RELATED WORK
In a survey of F.F.Punjab [9], the QoS multicast tree selection algorithms is classified according to
three criteria: non-MPLS/MPLS, single/multi QoS constraints, heuristic/unicast/artificial-
intelligence optimization techniques. Survey shows MPLS is new effective research in reducing
congestion and network resource utilization.
Typically among MPLS multicast algorithms are two algorithms inspired by MIRA (Minimum
Interference Routing Algorithm) [10]. K. Kar, M. Kodialam, and TV Lakshman proposed MIRA
in 2000 for point-to-point routing on the MPLS network. The algorithm introduces the concept of
critical links are links easily blocked by calculating the maximum flow-minimum cut. LSP find
path avoiding those links to meet many potential requirements. 3 years later, the authors had
recommended M-MIRA algorithm (Multicast Minimum Interference Routing Algorithm) [11]
find P2M LSP with some changes of MIRA to match the multicast environment. Then in 2009, L-
MMIRA algorithm (Light Multicast Routing Algorithm Minimum Interference) [12] was
proposed by L.Xuan and L.Ying reducing calculation time significantly.
L-MMIRA algorithms have good performance with less complexity than M-MIRA. While L-
MMIRA handle requests through two phases (offline and online), MMIRA has only one phase
(online). Phase offline means that the algorithm will calculate the weight of available network
parameters before receiving routing requests. Phase online receive requests and find multicast tree
based weight, must to calculate if it is not available. In L-MMIRA, two phase calculation parallel
and phase offline complies with certain cycle based on change of critical links. Critical link in
two algorithms also differ. M-MIRA algorithms define a link is critical when multicast max flow
reduced if reducing the bandwidth capacity of the link. MMF (maximum multicast flow)
calculation is extremely complex and time consuming due to capacity at scaling - a technique used
in the study of network flow with decreasing bandwidth. The consideration of all links between
MMF and new MMF is not a simple thing especially for large network. Therefore, the computation
time to find tree for a routing request is much greater than L-MMIRA. In L-MMIRA algorithms,
multicast requests are generated randomly to predict future demands. For each request generated
randomly, find k shortest paths for each path picked out highest initiate weighted link as critical
links. Initial weight for each link is inversely proportional to residual bandwidth, i.e link with low
bandwidth has high weight. This is understandable because they are capable of highest congestion.
Both algorithms calculate critical link differently but depend much on random requests. The better
random requests, the more accuracy of critical link. Random requests in L-MMIRA are not
presented clearly and random any request set in phase online. M-MIRA has good idea to generate
random set based on history routing. Number of requests as well as receiver node in each request is
averaged from collective history request but not interested in source node set and receiver node set.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
60
These algorithms are compared with other traditional multicast routing as SPT (Shortest Path Tree) or
MST (Minimal Spanning Tree) [13]. The problem of traditional multicast routing based primarily on
costs link as SPT, MST will make link capacity saturation quickly constant for multicast tree with
same multicast request. The proposed algorithm continue the idea of MIRA and combine two
algorithms M-MIRA and L-MMIRA to achieve the best efficiency routing with relatively
computation time. As algorithm design, the requirements are will be presented and evaluate
experiment in a later section.
3. PROPOSED ALGORITHM
This is the improved algorithm of L-MMIRA for practicing random request was based on realistic
parameters and more reliable, not the parameters are generated randomly. The same of M-MIRA,
set of source-receivers and number of receivers in each random number request are calculated in
advance based on the routing history. This calculation helps critical value flexibility with the
practical requests. The possibility of future requests similar to the routing requests, thus
predicting the critical links will be more accurate than L-MMIRA. The rest of the phase offline
similar to L-MMIRA. During phase online, multicast tree is identified to satisfy the routing
requests with the possible lowest cost for efficient resource use. The identification of minimum
cost tree for multicast group can resolve by Steiner tree problem, which is NP-hard [10]. In the
M-MIRA algorithm, this problem is solved by the simple calculation that is Directed Steiner tree.
The proposed algorithm called New-LMMIRA find critical links to restrict the path through these
links. It is combine of M-MIRA and L-MMIRA. This reduces bottleneck at the future request.
The algorithm has two phases: offline and online. Phase offline executes random requests to find
critical links. Phase online finds a multicast tree according Directed Steiner tree algorithm based
on link weights. The objective of the proposed algorithm is increasing acceptance ratio and
reserve bandwidth for future requests with reasonable computation time and reduce waste
network resources.
Phase Offline:
Step 1: Calculate Critical: Determine weight for link
(1) Random generate some multicast requests, for every generated request with m receivers
like Eq(1). Source-receivers set is generate from history requests.
Eq(1)
 m is number of receiver node
 T is total of receiver nodes in history request
 H is number of history requests
Number of receivers in each request is predicted based on the average receivers used in the
previous requests. Similar to the source and the receivers. Any nodes which were requested will
be appeared in the source-receivers set for random requests.
(2) Initialize link’s weights as Eq(2)
(3)
Eq(2)
 wl(u, v) is link’s weight
 cr(u, v) is link’s residual bandwidth
 Cr is set cr (u, v)
 ( ) returns the max element in Cr
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
61
Purpose of the calculation link’s weight is changing the path flexibility with network so weighted
formula should be based on bandwidth. The initialize weight for each link (wl) is inversely
proportional to the residual bandwidth (cr). The lower the link’s bandwidth, the higher the link’s
weight. The path will prioritize passing the links with lower weight because they have less
capable of congestion.
(4) Identify critical link
Dijkstra's algorithm runs k times from source to each receiver m, find the k paths, not select the
link with the largest weighting of each route for the CPS (critical path set). Then remove the link
from the network model to ensure that the link does not appear on a different shortest path.
(5) Assign the weight for the critical links
CPS includes (k x m) results. Link’s weight is the times each link appears in the CPS. The
formula like Eq(3):
l(i,j)∈CP indicates to examine all elements of CPS. A link may appear many times in CPS. The
greater the number of appearance, the higher link’s weight. Dijkstra just runs k times and a full
scan for the CPS to find out the critical links. Therefore, the complexity is much lower than using
maxflow.
Step 2: Calculate period: Determine the next calculation period
 the next period
 (u, v) is link’s weight
-1 is the last period, Tn-1 is the next period, ∑ (u, v) is total of link’s weight. Period calculation
depends on the total weight of the critical links. If the total weight reduces
( ) means less risk of network congestion so the
next calculation Tn is greater than Tn-1. However, when few resources
( ) so Tn is lower than Tn-1 because the regular
calculation describes exactly status of the network.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
62
Phase Online: Find multicast tree with Directed Steiner Tree algorithm.
4. PERFORMANCE EVALUATION
New-proposed algorithm were compared with three routing algorithms such as SPT, M-MIRA, L-
MMIRA according to two criteria: the acceptance ratio and the average computation time. The
first criteria is the percentage of accepted request set multicast route on total request. Sub-criteria
for the acceptance ratio is hard accepted and soft accepted: Hard accepted is which request meets
all multicast receiver. Soft accepted is which request meet at least 1 receiver. The second criteria
average computing time is algorithm’s processing time receipt of the request.
Input: A residual graph G(V,E,C), a multicast request set REQUESTS (Eq.1) which
contains the multicast request like req(s,R,b) and k,T0,T.
Output: A critical weight matrix C for the whole network.
New-LMIRA - Offline - Computing:
Innit CP = null;
for each l E
Init the link's weight wl according (Eq.2);
end for
for each req(s,R,b) REQUESTS
for each r R
Init i = 0;
while (i<k){
Find the Dijskstra shortest path p(s,r);
Find the biggest weight link l(u,v);
Add link l(u,v) to CP;
Remove link l(u,v) form the graph G;
i++;
}
end for
end for
for each l E
Set the link's critical weight cwl according (Eq.3);
end for
Compute Tn according to (Eq.4);
Set T = Tn
Sleep (T);
Input: A directed graph G = (V,E,C) with edge cost, a source node s and a set R of
receiver nodes.
Output: A low cost Directed Steiner Tree rooted at s and spanning all the nodes in R.
New-LMIRA - Online - Computing:
X R;
while X do
Run Dijkstra's shortest path algorithm with source s until a node r X is reached;
Add the path from s to r to the Steiner tree built so far;
Set the costs of all the edges along this path to zero;
X X - {r};
endwhile
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
63
4.1 SIMULATION ENVIRONMENT
Experimental key is NS (Network Simulator) which is inspired by the key operation of NS-2 and
some other network simulator environment. It is used to simulate unicast and multicast routing
algorithms.
In this section multicast routing algorithms were tested on MIRA and ANSNET topologies. Two
schemes are used in a variety of routing bandwidth guaranteed researches [13]. All links bi-
directed links. Bandwidth is 1200 MB and 4800 MB in Figure 2 and 2000 MB in Figure 3. For
MIRA network topology, the random request are generate according to probability distribution.
Source set consisting of {0, 4, 3} and receiver set consisting of {12, 8, 1, 14}, similar to the
ANSNET is {1, 4, 7, 18, 21} and {6, 17, 23, 29, 31}.
Figure 2: MIRA topology
Figure 3: ANSNET topology
Experiments were conducted under static routing scenarios. In static routing, requests to
sequentially and evenly. Moreover, if request accepted, the multicast tree will keep bandwidth till
the end of the experiment. Each dataset consists of 500 requests for MIRA topology and 1000s
request for ANSNET topology. Each request includes 1 source and from 2 to 4 receivers are
generated randomly according to the uniform distribution. Bandwidth requirement is from 10 to
20 units under the uniform distribution.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
64
4.2 SIMULATION RESULT
MIRA Topology:
 For SPT, initial weights are initialized to 1 for all the links.
 For the M-MIRA, MMF limit is set by 200 due to complex calculation.
 For L-MMIRA and New-LMMIRA, k = 3 is chosen because good results in the testing
process.
100 first requests were generated randomly. In the New-LMMIRA after actual requests,
information about the source, receivers and number of receiver will be collected to calculate
link’s weights. Phase offline runs periodically in the first time as 1000ms.
(a) Hard accepted
(b) Soft accepted
(c) Average computing time
Figure 4: Comparison of experimental results on the MIRA topology
Figure 4 compares hard accepted results of New-LMMIRA with other algorithms. SPT has the
lowest acceptance ratio than the proposed algorithm New-LMMIRA. Specifically, the accepted
request of New-LMMIRA is the highest while SPT is the lowest after 500 requests need to meet
one of the receivers in each request so the number of soft accepted larger than hard accepted.
Conversely, acceptance ratio SPT is next fast algorithm after L-MMIRA in 500 requests.
Meanwhile M-MIRA is the slowest because of MMF time consuming calculation. L-MMIRA has
the lowest average computing time by weighted calculation in the offline phase. New-LMMIRA
has calculated average time relatively. It can compared with SPT and L-MMIRA and much lower
than M-MIRA.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
65
ANSNET Topology:
Experiments on ANSNET topology also show results similar to MIRA topology (Figure 5).
(a) Hard accepted
(b) Soft accepted
(c) Average computing time
Figure 5: Comparison of experimental results on the ANSNET topology
5. CONCLUSIONS
While some value-added service is constantly being brought into the Internet, the demand for
bandwidth and quality of service is becoming increasingly more urgent. Multicast solves a point-
to-multipoint problem efficiently and to reduce network burden. SPT is the easiest algorithm to
find the optimal multicast tree. There are many protocols extended to support IP multicast service
quality assurance service, but the downside is they do not provide important QoS features such as
the distribution, reserve bandwidth for backup and fast reroute. MPLS core network was proposed
for solving these problems. Two algorithm on MPLS network are M-MIRA and L-MMIRA but
many limits.
This paper has inherited research to calculate the optimal routing tree. Through utilizing the
routing information in the past and predicting future request, the proposed algorithm New-
LMMIRA give accepted higher than other algorithms with equivalent processing time. However,
limitations of the algorithm old the weighted calculation method and experiment only in a static
network. Future development direction is evaluating proposed the algorithm on the dynamic
network, in which QoS requests can come in any time, and the change of joining or leaving
group of recievers multicast.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015
66
REFERENCES
[1] H.T.Cong (2012), “Multi-protocol Label Switching”, Information and Transmission publisher, p. 89.
[2] S.Natu (2006), “Fast Reroute for Triple Play Networks”, Tech. Report, Redback Networks,
APRICOT.
[3] J.Le Roux (2008), “Designing a Carrier Class TV Broadcast Network using P2MP MPLS-TE”, Tech.
Report, Orange France Telecom Group.
[4] N.Neate (2009), “RSVP-TE Point-to-Multipoint: An overview of the RSVP-TE P2MP Extensions,
Their Applications to IPTV, and Support for Other (G) MPLS Features”, Tech. Report, Data
Connection ltd.
[5] Q.Zhao, D. King, F. Verhaeghe, T. Takeda, Z. Ali, J. Meuric (2010), “Extensions to the Path
Computation Element Communication Protocol (PCEP) for Point-to-Multipoint Traffic Engineering
Label Switched Paths”, RFC 6006.
[6] IJ.Wijnands, I. Minei, K. Kompella, B. Thomas (2011), “Label Distribution Protocol Extensions for
Point-to-Multipoint and Multipoint-to-Multipoint Label Switched Paths”, RFC 6388.
[7] E.Rosen, R. Aggarwal (2012), “Multicast in MPLS/BGP IP VPNs”, RFC 6513
[8] P.-T. C. Thai and H. T. Cong (2013), “A Study of Bandwidth Guaranteed Routing Algorithms for
Traffic Engineering,” in Advanced Methods for Computational Collective Intelligence, vol. 457, N. T.
Nguyen, B. Trawiński, R. Katarzyniak, and G.-S. Jo, Eds. Berlin, Heidelberg: Springer Berlin
Heidelberg, pp. 313–322.
[9] F.Farooq, S. Aslam, and S. Sarwar (2009), “QoS-based MPLS multicast tree selection algorithms”, p.
1.
[10] K. Kar, M. Kodialam, and T. V. Lakshman (2000), “Minimum interference routing of bandwidth
guaranteed tunnels with MPLS traffic engineering applications,” IEEE J. Sel. Areas Commun., vol.
18, no. 12, pp. 2566–2579.
[11] M.Kodialam, T. V. Lakshman, and S. Sengupta (2003), “Online multicast routing with bandwidth
guarantees: A new approach using multicast network flow,” IEEEACM Trans. Netw., vol. 11, no. 4,
pp. 676–686.
[12] L.Xuan and L. Ying (2008), “L-MMIRA: Light Multicast Minimal Interference Routing Module in
MPLS Network,” Seventh International Conference on Networking, pp. 421–426.
[13] E.Crawley, R. Nair, B. Jajagopalan, H.Sandick (1998), “A Framework for QoS-based Routing in the
Internet,” RFC 2386.
Authors
Tran Cong Hung was born in Vietnam in 1961.He received the B.E in electronic and
Telecommunication engineering with first class honors from HOCHIMINH University
of technology in Vietnam, 1987. He received the B.E in informatics and computer
engineering from HOCHIMINH University of technology in Vietnam, 1995. He
received the master of engineering degree in telecommunications engineering course
from postgraduate department Hanoi University of technology in Vietnam, 1998. He
received Ph.D at Hanoi University of technology in Vietnam, 2004. His main research
areas are B – ISDN performance parameters and measuring methods, QoS in high speed networks, MPLS.
He is, currently, Associate Professor PhD. of Faculty of Information Technology II, Posts and Telecoms
Institute of Technology in HOCHIMINH, Vietnam.
Huynh Thach Thao was born in Vietnam in 1990.She received B.E. in Information
Engineering from Saigon University, Vietnam in 2012. She is currently a MSc. Candidate
in Information System from Post & Telecommunications Institute of Technology, Vietnam
in 2015. She is working as reporting specialist in VP bank FE Credit, Vietnam.
Cao Thai Phuong Thanh was born in Vietnam in 1983.He received B.E. in Information
Technology from Ho Chi Minh City University of Science, Vietnam in 2005; MSc. in
Computer Science from University of East Anglia, UK in 2007, and currently a PhD
candidate in Information System from Post &Telecommunications Institute of
Technology, Vietnam. He is working as lecturer in Faculty of Information Technology,
Saigon University, Vietnam.

More Related Content

What's hot

Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsIDES Editor
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
 
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...cscpconf
 

What's hot (17)

Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
 
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...
 
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in ManetsEnhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
 

Viewers also liked

ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN IJCNCJournal
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS IJCNCJournal
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip trafficIJCNCJournal
 
Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with videoIJCNCJournal
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensorIJCNCJournal
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...IJCNCJournal
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm forIJCNCJournal
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...IJCNCJournal
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on textIJCNCJournal
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNIJCNCJournal
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networksIJCNCJournal
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
 

Viewers also liked (18)

ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip traffic
 
Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with video
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensor
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm for
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on text
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networks
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGS
 

Similar to Bandwidth Guaranteed Multicast Routing Algorithm

Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkcsandit
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos TechniquesKatie Gulley
 
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...CSCJournals
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networkspaperpublications3
 
Solving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataSolving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataIJCNCJournal
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)IRJET Journal
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONAIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...AIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...AIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...AIRCC Publishing Corporation
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
 

Similar to Bandwidth Guaranteed Multicast Routing Algorithm (20)

Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networks
 
Solving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataSolving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing data
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
 
C0351725
C0351725C0351725
C0351725
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Bandwidth Guaranteed Multicast Routing Algorithm

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 DOI : 10.5121/ijcnc.2015.7505 57 BANDWIDTH GUARANTEED MULTICAST ROUTING ALGORITHM Tran Cong Hung1 , Huynh Thach Thao2 and Cao Thai Phuong Thanh3 1 Post & Telecommunications Institute of Technology, Vietnam 2 VP bank FE Credit, Vietnam 3 Saigon University, Vietnam ABSTRACT Computer network is becoming more popular and common, the need to use the broadband connection services (e-learning - online training, video conferencing - online conference, IPTV - digital TV ...) of organizations and individuals is increasing. Multicast is an effective mechanism for the transmission of information and data to many recipients simultaneously. Multicast is a routing problem from a source node to a receiver node set, also known as the routing from one point to multipoint. The advances in technology and multimedia applications emerge quickly has provided great motivation for the application of new real- time multi-point. Many multi-point applications will not function properly if the QoS (quality of service) can not be guaranteed. Therefore, multi-point algorithms must be able to meet the QoS constraints (cost, reliability, bandwidth, jitter, delay...). The objective of multicast routing algorithms guarantee QoS is to provide routing algorithms have the ability to recognize the tree to satisfy the maximum of traffic streams with QoS requirements. Most multicast algorithms on MPLS (MultiProtocol Label Switching) considered the unique QoS constraint as bandwidth. The other QoS constraints can be converted into bandwidth efficiency. Starting from this reality, this paper research multicast routing algorithms guarantee bandwidth and propose new algorithm compares with existing ones. KEYWORDS multicast, quality of service (QoS), routing, guarantee QoS 1.INTRODUCTION IP network models only provide "best effort", ie the network will try to exploit all possibilities within the limits but not guaranteed delay and data loss. So when traffic on the network transmissions exceed the capability of the network, services are not denied but reduced service quality (delay increases, speed reduces, data loss). IP networks are not suitable for applications that require real-time [1]. Today, with the explosion of Internet multimedia applications, IPTV and other broadcast as broadcast TV, video-on-demand (VoD) and similar VoD generated multicast requirements for core-network service providers. The core-network provides high availability and QoS to reduce network congestion and use resource efficiency. MPLS multicast (Figure 1) are best suited to these requirements. Studies on IP multicast over MPLS network (also known as MPLS multicast) starting from 1999-2000 when only the drafts in the IETF and the scientific paper is published in IEEE. By 2002, a framework was published in RFC 3353 by D.Ooms shows an overview of IP multicast in MPLS environment. Currently MPLS multicast is the big network providers prevail deployment [2], [3], [4].
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 58 MPLS multicast support Layer 2 forwarding on the explicit P2M LSP (point-to-multipoint label switched path) rather than the conventional shortest path. MPLS multicast routing are described as follows: (1) the packet is assigned to the difference FEC (Forwarding Equivalence Class) on the path to an egress LSR (Label Switching Router); (2) the FEC then grouped into traffic trunks, this is an routing object inside the LSP; (3) the P2M LSP is established between the ingress and egress LSR. While MPLS provides flexibility in packet switching, but the problems persist when link the multicast tree layer 3 with P2M LSP layer 2 as well as the integration of QoS for resources reservation in MPLS multicast. The multicast routing protocols over MPLS recently [5], [6], [7] are in place to try to overcome these problems. Figure 1: MPLS Multicast The paper is divided into four sections: section 1 introduces the MPLS multicast, section 2 presents the related multicast algorithms, section 3 introduces the proposed algorithm, section 4 is experiment and evaluation, part 5 is conclusion and future development. 2. PROBLEM DEFINITION & RELATED WORK Quality of Service (QoS) include bandwidth, delay, jitter...but most scientific studies use bandwidth constrained for other QoS constraints can be converted into efficient bandwidth requirement [8]. The proposed algorithm select multicast tree guaranteed bandwidth to settle for multicast scenarios in multi-point applications. 2.1. PROBLEM DEFINITION Given directed graph G(V,E,C). V is the set of all network nodes (includes switches, routers and hosts…), v∈V is a node, N=|V| is the total number of nodes. E is the set of edges, (u,v)∈E is a path (u,v)=u→v, L=|E| is the total number of edges. C is the set of link bandwidth, c(u,v)∈C is capacity of link (u,v). Cr is the set of residual capacity, cr(u, v)∈Cr remaining bandwidth of link (u,v). A multicast request guaranteed bandwidth is represented by req(s,R,b) with s is source node, the R is set of receivers (which r∈R is a receiver node), b is the request bandwidth. Assume that all receiver nodes in the multicast group with the same bandwidth requirements. This scenario occurs in multicast applications such as video conference. Multicast tree T(s,R) which satisfies b≤min(Cr) so max[Σ req(s,R,b)]. The aim of the problem is to satisfy as many routing requests as possible and optimal use of network resources. Many heuristic methods are proposed for this problem. In particular, the general method is weight the link and apply techniques to find optimal multicast tree with lowest cost min[cost(T(s,R)] (eg SPT, MST or Steiner Tree). However each algorithm has idea with various calculations. Table 1 shows the general steps of this algorithm.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 59 Table 1: The general steps of the heuristic bandwidth guaranteed multicast routing algorithm Input Network G (V,E,C) Multicast routing request req(s,R,b) Output A muticast tree guarantee bandwidth for all or some of the receivers Or none of multicast tree The general steps 1. Calculate weight of link 2. Eliminate links not satify bandwidth requirement 3. Find the optimal tree T(s,R) 2.2. RELATED WORK In a survey of F.F.Punjab [9], the QoS multicast tree selection algorithms is classified according to three criteria: non-MPLS/MPLS, single/multi QoS constraints, heuristic/unicast/artificial- intelligence optimization techniques. Survey shows MPLS is new effective research in reducing congestion and network resource utilization. Typically among MPLS multicast algorithms are two algorithms inspired by MIRA (Minimum Interference Routing Algorithm) [10]. K. Kar, M. Kodialam, and TV Lakshman proposed MIRA in 2000 for point-to-point routing on the MPLS network. The algorithm introduces the concept of critical links are links easily blocked by calculating the maximum flow-minimum cut. LSP find path avoiding those links to meet many potential requirements. 3 years later, the authors had recommended M-MIRA algorithm (Multicast Minimum Interference Routing Algorithm) [11] find P2M LSP with some changes of MIRA to match the multicast environment. Then in 2009, L- MMIRA algorithm (Light Multicast Routing Algorithm Minimum Interference) [12] was proposed by L.Xuan and L.Ying reducing calculation time significantly. L-MMIRA algorithms have good performance with less complexity than M-MIRA. While L- MMIRA handle requests through two phases (offline and online), MMIRA has only one phase (online). Phase offline means that the algorithm will calculate the weight of available network parameters before receiving routing requests. Phase online receive requests and find multicast tree based weight, must to calculate if it is not available. In L-MMIRA, two phase calculation parallel and phase offline complies with certain cycle based on change of critical links. Critical link in two algorithms also differ. M-MIRA algorithms define a link is critical when multicast max flow reduced if reducing the bandwidth capacity of the link. MMF (maximum multicast flow) calculation is extremely complex and time consuming due to capacity at scaling - a technique used in the study of network flow with decreasing bandwidth. The consideration of all links between MMF and new MMF is not a simple thing especially for large network. Therefore, the computation time to find tree for a routing request is much greater than L-MMIRA. In L-MMIRA algorithms, multicast requests are generated randomly to predict future demands. For each request generated randomly, find k shortest paths for each path picked out highest initiate weighted link as critical links. Initial weight for each link is inversely proportional to residual bandwidth, i.e link with low bandwidth has high weight. This is understandable because they are capable of highest congestion. Both algorithms calculate critical link differently but depend much on random requests. The better random requests, the more accuracy of critical link. Random requests in L-MMIRA are not presented clearly and random any request set in phase online. M-MIRA has good idea to generate random set based on history routing. Number of requests as well as receiver node in each request is averaged from collective history request but not interested in source node set and receiver node set.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 60 These algorithms are compared with other traditional multicast routing as SPT (Shortest Path Tree) or MST (Minimal Spanning Tree) [13]. The problem of traditional multicast routing based primarily on costs link as SPT, MST will make link capacity saturation quickly constant for multicast tree with same multicast request. The proposed algorithm continue the idea of MIRA and combine two algorithms M-MIRA and L-MMIRA to achieve the best efficiency routing with relatively computation time. As algorithm design, the requirements are will be presented and evaluate experiment in a later section. 3. PROPOSED ALGORITHM This is the improved algorithm of L-MMIRA for practicing random request was based on realistic parameters and more reliable, not the parameters are generated randomly. The same of M-MIRA, set of source-receivers and number of receivers in each random number request are calculated in advance based on the routing history. This calculation helps critical value flexibility with the practical requests. The possibility of future requests similar to the routing requests, thus predicting the critical links will be more accurate than L-MMIRA. The rest of the phase offline similar to L-MMIRA. During phase online, multicast tree is identified to satisfy the routing requests with the possible lowest cost for efficient resource use. The identification of minimum cost tree for multicast group can resolve by Steiner tree problem, which is NP-hard [10]. In the M-MIRA algorithm, this problem is solved by the simple calculation that is Directed Steiner tree. The proposed algorithm called New-LMMIRA find critical links to restrict the path through these links. It is combine of M-MIRA and L-MMIRA. This reduces bottleneck at the future request. The algorithm has two phases: offline and online. Phase offline executes random requests to find critical links. Phase online finds a multicast tree according Directed Steiner tree algorithm based on link weights. The objective of the proposed algorithm is increasing acceptance ratio and reserve bandwidth for future requests with reasonable computation time and reduce waste network resources. Phase Offline: Step 1: Calculate Critical: Determine weight for link (1) Random generate some multicast requests, for every generated request with m receivers like Eq(1). Source-receivers set is generate from history requests. Eq(1)  m is number of receiver node  T is total of receiver nodes in history request  H is number of history requests Number of receivers in each request is predicted based on the average receivers used in the previous requests. Similar to the source and the receivers. Any nodes which were requested will be appeared in the source-receivers set for random requests. (2) Initialize link’s weights as Eq(2) (3) Eq(2)  wl(u, v) is link’s weight  cr(u, v) is link’s residual bandwidth  Cr is set cr (u, v)  ( ) returns the max element in Cr
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 61 Purpose of the calculation link’s weight is changing the path flexibility with network so weighted formula should be based on bandwidth. The initialize weight for each link (wl) is inversely proportional to the residual bandwidth (cr). The lower the link’s bandwidth, the higher the link’s weight. The path will prioritize passing the links with lower weight because they have less capable of congestion. (4) Identify critical link Dijkstra's algorithm runs k times from source to each receiver m, find the k paths, not select the link with the largest weighting of each route for the CPS (critical path set). Then remove the link from the network model to ensure that the link does not appear on a different shortest path. (5) Assign the weight for the critical links CPS includes (k x m) results. Link’s weight is the times each link appears in the CPS. The formula like Eq(3): l(i,j)∈CP indicates to examine all elements of CPS. A link may appear many times in CPS. The greater the number of appearance, the higher link’s weight. Dijkstra just runs k times and a full scan for the CPS to find out the critical links. Therefore, the complexity is much lower than using maxflow. Step 2: Calculate period: Determine the next calculation period  the next period  (u, v) is link’s weight -1 is the last period, Tn-1 is the next period, ∑ (u, v) is total of link’s weight. Period calculation depends on the total weight of the critical links. If the total weight reduces ( ) means less risk of network congestion so the next calculation Tn is greater than Tn-1. However, when few resources ( ) so Tn is lower than Tn-1 because the regular calculation describes exactly status of the network.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 62 Phase Online: Find multicast tree with Directed Steiner Tree algorithm. 4. PERFORMANCE EVALUATION New-proposed algorithm were compared with three routing algorithms such as SPT, M-MIRA, L- MMIRA according to two criteria: the acceptance ratio and the average computation time. The first criteria is the percentage of accepted request set multicast route on total request. Sub-criteria for the acceptance ratio is hard accepted and soft accepted: Hard accepted is which request meets all multicast receiver. Soft accepted is which request meet at least 1 receiver. The second criteria average computing time is algorithm’s processing time receipt of the request. Input: A residual graph G(V,E,C), a multicast request set REQUESTS (Eq.1) which contains the multicast request like req(s,R,b) and k,T0,T. Output: A critical weight matrix C for the whole network. New-LMIRA - Offline - Computing: Innit CP = null; for each l E Init the link's weight wl according (Eq.2); end for for each req(s,R,b) REQUESTS for each r R Init i = 0; while (i<k){ Find the Dijskstra shortest path p(s,r); Find the biggest weight link l(u,v); Add link l(u,v) to CP; Remove link l(u,v) form the graph G; i++; } end for end for for each l E Set the link's critical weight cwl according (Eq.3); end for Compute Tn according to (Eq.4); Set T = Tn Sleep (T); Input: A directed graph G = (V,E,C) with edge cost, a source node s and a set R of receiver nodes. Output: A low cost Directed Steiner Tree rooted at s and spanning all the nodes in R. New-LMIRA - Online - Computing: X R; while X do Run Dijkstra's shortest path algorithm with source s until a node r X is reached; Add the path from s to r to the Steiner tree built so far; Set the costs of all the edges along this path to zero; X X - {r}; endwhile
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 63 4.1 SIMULATION ENVIRONMENT Experimental key is NS (Network Simulator) which is inspired by the key operation of NS-2 and some other network simulator environment. It is used to simulate unicast and multicast routing algorithms. In this section multicast routing algorithms were tested on MIRA and ANSNET topologies. Two schemes are used in a variety of routing bandwidth guaranteed researches [13]. All links bi- directed links. Bandwidth is 1200 MB and 4800 MB in Figure 2 and 2000 MB in Figure 3. For MIRA network topology, the random request are generate according to probability distribution. Source set consisting of {0, 4, 3} and receiver set consisting of {12, 8, 1, 14}, similar to the ANSNET is {1, 4, 7, 18, 21} and {6, 17, 23, 29, 31}. Figure 2: MIRA topology Figure 3: ANSNET topology Experiments were conducted under static routing scenarios. In static routing, requests to sequentially and evenly. Moreover, if request accepted, the multicast tree will keep bandwidth till the end of the experiment. Each dataset consists of 500 requests for MIRA topology and 1000s request for ANSNET topology. Each request includes 1 source and from 2 to 4 receivers are generated randomly according to the uniform distribution. Bandwidth requirement is from 10 to 20 units under the uniform distribution.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 64 4.2 SIMULATION RESULT MIRA Topology:  For SPT, initial weights are initialized to 1 for all the links.  For the M-MIRA, MMF limit is set by 200 due to complex calculation.  For L-MMIRA and New-LMMIRA, k = 3 is chosen because good results in the testing process. 100 first requests were generated randomly. In the New-LMMIRA after actual requests, information about the source, receivers and number of receiver will be collected to calculate link’s weights. Phase offline runs periodically in the first time as 1000ms. (a) Hard accepted (b) Soft accepted (c) Average computing time Figure 4: Comparison of experimental results on the MIRA topology Figure 4 compares hard accepted results of New-LMMIRA with other algorithms. SPT has the lowest acceptance ratio than the proposed algorithm New-LMMIRA. Specifically, the accepted request of New-LMMIRA is the highest while SPT is the lowest after 500 requests need to meet one of the receivers in each request so the number of soft accepted larger than hard accepted. Conversely, acceptance ratio SPT is next fast algorithm after L-MMIRA in 500 requests. Meanwhile M-MIRA is the slowest because of MMF time consuming calculation. L-MMIRA has the lowest average computing time by weighted calculation in the offline phase. New-LMMIRA has calculated average time relatively. It can compared with SPT and L-MMIRA and much lower than M-MIRA.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 65 ANSNET Topology: Experiments on ANSNET topology also show results similar to MIRA topology (Figure 5). (a) Hard accepted (b) Soft accepted (c) Average computing time Figure 5: Comparison of experimental results on the ANSNET topology 5. CONCLUSIONS While some value-added service is constantly being brought into the Internet, the demand for bandwidth and quality of service is becoming increasingly more urgent. Multicast solves a point- to-multipoint problem efficiently and to reduce network burden. SPT is the easiest algorithm to find the optimal multicast tree. There are many protocols extended to support IP multicast service quality assurance service, but the downside is they do not provide important QoS features such as the distribution, reserve bandwidth for backup and fast reroute. MPLS core network was proposed for solving these problems. Two algorithm on MPLS network are M-MIRA and L-MMIRA but many limits. This paper has inherited research to calculate the optimal routing tree. Through utilizing the routing information in the past and predicting future request, the proposed algorithm New- LMMIRA give accepted higher than other algorithms with equivalent processing time. However, limitations of the algorithm old the weighted calculation method and experiment only in a static network. Future development direction is evaluating proposed the algorithm on the dynamic network, in which QoS requests can come in any time, and the change of joining or leaving group of recievers multicast.
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.5, September 2015 66 REFERENCES [1] H.T.Cong (2012), “Multi-protocol Label Switching”, Information and Transmission publisher, p. 89. [2] S.Natu (2006), “Fast Reroute for Triple Play Networks”, Tech. Report, Redback Networks, APRICOT. [3] J.Le Roux (2008), “Designing a Carrier Class TV Broadcast Network using P2MP MPLS-TE”, Tech. Report, Orange France Telecom Group. [4] N.Neate (2009), “RSVP-TE Point-to-Multipoint: An overview of the RSVP-TE P2MP Extensions, Their Applications to IPTV, and Support for Other (G) MPLS Features”, Tech. Report, Data Connection ltd. [5] Q.Zhao, D. King, F. Verhaeghe, T. Takeda, Z. Ali, J. Meuric (2010), “Extensions to the Path Computation Element Communication Protocol (PCEP) for Point-to-Multipoint Traffic Engineering Label Switched Paths”, RFC 6006. [6] IJ.Wijnands, I. Minei, K. Kompella, B. Thomas (2011), “Label Distribution Protocol Extensions for Point-to-Multipoint and Multipoint-to-Multipoint Label Switched Paths”, RFC 6388. [7] E.Rosen, R. Aggarwal (2012), “Multicast in MPLS/BGP IP VPNs”, RFC 6513 [8] P.-T. C. Thai and H. T. Cong (2013), “A Study of Bandwidth Guaranteed Routing Algorithms for Traffic Engineering,” in Advanced Methods for Computational Collective Intelligence, vol. 457, N. T. Nguyen, B. Trawiński, R. Katarzyniak, and G.-S. Jo, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 313–322. [9] F.Farooq, S. Aslam, and S. Sarwar (2009), “QoS-based MPLS multicast tree selection algorithms”, p. 1. [10] K. Kar, M. Kodialam, and T. V. Lakshman (2000), “Minimum interference routing of bandwidth guaranteed tunnels with MPLS traffic engineering applications,” IEEE J. Sel. Areas Commun., vol. 18, no. 12, pp. 2566–2579. [11] M.Kodialam, T. V. Lakshman, and S. Sengupta (2003), “Online multicast routing with bandwidth guarantees: A new approach using multicast network flow,” IEEEACM Trans. Netw., vol. 11, no. 4, pp. 676–686. [12] L.Xuan and L. Ying (2008), “L-MMIRA: Light Multicast Minimal Interference Routing Module in MPLS Network,” Seventh International Conference on Networking, pp. 421–426. [13] E.Crawley, R. Nair, B. Jajagopalan, H.Sandick (1998), “A Framework for QoS-based Routing in the Internet,” RFC 2386. Authors Tran Cong Hung was born in Vietnam in 1961.He received the B.E in electronic and Telecommunication engineering with first class honors from HOCHIMINH University of technology in Vietnam, 1987. He received the B.E in informatics and computer engineering from HOCHIMINH University of technology in Vietnam, 1995. He received the master of engineering degree in telecommunications engineering course from postgraduate department Hanoi University of technology in Vietnam, 1998. He received Ph.D at Hanoi University of technology in Vietnam, 2004. His main research areas are B – ISDN performance parameters and measuring methods, QoS in high speed networks, MPLS. He is, currently, Associate Professor PhD. of Faculty of Information Technology II, Posts and Telecoms Institute of Technology in HOCHIMINH, Vietnam. Huynh Thach Thao was born in Vietnam in 1990.She received B.E. in Information Engineering from Saigon University, Vietnam in 2012. She is currently a MSc. Candidate in Information System from Post & Telecommunications Institute of Technology, Vietnam in 2015. She is working as reporting specialist in VP bank FE Credit, Vietnam. Cao Thai Phuong Thanh was born in Vietnam in 1983.He received B.E. in Information Technology from Ho Chi Minh City University of Science, Vietnam in 2005; MSc. in Computer Science from University of East Anglia, UK in 2007, and currently a PhD candidate in Information System from Post &Telecommunications Institute of Technology, Vietnam. He is working as lecturer in Faculty of Information Technology, Saigon University, Vietnam.