SlideShare a Scribd company logo
1 of 22
Analysis and Simulation Routing Management  MIRA (Minimum Interference Routing Algorithm) for Speedy traffic on MPLS Network  By :   1. RendyMunadi (rnd@ittelkom.ac.id)           2. AkhmadZaimi (djimie@gmail.com)	           3. SofiahNaning (snh@ittelkom.ac.id)	 1 3/24/2010
Background Routing Management Multi-services multi-treatment single network (best effort & QOS aware) MPLS Network as IP backbone has capacity constraint and routing mechanism constraint (SPF). The new routing management scheme is proposed using Minimum Interference Routing Algorithm (MIRA). Research’s objective increased availability and accessibility Speedy (BE service) to optimize network resource usage 3/24/2010 2
Basic Concept of MPLS-TE In MPLS-TE, headend LSR should be accomplished with network topology and other auxiliary information. The required information: bandwidth, TE metric, max. bandwidth, max. bandwidth reserveable, unreserved max. bandwidth and administrative group of links. 3/24/2010 3 MPLS-TE: FIB Construction
Basic Concept of MIRA Least cost routing, from 1  9: 1 – 4 – 5 – 9 (cost=4) 2  8: 2 – 4 – 5 – 8 (cost=4, but interfere 1-9 path) 3  8: 3 – 4 – 6 – 7 – 5 – 8 (cost=8) Terms: interference, minimum interference path, critical link Next issues: Observes critical links of QoS traffic with multi-path consideration Analyze best method to optimize netw. resources for both, BE+QoS service,  in term of multi-path. 3/24/2010 4
Algorithm (MIRA) Input A graph G(N,L) and a set B of residual capacities on all the arcs. An ingress node a and an egress node b between which a flow of D demand units have to routed Output A route between a and b having capacity of D units of bandwidth Algorithm Compute the maximum flow values for all  Compute the set of critical links Csd for all Compute the weights  Eliminate all links which have residual bandwidth less than D and form a reduced network Using Djikstra’s algorithm compute the shortest path (a-b) in the reduced network using w(l) as the weight on link l Route the demand of D units from a to b along this shortest path and update the residual capacities 3/24/2010 5
Algorithm (Enhancement of MIRA) 3/24/2010 Akhmad Zaimi 212080001 6 Input A graph G(N,L) and a set B of residual capacities on all the arcs. An ingress node a and an egress node b between which a flow of D demand units have to routed Output A route between a and b having capacity of D units of bandwidth Algorithm Identify Ingress Egress Node including bw. allocation Compute weight of Ingress Egress Pair:  Compute the candidate paths for all  Compute the set of critical links Csd for all  M1: all links, both MP and BP, are critical link M2: if B(l) < D then l = Csd, resource allocated for both MP and BP M3: if B(l) < D then l = Csd, resource allocated only for MP
Algorithm (Enhancement of MIRA) 3/24/2010 Akhmad Zaimi 212080001 7 Compute the weight of critical link Compute network cost (M1, M2, M3) Include link capacity as a factor of network cost (adopt OSPF cost) Eliminate all links with B < D and form a reduced network Use Djikstra’s algorithm to compute the shortest path (a-b) in the reduced network based on network cost Route the demand of D units from a to b and update the residual capacities
Candidate Paths Analysis 3/24/2010 Akhmad Zaimi 212080001 8 The applied rules: Candidate path of S1 to D7: Path 1: 1 – 2 – 5 – 7 (main path) Path 2: 1 – 2 – 8 – 10 - 7 (backup path) Path 3: 1 – 3 – 4 – 6 – 9 – 7 (backup path) Analyze critical links on all of candidate path 4 9 6 3 2 5 1 7 8 10
Network Topology 9
Routing Mechanism Nodes route traffic relying on least cost routing mechanism. On previous topology, source to destination routing would be as the following table. 3/24/2010 10
Analysis and Discussion Modeling Routing Management System Input of MIRA: G(N, L, B); B = residual capacity (Mbps) on each links 3/24/2010 11
Modeling Routing Management System Ingress Egress Pairs VPN IP 3/24/2010 12
Modeling Routing Management System Size of Demands for Each Ingress Egress Pairs (Mbps) Weight of Ingress Egress Pairs 3/24/2010 13
Modeling Routing Management System The number of candidate paths (main path and backup) is about 251 candidate paths of IP VPN. Then, analyze critical links within all of candidate paths. And here is the result of computation using 3 methods. 3/24/2010 14
Highlight of M3 Result Critical link regards to M3 computation 3/24/2010 15 Network cost regard to M3 computation
Analysis and Discussion Output Analysis Result path of routing management Then, to prove the interference path produced by SPF algorithm. 3/24/2010 16
Output Analysis 3/24/2010 Akhmad Zaimi 212080001 17 Interference Analysis of SPF algorithm: From 13  2 passes through some critical links (hop 3 and 4) From 13  3 passes through one critical links, which is hop 2.
Analysis and Discussion Output Analysis Network resource optimization. 3/24/2010 18
Analysis and Discussion Network Performance 3/24/2010 19
Analysis and Discussion Network Performance 3/24/2010 20
Analysis and Discussion Network Performance 3/24/2010 21
Conclusion Implement and enhance MIRA as routing management platform reduces  the occurrence of traffic interference and thus network congestion should be minimized.  The network optimization (through critical link analysis) would be achieved by managing routing of traffic in the network.  Routing management with MIRA is proficient to leverage network performance, even throughput, received  packet and delay 3/24/2010 22

More Related Content

What's hot

PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
 
Internet Traffic Engineering for Partially Uncertain Demands
Internet Traffic Engineering for Partially Uncertain DemandsInternet Traffic Engineering for Partially Uncertain Demands
Internet Traffic Engineering for Partially Uncertain DemandsEM Legacy
 
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingAn Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingCSCJournals
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
 
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...IJMER
 
Graph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designGraph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designjpstudcorner
 
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONijwmn
 
Graph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designGraph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designIeee Xpert
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkcsandit
 
Flexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticFlexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticIeee Xpert
 
High performance nb-ldpc decoder with reduction of message exchange
High performance nb-ldpc decoder with reduction of message exchange High performance nb-ldpc decoder with reduction of message exchange
High performance nb-ldpc decoder with reduction of message exchange Ieee Xpert
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...Milad Kiaee
 
High performance pipelined architecture of elliptic curve scalar multiplicati...
High performance pipelined architecture of elliptic curve scalar multiplicati...High performance pipelined architecture of elliptic curve scalar multiplicati...
High performance pipelined architecture of elliptic curve scalar multiplicati...Ieee Xpert
 
A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...Ieee Xpert
 
Flexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticFlexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticNexgen Technology
 
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...Danny Alex Lachos Perez
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Community based routing scheme for future Internet considering PLM systems
 Community based routing scheme for future Internet considering PLM systems Community based routing scheme for future Internet considering PLM systems
Community based routing scheme for future Internet considering PLM systemsYatish Bathla
 
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...IRJET Journal
 
HIGH SPEED MULTIPLE VALUED LOGIC FULL ADDER USING CARBON NANO TUBE FIELD EFFE...
HIGH SPEED MULTIPLE VALUED LOGIC FULL ADDER USING CARBON NANO TUBE FIELD EFFE...HIGH SPEED MULTIPLE VALUED LOGIC FULL ADDER USING CARBON NANO TUBE FIELD EFFE...
HIGH SPEED MULTIPLE VALUED LOGIC FULL ADDER USING CARBON NANO TUBE FIELD EFFE...VLSICS Design
 

What's hot (20)

PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
 
Internet Traffic Engineering for Partially Uncertain Demands
Internet Traffic Engineering for Partially Uncertain DemandsInternet Traffic Engineering for Partially Uncertain Demands
Internet Traffic Engineering for Partially Uncertain Demands
 
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT ForwardingAn Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
An Efficient Wireless Backhaul Utilizing MIMO Transmission and IPT Forwarding
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
 
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...Review and Comparisons between Multiple Ant Based Routing  Algorithms in Mobi...
Review and Comparisons between Multiple Ant Based Routing Algorithms in Mobi...
 
Graph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designGraph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate design
 
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
 
Graph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designGraph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate design
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
 
Flexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticFlexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmetic
 
High performance nb-ldpc decoder with reduction of message exchange
High performance nb-ldpc decoder with reduction of message exchange High performance nb-ldpc decoder with reduction of message exchange
High performance nb-ldpc decoder with reduction of message exchange
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
 
High performance pipelined architecture of elliptic curve scalar multiplicati...
High performance pipelined architecture of elliptic curve scalar multiplicati...High performance pipelined architecture of elliptic curve scalar multiplicati...
High performance pipelined architecture of elliptic curve scalar multiplicati...
 
A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...A high performance fir filter architecture for fixed and reconfigurable appli...
A high performance fir filter architecture for fixed and reconfigurable appli...
 
Flexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmeticFlexible dsp accelerator architecture exploiting carry save arithmetic
Flexible dsp accelerator architecture exploiting carry save arithmetic
 
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
Delivering Application-Layer​ Traffic Optimization​ (ALTO) Services based on ...
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Community based routing scheme for future Internet considering PLM systems
 Community based routing scheme for future Internet considering PLM systems Community based routing scheme for future Internet considering PLM systems
Community based routing scheme for future Internet considering PLM systems
 
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
Improving of Energy Efficiency in LTE based MIMO-OFDM systems with Multiuser ...
 
HIGH SPEED MULTIPLE VALUED LOGIC FULL ADDER USING CARBON NANO TUBE FIELD EFFE...
HIGH SPEED MULTIPLE VALUED LOGIC FULL ADDER USING CARBON NANO TUBE FIELD EFFE...HIGH SPEED MULTIPLE VALUED LOGIC FULL ADDER USING CARBON NANO TUBE FIELD EFFE...
HIGH SPEED MULTIPLE VALUED LOGIC FULL ADDER USING CARBON NANO TUBE FIELD EFFE...
 

Similar to Routing Management with MIRA and enhancement (IMECS2010)

Solving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataSolving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataIJCNCJournal
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteedIJCNCJournal
 
Optimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsOptimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsIRJET Journal
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET Journal
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...IJECEIAES
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...TELKOMNIKA JOURNAL
 
E04124030034
E04124030034E04124030034
E04124030034IOSR-JEN
 
Optimization of IP Networks in Various Hybrid IGP/MPLS Routing Schemes
Optimization of IP Networks in Various Hybrid IGP/MPLS Routing SchemesOptimization of IP Networks in Various Hybrid IGP/MPLS Routing Schemes
Optimization of IP Networks in Various Hybrid IGP/MPLS Routing SchemesEM Legacy
 
An Effective approach to control Inter-domain Traffic Engineering among Heter...
An Effective approach to control Inter-domain Traffic Engineering among Heter...An Effective approach to control Inter-domain Traffic Engineering among Heter...
An Effective approach to control Inter-domain Traffic Engineering among Heter...ijistjournal
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networkspaperpublications3
 
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET Journal
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...IRJET Journal
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksCSCJournals
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 

Similar to Routing Management with MIRA and enhancement (IMECS2010) (20)

Solving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataSolving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing data
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteed
 
Optimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsOptimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath Flows
 
IRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing AlgorithmsIRJET- Survey on Adaptive Routing Algorithms
IRJET- Survey on Adaptive Routing Algorithms
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...
 
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...Determining the Optimum Number of Paths for Realization of Multi-path Routing...
Determining the Optimum Number of Paths for Realization of Multi-path Routing...
 
E04124030034
E04124030034E04124030034
E04124030034
 
Optimization of IP Networks in Various Hybrid IGP/MPLS Routing Schemes
Optimization of IP Networks in Various Hybrid IGP/MPLS Routing SchemesOptimization of IP Networks in Various Hybrid IGP/MPLS Routing Schemes
Optimization of IP Networks in Various Hybrid IGP/MPLS Routing Schemes
 
An Effective approach to control Inter-domain Traffic Engineering among Heter...
An Effective approach to control Inter-domain Traffic Engineering among Heter...An Effective approach to control Inter-domain Traffic Engineering among Heter...
An Effective approach to control Inter-domain Traffic Engineering among Heter...
 
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networks
 
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
Hb3512341239
Hb3512341239Hb3512341239
Hb3512341239
 
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Routing Management with MIRA and enhancement (IMECS2010)

  • 1. Analysis and Simulation Routing Management MIRA (Minimum Interference Routing Algorithm) for Speedy traffic on MPLS Network By : 1. RendyMunadi (rnd@ittelkom.ac.id) 2. AkhmadZaimi (djimie@gmail.com) 3. SofiahNaning (snh@ittelkom.ac.id) 1 3/24/2010
  • 2. Background Routing Management Multi-services multi-treatment single network (best effort & QOS aware) MPLS Network as IP backbone has capacity constraint and routing mechanism constraint (SPF). The new routing management scheme is proposed using Minimum Interference Routing Algorithm (MIRA). Research’s objective increased availability and accessibility Speedy (BE service) to optimize network resource usage 3/24/2010 2
  • 3. Basic Concept of MPLS-TE In MPLS-TE, headend LSR should be accomplished with network topology and other auxiliary information. The required information: bandwidth, TE metric, max. bandwidth, max. bandwidth reserveable, unreserved max. bandwidth and administrative group of links. 3/24/2010 3 MPLS-TE: FIB Construction
  • 4. Basic Concept of MIRA Least cost routing, from 1  9: 1 – 4 – 5 – 9 (cost=4) 2  8: 2 – 4 – 5 – 8 (cost=4, but interfere 1-9 path) 3  8: 3 – 4 – 6 – 7 – 5 – 8 (cost=8) Terms: interference, minimum interference path, critical link Next issues: Observes critical links of QoS traffic with multi-path consideration Analyze best method to optimize netw. resources for both, BE+QoS service, in term of multi-path. 3/24/2010 4
  • 5. Algorithm (MIRA) Input A graph G(N,L) and a set B of residual capacities on all the arcs. An ingress node a and an egress node b between which a flow of D demand units have to routed Output A route between a and b having capacity of D units of bandwidth Algorithm Compute the maximum flow values for all Compute the set of critical links Csd for all Compute the weights Eliminate all links which have residual bandwidth less than D and form a reduced network Using Djikstra’s algorithm compute the shortest path (a-b) in the reduced network using w(l) as the weight on link l Route the demand of D units from a to b along this shortest path and update the residual capacities 3/24/2010 5
  • 6. Algorithm (Enhancement of MIRA) 3/24/2010 Akhmad Zaimi 212080001 6 Input A graph G(N,L) and a set B of residual capacities on all the arcs. An ingress node a and an egress node b between which a flow of D demand units have to routed Output A route between a and b having capacity of D units of bandwidth Algorithm Identify Ingress Egress Node including bw. allocation Compute weight of Ingress Egress Pair: Compute the candidate paths for all Compute the set of critical links Csd for all M1: all links, both MP and BP, are critical link M2: if B(l) < D then l = Csd, resource allocated for both MP and BP M3: if B(l) < D then l = Csd, resource allocated only for MP
  • 7. Algorithm (Enhancement of MIRA) 3/24/2010 Akhmad Zaimi 212080001 7 Compute the weight of critical link Compute network cost (M1, M2, M3) Include link capacity as a factor of network cost (adopt OSPF cost) Eliminate all links with B < D and form a reduced network Use Djikstra’s algorithm to compute the shortest path (a-b) in the reduced network based on network cost Route the demand of D units from a to b and update the residual capacities
  • 8. Candidate Paths Analysis 3/24/2010 Akhmad Zaimi 212080001 8 The applied rules: Candidate path of S1 to D7: Path 1: 1 – 2 – 5 – 7 (main path) Path 2: 1 – 2 – 8 – 10 - 7 (backup path) Path 3: 1 – 3 – 4 – 6 – 9 – 7 (backup path) Analyze critical links on all of candidate path 4 9 6 3 2 5 1 7 8 10
  • 10. Routing Mechanism Nodes route traffic relying on least cost routing mechanism. On previous topology, source to destination routing would be as the following table. 3/24/2010 10
  • 11. Analysis and Discussion Modeling Routing Management System Input of MIRA: G(N, L, B); B = residual capacity (Mbps) on each links 3/24/2010 11
  • 12. Modeling Routing Management System Ingress Egress Pairs VPN IP 3/24/2010 12
  • 13. Modeling Routing Management System Size of Demands for Each Ingress Egress Pairs (Mbps) Weight of Ingress Egress Pairs 3/24/2010 13
  • 14. Modeling Routing Management System The number of candidate paths (main path and backup) is about 251 candidate paths of IP VPN. Then, analyze critical links within all of candidate paths. And here is the result of computation using 3 methods. 3/24/2010 14
  • 15. Highlight of M3 Result Critical link regards to M3 computation 3/24/2010 15 Network cost regard to M3 computation
  • 16. Analysis and Discussion Output Analysis Result path of routing management Then, to prove the interference path produced by SPF algorithm. 3/24/2010 16
  • 17. Output Analysis 3/24/2010 Akhmad Zaimi 212080001 17 Interference Analysis of SPF algorithm: From 13  2 passes through some critical links (hop 3 and 4) From 13  3 passes through one critical links, which is hop 2.
  • 18. Analysis and Discussion Output Analysis Network resource optimization. 3/24/2010 18
  • 19. Analysis and Discussion Network Performance 3/24/2010 19
  • 20. Analysis and Discussion Network Performance 3/24/2010 20
  • 21. Analysis and Discussion Network Performance 3/24/2010 21
  • 22. Conclusion Implement and enhance MIRA as routing management platform reduces the occurrence of traffic interference and thus network congestion should be minimized. The network optimization (through critical link analysis) would be achieved by managing routing of traffic in the network. Routing management with MIRA is proficient to leverage network performance, even throughput, received packet and delay 3/24/2010 22
  • 23. Thank You 23 3/24/2010

Editor's Notes

  1. PT. TELKOM offers Speedy as internet broadband(BE) solution while provides IP VPN(SLA) for enterprise customers, in the same network.
  2. Best effort depicts of Speedy traffic characteristicQoS aware (sensitive traffic) depicts of IP VPN traffic characteristic
  3. Best effort depicts of Speedy traffic characteristicQoS aware (sensitive traffic) depicts of IP VPN traffic characteristicInterference The interference only take place if the decreasing maximum flow caused by other traffic flow in the same channel. Minimum Interference PathAn explicit route that maximize the minimum maxflow between other ingress egress pair [9].Critical LinkA group of links to the characteristics whenever an LSP is routed over those links the maxflow values of one or more ingress egress pair decreases (denoted by αsd).
  4. Jelasin tiap metode critical link M1  M2
  5. PE-BOO (1)PE-GB3 (18)PE-TAN (2)PE-BOO3 (21)PE-BKS (3)PE-CPP (27)PE-KBB-BRAS (4)PE-KRT (29)PE-JT-BRAS (5)PE-ANC (30)PE-GB-BRAS (6)PE-PSB (34)PE-ELK (13)PE-KAL (35)PE-GB (17)PE-SBB (36)PE-BOO (1)PE-GB3 (18)PE-TAN (2)PE-BOO3 (21)PE-BKS (3)PE-CPP (27)PE-KBB-BRAS (4)PE-KRT (29)PE-JT-BRAS (5)PE-ANC (30)PE-GB-BRAS (6)PE-PSB (34)PE-ELK (13)PE-KAL (35)PE-GB (17)PE-SBB (36)PE-BOO (1)PE-GB3 (18)PE-TAN (2)PE-BOO3 (21)PE-BKS (3)PE-CPP (27)PE-KBB-BRAS (4)PE-KRT (29)PE-JT-BRAS (5)PE-ANC (30)PE-GB-BRAS (6)PE-PSB (34)PE-ELK (13)PE-KAL (35)PE-GB (17)PE-SBB (36)