SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
DOI : 10.5121/ijist.2012.2605 53
An Effective approach to control Inter-domain
Traffic Engineering among Heterogeneous
Networks
Vivekanandan Mahadevan, Joseph Raymond
Department of Information Technology, SRM University, Chennai
Vivekanandan.ma@ktr.srmuniv.ac.in, Joseph.v@ktr.srmuniv.ac.in
ABSTRACT
The Flow of packets inside an IP networks can be effectively controlled by appropriate traffic engineering.
Today’s internet routing mainly concentrates on controlling the ingress and egress traffic which occurs
through border routers. There are different ways by which we can control the traffic between autonomous
systems. In most cases redistribution communities are used for the control over traffic engineering. In this
paper we focus on alternative approaches like Multi Protocol Label Switching (MPLS) and Ambient
Networks, through which there can be an effective control over traffic engineering. Ambient Networks
are designed to solve switching problems between heterogeneous networks.
KEYWORDS
Traffic Engineering, BGP, MPLS, Local Preference, Ambient Networks.
1. INTRODUCTION
Internet and other private network uses IP addresses to communicate between peers. Today’s
Internet is completely dominated by the IPv4 address scheme. The shortage of IPv4 address
space was forecasted few years back and because of that many proposal emerged to keep the
existence of IPv4 address alive. The deficiencies of IPv4 address emerged not only because of its
shortage of address space and technical issues, but also due to some political differences
involved in the distribution and allocation of the address.BGP is the exterior gateway
protocol which is used in the internet to exchange routing information between autonomous
systems. An Autonomous system is a group of routers that share similar routing policies and
operate within a single administrative domain. If an AS connects to the public Internet
using an exterior gateway routing protocol such as BGP, then it must be assigned a unique AS
number which is then managed by Internet Assigned Number Authority (IANA). The flow of
data towards an autonomous system from different destination is known as ingress traffic. On the
other side, egress traffic flows towards destination from the source.
ISP’s should have proper border routers which are capable enough to balance this traffic. BGP
acts like a RIP, if it is not properly tuned. Hence the network administrator has to properly
tune their network to avoid unnecessary flow of data packets which will result in network
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
54
congestion. To avoid such congestion we need traffic engineering. Traffic engineering should be
implemented effectively so that ISP’s can provide a better quality of service between its
customers and the upstream providers. While controlling the traffic , some of the important
parameters such as link capability, speed, next hop, bandwidth etc have to be considered. This
paper exhibits the different ways by which we can do traffic engineering to obtain a better QOS.
The most well-known and commonly used traffic engineering technique is redistribution
communities. Communities by themselves cannot have an impact of BGP decision making
process. Flags are used in communities to mark a set of routes. These flags will be used by
other autonomous system routers to apply those specific routing policies with in their network.
Administrators will be using some of the BGP attributes like next-hop, local preference along
with community attributes to control the ingress and egress traffic. These community attributes
have few drawbacks which limits its usage over the internet.
2. Ingress and Egress Traffic Control
Ingress and egress traffic can be effectively controlled using BGP attributes. Local preference and
metric has been configured for the following topology in order to estimate the traffic
characteristics of ingress and egress traffic. The result is as follows
2.1. Local-preference
This attribute can be mainly used to control the path that egress traffic takes. Using the topology
in Figure 1 local preference is configured to control the outgoing traffic from AS100 to AS300
and AS400. The network 100.100.100.0 is in AS300-R6 and 200.100.100.0 network is in AS
400- R7. Initially without tuning, BGP makes the routing decision based on next hop. The
shortest path from R1 to R6 is via 172.168.3.2 and to R7 is through 172.168.4.2
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
55
Before configuring BGP Attributes:
After configuring Local preference
From the above table it is clear that an administrator can have an effective control over an
outgoing traffic using LP within his autonomous system.
2.2. Metric
Metric is the only attribute which can be used to control the incoming traffic from other
autonomous systems. Here we are going to configure metric values to the border routers on an
autonomous system so that the route of ingress traffic towards this autonomous system is
changed. Before configuring it, in order to explain metric, some changes have been made to the
topology in the figure. A serial link is connected between routers R3 and R4. Network 60.0.0.0 is
configured on router R4. Extended ping has been used to test the connectivity from router R3 to
R4 via 172.16.2.2 of the serial interface.
Before configuring metric the obtained ping result is
Target IP address: 60.0.0.1
Repeat count [5]: 1
Datagram size [100]: Timeout in seconds [2]: Extended commands [n]: y
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
56
Source address or interface: 172.168.2.2
Reply to request 0 (56 ms). Received packet has options Total option bytes= 40, padded
length=40
Record route: (172.168.8.1) (60.0.0.1) (172.168.8.2) (172.168.2.2)
<*>
Figure2.Routing using metrics
After configuring metric:
Reply to request 0 (112 ms). Received packet has options Total option bytes= 40, padded
length=40
Record route: (172.168.8.1) (60.0.0.1) (172.168.3.2) (172.168.1.2) (172.168.2.1) (172.168.2.2)
<*>
Hence from this it is to be noted that an administrator can even have a control over ingress
traffic using metric. Even here an administrator can only control the external interface of an
autonomous system from which the administrator is receiving ingress traffic and not the other
autonomous system.
3. Community Attributes
Finally it has to be noted that if an administrator wants to have a control over the other
autonomous system, the administrator should find a way to pass the necessary attribute values to
the other autonomous system. This can be done by making use of community attribute. But there
are drawbacks that have to be considered while passing an attribute along with BGP table to the
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
57
other autonomous system.
Some of the drawbacks of the community attributes are:
• Whenever an autonomous system wants to use communities, it should advertise its own
community value to all other external peers. There is no standard method for anyone to
advertise this community value.
•Using BGP attributes results in more human errors which affect the global internet routing to a
greater extent.
• While including community attributes, several route filters have to be applied appropriately.
This further increases the complexity of the BGP routing table.
• Finally the most prominent drawback of redistribution communities is that it requires
manual configuration at every router.
In the next two sections we are going to see two different methods for traffic engineering i.e.
Multi Protocol Label Switching and Ambient Networks. The following focus on how these two
methods are suitable for traffic engineering.
4. MULTI PROTOCOL LABEL SWITCHING (MPLS)
Multi Protocol Label Switching (MPLS) is an improved packet forwarding scheme which can
offer advanced IP services and it is highly scalable. It is rather a new technology that is used to
address issues concerned with packet forwarding. In this paper we are going to focus on how
MPLS can be used for traffic engineering. The First section focuses on the introduction of MPLS,
the new terms used in it and its working mechanism. Later part explains how MPLS can be used
in Traffic Engineering.
4.1 How MPLS works
The Following figure explains how a packet flows through a MPLS network.
Figure3. MPLS Network
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
58
Now at the ingress traffic of each edge LSR, a MPLS label or header is included based on the
information from the Label Distribution Protocol (LDP). Within the MPLS cloud this label is
used by the LSR to lookup its forwarding table and then it changes the label if required and
forwards it to the next LSR where the process is repeated. Finally at the egress Edge LSR, the
MPLS label is removed. This MPLS label is composed of 32 bits and these bits are divided as
shown in figure
Figure4. MPLS Label format
The path followed by the packet between the two edge LSR’s is called Label Switched Path
(LSP), and these LSP’s are created with the routing information available in the LDP table. The
LSP paths are controlled by assigning attributes, where each LSP has its own attributes.
The various attributes used are,
1. Bandwidth
2.Path Attribute
3. Setup Priority
4. Affinity
5. Adaptability
6. Holding Priority
7. Resilience
4.2 Traffic Engineering with MPLS
The following explains some of the features in the MPLS architecture that makes it suitable for
traffic engineering and then how these features are being used for traffic engineering. The table
describes the features [8],In MPLS-TE a Label Switched Path is established in order to forward
the traffic. This LSP can be established by using different signalling methods and the most
common method is Constraint Based Routing Label Distribution Protocol (CR-LDP).
Constraint Based Routing computes the path for a packet in a way that the load is balanced to all
paths. It not only considers the network topology but also other path constraints such as
bandwidth and administrative policy. Finally it establishes an explicit route and this route do not
have to be the shortest path, since it can select a lightly loaded path in order to prevent the usage
of a heavily loaded shortest path. Hence by combining MPLS and CBR, traffic engineering can
be done much better.
The method described above is for an MPLS specific module. There are other methods in which
enhancements to already existing modules such as Resource Reservation Protocol (RSVP) and
IGP's are done in order to support MPLS-TE. For example in RSVP, extensions are done to the
message formats to support traffic attributes during signaling processes and a complete explicit
route is established. Routing by Resource Reservation (RRR) is a new method by which traffic
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
59
engineering is implemented. MPLS -TE has been used along with RRR to avoid network
congestion and optimally utilize the network resources that are available.
Advantages of MPLS in Traffic Engineering
1. Reduces operation cost by using the network backbone infrastructure efficiently.
2. It increases network scalability and simplifies the overall network management.
3. MPLS-TE can be supported by modifying existing signaling protocols.
4. It provides an alternative path when the primary path fails.
5. Avoids manual configuration and provides effective forwarding rate using layer2
address.
6. Avoids human error to an greater extent.
Table1. MPLS Architectural features for Traffic Engineering
5. AMBIENT NETWORKS
Definition (Views): [Abrahamsson] expresses Ambient Network as a new network technology
platform that will be able to bring together the cooperation of different networks regardless
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
60
of their different domains. Another view of the Ambient Network, considers the network as a
technology that will bridge incompatibilities of different network functions [Bength]. With the
recent improvements in modern technological developments like mobile technology and wireless
links, this network has the ability to combine features like WLAN, GSM and 3G to work
together.
Figure5. Ambient Network
5.1 Architecture
The architecture of the ambient network is built to integrate features like mobile communication
networks and 3G [Bengt11]. The Ambient Network internetworking phase is divided into two
main frameworks i.e. Connectivity Framework and Naming Framework [Bength]. The
Connectivity Framework encompasses the Ambient Control Space (ACS….refer to diagram)
which controls all functions of the network integration through its interfaces (Resource Interface
and Service Interface) [6th Prg].
Figure6. Control space modularization and interfaces
Figure 6, shows how different technologies are connected by their links through the AN platform.
As this connectivity will include nodes, there will also be an exhibition sequence of traffics
between any two nodes (and these sequence pattern can be regarded as paths) within a provided
time [Bength].
The Naming Framework is based on “entities” and not the names of the entities such as
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
61
namespace used in every important layers [Bengths 9]. Bengt et al [], describes four categories
Ambient Network Naming layers. These are:
• Naming Layers: deals with entities like applications, services and data.
Dynamic Binding between Levels: so that entities can become location free.
• Indirect and Delegation: creates an advance mobility series and gives control to processes like
NAT, so that an entity can attach itself to any network in any location.
• Bridging Across Different Addressing Realms: uses translation from foreign domain to a native
and also uses common namespace that can be used by all networks.
Figure7. Abstract connectivity planes in Ambient Networks
5.2 Effects of Ambient Networks on Traffic Engineering
Integration is the main purpose of Ambient Networks and the need to handle traffic loads must be
an essential focus. Since there will be different devices on different networks, a dynamic traffic
distribution system is needed to maintain a proper flow of the information delivery [Abra]. To
enable AN deal with the traffic engineering, the following methods can help,
a. Multi-Commodity Flow Optimization: by tackling MCF problems (global optimal
solution can calculate global information with regards to its links capabilities and
traffic demands). The advantage of using this solution is its faster ability to calculate
thousands of global optimal solutions which can aid in faster delivery of packets.
Using these optimization methods can be configured as the primary path determinant.
Attributes of the traditional routing protocols e.g. OSPF can also be used as
secondary path determinant.
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
62
Figure8. Traffic Engineering Process (Source [Towards])
The collaboration of the above two information processes can create a division of labour, where a
global optimal solution handles the topology connectivity using routing protocols like OSPF.
While the attributes can handle the traffic demands like load balancing.
b. Local State Perspective: depends on taking local decisions e.g. load balancing in a dynamic
network environment which traffic demand increase can shift location from heavy or a low
consumed paths. Also the use of new improve algorithms like the Multi Path-Routing with
Dynamic Variance (MRDV) can also aid in distributing and localizing multi-path routing
[towards paper 8]. An MRDV algorithm includes the load of the next hop router which can help to
determine a lesser load link to use.
Brunners et al [], states that traffic engineering in AN “which needs to provide connectivity
anywhere, anytime, at a low cost” needs to address problems of shifting traffic demands and
network topology
with dynamic emphasis [4] [5]. These problems could be solved by the implementation to two
steps [7],
Sufficient information gathering: this method is used to increase the optimization of routing in
the network. Two ways of collecting information from source to destination are by using the
Traffic Matrix (enables the capturing and analyzing of data entering backbones that runs a BGP
routing protocol) and Link loads (to enable load balancing and also allows creates scalability and
redundancy).
Optimization of routing configuration: - the use of forwarding system like MPLS (which can use
label switch path) can result to an improve traffic.
6. FUTURE ENHANCEMENT:
To make MPLS better and to use it globally, certain flag attributes have to be inserted along with
label distribution protocol to control the traffic manually. This will not add to the BGP payload
because LDP is a separate protocol which is used to forward only the labels. Finally we came to
know about an emerging technology known as ambient networks which can be considered as an
alternative for traffic engineering in the future, where it may be required to combine different
networks in different domains.
7. RELATED WORK
An in depth explanation of the MPLS Architecture is seen in [9]. The various features of MPLS
that make it suitable and its advantages for traffic engineering are explained in [8]. There have
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
63
been recent implementations of MPLS along with other signaling protocols in certain areas. For
example MPLS is used with Routing by Resource reservation (RRR) in order to improve traffic
engineering. It is possible that in the near feature we will need combining of networks from
different domains and Ambient Networks is considered to be a suitable solution. Traffic
engineering and its feasibility in Ambient Networks is seen in [4]. Broader knowledge of the
architecture of Ambient Networks was studied in [6].
The use of MPLS and Ambient Networks can prove to be more suitable for traffic engineering
than Redistribution Communities in the near feature considering the drawbacks of redistribution
communities. It is also possible to combine MPLS with BGP in order to obtain better traffic
engineering which in turn gives better QoS.
6. CONCLUSION
Thus in this paper we analyzed the different way of controlling the ingress and egress traffic
especially between different autonomous systems. The most usual way by which these traffic’s
were controlled by using community attributes. Our analysis and prediction says that if MPLS is
used for controlling traffic, the rate can be controlled in a much brisk pace, since it is using layer2
forwarding. This also reduces human error to a greater extent. Finally a network integration
design called ambient networks is a platform which integrates and provides a communication
paradigm among heterogeneous networks.
REFERENCES
[1] Jerome Saltzer. On the Naming and Binding of Network Destinations. In P. Ravasio et al. (ed.), Local
Computer Networks, North-Holland Publishing Company, Amsterdam, 1982, pp. 311-317. (Reprinted
as RFC1498, August 1993.)
[2] Bengt Ahlgren, Lars Eggert, Börje Ohlman and Andreas Schieder: “Bridging Heterogeneous Network
Domains”. European Union Commission. Sixth Framework Programme. March 30th, 2005 Pg 1-5.
[3] Marcus Brunner, Alex Galis , Lawrence Cheng, Jorge Andrés Colás, Bengt Ahlgren, Anders Gunnar,
Henrik Abrahamsson, Robert Szabo, Simon Csaba, Johan Nielsen, Alberto Gonzalez Prieto, Rolf
Stadler, Gergely Molnar: “Towards Ambient Networks Management”. Ambient Networks -
Information Society Technologies Project. European Union Commission. Accessed:
http://www.ambientnetworks.org/phase1web/publications/Towards_Ambient_Networks_Management.
pdf on 14th Feb, 2010.
[4] Henrik, Abrahamsson. & Anders, Gunnar: “Traffic Engineering in Ambient Networks: Challenges
and Approaches”. Swedish Computer Institute. Accessed on: http://www.sics.se/~henrik/ante-sncnw-
final.pdf on 13th Feb,2010.
[5] Sixth Framework Programme: Ambient Network. “Ambient Network Management –Technologies
and Strategies”. Project 507134. 21st Dec, 2004. Pg 1-124
[6] Sixth Framework Programme: Ambient Network. “AN Framework Architecture”. Project 507134.
30th Dec, 2005. Pg 1-120
[7] Stefan Schmid, Lars Eggert, Marcus Brunner and Jürgen Quittek. Towards Autonomous Network
Domains. Proc. 8th IEEE Global Internet Symposium, Miami, FL, USA, March 17-18, 2005. ….Bengt
11
[8] George Swallow, “MPLS Advantages for Traffic Engineering”, Cisco Systems.
[9] John Evans, “MPLS Architecture“, Cisco Systems.
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
VIVEKANANDAN .M CCNP Net
 Obtained letter of appreci
CCNP modules from Cisco N
 Working in Ideaon Think
working in SRM University as
analyst in Cisco Network Acad
 Worked with Cable and
Engineer for 6 Months
 Have Masters in Computer Network Engineering (2010) (Grade 5), HALMSTAD
University, Sweden
 Excellent communication 
 Worked in team envir
development Lifecycle.
 Worked as a Network train
 Worked as a trainee
telecommunication domain, i
automated the PABX by making
to C++) provided by the compa
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
twork Academy Certified Professional
iation from CISCO for all CCNA and
Network Academy
as a Senior Network Trainer as well as
sity as a Assistant Professor cum research
demy.
d Wireless Worldwide as a Network
Have Masters in Computer Network Engineering (2010) (Grade 5), HALMSTAD
tion  presentation skills in working area.
ronment and had expertise in the compl
ner in Linsun Technologies for 1year.
e in ALCATEL LUCENT for 8 month
in, i.e. we wrote testing codes to automate PA
king use of 2 tools (PILOT2a,C-AUTECO-which is
any.
International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
64
Have Masters in Computer Network Engineering (2010) (Grade 5), HALMSTAD
plete project
onths, in the
PABX and we
h is very similar

More Related Content

What's hot

Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETEswar Publications
 
Traffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemTraffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemIOSR Journals
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
Simulation of LTE Network Parameters
Simulation of  LTE Network ParametersSimulation of  LTE Network Parameters
Simulation of LTE Network ParametersIRJET Journal
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewIRJET Journal
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir Mehdi Ahmadian
 
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdfPerformance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdfIUA
 
Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfIUA
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Ccna 3-discovery-4-0-module-7-100-
Ccna 3-discovery-4-0-module-7-100-Ccna 3-discovery-4-0-module-7-100-
Ccna 3-discovery-4-0-module-7-100-junkut3
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...TELKOMNIKA JOURNAL
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
 

What's hot (20)

Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANET
 
Traffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology SystemTraffic Dynamics in Virtual Routing Multi Topology System
Traffic Dynamics in Virtual Routing Multi Topology System
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
Simulation of LTE Network Parameters
Simulation of  LTE Network ParametersSimulation of  LTE Network Parameters
Simulation of LTE Network Parameters
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A ReviewAttacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-Amir ahmadian tlt-6507-seminar report final version-
Amir ahmadian tlt-6507-seminar report final version-
 
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdfPerformance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
 
Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdf
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Ccna 3-discovery-4-0-module-7-100-
Ccna 3-discovery-4-0-module-7-100-Ccna 3-discovery-4-0-module-7-100-
Ccna 3-discovery-4-0-module-7-100-
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
A New Model of Genetic Zone Routing Protocol (GZRP): The Process of Load Bala...
 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
 

Similar to An Effective approach to control Inter-domain Traffic Engineering among Heterogeneous Networks

DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNETDIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNETijcseit
 
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip trafficIJCNCJournal
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Kimberly Jones
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...journalBEEI
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Networkijtsrd
 
Generating Router Level Topology Using Dns And Ip Identifier
Generating Router Level Topology Using Dns And Ip IdentifierGenerating Router Level Topology Using Dns And Ip Identifier
Generating Router Level Topology Using Dns And Ip IdentifierIJERA Editor
 

Similar to An Effective approach to control Inter-domain Traffic Engineering among Heterogeneous Networks (20)

DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNETDIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET
 
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS CloudIRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
IRJET - Designing a High Level Corporate Network Infrastructure with MPLS Cloud
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip traffic
 
Group 1
Group 1Group 1
Group 1
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
A study on “link
A study on “linkA study on “link
A study on “link
 
Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
C0343015019
C0343015019C0343015019
C0343015019
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Network
 
Generating Router Level Topology Using Dns And Ip Identifier
Generating Router Level Topology Using Dns And Ip IdentifierGenerating Router Level Topology Using Dns And Ip Identifier
Generating Router Level Topology Using Dns And Ip Identifier
 

More from ijistjournal

Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDYijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...ijistjournal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSijistjournal
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithmijistjournal
 

More from ijistjournal (20)

Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithm
 

Recently uploaded

Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 

Recently uploaded (20)

Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 

An Effective approach to control Inter-domain Traffic Engineering among Heterogeneous Networks

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 DOI : 10.5121/ijist.2012.2605 53 An Effective approach to control Inter-domain Traffic Engineering among Heterogeneous Networks Vivekanandan Mahadevan, Joseph Raymond Department of Information Technology, SRM University, Chennai Vivekanandan.ma@ktr.srmuniv.ac.in, Joseph.v@ktr.srmuniv.ac.in ABSTRACT The Flow of packets inside an IP networks can be effectively controlled by appropriate traffic engineering. Today’s internet routing mainly concentrates on controlling the ingress and egress traffic which occurs through border routers. There are different ways by which we can control the traffic between autonomous systems. In most cases redistribution communities are used for the control over traffic engineering. In this paper we focus on alternative approaches like Multi Protocol Label Switching (MPLS) and Ambient Networks, through which there can be an effective control over traffic engineering. Ambient Networks are designed to solve switching problems between heterogeneous networks. KEYWORDS Traffic Engineering, BGP, MPLS, Local Preference, Ambient Networks. 1. INTRODUCTION Internet and other private network uses IP addresses to communicate between peers. Today’s Internet is completely dominated by the IPv4 address scheme. The shortage of IPv4 address space was forecasted few years back and because of that many proposal emerged to keep the existence of IPv4 address alive. The deficiencies of IPv4 address emerged not only because of its shortage of address space and technical issues, but also due to some political differences involved in the distribution and allocation of the address.BGP is the exterior gateway protocol which is used in the internet to exchange routing information between autonomous systems. An Autonomous system is a group of routers that share similar routing policies and operate within a single administrative domain. If an AS connects to the public Internet using an exterior gateway routing protocol such as BGP, then it must be assigned a unique AS number which is then managed by Internet Assigned Number Authority (IANA). The flow of data towards an autonomous system from different destination is known as ingress traffic. On the other side, egress traffic flows towards destination from the source. ISP’s should have proper border routers which are capable enough to balance this traffic. BGP acts like a RIP, if it is not properly tuned. Hence the network administrator has to properly tune their network to avoid unnecessary flow of data packets which will result in network
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 54 congestion. To avoid such congestion we need traffic engineering. Traffic engineering should be implemented effectively so that ISP’s can provide a better quality of service between its customers and the upstream providers. While controlling the traffic , some of the important parameters such as link capability, speed, next hop, bandwidth etc have to be considered. This paper exhibits the different ways by which we can do traffic engineering to obtain a better QOS. The most well-known and commonly used traffic engineering technique is redistribution communities. Communities by themselves cannot have an impact of BGP decision making process. Flags are used in communities to mark a set of routes. These flags will be used by other autonomous system routers to apply those specific routing policies with in their network. Administrators will be using some of the BGP attributes like next-hop, local preference along with community attributes to control the ingress and egress traffic. These community attributes have few drawbacks which limits its usage over the internet. 2. Ingress and Egress Traffic Control Ingress and egress traffic can be effectively controlled using BGP attributes. Local preference and metric has been configured for the following topology in order to estimate the traffic characteristics of ingress and egress traffic. The result is as follows 2.1. Local-preference This attribute can be mainly used to control the path that egress traffic takes. Using the topology in Figure 1 local preference is configured to control the outgoing traffic from AS100 to AS300 and AS400. The network 100.100.100.0 is in AS300-R6 and 200.100.100.0 network is in AS 400- R7. Initially without tuning, BGP makes the routing decision based on next hop. The shortest path from R1 to R6 is via 172.168.3.2 and to R7 is through 172.168.4.2
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 55 Before configuring BGP Attributes: After configuring Local preference From the above table it is clear that an administrator can have an effective control over an outgoing traffic using LP within his autonomous system. 2.2. Metric Metric is the only attribute which can be used to control the incoming traffic from other autonomous systems. Here we are going to configure metric values to the border routers on an autonomous system so that the route of ingress traffic towards this autonomous system is changed. Before configuring it, in order to explain metric, some changes have been made to the topology in the figure. A serial link is connected between routers R3 and R4. Network 60.0.0.0 is configured on router R4. Extended ping has been used to test the connectivity from router R3 to R4 via 172.16.2.2 of the serial interface. Before configuring metric the obtained ping result is Target IP address: 60.0.0.1 Repeat count [5]: 1 Datagram size [100]: Timeout in seconds [2]: Extended commands [n]: y
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 56 Source address or interface: 172.168.2.2 Reply to request 0 (56 ms). Received packet has options Total option bytes= 40, padded length=40 Record route: (172.168.8.1) (60.0.0.1) (172.168.8.2) (172.168.2.2) <*> Figure2.Routing using metrics After configuring metric: Reply to request 0 (112 ms). Received packet has options Total option bytes= 40, padded length=40 Record route: (172.168.8.1) (60.0.0.1) (172.168.3.2) (172.168.1.2) (172.168.2.1) (172.168.2.2) <*> Hence from this it is to be noted that an administrator can even have a control over ingress traffic using metric. Even here an administrator can only control the external interface of an autonomous system from which the administrator is receiving ingress traffic and not the other autonomous system. 3. Community Attributes Finally it has to be noted that if an administrator wants to have a control over the other autonomous system, the administrator should find a way to pass the necessary attribute values to the other autonomous system. This can be done by making use of community attribute. But there are drawbacks that have to be considered while passing an attribute along with BGP table to the
  • 5. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 57 other autonomous system. Some of the drawbacks of the community attributes are: • Whenever an autonomous system wants to use communities, it should advertise its own community value to all other external peers. There is no standard method for anyone to advertise this community value. •Using BGP attributes results in more human errors which affect the global internet routing to a greater extent. • While including community attributes, several route filters have to be applied appropriately. This further increases the complexity of the BGP routing table. • Finally the most prominent drawback of redistribution communities is that it requires manual configuration at every router. In the next two sections we are going to see two different methods for traffic engineering i.e. Multi Protocol Label Switching and Ambient Networks. The following focus on how these two methods are suitable for traffic engineering. 4. MULTI PROTOCOL LABEL SWITCHING (MPLS) Multi Protocol Label Switching (MPLS) is an improved packet forwarding scheme which can offer advanced IP services and it is highly scalable. It is rather a new technology that is used to address issues concerned with packet forwarding. In this paper we are going to focus on how MPLS can be used for traffic engineering. The First section focuses on the introduction of MPLS, the new terms used in it and its working mechanism. Later part explains how MPLS can be used in Traffic Engineering. 4.1 How MPLS works The Following figure explains how a packet flows through a MPLS network. Figure3. MPLS Network
  • 6. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 58 Now at the ingress traffic of each edge LSR, a MPLS label or header is included based on the information from the Label Distribution Protocol (LDP). Within the MPLS cloud this label is used by the LSR to lookup its forwarding table and then it changes the label if required and forwards it to the next LSR where the process is repeated. Finally at the egress Edge LSR, the MPLS label is removed. This MPLS label is composed of 32 bits and these bits are divided as shown in figure Figure4. MPLS Label format The path followed by the packet between the two edge LSR’s is called Label Switched Path (LSP), and these LSP’s are created with the routing information available in the LDP table. The LSP paths are controlled by assigning attributes, where each LSP has its own attributes. The various attributes used are, 1. Bandwidth 2.Path Attribute 3. Setup Priority 4. Affinity 5. Adaptability 6. Holding Priority 7. Resilience 4.2 Traffic Engineering with MPLS The following explains some of the features in the MPLS architecture that makes it suitable for traffic engineering and then how these features are being used for traffic engineering. The table describes the features [8],In MPLS-TE a Label Switched Path is established in order to forward the traffic. This LSP can be established by using different signalling methods and the most common method is Constraint Based Routing Label Distribution Protocol (CR-LDP). Constraint Based Routing computes the path for a packet in a way that the load is balanced to all paths. It not only considers the network topology but also other path constraints such as bandwidth and administrative policy. Finally it establishes an explicit route and this route do not have to be the shortest path, since it can select a lightly loaded path in order to prevent the usage of a heavily loaded shortest path. Hence by combining MPLS and CBR, traffic engineering can be done much better. The method described above is for an MPLS specific module. There are other methods in which enhancements to already existing modules such as Resource Reservation Protocol (RSVP) and IGP's are done in order to support MPLS-TE. For example in RSVP, extensions are done to the message formats to support traffic attributes during signaling processes and a complete explicit route is established. Routing by Resource Reservation (RRR) is a new method by which traffic
  • 7. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 59 engineering is implemented. MPLS -TE has been used along with RRR to avoid network congestion and optimally utilize the network resources that are available. Advantages of MPLS in Traffic Engineering 1. Reduces operation cost by using the network backbone infrastructure efficiently. 2. It increases network scalability and simplifies the overall network management. 3. MPLS-TE can be supported by modifying existing signaling protocols. 4. It provides an alternative path when the primary path fails. 5. Avoids manual configuration and provides effective forwarding rate using layer2 address. 6. Avoids human error to an greater extent. Table1. MPLS Architectural features for Traffic Engineering 5. AMBIENT NETWORKS Definition (Views): [Abrahamsson] expresses Ambient Network as a new network technology platform that will be able to bring together the cooperation of different networks regardless
  • 8. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 60 of their different domains. Another view of the Ambient Network, considers the network as a technology that will bridge incompatibilities of different network functions [Bength]. With the recent improvements in modern technological developments like mobile technology and wireless links, this network has the ability to combine features like WLAN, GSM and 3G to work together. Figure5. Ambient Network 5.1 Architecture The architecture of the ambient network is built to integrate features like mobile communication networks and 3G [Bengt11]. The Ambient Network internetworking phase is divided into two main frameworks i.e. Connectivity Framework and Naming Framework [Bength]. The Connectivity Framework encompasses the Ambient Control Space (ACS….refer to diagram) which controls all functions of the network integration through its interfaces (Resource Interface and Service Interface) [6th Prg]. Figure6. Control space modularization and interfaces Figure 6, shows how different technologies are connected by their links through the AN platform. As this connectivity will include nodes, there will also be an exhibition sequence of traffics between any two nodes (and these sequence pattern can be regarded as paths) within a provided time [Bength]. The Naming Framework is based on “entities” and not the names of the entities such as
  • 9. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 61 namespace used in every important layers [Bengths 9]. Bengt et al [], describes four categories Ambient Network Naming layers. These are: • Naming Layers: deals with entities like applications, services and data. Dynamic Binding between Levels: so that entities can become location free. • Indirect and Delegation: creates an advance mobility series and gives control to processes like NAT, so that an entity can attach itself to any network in any location. • Bridging Across Different Addressing Realms: uses translation from foreign domain to a native and also uses common namespace that can be used by all networks. Figure7. Abstract connectivity planes in Ambient Networks 5.2 Effects of Ambient Networks on Traffic Engineering Integration is the main purpose of Ambient Networks and the need to handle traffic loads must be an essential focus. Since there will be different devices on different networks, a dynamic traffic distribution system is needed to maintain a proper flow of the information delivery [Abra]. To enable AN deal with the traffic engineering, the following methods can help, a. Multi-Commodity Flow Optimization: by tackling MCF problems (global optimal solution can calculate global information with regards to its links capabilities and traffic demands). The advantage of using this solution is its faster ability to calculate thousands of global optimal solutions which can aid in faster delivery of packets. Using these optimization methods can be configured as the primary path determinant. Attributes of the traditional routing protocols e.g. OSPF can also be used as secondary path determinant.
  • 10. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 62 Figure8. Traffic Engineering Process (Source [Towards]) The collaboration of the above two information processes can create a division of labour, where a global optimal solution handles the topology connectivity using routing protocols like OSPF. While the attributes can handle the traffic demands like load balancing. b. Local State Perspective: depends on taking local decisions e.g. load balancing in a dynamic network environment which traffic demand increase can shift location from heavy or a low consumed paths. Also the use of new improve algorithms like the Multi Path-Routing with Dynamic Variance (MRDV) can also aid in distributing and localizing multi-path routing [towards paper 8]. An MRDV algorithm includes the load of the next hop router which can help to determine a lesser load link to use. Brunners et al [], states that traffic engineering in AN “which needs to provide connectivity anywhere, anytime, at a low cost” needs to address problems of shifting traffic demands and network topology with dynamic emphasis [4] [5]. These problems could be solved by the implementation to two steps [7], Sufficient information gathering: this method is used to increase the optimization of routing in the network. Two ways of collecting information from source to destination are by using the Traffic Matrix (enables the capturing and analyzing of data entering backbones that runs a BGP routing protocol) and Link loads (to enable load balancing and also allows creates scalability and redundancy). Optimization of routing configuration: - the use of forwarding system like MPLS (which can use label switch path) can result to an improve traffic. 6. FUTURE ENHANCEMENT: To make MPLS better and to use it globally, certain flag attributes have to be inserted along with label distribution protocol to control the traffic manually. This will not add to the BGP payload because LDP is a separate protocol which is used to forward only the labels. Finally we came to know about an emerging technology known as ambient networks which can be considered as an alternative for traffic engineering in the future, where it may be required to combine different networks in different domains. 7. RELATED WORK An in depth explanation of the MPLS Architecture is seen in [9]. The various features of MPLS that make it suitable and its advantages for traffic engineering are explained in [8]. There have
  • 11. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 63 been recent implementations of MPLS along with other signaling protocols in certain areas. For example MPLS is used with Routing by Resource reservation (RRR) in order to improve traffic engineering. It is possible that in the near feature we will need combining of networks from different domains and Ambient Networks is considered to be a suitable solution. Traffic engineering and its feasibility in Ambient Networks is seen in [4]. Broader knowledge of the architecture of Ambient Networks was studied in [6]. The use of MPLS and Ambient Networks can prove to be more suitable for traffic engineering than Redistribution Communities in the near feature considering the drawbacks of redistribution communities. It is also possible to combine MPLS with BGP in order to obtain better traffic engineering which in turn gives better QoS. 6. CONCLUSION Thus in this paper we analyzed the different way of controlling the ingress and egress traffic especially between different autonomous systems. The most usual way by which these traffic’s were controlled by using community attributes. Our analysis and prediction says that if MPLS is used for controlling traffic, the rate can be controlled in a much brisk pace, since it is using layer2 forwarding. This also reduces human error to a greater extent. Finally a network integration design called ambient networks is a platform which integrates and provides a communication paradigm among heterogeneous networks. REFERENCES [1] Jerome Saltzer. On the Naming and Binding of Network Destinations. In P. Ravasio et al. (ed.), Local Computer Networks, North-Holland Publishing Company, Amsterdam, 1982, pp. 311-317. (Reprinted as RFC1498, August 1993.) [2] Bengt Ahlgren, Lars Eggert, Börje Ohlman and Andreas Schieder: “Bridging Heterogeneous Network Domains”. European Union Commission. Sixth Framework Programme. March 30th, 2005 Pg 1-5. [3] Marcus Brunner, Alex Galis , Lawrence Cheng, Jorge Andrés Colás, Bengt Ahlgren, Anders Gunnar, Henrik Abrahamsson, Robert Szabo, Simon Csaba, Johan Nielsen, Alberto Gonzalez Prieto, Rolf Stadler, Gergely Molnar: “Towards Ambient Networks Management”. Ambient Networks - Information Society Technologies Project. European Union Commission. Accessed: http://www.ambientnetworks.org/phase1web/publications/Towards_Ambient_Networks_Management. pdf on 14th Feb, 2010. [4] Henrik, Abrahamsson. & Anders, Gunnar: “Traffic Engineering in Ambient Networks: Challenges and Approaches”. Swedish Computer Institute. Accessed on: http://www.sics.se/~henrik/ante-sncnw- final.pdf on 13th Feb,2010. [5] Sixth Framework Programme: Ambient Network. “Ambient Network Management –Technologies and Strategies”. Project 507134. 21st Dec, 2004. Pg 1-124 [6] Sixth Framework Programme: Ambient Network. “AN Framework Architecture”. Project 507134. 30th Dec, 2005. Pg 1-120 [7] Stefan Schmid, Lars Eggert, Marcus Brunner and Jürgen Quittek. Towards Autonomous Network Domains. Proc. 8th IEEE Global Internet Symposium, Miami, FL, USA, March 17-18, 2005. ….Bengt 11 [8] George Swallow, “MPLS Advantages for Traffic Engineering”, Cisco Systems. [9] John Evans, “MPLS Architecture“, Cisco Systems.
  • 12. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 VIVEKANANDAN .M CCNP Net Obtained letter of appreci CCNP modules from Cisco N Working in Ideaon Think working in SRM University as analyst in Cisco Network Acad Worked with Cable and Engineer for 6 Months Have Masters in Computer Network Engineering (2010) (Grade 5), HALMSTAD University, Sweden Excellent communication Worked in team envir development Lifecycle. Worked as a Network train Worked as a trainee telecommunication domain, i automated the PABX by making to C++) provided by the compa International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 twork Academy Certified Professional iation from CISCO for all CCNA and Network Academy as a Senior Network Trainer as well as sity as a Assistant Professor cum research demy. d Wireless Worldwide as a Network Have Masters in Computer Network Engineering (2010) (Grade 5), HALMSTAD tion presentation skills in working area. ronment and had expertise in the compl ner in Linsun Technologies for 1year. e in ALCATEL LUCENT for 8 month in, i.e. we wrote testing codes to automate PA king use of 2 tools (PILOT2a,C-AUTECO-which is any. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012 64 Have Masters in Computer Network Engineering (2010) (Grade 5), HALMSTAD plete project onths, in the PABX and we h is very similar