SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
DOI : 10.5121/ijcnc.2014.6402 11
DYNAMIC ROUTING OF IP TRAFFIC
BASED ON QOS PARAMETERS
Martin Kriška1
, Jozef Janitor2
and Peter Fecilak3
1
Computer Networks Laboratory, Technical University of Kosice, Slovakia
2
Institute of Computer Technology, Technical University of Kosice, Slovakia
3
Department of Computers and Informatics, Technical University of Kosice, Slovakia
ABSTRACT
The article looks into the current state of the art of dynamic routing protocols with respect to their
possibilities to react to changes in the Quality of Service when selecting the best route towards a
destination network. New options that could leverage information about the ever changing QoS parameters
for data communication are analysed and a Cisco Performance Routing solution is described more in
detail. The practical part of this work focuses on a design and implementation of a test bed that provides a
scalable laboratory architecture to manipulate QoS parameters of different data communications flowing
through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing
optimization capabilities in different scenarios.
KEYWORDS
Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing
1. INTRODUCTION
In the field of computer networks, the traditional task of dynamic routing protocols was, and still
is, to provide loop free reachability between distant IP [1] networks and communicating parties.
In today's world, where the network is not anymore only a file transport service, this traditional
approach, while still fulfilling the requirements it was designed for decades ago, is no longer seen
as sufficient.
With the invent of new applications of computer networks, converged architectures that integrate
Data, Voice, Video and other real-time sensitive services, new requirements are forming which no
longer see data communication traffic as only packets passing between source and destination
machines. Nowadays, a deeper visibility into data communication is needed, so that different
applications inside the data channels passing information between the source and destination
machines can be distinguished from each other. Once such a visibility is available, routing
protocols can leverage this information and different classes of applications, depending on their
usefulness, or priorities, can be treated differently in terms of Quality of Service leading to
different routing paths for different classes of communicating applications.
The topic of this work is to give indication and demonstrate on how routing decisions can take
advantage of additional information about the current Quality of Service parameters along the
whole path. This work also attempts to give multiple views of how such routing can be achieved.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
12
2. GOALS
The goal of this work is to take a deeper look into the possibilities of using currently available
technologies and their capabilities, to provide routing decisions based on dynamically changing
Quality of Service parameters inside the computer network. The respective work also proposes a
design of a laboratory test bed environment, which can manipulate various QoS parameters of
data communication traffic flows, flowing through it. Once such an environment exists, the Cisco
Performance Routing solution is deployed on top of the test bed to demonstrate its possibilities.
Optimization capabilities are illustrated on a simple example.
3. ANALYSIS
A new need to provide IP routing based on the communicating applications, rather than based on
the shortest (or cheapest) path, brings the question whether the currently used dynamic routing
protocols can address this challenge. Dynamic routing protocols both interior and exterior such as
EIGRP, OSPF, IS-IS and BGP were analysed in this work [2].
The OSPF protocol defines its metric as a cost of traversing link and this cost is inversely
proportional to bandwidth available on specific interface. This value is configurable by
administrator but it neither does change dynamically nor does it have to reflect actual theoretical
bandwidth of interface.
Integrated IS-IS also defines its metric as a cost of traversing link, but by default on Cisco devices
all interfaces are equal regardless of available bandwidth or any other parameters. It is up to
administrator to modify cost values on per-interface basis to achieve suitable routing behaviour.
Cisco proprietary (recently with some extent partially open sourced [3]) EIGRP uses a formula
for calculating metric, which is very similar to its predecessor protocol IGRP. Parameters such as
bandwidth, delay, load and reliability can be taken into an account when calculating composite
metric value. Yet, by default only the first two of them – bandwidth and delay – are used. Among
the reasons for this default behaviour is that EIGRP, unlike its predecessor IGRP which had been
sending updates periodically, generates updates only when there is a significant change in the
network. This is also the only time when the load and reliability parameters are read to distil the
final composite metric. If these values change over time, which they indeed do, but there is no
other change in the network, the metric for passive routes is not recalculated [4].
BGP as the only representative of EGP class of dynamic routing protocols is also known as path-
vector protocol. It uses multiple attributes and a rather long decision process which results in
selecting the best route according to the routing policy implemented by the network operator [5].
However, none of these attributes represent Quality of Service parameters since the main goal of
BGP is to provide a stable and scalable routing between interconnected autonomous systems [6].
If the underlying network is Multiprotocol Label Switching enabled, then MPLS tags are used in
routing process instead of destination IP addresses. The ability to stack more than one MPLS tag
provides network administrators opportunity to provide additional services such as MPLS Virtual
Private Networks, Any Transport over MPLS and MPLS Traffic Engineering and not just loop
free reachability. It is the deployment of MPLS Traffic Engineering tunnels that enables network
administrators to utilize other available paths for various traffic flows and not just the one with
the lowest metric according to routing protocol used. Dynamic routing protocols with extensions
for Traffic Engineering such as OSPF or IS-IS carry additional information in routing updates
which are necessary so that other routers know about conditions inside the computer network and
can compute Traffic Engineering tunnels accordingly. Current implementation of MPLS Traffic
Engineering tunnels as described in [7] supports creating of tunnels where the only parameter
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
13
taken into consideration is requested amount of bandwidth. Head-end router knowing all available
paths to destination and available bandwidth along these paths can select route that fulfils the
requirement. If MPLS Traffic Engineering tunnels are used, it is possible to route different traffic
classes based on their bandwidth requirements and current link utilization inside the network
which is communicated via dynamic routing protocol updates. Despite the fact that no other
parameters than bandwidth are currently being used when constructing Traffic Engineering
tunnels, drafts of documents that describe support for additional parameters, namely packet loss
and delay, exists in RSVP-TE extensions for Loss and Delay Traffic Engineering [8]. If these
drafts will ever be incorporated into standard, MPLS Traffic Engineering tunnels will enable
network operators to route traffic classes with respect to dynamic and ever-changing QoS
parameters that delay, packet loss and required bandwidth without a doubt are.
It is clear that none of the previously named dynamic routing protocols nor MPLS Traffic
Engineering tunnels take realtime QoS related parameters into consideration in their decision
process. Additional logic is needed to enforce routing changes whenever dynamic QoS
parameters change.
Software Defined Networking well known for its idea of decoupling control plane from data
plane in networking devices and centralizing control plane logic on a separate controller for
whole computer network [9]. This will provide visibility into network traffic flows as well as
additional logic required for routing different traffic flows according to their QoS needs. This
controller with a complete visibility into traffic flows and knowledge of current conditions inside
the computer network can calculate the optimal route for traffic flow based on its specific QoS
requirements. This new paradigm shift in networking field is excellent for providing routing
based on QoS parameters in greenfield installations, where all networking equipment is new and
SDN capable. On the other hand incremental equipment upgrade is far more often the case, which
means that new SDN capable hardware has to work alongside legacy equipment which will never
support features of Software Defined Networking. This certainly limits benefits gained by
deploying SDN in some parts of the network when visibility into traffic flows and routing based
on QoS parameters is needed for the whole computer network. Once all network equipment
support SDN, network operators will be able to benefit from all new possibilities, to name just a
few like Topology Independent Forwarding and Routing for Dollars [10] [11].
The necessity of having all equipment SDN capable as well as lack of publicly available
documentation during its early stages of development meant that it was not chosen as a solution
used in this work. The additional logic used in this work is the Cisco Performance Routing
solution [12] due to support of multiple commonly used router platforms, both brand new as well
as older ones. It consists of a centralized master controller which is responsible for evaluating
collected performance characteristics and if necessary instructs the so called border routers to
apply new changes to the routing processes. Border routers are responsible for collecting
performance characteristics, as well as for enforcing routing changes. The Cisco Performance
Routing solution can either only passively monitor traffic flows, or actively generate IP SLA
probes to collect performance statistics, which are later compared against a predefined
optimization policy. If the performance requirements are not met on the current interface, then the
master controller can reroute the traffic to another interface which is able to provide performance
characteristics in compliance with the predefined optimization policy.
Multiple optimization techniques such as insertion of more specific static route, or BGP route, as
well as dynamic policy-based routing for the entire prefix, or just a specific application are
available within the analysed solution. It is also possible to manipulate the BGP
LOCAL_PREFERENCE attribute for outgoing traffic and AS_PATH attribute for incoming
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
14
traffic. Appending communities to BGP updates to manipulate routing inbound requires
cooperation with ISP but is also available.
The biggest improvement that the network operator and the network users can get by using the
Cisco Performance Routing solution is a per application based different routing behaviour.
Scavenger traffic, such as YouTube and other not business critical applications can be routed over
a path with a lower bandwidth, while business critical traffic, such as VoIP, CRM, Salesforce can
be routed over a high bandwidth link. Should the QoS parameters on the business critical primary
link change, the Cisco Performance Routing solution can dynamically detect such a change and
apply new routing decisions making sure the business critical applications are always using the
best possible path.
4. SOLUTION AND RESULTS
4.1. The design of a test bed to manipulate QoS parameters of data flows
The ambition to use the Cisco Performance Routing solution requires the ability to build a
network where we are capable of granularly modifying QoS parameters of data communication
flowing through the network, thus simulating a real behaviour of public WAN networks. The test
bed was designed to reach this goal in laboratory conditions. This test bed consists of physical
networking equipment as well as virtual machines which are interconnected according to physical
topology shown in Figure 1.
Figure 1. Example shows physical topology of proposed test bed which is used throughout this work
IEEE 802.1Q tagging and VLANs are used to create logical separation of traffic passing through
a single physical interface on the physical host named NTB, as well as to provide subinterfaces to
which virtual machines Ethernet network interface cards can be bridged. Virtual machines, in
Figure 1 named WANem #1 and WANem #2, run a live Knoppix Linux distribution [13] without
the need for installation. Since no dynamic routing protocol is by default available in the used
Live Linux distribution and a hard disk installation was not desired for this purpose, the problem
of routing data traffic passing through these virtual machines had to be solved. Adding static
routes for all prefixes in the test bed network is possible but time-consuming and error-prone as
more and more networks are added and as the topology grows. When choosing a solution, a
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
15
decision was made to build an overlay network on top of the physical topology shown in Figure 1.
With such a design the virtual machine only needs to have routing information for its directly
connected interfaces, which are always present anyway. Generic Routing Encapsulation was
selected as the carrier protocol for data traffic using IPv4 as the transport protocol in this test bed.
The physical topology as well as the logical topology with the overlay network built on top of it is
shown in Figure 2. This way, routers are unaware of the presence of virtual machines in between
the path at the cost of having additional logical tunnel interface and increased overhead associated
with GRE encapsulation.
Figure 2. Example shows logical topology of proposed test bed as well as the overlay network using GRE
tunnels
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
16
Communicating computer workstations are connected to the LAN interfaces of routers R2 and
R4. As shown in Figure 2 to communicate with each other there are two possible paths. The first
path is using the Tunnel0 interface between routers R2 and R4. The second path is using the
Tunnel1 interface between R2 and R3 and then the Serial0/0/0 interface interconnecting routers
R3 and R4. In both cases, traffic is flowing through a separate WANem virtual machine which
enables to modify and tune QoS parameters of traffic passing through each virtual machine
separately and therefore modify and tune QoS parameters of the two existing paths
interconnecting computer workstations. If a computer connected to router R2 communicates with
a workstation connected to router R4 and this traffic traverses the WANem #1 virtual machine,
then the traffic flow through the physical topology of proposed test bed is shown in Figure 3 with
green arrows:
1. Traffic flows from router R2 towards the switch CAT2960
2. Traffic flows from the switch CAT2960 towards the physical host NTB
3. Traffic flows from within physical the host NTB towards the virtual machine WANem #1
4. Traffic flows from the virtual machine WANem #1 towards physical the host NTB
5. Traffic flows from physical the host NTB towards the switch CAT2960
6. Traffic flows from the switch CAT2960 towards the router R4
Figure 3. Example shows traffic flow through physical topology of proposed test bed from workstations
connected to router R2 towards workstations connected to router R4
If the workstation connected to router R2 communicates with the computer connected to router
R4 and this time this traffic flow traverses the WANem #2 virtual machine, then the traffic flow
through physical topology of proposed test bed is shown in Figure 3 with pink arrows. The
difference when compared to previous detailed description of traffic flow via WANem #1 is
obviously flowing through different virtual machine, WANem #2 and then in the last two steps
where traffic from switch CAT2960 flows towards router R3 and then it traverses the serial
interface towards router R4.
Using WANem virtual machines enables us to modify and tune QoS parameters on ingress
interfaces separately within virtual machine. This means that the proposed test bed allows the
modification of different QoS parameters for requests and replies if these are flowing through the
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
17
same virtual machine. If this is not the case and asymmetrical routing exists then different QoS
parameters for requests and replies can be enforced by setting these on different virtual machines.
4.2. Optimization of a destination prefix with usage of dynamic routing protocol
This section provides simple example how the proposed test bed can be utilized to demonstrate
the Cisco Performance Routing optimization capabilities with topology shown in Figure 4. The
branch office location is connected to company HQ via two separate links from two different ISPs
for redundancy reason and is using the Cisco Performance Routing solution to provide routing
based on QoS parameters. From the branch office point of view, the link via ISP_1 is preferred to
reach company HQ and the other link is used as a backup link. Optimization policy dictates to
monitor the latency of a communication between the branch office and company HQ and the
threshold for latency is set to 250 milliseconds.
Figure 4. Example shows simple topology used to demonstrate traffic flow optimization
At the beginning, a data communication stream towards host company HQ is initiated from the
branch office location. During normal operation of network, both links on R2 are in compliance
with the optimization policy. Both provide latency of roughly the same value - 100 milliseconds
as shown in Figure 5. Since the link via ISP_1 is preferred and both links provide acceptable
Quality of Service, this link is used to route communication towards company HQ. Cisco
Performance Routing is monitoring delay on both links, but as they both comply with the policy,
it does not enforce any routing changes and OSPF is responsible for routing now.
Figure 5. Output shows latency via both exit interfaces during normal operation
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
18
To simulate an anomaly inside the ISP_1 network, which causes customer traffic from the branch
office location towards the company HQ to suffer from increased latency, the proposed test bed is
used to manipulate this specific QoS parameter. Delay on an ingress interface Eth0 of the
WANem #1 virtual machine is set to the value of 300 milliseconds as shown in Figure 6.
Figure 6. Output shows latency manipulation on WANem #1 virtual machine
Cisco Performance Routing keeps actively monitoring performance characteristics of traffic flow
from the branch office towards company HQ, while at the same time the test bed manipulates the
latency with the WANem #1 virtual machine. After detecting that latency on the currently chosen
primary link by OSPF increased beyond the value acceptable by the optimization policy, it tries to
evaluate if the backup link can provide a better path based on the specified QoS parameters - in
this case delay only. The backup link is indeed capable of providing better latency compared to
the link via ISP_1 that is experiencing problems, or so called brownout, as shown in Figure 7.
Figure 7. Output shows latency via both exit interfaces during ISP_1 problems
Cisco Performance Routing used IP SLA probes towards the destination of traffic flow residing in
company HQ location. Once it has detected noncompliance of primary link through which the
traffic is flowing with optimization policy and after identifying another link that can satisfy QoS
requirements, it took action and modified routing and therefore now traffic flows from the branch
office location towards company HQ location as shown in Figure 8.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
19
Figure 8. Output shows modification of routing by Cisco Performance Routing
Instead of generating a new routing protocol update information for any dynamic routing protocol
deployed in all possible scenarios, whenever Cisco Performance Routing needs to enforce a new
routing policy, a Protocol Independent Route Optimization feature is used. This means that
instead of influencing a dynamic routing protocol itself and propagating such a change deep into
routing domain causing recomputation and when misconfigured, even routing instability, dynamic
policy based routing solves the problem without directly involving whatever dynamic routing
protocol is used. Dynamic policy based routing can direct traffic flow from the border router
selected by a dynamic routing protocol to a different border router that is currently the optimal
exit router for such a traffic flow. Once the traffic flow is on correct a border router, then the
dynamic policy based routing can divert this traffic flow to the exit interface that is currently
optimal for this specific traffic flow. This happens on behalf of instructions from the master
controller router and requires no intervention from the network operator's point of view, except
the initial configuration of the Cisco Performance Routing solution.
The fact that this dynamic policy based routing, as well as dynamic access list, were created
dynamically and not configured by the network operator is confirmed by running various
commands as shown in Figure 9, Figure 10 and Figure 11.
Figure 9. Output shows dynamically created route map by Cisco Performance Routing
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
20
Figure 10. Output shows dynamically created access list by Cisco Performance Routing
Figure 11. Output shows dynamically configured policy based routing by Cisco Performance Routing
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
21
5. CONCLUSIONS
In this paper we analysed various possible approaches, capable of providing routing of data flows
based on their QoS requirements. The proposed design of a laboratory test bed, which allows to
dynamically manipulate QoS parameters of data traffic flowing through it provides the
opportunity to simulate real WAN network characteristics in a simulated laboratory environment.
The proposed test bed provides a scalable solution since multiple instances of virtual machines
can run on the same physical machine. If available bandwidth on the interface becomes the
bottleneck and it is not possible to install another NIC, then the virtual machines can be
distributed among multiple physical hosts, which also lowers the strain on CPU and RAM
resources.
The disadvantage of the proposed test bed is that logical tunnel interfaces are needed to be created
for every link traversing the virtual machine and also reachability to the far-end tunnel endpoint
requires for example a static route entry. It means that some configuration is needed on these
routers and it is not totally transparent for the initial use. This could be solved at a cost of
installing additional pair of devices per tunnel and using for example L2TPv3 pseudowires.
The proposed test bed for manipulating QoS parameters of traffic flowing through it can be useful
in various fields not limited to university sector only. Developers of client-server based
applications are given an opportunity to test their applications in various QoS conditions, typical
for their application usage scenario over the Internet, instead of testing the application on
localhost only. Experimenting with VoIP technologies can also benefit from the test bed, as it
allows demonstration of impact of QoS parameters on voice traffic and how different codecs can
handle degraded network conditions even in a laboratory environment.
As discussed in Section 4.2, Cisco Performance Routing was periodically measuring if
performance characteristics of data flow are in compliance with defined policy. After
manipulating QoS parameters in the network using the proposed test bed, Cisco Performance
Routing detected this event and acted accordingly, hence providing routing of traffic based on
dynamically changing QoS parameters.
ACKNOWLEDGEMENTS
This article is a result of the Project implementation: University Science Park TECHNICOM for
Innovation Applications Supported by Knowledge Technology, ITMS: 26220220182, supported
by the Research & Development Operational Programme funded by the ERDF.
We support research activities in Slovakia/This project is being co-financed by the European
Union.
REFERENCES
[1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET
PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet
Engineering Task Force, 1981.
[2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th
of October
2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf.
[3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date: 25th
of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00.
[4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide. Indianapolis:
Cisco Press, 2010. ISBN 1587058820.
[5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th
of
October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
22
[6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I.
Indianapolis: Cisco Press, 2006. ISBN 1587052024.
[7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013 [Date:
11th
of November 2013.] http://tools.ietf.org/html/rfc3209.
[8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online] 2013
[Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp-te-ext-
02.
[9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013. [Date:
4th
of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946.
[10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date: 4th
of
October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco-live.
[11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th
of September 2013.]
https://learningnetwork.cisco.com/docs/DOC-22910.
[12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online] 2009.
[Date: 15th
of November 2013.] http://netcraftsmen.net/archived-documents/c-mug-article-
archive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10.
[13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network Emulator
tool. Bangalore, 2011. ISBN 9780769546186.
[14] R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-source multicast
routing protocol in mobile ad hoc networks, International Journal of Computer Networks &
Communications (IJCNC) Vol.3, No.1, January 2011, PP. 154-166. ISSN 0974-9322
Authors
Martin Kriška received his Ing. (equiv of M.Sc.) Degree from Technical University of
Kosice in 2014. Since 2011 he was an active member of the Computer Networks
Laboratory where he was working on several R&D activities connected with computer
networks in general, QoS and security. He has spent one semester studying at the
Polytechnic in Jyvaskyla, Finland. He has been selected to join the Cisco incubator program
under the umbrella of the TUKE ASC, where he gone through training in the field of
advanced network technologies.
Jozef Janitor received his PhD. Degree from Technical University of Kosice in 2013. Since
then, he has been working at the Institute of Computer Technology as a systems engineer,
where he is working with the local team on R&D activities in the field of computer
networks, IP telephony and cloud technologies.
Peter Feciľak received his PhD. Degree from Technical University of Kosice in 2011.
Since then, he has been working at the Department of Computers and Informatics as a
teacher and researcher in the field of computer networks, security and smartgrid
technologies. He is leading the TUKE ASC as well as other educational activities in the
region.

Más contenido relacionado

La actualidad más candente

Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkcsandit
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTESpiros Louvros
 
19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)nIAESIJEECS
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
 
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSISMIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIScscpconf
 
Improvement in the mobility of mobile ipv6 based mobile networks using revers...
Improvement in the mobility of mobile ipv6 based mobile networks using revers...Improvement in the mobility of mobile ipv6 based mobile networks using revers...
Improvement in the mobility of mobile ipv6 based mobile networks using revers...ijmnct
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
 
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...IJCSIS Research Publications
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 

La actualidad más candente (19)

Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
4 gstudy
4 gstudy4 gstudy
4 gstudy
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTE
 
Multiflow Model for Routing and Policing Traffic in Infocommunication Network
Multiflow Model for Routing and Policing Traffic in  Infocommunication NetworkMultiflow Model for Routing and Policing Traffic in  Infocommunication Network
Multiflow Model for Routing and Policing Traffic in Infocommunication Network
 
19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
 
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSISMIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
MIPV6 PROTOCOLS: A SURVEY AND COMPARATIVE ANALYSIS
 
Improvement in the mobility of mobile ipv6 based mobile networks using revers...
Improvement in the mobility of mobile ipv6 based mobile networks using revers...Improvement in the mobility of mobile ipv6 based mobile networks using revers...
Improvement in the mobility of mobile ipv6 based mobile networks using revers...
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...
 
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehic...
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 

Destacado

DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNIJCNCJournal
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONIJCNCJournal
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensorIJCNCJournal
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS IJCNCJournal
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN IJCNCJournal
 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networksIJCNCJournal
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteedIJCNCJournal
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on textIJCNCJournal
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm forIJCNCJournal
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...IJCNCJournal
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...IJCNCJournal
 
Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with videoIJCNCJournal
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
 

Destacado (19)

DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensor
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networks
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteed
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on text
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm for
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...
 
Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with video
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGS
 

Similar a Dynamic routing of ip traffic

NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015TTA_TNagar
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business ModelsCisco Service Provider
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEImplementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEIJERA Editor
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceIRJET Journal
 
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...IJCNCJournal
 
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...IJCNCJournal
 
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionTowards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...IJCNCJournal
 
E2IOPN_Elsevier.pdf
E2IOPN_Elsevier.pdfE2IOPN_Elsevier.pdf
E2IOPN_Elsevier.pdftaha karram
 

Similar a Dynamic routing of ip traffic (20)

A study on “link
A study on “linkA study on “link
A study on “link
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
How to implement mpls
How to implement mplsHow to implement mpls
How to implement mpls
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
Segment Routing: Prepare Your Network For New Business Models
Segment Routing:  Prepare Your Network For New Business ModelsSegment Routing:  Prepare Your Network For New Business Models
Segment Routing: Prepare Your Network For New Business Models
 
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...An Efficient Machine Learning Optimization Model for Route Establishment Mech...
An Efficient Machine Learning Optimization Model for Route Establishment Mech...
 
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEImplementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of Service
 
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
 
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
 
Ijetr021261
Ijetr021261Ijetr021261
Ijetr021261
 
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionTowards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-function
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...
 
E2IOPN_Elsevier.pdf
E2IOPN_Elsevier.pdfE2IOPN_Elsevier.pdf
E2IOPN_Elsevier.pdf
 

Más de IJCNCJournal

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksIJCNCJournal
 

Más de IJCNCJournal (20)

High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things NetworksQ-Learning Model for Blockchain Security in Internet of Medical Things Networks
Q-Learning Model for Blockchain Security in Internet of Medical Things Networks
 

Último

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Último (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Dynamic routing of ip traffic

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 DOI : 10.5121/ijcnc.2014.6402 11 DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3 1 Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of Computer Technology, Technical University of Kosice, Slovakia 3 Department of Computers and Informatics, Technical University of Kosice, Slovakia ABSTRACT The article looks into the current state of the art of dynamic routing protocols with respect to their possibilities to react to changes in the Quality of Service when selecting the best route towards a destination network. New options that could leverage information about the ever changing QoS parameters for data communication are analysed and a Cisco Performance Routing solution is described more in detail. The practical part of this work focuses on a design and implementation of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of different data communications flowing through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing optimization capabilities in different scenarios. KEYWORDS Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing 1. INTRODUCTION In the field of computer networks, the traditional task of dynamic routing protocols was, and still is, to provide loop free reachability between distant IP [1] networks and communicating parties. In today's world, where the network is not anymore only a file transport service, this traditional approach, while still fulfilling the requirements it was designed for decades ago, is no longer seen as sufficient. With the invent of new applications of computer networks, converged architectures that integrate Data, Voice, Video and other real-time sensitive services, new requirements are forming which no longer see data communication traffic as only packets passing between source and destination machines. Nowadays, a deeper visibility into data communication is needed, so that different applications inside the data channels passing information between the source and destination machines can be distinguished from each other. Once such a visibility is available, routing protocols can leverage this information and different classes of applications, depending on their usefulness, or priorities, can be treated differently in terms of Quality of Service leading to different routing paths for different classes of communicating applications. The topic of this work is to give indication and demonstrate on how routing decisions can take advantage of additional information about the current Quality of Service parameters along the whole path. This work also attempts to give multiple views of how such routing can be achieved.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 12 2. GOALS The goal of this work is to take a deeper look into the possibilities of using currently available technologies and their capabilities, to provide routing decisions based on dynamically changing Quality of Service parameters inside the computer network. The respective work also proposes a design of a laboratory test bed environment, which can manipulate various QoS parameters of data communication traffic flows, flowing through it. Once such an environment exists, the Cisco Performance Routing solution is deployed on top of the test bed to demonstrate its possibilities. Optimization capabilities are illustrated on a simple example. 3. ANALYSIS A new need to provide IP routing based on the communicating applications, rather than based on the shortest (or cheapest) path, brings the question whether the currently used dynamic routing protocols can address this challenge. Dynamic routing protocols both interior and exterior such as EIGRP, OSPF, IS-IS and BGP were analysed in this work [2]. The OSPF protocol defines its metric as a cost of traversing link and this cost is inversely proportional to bandwidth available on specific interface. This value is configurable by administrator but it neither does change dynamically nor does it have to reflect actual theoretical bandwidth of interface. Integrated IS-IS also defines its metric as a cost of traversing link, but by default on Cisco devices all interfaces are equal regardless of available bandwidth or any other parameters. It is up to administrator to modify cost values on per-interface basis to achieve suitable routing behaviour. Cisco proprietary (recently with some extent partially open sourced [3]) EIGRP uses a formula for calculating metric, which is very similar to its predecessor protocol IGRP. Parameters such as bandwidth, delay, load and reliability can be taken into an account when calculating composite metric value. Yet, by default only the first two of them – bandwidth and delay – are used. Among the reasons for this default behaviour is that EIGRP, unlike its predecessor IGRP which had been sending updates periodically, generates updates only when there is a significant change in the network. This is also the only time when the load and reliability parameters are read to distil the final composite metric. If these values change over time, which they indeed do, but there is no other change in the network, the metric for passive routes is not recalculated [4]. BGP as the only representative of EGP class of dynamic routing protocols is also known as path- vector protocol. It uses multiple attributes and a rather long decision process which results in selecting the best route according to the routing policy implemented by the network operator [5]. However, none of these attributes represent Quality of Service parameters since the main goal of BGP is to provide a stable and scalable routing between interconnected autonomous systems [6]. If the underlying network is Multiprotocol Label Switching enabled, then MPLS tags are used in routing process instead of destination IP addresses. The ability to stack more than one MPLS tag provides network administrators opportunity to provide additional services such as MPLS Virtual Private Networks, Any Transport over MPLS and MPLS Traffic Engineering and not just loop free reachability. It is the deployment of MPLS Traffic Engineering tunnels that enables network administrators to utilize other available paths for various traffic flows and not just the one with the lowest metric according to routing protocol used. Dynamic routing protocols with extensions for Traffic Engineering such as OSPF or IS-IS carry additional information in routing updates which are necessary so that other routers know about conditions inside the computer network and can compute Traffic Engineering tunnels accordingly. Current implementation of MPLS Traffic Engineering tunnels as described in [7] supports creating of tunnels where the only parameter
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 13 taken into consideration is requested amount of bandwidth. Head-end router knowing all available paths to destination and available bandwidth along these paths can select route that fulfils the requirement. If MPLS Traffic Engineering tunnels are used, it is possible to route different traffic classes based on their bandwidth requirements and current link utilization inside the network which is communicated via dynamic routing protocol updates. Despite the fact that no other parameters than bandwidth are currently being used when constructing Traffic Engineering tunnels, drafts of documents that describe support for additional parameters, namely packet loss and delay, exists in RSVP-TE extensions for Loss and Delay Traffic Engineering [8]. If these drafts will ever be incorporated into standard, MPLS Traffic Engineering tunnels will enable network operators to route traffic classes with respect to dynamic and ever-changing QoS parameters that delay, packet loss and required bandwidth without a doubt are. It is clear that none of the previously named dynamic routing protocols nor MPLS Traffic Engineering tunnels take realtime QoS related parameters into consideration in their decision process. Additional logic is needed to enforce routing changes whenever dynamic QoS parameters change. Software Defined Networking well known for its idea of decoupling control plane from data plane in networking devices and centralizing control plane logic on a separate controller for whole computer network [9]. This will provide visibility into network traffic flows as well as additional logic required for routing different traffic flows according to their QoS needs. This controller with a complete visibility into traffic flows and knowledge of current conditions inside the computer network can calculate the optimal route for traffic flow based on its specific QoS requirements. This new paradigm shift in networking field is excellent for providing routing based on QoS parameters in greenfield installations, where all networking equipment is new and SDN capable. On the other hand incremental equipment upgrade is far more often the case, which means that new SDN capable hardware has to work alongside legacy equipment which will never support features of Software Defined Networking. This certainly limits benefits gained by deploying SDN in some parts of the network when visibility into traffic flows and routing based on QoS parameters is needed for the whole computer network. Once all network equipment support SDN, network operators will be able to benefit from all new possibilities, to name just a few like Topology Independent Forwarding and Routing for Dollars [10] [11]. The necessity of having all equipment SDN capable as well as lack of publicly available documentation during its early stages of development meant that it was not chosen as a solution used in this work. The additional logic used in this work is the Cisco Performance Routing solution [12] due to support of multiple commonly used router platforms, both brand new as well as older ones. It consists of a centralized master controller which is responsible for evaluating collected performance characteristics and if necessary instructs the so called border routers to apply new changes to the routing processes. Border routers are responsible for collecting performance characteristics, as well as for enforcing routing changes. The Cisco Performance Routing solution can either only passively monitor traffic flows, or actively generate IP SLA probes to collect performance statistics, which are later compared against a predefined optimization policy. If the performance requirements are not met on the current interface, then the master controller can reroute the traffic to another interface which is able to provide performance characteristics in compliance with the predefined optimization policy. Multiple optimization techniques such as insertion of more specific static route, or BGP route, as well as dynamic policy-based routing for the entire prefix, or just a specific application are available within the analysed solution. It is also possible to manipulate the BGP LOCAL_PREFERENCE attribute for outgoing traffic and AS_PATH attribute for incoming
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 14 traffic. Appending communities to BGP updates to manipulate routing inbound requires cooperation with ISP but is also available. The biggest improvement that the network operator and the network users can get by using the Cisco Performance Routing solution is a per application based different routing behaviour. Scavenger traffic, such as YouTube and other not business critical applications can be routed over a path with a lower bandwidth, while business critical traffic, such as VoIP, CRM, Salesforce can be routed over a high bandwidth link. Should the QoS parameters on the business critical primary link change, the Cisco Performance Routing solution can dynamically detect such a change and apply new routing decisions making sure the business critical applications are always using the best possible path. 4. SOLUTION AND RESULTS 4.1. The design of a test bed to manipulate QoS parameters of data flows The ambition to use the Cisco Performance Routing solution requires the ability to build a network where we are capable of granularly modifying QoS parameters of data communication flowing through the network, thus simulating a real behaviour of public WAN networks. The test bed was designed to reach this goal in laboratory conditions. This test bed consists of physical networking equipment as well as virtual machines which are interconnected according to physical topology shown in Figure 1. Figure 1. Example shows physical topology of proposed test bed which is used throughout this work IEEE 802.1Q tagging and VLANs are used to create logical separation of traffic passing through a single physical interface on the physical host named NTB, as well as to provide subinterfaces to which virtual machines Ethernet network interface cards can be bridged. Virtual machines, in Figure 1 named WANem #1 and WANem #2, run a live Knoppix Linux distribution [13] without the need for installation. Since no dynamic routing protocol is by default available in the used Live Linux distribution and a hard disk installation was not desired for this purpose, the problem of routing data traffic passing through these virtual machines had to be solved. Adding static routes for all prefixes in the test bed network is possible but time-consuming and error-prone as more and more networks are added and as the topology grows. When choosing a solution, a
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 15 decision was made to build an overlay network on top of the physical topology shown in Figure 1. With such a design the virtual machine only needs to have routing information for its directly connected interfaces, which are always present anyway. Generic Routing Encapsulation was selected as the carrier protocol for data traffic using IPv4 as the transport protocol in this test bed. The physical topology as well as the logical topology with the overlay network built on top of it is shown in Figure 2. This way, routers are unaware of the presence of virtual machines in between the path at the cost of having additional logical tunnel interface and increased overhead associated with GRE encapsulation. Figure 2. Example shows logical topology of proposed test bed as well as the overlay network using GRE tunnels
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 16 Communicating computer workstations are connected to the LAN interfaces of routers R2 and R4. As shown in Figure 2 to communicate with each other there are two possible paths. The first path is using the Tunnel0 interface between routers R2 and R4. The second path is using the Tunnel1 interface between R2 and R3 and then the Serial0/0/0 interface interconnecting routers R3 and R4. In both cases, traffic is flowing through a separate WANem virtual machine which enables to modify and tune QoS parameters of traffic passing through each virtual machine separately and therefore modify and tune QoS parameters of the two existing paths interconnecting computer workstations. If a computer connected to router R2 communicates with a workstation connected to router R4 and this traffic traverses the WANem #1 virtual machine, then the traffic flow through the physical topology of proposed test bed is shown in Figure 3 with green arrows: 1. Traffic flows from router R2 towards the switch CAT2960 2. Traffic flows from the switch CAT2960 towards the physical host NTB 3. Traffic flows from within physical the host NTB towards the virtual machine WANem #1 4. Traffic flows from the virtual machine WANem #1 towards physical the host NTB 5. Traffic flows from physical the host NTB towards the switch CAT2960 6. Traffic flows from the switch CAT2960 towards the router R4 Figure 3. Example shows traffic flow through physical topology of proposed test bed from workstations connected to router R2 towards workstations connected to router R4 If the workstation connected to router R2 communicates with the computer connected to router R4 and this time this traffic flow traverses the WANem #2 virtual machine, then the traffic flow through physical topology of proposed test bed is shown in Figure 3 with pink arrows. The difference when compared to previous detailed description of traffic flow via WANem #1 is obviously flowing through different virtual machine, WANem #2 and then in the last two steps where traffic from switch CAT2960 flows towards router R3 and then it traverses the serial interface towards router R4. Using WANem virtual machines enables us to modify and tune QoS parameters on ingress interfaces separately within virtual machine. This means that the proposed test bed allows the modification of different QoS parameters for requests and replies if these are flowing through the
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 17 same virtual machine. If this is not the case and asymmetrical routing exists then different QoS parameters for requests and replies can be enforced by setting these on different virtual machines. 4.2. Optimization of a destination prefix with usage of dynamic routing protocol This section provides simple example how the proposed test bed can be utilized to demonstrate the Cisco Performance Routing optimization capabilities with topology shown in Figure 4. The branch office location is connected to company HQ via two separate links from two different ISPs for redundancy reason and is using the Cisco Performance Routing solution to provide routing based on QoS parameters. From the branch office point of view, the link via ISP_1 is preferred to reach company HQ and the other link is used as a backup link. Optimization policy dictates to monitor the latency of a communication between the branch office and company HQ and the threshold for latency is set to 250 milliseconds. Figure 4. Example shows simple topology used to demonstrate traffic flow optimization At the beginning, a data communication stream towards host company HQ is initiated from the branch office location. During normal operation of network, both links on R2 are in compliance with the optimization policy. Both provide latency of roughly the same value - 100 milliseconds as shown in Figure 5. Since the link via ISP_1 is preferred and both links provide acceptable Quality of Service, this link is used to route communication towards company HQ. Cisco Performance Routing is monitoring delay on both links, but as they both comply with the policy, it does not enforce any routing changes and OSPF is responsible for routing now. Figure 5. Output shows latency via both exit interfaces during normal operation
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 18 To simulate an anomaly inside the ISP_1 network, which causes customer traffic from the branch office location towards the company HQ to suffer from increased latency, the proposed test bed is used to manipulate this specific QoS parameter. Delay on an ingress interface Eth0 of the WANem #1 virtual machine is set to the value of 300 milliseconds as shown in Figure 6. Figure 6. Output shows latency manipulation on WANem #1 virtual machine Cisco Performance Routing keeps actively monitoring performance characteristics of traffic flow from the branch office towards company HQ, while at the same time the test bed manipulates the latency with the WANem #1 virtual machine. After detecting that latency on the currently chosen primary link by OSPF increased beyond the value acceptable by the optimization policy, it tries to evaluate if the backup link can provide a better path based on the specified QoS parameters - in this case delay only. The backup link is indeed capable of providing better latency compared to the link via ISP_1 that is experiencing problems, or so called brownout, as shown in Figure 7. Figure 7. Output shows latency via both exit interfaces during ISP_1 problems Cisco Performance Routing used IP SLA probes towards the destination of traffic flow residing in company HQ location. Once it has detected noncompliance of primary link through which the traffic is flowing with optimization policy and after identifying another link that can satisfy QoS requirements, it took action and modified routing and therefore now traffic flows from the branch office location towards company HQ location as shown in Figure 8.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 19 Figure 8. Output shows modification of routing by Cisco Performance Routing Instead of generating a new routing protocol update information for any dynamic routing protocol deployed in all possible scenarios, whenever Cisco Performance Routing needs to enforce a new routing policy, a Protocol Independent Route Optimization feature is used. This means that instead of influencing a dynamic routing protocol itself and propagating such a change deep into routing domain causing recomputation and when misconfigured, even routing instability, dynamic policy based routing solves the problem without directly involving whatever dynamic routing protocol is used. Dynamic policy based routing can direct traffic flow from the border router selected by a dynamic routing protocol to a different border router that is currently the optimal exit router for such a traffic flow. Once the traffic flow is on correct a border router, then the dynamic policy based routing can divert this traffic flow to the exit interface that is currently optimal for this specific traffic flow. This happens on behalf of instructions from the master controller router and requires no intervention from the network operator's point of view, except the initial configuration of the Cisco Performance Routing solution. The fact that this dynamic policy based routing, as well as dynamic access list, were created dynamically and not configured by the network operator is confirmed by running various commands as shown in Figure 9, Figure 10 and Figure 11. Figure 9. Output shows dynamically created route map by Cisco Performance Routing
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 20 Figure 10. Output shows dynamically created access list by Cisco Performance Routing Figure 11. Output shows dynamically configured policy based routing by Cisco Performance Routing
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 21 5. CONCLUSIONS In this paper we analysed various possible approaches, capable of providing routing of data flows based on their QoS requirements. The proposed design of a laboratory test bed, which allows to dynamically manipulate QoS parameters of data traffic flowing through it provides the opportunity to simulate real WAN network characteristics in a simulated laboratory environment. The proposed test bed provides a scalable solution since multiple instances of virtual machines can run on the same physical machine. If available bandwidth on the interface becomes the bottleneck and it is not possible to install another NIC, then the virtual machines can be distributed among multiple physical hosts, which also lowers the strain on CPU and RAM resources. The disadvantage of the proposed test bed is that logical tunnel interfaces are needed to be created for every link traversing the virtual machine and also reachability to the far-end tunnel endpoint requires for example a static route entry. It means that some configuration is needed on these routers and it is not totally transparent for the initial use. This could be solved at a cost of installing additional pair of devices per tunnel and using for example L2TPv3 pseudowires. The proposed test bed for manipulating QoS parameters of traffic flowing through it can be useful in various fields not limited to university sector only. Developers of client-server based applications are given an opportunity to test their applications in various QoS conditions, typical for their application usage scenario over the Internet, instead of testing the application on localhost only. Experimenting with VoIP technologies can also benefit from the test bed, as it allows demonstration of impact of QoS parameters on voice traffic and how different codecs can handle degraded network conditions even in a laboratory environment. As discussed in Section 4.2, Cisco Performance Routing was periodically measuring if performance characteristics of data flow are in compliance with defined policy. After manipulating QoS parameters in the network using the proposed test bed, Cisco Performance Routing detected this event and acted accordingly, hence providing routing of traffic based on dynamically changing QoS parameters. ACKNOWLEDGEMENTS This article is a result of the Project implementation: University Science Park TECHNICOM for Innovation Applications Supported by Knowledge Technology, ITMS: 26220220182, supported by the Research & Development Operational Programme funded by the ERDF. We support research activities in Slovakia/This project is being co-financed by the European Union. REFERENCES [1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet Engineering Task Force, 1981. [2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf. [3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date: 25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00. [4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide. Indianapolis: Cisco Press, 2010. ISBN 1587058820. [5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 22 [6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I. Indianapolis: Cisco Press, 2006. ISBN 1587052024. [7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209. [8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online] 2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp-te-ext- 02. [9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013. [Date: 4th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946. [10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date: 4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco-live. [11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September 2013.] https://learningnetwork.cisco.com/docs/DOC-22910. [12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online] 2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug-article- archive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10. [13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network Emulator tool. Bangalore, 2011. ISBN 9780769546186. [14] R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-source multicast routing protocol in mobile ad hoc networks, International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.1, January 2011, PP. 154-166. ISSN 0974-9322 Authors Martin Kriška received his Ing. (equiv of M.Sc.) Degree from Technical University of Kosice in 2014. Since 2011 he was an active member of the Computer Networks Laboratory where he was working on several R&D activities connected with computer networks in general, QoS and security. He has spent one semester studying at the Polytechnic in Jyvaskyla, Finland. He has been selected to join the Cisco incubator program under the umbrella of the TUKE ASC, where he gone through training in the field of advanced network technologies. Jozef Janitor received his PhD. Degree from Technical University of Kosice in 2013. Since then, he has been working at the Institute of Computer Technology as a systems engineer, where he is working with the local team on R&D activities in the field of computer networks, IP telephony and cloud technologies. Peter Feciľak received his PhD. Degree from Technical University of Kosice in 2011. Since then, he has been working at the Department of Computers and Informatics as a teacher and researcher in the field of computer networks, security and smartgrid technologies. He is leading the TUKE ASC as well as other educational activities in the region.