Packet Reordering To Improve Data Center Network Using Near Optimal Traffic Engineering
نویسندگان
چکیده
Data Centers are large collection of computers owned and operated by single or group of organizations. It is necessary to handle huge amount of data, there by traffic is complicated. To reduce the traffic volume and to diverse traffic in an effective way, I would like to introduce PEFT (Penalizing Exponential Flow spliTing), which penalize the longer path and diverse traffic in unequal cost path to reach its destination with in short time. An end-to-end transport layer protocol called migratory Transmission Control Protocol, which aggregate the available bandwidth of those redundant paths in parallel and also become more robust under path failures. Whenever some path fails, migratory Transmission Control Protocol will send the packets on other living paths and within few seconds it will be recovered. A shared detection mechanism is integrated into this system which dynamically detects and suppress paths with shared congestion so as to avoid the aggressiveness problem. A new scheduling algorithm can be used here to reorder the packet in an effective ways, that scheduling algorithm is PET (Packet Pair based earliest Delivery Path First) which effectively utilize full bandwidth and minimize the reordering together with Buffer Management Policy. General Terms Design, Performance
منابع مشابه
Feature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کاملRouting Improvement for Vehicular Ad Hoc Networks (VANETs) Using Nature Inspired Algorithms
are a subset of MANETs in which vehicles are considered as network clients. These networks have been created to communicate between vehicles and traffic control on the roads. have similar features to MANETs and their main special property is the high-speed node mobility which makes a quick change of the network. The rapid change of network topology is a major challenge in routing. One of the we...
متن کاملBehavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملProtocol level solutions for the packet reordering problem
The Internet is experiencing an exponential growth in users and network traffic. As the Internet grows larger and larger, the performance of the network is subjected to severe performance degrading issues such as congestion in the network, link failures, corruption of packets and reordering of packets. In this thesis, we examine the problem of packet reordering in networks and how reordering of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014