Designing the Network Layer for End-Host Traffic Engineering
نویسندگان
چکیده
Traffic engineering (TE) is used to control the distribution of network load across the links and routers of a network. TE techniques usually focus on multiplexing traffic across competing paths connecting a source and destination. There are two significant barriers to traffic engineering on the Internet. First, it is difficult to employ interdomain traffic engineering (across multiple autonomous systems) because BGP forces a router to select a single best route per prefix. Second, intradomain TE is complicated because the paths of individual flows can not be changed arbitrarily without negatively affecting high-layer protocols, particularly TCP. These disparate difficulties can both be addressed by exposing a portion of the TE decision process to end-hosts. We propose a tag mechanism that allows end-hosts to influence, but not control, the paths chosen by the network for its packets. End-hosts will provide explicit opportunities for TE by tagging packets with opaque identifiers. Only packets with the same tag must be delivered along the same path. The tag mechanism will also allow multiple ASs to coordinate to provide interdomain traffic engineering. Our analysis of Internet provider/peering topologies shows that there are multiple paths available between the majority of ASes that do not violate AS transit policies, and that tags would expose these paths to end-host traffic engineering.
منابع مشابه
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملFurther Explore on Performance of Various Traffic Combination based on Network Calculus
Theend-to-end transport principle has been one of the building blocks since the Internet born. However, with the explosion of Internet scale and various services, all of these pound on the poor scalability and strictness of the end-to-end model. With the Internet switch from host-center network to services/information/content centric network. In this paper, we investigate the two traditional e...
متن کاملCluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks
The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...
متن کاملModeling of VANET Technology & Ad-Hoc Routing Protocols Based on High Performance Random Waypoint Models
Today, one of the new technologies in the modern era is Vehicular Ad-hoc Network which has takenenormous attention in the recent years. Because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called V2V orvehicle to vehicle communication and vehicle to roadside infrastructure, called V2I. Designin...
متن کاملشیوه های توزیع بار در مهندسی ترافیک
Because of rapidly rising network traffic, ISP providers are trying to create new network structures and extend more resources to control the growth of demands. It is important to efficiently split the network bandwidth among different sources so that each user has enough bandwidth. Traffic engineering is used to achieve this goal. Performing reliable and efficient network ope...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006