SlideShare a Scribd company logo
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 127
Paper Publications
OPTIMIZED TRAFFIC FLOW OVER
MULTIPATH IN OPTICAL NETWORKS
B. Shincy Mercylin1
, Mrs. Manchu.M2
PG Scholar1
Associate Professor of the CSE Department2
, Ponjesly College of Engineering, Nagercoil -3, India
Abstract: In optical networks, the delivery of a traffic flow with a certain bandwidth demand over a single network
path is either not possible or not cost-effective. In these cases, it is very often possible to improve the network's
bandwidth utilization by splitting the traffic flow over multiple efficient paths. While using multiple paths for the
same traffic flow increases the efficiency of the network, it consumes expensive forwarding resources from the
network nodes such as wavelengths/light paths of optical networks. The problem of reducing forwarding cost can
be defined in two cases such as Routing with Minimum Overhead and Decomposition with Minimum Overhead.
For Routing with Minimum Overhead only the traffic demand must be given and for Decomposition with
Minimum Overhead both the traffic demand and network flow will be given. For both the problems forwarding
cost can be minimized by measuring the number of paths and the number of nodes traversed by these paths
Keywords: Multipath flows, optical networks, routing.
1. INTRODUCTION
Networking is the practice of linking multiple computing devices together in order to share resources. These resources can
be printers, CDs, files, or even electronic communications such as e-mails and instant messages. These networks can be
created using several different methods, such as cables, telephone lines, satellites, radio waves, and infrared beams.
A computer network facilitates interpersonal communications allowing people to communicate efficiently and easily via
email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. Providing access to
information on shared storage devices is an important feature of many networks. A network allows sharing of files, data,
and other types of information giving authorized users the ability to access information stored on other computers on the
network. A network allows sharing of network and computing resources. Users may access and use resources provided by
devices on the network.
Without the ability to network, businesses, government agencies, and schools would be unable to operate as efficiently as
they do today. Perhaps even more valuable is the ability to access the same data files from various computers throughout a
building. This is incredibly useful for companies that may have files that require access by multiple employees daily. By
utilizing networking, those same files could be made available to several employees on separate computers
simultaneously, improving efficiency.
2. EXISTING SYSTEM
In Computer networks, a traffic flow is a flow of data packets sharing the same source and destination network nodes
(switches or routers). A traffic flow can often be split into multiple traffic subflows, usually using information in the
packet header, such as the IP/MAC addresses, the Port fields in the UDP/TCP header, or the VLAN number. Because
these traffic sub flows are generated by different applications, or even by different hosts, it is possible to route each of
them over a different network path.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 128
Paper Publications
Using multiple paths for a traffic flow is useful when routing over a single path is impossible or too expensive. In optical
networks, each path is an optical,-switched, light path. Such light paths can be set up and taken down in real time. The
dominating cost in the setup of a signals and vice versa. Therefore, network operators usually seek to minimize the
number of established light paths.
In addition, every light path requires a wavelength on each optical link it traverses. Since wavelengths are also a scarce
resource, it is often desirable to minimize not only the number of light paths, but also the number of nodes traversed by
each one. This network flow is predetermined according to some bandwidth efficiency criterion, such as bandwidth
cost,andthe problem is to break it into a set of simple paths between the source and destination nodes while minimizing
the number of paths or the number of nodes they traverse.
3. PROPOSED SYSTEM
In Computer networks, using multiple paths for a traffic flow is useful when routing over a single path is impossible or
too expensive. However it consumes expensive forwarding resources thus increases the forwarding cost. Hence it is
required to split the traffic flow over multiple paths while minimizing the forwarding cost.In proposed system multipath
traffic flow scheme with improved bandwidth utilization and reduced forwarding cost. The problem of reducing the
forwarding cost is handled as two different cases. In the first case, called Routing with Minimum Overhead (RMO), given
a traffic demand, a set of simple paths between the source and destination nodes over which the bandwidth demand can be
delivered while minimizing the number of paths or the number of nodes they traverse is found.
In the second case, called Decomposition with Minimum Overhead (DMO), given a traffic demand and a network flow
that satisfies the bandwidth demand between the source and destination nodes, the traffic flow is broken into a set of
simple paths between the source and destination nodes while minimizing the number of paths or the number of nodes they
traverse.
4. SYSTEM DESIGN
The overview of the proposed system architecture is given as follows
Fig 4.1 Architecture for proposed system
Fig 4.1 shows that splitting a traffic flow over multipath consumes extra forwarding resources. These resources are related
to number of paths and nodes. so the source can use the traffic demand as input to RMO and this solution minimizes the
both the number of paths and nodes but the bandwidth cost will be higher so the minimum cost network flow will be find
and this network flow along with the traffic demand will be given as an input to DMO in order to decompose it into a set
of paths which minimizes the forwarding cost.
Then compare the performance of the RMO and DMO. The purpose of this comparison is to better understand the tradeoff
between bandwidth efficiency and forwarding cost. This comparison allows us to identify an algorithm that has the best
performance for both objectives.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 129
Paper Publications
5. MODULES DESCRIPTION
There are four modules:
5.1 Data owner:
Data owner module creates the nodes in the optical network. The data owner manager performs the process of monitoring
and controlling the network devices to find where the nodes are located. This module organize and maintain the details
about all components of the network. This component collects the packets from the networks, which are in-turn specified
by the user and transfer it to the destination. This also identifies the source and destination to transfer the data. Data owner
module implements policies, procedures, techniques and tools that are required to manage evaluate the changes, track the
status of change and to maintain an inventory of system and support documents as the system changes.
5.2 Routing with minimum overhead:
In routing with minimum overhead only a traffic demand must (source, destination, and bandwidth demand) is given and
the problem is to find a set of simple paths between the source and the destination nodes over which the bandwidth
demand can be delivered while minimizing the number of paths or the number of nodes they traverse.
RMO should be solved using a solution for DMO as a subroutine. To solve RMO first a feasible network flow that
satisfies the bandwidth demand is to be constructed. After the flow is constructed, it is decomposed into paths.
∑ [ ] [ ] (5.1)
Let α[B/α] is the value of the flow. Scaling algorithm uses a parameter α for the scaling process. The algorithm finds a
network flow whose value is slightly less than B using no more than [B/α] paths. Choosing a larger α would yield fewer
paths whose total bandwidth is smaller. The algorithm used here is scaling algorithm that is used to finds a network flow
whose value is slightly less than the bandwidth. The overhead should be measured by RMO using path and RMO using
node. In RMO(P) for a given traffic demand(source, destination and bandwidth demand) find a minimum set of paths
which satisfies it. In RMO(N) for a given traffic demand source, destination and bandwidth demand) find a set of paths
which satisfies this flow while traversing a minimum number of nodes.
5.3 Decomposition with minimum overhead:
In decomposition with minimum overhead both the traffic demand (source, destination, and bandwidth demand) and
network flow that satisfies the bandwidth demand between the source and the destination must be must be given.This
network flow is predetermined according to some bandwidth efficiency criteria such as bandwidth cost, and the problem
is to break into a set of simple paths between the source and the destination nodes over which the bandwidth demand can
be delivered while minimizing the number of paths or the number of nodes they traverse.
The input network flow for DMO is f, while f(e) is the value of f carried over edge e. Let f(p) denote the value of a single
path flow carried over p.
f(p) = { } (5.2)
( )
(5.3)
The right handside in equation (5.2) denotes the entire set of optimal paths can decompose the network flow f .The left
handside in equation (5.3) denotes the cost of each b bandwidth units routed by .Let Let be the path chosen by the
algorithm in the the ith iteration and denotes the path in the optimal solution.
Now equation (4.3) becomes
OPT. ≥∑ ( )
≥ /b (5.4)
Let OPT denotes the number of paths in the optimal solution and the value of j ranges from one to OPT and b denotes the
edges capacities. The algorithm used here is greedy algorithm that is used to finds a single path flow whose bandwidth is
maximum until it reaches a total bandwidth of B. The overhead should be measured by DMO using path and DMO using
node.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 130
Paper Publications
In DMO(P) decomposing a given network flow into a minimum number of paths which satisfies it. In DMO(N)
decomposing a given network flow into a minimum number of paths while traversing a minimum number of nodes.
6. PERFORMANCE ANALYSIS
The multipath data transmission provided by our cost effective system are analyzed.The limitations associated with the
proposed approaches are pointed out.
6.1 Bandwidth cost analysis:
Bandwidth cost is the cost taken by the packets to deliver in a destination node.
Number of packets delivered is given as x and bandwidth cost is given as y.
Bandwidth cost = Number of packets delivered*Number of edges in the path
7. CONCLUSION
In Computer networks, using multiple paths for a traffic flow is useful when routing over a single path is impossible or
too expensive. However it consumes expensive forwarding resources, thus increases the forwarding cost. These resources
are proportional to number of paths and number of nodes. Hence it is required to split the traffic flow over multiple paths.
To improve bandwidth utilization, it is often desirable to split one traffic flow over multiple paths while minimizing the
associated forwarding cost. Two important optimization problems results namely Decomposition with Minimum
forwarding Overhead (DMO) and Routing with Minimum forwarding Overhead (RMO). It showed that both problems are
NP-hard and presented approximation algorithms. It present efficient practical heuristics for RMO. These heuristics first
find an initial network flow and then decompose it using the DMO approximation. The procedure for selecting the initial
network flow was shown to have a critical impact on the performance of the algorithm. WID/LEN gave the best tradeoff
between bandwidth cost and forwarding overhead.
8. FUTURE WORK
The main objective is to break the network traffic flow into a set of simple paths between the source and destination
nodes. It also aims to find a set of simple paths between the source and destination nodes over which the bandwidth
demand can be delivered while minimizing the number of paths or the number of nodes they traverse. In future it can be
extended by introducing a mechanism for filtering highly distributed denial-of-service attacks. It can block a thousand of
undesired flows, while only requiring a hundred filters. It also prevents malicious nodes seeking to disrupt the
communications of other nodes. Multipath flow has the capability of blocking unwanted flows from the same source from
different paths, even before they can occur.Thus the process will overcome the attacks. It focuses on dropping or
removing all data packets and/or all ACK packets passing is overcome by the proposed model.
0
2
4
6
8
10
12
14
1 2 3 4
Bandwidthcost
Number of packets delivered
Existing
Proposed
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 131
Paper Publications
REFERENCES
[1] G. Baier, E. Köhler, and M. Skutella, ―The k-splittable flow problem,‖ Algorithmica, vol. 42, no. 3–4, pp. 231–248,
2005.
[2] R. Banner and A. Orda, ―Efficient multipath-routing schemes for congestion minimization,‖ Technion—Israel
Institute of Technology, Haifa, Israel, Tech. rep., 2004.
[3] A. Curtis, J. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, and S.Banerjee, ―DevoFlow: Scaling flow
management for high-performance networks,‖ in Proc. ACM SIGCOMM, 2011, pp. 254–265.
[4] O. Gerstel, R. Ramaswami, and G. H. Sasaki, ―Cost-effective traffic grooming in WDM rings,‖ IEEE/ACM Trans.
Netw., vol. 8, no. 5, pp.618–630, Oct. 2000.
[5] A. Goldberg and R. Tarjan, ―Finding minimum-cost circulations by canceling negative cycles,‖ J. ACM, vol. 36, no.
4, pp. 873–886, 1989.
[6] P. Patel, and S. Sengupta, ―VL2: A scalable and flexible data center network,‖ in Proc. ACM SIGCOMM,
Barcelona, Spain, 2009, pp. 51–62.
[7] A. Medina, A. Lakhina, I. Matta, and J. Byers, ―BRITE: An approach to universal topology generation,‖ in Proc.
MASCOTS, 2001, p. 346.
[8] D.Nakibly, J.Cohen, J.Liran, ―Optimizing data Plane Resources for Multipath Flows,‖ IETF RFC 2702, IEEE/ACM
Trans.Netw., vol.23,no.1,Feb. 2015.
[9] C. Raiciu, S. Barre, C. Pluntke, A. Greenhalgh, D. Wischik, and M. Handley, ―Improving datacenter performance
and robustness with multipath TCP,‖ in Proc. ACM SIGCOMM, Toronto, ON, Canada, 2011, pp. 266–277.
[10] B. Vatinlen, F. Chauvet, P. Chrétienne, and P. Mahey, ―Simple bounds and greedy algorithms for decomposing a
flow into a minimal set of paths,‖ Eur. J. Oper. Res., vol. 185, no. 3, pp. 1390–1401, 2008.

More Related Content

PDF
Adaptive resource allocation and internet traffic engineering on data network
PDF
M-EPAR to Improve the Quality of the MANETs
PDF
O dsr optimized dsr routing
PDF
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PDF
Review on Clustering and Data Aggregation in Wireless Sensor Network
PDF
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
PDF
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
PDF
Source routing in Mobile Ad hoc NETworks (MANETs)
Adaptive resource allocation and internet traffic engineering on data network
M-EPAR to Improve the Quality of the MANETs
O dsr optimized dsr routing
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
Review on Clustering and Data Aggregation in Wireless Sensor Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
Source routing in Mobile Ad hoc NETworks (MANETs)

What's hot (19)

PDF
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
PDF
An Enhanced DSR Protocol for Improving QoS in MANET
PDF
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
PDF
Efficient routing mechanism using cycle based network and k hop security in a...
PDF
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
PDF
Tree Based Proactive Source Routing Protocol for MANETs
PDF
Efficient Utilization of Bandwidth in Location Aided Routing
PDF
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
PDF
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
PDF
A02100108
PDF
Gk2411581160
PDF
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
PDF
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
PDF
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
PDF
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
PDF
Congestion Control in Manets Using Hybrid Routing Protocol
PDF
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
PDF
A New Efficient Cache Replacement Strategy for Named Data Networking
PDF
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
An Enhanced DSR Protocol for Improving QoS in MANET
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Efficient routing mechanism using cycle based network and k hop security in a...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Tree Based Proactive Source Routing Protocol for MANETs
Efficient Utilization of Bandwidth in Location Aided Routing
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
A02100108
Gk2411581160
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Congestion Control in Manets Using Hybrid Routing Protocol
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
A New Efficient Cache Replacement Strategy for Named Data Networking
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Ad

Viewers also liked (20)

PDF
Security for Hard AI Problems Using CaRP Authentication
PDF
Multimedia Cloud Computing To Save Smartphone Energy
PDF
Android Application for College
DOCX
Brian fct (1)
PDF
Automatic Conversion of 2D Image into 3D Image
PDF
Diabetics Online
PDF
Analysis of Fungus in Plant Using Image Processing Techniques
PDF
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
PDF
Automatic Fire Fighting Robot
PDF
Folder Security Using Graphical Password Authentication Scheme
PDF
Fuzzy α^m-Separation Axioms
PDF
Efficient File Sharing Scheme in Mobile Adhoc Network
PDF
Sign Language Recognition with Gesture Analysis
PDF
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
PDF
Privacy Preserving Data Leak Detection for Sensitive Data
PDF
Smart Password
PDF
Supervised Multi Attribute Gene Manipulation For Cancer
PDF
Fingerprint Feature Extraction, Identification and Authentication: A Review
PDF
Some Aspects of Abelian Categories
PDF
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Security for Hard AI Problems Using CaRP Authentication
Multimedia Cloud Computing To Save Smartphone Energy
Android Application for College
Brian fct (1)
Automatic Conversion of 2D Image into 3D Image
Diabetics Online
Analysis of Fungus in Plant Using Image Processing Techniques
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Automatic Fire Fighting Robot
Folder Security Using Graphical Password Authentication Scheme
Fuzzy α^m-Separation Axioms
Efficient File Sharing Scheme in Mobile Adhoc Network
Sign Language Recognition with Gesture Analysis
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Privacy Preserving Data Leak Detection for Sensitive Data
Smart Password
Supervised Multi Attribute Gene Manipulation For Cancer
Fingerprint Feature Extraction, Identification and Authentication: A Review
Some Aspects of Abelian Categories
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Ad

Similar to Optimized Traffic Flow over Multipath in Optical Networks (20)

PDF
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
PDF
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
PDF
Efficient and stable route selection by using cross layer concept for highly...
PDF
Ijetcas14 488
PPTX
Jamming aware traffic allocation for multiple-path routing using portfolio se...
PDF
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PDF
“Optimizing the data transmission between multiple nodes during link failure ...
PDF
A scalable and power efficient solution for routing in mobile ad hoc network ...
PDF
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
PDF
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
PDF
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
PDF
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
PDF
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
PDF
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
PDF
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
PDF
10.1.1.258.7234
PDF
Energy efficiency cross layer protocol for wireless mesh network
PDF
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
PDF
7. 7775 8118-1-pb
PDF
A survey on routing algorithms and routing metrics for wireless mesh networks
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Efficient and stable route selection by using cross layer concept for highly...
Ijetcas14 488
Jamming aware traffic allocation for multiple-path routing using portfolio se...
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
“Optimizing the data transmission between multiple nodes during link failure ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
10.1.1.258.7234
Energy efficiency cross layer protocol for wireless mesh network
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
7. 7775 8118-1-pb
A survey on routing algorithms and routing metrics for wireless mesh networks

Recently uploaded (20)

PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Digital Logic Computer Design lecture notes
PPTX
Welding lecture in detail for understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Well-logging-methods_new................
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
DOCX
573137875-Attendance-Management-System-original
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Project quality management in manufacturing
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
Lesson 3_Tessellation.pptx finite Mathematics
Digital Logic Computer Design lecture notes
Welding lecture in detail for understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Well-logging-methods_new................
Lecture Notes Electrical Wiring System Components
additive manufacturing of ss316l using mig welding
Geodesy 1.pptx...............................................
UNIT-1 - COAL BASED THERMAL POWER PLANTS
573137875-Attendance-Management-System-original
CH1 Production IntroductoryConcepts.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
UNIT 4 Total Quality Management .pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Project quality management in manufacturing
Internet of Things (IOT) - A guide to understanding
Arduino robotics embedded978-1-4302-3184-4.pdf

Optimized Traffic Flow over Multipath in Optical Networks

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 127 Paper Publications OPTIMIZED TRAFFIC FLOW OVER MULTIPATH IN OPTICAL NETWORKS B. Shincy Mercylin1 , Mrs. Manchu.M2 PG Scholar1 Associate Professor of the CSE Department2 , Ponjesly College of Engineering, Nagercoil -3, India Abstract: In optical networks, the delivery of a traffic flow with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is very often possible to improve the network's bandwidth utilization by splitting the traffic flow over multiple efficient paths. While using multiple paths for the same traffic flow increases the efficiency of the network, it consumes expensive forwarding resources from the network nodes such as wavelengths/light paths of optical networks. The problem of reducing forwarding cost can be defined in two cases such as Routing with Minimum Overhead and Decomposition with Minimum Overhead. For Routing with Minimum Overhead only the traffic demand must be given and for Decomposition with Minimum Overhead both the traffic demand and network flow will be given. For both the problems forwarding cost can be minimized by measuring the number of paths and the number of nodes traversed by these paths Keywords: Multipath flows, optical networks, routing. 1. INTRODUCTION Networking is the practice of linking multiple computing devices together in order to share resources. These resources can be printers, CDs, files, or even electronic communications such as e-mails and instant messages. These networks can be created using several different methods, such as cables, telephone lines, satellites, radio waves, and infrared beams. A computer network facilitates interpersonal communications allowing people to communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. Providing access to information on shared storage devices is an important feature of many networks. A network allows sharing of files, data, and other types of information giving authorized users the ability to access information stored on other computers on the network. A network allows sharing of network and computing resources. Users may access and use resources provided by devices on the network. Without the ability to network, businesses, government agencies, and schools would be unable to operate as efficiently as they do today. Perhaps even more valuable is the ability to access the same data files from various computers throughout a building. This is incredibly useful for companies that may have files that require access by multiple employees daily. By utilizing networking, those same files could be made available to several employees on separate computers simultaneously, improving efficiency. 2. EXISTING SYSTEM In Computer networks, a traffic flow is a flow of data packets sharing the same source and destination network nodes (switches or routers). A traffic flow can often be split into multiple traffic subflows, usually using information in the packet header, such as the IP/MAC addresses, the Port fields in the UDP/TCP header, or the VLAN number. Because these traffic sub flows are generated by different applications, or even by different hosts, it is possible to route each of them over a different network path.
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 128 Paper Publications Using multiple paths for a traffic flow is useful when routing over a single path is impossible or too expensive. In optical networks, each path is an optical,-switched, light path. Such light paths can be set up and taken down in real time. The dominating cost in the setup of a signals and vice versa. Therefore, network operators usually seek to minimize the number of established light paths. In addition, every light path requires a wavelength on each optical link it traverses. Since wavelengths are also a scarce resource, it is often desirable to minimize not only the number of light paths, but also the number of nodes traversed by each one. This network flow is predetermined according to some bandwidth efficiency criterion, such as bandwidth cost,andthe problem is to break it into a set of simple paths between the source and destination nodes while minimizing the number of paths or the number of nodes they traverse. 3. PROPOSED SYSTEM In Computer networks, using multiple paths for a traffic flow is useful when routing over a single path is impossible or too expensive. However it consumes expensive forwarding resources thus increases the forwarding cost. Hence it is required to split the traffic flow over multiple paths while minimizing the forwarding cost.In proposed system multipath traffic flow scheme with improved bandwidth utilization and reduced forwarding cost. The problem of reducing the forwarding cost is handled as two different cases. In the first case, called Routing with Minimum Overhead (RMO), given a traffic demand, a set of simple paths between the source and destination nodes over which the bandwidth demand can be delivered while minimizing the number of paths or the number of nodes they traverse is found. In the second case, called Decomposition with Minimum Overhead (DMO), given a traffic demand and a network flow that satisfies the bandwidth demand between the source and destination nodes, the traffic flow is broken into a set of simple paths between the source and destination nodes while minimizing the number of paths or the number of nodes they traverse. 4. SYSTEM DESIGN The overview of the proposed system architecture is given as follows Fig 4.1 Architecture for proposed system Fig 4.1 shows that splitting a traffic flow over multipath consumes extra forwarding resources. These resources are related to number of paths and nodes. so the source can use the traffic demand as input to RMO and this solution minimizes the both the number of paths and nodes but the bandwidth cost will be higher so the minimum cost network flow will be find and this network flow along with the traffic demand will be given as an input to DMO in order to decompose it into a set of paths which minimizes the forwarding cost. Then compare the performance of the RMO and DMO. The purpose of this comparison is to better understand the tradeoff between bandwidth efficiency and forwarding cost. This comparison allows us to identify an algorithm that has the best performance for both objectives.
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 129 Paper Publications 5. MODULES DESCRIPTION There are four modules: 5.1 Data owner: Data owner module creates the nodes in the optical network. The data owner manager performs the process of monitoring and controlling the network devices to find where the nodes are located. This module organize and maintain the details about all components of the network. This component collects the packets from the networks, which are in-turn specified by the user and transfer it to the destination. This also identifies the source and destination to transfer the data. Data owner module implements policies, procedures, techniques and tools that are required to manage evaluate the changes, track the status of change and to maintain an inventory of system and support documents as the system changes. 5.2 Routing with minimum overhead: In routing with minimum overhead only a traffic demand must (source, destination, and bandwidth demand) is given and the problem is to find a set of simple paths between the source and the destination nodes over which the bandwidth demand can be delivered while minimizing the number of paths or the number of nodes they traverse. RMO should be solved using a solution for DMO as a subroutine. To solve RMO first a feasible network flow that satisfies the bandwidth demand is to be constructed. After the flow is constructed, it is decomposed into paths. ∑ [ ] [ ] (5.1) Let α[B/α] is the value of the flow. Scaling algorithm uses a parameter α for the scaling process. The algorithm finds a network flow whose value is slightly less than B using no more than [B/α] paths. Choosing a larger α would yield fewer paths whose total bandwidth is smaller. The algorithm used here is scaling algorithm that is used to finds a network flow whose value is slightly less than the bandwidth. The overhead should be measured by RMO using path and RMO using node. In RMO(P) for a given traffic demand(source, destination and bandwidth demand) find a minimum set of paths which satisfies it. In RMO(N) for a given traffic demand source, destination and bandwidth demand) find a set of paths which satisfies this flow while traversing a minimum number of nodes. 5.3 Decomposition with minimum overhead: In decomposition with minimum overhead both the traffic demand (source, destination, and bandwidth demand) and network flow that satisfies the bandwidth demand between the source and the destination must be must be given.This network flow is predetermined according to some bandwidth efficiency criteria such as bandwidth cost, and the problem is to break into a set of simple paths between the source and the destination nodes over which the bandwidth demand can be delivered while minimizing the number of paths or the number of nodes they traverse. The input network flow for DMO is f, while f(e) is the value of f carried over edge e. Let f(p) denote the value of a single path flow carried over p. f(p) = { } (5.2) ( ) (5.3) The right handside in equation (5.2) denotes the entire set of optimal paths can decompose the network flow f .The left handside in equation (5.3) denotes the cost of each b bandwidth units routed by .Let Let be the path chosen by the algorithm in the the ith iteration and denotes the path in the optimal solution. Now equation (4.3) becomes OPT. ≥∑ ( ) ≥ /b (5.4) Let OPT denotes the number of paths in the optimal solution and the value of j ranges from one to OPT and b denotes the edges capacities. The algorithm used here is greedy algorithm that is used to finds a single path flow whose bandwidth is maximum until it reaches a total bandwidth of B. The overhead should be measured by DMO using path and DMO using node.
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 130 Paper Publications In DMO(P) decomposing a given network flow into a minimum number of paths which satisfies it. In DMO(N) decomposing a given network flow into a minimum number of paths while traversing a minimum number of nodes. 6. PERFORMANCE ANALYSIS The multipath data transmission provided by our cost effective system are analyzed.The limitations associated with the proposed approaches are pointed out. 6.1 Bandwidth cost analysis: Bandwidth cost is the cost taken by the packets to deliver in a destination node. Number of packets delivered is given as x and bandwidth cost is given as y. Bandwidth cost = Number of packets delivered*Number of edges in the path 7. CONCLUSION In Computer networks, using multiple paths for a traffic flow is useful when routing over a single path is impossible or too expensive. However it consumes expensive forwarding resources, thus increases the forwarding cost. These resources are proportional to number of paths and number of nodes. Hence it is required to split the traffic flow over multiple paths. To improve bandwidth utilization, it is often desirable to split one traffic flow over multiple paths while minimizing the associated forwarding cost. Two important optimization problems results namely Decomposition with Minimum forwarding Overhead (DMO) and Routing with Minimum forwarding Overhead (RMO). It showed that both problems are NP-hard and presented approximation algorithms. It present efficient practical heuristics for RMO. These heuristics first find an initial network flow and then decompose it using the DMO approximation. The procedure for selecting the initial network flow was shown to have a critical impact on the performance of the algorithm. WID/LEN gave the best tradeoff between bandwidth cost and forwarding overhead. 8. FUTURE WORK The main objective is to break the network traffic flow into a set of simple paths between the source and destination nodes. It also aims to find a set of simple paths between the source and destination nodes over which the bandwidth demand can be delivered while minimizing the number of paths or the number of nodes they traverse. In future it can be extended by introducing a mechanism for filtering highly distributed denial-of-service attacks. It can block a thousand of undesired flows, while only requiring a hundred filters. It also prevents malicious nodes seeking to disrupt the communications of other nodes. Multipath flow has the capability of blocking unwanted flows from the same source from different paths, even before they can occur.Thus the process will overcome the attacks. It focuses on dropping or removing all data packets and/or all ACK packets passing is overcome by the proposed model. 0 2 4 6 8 10 12 14 1 2 3 4 Bandwidthcost Number of packets delivered Existing Proposed
  • 5. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (127-131), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 131 Paper Publications REFERENCES [1] G. Baier, E. Köhler, and M. Skutella, ―The k-splittable flow problem,‖ Algorithmica, vol. 42, no. 3–4, pp. 231–248, 2005. [2] R. Banner and A. Orda, ―Efficient multipath-routing schemes for congestion minimization,‖ Technion—Israel Institute of Technology, Haifa, Israel, Tech. rep., 2004. [3] A. Curtis, J. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, and S.Banerjee, ―DevoFlow: Scaling flow management for high-performance networks,‖ in Proc. ACM SIGCOMM, 2011, pp. 254–265. [4] O. Gerstel, R. Ramaswami, and G. H. Sasaki, ―Cost-effective traffic grooming in WDM rings,‖ IEEE/ACM Trans. Netw., vol. 8, no. 5, pp.618–630, Oct. 2000. [5] A. Goldberg and R. Tarjan, ―Finding minimum-cost circulations by canceling negative cycles,‖ J. ACM, vol. 36, no. 4, pp. 873–886, 1989. [6] P. Patel, and S. Sengupta, ―VL2: A scalable and flexible data center network,‖ in Proc. ACM SIGCOMM, Barcelona, Spain, 2009, pp. 51–62. [7] A. Medina, A. Lakhina, I. Matta, and J. Byers, ―BRITE: An approach to universal topology generation,‖ in Proc. MASCOTS, 2001, p. 346. [8] D.Nakibly, J.Cohen, J.Liran, ―Optimizing data Plane Resources for Multipath Flows,‖ IETF RFC 2702, IEEE/ACM Trans.Netw., vol.23,no.1,Feb. 2015. [9] C. Raiciu, S. Barre, C. Pluntke, A. Greenhalgh, D. Wischik, and M. Handley, ―Improving datacenter performance and robustness with multipath TCP,‖ in Proc. ACM SIGCOMM, Toronto, ON, Canada, 2011, pp. 266–277. [10] B. Vatinlen, F. Chauvet, P. Chrétienne, and P. Mahey, ―Simple bounds and greedy algorithms for decomposing a flow into a minimal set of paths,‖ Eur. J. Oper. Res., vol. 185, no. 3, pp. 1390–1401, 2008.