Presentation Flow. PNNI Routing Protocol Hello Protocol. What is PNNI?

Similar documents
Content. Motivation General Framework The BGR Algorithm Simulation Results Conclusion. BGR: Blind Geographic Routing for Sensor Networks

Alarm setup and definitions in Cisco Unified Serviceability

To appear in the IEEE/IFIP 1996 Network Operations and Management. Symposium (NOMS'96), Kyoto, Japan, April TASA: Telecommunication

Configuring Thresholds

Chapter 1 Introduction

SimpleComTools, LLC 1

Animals:Goats:Bleat.Calls,Warbling.Baa,Movements.Rubbing,Barn,Medium.Close,Interior,BG.Dog.Barks 01:21.618

Andover ContinuumTM. SNMP Alarming

Smart Sensing and Tracking with Video and Mote Sensor Collaboration

Simplex Panel Interface Guide

WHAT HAPPENS NEXT FOR ADT SMART BUSINESS CUSTOMERS

Composite Event Detection in Wireless Sensor Networks

FIMD: Fine-grained Device-free Motion Detection

The Basics of Package/Device Cooling

Fault and Performance Management

C. The system shall be capable of turning luminaires on/off (where supported by the luminaire) as well as full range dimming.

Application of Fuzzy Control in Central Air-conditioning Terminal Units Energy-saving

Where Technology Shapes Solutions. Alarm management : Wasn t that problem already solved years ago?

CRUSH: Cognitive Radio Universal Software Hardware

The Compact Muon Solenoid Experiment. Conference Report. Mailing address: CMS CERN, CH-1211 GENEVA 23, Switzerland

NOTE: Oracle Real Application Clusters 11g Page 2

Installation Manual. ATS Remote Annunciator Catalog 5350 DANGER WARNING D

Dynamic Evacuation Guidance Considering Occupant Distribution

Brine Generation Study

Construction of Wireless Fire Alarm System Based on ZigBee Technology

Temperature Monitoring System. Specifications

How Computer Simulation Helps to Design Induction Heating Systems

Slope stability assessment

API MANUAL OF PETROLEUM MEASUREMENT STANDARDS

NF MARK RIGID NON-PLASTICISED PVC PIPES AND FITTINGS

Growth Management Planning in the Central Puget Sound Region. Today s Presentation. Puget Sound Region. New Partners for Smart Growth

The Process of Design. Jason M. Keith Fuel Cells and Alternative Fuels Enterprise Michigan Technological University Houghton, MI 49931

Alarm Benchmark Module By Konnection Introduction Overview Description

White Paper. Fog Detection and Defog Technology. hanwhasecurity.com

Secador Automatic Desiccator. vs. Comparable Competitor

EOTec 2000 ControlNet Fiber Optic SHR/DSHR Communications Modules* With Support for Single and Dual Channel Self-Healing Rings

Design of the Fiber-optic Fence Warning System with Distributed Video Real-Time Display Function Qiang-yi YI and Zheng-hong YU *

Fire Risks of Loviisa NPP During Shutdown States

NeXT is a powerful stand-alone application running fully embedded in network cameras to perform an intelligent video surveillance for ATM devices.

FortiNAC. Lightspeed Single Sign-On Integration. Version: 8.x Date: 8/29/2018. Rev: B

LineGuard 2300 Program User Manual (FloBoss 107)

Implementation of Auto Car Washing System Using Two Robotic Arms

WHITE PAPER: Cooling Industrial Enclosures with Filter Fans

A Energy Efficient Approach to Processing Spatial Alarms on Mobile Clients

Before you install ProSeries software for network use

RLDS - Remote LEAK DETECTION SYSTEM

Artificial Intelligence Enables a Network Revolution

Successful Applications Using ISA100 Wireless Technology

Meeting PHMSA Alarm Management Requirements: How TiPS Can Help

Added password for IP setup page : Password must be in IP format!

Oral Syringe Product Stability &

1 Descriptions of Function

Toward a Robust Flood Emergency Evacuation Integration of 2-D Hydraulic Modeling and Dynamic Evacuation Routing

Proven Fire Fighting Efficiency for Large Transformers with High Pressure Water Mist

WHAT HAPPENS NEXT for ADT Interactive Security Customers

Research on Decision Tree Application in Data of Fire Alarm Receipt and Disposal

Pack Calculation Pro. Users guide. Version Morten Juel Skovrup

Platform Services BACnet Alarm Management

DEVELOPMENT OF THE TANGO ALARM SYSTEM

Avigilon Control Center System Integration Guide

Induction Billet Heaters with Enthalpy Controlled Zone Heating

Avigilon Control Center System Integration Guide

Self-monitoring of wireless sensor networks

ISA100 Wireless. End-User Vision Realized. Standards Certification Education & Training Publishing Conferences & Exhibits

An Energy Efficient Middleware Architecture for Processing Spatial Alarms on Mobile Clients

WIRELESS CONTROLLABLE DEUS LLC

Millennium Xtra. Millennium ATMA setup and configuration guide. May Millennium Group, Inc.

Wiser Air User Interface Guide. Thermostat

Cisco Service Path Analyzer Alarm Reference

ION Meter Alerts TECHNICAL NOTE NOVEMBER In This Document

Research Article Footstep and Vehicle Detection Using Seismic Sensors in Wireless Sensor Network: Field Tests

FTS510 Series. Handheld OTDR Test Set.

Common Questions & Answers

Emergency Action Plan Program

Intrusion Detection: Eliminating False Alarms

IDS RainStorm: Visualizing IDS Alarms. Kulsoom Abdullah, Chris Lee, Gregory Conti, John A. Copeland, John Stasko

Avigilon Control Center System Integration Guide

KE2 EvaporatorEfficiency Theory of Operation

USER S GUIDE. AXIS Cross Line Detection

Operating instructions

Integrating fire-spread and household-level trigger modeling to stage wildfire evacuation warnings

Practicalities and Limitations of Coupling FDS with Evacuation Software

Australian Standard. Fire detection, warning, control and intercom systems System design, installation and commissioning

IMPACTS OF SERVICE MANAGEMENT OF NEW GENERATION SERVICES ON FAULT MANAGEMENT SYSTEM

IRIS Touch Firmware Enhancements and Additions from Version to Version

How the People Counter Works. Enhanced Safety, Security and Building Automation, and Improved Marketing Intelligence. 3D MLI Sensor Technology

Avigilon Control Center 5 System Integration Guide

Frequently asked questions: Intelligent Transmitter Series

FlameGard 5 MSIR HART

A Forest Fire Warning Method Based on Fire Dangerous Rating Dan Wang 1, a, Lei Xu 1, b*, Yuanyuan Zhou 1, c, Zhifu Gao 1, d

An Overview of Procedural Fire. How to model procedurally spreading fire

RS485 MODBUS Module 8AI

PROJECT PROPOSAL FOR INTRUDER DETECTION SYSTEM

A Network Theory Framework for Urban Cultural Heritage Conservation. Manal Ginzarly LEMA, Université de Liège

Before you install ProSeries software for network use

Designing Nanophotonic Interconnection Networks

Practical Distributed Control Systems (DCS) for Engineers & Technicians. Contents

VNCManager. Version June Developed by:

Faster GPS via the Sparse Fourier Transform. Haitham Hassanieh Fadel Adib Dina Katabi Piotr Indyk

Advanced Features Guide of Visual MIBrowser Pro

Transcription:

Performance Evaluation of Multiple Criteria Routing Algorithms in Large PNNI ATM Network Phongsak Prasithsangaree Master s Thesis Defense May 22, 2000 Presentation Flow What is PNNI? Problem statement Our solution Implementation Performance metrics Test scenarios Performance evaluation Conclusions May 22, 2000 2 What is PNNI? Private Network to Network Interface A protocol for ATM networks PNNI is composed of two protocols PNNI Routing Protocol PNNI Signaling Protocol May 22, 2000 3 PNNI Routing Protocol Hello Protocol Hello Packets are exchanged between neighbor nodes To discover and verify the identity of the neighbor nodes. Flooding Mechanism A reliable hop-by-hop propagation of topology information. Topology information, PTSE, and PTSP PTSE is subject to aging and is removed after a pre-defined duration. An updated PTSE is sent when topology information is significantly changed. A significant change is determined by configuration parameters. May 22, 2000 4

PNNI Routing Protocol (continued) PNNI Topology Metrics and Attributes Metric: delay or administrative weight Attribute: bandwidth, CLR, or CDV Routing Mechanism Router gets a route request with requirements. Router retrieves topology information from its database. Router finds a possible path according to the requirements. Return the path in the DTL format. PNNI Signaling Protocol A subset of UNI 4.0 signaling standard. Call Setup Procedure Call Admission Control (CAC) Crankback and Alternate Routing Host 1 Node 1 Node 2 Host 2 setup setup call_proc setup call_proc connect connect connect May 22, 2000 5 May 22, 2000 6 Problem Statement Problem Statement The popular routing algorithm used is Dijkstra s algorithm, which can find a path based on a single cost. Need something better than Dijkstra s Algorithm Multiple QoS Routing A routing algorithm that can find a route with more than one constraint at the same time. However... The problem of deciding if there is a path which satisfies more than one additive constraints is NPcomplete. May 22, 2000 7 May 22, 2000 8

Our Solution Heuristic Multiple Criteria Routing Algorithms Our Solution May 22, 2000 9 May 22, 2000 10 Implementation Implementation Generic Call Admission Control (GCAC) Standardized by ATM forum to be used for call admission control (CAC). CAC is vendor-specific. GCAC is used to reduce the routing computational time. It prunes links and nodes that cannot support the call. May 22, 2000 11 May 22, 2000 12

Routing Algorithms Dijkstra s algorithm has cost and distance as parameters. Widest Shortest Algorithm Modified Dijkstra s algorithms to consider two costs and two distances. D_widest algorithm modified relaxation method of Dijkstra s algorithm Shortest Widest Algorithm (has two routing passes) The first pass used D_widest algorithm and the second pass used the modified Dijkstra s algorithm Implementation (continued) Routing Computation Flow Chart May 22, 2000 13 May 22, 2000 14 Performance Metrics May 22, 2000 15 May 22, 2000 16

Performance Metrics Average Call Failure Rate Total number of rejected calls = Total number of requested calls Average Call Setup Time Total call setup time = Total number of successful calls Performance Metrics (continued) Routing Inaccuracy Number of Crankback events = Total number of call requests Link Utilization Used Link Bandwidth = Link Bandwidth Capacity May 22, 2000 17 May 22, 2000 18 Test Scenarios Edge-Core Networks Test Scenarios May 22, 2000 19 May 22, 2000 20

Dense Edge-Core Network Light Edge-Core Network May 22, 2000 21 May 22, 2000 22 Test Scenarios 3-Cluster Network Cluster Networks May 22, 2000 23 May 22, 2000 24

8-Cluster Network Performance Evaluation May 22, 2000 25 May 22, 2000 26 Performance Evaluation Maximum bandwidth routing tests Minimum delay routing tests Link utilization tests Alternate routing tests Network density tests Maximum Bandwidth Routing Tests Calls are CBR-typed with different bandwidth requests Call Arrival: 5 seconds between calls with Poisson distribution. Call duration: 60 seconds with Poisson distribution. Destination Hosts: uniformly selected from all other nodes. Total Calls: 2400 calls May 22, 2000 27 May 22, 2000 28

Average Call Blocking Rate and Call Bandwidth Average Call Setup Time and Call Bandwidth May 22, 2000 29 May 22, 2000 30 Routing Inaccuracy and Call Bandwidth Minimum Delay Routing Tests May 22, 2000 31 May 22, 2000 32

Minimum Delay Routing Tests Average Call Blocking Rate and Call Bandwidth Calls are CBR-typed with different bandwidth requests Call Arrival: 5 seconds between calls with Poisson distribution. Call duration: varied with Poisson distribution. Destination Hosts: uniformly selected from all other nodes. Total Calls: 2400 calls May 22, 2000 33 May 22, 2000 34 Average Call Blocking Rate and Call Holding Time Link Utilization Tests May 22, 2000 35 May 22, 2000 36

Link Utilization Tests What is Link Utilization? Link Utilization in Edge-Core Network Minhop = Total BW used of the link Link Capacity Calls are CBR-typed: an average of uniformly distributed call bandwidth:10 Mbps. Call arrival: 5 seconds between calls with Poisson Distribution Call duration: 60 seconds with Poisson distribution One host makes 1000 calls Total 24,000 calls in the network. May 22, 2000 37 May 22, 2000 38 Link Utilization in Edge-Core Network Link Utilization in Edge-Core Network Shortestminhop Widestminhop May 22, 2000 39 May 22, 2000 40

Alternate Routing Tests Alternate Routing Tests Calls are CBR-typed: an average of uniformly distributed call bandwidth: 30 Mbps. Call arrival: 5 seconds between calls with Poisson distribution. Call duration: 60 seconds with Poisson distribution Total number of calls: 2400 calls We increase the number of alternate routing retries. May 22, 2000 41 May 22, 2000 42 Alternate Routing in Cluster Network Average call failure rate when using widest group algorithm Network Core Density Tests May 22, 2000 43 May 22, 2000 44

Network Core Density Tests Calls are CBR-typed: an average of uniformly distributed call bandwidth: 15 Mbps. Call arrivals: 5 seconds between calls with Poisson distribution. Call duration: 60 seconds with Poisson distribution. Total calls: 2400 calls Network density (or connectivity) Links Lowdense Medium -dense Highdense Core Links 18 27 36 Edge Links 24 24 24 Nodes 24 24 24 Connectivity 1.75 2.125 2.5 May 22, 2000 45 Routing with Different Network Core Density May 22, 2000 46 Conclusions Conclusions In maximum bandwidth routing, the widest-minhop and the shortest-widest-minhop routing algorithms tend to perform better than others in the widest algorithm group. However, the minhop-widest and the shortest-widest routing algorithms tend to perform worse than others in the widest algorithm group. In minimum delay routing, those algorithms does not perform well because they do not consider the dynamic change of the network. May 22, 2000 47 May 22, 2000 48

Conclusions (continued) Widest-minhop routing algorithm can improve the link utilization of the network. Increasing the number of alternate routing retries slightly improves the call success rate. Increasing the number of the core links in the edge-core network improves the call success rate, BUT not always. At a certain point, increasing the network density does not reduce the call failure rate. Instead, it increases the call setup time. The large amount of resource information can deteriorate the network performance. May 22, 2000 49 May 22, 2000 50