SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 3, Issue 12 (July 2014) PP: 56-59
www.ijeijournal.com Page | 56
Multiflow Model for Routing and Policing Traffic in
Infocommunication Network
Dr. Mohammed Khodayer Hassan
Abstract: Thus the article offers the model represented by algebraic equations and inequalities for routing and
policing traffic in infocommunication network. The novelty of the model is as follows: multiflow nature of
modern ICN is taken into account (1), i.е. a set of flows circling between different pairs of network routers are
considered simultaneously; coherent formalization of processes of traffic routing and policing within the model
that has lower dimensionality in comparison to known earlier is provided; the choice of optimality criterion, use
of which allows to implement multipath routing with consequent inclusion of paths as well as to organize
limitation of flow intensity on all the used routs simultaneously depending on their characteristics and flow
priority. According to the results of the analysis conducted we offer recommendations for choosing relation in
numerical values of routing metrics and service denial regarding the provision of the given values for the main
QoS characteristics, e.g. average packet delay. The model can be used as a basis for perspective protocol
decisions aimed at coherence of solutions for the tasks of traffic routing and policing. Further development of
the given model is possible under full account of stochastic characteristics of packet flows circling in the
network.
Keywords: Model; Routing, Traffic, Flow, Priority, Quality of Service, Network.
I. Introduction
Rapid progress in technologies of info communication networks (ICN) and increase of their
performance is first of all connected with the development of fiber optic communications. Never the less the
problem of overloading still remains an important task. Under high ICN overload provision of the given values
of Quality of Service (QoS) characteristics is possible only at the account of policing (limiting) the traffic
coming on edge network nodes [1]-[3]. Considering multiservice nature of modern ICN limitations of the
intensity with service denials should be related more to low priority flows on the overloaded areas of network.
Thus the process of traffic policing should be adaptive basing on the constant monitoring ICN states – load of
communication links and routers, flow characteristics and QoS requirements. One of the important requirements
is provision of maximal level of consistency between means of traffic policing and routing protocols.
Despite a rather wide spectrum of currently applied network mechanisms and protocols consistent
solution for local tasks of traffic control is not provided. The existing methods for traffic control that are
responsible for its formation, distribution (routing) and limitation have distributive nature and base on the
information of an average rate stated in SLA (Service-Level Agreement) and network topology [1]-[3]. In order
to solve each task of control we should apply different means such as Traffic Shaping and Committed Access
Rate for traffic formation, for routing tasks we use such protocols as IGRP (Interior Gateway Routing Protocol),
OSPF (Open Shortest Path First), PNNI (Private Network – to – Network Interface) [4]-[6] etc. These means
work consequently and in the best case they define initial data for each other while solving tasks of traffic
control. Besides models for traffic control that are heuristic by their meaning such as shortest path search, token
bucket and lucky bucket are not able to take into account changes in the current load of a network node and
characteristics of traffics of other users; they are also not coherent. This in its turn decreases considerably the
effectiveness of means of control and visibly restricts their application area in ICN.
II. Problem statement
Thus the reason of the low consistency level in solving tasks of traffic control is not only the problem
of the technical implementation of the given requirement; it is more connected with complexity of formalization
of these tasks within the single model. In this case the actual scientific and practical problem is the development
of the complex model able to describe consistently the processes of routing and policing traffic in ICN that
could be a basis of perspective protocols for traffic management.
III. Model for traffic routing and policing in infocommunication network
Currently we know several approaches within which attempts to develop such model were made. The
most successful among them are [7]-[11]. In [7] a model of consistently solving tasks of traffic policing using
implementation of precomputation routing is given. This model suggests that the problem of these paths
Multiflow Model For Routing And Policing Traffic In Infocommunication Network
www.ijeijournal.com Page | 57
computation is preliminary solved and it is necessary only to provide distribution of the flows coming into ICN
along the given routs. In [8], [9] two-index model that does not require path precomputation is offered and
investigated. This model is based on the model of flow-based routing, i.e. it considers flow structure of modern
network traffic. Although a model in [8], [9] possesses rather high dimensionality [10] that has negative
influence on perspectives of its computing and software implementation. That is why the given articles offers to
use three-index model of flow-based routing in [10], [11] as a basic one.
Let the structure of the network be described with oriented graph ),( EMG  , where M is a set of
nodes (ICN routers) and E is a set of arcs (communication links). For each arc Eji ),( has its bandwidth
ij . Besides, let K be a set of flows, circling in the network.
Regarding multiflow nature of modern ICN as well as necessity of joint description of traffic routing and
policing processes the condition of flow conservation on routers and in ICN in general obtains the next form:



sk Ms
sk
ji
Mm
ik
jm
k
ji
k
ji xxr ,
,
,
,,, )( 1 , (1)
where ik
jmx ,
, is intensity of the k -th flow of packets that must be sent from the m -th to the j -th node via the i -
th node;
k
ji, is a portion of the k -th packet flow from the m -th node to the j -th node that was denied in
service;
k
jir , is intensity of the k -th packet flow arriving to the i -th node from access networks (network users)
for their further transmission to the j -th node;
kM is a set of adjacent nodes for the i -th node from which they can receive packets;
sM is a set of adjacent nodes for the i -th node to which it can send packets.
Then the condition of loop absence in computing routs of packet delivery in the network can be written as
[10], [11]
 sk MM . (2)
In its turn the condition of absence of ICN communication channel overload is as follows:
 
k j
ik
ik
jmx ,
,
,  , Eim ),( . (3)
Routing variables i
jkx , and dropping variables ji, should be given several important restrictions as
ji
ik
jm rx ,
,
, 0 , (4)
10  k
ji, . (5)
Fulfillment of the condition (4) provides implementation of multipath routing strategy Introduction of
the condition (5) allows to use adaptive flow limitation under possible overload of communication channels of
the network in general.
Computation of control variables
ik
jmx ,
,
and
k
ji,
should be made consistently providing minimization
of available network (channel) resources usage. In this case it is necessary to present initial task as optimized
with the following target function subjected to minimization:
 
k i j
k
ji
k
ji
k
ji
k m j
ik
jm
i
i
m fxfJ ,,,
,
,  , (6)
where ik
jmf ,
, is routing metrics for the links given by the arc Eim ),( ; k
jif , is metrics of service denials that
depends directly on the priority of k -th flow.
Such choice of target function was made due to the results of the investigation of models that were
known earlier [8], [9]. The choice of linear form 
k m j
ik
jm
i
i
m xf ,
, guaranties realization of multipath routing
with consequent inclusion of paths and usage of quadratic form 
k i j
k
ji
k
ji
k
ji f ,,,  allows to organize
limitation of flow intensity on all used routs simultaneously depending on their characteristics and priority of
flow.
Multiflow Model For Routing And Policing Traffic In Infocommunication Network
www.ijeijournal.com Page | 58
In [8], [9] it is showed that denial metrics should be chosen by their numerical values that are bigger
than routing metrics. Relation between metrics is largely determined by the structure of the network: the amount
of communication channels, routers and their connectivity. As the results of conducted investigations have
shown (fig. 1) by choosing the relation between metrics of routing and service denials
ik
jm
k
ji ffd ,
,, , (7)
it is possible to regulate maximal allowed average end-to-end delivery of packets in ICN for any flow. However
when the value of d is getting higher, traffic proofing begins at the border of ICN under higher intensity of the
flow k
jir, , i.e. the higher is d , the lower will be the amount of denials. While obtaining the analysis of the
results in order to make the example more vivid we adopted hypothesis that the work of routing interface was
simulated by the queuing systems M/M/1.
100 120 140 160 180 200 220 240 260 280
0.01
0.02
0.03
0.04
0.05
0.06
0.07
0.08
0.09
rate, packet/sec
averagedelay,sec
d=3
d=4
d=5
Fig. 1. The results of the analysis for the influence of relation between metrics of routing and service denial on
the nature of decisions connected with traffic routing and policing
By the same way it is possible to control other QoS characteristics, e.g. jitter and probability of packet
loss. Besides numerical value of the parameter d (7) for each flow can be specified in the course of
infocommunication network functioning according to the changes of QoS requirements.
IV. Conclusions
Thus the article offers the model represented by algebraic equations and inequalities (1)-(6) for routing
and policing traffic in infocommunication network. The novelty of the model is as follows:
1. Multiflow nature of modern ICN is taken into account (1), i.е. a set of flows circling between different
pairs of network routers are considered simultaneously;
2. Coherent formalization of processes of traffic routing and policing within the model that has lower
dimensionality in comparison to known earlier is provided;
3. The choice of optimality criterion (6), use of which allows to implement multipath routing with
consequent inclusion of paths as well as to organize limitation of flow intensity on all the used routs
simultaneously depending on their characteristics and flow priority.
According to the results of the analysis conducted we offer recommendations for choosing relation in
numerical values of routing metrics ( ik
jmf ,
, ) and service denial ( k
jif , ) regarding the provision of the given values
for the main QoS characteristics, e.g. average packet delay. The model (1)-(6) can be used as a basis for
perspective protocol decisions aimed at coherence of solutions for the tasks of traffic routing and policing.
Further development of the given model is possible under full account of stochastic characteristics of packet
flows circling in the network.
Multiflow Model For Routing And Policing Traffic In Infocommunication Network
www.ijeijournal.com Page | 59
REFERENSES
[1.] Vegesna, S. (2001). IP Quality of Service. Cisco Press, 368.
[2.] Álvarez, S. (2006). QoS for IP/MPLS networks. Cisco Press, 299.
[3.] Wang, Z. (2001). Internet QoS: Architectures and Mechanisms. Morgan Kaufmann, 239.
[4.] Pióro, M., Medhi, D. (2004). Routing, Flow, and Capacity Design in Communication and Computer Networks: Morgan
Kaufmann Kaufmann Series in Networking. Elsevier Digital Press, 765.
[5.] Medhi, D. (2007). Network routing: algorithms, protocols, and architectures / Deepankar Medhi, Karthikeyan Ramasamy.
Morgan Kaufmann Publishers, 788.
[6.] Osterloh, H. (2001). IP Routing. Primer Plus. Sams Publishing, 490.
[7.] Bertsekas, D.P., Gallager, R.G. (1992). Data Networks, 2nd edition. Prentice Hall. 556.
[8.] Lemeshko, A.V, Dobryshkin, Y.N, Drobot, O.A (2010). Results of traffic management models research with taking into account
the priorities defined for the multiproduct and multipolar cases [electronic resource]. Problemy telekomunikatsiy, 2 (2), 33-41. –
URL: http://pt.journal.kh.ua/2010/2/2/ 102_lemeshko_rezults.pdf.
[9.] Lemeshko, A.V, Dobryshkin, Y.N, Shcherbinin, S.A (2008). Model of traffic management analysis of areas of preventive limit
its intensity at the network edge. Modelyuvannya that іnformatsіynі tehnologії. Issue. 49, Kyiv, Institute for Modelling in Energy
National Academy of Sciences of Ukraine. 65-71.
[10.] Lemeshko, A.V, Gogoleva, M.A (2008). Thread-based model of multipath routing in a telecommunications network. Bulletin of
the State University of Information and Communication Technologies, 6 (2), 162-170.
[11.] Mizin, I.A, Bogatyrev, V.A, Kuleshov, A.P (1986). Packet switching network. Moscow, Radio and Communications, 408.
Author
Mohammed Khodayer Hassan
Ph.D: Computer Science from Iraq commission for computers & Information Institute for postgraduate studies,
Bagdad, Iraq.
Instructor at Al-Rafidain University College, Bagdad, Iraq
Hay Al Mustansuryah, Baghdad, Iraq
For information about the availability of printed works in national and international
Contact tel.: (+964) 770-277-1786
E-mail: aymenaldulaimi@yahoo.com

Mais conteúdo relacionado

Mais procurados

Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc NetworksIOSR Journals
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
 
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...IOSR Journals
 
QoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless NetworksQoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless Networksiosrjce
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...IJERA Editor
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmIJSRED
 
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSSTUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSijngnjournal
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
 
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkPacket Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkEswar Publications
 

Mais procurados (16)

Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
 
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
A Load Aware Proposal for Maximum Available Bandwidth Routing in Wireless Mes...
 
QoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless NetworksQoS Oriented Coding For Mobility Constraint in Wireless Networks
QoS Oriented Coding For Mobility Constraint in Wireless Networks
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networks
 
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated AlgorithmLoad balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
Load balancing In Wireless Mesh Networks Using liquid–Simulated Algorithm
 
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSSTUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITS
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkPacket Transfer Rate & Robust Throughput for Mobile Adhoc Network
Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network
 

Semelhante a Multiflow Model for Routing and Policing Traffic in Infocommunication Network

A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsCSCJournals
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsIJCNCJournal
 
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...IJCNCJournal
 
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...IJCNCJournal
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkcsandit
 
OVERBOOKING IN MOBILE BACKHAUL
OVERBOOKING IN MOBILE BACKHAULOVERBOOKING IN MOBILE BACKHAUL
OVERBOOKING IN MOBILE BACKHAULijwmn
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network iosrjce
 
Next Generation Internet Over Satellite
Next Generation Internet Over SatelliteNext Generation Internet Over Satellite
Next Generation Internet Over SatelliteReza Gh
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...Milad Kiaee
 
Optimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsOptimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsIRJET Journal
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
 
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...EM Legacy
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsIRJET Journal
 

Semelhante a Multiflow Model for Routing and Policing Traffic in Infocommunication Network (20)

A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
 
K010635566
K010635566K010635566
K010635566
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
Dynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV ParadigmsDynamic Shaping Method using SDN And NFV Paradigms
Dynamic Shaping Method using SDN And NFV Paradigms
 
RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006
 
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
WS-OLSR: MULTIPOINT RELAY SELECTION IN VANET NETWORKS USING A WINGSUIT FLYING...
 
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
WS-OLSR: Multipoint Relay Selection in VANET Networks using a Wingsuit Flying...
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
 
OVERBOOKING IN MOBILE BACKHAUL
OVERBOOKING IN MOBILE BACKHAULOVERBOOKING IN MOBILE BACKHAUL
OVERBOOKING IN MOBILE BACKHAUL
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
G010613135
G010613135G010613135
G010613135
 
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network
Litrature Survey of Traffic Analysis and Congestion Modeling In Mobile Network
 
Next Generation Internet Over Satellite
Next Generation Internet Over SatelliteNext Generation Internet Over Satellite
Next Generation Internet Over Satellite
 
D1102031727
D1102031727D1102031727
D1102031727
 
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
A-TWENTY-YEAR-TRACKING-OF-THE-TRAFFIC-SERVICE-QUALITY-IN-A-DOWNTOWN-NETWORK-T...
 
Ijcnc050215
Ijcnc050215Ijcnc050215
Ijcnc050215
 
Optimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsOptimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath Flows
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
 
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
 

Mais de International Journal of Engineering Inventions www.ijeijournal.com

Mais de International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

Último

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Último (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

Multiflow Model for Routing and Policing Traffic in Infocommunication Network

  • 1. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 12 (July 2014) PP: 56-59 www.ijeijournal.com Page | 56 Multiflow Model for Routing and Policing Traffic in Infocommunication Network Dr. Mohammed Khodayer Hassan Abstract: Thus the article offers the model represented by algebraic equations and inequalities for routing and policing traffic in infocommunication network. The novelty of the model is as follows: multiflow nature of modern ICN is taken into account (1), i.е. a set of flows circling between different pairs of network routers are considered simultaneously; coherent formalization of processes of traffic routing and policing within the model that has lower dimensionality in comparison to known earlier is provided; the choice of optimality criterion, use of which allows to implement multipath routing with consequent inclusion of paths as well as to organize limitation of flow intensity on all the used routs simultaneously depending on their characteristics and flow priority. According to the results of the analysis conducted we offer recommendations for choosing relation in numerical values of routing metrics and service denial regarding the provision of the given values for the main QoS characteristics, e.g. average packet delay. The model can be used as a basis for perspective protocol decisions aimed at coherence of solutions for the tasks of traffic routing and policing. Further development of the given model is possible under full account of stochastic characteristics of packet flows circling in the network. Keywords: Model; Routing, Traffic, Flow, Priority, Quality of Service, Network. I. Introduction Rapid progress in technologies of info communication networks (ICN) and increase of their performance is first of all connected with the development of fiber optic communications. Never the less the problem of overloading still remains an important task. Under high ICN overload provision of the given values of Quality of Service (QoS) characteristics is possible only at the account of policing (limiting) the traffic coming on edge network nodes [1]-[3]. Considering multiservice nature of modern ICN limitations of the intensity with service denials should be related more to low priority flows on the overloaded areas of network. Thus the process of traffic policing should be adaptive basing on the constant monitoring ICN states – load of communication links and routers, flow characteristics and QoS requirements. One of the important requirements is provision of maximal level of consistency between means of traffic policing and routing protocols. Despite a rather wide spectrum of currently applied network mechanisms and protocols consistent solution for local tasks of traffic control is not provided. The existing methods for traffic control that are responsible for its formation, distribution (routing) and limitation have distributive nature and base on the information of an average rate stated in SLA (Service-Level Agreement) and network topology [1]-[3]. In order to solve each task of control we should apply different means such as Traffic Shaping and Committed Access Rate for traffic formation, for routing tasks we use such protocols as IGRP (Interior Gateway Routing Protocol), OSPF (Open Shortest Path First), PNNI (Private Network – to – Network Interface) [4]-[6] etc. These means work consequently and in the best case they define initial data for each other while solving tasks of traffic control. Besides models for traffic control that are heuristic by their meaning such as shortest path search, token bucket and lucky bucket are not able to take into account changes in the current load of a network node and characteristics of traffics of other users; they are also not coherent. This in its turn decreases considerably the effectiveness of means of control and visibly restricts their application area in ICN. II. Problem statement Thus the reason of the low consistency level in solving tasks of traffic control is not only the problem of the technical implementation of the given requirement; it is more connected with complexity of formalization of these tasks within the single model. In this case the actual scientific and practical problem is the development of the complex model able to describe consistently the processes of routing and policing traffic in ICN that could be a basis of perspective protocols for traffic management. III. Model for traffic routing and policing in infocommunication network Currently we know several approaches within which attempts to develop such model were made. The most successful among them are [7]-[11]. In [7] a model of consistently solving tasks of traffic policing using implementation of precomputation routing is given. This model suggests that the problem of these paths
  • 2. Multiflow Model For Routing And Policing Traffic In Infocommunication Network www.ijeijournal.com Page | 57 computation is preliminary solved and it is necessary only to provide distribution of the flows coming into ICN along the given routs. In [8], [9] two-index model that does not require path precomputation is offered and investigated. This model is based on the model of flow-based routing, i.e. it considers flow structure of modern network traffic. Although a model in [8], [9] possesses rather high dimensionality [10] that has negative influence on perspectives of its computing and software implementation. That is why the given articles offers to use three-index model of flow-based routing in [10], [11] as a basic one. Let the structure of the network be described with oriented graph ),( EMG  , where M is a set of nodes (ICN routers) and E is a set of arcs (communication links). For each arc Eji ),( has its bandwidth ij . Besides, let K be a set of flows, circling in the network. Regarding multiflow nature of modern ICN as well as necessity of joint description of traffic routing and policing processes the condition of flow conservation on routers and in ICN in general obtains the next form:    sk Ms sk ji Mm ik jm k ji k ji xxr , , , ,,, )( 1 , (1) where ik jmx , , is intensity of the k -th flow of packets that must be sent from the m -th to the j -th node via the i - th node; k ji, is a portion of the k -th packet flow from the m -th node to the j -th node that was denied in service; k jir , is intensity of the k -th packet flow arriving to the i -th node from access networks (network users) for their further transmission to the j -th node; kM is a set of adjacent nodes for the i -th node from which they can receive packets; sM is a set of adjacent nodes for the i -th node to which it can send packets. Then the condition of loop absence in computing routs of packet delivery in the network can be written as [10], [11]  sk MM . (2) In its turn the condition of absence of ICN communication channel overload is as follows:   k j ik ik jmx , , ,  , Eim ),( . (3) Routing variables i jkx , and dropping variables ji, should be given several important restrictions as ji ik jm rx , , , 0 , (4) 10  k ji, . (5) Fulfillment of the condition (4) provides implementation of multipath routing strategy Introduction of the condition (5) allows to use adaptive flow limitation under possible overload of communication channels of the network in general. Computation of control variables ik jmx , , and k ji, should be made consistently providing minimization of available network (channel) resources usage. In this case it is necessary to present initial task as optimized with the following target function subjected to minimization:   k i j k ji k ji k ji k m j ik jm i i m fxfJ ,,, , ,  , (6) where ik jmf , , is routing metrics for the links given by the arc Eim ),( ; k jif , is metrics of service denials that depends directly on the priority of k -th flow. Such choice of target function was made due to the results of the investigation of models that were known earlier [8], [9]. The choice of linear form  k m j ik jm i i m xf , , guaranties realization of multipath routing with consequent inclusion of paths and usage of quadratic form  k i j k ji k ji k ji f ,,,  allows to organize limitation of flow intensity on all used routs simultaneously depending on their characteristics and priority of flow.
  • 3. Multiflow Model For Routing And Policing Traffic In Infocommunication Network www.ijeijournal.com Page | 58 In [8], [9] it is showed that denial metrics should be chosen by their numerical values that are bigger than routing metrics. Relation between metrics is largely determined by the structure of the network: the amount of communication channels, routers and their connectivity. As the results of conducted investigations have shown (fig. 1) by choosing the relation between metrics of routing and service denials ik jm k ji ffd , ,, , (7) it is possible to regulate maximal allowed average end-to-end delivery of packets in ICN for any flow. However when the value of d is getting higher, traffic proofing begins at the border of ICN under higher intensity of the flow k jir, , i.e. the higher is d , the lower will be the amount of denials. While obtaining the analysis of the results in order to make the example more vivid we adopted hypothesis that the work of routing interface was simulated by the queuing systems M/M/1. 100 120 140 160 180 200 220 240 260 280 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 rate, packet/sec averagedelay,sec d=3 d=4 d=5 Fig. 1. The results of the analysis for the influence of relation between metrics of routing and service denial on the nature of decisions connected with traffic routing and policing By the same way it is possible to control other QoS characteristics, e.g. jitter and probability of packet loss. Besides numerical value of the parameter d (7) for each flow can be specified in the course of infocommunication network functioning according to the changes of QoS requirements. IV. Conclusions Thus the article offers the model represented by algebraic equations and inequalities (1)-(6) for routing and policing traffic in infocommunication network. The novelty of the model is as follows: 1. Multiflow nature of modern ICN is taken into account (1), i.е. a set of flows circling between different pairs of network routers are considered simultaneously; 2. Coherent formalization of processes of traffic routing and policing within the model that has lower dimensionality in comparison to known earlier is provided; 3. The choice of optimality criterion (6), use of which allows to implement multipath routing with consequent inclusion of paths as well as to organize limitation of flow intensity on all the used routs simultaneously depending on their characteristics and flow priority. According to the results of the analysis conducted we offer recommendations for choosing relation in numerical values of routing metrics ( ik jmf , , ) and service denial ( k jif , ) regarding the provision of the given values for the main QoS characteristics, e.g. average packet delay. The model (1)-(6) can be used as a basis for perspective protocol decisions aimed at coherence of solutions for the tasks of traffic routing and policing. Further development of the given model is possible under full account of stochastic characteristics of packet flows circling in the network.
  • 4. Multiflow Model For Routing And Policing Traffic In Infocommunication Network www.ijeijournal.com Page | 59 REFERENSES [1.] Vegesna, S. (2001). IP Quality of Service. Cisco Press, 368. [2.] Álvarez, S. (2006). QoS for IP/MPLS networks. Cisco Press, 299. [3.] Wang, Z. (2001). Internet QoS: Architectures and Mechanisms. Morgan Kaufmann, 239. [4.] Pióro, M., Medhi, D. (2004). Routing, Flow, and Capacity Design in Communication and Computer Networks: Morgan Kaufmann Kaufmann Series in Networking. Elsevier Digital Press, 765. [5.] Medhi, D. (2007). Network routing: algorithms, protocols, and architectures / Deepankar Medhi, Karthikeyan Ramasamy. Morgan Kaufmann Publishers, 788. [6.] Osterloh, H. (2001). IP Routing. Primer Plus. Sams Publishing, 490. [7.] Bertsekas, D.P., Gallager, R.G. (1992). Data Networks, 2nd edition. Prentice Hall. 556. [8.] Lemeshko, A.V, Dobryshkin, Y.N, Drobot, O.A (2010). Results of traffic management models research with taking into account the priorities defined for the multiproduct and multipolar cases [electronic resource]. Problemy telekomunikatsiy, 2 (2), 33-41. – URL: http://pt.journal.kh.ua/2010/2/2/ 102_lemeshko_rezults.pdf. [9.] Lemeshko, A.V, Dobryshkin, Y.N, Shcherbinin, S.A (2008). Model of traffic management analysis of areas of preventive limit its intensity at the network edge. Modelyuvannya that іnformatsіynі tehnologії. Issue. 49, Kyiv, Institute for Modelling in Energy National Academy of Sciences of Ukraine. 65-71. [10.] Lemeshko, A.V, Gogoleva, M.A (2008). Thread-based model of multipath routing in a telecommunications network. Bulletin of the State University of Information and Communication Technologies, 6 (2), 162-170. [11.] Mizin, I.A, Bogatyrev, V.A, Kuleshov, A.P (1986). Packet switching network. Moscow, Radio and Communications, 408. Author Mohammed Khodayer Hassan Ph.D: Computer Science from Iraq commission for computers & Information Institute for postgraduate studies, Bagdad, Iraq. Instructor at Al-Rafidain University College, Bagdad, Iraq Hay Al Mustansuryah, Baghdad, Iraq For information about the availability of printed works in national and international Contact tel.: (+964) 770-277-1786 E-mail: aymenaldulaimi@yahoo.com