I. Research Question and Problem Setting
The Border Gateway Protocol (BGP) is responsible for communication between different Autonomous Systems (AS). The Internet is comprised of a large number of Autonomous Systems (AS) and exchanging routing information between two or more AS is achieved using BGP. Inter-domain routing in the Internet is carried out majorly by one protocol – Border Gateway Protocol (BGP). BGP is a distance-vector protocol and uses TCP as its underlying mechanism.
BGP peers are the routers running BGP that exchange routing information directly with each other. Two BGP peers communicate with each other via a BGP session. It is important for the BGP sessions to be reliable and scalable to provide high-quality Internet data communication. At present, the Internet lacks a differentiation mechanism in packet forwarding making BGP sessions sensitive to network congestion. Thus, it is important to understand the reliability of BGP in congested networks, for the purposes of evaluating system stability and avoiding system failure [1].
BGP forwards packets based on its best path. The current BGP routing table does not include an alternate path in it. If there is only one best path, and if that best path becomes congested, current BGPv4 still forwards packets using that best path. This does not improve the congestion scenario along the best path. It not only leads to the packets being dropped and re-sent again and again, it also leads to a large amount of delay which eventually affects the customer. To avoid delays and congestion on BGP paths, alternate paths are fed into the routing table for each destination.
Also, it does not have an inherent mechanism to avoid or detect traffic congested areas. This causes large d...
... middle of paper ...
...anies, who base their business on inbound traffic, will be interviewed. This will give a detailed description of the industry standpoint on the possible integration of this new concept in BGP.
Works Cited
Sahoo, A., (2002). An OSPF based load sensitive QoS routing algorithm using alternate paths. IEEE International Conference on Computer Communication Networks. pp.236- 241. DOI: 10.1109/ICCCN.2002.1043072
Shieh, Y.-P. & Hsu, W.-H. (2011). Simple path diversity algorithm for interdomain routing. IET Communications. 5 (16), pp.2310-2316. DOI: 10.1049/iet-com.2011.0050
Wang, F., Gao, L., (2009). Path Diversity Aware Interdomain Routing. IEEE INFOCOM. pp.307 - 315. DOI: 10.1109/INFCOM.2009.5061934
Wang, Y., Wang, Z., (1999). Explicit routing algorithms for internet traffic engineering. Computer Communications and Networks. pp.582 – 588. DOI: 10.1109/ICCCN.1999.805577
The routing protocols for UWSNs can be categorized into two classes according to the preconditions they assume:
Lab 1 demonstrates the capabilities of congestion control algorithms implemented by Transmission Control Protocol (TCP). It provides three scenarios to simulate these algorithms and will later compare the results.
In this lab, we used Transmission Control Protocol (TCP) which is a connection oriented protocol, to demonstrate congestion control algorithms. As the name itself describes, these algorithms are used to avoid network congestion. The algorithms were implemented in three different scenarios i.e. No Drop Scenario, Drop_Fast Scenario and Drop_NoFast Scenario.
Imagine that your car could detect hazardous roads before you could sense it? A feature that provides this type of protective driving exists within European cars. This valuable safety feature that is offered in European cars i...
At any moment, there are nearly 700,000 people multi-tasking while driving, a danger to everyone on the
Murdoch, Steven J., and George Danezis. Low-cost traffic analysis of Tor. Security and Privacy, 2005
Johnson, D., Maltz, D. (1996). Dynamic Source Routing in Ad-hoc Wireless network. Print ISBN: 0 79239697 0
Netflix consumes about 29.7% of peak downstream traffic because of its online video streaming service. (Adhikari, et al., 2012). The network architecture of Netflix should be well organized to support the features of high availability and scalability. Netflix previously had its own data center to host the services and functions required for efficient video streaming availability to its customers. Currently, Netflix has adopted cloud techn...
Cianfrani, A., Eramo, V., Listanti, M., Polverini, M., & Vasilakos, A.V. (2012). An OSPF-integrated routing strategy for Qos-aware energy saving in IP backbone networks. IEEE Transactions on Network & Service Management, 9(3), 254. doi: 10.1109/TNSM.2012.031512.110165
Nissan Motor Corporation is the automaker that seems to be the leader in safety technology. They implemented many features such as intelligent cruise control and advanced rear-view backup cameras to their vehicles. “The low-speed following mode operates at speeds under about 40 km/h to maintain an appropriate following distance in congested traffic, thereby helping reduce the driver’s workload” (Nissan 7). A teenager may get stressed out when trying to drive in high-traffic situations. Nissan is helping them by using an intelligent cruise control that will slow down and speed up traffic while staying a distance away from the driver in front of them.
Sending data through the internet efficiently has always posed many problems. The two major technologies used, Ethernet and Asynchronous Transfer Mode (ATM), have done an admirable job of porting data, voice and video from one point to another. However, they both fall short in differing areas; neither has been able to present the "complete" package to become the single, dominant player in the internet market. They both have dominant areas they cover. Ethernet has dominated the LAN side, while ATM covers the WAN (backbone). This paper will compare the two technologies and determine which has a hand-up in the data trafficking world.
4. A. Crespo and H. Garcia-Molina. Routing indices for peer-to-peer systems. In Proc. of the 28th International Conference on Distributed Computing Systems, July 2002.
The TCP/IP is the most important internet operation protocol in the world. While IP protocol performs the mass of the functions which is needed for the internet to work. It does not have many capabilities which are essential and needed by applications. In TCP/IP model these tasks are performed by a pair of protocols that operate at the transport layer. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). These two protocols are vital when it comes to delivering and managing the communication of numerous applications. To pass on data streams to the proper applications the Transport layer must identify the target application. First, to be able to attain this, Transport layer assigns an application an identifier. In the TCP/IP model call this identifier a port number. Every individual software process needing to access the network is assigned a un...
Before any type of traffic lights were invented, car circulation would be unquestionably crazy. Car accidents would often happen; pedestrians and car drivers would die. City d...
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...