I. Research Question and Problem Setting
The Border Gateway Protocol (BGP) is responsible for communication between different Autonomous Systems (AS). The Internet is comprised of a large number of Autonomous Systems (AS) and exchanging routing information between two or more AS is achieved using BGP. Inter-domain routing in the Internet is carried out majorly by one protocol – Border Gateway Protocol (BGP). BGP is a distance-vector protocol and uses TCP as its underlying mechanism.
BGP peers are the routers running BGP that exchange routing information directly with each other. Two BGP peers communicate with each other via a BGP session. It is important for the BGP sessions to be reliable and scalable to provide high-quality Internet data communication. At present, the Internet lacks a differentiation mechanism in packet forwarding making BGP sessions sensitive to network congestion. Thus, it is important to understand the reliability of BGP in congested networks, for the purposes of evaluating system stability and avoiding system failure [1].
BGP forwards packets based on its best path. The current BGP routing table does not include an alternate path in it. If there is only one best path, and if that best path becomes congested, current BGPv4 still forwards packets using that best path. This does not improve the congestion scenario along the best path. It not only leads to the packets being dropped and re-sent again and again, it also leads to a large amount of delay which eventually affects the customer. To avoid delays and congestion on BGP paths, alternate paths are fed into the routing table for each destination.
Also, it does not have an inherent mechanism to avoid or detect traffic congested areas. This causes large d...
... middle of paper ...
...anies, who base their business on inbound traffic, will be interviewed. This will give a detailed description of the industry standpoint on the possible integration of this new concept in BGP.
Works Cited
Sahoo, A., (2002). An OSPF based load sensitive QoS routing algorithm using alternate paths. IEEE International Conference on Computer Communication Networks. pp.236- 241. DOI: 10.1109/ICCCN.2002.1043072
Shieh, Y.-P. & Hsu, W.-H. (2011). Simple path diversity algorithm for interdomain routing. IET Communications. 5 (16), pp.2310-2316. DOI: 10.1049/iet-com.2011.0050
Wang, F., Gao, L., (2009). Path Diversity Aware Interdomain Routing. IEEE INFOCOM. pp.307 - 315. DOI: 10.1109/INFCOM.2009.5061934
Wang, Y., Wang, Z., (1999). Explicit routing algorithms for internet traffic engineering. Computer Communications and Networks. pp.582 – 588. DOI: 10.1109/ICCCN.1999.805577
The routing protocols for UWSNs can be categorized into two classes according to the preconditions they assume:
Lab 1 demonstrates the capabilities of congestion control algorithms implemented by Transmission Control Protocol (TCP). It provides three scenarios to simulate these algorithms and will later compare the results.
In this lab, we used Transmission Control Protocol (TCP) which is a connection oriented protocol, to demonstrate congestion control algorithms. As the name itself describes, these algorithms are used to avoid network congestion. The algorithms were implemented in three different scenarios i.e. No Drop Scenario, Drop_Fast Scenario and Drop_NoFast Scenario.
Imagine that your car could detect hazardous roads before you could sense it? A feature that provides this type of protective driving exists within European cars. This valuable safety feature that is offered in European cars i...
Sending data through the internet efficiently has always posed many problems. The two major technologies used, Ethernet and Asynchronous Transfer Mode (ATM), have done an admirable job of porting data, voice and video from one point to another. However, they both fall short in differing areas; neither has been able to present the "complete" package to become the single, dominant player in the internet market. They both have dominant areas they cover. Ethernet has dominated the LAN side, while ATM covers the WAN (backbone). This paper will compare the two technologies and determine which has a hand-up in the data trafficking world.
Murdoch, Steven J., and George Danezis. Low-cost traffic analysis of Tor. Security and Privacy, 2005
Johnson, D., Maltz, D. (1996). Dynamic Source Routing in Ad-hoc Wireless network. Print ISBN: 0 79239697 0
Netflix consumes about 29.7% of peak downstream traffic because of its online video streaming service. (Adhikari, et al., 2012). The network architecture of Netflix should be well organized to support the features of high availability and scalability. Netflix previously had its own data center to host the services and functions required for efficient video streaming availability to its customers. Currently, Netflix has adopted cloud techn...
At any moment, there are nearly 700,000 people multi-tasking while driving, a danger to everyone on the
Open Shortest Path First (OSPF) is a link-state routing protocol which uses link state routing algorithm for Internet Protocol (IP) networks.Using OSPF, th convergence of a network can be done in very few seconds, loop-free paths can be guaranteed and better load-sharing on external links can be achievd. Every change in the topology of the network is identified within seconds using OSPF and it instantaneously computes the “shortest path tree” for every route using “Dijkstra's algorithm” . For that reason, OSPF requires a router which have a more powerful processor and more memory than any other routing protocols which leads to more elect...
Nissan Motor Corporation is the automaker that seems to be the leader in safety technology. They implemented many features such as intelligent cruise control and advanced rear-view backup cameras to their vehicles. “The low-speed following mode operates at speeds under about 40 km/h to maintain an appropriate following distance in congested traffic, thereby helping reduce the driver’s workload” (Nissan 7). A teenager may get stressed out when trying to drive in high-traffic situations. Nissan is helping them by using an intelligent cruise control that will slow down and speed up traffic while staying a distance away from the driver in front of them.
Before any type of traffic lights were invented, car circulation would be unquestionably crazy. Car accidents would often happen; pedestrians and car drivers would die. City d...
4. A. Crespo and H. Garcia-Molina. Routing indices for peer-to-peer systems. In Proc. of the 28th International Conference on Distributed Computing Systems, July 2002.
TCP/IP is a network model which enables the communication across the Internet. The most fundamental protocol on which the Internet is built. This is made up of the 2 common networking protocols, TCP, for Transmission Control Protocol, and IP, for Internet Protocol. TCP maintains and handles packet flow linking the systems and IP protocol has the ability to handle the routing of packets. However The TCP/IP stack consists of 5 layers first being application layer, the transport layer, then the network layer, the link layer and finally the physical layer. The assignment focuses on the three middle layers and is divided into five parts. Firstly explaining how the TCP and UDP the most vital protocols needed to deliver and communicate.
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...