By Topic

High Performance Switching and Routing, 2001 IEEE Workshop on

Date 29-31 May 2001

Filter Results

Displaying Results 1 - 25 of 81
  • 2001 IEEE Workshop on High Performance Switching and Routing (IEEE Cat. No.01TH8552)

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (573 KB)
    Freely Available from IEEE
  • Index

    Publication Year: 2001, Page(s):415 - 416
    Request permission for commercial reuse | PDF file iconPDF (304 KB)
    Freely Available from IEEE
  • Performance of all-optical shared memory architecture packet switch networks using channel grouping under bursty traffic

    Publication Year: 2001, Page(s):208 - 212
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1972 KB) | HTML iconHTML

    This work develops an exact logical operation model to predict the performance of the all-optical shared memory architecture (OSMA) class of packet switches, under random or bursty traffic. The model also provides a means to obtain a reasonable approximation of OSMA switch element performance within certain types of networks, including the Banyan family View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Upper-bound for blocking probabilities of a class of optical MINs under crosstalk-free constraint

    Publication Year: 2001, Page(s):203 - 207
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB) | HTML iconHTML

    Available results indicate that under the crosstalk-free constraint, the hardware cost will be high for a strictly nonblocking optical multistage interconnection network (MIN) based on a vertical stacking scheme. In this paper, the blocking behaviors of this class of optical MINs are studied from the probabilistic view, and an upper bound probabilistic model is developed to describe the blocking b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CIXB-1: combined input-one-cell-crosspoint buffered switch

    Publication Year: 2001, Page(s):324 - 329
    Cited by:  Papers (125)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    Buffered crossbars have been considered as an alternative for non-buffered crossbars to improve switching throughput. The drawback of a buffered crossbar is the memory amount that is proportional to the square of the number of ports (O(N2)). This is not the main limitation when the buffer size is kept to a minimum size such that implementation is feasible. For a small buffer size, the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multifractal study of Internet traffic

    Publication Year: 2001, Page(s):197 - 201
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    The self-similar/multifractal nature of Internet traffic has been observed by several measurements and statistical studies. It has not been decided yet whether the traces are following either self-similar or multifractal flows. In this paper we analyzed Internet data traffic, both the classical Bellcore-data and data measured at our MAN by a local protocol analyzer. A new multifractal stochastic m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Administrative weight allocation for PNNI routing algorithms

    Publication Year: 2001, Page(s):347 - 352
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    The paper addresses the issue of assigning administrative weights used by routing algorithms in private network-network interface (PNNI) networks. We consider two versions of the problem: with and without the knowledge of the traffic matrix. For both versions, we propose methods capable of improving the routing performance of PNNI routing algorithms. Depending on the network and traffic patterns, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On scheduling using parallel input-output queued crossbar switches with no speedup

    Publication Year: 2001, Page(s):317 - 323
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2892 KB) | HTML iconHTML

    We propose an efficient parallel switching architecture (PSA) that requires no speedup and guarantees bounded delay. Our architecture consists of κ crossbar switches operating in parallel under the control of a single scheduler, with κ being independent of N the number of inputs and outputs of the PSA. Arriving traffic is demultiplexed (spread) over the κ identical crossbar switc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pricing for the multi-service networks

    Publication Year: 2001, Page(s):103 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB) | HTML iconHTML

    Congestion control is one of the key issues to be addressed for the emerging multi-service networks. However, without an appropriate mechanism to encourage end users to use the network properly, over-utilization and congestion are unavoidable. It has been widely accepted that pricing is a proper tool to manage congestion. However, how to charge for the traffic and at what price is still under stud... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of the TCP/UDP fairness issue for the assured forwarding per hop behavior in differentiated services networks

    Publication Year: 2001, Page(s):190 - 196
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    The IETF Differentiated Services Working Group has standardized the assured forwarding (AF) per hop behavior (PHB). Studies of the AF PHB showed that there are a number of factors that affect fair bandwidth distribution for traffic flows with equal target rates. These factors cause unfair distribution of excess bandwidth in an over provisioned network as well as unfair degradation in an under prov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differentiated fairness: service model and implementation

    Publication Year: 2001, Page(s):260 - 264
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB) | HTML iconHTML

    Real-time traffic in the Internet is growing and the best-effort model has not been designed for such challenging streams. The DiffServ (DS) architecture, which permits one to aggregate traffic flows into classes with a common forwarding requirement, is a quality of service (QoS) solution for IP networks. But most of the DS models provide classes getting better performance than others, calling for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved PIM-SM tree recovery algorithm

    Publication Year: 2001, Page(s):342 - 346
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Multicast tree recovery in protocol independent multicast-sparse mode (PIM-SM) networks is initiated by state changes in the underlying unicast routing protocol. A substantial part of the subsequent data loss can be attributed to the non-reductive events, e.g. link addition. We propose and evaluate an improvement to the standard PIM-SM recovery procedure, showing that the data loss can be signific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture and performance of a multi-Tbps protocol independent switching fabric

    Publication Year: 2001, Page(s):363 - 367
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB) | HTML iconHTML

    We describe a scalable multi-Tbps protocol independent switching fabric architecture. This architecture is cost effective for building switches supporting wirespeed switching up to 1024 ports with capacity ranging from 10's of Gbps to 10's of Tbps and QoS traffic classes. The scalability has been achieved via self-routing of cells with the routing queue number scheme coupled with an efficient back... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A high-speed router featuring minimal delay variation

    Publication Year: 2001, Page(s):312 - 316
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1720 KB) | HTML iconHTML

    This paper describes a technique for implementing the switch fabric of a high-speed router (with a throughput in excess of 600 Gb/s based on the current slate of the art), with the following properties. Delay performance is virtually identical to that of a standard output-buffered switch, and the switch fabric preserves the packet sequence, so that no resequencing is required for segmented packets... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TSFD: two stage frame dropping for scalable video transmission over data networks

    Publication Year: 2001, Page(s):43 - 47
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Scalable video transmission is used to adjust the rate of video depending on the level of network congestion. Previous studies on scalable video transmission of MPEG over ATM ABR service required major changes in the network protocols and did not provide methods to determine the ABR connection parameters. We propose a new scalable video transmission scheme which does not require major changes in n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing algorithms evaluation for elastic traffic

    Publication Year: 2001, Page(s):297 - 301
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    An innovative simulation technique for the performance of routing algorithms in presence of elastic traffic is proposed in this paper. Traditional simulation tools for the evaluation of routing strategies are based on the generation of calls whose length is determined when the connection enters the network. But the real duration of connections in the Internet depends on the amount of information t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A processor based high-speed longest prefix match search engine

    Publication Year: 2001, Page(s):233 - 239
    Cited by:  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    This paper describes a new IP forwarding table search method that can be implemented on a general-purpose processor with a high-speed cache memory. It uses an efficient small data structure to store an IP forwarding table in the cache memory by exploiting a characteristic of the IP address prefixes of forwarding tables in the Internet backbone. At the particular level of the prefix-tree, the numbe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of wavelength-convertible optical switches for the all-optical next-generation Internet

    Publication Year: 2001, Page(s):97 - 101
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    The implementation of wavelength converters in the optical crossconnect (OXC) is a key step towards the all-optical networks. Optical switches are the building blocks of OXC with the functions of wavelength routing, reconfigurability, network protection and restoration. Wavelength converters are used to effectively alleviate the blocking probability and help to resolve contention at the output por... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel protection in WDM mesh networks

    Publication Year: 2001, Page(s):26 - 30
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    With the increased transmission capacity in WDM networks a single failure in the network (like a fiber cut or equipment failure) may result in enormous data loss. Therefore, resilience from a component or optical link failure is essential to provide uninterrupted communication between any two nodes in the network. Several techniques exist to provide reliable services in the occurrence of failures.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable configuration of RED queue parameters

    Publication Year: 2001, Page(s):185 - 189
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Active queue management policies and in particular random early drop (RED) are being pushed as additional mechanisms in Internet routers to control congestion and keep network utilization high. RED's performance is highly dependent on the settings of its control parameters. However, no firm guidelines exist on configuring RED parameters and the current suggestions fail to provide the desired perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling high-speed shared-memory switch fabric buffers

    Publication Year: 2001, Page(s):281 - 286
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    A novel approach is presented for expanding the buffer size in a shared memory switch. Utilizing this two-tier buffering mechanism we present a two-level scheduling algorithm whose complexity is considerably lower than that of purely input scheduling algorithms. Furthermore, this approach easily provides differentiated qualities of service to different traffic classes while maintaining high throug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A platform-independent API for quality of service management

    Publication Year: 2001, Page(s):255 - 259
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    The differentiated services approach to QoS in the Internet poses new challenges on the configuration and service provisioning side. The approach relies on an entity often referred to as a bandwidth broker. It configures the network elements so that guaranteed networking services are provided to customers. However, the DiffServ capable routers have a large variety of hardware configurations and di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theoretical network load limit when self-similarity has no adverse effect on the network

    Publication Year: 2001, Page(s):135 - 139
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    It is well-known that the multimedia traffic is statistically self-similar, with fractal-like behavior, that is, network traffic exhibits scale-invariance at a wide range of scales. Such scale-invariance is different from traditional models of network traffic. It is also well-known that self-similarity degrades the network performance by requiring large queueing buffers, causing delay and packet d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithm for traffic grooming in optical networks to minimize the number of transceivers

    Publication Year: 2001, Page(s):218 - 221
    Cited by:  Papers (60)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB) | HTML iconHTML

    We study the problem of traffic grooming to reduce the number of transceivers in optical networks. We show that this problem is equivalent to a certain traffic maximization problem. We give an intuitive interpretation of this equivalence and use this interpretation to derive a greedy algorithm for transceiver minimization. We discuss implementation issues and present computational results comparin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing PRouST: the PNNI routing and simulation toolkit

    Publication Year: 2001, Page(s):335 - 341
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    Despite the increased availability of affordable ATM hardware, the scientific research community has often found it difficult to engage in much needed basic research in the areas of ATM protocol design and network performance optimization. We believe that one major cause for this has been the absence of affordable, publicly available source-level implementations of the ATM switch protocol stack. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.