scispace - formally typeset
Search or ask a question

Showing papers on "Dynamic Source Routing published in 1989"


Patent
16 Jun 1989
TL;DR: In this paper, a message routing system couples a transmitter at any one system input to a receiver at any other system output using a message format that is structure independent of the location of the receiver in the system.
Abstract: A plurality of disparate communication network systems communicate with each other through the use of different physical media protocols. Each of the systems has at least one input and one output. A message routing system couples a transmitter at any one system input to a receiver at any other system output using a message format that is structure independent of the location of the receiver in the system. Each receiver/transmitter device coupled to any one system input has a unique, fixed and unchangeable identification code regardless of the communication network system to which it is connected. To couple a message from any one receiver/transmitter device to a second receiver/transmitter device at an unknown location within the communication network system, a message format is transmitted from the sending location containing the fixed, unique identification code of the receiving station. A routing system having a plurality of intermediate routing devices receives the message format and couples it to the receiving station at the unknown location using only the fixed, unique identification codes of the transmitting and receiving stations and the addresses of the intermediate routing devices for determining routing.

284 citations


Proceedings ArticleDOI
01 Aug 1989
TL;DR: A distributed algorithm that provides loop-free paths at every instant and extends or improves algorithms introduced previously by Chandy and Misra, Jaffe and Moss, Merlin and Segall, and the author is described.
Abstract: We present a unified approach for the dynamic computation of shortest paths in a computer network using either distance vectors or link states. We describe a distributed algorithm that provides loop-free paths at every instant and extends or improves algorithms introduced previously by Chandy and Misra, Jaffe and Moss, Merlin and Segall, and the author. Our approach treats the problem of distributed shortest-path routing as one of diffusing computations, which was first proposed by Dijkstra and Scholten. We verify the loop-freedom of the new algorithm, and also demonstrate that it converges to the correct routing entries a finite time after an arbitrary sequence of topological changes. We analyze the complexity of the new algorithm when distance vectors and link states are used, and show that using distance vectors is better insofar as routing overhead is concerned.

227 citations


Proceedings ArticleDOI
01 Aug 1989
TL;DR: A protocol that maintains the shortest-path routes in a dynamic topology, that is, in an environment where links and nodes can fail and recover at arbitrary times, and avoids the bouncing effect and the looping problem that occur in the previous approaches of the distributed implementation of Bellman-Ford algorithm.
Abstract: Distributed algorithms for shortest-path problems are important in the context of routing in computer communication networks. We present a protocol that maintains the shortest-path routes in a dynamic topology, that is, in an environment where links and nodes can fail and recover at arbitrary times. The novelty of this protocol is that it avoids the bouncing effect and the looping problem that occur in the previous approaches of the distributed implementation of Bellman-Ford algorithm. The bouncing effect refers to the very long duration for convergence when failures happen or weights increase, and the nonterminating exchanges of messages, or counting-to-infinity behavior, in disconnected components of the network resulting from failures. The looping problems cause data packets to circulate and, thus, waste bandwidth. These undesirable effects are avoided without any increase in the overall message complexity of previous approaches required in the connected part of the network. The time complexity is better than the distributed Bellman-Ford algorithm encountering failures. The key idea in the implementation is to maintain only loop-free paths, and search for the shortest path only from this set.

226 citations


Proceedings ArticleDOI
Nicholas F. Maxemchuk1
23 Apr 1989
TL;DR: The Manhattan Street Network (MS-Net) and Shuffle-exchange network (SX-net) as discussed by the authors are two-connected networks with significantly different topologies, and both of these networks are suitable for deflection routing.
Abstract: The Manhattan Street Network (MS-Net) and Shuffle-Exchange Network (SX-Net) are two-connected networks with significantly different topologies. Fixed-size packets are transmitted between nodes in these networks. The nodes are synchronized so that all of the packets that are received by a node within a slot transmission time arrive at a switching point simultaneously. Instead of storing large numbers of packets at intermediate nodes, a deflection strategy similar to hot-potato routing is used. There are characteristics of the MS-Net that make it well suited for deflection routing. With no buffer, 55-70% of the throughput with an infinite number of buffers has been obtained; with a single buffer per node, the throughput increases to 80-90%. With uniform load the throughput does not decrease significantly as the network utilization increases. Therefore, additional flow control mechanisms are not required to achieve the highest network throughput. The SX-Net does not have the above characteristics of the MS-Net. However, deflection routing still provides a significant portion of the available throughput. In the SX-Net, more buffers are required than in the MS-Net, and a flow control mechanism must be used to achieve the greatest throughput. >

183 citations


Proceedings ArticleDOI
01 Feb 1989
TL;DR: This paper presents a family of adaptive routing schemes for general networks with applicability to networks with arbitrary edge costs, name-independence, i.e., usage of original names, and an efficient on-line distributed preprocessing.
Abstract: In designing a routing scheme for a communication network it is desirable to use as short as possible paths for routing messages, while keeping the routing information stored in the processors' local memory as succinct as possible. The efficiency of a routing scheme is measured in terms of its stretch factor - the maximum ratio between the cost of a route computed by the scheme and that of a cheapest path connecting the same pair of vertices.This paper presents a family of adaptive routing schemes for general networks. The hierarchical schemes H Sk (for every fixed k ≥ 1) guarantee a stretch factor of O (k2 · 3k) and require storing at most O (knk log n) bits of routing information per vertex. The new important features, that make the schemes appropriate for adaptive use, are applicability to networks with arbitrary edge costs;name-independence, i.e., usage of original names;a balanced distribution of the memory;an efficient on-line distributed preprocessing.

119 citations


Proceedings ArticleDOI
01 Mar 1989

114 citations


Proceedings ArticleDOI
01 Apr 1989
TL;DR: This paper proposes a solution to deadlock free, adaptive, high throughput packet routing to be implemented on networks of processors, which serves as a basis for a very low latency routing strategy named the mad postman.
Abstract: In order to provide an arbitrary and fully dynamic connectivity in a network of processors, transport mechanisms must be implemented, which provide the propagation of data from processor to processor, based on addresses contained within a packet of data. Such data transport mechanisms must satisfy a number of requirements - deadlock and livelock freedom, good hot-spot performance, high throughput and low latency. This paper proposes a solution to these problems, which allows deadlock free, adaptive, high throughput packet routing to be implemented on networks of processors. Examples are given which illustrate the technique for 2-D array and toroidal networks. An implementation of this scheme on arrays of transputers is described. The scheme also serves as a basis for a very low latency routing strategy named the mad postman, a detailed implementation of which is described here as well.

112 citations


Proceedings ArticleDOI
30 Oct 1989
TL;DR: The multibutterfly is shown to be an excellent candidate for a high-bandwidth, low-diameter switching network underlying a distributed-memory machine.
Abstract: Simple deterministic O(log N)-step algorithms for routing packets on a multibutterfly are described. The algorithms are shown to be robust against faults, even in the worst case, and to be efficient from a practical point of view. As a consequence, the multibutterfly is shown to be an excellent candidate for a high-bandwidth, low-diameter switching network underlying a distributed-memory machine. >

105 citations


Journal ArticleDOI
TL;DR: An adaptive hierarchical routing protocol based on the extension of the new Arpanet scheme is proposed and its simulated performance is presented and the tradeoff between two conflicting performance criteria, response speed and communication overhead, is shown.
Abstract: An adaptive hierarchical routing protocol based on the extension of the new Arpanet scheme is proposed and its simulated performance is presented. The protocol can adapt to rapidly changing environments and works for arbitrarily large networks. A number of existing schemes as well as the proposed scheme are simulated under many different environments and clustering structures. The proposed protocol is found to be superior to the other protocols tested in many different types of network traffic and topological configurations. The results indicate that intercluster links must be reliable, because (1) the failure of these links can significantly degrade the routing performance, even though the protocol does not degrade as badly as the existing scheme and (2) hierarchical routing protocols usually prefer small clusters, which means that there will be many intercluster links. The tradeoff between two conflicting performance criteria, response speed and communication overhead, is shown. >

88 citations


Proceedings ArticleDOI
01 Aug 1989
TL;DR: Sirpent™ (Source Internetwork Routing Protocol with Extended Network Transfer) is described, a new approach to an internetwork architecture that makes source routing the basis for interconnection, rather than an option as in IP.
Abstract: A clear target for computer communication technology is to support a high-performance global internetwork. Current internetworking approaches use either concatenated virtual circuits, as in X.75, or a “universal” internetwork datagram, as in the DoD Internet IP protocol and the ISO connectionless network protocol (CLNP). Both approaches have significant disadvantages.This paper describes Sirpent™ (Source Internetwork Routing Protocol with Extended Network Transfer)1, a new approach to an internetwork architecture that makes source routing the basis for interconnection, rather than an option as in IP. Its benefits include simple switching with low per-packet processing and delay, support for accounting and congestion control, and scalability to a global internetwork. It also supports flexible, user-controlled routing such as required for security, policy-based routing and realtime applications. We also propose a specific internetwork protocol, called VIPER™2, as a realization of the Sirpent approach.

85 citations


Journal ArticleDOI
TL;DR: The authors prove the optimality of the Z/sup 2/ (zigzag) routing policy with respect to two criteria: maximizing the probability of reaching the destination from a given source without delays at intermediate nodes and minimizing the expected lifetime of a message.
Abstract: A probabilistic routing policy, the Z/sup 2/ (zigzag) routing policy, is presented within the class of nonadaptive, shortest-path routing policies for regular mesh-connected topologies such as n-dimensional toroids and hypercubes. The focus of the research is routing in networks of computers in a distributed computing environment, where constituent subcomputers are organized in a mesh-connected topology and communication among individual computers takes places by some form of message exchange. The authors prove the optimality of this policy with respect to two criteria: (1) maximizing the probability of reaching the destination from a given source without delays at intermediate nodes; and (2) minimizing the expected lifetime of a message. >

Journal Article
TL;DR: In this paper, the authors present a family of adaptive routing schemes for general networks, which guarantee a stretch factor of O (k 2 · 3k) and require storing at most O (knk log n) bits of routing information per vertex.
Abstract: In designing a routing scheme for a communication network it is desirable to use as short as possible paths for routing messages, while keeping the routing information stored in the processors' local memory as succinct as possible. The efficiency of a routing scheme is measured in terms of its stretch factor - the maximum ratio between the cost of a route computed by the scheme and that of a cheapest path connecting the same pair of vertices.This paper presents a family of adaptive routing schemes for general networks. The hierarchical schemes H Sk (for every fixed k ≥ 1) guarantee a stretch factor of O (k2 · 3k) and require storing at most O (knk log n) bits of routing information per vertex. The new important features, that make the schemes appropriate for adaptive use, are applicability to networks with arbitrary edge costs;name-independence, i.e., usage of original names;a balanced distribution of the memory;an efficient on-line distributed preprocessing.

Journal ArticleDOI
01 Jan 1989-Infor
TL;DR: In this paper, an Arc Oriented Location Routing Problem (AOLRP) is described, where the customers to be serviced are represented by arcs and the allocation of customers to depots is an arc oriented problem as well as the resulting routing problem.
Abstract: The location routing problem is concerned with locating depots and creating routes to service customers. In particular, location-allocation-routing (LAR) algorithms are designed to locate facilities, allocate customers to facilities and design the routes through these customers. In the literature, the typical location routing problem is a node oriented problem, where depots and customers are all represented by nodes and the routing is a node routing problem. In this paper, an Arc Oriented Location Routing Problem (AOLRP) is described, where the customers to be serviced are represented by arcs. Therefore, the allocation of customers to depots is an arc oriented problem as well as the resulting routing problem. An algorithm is presented for solving the AOLRP and computational results are given regarding parameter settings and performance of this algorithm.

Journal Article
TL;DR: In this paper, the authors present a randomized algorithm for routing messages on a fat-tree, where the quality of the algorithm is measured in terms of the load factor of a set of messages to be routed, which is a lower bound on the time required to deliver the messages.
Abstract: Fat-trees are a class of routing networks for hardwareefficient parallel computation. This paper presents a randomized algorithm for routing messages on a fat-tree. The quality of the algorithm is measured in terms of the load factor of a set of messages to be routed, which is a lower bound on the time required to deliver the messages. We show that if a set of messages has load factor λ = Ω(lg n lg lg n) on a fat-tree with n processors, the number of delivery cycles (routing attempts) that the algorithm requires is O(λ) with probability 1-O(1/n). The best previous bound was O(λ lg n) for the off-line problem where switch settings can be determined in advance. In a VLSI-like model where hardware cost is equated with physical volume, we use the routing algorithm to demonstrate that fat-trees are universal routing networks in the sense that any routing network can be efficiently simulated by a fat-tree of comparable hardware cost.

Proceedings ArticleDOI
30 Oct 1989
TL;DR: An algorithm and two lower bounds are presented for the problem of constructing and maintaining routing schemes in dynamic networks, which distributively assigns addresses to nodes and constructs routing tables in a dynamically growing tree.
Abstract: An algorithm and two lower bounds are presented for the problem of constructing and maintaining routing schemes in dynamic networks. The algorithm distributively assigns addresses to nodes and constructs routing tables in a dynamically growing tree. The resulting scheme routes data messages over the shortest path between any source and destination, assigns addresses of O(log/sup 2/n) bits to each node, and uses in its routing table O(log/sup 3/n) bits of memory per incident link, where n is the final number of nodes in the tree. The amortized communication cost of the algorithm is O(log n) messages per node. Also given are two lower bounds on the tradeoff between the quality of routing schemes (i.e. their stretch factor) and their amortized communication cost in general dynamic networks. >

Proceedings ArticleDOI
15 Oct 1989
TL;DR: The results show that, when the rate of topological change becomes very high, flooding is preferable to the other alternatives, and for lower rate of change, the performance of the new algorithm is encouraging in that it has been generally superior to that of the alternative protocols.
Abstract: The authors present a distributed routing protocol intended for use in networks where the rate of topological change is not so fast as to make 'flooding' the only possible routing method but not so slow as to make one of the existing protocols for a static topology applicable. The routing algorithm adapts asynchronously in a distributed fashion to arbitrary changes in topology in the absence of global topological knowledge. The protocol maintains a set of loop-free routes to each destination from any node that desires a route. The protocol's performance, measured in terms of end-to-end packet delay and throughput, is compared with that of pure flooding and an alternative algorithm that is well suited to the medium-rate topological change environment envisioned here. The results show that, when the rate of topological change becomes very high, flooding is preferable to the other alternatives. For lower rate of change, it appears that, when the effects of channel access are accounted for, the performance of the new algorithm is encouraging in that it has been generally superior to that of the alternative protocols. >

Journal ArticleDOI
01 Jan 1989
TL;DR: It is shown that it is possible to design open-loop policies that give good performance in a way which is very robust with respect to large changes in the arrival rates, even though it is assumed that there is no online coordination between the routing algorithms for the different arrival streams.
Abstract: Some open-loop and closed-loop control algorithms are discussed for an example of a discrete-event system, namely, the routing of arriving tasks from different arrival streams among several possible service stations. It is shown that it is possible to design open-loop policies that give good performance in a way which is very robust with respect to large changes in the arrival rates. This is possible even though it is assumed that there is no online coordination between the routing algorithms for the different arrival streams. Some further improvements of the performance are possible when a simple feedback policy, namely, overflow routing, is implemented. This also gives reasonable robustness of performance with respect to changes in the service rates. >

Proceedings ArticleDOI
Prabhakar Raghavan1
01 Mar 1989
TL;DR: This paper gives a routing algorithm which, ifp⩽ 0.29, will with very high probability route every packet that can be routed inO(√n logn) steps with queue lengths that areO(log2n).
Abstract: This paper considers the problem of permutation packet routing on a √n×√n mesh-connected array of processors. Each node in the array is assumed to be independently faulty with a probability bounded above by a valuep. This paper gives a routing algorithm which, ifp⩽ 0.29, will with very high probability route every packet that can be routed inO(√n logn) steps with queue lengths that areO(log2n). Extensions to higher-dimensional meshes are given.

Proceedings ArticleDOI
01 Mar 1989
TL;DR: The focus of this paper lies on routing with each processor containing exactly k packets, k > 2, initially and finally (so-called k-k-routing), and it is shown that splitting large packets into smaller ones has benefits for permutation routing problems.
Abstract: In this paper we study the problem of routing packets on an r-dimensional mesh-connected array of processors. The focus of this paper lies on routing with each processor containing exactly k packets, k > 2, initially and finally (so-called k-k-routing). For two-dimensional n x n grids the number of transport steps is at most ~kn + O(kn/f(n)) with a buffersize of O(kf(n)). In the special case of a sequence of k permutation routing problems this step count can be reduced to kn + O(kn/f(n)). For an r-dimensional cube, r > 3, with side length n the same technique yields an algorithm with step count [~] ( 2 r 2)n + O(kn/f(n) 1/(r-1)) and a buffer size of O(kf(n)). Furthermore it is shown that splitting large packets into smaller ones has benefits for permutation routing problems. 1 I n t r o d u c t i o n The performance of parallel computation is heavily influenced by the existence of fast data movement algorithms [AJP86]. In this area especially mesh connected processor arrays have drawn attention because of their simple interconnection and their easy scalability. A nl x . . . x n~ mesh connected array is a set mesh(n1,..., n~)of N = n l . . . n~ identical processors where each processor P = (pl,...,p~),O _< Pi _< ni 1, is directly connected to all its nearPermission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and /o r specific permission. @ t989 A C M 0 8 9 7 9 1 3 2 3 X / 8 9 / 0 0 0 6 / 0 3 3 6 $1.50 est neighbours only. A processor Q = ( q l , . . . , q r ) is called nearest neighbour of P iff the manhattan distance between P and Q is 1 (d(P,Q) = Eir=l IPi -qi[)" The control structure of the grid of processors is assumed to be of the MIMD type (Multiple Instruction Multiple Data). That is, each processor has its own program memory, different processors can perform different instructions at the same clock period, there is a global clock, and each processor can send data only to its nearest neighbours during one clock period. Bidirectional communication can occur with all nearest neighbours in one clock cycle. Furthermore, each processor has only a limited number of registers for data (e.g. the buffer size is constant or log N). D e f i n i t i o n I (k -k p a c k e t r o u t i n g ) A k-k pakket routing problem is the problem of transporting k packets from each processor in the mesh to k destination processors. Each processor in the mesh sends and finally receives k packets. More formally a k-k routing problem is described by a (k+l) tuple (mesh, address],..., addressk ) where each addressi is a map from mesh to mesh and for all processors P in the mesh we have k Ei=~ ]address~-l(P)l = k. All the packets in address~-l(mesh) are said to lie in layer i. In the case of k = 1 address1 is a bijective func tion by definition and the problem is then called a permutation routing problem. This basic problem has been extensively studied in the literature. For n × n meshes some algorithms based on sorting only need 3n+O(low order) steps and a buffer*This research was supported by SIEMENS AG, Mfinchen, and by the Deutsche Forschungsgemeinschaft, Grant No. Ku 658/1-1.

Proceedings ArticleDOI
01 Aug 1989
TL;DR: Under the new scheme, each node uses partial topology information to eliminate the cost-dependent looping problem and no update constraints are imposed and no assumptions are made regarding link costs.
Abstract: Distributed shortest-path routing algorithms based on the Ford-Fulkerson method are simple to implement but they suffer from the cost-dependent looping problem: when link costs increase, routing table loops may form and convergence to correct paths may be too slow, depending on link costs. This problem can be eliminated if constraints are imposed on the order in which routing tables are updated at different nodes but the resulting internode protocols tend to be relatively complex. Furthermore, update constraints may restrict a node's ability to obtain alternate paths quickly in an environment where topology changes are frequent. In this paper, a new distributed shortest-path routing scheme based on the Ford-Fulkerson method is presented. Under the new scheme, each node uses partial topology information to eliminate the cost-dependent looping problem. No update constraints are imposed and no assumptions are made regarding link costs. In the worst case, the new scheme responds to link cost changes in O(D) update steps, where D is the diameter of the network after the occurrence of the changes.

Patent
Colin I'anson1
06 Nov 1989
TL;DR: In this paper, the authors present a directory information base (DIB) which includes a machine listing, which includes attributes of the machine, such as updating and routing information, as well as means for updating the routing table in response to such transmissions from the updating means, including format conversion for converting such transmissions to the format of the routing tables.
Abstract: A communication system includes a plurality of machines 21-24, 30, 33-35, etc) having unique identifiers and interconnected by a network of message switching nodes (10-14, 40, etc). Each node includes a dynamic routing table containing a plurality of machine identifiers and, for each, the next place in the network where a message to that machine should be directed to. The system includes a Directory Information Base (DIB) which includes a machine listing. For each machine, the listing has an entry including attributes of the machine. The attributes include updating and routing information. The former identifies the parts of the system need to be be updated to maintain consistency if some part of the entry is changed, including in particular information as to which nodes require their dynamic routing tables to be updated in response to a change in that entry (as if the routing tables were part of the DIB). The latter gives node identifications and routes from those nodes to the potential receiving machines. The DIB includes updating means which, on a change in an entry, use the updating attribute of that entry to transmit updating information to the rest of the DIB, in a format defined for the whole of the DIB. Such information is thus also sent to the relevant nodes. Each node includes means for updating the routing table in response to such transmissions from the updating means, including format conversion means for converting such transmissions to the format of the routing table.


Journal ArticleDOI
W.K. Tsai1
TL;DR: The gradient projection routing algorithms implemented either by the metering rule or the randomized rule are shown to converge to a neighborhood of a long-term optimal routing.
Abstract: The convergence of the gradient projection algorithms for optimal routing in virtual circuit data networks proposed by D.P. Bertsekas (1982) is studied. The routing model explicitly takes into account stochastic generation and termination of virtual circuits, distributed asynchronous routing updates, inaccurate flow measurement, and delays in forwarding control packets. The problem of assigning paths for incoming sessions (or virtual circuits) to implement the gradient projection algorithms is also studied. A metering rule based on deficiency in a desired number of virtual circuits is proposed and analyzed. It is shown that the proposed metering rule is better than a randomized rule in some sense. The gradient projection routing algorithms implemented either by the metering rule or the randomized rule are shown to converge to a neighborhood of a long-term optimal routing. >

Proceedings ArticleDOI
T. Narten1
01 Aug 1989
TL;DR: The weaknesses and limitations of the most commonly used routing protocols, including RIP, GGP, and HELLO are articulated and how the protocols interact with each other and with EGP is examined.
Abstract: Comprising an estimated 60,000 hosts, the DARPA Internet is the largest existing internet. This paper traces the routing information protocols used by Internet gateways to build routing tables that define the paths datagrams traverse as they travel between end systems. We articulate the weaknesses and limitations of the most commonly used routing protocols, including RIP, GGP, and HELLO and examine how the protocols interact with each other and with EGP. Finally, we trace the evolution of routing as the Internet has grown from a single backbone (ARPANET) to its present inclusion of the ARPANET, Milnet, and NSFnet cross-country networks.

Journal ArticleDOI
03 Jan 1989
TL;DR: Wiretap is introduced, an experimental routing algorithm which computes maximum-likelihood diversity routes for packet-radio stations sharing a common broadcast channel, but with some stations hidden from others.
Abstract: This paper introduces Wiretap, an experimental routing algorithm which computes maximum-likelihood diversity routes for packet-radio stations sharing a common broadcast channel, but with some stations hidden from others. The wiretapper observes the paths (source routes) used by other stations sending traffic on the channel and, using a heuristic set of factors and weights, constructs speculative paths for its own traffic. The algorithm is presented as an example of maximum-likelihood routing and database management techniques useful for richly connected networks of mobile stations. Of particular interest are the mechanisms to compute, select, rank and cache a potentially large number of speculative routes when only limited computational resources are available.A prototype implementation has been constructed and tested for the AX.25 packet-radio channel now in widespread use in the amateur-radio community. Its design is similar in many respects to the SPF algorithm used in the ARPANET and NSFNET backbone networks, and is in fact a variation of the Viterbi algorithm, which constructs maximum-likelihood paths on a graph according to a weighted sum of factors assigned to the nodes and edges.

Journal ArticleDOI
TL;DR: The theory of insensitivity is extended to include processes where some of the routing probabilities of the process are made dependent upon the length of time the generally distributed variables have been alive as mentioned in this paper.
Abstract: The theory of insensitivity is extended to include processes where some of the routing probabilities of the process are made dependent upon the length of time the generally distributed variables have been alive. Examples of such systems are given, including networks of queues with age-dependent routing. PARTIAL BALANCE; PRODUCT-FORM QUEUEING NETWORKS; AGE-DEPENDENT ROUTING

Proceedings ArticleDOI
23 Apr 1989
TL;DR: Present computational experiments clearly show that the performance of a self-planning network is always better than that of the same network without the trunk routing capability.
Abstract: The configuration and routing problem (or the joint trunk and traffic routing problem) is first formulated as a mixed integer nonlinear minimization problem. Then certain properties are proved about the problem structure. These properties lead to an efficient algorithm that determines near-optimal configurations and routing assignments. A lower bound is also computed in order to evaluate the quality of the solution. The algorithm was coded and tested on several networks. Present computational experiments clearly show that the performance of a self-planning network is always better than that of the same network without the trunk routing capability. The reduction in average packet delay is as much as 67%. >

Journal ArticleDOI
TL;DR: The authors explore control strategies in the design of a high-performance transport architecture for integrated services digital network (ISDN) frame-relay networks for real-time congestion control, buffer management, priority queueing, adaptive windowing, and selective frame, discard policies.
Abstract: The authors explore control strategies in the design of a high-performance transport architecture for integrated services digital network (ISDN) frame-relay networks. For real-time congestion control, buffer management, priority queueing, adaptive windowing, and selective frame, discard policies are described that can effectively maximize network efficiency while preventing unfair usage of shared network resources. Virtual-circuit routing strategies are proposed that ensure an efficient distribution of traffic loads across the network despite variations in traffic patterns and topology changes. It is shown that source routing provides significant performance benefits over link-by-link routing, particularly in large networks that are not so densely connected. Routing table update and call acceptance mechanisms are described that provide for efficient bandwidth management in the network. Fault-tolerant strategies are described that include fast failure detection and local reroute. These strategies are capable of restoring affected virtual circuits in less than 10 s, which is adequate for session maintenance under most application scenarios. >

Journal ArticleDOI
TL;DR: Two protocols are presented that permit varying degrees of fragmentation and dynamic routing, while allowing the gateways to authenticate successive packets belonging to authorized connections.
Abstract: The implications of fragmentation and dynamic routing for datagram authentication at the gateway level are discussed. Two protocols are presented that permit varying degrees of fragmentation and dynamic routing, while allowing the gateways to authenticate successive packets belonging to authorized connections. The first adapts to changing paths and fragmentation by keeping state information on a per-packet basis, while the second restricts fragmentation but incurs little state overhead. The two methods vary in implementation complexity, overhead, number of extra packets sent, and host modification requirements. They were designed with different network characteristics in mind, and, since they are not mutually exclusive, both can be incorporated and used depending on the nature of communication. >

Proceedings ArticleDOI
05 Nov 1989
TL;DR: A general-purpose routing algorithm that demonstrates a speed compatible to a hierarchical router and produces routings with quality equivalent to that by a maze router is proposed.
Abstract: A general-purpose routing algorithm is proposed. Ideas behind both the maze-running algorithm and the hierarchical routing algorithm are combined into a hybrid routing algorithm. The new algorithm demonstrates a speed compatible to a hierarchical router and produces routings with quality equivalent to that by a maze router. Hybrid routing is based on the maze-running method with a third search dimension added. The extra search space is built by recursively constructing a hierarchy of coarser grid meshes. A user-given parameter can turn this algorithm into a pure maze router, a pure hierarchical router, or a wide spectrum of hybrid routers with different speed/quality characteristics between the extremes. With this approach, it is possible to handle easily a routing of large size, such as those encountered in the sea-of-gate layout. >