WO2008127574A1 - Available bandwidth estimation - Google Patents

Available bandwidth estimation Download PDF

Info

Publication number
WO2008127574A1
WO2008127574A1 PCT/US2008/004424 US2008004424W WO2008127574A1 WO 2008127574 A1 WO2008127574 A1 WO 2008127574A1 US 2008004424 W US2008004424 W US 2008004424W WO 2008127574 A1 WO2008127574 A1 WO 2008127574A1
Authority
WO
WIPO (PCT)
Prior art keywords
nodes
node
cluster
network
feature vectors
Prior art date
Application number
PCT/US2008/004424
Other languages
French (fr)
Inventor
Alok Shriram
Sujata Banerjee
Praveen Yalagandula
Sung-Ju Lee
Original Assignee
Hewlett-Packard Development Company, L.P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett-Packard Development Company, L.P. filed Critical Hewlett-Packard Development Company, L.P.
Priority to CN200880020035.4A priority Critical patent/CN101682548B/en
Priority to EP08742575.7A priority patent/EP2137888B1/en
Publication of WO2008127574A1 publication Critical patent/WO2008127574A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/123Evaluation of link metrics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/147Network analysis or design for predicting network behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/04Interdomain routing, e.g. hierarchical routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/125Shortest path evaluation based on throughput or bandwidth
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/26Route discovery packet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/302Route determination based on requested QoS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/46Cluster building
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/127Avoiding congestion; Recovering from congestion by using congestion prediction

Definitions

  • QoS Quality of Service
  • FIG. 1 illustrates a network including nodes, according to an embodiment
  • Figures 2A-B illustrate examples of nodes that may and may not be clustered, according to an embodiment
  • Figure 3 illustrates a flow chart of a method for estimating available bandwidth, according to an embodiment
  • Figure 4 illustrates a computer system, according to an embodiment.
  • a relatively stable network metric when compared to available bandwidth, is used to identify clusters of nodes that are likely to have similar available bandwidths to other nodes in the network.
  • Examples of a stable network metric include but are not limited to capacity and last m-hops in network paths.
  • a representative node is selected from each cluster, referred to as the cluster head, and available bandwidth is measured from the cluster head to all other nodes in the network outside the cluster.
  • the measured available bandwidth from the cluster head may be used as an estimation of available bandwidth from each of the nodes in the cluster.
  • much fewer available bandwidth measurements are performed to determine available bandwidth between all the nodes in a network. This represents a significant savings in terms of network traffic and time to determine available bandwidth between the nodes in a network.
  • the available bandwidths may be stored, displayed or conveyed to a user or another node in the network.
  • the available bandwidths may be used to select a path for transmitting data to a destination.
  • the available bandwidths are used to select a path that meets the requirements for providing a service. For example, a service provided to a user over a network, such as the Internet, may require a minimum available bandwidth.
  • a path is selected in the network that has an available bandwidth greater than or equal to the required minimum available bandwidth.
  • Other network metrics such as latency, throughput, loss rate, etc., in addition to available bandwidth, may be considered when selecting a path.
  • capacity is the maximum transmission rate of a data transmission on a link or end-to-end path, assuming the data transmission has full access to the link or path without any other network traffic on the link or path. Capacity measurements create network traffic. However, a capacity measurement is typically valid for a much longer period of time, so the periodicity of performing these measurements to be used for determining available bandwidth is less.
  • Available bandwidth is the transmission rate of a data transmission on a link or path with other network traffic on the link or path.
  • the network traffic typically varies over time, so the available bandwidth varies over time and is generally less stable than capacity.
  • Equation 1 provides a more formal description of available bandwidth for a path as the minimum unused capacity of the path during a time interval (ti,t 2 ).
  • Equation 1 AB is the available bandwidth in bits per second
  • An end-to-end path in a network between a source and a destination also referred to as a path or network path, may be comprised of one or more links.
  • the available bandwidth or capacity of a path comprised of multiple links may be characterized by the link in the path having the lowest capacity or lowest available bandwidth. This link may be referred to as the bottleneck link.
  • Figure 1 illustrates a network 100 including nodes.
  • An example of the network 100 includes a large-scale network, such as the Internet. However, the embodiments may be implemented in smaller networks.
  • a node is any device that may send and/or receive messages via the network and that is typically operable to perform some type of data processing.
  • nodes include routers, servers, and end-user devices, such as personal digital assistants (PDAs), personal computers, laptops, and cellular phones.
  • PDAs personal digital assistants
  • the nodes 110 may be operable to route data in the network 100 along network paths.
  • Figure 1 shows a source node 110x and a destination node 110y.
  • a path 130 between the source node 110x and the destination node 110y includes links 131a-e and intermediate nodes 110r-u.
  • the path 130 for example, is an IP network path for routing data between the source node 110x and the destination node 110y, as is known in the art.
  • the slowest link of the path 130 determines the maximum available bandwidth of the entire path 130. For example, if the available bandwidths for the links 131a-e are 20, 50, 100, 30 and 1 Mbps respectively, the maximum available bandwidth for the path 130 is 1 Mbps. If a service, such as streaming media, or a bulk transfer of data to be provided to the destination node 110y requires over 1 Mbps to provide the service, the path 130 may not be selected to provide the service if another path to the destination node 110y with available bandwidth greater than 1 Mbps is available for providing the service. For example, another path and/or another source providing the same service may be used to provide the service. The path 130 may be selected if the service requires less than or equal to 1 Mbps available bandwidth. Similarly to available bandwidth, the link having the lowest capacity in the path 130 may be used as the maximum capacity of the entire path 130.
  • nodes are clustered to estimate available bandwidth with reduced overhead. Nodes are clustered based on the sameness of their view of the network in terms of a network metric, such as bandwidth, capacity, last m-hops, etc.
  • Figures 2A-B illustrate examples of nodes that can or cannot be clustered based on their views of the network.
  • FIG. 2A illustrates nodes 110e-j in the network 100.
  • Each of the nodes 110e-j measures a network metric, in this example bandwidth, to all the other nodes.
  • Figure 2A shows the measured bandwidths, which are access bandwidth for each of the nodes.
  • the access bandwidth is the transmission rate on the link closest to the node providing access to the network.
  • the lowest bandwidth of any path i.e., the bandwidth of the bottleneck link in the path
  • the access bandwidths for the nodes 110e-j are 100, 10, 50, 50, 1 and 100 Mbps, respectively.
  • the view of the network for the node 110e is the bandwidth for each of the paths from the node 110e to the nodes 110f-i, respectively in this example.
  • the view 201 e includes 10, 50, 50, and 1 Mbps, which are the bandwidths for the paths between the node 110e and the nodes 110f-i, respectively.
  • the view of the network for the node 110j shown as 201 j, includes 10, 50, 50, and 1 Mbps, which are the access bandwidths for the nodes 110f-i, respectively.
  • the view 201 j represents the bandwidth for each of the paths from the node 110e to the nodes 11Of-I, respectively.
  • the views 201 e and 201 j are the same, and thus the nodes 11Oe and 11Oj may be clustered for estimating available bandwidth.
  • Figure 2B is an example of nodes that cannot be clustered.
  • the view of the network for the node 110e shown as 201 e, includes 10, 50, 50, and 1 Mbps, as described above.
  • the view 201 k for the node 110k is 1 , 1 , 1 , 1 Mbps, which are the bandwidths for the paths between the node 11 Ok and the nodes 110f-i, respectively.
  • the bandwidth is 1 Mbps for each path because that is the bandwidth of the bottleneck link of each path.
  • the views 201 e and 201k are substantially different . Thus, the nodes 110e and 110k may not be clustered.
  • Figure 3 illustrates a method for estimating available bandwidth using a clustering approach.
  • Figure 3 is described with respect to figures 1 and 2A-B by way of example and not limitation.
  • feature vectors are determined for each node.
  • the views 201 e, 201 j, and 201k are examples of feature vectors.
  • each node measures a network metric between itself and every other node in the network or a set of nodes in the network. The measurements are the feature vector.
  • the views 201 e, 201j, and 201k shown in figures 2A-B are examples of feature vectors and the network metric is bandwidth for those feature vectors.
  • the feature vectors include capacity measurements.
  • the nodes 110e-j shown in figure 2A each measure capacity to each other to determine feature vectors for each of the nodes.
  • Bandwidth and capacity measurement tools known in the art may be used to perform the measurements.
  • Capacity measurements create network traffic. However, capacity is a relatively stable network metric and is typically valid for a much longer period of time, when compared to other metrics, such as available bandwidth, which are dependent on current network traffic. Thus, the periodicity of performing capacity measurements for feature vectors to be used for determining available bandwidth is less. Furthermore, since it has been observed that tight and narrow links in a path tend to be the same, capacity may be leveraged to determine available bandwidth for a path.
  • the feature vectors include the last m- hops for each path.
  • each of the nodes 110e-j shown in figure 2A perform traceroutes to each other.
  • the traceroutes are used to determine the last m-hops for each path between each of the nodes 110e-j.
  • the feature vector for the node 110e includes the last 4 hops in each path between the node 110e and the nodes 110f-i. This may include a unique ID of the last four nodes in each path or some other representation of the last four nodes in each path. Since it has been observed that many paths in a large network are shared, nodes that are common for two different paths may be used as the metric for clustering.
  • the feature vectors are used to form clusters.
  • Clusters are formed based on the "sameness" of the nodes view of the network in terms of a network metric, such as capacity, last hops in a path, etc. Sameness is determined from the feature vectors and distance metrics computed from the feature vectors as described below.
  • feature vectors are comprised of capacity measurements.
  • a distance metric between any two given nodes in the network is computed to determine sameness between the nodes and to form clusters. For example, given a node pair and assuming n number of nodes are in the network, the distance metric is the average of the normalized differences between the capacity from the first node in the pair and the capacity from the second node in the pair to each other (n-2) nodes. For example, two nodes, such as the node 110e and the node 110j, shown in figure 2A, are being compared.
  • the average of the normalized differences between the capacity from node 110e and the capacity from the node 110j to each of the other (n-2) nodes is computed. This computation is performed for every node pair.
  • the result for each computation for example, is a number between 0 and 1.
  • the pair is either placed in the same cluster or not.
  • the computation results are used as input to a known clustering function, such as k-means clustering, and the function determines the clusters.
  • Equation 2 Given n number of nodes in the network, a computation is performed for each node pair (i, j). At step 301 , for example, capacity is measured from each of the nodes i and j to every other node in the network to determine the feature vectors. A capacity measurement from the node i to a node k is represented as Cap(N iik ), and Cap(Nj k ) represents the capacity measurement from the node j to node k in the network. A difference is computed. The difference is the capacity from node i to node k minus the capacity from node j to node k. The difference is divided by the maximum of the capacities from node i to node k and from node j to node k. This computation is represented by Equation 2 as follows:
  • Equation 2 Diff k
  • Equation 3 The difference calculated in equation 2 is averaged across all other (n-2) nodes in the network.
  • equation 2 is calculated for each node k, where k represents the nodes in the network othen than the nodes i and j.
  • the number of nodes k is (n-2).
  • Equation 3 The computation for averaging the differences across all other (n-2) nodes is shown in Equation 3 as follows:
  • the normalized difference calculated in Equation 3, for example, is a number between 0 and 1 and is the distance metric for the pair. If the capacities are the same, then the difference is 0 and then the nodes i and j have the same view and are placed in the same cluster. Generally, if the normalized difference is closer to 0, the nodes are placed in the same cluster. If the normalized difference is closer to 1 , the nodes are not placed in the same cluster.
  • the results of Equation 3 for each node pair in the network are used as input to a known clustering function, such as k-means clustering, and the function determines the clusters.
  • the distance metric may be calculated for a subset of nodes in the network instead of all the nodes in the network.
  • n is a number of nodes in the subset of nodes in the network
  • (n-2) is a number of the nodes in the subset except for the node pair
  • k represents each node in the subset.
  • paths are used to determine feature vectors. For example, as described above, the last m-hops to all destination nodes are provided in the feature vectors for each node.
  • a distance metric representing path similarity is calculated, which measures the fraction of nodes that are common between the routes from two nodes in a node pair to a common destination and averages over all destinations. Any standard clustering technique may then be applied to obtain the clusters.
  • a distance metric of 1 implies nodes can be clustered and a distance metric of 0 implies nodes cannot be clustered.
  • a hop similarity function HS ⁇ (h) is computed as shown in Equation 4 as follows, where N* k and are the node id's for the h th hop on the paths between nodes i and k and nodes j and k respectively. Note that N ⁇ and N J h k could be part of k th entry in the feature vectors for nodes i and j as discussed before.
  • PS,, is averaged over the set of all other destination nodes k, such that k ⁇ i, j.
  • the normalized PS is the distance metric and is calculated using Equation 6:
  • a distance metric matrix including the distance metric for every node pair is created. If a known clustering function, such as k- means clustering function, is used to form the clusters, the distance matrix metric along with the number of clusters to be formed is input into the clustering function to form the clusters of nodes.
  • k- means clustering function
  • a cluster head is selected for each cluster. For example, once the clusters are created, each cluster elects its cluster representative, i.e., the cluster head, which then conducts bandwidth measurements to the nodes outside the cluster.
  • the cluster representative may be chosen by a number of techniques.
  • the cluster head is chosen, for example randomly, and available bandwidth measurements from the cluster head are considered estimations from all the nodes in the cluster.
  • Available bandwidth measurements are also performed to obtain the bandwidths between the nodes inside each cluster. These measurements may be used to identify a bottleneck link close to the source and for selecting a cluster head using a second approach, referred to as the min-use approach.
  • the min-use approach if available bandwidth between a node in the cluster, referred to as a source node in the cluster, and the cluster head is less than the available bandwidth between the cluster head and a node outside the cluster, referred to as a destination node outside the cluster, the available bandwidth between the source node in the cluster and the cluster head is used as the estimation of available bandwidth between the source node and that destination node.
  • the min-use approach accounts for bottleneck links that may be closer to the source node rather than the destination node.
  • These bottleneck links may be used as the estimation of available bandwidth from the nodes in the cluster. If the bandwidths between the cluster head and the nodes outside the cluster are smaller than the bandwidths between the nodes in the cluster and the cluster head, the bottleneck links may be close to the destination. Then, the bandwidths between the cluster head and the nodes outside the cluster may be used as the estimation of available bandwidth for the nodes in the cluster.
  • nodes 110e and 110j are in the same cluster, and the node 110e is selected as the cluster head using the direct approach.
  • the node 110e measures available bandwidths to all the nodes outside the cluster. Assume the node is 110g is outside the cluster. If the available bandwidth between 110e and 110g is IOMbps and the available bandwidth between 110e and 110j is 5 Mbps, then 5 Mbps may be used as the available bandwidth to the destination 110g from node 110j. If the available bandwidth between another node in the cluster and 110e is less than 5 Mbps, then that available bandwidth may be used as the available bandwidth to the destination 110g from that node. [0054] At step 304, available bandwidth measurements from a single node in the cluster are used as an estimation of available bandwidth from all the nodes in the cluster.
  • Figure 4 illustrates an exemplary block diagram of a computer system 400 that may be used as a node in the network 100.
  • the computer system 400 includes one or more processors, such as processor 402, providing an execution platform for executing software.
  • the computer system 400 also includes a main memory 404, such as a Random Access Memory (RAM), where software may be resident during runtime, and a secondary memory 406.
  • the secondary memory 406 includes, for example, a hard disk drive and/or a removable storage drive, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc., or a nonvolatile memory where a copy of the software may be stored.
  • the secondary memory 406 may also include ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM).
  • routing tables, capacities for overlay paths, available bandwidths for overlay paths, and other data may be stored in the main memory 404 and/or the secondary memory 406.
  • the memories 404 and/or 406 may store network metric measurements, including feature vectors and measured available bandwidths.
  • a user interfaces with the computer system 400 with one or more
  • I/O devices 404 such as a keyboard, a mouse, a stylus, display, and the like.
  • a network interface 416 is provided for communicating with other nodes in the network 100.
  • One or more of the steps of the method 300 and other steps described herein may be implemented as software embedded on a computer readable medium, such as the memory 404 and/or 406, and executed on the computer system 400, for example, by the processor 402.
  • the steps may be embodied by a computer program, which may exist in a variety of forms both active and inactive. For example, they may exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats for performing some of the steps. Any of the above may be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form.
  • Examples of suitable computer readable storage devices include conventional computer system RAM (random access memory), ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes.
  • Examples of computer readable signals are signals that a computer system hosting or running the computer program may be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of the programs on a CD ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general. It is therefore to be understood that those functions enumerated below may be performed by any electronic device capable of executing the above-described functions.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Feature vectors are nodes in a network 100 are computed based on a network metric. Clusters of the nodes are formed based on the feature vectors. A cluster head is selected for each cluster. Available bandwidths between the cluster head and nodes outside the cluster are determined. The available bandwidths between the cluster head and the nodes outside the cluster may be used as estimations of available bandwidths for the nodes in the cluster.

Description

AVAILABLE BANDWIDTH ESTIMATION
BACKGROUND
[0001] Large networks, such as the Internet, provide the infrastructure for many peer-to-peer systems and are now being used to provide a variety of services to users. Some recent Internet applications require high bandwidth. Live, high-quality, streaming video, video conferencing, and graphic-intensive multiplayer games are examples of high-bandwidth applications.
[0002] A fundamental challenge in effectively utilizing high-bandwidth network services is to provide these services and other data transmission without affecting the quality of the services. Quality of Service (QoS) routing is a major factor in providing these services. However, selecting routes that provide the performance required by the service is difficult.
[0003] Accurately measuring metrics for computing network routes can be difficult. This is especially true when determining bandwidth. Measuring bandwidth is a computational and resource intensive process. It is difficult to conduct bandwidth measurements for large networks, such as the Internet, having a large number of paths. Measuring simultaneously on multiple paths may cause interference to measurement tools and may generate cross traffic, thus making it difficult to get accurate measurements in real-time. Furthermore, bandwidth changes quite rapidly and the measurements need to be updated frequently. In a large network, continuously measuring bandwidth would be infeasible because of the large measurement overhead.
BRIEF DESCRIPTION OF THE DRAWINGS [0004] Various features of the embodiments can be more fully appreciated, as the same become better understood with reference to the following detailed description of the embodiments when considered in connection with the accompanying figures, in which: [0005] Figure 1 illustrates a network including nodes, according to an embodiment;
[0006] Figures 2A-B illustrate examples of nodes that may and may not be clustered, according to an embodiment;
[0007] Figure 3 illustrates a flow chart of a method for estimating available bandwidth, according to an embodiment; and
[0008] Figure 4 illustrates a computer system, according to an embodiment.
DETAILED DESCRIPTION OF THE EMBODIMENTS [0009] According to embodiments described herein, efficient and scalable methods for estimating available bandwidth for an end-to-end path are provided. In one embodiment, a relatively stable network metric, when compared to available bandwidth, is used to identify clusters of nodes that are likely to have similar available bandwidths to other nodes in the network. Examples of a stable network metric include but are not limited to capacity and last m-hops in network paths. A representative node is selected from each cluster, referred to as the cluster head, and available bandwidth is measured from the cluster head to all other nodes in the network outside the cluster. The measured available bandwidth from the cluster head may be used as an estimation of available bandwidth from each of the nodes in the cluster. Thus, much fewer available bandwidth measurements are performed to determine available bandwidth between all the nodes in a network. This represents a significant savings in terms of network traffic and time to determine available bandwidth between the nodes in a network.
[0010] After the available bandwidths between the nodes are determined, the available bandwidths may be stored, displayed or conveyed to a user or another node in the network. The available bandwidths may be used to select a path for transmitting data to a destination. In one example, the available bandwidths are used to select a path that meets the requirements for providing a service. For example, a service provided to a user over a network, such as the Internet, may require a minimum available bandwidth. A path is selected in the network that has an available bandwidth greater than or equal to the required minimum available bandwidth. Other network metrics, such as latency, throughput, loss rate, etc., in addition to available bandwidth, may be considered when selecting a path.
[0011] As used herein capacity is the maximum transmission rate of a data transmission on a link or end-to-end path, assuming the data transmission has full access to the link or path without any other network traffic on the link or path. Capacity measurements create network traffic. However, a capacity measurement is typically valid for a much longer period of time, so the periodicity of performing these measurements to be used for determining available bandwidth is less.
[0012] Available bandwidth is the transmission rate of a data transmission on a link or path with other network traffic on the link or path. The network traffic typically varies over time, so the available bandwidth varies over time and is generally less stable than capacity.
[0013] Equation 1 provides a more formal description of available bandwidth for a path as the minimum unused capacity of the path during a time interval (ti,t2).
[0014] Equation 1 : AB[tx,t2]= C- BJtxJ2) h - tχ
[0015] In Equation 1 , AB is the available bandwidth in bits per second
(bps) for the time interval (t1,t2>, C is the capacity of the path and B is the measured traffic on the path during the time interval. [0016] An end-to-end path in a network between a source and a destination, also referred to as a path or network path, may be comprised of one or more links. The available bandwidth or capacity of a path comprised of multiple links may be characterized by the link in the path having the lowest capacity or lowest available bandwidth. This link may be referred to as the bottleneck link.
[0017] Figure 1 illustrates a network 100 including nodes. An example of the network 100 includes a large-scale network, such as the Internet. However, the embodiments may be implemented in smaller networks.
[0018] A node is any device that may send and/or receive messages via the network and that is typically operable to perform some type of data processing. Examples of nodes include routers, servers, and end-user devices, such as personal digital assistants (PDAs), personal computers, laptops, and cellular phones. The nodes 110 may be operable to route data in the network 100 along network paths.
[0019] Figure 1 shows a source node 110x and a destination node 110y.
A path 130 between the source node 110x and the destination node 110y includes links 131a-e and intermediate nodes 110r-u. The path 130, for example, is an IP network path for routing data between the source node 110x and the destination node 110y, as is known in the art.
[0020] The slowest link of the path 130 determines the maximum available bandwidth of the entire path 130. For example, if the available bandwidths for the links 131a-e are 20, 50, 100, 30 and 1 Mbps respectively, the maximum available bandwidth for the path 130 is 1 Mbps. If a service, such as streaming media, or a bulk transfer of data to be provided to the destination node 110y requires over 1 Mbps to provide the service, the path 130 may not be selected to provide the service if another path to the destination node 110y with available bandwidth greater than 1 Mbps is available for providing the service. For example, another path and/or another source providing the same service may be used to provide the service. The path 130 may be selected if the service requires less than or equal to 1 Mbps available bandwidth. Similarly to available bandwidth, the link having the lowest capacity in the path 130 may be used as the maximum capacity of the entire path 130.
[0021] According to an embodiment, nodes are clustered to estimate available bandwidth with reduced overhead. Nodes are clustered based on the sameness of their view of the network in terms of a network metric, such as bandwidth, capacity, last m-hops, etc. Figures 2A-B illustrate examples of nodes that can or cannot be clustered based on their views of the network.
[0022] Figure 2A illustrates nodes 110e-j in the network 100. Each of the nodes 110e-j measures a network metric, in this example bandwidth, to all the other nodes. Figure 2A shows the measured bandwidths, which are access bandwidth for each of the nodes. The access bandwidth is the transmission rate on the link closest to the node providing access to the network. In the examples shown in figures 2A-B, the lowest bandwidth of any path (i.e., the bandwidth of the bottleneck link in the path) happens to be the access bandwidth of one of the two end nodes of the path, and thus the minimum of the end nodes' access bandwidths may be considered as the bandwidth for the entire path. As shown in figure 2A, the access bandwidths for the nodes 110e-j are 100, 10, 50, 50, 1 and 100 Mbps, respectively.
[0023] The view of the network for the node 110e, shown as 201 e, is the bandwidth for each of the paths from the node 110e to the nodes 110f-i, respectively in this example. The view 201 e includes 10, 50, 50, and 1 Mbps, which are the bandwidths for the paths between the node 110e and the nodes 110f-i, respectively. Similarly, the view of the network for the node 110j, shown as 201 j, includes 10, 50, 50, and 1 Mbps, which are the access bandwidths for the nodes 110f-i, respectively. The view 201 j represents the bandwidth for each of the paths from the node 110e to the nodes 11Of-I, respectively. The views 201 e and 201 j are the same, and thus the nodes 11Oe and 11Oj may be clustered for estimating available bandwidth.
[0024] Figure 2B is an example of nodes that cannot be clustered. As shown in figure 2B, the view of the network for the node 110e, shown as 201 e, includes 10, 50, 50, and 1 Mbps, as described above. The view 201 k for the node 110k is 1 , 1 , 1 , 1 Mbps, which are the bandwidths for the paths between the node 11 Ok and the nodes 110f-i, respectively. The bandwidth is 1 Mbps for each path because that is the bandwidth of the bottleneck link of each path. The views 201 e and 201k are substantially different . Thus, the nodes 110e and 110k may not be clustered.
[0025] The examples shown in figures 2A-B are simplistic and it will be apparent to one of ordinary skill in the art that other metrics may be used to determine views of the network. Furthermore, views may not exactly match, but may still be considered close enough for placing the respective nodes in the same cluster. Criteria for comparing views to determine whether to place nodes in the same cluster are described in further detail below.
[0026] Through testing, it has been observed that many paths in a large network, such as the Internet, are shared. Also, most bottleneck links are in the first or last four hops in a path between a source and destination node. Also, tight and narrow links in a path are the same. A tight link is a link in a path with the smallest capacity. A narrow link is a link in a path with the smallest available bandwidth. Based on these observations, clustering approaches for determining available bandwidth for a path, according to embodiments, is described with respect to figure 3.
[0027] Figure 3 illustrates a method for estimating available bandwidth using a clustering approach. Figure 3 is described with respect to figures 1 and 2A-B by way of example and not limitation. [0028] At step 301 , feature vectors are determined for each node. The views 201 e, 201 j, and 201k are examples of feature vectors. For example each node measures a network metric between itself and every other node in the network or a set of nodes in the network. The measurements are the feature vector. The views 201 e, 201j, and 201k shown in figures 2A-B are examples of feature vectors and the network metric is bandwidth for those feature vectors.
[0029] In one embodiment, the feature vectors include capacity measurements. For example, the nodes 110e-j shown in figure 2A each measure capacity to each other to determine feature vectors for each of the nodes. Bandwidth and capacity measurement tools known in the art may be used to perform the measurements.
[0030] Capacity measurements create network traffic. However, capacity is a relatively stable network metric and is typically valid for a much longer period of time, when compared to other metrics, such as available bandwidth, which are dependent on current network traffic. Thus, the periodicity of performing capacity measurements for feature vectors to be used for determining available bandwidth is less. Furthermore, since it has been observed that tight and narrow links in a path tend to be the same, capacity may be leveraged to determine available bandwidth for a path.
[0031] In another embodiment, the feature vectors include the last m- hops for each path. For example, each of the nodes 110e-j shown in figure 2A perform traceroutes to each other. The traceroutes are used to determine the last m-hops for each path between each of the nodes 110e-j. For example, if m=4, the feature vector for the node 110e includes the last 4 hops in each path between the node 110e and the nodes 110f-i. This may include a unique ID of the last four nodes in each path or some other representation of the last four nodes in each path. Since it has been observed that many paths in a large network are shared, nodes that are common for two different paths may be used as the metric for clustering. [0032] At step 302, the feature vectors are used to form clusters.
Clusters are formed based on the "sameness" of the nodes view of the network in terms of a network metric, such as capacity, last hops in a path, etc. Sameness is determined from the feature vectors and distance metrics computed from the feature vectors as described below.
[0033] According to an embodiment, feature vectors are comprised of capacity measurements. Using the capacity measurements, a distance metric between any two given nodes in the network is computed to determine sameness between the nodes and to form clusters. For example, given a node pair and assuming n number of nodes are in the network, the distance metric is the average of the normalized differences between the capacity from the first node in the pair and the capacity from the second node in the pair to each other (n-2) nodes. For example, two nodes, such as the node 110e and the node 110j, shown in figure 2A, are being compared. Assuming the network 100 includes n number of nodes, the average of the normalized differences between the capacity from node 110e and the capacity from the node 110j to each of the other (n-2) nodes is computed. This computation is performed for every node pair. The result for each computation, for example, is a number between 0 and 1. Depending on where the threshold is set, the pair is either placed in the same cluster or not. Alternatively, the computation results are used as input to a known clustering function, such as k-means clustering, and the function determines the clusters.
[0034] Computing the distance metric for each pair of nodes is as follows: given n number of nodes in the network, a computation is performed for each node pair (i, j). At step 301 , for example, capacity is measured from each of the nodes i and j to every other node in the network to determine the feature vectors. A capacity measurement from the node i to a node k is represented as Cap(Niik), and Cap(Nj k) represents the capacity measurement from the node j to node k in the network. A difference is computed. The difference is the capacity from node i to node k minus the capacity from node j to node k. The difference is divided by the maximum of the capacities from node i to node k and from node j to node k. This computation is represented by Equation 2 as follows:
[0035] Equation 2: Diffk
Figure imgf000011_0001
'J Max(Cap(Nl k),Cap{Nj k))
[0036] The difference calculated in equation 2 is averaged across all other (n-2) nodes in the network. Thus, equation 2 is calculated for each node k, where k represents the nodes in the network othen than the nodes i and j. The number of nodes k is (n-2). The computation for averaging the differences across all other (n-2) nodes is shown in Equation 3 as follows:
[0037] Equation 3:
Figure imgf000011_0002
[0038] The normalized difference calculated in Equation 3, for example, is a number between 0 and 1 and is the distance metric for the pair. If the capacities are the same, then the difference is 0 and then the nodes i and j have the same view and are placed in the same cluster. Generally, if the normalized difference is closer to 0, the nodes are placed in the same cluster. If the normalized difference is closer to 1 , the nodes are not placed in the same cluster. In one embodiment, the results of Equation 3 for each node pair in the network are used as input to a known clustering function, such as k-means clustering, and the function determines the clusters.
[0039] The distance metric may be calculated for a subset of nodes in the network instead of all the nodes in the network. For example, n is a number of nodes in the subset of nodes in the network; (n-2) is a number of the nodes in the subset except for the node pair; and k represents each node in the subset. [0040] According to another embodiment, paths are used to determine feature vectors. For example, as described above, the last m-hops to all destination nodes are provided in the feature vectors for each node. A distance metric representing path similarity is calculated, which measures the fraction of nodes that are common between the routes from two nodes in a node pair to a common destination and averages over all destinations. Any standard clustering technique may then be applied to obtain the clusters. A distance metric of 1 implies nodes can be clustered and a distance metric of 0 implies nodes cannot be clustered.
[0041] Computing the distance metric for each pair of node is as follows: given n number of nodes in the network, a computation is performed for each pair of source nodes i and j. and a destination node k. At step 301 , for example, the last m-hops are determined for the two paths between nodes i and k and nodes j and k. For each of the hops h ranging from 1 to m, a hop similarity function HS^(h) is computed as shown in Equation 4 as follows, where N*k and
Figure imgf000012_0001
are the node id's for the hth hop on the paths between nodes i and k and nodes j and k respectively. Note that N^ and NJ h k could be part of kth entry in the feature vectors for nodes i and j as discussed before.
[0042] Equation 4: HS^(H) = 1 if (_V,*t = _V*t), else HS* ^h) = 0
[0043] For example, for m=4, in computing the feature vector for a node i, the intermediate nodes at the last 4 hops (h0> h-i, h2, h3) to each destination node k are used. Assume that the last four hops from node i to the node k are 110h, 110i, 110j and 110k, and the last four hops from node j to the node k is 110h, 110i, 110x, 110y. The results of equation 4 for nodes i and j with respect to destination k is 1 , 1 , 0, and 0, because h0 and hi are the same in both feature vectors and h2 and h3 are different. [0044] The path similarity (PS) of two paths from node i to k and node j to k is computed as a function of the sum of HS^(H) for each of the m hops as follows: m
[0045] Equation 5: PS* = -*≡*
'J m
[0046] In the example above where the last four hops from node i to the node k are 110h, 110i, 110j and 110k and the last four hops from node j to the node k are 110h, 110i, 110x, 110y, the result of equation 5 is 2/4.
[0047] PS,,) is averaged over the set of all other destination nodes k, such that k ≠ i, j. The normalized PS is the distance metric and is calculated using Equation 6:
[0048] Equation 6: PS,,, = _ Vλ≠i.y
(π - 2)
[0049] Thus, at step 302, a distance metric matrix including the distance metric for every node pair is created. If a known clustering function, such as k- means clustering function, is used to form the clusters, the distance matrix metric along with the number of clusters to be formed is input into the clustering function to form the clusters of nodes.
[0050] At step 303, a cluster head is selected for each cluster. For example, once the clusters are created, each cluster elects its cluster representative, i.e., the cluster head, which then conducts bandwidth measurements to the nodes outside the cluster. The cluster representative may be chosen by a number of techniques.
[0051] In a direct approach for determining the cluster head, the cluster head is chosen, for example randomly, and available bandwidth measurements from the cluster head are considered estimations from all the nodes in the cluster.
[0052] Available bandwidth measurements are also performed to obtain the bandwidths between the nodes inside each cluster. These measurements may be used to identify a bottleneck link close to the source and for selecting a cluster head using a second approach, referred to as the min-use approach. In this approach, if available bandwidth between a node in the cluster, referred to as a source node in the cluster, and the cluster head is less than the available bandwidth between the cluster head and a node outside the cluster, referred to as a destination node outside the cluster, the available bandwidth between the source node in the cluster and the cluster head is used as the estimation of available bandwidth between the source node and that destination node. The min-use approach accounts for bottleneck links that may be closer to the source node rather than the destination node. These bottleneck links may be used as the estimation of available bandwidth from the nodes in the cluster. If the bandwidths between the cluster head and the nodes outside the cluster are smaller than the bandwidths between the nodes in the cluster and the cluster head, the bottleneck links may be close to the destination. Then, the bandwidths between the cluster head and the nodes outside the cluster may be used as the estimation of available bandwidth for the nodes in the cluster.
[0053] For example, nodes 110e and 110j are in the same cluster, and the node 110e is selected as the cluster head using the direct approach. The node 110e measures available bandwidths to all the nodes outside the cluster. Assume the node is 110g is outside the cluster. If the available bandwidth between 110e and 110g is IOMbps and the available bandwidth between 110e and 110j is 5 Mbps, then 5 Mbps may be used as the available bandwidth to the destination 110g from node 110j. If the available bandwidth between another node in the cluster and 110e is less than 5 Mbps, then that available bandwidth may be used as the available bandwidth to the destination 110g from that node. [0054] At step 304, available bandwidth measurements from a single node in the cluster are used as an estimation of available bandwidth from all the nodes in the cluster.
[0055] Figure 4 illustrates an exemplary block diagram of a computer system 400 that may be used as a node in the network 100. The computer system 400 includes one or more processors, such as processor 402, providing an execution platform for executing software.
[0056] Commands and data from the processor 402 are communicated over a communication bus 405. The computer system 400 also includes a main memory 404, such as a Random Access Memory (RAM), where software may be resident during runtime, and a secondary memory 406. The secondary memory 406 includes, for example, a hard disk drive and/or a removable storage drive, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc., or a nonvolatile memory where a copy of the software may be stored. The secondary memory 406 may also include ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM). In addition to software for routing and other steps described herein, routing tables, capacities for overlay paths, available bandwidths for overlay paths, and other data may be stored in the main memory 404 and/or the secondary memory 406. The memories 404 and/or 406 may store network metric measurements, including feature vectors and measured available bandwidths.
[0057] A user interfaces with the computer system 400 with one or more
I/O devices 404, such as a keyboard, a mouse, a stylus, display, and the like. A network interface 416 is provided for communicating with other nodes in the network 100.
[0058] One or more of the steps of the method 300 and other steps described herein may be implemented as software embedded on a computer readable medium, such as the memory 404 and/or 406, and executed on the computer system 400, for example, by the processor 402. The steps may be embodied by a computer program, which may exist in a variety of forms both active and inactive. For example, they may exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats for performing some of the steps. Any of the above may be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form. Examples of suitable computer readable storage devices include conventional computer system RAM (random access memory), ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes. Examples of computer readable signals, whether modulated using a carrier or not, are signals that a computer system hosting or running the computer program may be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of the programs on a CD ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general. It is therefore to be understood that those functions enumerated below may be performed by any electronic device capable of executing the above-described functions.
[0059] While the embodiments have been described with reference to examples, those skilled in the art will be able to make various modifications to the described embodiments without departing from the scope of the claimed embodiments.

Claims

What is claimed is:
1. A method of estimating available bandwidth between nodes 110 in a network 100, the method comprising: determining feature vectors for each node based on a network metric
(step 301 ); determining clusters of the nodes based on the feature vectors (step 302); selecting a cluster head for each cluster (step 303); for each cluster, determining available bandwidths between the cluster head and nodes outside the cluster (step 304); and for each cluster head, using the available bandwidths between the cluster head and nodes outside the cluster as estimations of available bandwidths for the nodes in the cluster (step 304).
2. The method of claim 1 , wherein determining feature vectors comprises: measuring capacity from each node to every other node in the network
100 to determine the feature vectors.
3. The method of claim 1 , wherein determining feature vectors comprises: determining last m-hops in paths between each node and every other node in the network 100 to determine the feature vectors.
4. The method of claim 1 , wherein determining clusters of the nodes based on the feature vectors comprises: for every pair of the nodes, determining a sameness of the nodes based on the network metric; and placing each pair of the nodes in the same cluster based on the sameness.
5. The method of claim 4, wherein determining a sameness comprises: computing a distance metric from the feature vectors for each pair of nodes; and determining the sameness for the pair of nodes based on the distance metric.
6. The method of claim 5, wherein determining clusters comprises: using the distance metrics for all the node pairs as input to a clustering function to determine the clusters.
7. The method of claim 5, wherein the feature vectors comprise capacity measurements, every node pair is represented by (i, j) and there are n nodes in the network, and computing the distance metric comprises: for each pair of nodes computing an average of a normalized difference between the capacity from node i and from node j to each one of other (n-2) nodes.
8. The method of claim 5, wherein the feature vectors comprise last m- hops, every node pair is represented by (i, j) and there are n nodes in the network, computing the distance metric comprises: for each pair of nodes computing a value indicative of a fraction of nodes that are common between the routes from nodes i and j to all other nodes in the network; and averaging the values over n-2.
9. A node of a plurality of nodes in a cluster, wherein the node is a cluster head of the cluster and the plurality of nodes are in a network 100, the node comprising: a memory 404 storing available bandwidth measurements between the node and nodes in the network 100 outside the cluster; and a processor 402 operable to determine whether the available bandwidth measurements between the node and the nodes outside the cluster are estimations of available bandwidth for all the nodes in the cluster based on whether bottleneck links are located close to the nodes outside the cluster or located close to the cluster head.
10. The node of claim 9, wherein the memory 404 stores a feature vector of network metric values, and the network metric values are associated with network paths between the node and other nodes in the network 100, wherein the node is placed in a same cluster as all other nodes in the plurality of nodes based on a comparison of the feature vector for the node and the feature vectors for all the other nodes in the plurality of nodes in the cluster.
PCT/US2008/004424 2007-04-13 2008-04-02 Available bandwidth estimation WO2008127574A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN200880020035.4A CN101682548B (en) 2007-04-13 2008-04-02 Available bandwidth estimation
EP08742575.7A EP2137888B1 (en) 2007-04-13 2008-04-02 Available bandwidth estimation

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/787,008 2007-04-13
US11/787,008 US7813351B2 (en) 2007-04-13 2007-04-13 Available bandwidth estimation

Publications (1)

Publication Number Publication Date
WO2008127574A1 true WO2008127574A1 (en) 2008-10-23

Family

ID=39853606

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/004424 WO2008127574A1 (en) 2007-04-13 2008-04-02 Available bandwidth estimation

Country Status (4)

Country Link
US (1) US7813351B2 (en)
EP (1) EP2137888B1 (en)
CN (1) CN101682548B (en)
WO (1) WO2008127574A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12107760B2 (en) 2019-09-06 2024-10-01 Huawei Technologies Co., Ltd. Transmitting traffic on path between nodes in network device based on available bandwidths

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8275866B2 (en) * 2007-11-13 2012-09-25 At&T Intellectual Property I, L.P. Assigning telecommunications nodes to community of interest clusters
US8315164B2 (en) * 2008-12-11 2012-11-20 Skype Controlling packet transmission
GB2466208B (en) * 2008-12-11 2013-09-11 Skype Controlling packet transmission
IL216207A (en) * 2011-11-08 2017-05-29 Google Inc Splitting a network traffic flow
JP2014044677A (en) * 2012-08-28 2014-03-13 Fujitsu Ltd Transmission control program, communication node, and transmission control method
US9680915B2 (en) * 2012-09-12 2017-06-13 Infosys Limited Methods for clustering networks based on topology discovery and devices thereof
US9231843B2 (en) 2012-11-29 2016-01-05 International Business Machines Corporation Estimating available bandwith in cellular networks
US9455868B2 (en) * 2013-07-01 2016-09-27 Empire Technology Development Llc Formation of guilds in a cloud computing environment
US9781610B2 (en) * 2013-12-18 2017-10-03 Qualcomm Incorporated Small cell clusters for signaling load reduction, time synchronization, KPI filtering and spectrum coordination
DE102014103702B4 (en) * 2014-03-18 2017-08-03 Intel IP Corporation Method and apparatus for processing resource blocks
US9338714B2 (en) * 2014-04-24 2016-05-10 United States Cellular Corporation System and method for providing mobile wireless data network connectivity via vehicle-installed small cell
US10225761B2 (en) 2014-11-06 2019-03-05 At&T Intellectual Property I, L.P. Enhanced network congestion application programming interface
CN105490873B (en) * 2015-11-25 2019-01-11 上海大学 The available network bandwidth measurement method of expansion attack can be resisted
CN105897582A (en) * 2015-12-07 2016-08-24 乐视云计算有限公司 Inter-node distance measurement method and system
US10069689B1 (en) * 2015-12-18 2018-09-04 Amazon Technologies, Inc. Cache based on dynamic device clustering
CN109165322B (en) * 2018-08-01 2022-04-19 成都数联铭品科技有限公司 Network feature extraction system and method based on path relation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204623A1 (en) 2002-04-29 2003-10-30 Harris Corporation Hierarchical mobile ad-hoc network and methods for performing reactive routing therein
US20050120105A1 (en) 2003-12-01 2005-06-02 Popescu George V. Method and apparatus to support application and network awareness of collaborative applications using multi-attribute clustering

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5758257A (en) * 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles
US6920171B2 (en) * 2000-12-14 2005-07-19 Motorola, Inc. Multiple access frequency hopping network with interference anticipation
US7764617B2 (en) * 2002-04-29 2010-07-27 Harris Corporation Mobile ad-hoc network and methods for performing functions therein based upon weighted quality of service metrics
US7729268B2 (en) * 2002-06-28 2010-06-01 Ntt Docomo, Inc. Method and apparatus for quality of service determination
US20040059830A1 (en) * 2002-09-17 2004-03-25 Sockeye Networks, Inc. Network address space clustering employing topological groupings, distance measurements and structural generalization
US20050002372A1 (en) * 2003-06-13 2005-01-06 Johan Rune Method of and system for intra-piconet scheduling
US7706282B2 (en) * 2003-06-25 2010-04-27 Leping Huang Bluetooth personal area network routing protocol optimization using connectivity metric
TWI234970B (en) * 2003-12-05 2005-06-21 Inst Information Industry Method and system for route selection and method for route reconstruction
CN100518055C (en) * 2003-12-10 2009-07-22 联想(北京)有限公司 Secure data transmission method
US7978710B2 (en) * 2004-03-26 2011-07-12 Qualcomm Incorporated Synchronous inter-piconet routing
US20070160016A1 (en) * 2006-01-09 2007-07-12 Amit Jain System and method for clustering wireless devices in a wireless network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204623A1 (en) 2002-04-29 2003-10-30 Harris Corporation Hierarchical mobile ad-hoc network and methods for performing reactive routing therein
US20050120105A1 (en) 2003-12-01 2005-06-02 Popescu George V. Method and apparatus to support application and network awareness of collaborative applications using multi-attribute clustering

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DHURANDHER S.K. AND SINGH G.V.: "Weight based adaptive clustering in wireless ad hoc networks", 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005. ICPWC 2005, 23 January 2005 (2005-01-23) - 25 January 2005 (2005-01-25), pages 95 - 100, XP010799035 *
MAVROMOUSTAKIS C.X. AND KARATZA H.D.: "Bandwidth clustering for reliable and prioritized network routing using split agent-based method", 25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, 2005, 6 June 2005 (2005-06-06) - 10 June 2005 (2005-06-10), pages 89 - 94, XP010808041 *
See also references of EP2137888A4

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12107760B2 (en) 2019-09-06 2024-10-01 Huawei Technologies Co., Ltd. Transmitting traffic on path between nodes in network device based on available bandwidths

Also Published As

Publication number Publication date
CN101682548A (en) 2010-03-24
US20080253286A1 (en) 2008-10-16
EP2137888A4 (en) 2012-02-22
EP2137888A1 (en) 2009-12-30
US7813351B2 (en) 2010-10-12
CN101682548B (en) 2013-06-19
EP2137888B1 (en) 2013-08-21

Similar Documents

Publication Publication Date Title
EP2137888B1 (en) Available bandwidth estimation
US9420513B1 (en) Clustering approach to estimating a network metric for nodes
US7643426B1 (en) Path selection in a network
US8982709B2 (en) Selecting service nodes for an end-to-end service path from a reduced search space
JP4226922B2 (en) Peer-to-peer based network performance measurement and analysis system and method for large networks
US8068417B1 (en) System, method, and computer program product for processing flow requests based on an associated preference using a single computation
US6947386B2 (en) Practical network node coordinate estimation
US8660018B2 (en) Machine learning approach for estimating a network path property
US10924388B1 (en) Multi-path routing
JP4854078B2 (en) Method, system, and program for generating an annotated network topology
Pei et al. Blockchain-enabled dynamic spectrum access: cooperative spectrum sensing, access and mining
CN102075359B (en) A kind of server disposition method of coordinate Network Based and device
CN101854299A (en) Dynamic load balancing method of release/subscription system
CN113032096A (en) SFC mapping method based on node importance and user demand dual perception
EP3515018B1 (en) Method, apparatus and system for measuring network path
CN103825963B (en) Virtual Service moving method
CN112970231A (en) Method for intelligent multi-hop overlay routing
CN116074204A (en) Routing method, routing computing device, electronic device, and computer storage medium
Qiao et al. Load balancing in peer-to-peer systems using a diffusive approach
US10623306B2 (en) Multi-path routing
Bikas et al. Improving QoE With Genetic Algorithm-Based Path Selection for MPTCP
US9860159B1 (en) Multi-path routing
CN118250765B (en) Large-scale networking low-overhead routing method based on fuzzy visual constraint flooding
Xing et al. Predicting available bandwidth of internet path with ultra metric space-based approaches
Li et al. MPTCP-based link congestion detection and traffic control scheme in software-defined networks

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200880020035.4

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08742575

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2008742575

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE