WO2008127574A1 - Available bandwidth estimation - Google Patents
Available bandwidth estimation Download PDFInfo
- Publication number
- WO2008127574A1 WO2008127574A1 PCT/US2008/004424 US2008004424W WO2008127574A1 WO 2008127574 A1 WO2008127574 A1 WO 2008127574A1 US 2008004424 W US2008004424 W US 2008004424W WO 2008127574 A1 WO2008127574 A1 WO 2008127574A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- nodes
- node
- cluster
- network
- feature vectors
- Prior art date
Links
- 239000013598 vector Substances 0.000 claims abstract description 36
- 241000854291 Dianthus carthusianorum Species 0.000 claims abstract description 25
- 238000005259 measurement Methods 0.000 claims description 28
- 238000000034 method Methods 0.000 claims description 16
- 230000015654 memory Effects 0.000 claims description 13
- 230000006870 function Effects 0.000 claims description 12
- 235000008694 Humulus lupulus Nutrition 0.000 claims description 10
- 238000012935 Averaging Methods 0.000 claims description 2
- 238000013459 approach Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 238000003064 k means clustering Methods 0.000 description 3
- ODCKICSDIPVTRM-UHFFFAOYSA-N [4-[2-hydroxy-3-(propan-2-ylazaniumyl)propoxy]naphthalen-1-yl] sulfate Chemical compound C1=CC=C2C(OCC(O)CNC(C)C)=CC=C(OS(O)(=O)=O)C2=C1 ODCKICSDIPVTRM-UHFFFAOYSA-N 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
- H04L45/123—Evaluation of link metrics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/147—Network analysis or design for predicting network behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
- H04L45/125—Shortest path evaluation based on throughput or bandwidth
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/26—Route discovery packet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/302—Route determination based on requested QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/46—Cluster building
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/12—Avoiding congestion; Recovering from congestion
- H04L47/127—Avoiding congestion; Recovering from congestion by using congestion prediction
Definitions
- QoS Quality of Service
- FIG. 1 illustrates a network including nodes, according to an embodiment
- Figures 2A-B illustrate examples of nodes that may and may not be clustered, according to an embodiment
- Figure 3 illustrates a flow chart of a method for estimating available bandwidth, according to an embodiment
- Figure 4 illustrates a computer system, according to an embodiment.
- a relatively stable network metric when compared to available bandwidth, is used to identify clusters of nodes that are likely to have similar available bandwidths to other nodes in the network.
- Examples of a stable network metric include but are not limited to capacity and last m-hops in network paths.
- a representative node is selected from each cluster, referred to as the cluster head, and available bandwidth is measured from the cluster head to all other nodes in the network outside the cluster.
- the measured available bandwidth from the cluster head may be used as an estimation of available bandwidth from each of the nodes in the cluster.
- much fewer available bandwidth measurements are performed to determine available bandwidth between all the nodes in a network. This represents a significant savings in terms of network traffic and time to determine available bandwidth between the nodes in a network.
- the available bandwidths may be stored, displayed or conveyed to a user or another node in the network.
- the available bandwidths may be used to select a path for transmitting data to a destination.
- the available bandwidths are used to select a path that meets the requirements for providing a service. For example, a service provided to a user over a network, such as the Internet, may require a minimum available bandwidth.
- a path is selected in the network that has an available bandwidth greater than or equal to the required minimum available bandwidth.
- Other network metrics such as latency, throughput, loss rate, etc., in addition to available bandwidth, may be considered when selecting a path.
- capacity is the maximum transmission rate of a data transmission on a link or end-to-end path, assuming the data transmission has full access to the link or path without any other network traffic on the link or path. Capacity measurements create network traffic. However, a capacity measurement is typically valid for a much longer period of time, so the periodicity of performing these measurements to be used for determining available bandwidth is less.
- Available bandwidth is the transmission rate of a data transmission on a link or path with other network traffic on the link or path.
- the network traffic typically varies over time, so the available bandwidth varies over time and is generally less stable than capacity.
- Equation 1 provides a more formal description of available bandwidth for a path as the minimum unused capacity of the path during a time interval (ti,t 2 ).
- Equation 1 AB is the available bandwidth in bits per second
- An end-to-end path in a network between a source and a destination also referred to as a path or network path, may be comprised of one or more links.
- the available bandwidth or capacity of a path comprised of multiple links may be characterized by the link in the path having the lowest capacity or lowest available bandwidth. This link may be referred to as the bottleneck link.
- Figure 1 illustrates a network 100 including nodes.
- An example of the network 100 includes a large-scale network, such as the Internet. However, the embodiments may be implemented in smaller networks.
- a node is any device that may send and/or receive messages via the network and that is typically operable to perform some type of data processing.
- nodes include routers, servers, and end-user devices, such as personal digital assistants (PDAs), personal computers, laptops, and cellular phones.
- PDAs personal digital assistants
- the nodes 110 may be operable to route data in the network 100 along network paths.
- Figure 1 shows a source node 110x and a destination node 110y.
- a path 130 between the source node 110x and the destination node 110y includes links 131a-e and intermediate nodes 110r-u.
- the path 130 for example, is an IP network path for routing data between the source node 110x and the destination node 110y, as is known in the art.
- the slowest link of the path 130 determines the maximum available bandwidth of the entire path 130. For example, if the available bandwidths for the links 131a-e are 20, 50, 100, 30 and 1 Mbps respectively, the maximum available bandwidth for the path 130 is 1 Mbps. If a service, such as streaming media, or a bulk transfer of data to be provided to the destination node 110y requires over 1 Mbps to provide the service, the path 130 may not be selected to provide the service if another path to the destination node 110y with available bandwidth greater than 1 Mbps is available for providing the service. For example, another path and/or another source providing the same service may be used to provide the service. The path 130 may be selected if the service requires less than or equal to 1 Mbps available bandwidth. Similarly to available bandwidth, the link having the lowest capacity in the path 130 may be used as the maximum capacity of the entire path 130.
- nodes are clustered to estimate available bandwidth with reduced overhead. Nodes are clustered based on the sameness of their view of the network in terms of a network metric, such as bandwidth, capacity, last m-hops, etc.
- Figures 2A-B illustrate examples of nodes that can or cannot be clustered based on their views of the network.
- FIG. 2A illustrates nodes 110e-j in the network 100.
- Each of the nodes 110e-j measures a network metric, in this example bandwidth, to all the other nodes.
- Figure 2A shows the measured bandwidths, which are access bandwidth for each of the nodes.
- the access bandwidth is the transmission rate on the link closest to the node providing access to the network.
- the lowest bandwidth of any path i.e., the bandwidth of the bottleneck link in the path
- the access bandwidths for the nodes 110e-j are 100, 10, 50, 50, 1 and 100 Mbps, respectively.
- the view of the network for the node 110e is the bandwidth for each of the paths from the node 110e to the nodes 110f-i, respectively in this example.
- the view 201 e includes 10, 50, 50, and 1 Mbps, which are the bandwidths for the paths between the node 110e and the nodes 110f-i, respectively.
- the view of the network for the node 110j shown as 201 j, includes 10, 50, 50, and 1 Mbps, which are the access bandwidths for the nodes 110f-i, respectively.
- the view 201 j represents the bandwidth for each of the paths from the node 110e to the nodes 11Of-I, respectively.
- the views 201 e and 201 j are the same, and thus the nodes 11Oe and 11Oj may be clustered for estimating available bandwidth.
- Figure 2B is an example of nodes that cannot be clustered.
- the view of the network for the node 110e shown as 201 e, includes 10, 50, 50, and 1 Mbps, as described above.
- the view 201 k for the node 110k is 1 , 1 , 1 , 1 Mbps, which are the bandwidths for the paths between the node 11 Ok and the nodes 110f-i, respectively.
- the bandwidth is 1 Mbps for each path because that is the bandwidth of the bottleneck link of each path.
- the views 201 e and 201k are substantially different . Thus, the nodes 110e and 110k may not be clustered.
- Figure 3 illustrates a method for estimating available bandwidth using a clustering approach.
- Figure 3 is described with respect to figures 1 and 2A-B by way of example and not limitation.
- feature vectors are determined for each node.
- the views 201 e, 201 j, and 201k are examples of feature vectors.
- each node measures a network metric between itself and every other node in the network or a set of nodes in the network. The measurements are the feature vector.
- the views 201 e, 201j, and 201k shown in figures 2A-B are examples of feature vectors and the network metric is bandwidth for those feature vectors.
- the feature vectors include capacity measurements.
- the nodes 110e-j shown in figure 2A each measure capacity to each other to determine feature vectors for each of the nodes.
- Bandwidth and capacity measurement tools known in the art may be used to perform the measurements.
- Capacity measurements create network traffic. However, capacity is a relatively stable network metric and is typically valid for a much longer period of time, when compared to other metrics, such as available bandwidth, which are dependent on current network traffic. Thus, the periodicity of performing capacity measurements for feature vectors to be used for determining available bandwidth is less. Furthermore, since it has been observed that tight and narrow links in a path tend to be the same, capacity may be leveraged to determine available bandwidth for a path.
- the feature vectors include the last m- hops for each path.
- each of the nodes 110e-j shown in figure 2A perform traceroutes to each other.
- the traceroutes are used to determine the last m-hops for each path between each of the nodes 110e-j.
- the feature vector for the node 110e includes the last 4 hops in each path between the node 110e and the nodes 110f-i. This may include a unique ID of the last four nodes in each path or some other representation of the last four nodes in each path. Since it has been observed that many paths in a large network are shared, nodes that are common for two different paths may be used as the metric for clustering.
- the feature vectors are used to form clusters.
- Clusters are formed based on the "sameness" of the nodes view of the network in terms of a network metric, such as capacity, last hops in a path, etc. Sameness is determined from the feature vectors and distance metrics computed from the feature vectors as described below.
- feature vectors are comprised of capacity measurements.
- a distance metric between any two given nodes in the network is computed to determine sameness between the nodes and to form clusters. For example, given a node pair and assuming n number of nodes are in the network, the distance metric is the average of the normalized differences between the capacity from the first node in the pair and the capacity from the second node in the pair to each other (n-2) nodes. For example, two nodes, such as the node 110e and the node 110j, shown in figure 2A, are being compared.
- the average of the normalized differences between the capacity from node 110e and the capacity from the node 110j to each of the other (n-2) nodes is computed. This computation is performed for every node pair.
- the result for each computation for example, is a number between 0 and 1.
- the pair is either placed in the same cluster or not.
- the computation results are used as input to a known clustering function, such as k-means clustering, and the function determines the clusters.
- Equation 2 Given n number of nodes in the network, a computation is performed for each node pair (i, j). At step 301 , for example, capacity is measured from each of the nodes i and j to every other node in the network to determine the feature vectors. A capacity measurement from the node i to a node k is represented as Cap(N iik ), and Cap(Nj k ) represents the capacity measurement from the node j to node k in the network. A difference is computed. The difference is the capacity from node i to node k minus the capacity from node j to node k. The difference is divided by the maximum of the capacities from node i to node k and from node j to node k. This computation is represented by Equation 2 as follows:
- Equation 2 Diff k
- Equation 3 The difference calculated in equation 2 is averaged across all other (n-2) nodes in the network.
- equation 2 is calculated for each node k, where k represents the nodes in the network othen than the nodes i and j.
- the number of nodes k is (n-2).
- Equation 3 The computation for averaging the differences across all other (n-2) nodes is shown in Equation 3 as follows:
- the normalized difference calculated in Equation 3, for example, is a number between 0 and 1 and is the distance metric for the pair. If the capacities are the same, then the difference is 0 and then the nodes i and j have the same view and are placed in the same cluster. Generally, if the normalized difference is closer to 0, the nodes are placed in the same cluster. If the normalized difference is closer to 1 , the nodes are not placed in the same cluster.
- the results of Equation 3 for each node pair in the network are used as input to a known clustering function, such as k-means clustering, and the function determines the clusters.
- the distance metric may be calculated for a subset of nodes in the network instead of all the nodes in the network.
- n is a number of nodes in the subset of nodes in the network
- (n-2) is a number of the nodes in the subset except for the node pair
- k represents each node in the subset.
- paths are used to determine feature vectors. For example, as described above, the last m-hops to all destination nodes are provided in the feature vectors for each node.
- a distance metric representing path similarity is calculated, which measures the fraction of nodes that are common between the routes from two nodes in a node pair to a common destination and averages over all destinations. Any standard clustering technique may then be applied to obtain the clusters.
- a distance metric of 1 implies nodes can be clustered and a distance metric of 0 implies nodes cannot be clustered.
- a hop similarity function HS ⁇ (h) is computed as shown in Equation 4 as follows, where N* k and are the node id's for the h th hop on the paths between nodes i and k and nodes j and k respectively. Note that N ⁇ and N J h k could be part of k th entry in the feature vectors for nodes i and j as discussed before.
- PS,, is averaged over the set of all other destination nodes k, such that k ⁇ i, j.
- the normalized PS is the distance metric and is calculated using Equation 6:
- a distance metric matrix including the distance metric for every node pair is created. If a known clustering function, such as k- means clustering function, is used to form the clusters, the distance matrix metric along with the number of clusters to be formed is input into the clustering function to form the clusters of nodes.
- k- means clustering function
- a cluster head is selected for each cluster. For example, once the clusters are created, each cluster elects its cluster representative, i.e., the cluster head, which then conducts bandwidth measurements to the nodes outside the cluster.
- the cluster representative may be chosen by a number of techniques.
- the cluster head is chosen, for example randomly, and available bandwidth measurements from the cluster head are considered estimations from all the nodes in the cluster.
- Available bandwidth measurements are also performed to obtain the bandwidths between the nodes inside each cluster. These measurements may be used to identify a bottleneck link close to the source and for selecting a cluster head using a second approach, referred to as the min-use approach.
- the min-use approach if available bandwidth between a node in the cluster, referred to as a source node in the cluster, and the cluster head is less than the available bandwidth between the cluster head and a node outside the cluster, referred to as a destination node outside the cluster, the available bandwidth between the source node in the cluster and the cluster head is used as the estimation of available bandwidth between the source node and that destination node.
- the min-use approach accounts for bottleneck links that may be closer to the source node rather than the destination node.
- These bottleneck links may be used as the estimation of available bandwidth from the nodes in the cluster. If the bandwidths between the cluster head and the nodes outside the cluster are smaller than the bandwidths between the nodes in the cluster and the cluster head, the bottleneck links may be close to the destination. Then, the bandwidths between the cluster head and the nodes outside the cluster may be used as the estimation of available bandwidth for the nodes in the cluster.
- nodes 110e and 110j are in the same cluster, and the node 110e is selected as the cluster head using the direct approach.
- the node 110e measures available bandwidths to all the nodes outside the cluster. Assume the node is 110g is outside the cluster. If the available bandwidth between 110e and 110g is IOMbps and the available bandwidth between 110e and 110j is 5 Mbps, then 5 Mbps may be used as the available bandwidth to the destination 110g from node 110j. If the available bandwidth between another node in the cluster and 110e is less than 5 Mbps, then that available bandwidth may be used as the available bandwidth to the destination 110g from that node. [0054] At step 304, available bandwidth measurements from a single node in the cluster are used as an estimation of available bandwidth from all the nodes in the cluster.
- Figure 4 illustrates an exemplary block diagram of a computer system 400 that may be used as a node in the network 100.
- the computer system 400 includes one or more processors, such as processor 402, providing an execution platform for executing software.
- the computer system 400 also includes a main memory 404, such as a Random Access Memory (RAM), where software may be resident during runtime, and a secondary memory 406.
- the secondary memory 406 includes, for example, a hard disk drive and/or a removable storage drive, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc., or a nonvolatile memory where a copy of the software may be stored.
- the secondary memory 406 may also include ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM).
- routing tables, capacities for overlay paths, available bandwidths for overlay paths, and other data may be stored in the main memory 404 and/or the secondary memory 406.
- the memories 404 and/or 406 may store network metric measurements, including feature vectors and measured available bandwidths.
- a user interfaces with the computer system 400 with one or more
- I/O devices 404 such as a keyboard, a mouse, a stylus, display, and the like.
- a network interface 416 is provided for communicating with other nodes in the network 100.
- One or more of the steps of the method 300 and other steps described herein may be implemented as software embedded on a computer readable medium, such as the memory 404 and/or 406, and executed on the computer system 400, for example, by the processor 402.
- the steps may be embodied by a computer program, which may exist in a variety of forms both active and inactive. For example, they may exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats for performing some of the steps. Any of the above may be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form.
- Examples of suitable computer readable storage devices include conventional computer system RAM (random access memory), ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes.
- Examples of computer readable signals are signals that a computer system hosting or running the computer program may be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of the programs on a CD ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general. It is therefore to be understood that those functions enumerated below may be performed by any electronic device capable of executing the above-described functions.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Feature vectors are nodes in a network 100 are computed based on a network metric. Clusters of the nodes are formed based on the feature vectors. A cluster head is selected for each cluster. Available bandwidths between the cluster head and nodes outside the cluster are determined. The available bandwidths between the cluster head and the nodes outside the cluster may be used as estimations of available bandwidths for the nodes in the cluster.
Description
AVAILABLE BANDWIDTH ESTIMATION
BACKGROUND
[0001] Large networks, such as the Internet, provide the infrastructure for many peer-to-peer systems and are now being used to provide a variety of services to users. Some recent Internet applications require high bandwidth. Live, high-quality, streaming video, video conferencing, and graphic-intensive multiplayer games are examples of high-bandwidth applications.
[0002] A fundamental challenge in effectively utilizing high-bandwidth network services is to provide these services and other data transmission without affecting the quality of the services. Quality of Service (QoS) routing is a major factor in providing these services. However, selecting routes that provide the performance required by the service is difficult.
[0003] Accurately measuring metrics for computing network routes can be difficult. This is especially true when determining bandwidth. Measuring bandwidth is a computational and resource intensive process. It is difficult to conduct bandwidth measurements for large networks, such as the Internet, having a large number of paths. Measuring simultaneously on multiple paths may cause interference to measurement tools and may generate cross traffic, thus making it difficult to get accurate measurements in real-time. Furthermore, bandwidth changes quite rapidly and the measurements need to be updated frequently. In a large network, continuously measuring bandwidth would be infeasible because of the large measurement overhead.
BRIEF DESCRIPTION OF THE DRAWINGS [0004] Various features of the embodiments can be more fully appreciated, as the same become better understood with reference to the following detailed description of the embodiments when considered in connection with the accompanying figures, in which:
[0005] Figure 1 illustrates a network including nodes, according to an embodiment;
[0006] Figures 2A-B illustrate examples of nodes that may and may not be clustered, according to an embodiment;
[0007] Figure 3 illustrates a flow chart of a method for estimating available bandwidth, according to an embodiment; and
[0008] Figure 4 illustrates a computer system, according to an embodiment.
DETAILED DESCRIPTION OF THE EMBODIMENTS [0009] According to embodiments described herein, efficient and scalable methods for estimating available bandwidth for an end-to-end path are provided. In one embodiment, a relatively stable network metric, when compared to available bandwidth, is used to identify clusters of nodes that are likely to have similar available bandwidths to other nodes in the network. Examples of a stable network metric include but are not limited to capacity and last m-hops in network paths. A representative node is selected from each cluster, referred to as the cluster head, and available bandwidth is measured from the cluster head to all other nodes in the network outside the cluster. The measured available bandwidth from the cluster head may be used as an estimation of available bandwidth from each of the nodes in the cluster. Thus, much fewer available bandwidth measurements are performed to determine available bandwidth between all the nodes in a network. This represents a significant savings in terms of network traffic and time to determine available bandwidth between the nodes in a network.
[0010] After the available bandwidths between the nodes are determined, the available bandwidths may be stored, displayed or conveyed to a user or another node in the network. The available bandwidths may be used to select a
path for transmitting data to a destination. In one example, the available bandwidths are used to select a path that meets the requirements for providing a service. For example, a service provided to a user over a network, such as the Internet, may require a minimum available bandwidth. A path is selected in the network that has an available bandwidth greater than or equal to the required minimum available bandwidth. Other network metrics, such as latency, throughput, loss rate, etc., in addition to available bandwidth, may be considered when selecting a path.
[0011] As used herein capacity is the maximum transmission rate of a data transmission on a link or end-to-end path, assuming the data transmission has full access to the link or path without any other network traffic on the link or path. Capacity measurements create network traffic. However, a capacity measurement is typically valid for a much longer period of time, so the periodicity of performing these measurements to be used for determining available bandwidth is less.
[0012] Available bandwidth is the transmission rate of a data transmission on a link or path with other network traffic on the link or path. The network traffic typically varies over time, so the available bandwidth varies over time and is generally less stable than capacity.
[0013] Equation 1 provides a more formal description of available bandwidth for a path as the minimum unused capacity of the path during a time interval (ti,t2).
[0014] Equation 1 : AB[tx,t2]= C- BJtxJ2) h - tχ
[0015] In Equation 1 , AB is the available bandwidth in bits per second
(bps) for the time interval (t1,t2>, C is the capacity of the path and B is the measured traffic on the path during the time interval.
[0016] An end-to-end path in a network between a source and a destination, also referred to as a path or network path, may be comprised of one or more links. The available bandwidth or capacity of a path comprised of multiple links may be characterized by the link in the path having the lowest capacity or lowest available bandwidth. This link may be referred to as the bottleneck link.
[0017] Figure 1 illustrates a network 100 including nodes. An example of the network 100 includes a large-scale network, such as the Internet. However, the embodiments may be implemented in smaller networks.
[0018] A node is any device that may send and/or receive messages via the network and that is typically operable to perform some type of data processing. Examples of nodes include routers, servers, and end-user devices, such as personal digital assistants (PDAs), personal computers, laptops, and cellular phones. The nodes 110 may be operable to route data in the network 100 along network paths.
[0019] Figure 1 shows a source node 110x and a destination node 110y.
A path 130 between the source node 110x and the destination node 110y includes links 131a-e and intermediate nodes 110r-u. The path 130, for example, is an IP network path for routing data between the source node 110x and the destination node 110y, as is known in the art.
[0020] The slowest link of the path 130 determines the maximum available bandwidth of the entire path 130. For example, if the available bandwidths for the links 131a-e are 20, 50, 100, 30 and 1 Mbps respectively, the maximum available bandwidth for the path 130 is 1 Mbps. If a service, such as streaming media, or a bulk transfer of data to be provided to the destination node 110y requires over 1 Mbps to provide the service, the path 130 may not be selected to provide the service if another path to the destination node 110y with available bandwidth greater than 1 Mbps is available for providing the
service. For example, another path and/or another source providing the same service may be used to provide the service. The path 130 may be selected if the service requires less than or equal to 1 Mbps available bandwidth. Similarly to available bandwidth, the link having the lowest capacity in the path 130 may be used as the maximum capacity of the entire path 130.
[0021] According to an embodiment, nodes are clustered to estimate available bandwidth with reduced overhead. Nodes are clustered based on the sameness of their view of the network in terms of a network metric, such as bandwidth, capacity, last m-hops, etc. Figures 2A-B illustrate examples of nodes that can or cannot be clustered based on their views of the network.
[0022] Figure 2A illustrates nodes 110e-j in the network 100. Each of the nodes 110e-j measures a network metric, in this example bandwidth, to all the other nodes. Figure 2A shows the measured bandwidths, which are access bandwidth for each of the nodes. The access bandwidth is the transmission rate on the link closest to the node providing access to the network. In the examples shown in figures 2A-B, the lowest bandwidth of any path (i.e., the bandwidth of the bottleneck link in the path) happens to be the access bandwidth of one of the two end nodes of the path, and thus the minimum of the end nodes' access bandwidths may be considered as the bandwidth for the entire path. As shown in figure 2A, the access bandwidths for the nodes 110e-j are 100, 10, 50, 50, 1 and 100 Mbps, respectively.
[0023] The view of the network for the node 110e, shown as 201 e, is the bandwidth for each of the paths from the node 110e to the nodes 110f-i, respectively in this example. The view 201 e includes 10, 50, 50, and 1 Mbps, which are the bandwidths for the paths between the node 110e and the nodes 110f-i, respectively. Similarly, the view of the network for the node 110j, shown as 201 j, includes 10, 50, 50, and 1 Mbps, which are the access bandwidths for the nodes 110f-i, respectively. The view 201 j represents the bandwidth for each of the paths from the node 110e to the nodes 11Of-I, respectively. The
views 201 e and 201 j are the same, and thus the nodes 11Oe and 11Oj may be clustered for estimating available bandwidth.
[0024] Figure 2B is an example of nodes that cannot be clustered. As shown in figure 2B, the view of the network for the node 110e, shown as 201 e, includes 10, 50, 50, and 1 Mbps, as described above. The view 201 k for the node 110k is 1 , 1 , 1 , 1 Mbps, which are the bandwidths for the paths between the node 11 Ok and the nodes 110f-i, respectively. The bandwidth is 1 Mbps for each path because that is the bandwidth of the bottleneck link of each path. The views 201 e and 201k are substantially different . Thus, the nodes 110e and 110k may not be clustered.
[0025] The examples shown in figures 2A-B are simplistic and it will be apparent to one of ordinary skill in the art that other metrics may be used to determine views of the network. Furthermore, views may not exactly match, but may still be considered close enough for placing the respective nodes in the same cluster. Criteria for comparing views to determine whether to place nodes in the same cluster are described in further detail below.
[0026] Through testing, it has been observed that many paths in a large network, such as the Internet, are shared. Also, most bottleneck links are in the first or last four hops in a path between a source and destination node. Also, tight and narrow links in a path are the same. A tight link is a link in a path with the smallest capacity. A narrow link is a link in a path with the smallest available bandwidth. Based on these observations, clustering approaches for determining available bandwidth for a path, according to embodiments, is described with respect to figure 3.
[0027] Figure 3 illustrates a method for estimating available bandwidth using a clustering approach. Figure 3 is described with respect to figures 1 and 2A-B by way of example and not limitation.
[0028] At step 301 , feature vectors are determined for each node. The views 201 e, 201 j, and 201k are examples of feature vectors. For example each node measures a network metric between itself and every other node in the network or a set of nodes in the network. The measurements are the feature vector. The views 201 e, 201j, and 201k shown in figures 2A-B are examples of feature vectors and the network metric is bandwidth for those feature vectors.
[0029] In one embodiment, the feature vectors include capacity measurements. For example, the nodes 110e-j shown in figure 2A each measure capacity to each other to determine feature vectors for each of the nodes. Bandwidth and capacity measurement tools known in the art may be used to perform the measurements.
[0030] Capacity measurements create network traffic. However, capacity is a relatively stable network metric and is typically valid for a much longer period of time, when compared to other metrics, such as available bandwidth, which are dependent on current network traffic. Thus, the periodicity of performing capacity measurements for feature vectors to be used for determining available bandwidth is less. Furthermore, since it has been observed that tight and narrow links in a path tend to be the same, capacity may be leveraged to determine available bandwidth for a path.
[0031] In another embodiment, the feature vectors include the last m- hops for each path. For example, each of the nodes 110e-j shown in figure 2A perform traceroutes to each other. The traceroutes are used to determine the last m-hops for each path between each of the nodes 110e-j. For example, if m=4, the feature vector for the node 110e includes the last 4 hops in each path between the node 110e and the nodes 110f-i. This may include a unique ID of the last four nodes in each path or some other representation of the last four nodes in each path. Since it has been observed that many paths in a large network are shared, nodes that are common for two different paths may be used as the metric for clustering.
[0032] At step 302, the feature vectors are used to form clusters.
Clusters are formed based on the "sameness" of the nodes view of the network in terms of a network metric, such as capacity, last hops in a path, etc. Sameness is determined from the feature vectors and distance metrics computed from the feature vectors as described below.
[0033] According to an embodiment, feature vectors are comprised of capacity measurements. Using the capacity measurements, a distance metric between any two given nodes in the network is computed to determine sameness between the nodes and to form clusters. For example, given a node pair and assuming n number of nodes are in the network, the distance metric is the average of the normalized differences between the capacity from the first node in the pair and the capacity from the second node in the pair to each other (n-2) nodes. For example, two nodes, such as the node 110e and the node 110j, shown in figure 2A, are being compared. Assuming the network 100 includes n number of nodes, the average of the normalized differences between the capacity from node 110e and the capacity from the node 110j to each of the other (n-2) nodes is computed. This computation is performed for every node pair. The result for each computation, for example, is a number between 0 and 1. Depending on where the threshold is set, the pair is either placed in the same cluster or not. Alternatively, the computation results are used as input to a known clustering function, such as k-means clustering, and the function determines the clusters.
[0034] Computing the distance metric for each pair of nodes is as follows: given n number of nodes in the network, a computation is performed for each node pair (i, j). At step 301 , for example, capacity is measured from each of the nodes i and j to every other node in the network to determine the feature vectors. A capacity measurement from the node i to a node k is represented as Cap(Niik), and Cap(Nj k) represents the capacity measurement from the node j to node k in the network. A difference is computed. The difference is the capacity from node i to node k minus the capacity from node j to node k. The difference
is divided by the maximum of the capacities from node i to node k and from node j to node k. This computation is represented by Equation 2 as follows:
'J Max(Cap(Nl k),Cap{Nj k))
[0036] The difference calculated in equation 2 is averaged across all other (n-2) nodes in the network. Thus, equation 2 is calculated for each node k, where k represents the nodes in the network othen than the nodes i and j. The number of nodes k is (n-2). The computation for averaging the differences across all other (n-2) nodes is shown in Equation 3 as follows:
[0038] The normalized difference calculated in Equation 3, for example, is a number between 0 and 1 and is the distance metric for the pair. If the capacities are the same, then the difference is 0 and then the nodes i and j have the same view and are placed in the same cluster. Generally, if the normalized difference is closer to 0, the nodes are placed in the same cluster. If the normalized difference is closer to 1 , the nodes are not placed in the same cluster. In one embodiment, the results of Equation 3 for each node pair in the network are used as input to a known clustering function, such as k-means clustering, and the function determines the clusters.
[0039] The distance metric may be calculated for a subset of nodes in the network instead of all the nodes in the network. For example, n is a number of nodes in the subset of nodes in the network; (n-2) is a number of the nodes in the subset except for the node pair; and k represents each node in the subset.
[0040] According to another embodiment, paths are used to determine feature vectors. For example, as described above, the last m-hops to all destination nodes are provided in the feature vectors for each node. A distance metric representing path similarity is calculated, which measures the fraction of nodes that are common between the routes from two nodes in a node pair to a common destination and averages over all destinations. Any standard clustering technique may then be applied to obtain the clusters. A distance metric of 1 implies nodes can be clustered and a distance metric of 0 implies nodes cannot be clustered.
[0041] Computing the distance metric for each pair of node is as follows: given n number of nodes in the network, a computation is performed for each pair of source nodes i and j. and a destination node k. At step 301 , for example, the last m-hops are determined for the two paths between nodes i and k and nodes j and k. For each of the hops h ranging from 1 to m, a hop similarity function HS^(h) is computed as shown in Equation 4 as follows, where N*k and
are the node id's for the hth hop on the paths between nodes i and k and nodes j and k respectively. Note that N^ and NJ h k could be part of kth entry in the feature vectors for nodes i and j as discussed before.
[0042] Equation 4: HS^(H) = 1 if (_V,*t = _V*t), else HS* ^h) = 0
[0043] For example, for m=4, in computing the feature vector for a node i, the intermediate nodes at the last 4 hops (h0> h-i, h2, h3) to each destination node k are used. Assume that the last four hops from node i to the node k are 110h, 110i, 110j and 110k, and the last four hops from node j to the node k is 110h, 110i, 110x, 110y. The results of equation 4 for nodes i and j with respect to destination k is 1 , 1 , 0, and 0, because h0 and hi are the same in both feature vectors and h2 and h3 are different.
[0044] The path similarity (PS) of two paths from node i to k and node j to k is computed as a function of the sum of HS^(H) for each of the m hops as follows: m
[0045] Equation 5: PS* = -*≡*
'J m
[0046] In the example above where the last four hops from node i to the node k are 110h, 110i, 110j and 110k and the last four hops from node j to the node k are 110h, 110i, 110x, 110y, the result of equation 5 is 2/4.
[0047] PS,,) is averaged over the set of all other destination nodes k, such that k ≠ i, j. The normalized PS is the distance metric and is calculated using Equation 6:
[0048] Equation 6: PS,,, = _ Vλ≠i.y
(π - 2)
[0049] Thus, at step 302, a distance metric matrix including the distance metric for every node pair is created. If a known clustering function, such as k- means clustering function, is used to form the clusters, the distance matrix metric along with the number of clusters to be formed is input into the clustering function to form the clusters of nodes.
[0050] At step 303, a cluster head is selected for each cluster. For example, once the clusters are created, each cluster elects its cluster representative, i.e., the cluster head, which then conducts bandwidth measurements to the nodes outside the cluster. The cluster representative may be chosen by a number of techniques.
[0051] In a direct approach for determining the cluster head, the cluster head is chosen, for example randomly, and available bandwidth measurements
from the cluster head are considered estimations from all the nodes in the cluster.
[0052] Available bandwidth measurements are also performed to obtain the bandwidths between the nodes inside each cluster. These measurements may be used to identify a bottleneck link close to the source and for selecting a cluster head using a second approach, referred to as the min-use approach. In this approach, if available bandwidth between a node in the cluster, referred to as a source node in the cluster, and the cluster head is less than the available bandwidth between the cluster head and a node outside the cluster, referred to as a destination node outside the cluster, the available bandwidth between the source node in the cluster and the cluster head is used as the estimation of available bandwidth between the source node and that destination node. The min-use approach accounts for bottleneck links that may be closer to the source node rather than the destination node. These bottleneck links may be used as the estimation of available bandwidth from the nodes in the cluster. If the bandwidths between the cluster head and the nodes outside the cluster are smaller than the bandwidths between the nodes in the cluster and the cluster head, the bottleneck links may be close to the destination. Then, the bandwidths between the cluster head and the nodes outside the cluster may be used as the estimation of available bandwidth for the nodes in the cluster.
[0053] For example, nodes 110e and 110j are in the same cluster, and the node 110e is selected as the cluster head using the direct approach. The node 110e measures available bandwidths to all the nodes outside the cluster. Assume the node is 110g is outside the cluster. If the available bandwidth between 110e and 110g is IOMbps and the available bandwidth between 110e and 110j is 5 Mbps, then 5 Mbps may be used as the available bandwidth to the destination 110g from node 110j. If the available bandwidth between another node in the cluster and 110e is less than 5 Mbps, then that available bandwidth may be used as the available bandwidth to the destination 110g from that node.
[0054] At step 304, available bandwidth measurements from a single node in the cluster are used as an estimation of available bandwidth from all the nodes in the cluster.
[0055] Figure 4 illustrates an exemplary block diagram of a computer system 400 that may be used as a node in the network 100. The computer system 400 includes one or more processors, such as processor 402, providing an execution platform for executing software.
[0056] Commands and data from the processor 402 are communicated over a communication bus 405. The computer system 400 also includes a main memory 404, such as a Random Access Memory (RAM), where software may be resident during runtime, and a secondary memory 406. The secondary memory 406 includes, for example, a hard disk drive and/or a removable storage drive, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc., or a nonvolatile memory where a copy of the software may be stored. The secondary memory 406 may also include ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM). In addition to software for routing and other steps described herein, routing tables, capacities for overlay paths, available bandwidths for overlay paths, and other data may be stored in the main memory 404 and/or the secondary memory 406. The memories 404 and/or 406 may store network metric measurements, including feature vectors and measured available bandwidths.
[0057] A user interfaces with the computer system 400 with one or more
I/O devices 404, such as a keyboard, a mouse, a stylus, display, and the like. A network interface 416 is provided for communicating with other nodes in the network 100.
[0058] One or more of the steps of the method 300 and other steps described herein may be implemented as software embedded on a computer
readable medium, such as the memory 404 and/or 406, and executed on the computer system 400, for example, by the processor 402. The steps may be embodied by a computer program, which may exist in a variety of forms both active and inactive. For example, they may exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats for performing some of the steps. Any of the above may be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form. Examples of suitable computer readable storage devices include conventional computer system RAM (random access memory), ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes. Examples of computer readable signals, whether modulated using a carrier or not, are signals that a computer system hosting or running the computer program may be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of the programs on a CD ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general. It is therefore to be understood that those functions enumerated below may be performed by any electronic device capable of executing the above-described functions.
[0059] While the embodiments have been described with reference to examples, those skilled in the art will be able to make various modifications to the described embodiments without departing from the scope of the claimed embodiments.
Claims
1. A method of estimating available bandwidth between nodes 110 in a network 100, the method comprising: determining feature vectors for each node based on a network metric
(step 301 ); determining clusters of the nodes based on the feature vectors (step 302); selecting a cluster head for each cluster (step 303); for each cluster, determining available bandwidths between the cluster head and nodes outside the cluster (step 304); and for each cluster head, using the available bandwidths between the cluster head and nodes outside the cluster as estimations of available bandwidths for the nodes in the cluster (step 304).
2. The method of claim 1 , wherein determining feature vectors comprises: measuring capacity from each node to every other node in the network
100 to determine the feature vectors.
3. The method of claim 1 , wherein determining feature vectors comprises: determining last m-hops in paths between each node and every other node in the network 100 to determine the feature vectors.
4. The method of claim 1 , wherein determining clusters of the nodes based on the feature vectors comprises: for every pair of the nodes, determining a sameness of the nodes based on the network metric; and placing each pair of the nodes in the same cluster based on the sameness.
5. The method of claim 4, wherein determining a sameness comprises: computing a distance metric from the feature vectors for each pair of nodes; and determining the sameness for the pair of nodes based on the distance metric.
6. The method of claim 5, wherein determining clusters comprises: using the distance metrics for all the node pairs as input to a clustering function to determine the clusters.
7. The method of claim 5, wherein the feature vectors comprise capacity measurements, every node pair is represented by (i, j) and there are n nodes in the network, and computing the distance metric comprises: for each pair of nodes computing an average of a normalized difference between the capacity from node i and from node j to each one of other (n-2) nodes.
8. The method of claim 5, wherein the feature vectors comprise last m- hops, every node pair is represented by (i, j) and there are n nodes in the network, computing the distance metric comprises: for each pair of nodes computing a value indicative of a fraction of nodes that are common between the routes from nodes i and j to all other nodes in the network; and averaging the values over n-2.
9. A node of a plurality of nodes in a cluster, wherein the node is a cluster head of the cluster and the plurality of nodes are in a network 100, the node comprising: a memory 404 storing available bandwidth measurements between the node and nodes in the network 100 outside the cluster; and a processor 402 operable to determine whether the available bandwidth measurements between the node and the nodes outside the cluster are estimations of available bandwidth for all the nodes in the cluster based on whether bottleneck links are located close to the nodes outside the cluster or located close to the cluster head.
10. The node of claim 9, wherein the memory 404 stores a feature vector of network metric values, and the network metric values are associated with network paths between the node and other nodes in the network 100, wherein the node is placed in a same cluster as all other nodes in the plurality of nodes based on a comparison of the feature vector for the node and the feature vectors for all the other nodes in the plurality of nodes in the cluster.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200880020035.4A CN101682548B (en) | 2007-04-13 | 2008-04-02 | Available bandwidth estimation |
EP08742575.7A EP2137888B1 (en) | 2007-04-13 | 2008-04-02 | Available bandwidth estimation |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/787,008 | 2007-04-13 | ||
US11/787,008 US7813351B2 (en) | 2007-04-13 | 2007-04-13 | Available bandwidth estimation |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008127574A1 true WO2008127574A1 (en) | 2008-10-23 |
Family
ID=39853606
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2008/004424 WO2008127574A1 (en) | 2007-04-13 | 2008-04-02 | Available bandwidth estimation |
Country Status (4)
Country | Link |
---|---|
US (1) | US7813351B2 (en) |
EP (1) | EP2137888B1 (en) |
CN (1) | CN101682548B (en) |
WO (1) | WO2008127574A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12107760B2 (en) | 2019-09-06 | 2024-10-01 | Huawei Technologies Co., Ltd. | Transmitting traffic on path between nodes in network device based on available bandwidths |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8275866B2 (en) * | 2007-11-13 | 2012-09-25 | At&T Intellectual Property I, L.P. | Assigning telecommunications nodes to community of interest clusters |
US8315164B2 (en) * | 2008-12-11 | 2012-11-20 | Skype | Controlling packet transmission |
GB2466208B (en) * | 2008-12-11 | 2013-09-11 | Skype | Controlling packet transmission |
IL216207A (en) * | 2011-11-08 | 2017-05-29 | Google Inc | Splitting a network traffic flow |
JP2014044677A (en) * | 2012-08-28 | 2014-03-13 | Fujitsu Ltd | Transmission control program, communication node, and transmission control method |
US9680915B2 (en) * | 2012-09-12 | 2017-06-13 | Infosys Limited | Methods for clustering networks based on topology discovery and devices thereof |
US9231843B2 (en) | 2012-11-29 | 2016-01-05 | International Business Machines Corporation | Estimating available bandwith in cellular networks |
US9455868B2 (en) * | 2013-07-01 | 2016-09-27 | Empire Technology Development Llc | Formation of guilds in a cloud computing environment |
US9781610B2 (en) * | 2013-12-18 | 2017-10-03 | Qualcomm Incorporated | Small cell clusters for signaling load reduction, time synchronization, KPI filtering and spectrum coordination |
DE102014103702B4 (en) * | 2014-03-18 | 2017-08-03 | Intel IP Corporation | Method and apparatus for processing resource blocks |
US9338714B2 (en) * | 2014-04-24 | 2016-05-10 | United States Cellular Corporation | System and method for providing mobile wireless data network connectivity via vehicle-installed small cell |
US10225761B2 (en) | 2014-11-06 | 2019-03-05 | At&T Intellectual Property I, L.P. | Enhanced network congestion application programming interface |
CN105490873B (en) * | 2015-11-25 | 2019-01-11 | 上海大学 | The available network bandwidth measurement method of expansion attack can be resisted |
CN105897582A (en) * | 2015-12-07 | 2016-08-24 | 乐视云计算有限公司 | Inter-node distance measurement method and system |
US10069689B1 (en) * | 2015-12-18 | 2018-09-04 | Amazon Technologies, Inc. | Cache based on dynamic device clustering |
CN109165322B (en) * | 2018-08-01 | 2022-04-19 | 成都数联铭品科技有限公司 | Network feature extraction system and method based on path relation |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030204623A1 (en) | 2002-04-29 | 2003-10-30 | Harris Corporation | Hierarchical mobile ad-hoc network and methods for performing reactive routing therein |
US20050120105A1 (en) | 2003-12-01 | 2005-06-02 | Popescu George V. | Method and apparatus to support application and network awareness of collaborative applications using multi-attribute clustering |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US6920171B2 (en) * | 2000-12-14 | 2005-07-19 | Motorola, Inc. | Multiple access frequency hopping network with interference anticipation |
US7764617B2 (en) * | 2002-04-29 | 2010-07-27 | Harris Corporation | Mobile ad-hoc network and methods for performing functions therein based upon weighted quality of service metrics |
US7729268B2 (en) * | 2002-06-28 | 2010-06-01 | Ntt Docomo, Inc. | Method and apparatus for quality of service determination |
US20040059830A1 (en) * | 2002-09-17 | 2004-03-25 | Sockeye Networks, Inc. | Network address space clustering employing topological groupings, distance measurements and structural generalization |
US20050002372A1 (en) * | 2003-06-13 | 2005-01-06 | Johan Rune | Method of and system for intra-piconet scheduling |
US7706282B2 (en) * | 2003-06-25 | 2010-04-27 | Leping Huang | Bluetooth personal area network routing protocol optimization using connectivity metric |
TWI234970B (en) * | 2003-12-05 | 2005-06-21 | Inst Information Industry | Method and system for route selection and method for route reconstruction |
CN100518055C (en) * | 2003-12-10 | 2009-07-22 | 联想(北京)有限公司 | Secure data transmission method |
US7978710B2 (en) * | 2004-03-26 | 2011-07-12 | Qualcomm Incorporated | Synchronous inter-piconet routing |
US20070160016A1 (en) * | 2006-01-09 | 2007-07-12 | Amit Jain | System and method for clustering wireless devices in a wireless network |
-
2007
- 2007-04-13 US US11/787,008 patent/US7813351B2/en not_active Expired - Fee Related
-
2008
- 2008-04-02 WO PCT/US2008/004424 patent/WO2008127574A1/en active Application Filing
- 2008-04-02 EP EP08742575.7A patent/EP2137888B1/en active Active
- 2008-04-02 CN CN200880020035.4A patent/CN101682548B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030204623A1 (en) | 2002-04-29 | 2003-10-30 | Harris Corporation | Hierarchical mobile ad-hoc network and methods for performing reactive routing therein |
US20050120105A1 (en) | 2003-12-01 | 2005-06-02 | Popescu George V. | Method and apparatus to support application and network awareness of collaborative applications using multi-attribute clustering |
Non-Patent Citations (3)
Title |
---|
DHURANDHER S.K. AND SINGH G.V.: "Weight based adaptive clustering in wireless ad hoc networks", 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005. ICPWC 2005, 23 January 2005 (2005-01-23) - 25 January 2005 (2005-01-25), pages 95 - 100, XP010799035 * |
MAVROMOUSTAKIS C.X. AND KARATZA H.D.: "Bandwidth clustering for reliable and prioritized network routing using split agent-based method", 25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, 2005, 6 June 2005 (2005-06-06) - 10 June 2005 (2005-06-10), pages 89 - 94, XP010808041 * |
See also references of EP2137888A4 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12107760B2 (en) | 2019-09-06 | 2024-10-01 | Huawei Technologies Co., Ltd. | Transmitting traffic on path between nodes in network device based on available bandwidths |
Also Published As
Publication number | Publication date |
---|---|
CN101682548A (en) | 2010-03-24 |
US20080253286A1 (en) | 2008-10-16 |
EP2137888A4 (en) | 2012-02-22 |
EP2137888A1 (en) | 2009-12-30 |
US7813351B2 (en) | 2010-10-12 |
CN101682548B (en) | 2013-06-19 |
EP2137888B1 (en) | 2013-08-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2137888B1 (en) | Available bandwidth estimation | |
US9420513B1 (en) | Clustering approach to estimating a network metric for nodes | |
US7643426B1 (en) | Path selection in a network | |
US8982709B2 (en) | Selecting service nodes for an end-to-end service path from a reduced search space | |
JP4226922B2 (en) | Peer-to-peer based network performance measurement and analysis system and method for large networks | |
US8068417B1 (en) | System, method, and computer program product for processing flow requests based on an associated preference using a single computation | |
US6947386B2 (en) | Practical network node coordinate estimation | |
US8660018B2 (en) | Machine learning approach for estimating a network path property | |
US10924388B1 (en) | Multi-path routing | |
JP4854078B2 (en) | Method, system, and program for generating an annotated network topology | |
Pei et al. | Blockchain-enabled dynamic spectrum access: cooperative spectrum sensing, access and mining | |
CN102075359B (en) | A kind of server disposition method of coordinate Network Based and device | |
CN101854299A (en) | Dynamic load balancing method of release/subscription system | |
CN113032096A (en) | SFC mapping method based on node importance and user demand dual perception | |
EP3515018B1 (en) | Method, apparatus and system for measuring network path | |
CN103825963B (en) | Virtual Service moving method | |
CN112970231A (en) | Method for intelligent multi-hop overlay routing | |
CN116074204A (en) | Routing method, routing computing device, electronic device, and computer storage medium | |
Qiao et al. | Load balancing in peer-to-peer systems using a diffusive approach | |
US10623306B2 (en) | Multi-path routing | |
Bikas et al. | Improving QoE With Genetic Algorithm-Based Path Selection for MPTCP | |
US9860159B1 (en) | Multi-path routing | |
CN118250765B (en) | Large-scale networking low-overhead routing method based on fuzzy visual constraint flooding | |
Xing et al. | Predicting available bandwidth of internet path with ultra metric space-based approaches | |
Li et al. | MPTCP-based link congestion detection and traffic control scheme in software-defined networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200880020035.4 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08742575 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008742575 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |