Improving the routing efficiency of routers using the fuzzy method

Number of pages: 71 File Format: word File Code: 31042
Year: 2014 University Degree: Not Specified Category: Computer Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Improving the routing efficiency of routers using the fuzzy method

    Abstract

    The growth and development of computer networks is not hidden from anyone. For years, the collection and processing of information is done by computers. In addition, the computer plays an important role in distributing information and communicating through computer networks. To establish communication between networks, we need a backbone. This infrastructure network, which consists of a large number of routers, is responsible for transmitting information. Algorithms should be implemented on these routers so that they can choose the best path for transferring information in this vast network. In relation to computer networks and routing in these networks and checking the quality of different routing algorithms, we will analyze and study how to implement these algorithms in a practical way. And we will make a comparison about the routing of different routing algorithms and especially the OSPF pattern.

    Keywords

    Protocol, routing, fuzzy, queue length, link delay, free bandwidth, collision, load balancing, topology, interface, switching

    Chapter 1

    Getting to know routing in the network

    Introduction

    Using computer networks in several years Recently, there has been a lot of growth and organizations and institutions have started to establish a network. Computer networks provide the necessary infrastructure for sharing resources in the organization; while these infrastructures are not designed correctly, different problems arise when using the network, and a lot of money must be spent to maintain the network and adapt it to the desired demands. Therefore, before designing a network, the purpose of creating that network, the volume of traffic that will pass through the network, and many other issues should be taken into account. For this purpose, we must have sufficient familiarity with different networks and the equipment used in the network infrastructure.

    During the last decade, the Internet has gone beyond the communication research projects that have changed our world forever. Short messages, SMS, IP telephones, movies and music on demand, banking are only a part of many applications. that have made our lives easier, but the technology and technology that enables us to use these facilities are computer networks and the way of communication between these networks. The Internet, which is the biggest tool for providing the above services, consists of several thousand small networks that need another wide network to communicate and exchange information between these networks, which is called the backbone, and has different devices, including routers, the way messages are exchanged between routers is the basis of the work of this backbone, because of its importance which has this technique of sending and receiving messages from one point to another, different methods of doing this work are examined and finally the best and most suitable method of doing the work is examined completely. to be In this case, it may not be appropriate to use a bridge to maintain the speed of communication between network parts. In these complex and extensive network environments, a device is needed that, in addition to having the properties of a bridge and the ability to separate a network into smaller parts, is also able to determine the best path for data transmission among the parts. Such a device is called a router. Routers operate in the network layer of the OSI model.

    Routers have access to network addressing information and thus have the ability to route data packets through multiple access networks. This action is done by exchanging information about protocols between separate networks in routers. In the router, a routing table is used to determine the addresses of the incoming data. We have switching in different layers, but the third layer switching is called routing. The routing process is the same as the process of sending letters in post offices.

    Routers determine the best path for data packets based on the information in the routing tables. In this way, the communication between the sending and receiving computers is managed.Routers do not give the network a large amount of data packets known as the broadcast storm phenomenon.

    Unlike bridges, routers can choose multiple paths between parts of the LAN network, and also have the ability

    to connect parts that use different forms of data packets. Routers can identify parts of the network that have heavy traffic and use this information to determine the appropriate route for packets. Choosing the right path is based on the number of hops that a data packet must make to reach the destination and comparing the number of hops. Hop refers to the movement of data from one router to the next router. Unlike bridges, routers work at the network layer (OSI model) and thus are able to route data packets efficiently. They also have the ability to direct data packets to other routers that identify their addresses. Also, routers, unlike bridges, which use only one path to route data, can choose the best path from several available paths. Brouler is a device that combines the properties of a bridge and a router. Brouler acts as a router in routable protocols and appears as a bridge in other cases.  The process of receiving a data unit with an identity from one of the input channels and directing it on the appropriate output channel in such a way that it approaches and leads to its final destination is called switching. The use of routers in the network has become a necessity. One of the important reasons for expanding the use of routers is to connect a network to several other Internet networks or other remote sites in today's world. The name considered for routers is appropriate to what they do: "send data from one network to another". For example, if a company has a branch in Tehran and another office in Khoi, in order to connect them to each other, a dedicated leased line can be used that is connected to each of the routers in the offices. In this way, any traffic that needs to be transferred from one site to another is provided through the router and all other unnecessary traffic is filtered and bandwidth and related costs are saved.

    Different types of routers:

    1-2-1-1-Hardware routers:

    There are routers whose task is to run special software created by router manufacturers that simplify the router's work. and that is only sending data from one side of the network to the other, and these routers have higher reliability and speed compared to software routers, and most companies tend to use this type of routers. A software router can be an NT server, a Net server, or a server for Linux. All network-specific operating systems have built-in routing capabilities and they also use routers as a firewall and Internet gateway. Example 1: Using a router to connect two networks to each other and connect to the Internet. has been used When the router receives data through a LAN network or the Internet, after checking the source and destination addresses, it sends the received data to each of the networks or the Internet. The used router has divided the network into two different parts. Two penal networks. Every network has a hub to which all the computers in the network are connected. In addition to the above, the used router has the necessary interfaces to connect any network to it and uses another interface to connect to the Internet. In this way, the router is able to send the desired data to the correct destination. Example 2: Using a router in a LAN network. Suppose a router is used in a LAN network. In the above model, each device in the network interacts with the existing router like a gateway.

  • Contents & References of Improving the routing efficiency of routers using the fuzzy method

    List:

    Chapter One

    Getting to know routing in the network

    1-1-Introduction. 8

    1-2 Examining the structure of routers and switches. 9

    1-2-1-Router (router). 9

    1-2-1-1- Hardware routers. 10

    1-2-1-2- Software routers. 10

    1-2-1-3- The most important feature of a router. 11

    1-2-1-4- How a router works on the Internet. 11

    1-2-1-5- Internal elements of the router. 11

    1-2-1-5-1 CPU consumption. 12

    1-2-1-5-2- RAM main memory. 12

    1-2-1-5-3- Flash memory. 12

    1-2-1-5-4-NVRAM memory. 12

    1-2-1-5-5 Buses. 13

    1-2-1-5-6 RAM memory. 13

    1-2-1-5-7 Interfaces. 13

    1-2-1-5-8 Power supply. 14

    1-3 Switch. 14

    1-5-1 How to send message. 16

    1-5-2 Broadcast 18

    1-6 Knowing the destination of a message. 18

    1-7- Protocols. 19

    1-8- Tracking a message. 20

    1-9- Internet backbone. 21

    1-10- Network basics. 21

    1-10-1 Network. 21

    1-10-2- Node.22

    1-10-3- Topology.22

    1-10-3-1- Bus topology.22

    1-10-3-2- Star topology.23

    1-10-3-3- Mesh topology.23

    1-10-3-4- Ring topology 23

    1-10-3-5- Wireless topology. 24

    1-11- Network terminology. 24

    1-11-1- Scalability 24

    1-11-2- Latency 24

    1-11-3- Network failure. 25

    1-11-4- Collisions 25

    1-4- Fuzzy logic. 26

    1-4-1- Fuzzy logic and its applications.

    1-4-2- Fuzzy system.

    2-1-1- Distance Vector Algorithms.28

    2-1-2- Link State (LS) Algorithms.30

    2-1-3- Hierarchical Routing.32

    2-2- Routing Algorithms.33

    2-2-1- Types of Routing Algorithms.33

    2-3- AS Autonomous Networks 34

    2-4- Internet ..35

    2-4-1- Internal routing ..36

    2-4-2- External routing ..36

    2-5- Basics of BGP protocol ..37

    2-5-1- Stub network ..38

    2-5-2-Multihome networks 39

    2-5-3- Transit networks. 39

    2-5-4-IBGP..40

    2-5-5- EBGP..40

    2-5-6- EBGP configuration communication. ..42

    2-6-2- KeepAlive message ..42

    2-6-3- Notification message ..42

    2-6-4- Update ..42

    2-7- Path of BGP attributes (BGP Path Attribute) .44

    2-7-1-AS-Path ..45

    2-7-2- Origin ..45

    2-7-3- Local Preference .46

    2-7-4 MEP- Multi Exit Discriminator .46

    2-8- Selection of the best path in BGP protocol .47

    Chapter 3

    Examination and comparison of different routing protocols

    3-1- RIP protocol ..48

    3-2- Combined routing protocols or EIGRP. Ospf .54

    3-4-3 Ospf performance review .55

    3-4-4- Ospf timers ..55

    Chapter 4

    Presentation of the proposed fuzzy model

    4-1- Routing based on quality of service (QOS) 56

    4-1-1- Purpose of routing based on quality of service (QOS) 56

    4-2- Disadvantages of current routing protocols such as BGP, RIP, OSPF. 57

    4-3- Fuzzy system..58

    4-3-1- Fuzzy algorithm..59

    4-4- Proposed fuzzy algorithm.60

    4-4-1- Free bandwidth.61

    4-4-2- Diagram of the rules of the proposed fuzzy algorithm. 62

    4-4-3- Simulation and performance. 64

    5- Conclusion. Simulation of network topologies - a model for OSPF. Mobile Technology, Applications and Systems, 2005 2nd International Conference on.

                   

    2) Borovina, N. and S. Kreso (2005). OSPF-based model of adaptive routing and possibility forOSPF-based model of adaptive routing and possibility for stable network operations. Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications. Malta, World Scientific and Engineering Academy and Society (WSEAS): 104-109.

                   

    3) Liu, Y., et al. (2005). Application of Rough Set for Routing Selection Based on OSPF Protocol. Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing. D. ?l?zak, J. Yao, J. Peters, W. Ziarko and X. Hu, Springer Berlin Heidelberg. 3642: 654-661.

                   

    4) Majd, N. E. and M. H. Yaghmaee (2006). A Fuzzy Algorithm for QoS-Based Routing in MPLS Network. Communications, 2006. APCC '06. Asia-Pacific Conference on.

                   

    5) NULL, N., et al. (2010). Design and simulation of OSPF routing protocol fuzzy model by two constraints: Bandwidth and queue size of router. (2005). A Microeconomics-Based Fuzzy QoS Unicast Routing Scheme in NGI. Embedded and Ubiquitous Computing – EUC 2005. L. Yang, M. Amamiya, Z. Liu, M. Guo and F. Rammig, Springer Berlin Heidelberg. 3824: 1055-1064.

                   

    7) Wang, X., et al. (2004). A Fuzzy-Tower-Based QoS Unicast Routing Algorithm. Embedded and Ubiquitous Computing. L. Yang, M. Guo, G. Gao and N. Jha, Springer Berlin Heidelberg. 3207: 923-930.

                   

    8) Yaghmaei, M., et al. (2006). A Fuzzy QOS Routing Algorithm for Communication Networks. Communication systems, 2006. ICCS 2006. 10th IEEE Singapore International Conference on.

                   

    9] A. Capone, L. Fratta, and F. Martignon, “Virtual Flow Deviation: Dynamic routing of bandwidth guaranteed connections,” The 2nd International Workshop on QoS in Multiservice IP Networks (QoS-IP 2003), pp. 592-605, Italy, 2003.

    10] A. K. Parekh, and R. G. Gallager, “A generalized processor sharing approach to flow control in integrated services networks: The multiple-node case,” IEEE/ACM Transaction on Networking vol. 2, no. 2, pp 137-150, 1994.

    11] K. Kar, M. Kodialam, and T. V. Lakshman, “MPLS traffic engineering using enhanced minimum interference routing: An approach based on lexicographic max-flow,” Eighth International Workshop on Quality of Service (IWQoS), Pittsburgh, USA, June 2000.

    12] E. Aboelela, and C. Douligeris, "Fuzzy reasoning approach for QoS routing in B-ISDN," Journal of Intelligent and Fuzzy Systems, Application in Engineering and Technology, Vol. 9, pp. 11-27, November 2000.

    13] S. M. Sait, H. Youssef, and J. A. Khan. "Fuzzy evolutionary algorithm for VLSI placement," Genetic and Evolutionary Computer Conference 2001 (GECCO-2001), pp. 1056-1063, San Francisco, July 2001.

    14] L. A. Zadeh. "Outline of a new approach to the analysis of complex systems and decision processes," IEEE Transaction Systems Man. Cybern, SMC-3 (1): pp. 28–44, 1973.

    15] Ronald R. Yager, “On ordered weighted averaging aggregation operators in multicriteria decision making,” IEEE Transaction on systems, MAN, and Cybernetics, vol.18, pp. 183-190, January 1988.

    16] Subhash Suri, Marcel Waldvogel, and Priyank Ramesh Warkhede, “Profile-based routing: A new framework for {MPLS} traffic engineering,” 2nd International Workshop on Quality of Future Internet Services, QoS 2001, Coimbra, Portugal, pages 138-157, September 2001.

Improving the routing efficiency of routers using the fuzzy method