DACoRM: A coordinated, decentralized and adaptive network resource management scheme

D. Tuncer*, M. Charalambides, G. Pavlou, N. Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

Abstract

In order to meet the requirements of emerging demanding services, network resource management functionality that is decentralized, flexible and adaptive to traffic and network dynamics is of paramount importance. In this paper we describe the main mechanisms of DACoRM, a new intra-domain adaptive resource management approach for IP networks. Based on path diversity provided by multi-topology routing, our approach controls the distribution of traffic load in the network in an adaptive manner through periodical re-configurations that uses real-time monitoring information. The re-configuration actions performed are decided in a coordinated fashion between a set of source nodes that form an in-network overlay. We evaluate the overall performance of our approach using realistic network topologies. Results show that near-optimal network performance in terms of resource utilization can be achieved in scalable manner.

Original languageEnglish
Title of host publicationProceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012
Pages417-425
Number of pages9
DOIs
Publication statusPublished - 2012
Event2012 IEEE Network Operations and Management Symposium, NOMS 2012 - Maui, HI, United States
Duration: 16 Apr 201220 Apr 2012

Publication series

NameProceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012

Conference

Conference2012 IEEE Network Operations and Management Symposium, NOMS 2012
Country/TerritoryUnited States
CityMaui, HI
Period16/04/1220/04/12

Keywords

  • Adptative Resource Management
  • Decentralized Network Configuration
  • Online Traffic Engineering

Fingerprint

Dive into the research topics of 'DACoRM: A coordinated, decentralized and adaptive network resource management scheme'. Together they form a unique fingerprint.

Cite this