the discarding probability in case of congestion.
Routers only need to be able to support the different
PHBs. Furthermore, MPLS traffic engineering (TE)
capability augmented with constraint-based routing,
has the ability to compute routes with constraints on
bandwidth and delay requirements. If the two tech-
nologies are combined, then standardized DiffServ
service offerings can be made. The combination of
MPLS and DiffServ is called DS-TE (DiffServ aware
MPLS Traffic Engineering) (DS-TE, ).
This paper is organized as follows: Section 2 de-
scribes different algorithms of Traffic Engineering us-
ing MPLS. Section 3 lists and compares a set of
topology generators. Section 4 defines our simula-
tion model. Section 5 describes experiments and the
analyses of results. Finally, the conclusion gives some
perspectives of this study.
2 ALGORITHMS
2.1 Introduction
Multipath routing algorithm consists in two main
steps as depicted by Figure 1: computation of mul-
tiple paths and traffic splitting among these multiple
paths. In the first step, it computes the set of candidate
paths which is a subset of all the paths between a pair
of considered routers according to various static cri-
teria such as bandwidth, hop count, delay, error ratio
and so on ...
The second step is to split traffic among multiple
candidate paths. The repartition rate of a demand on
candidate paths depends on the evaluation of dynamic
criteria such as the blockages, the packet loss ratio,
the measured delay, the jitter, and so on ...
2.2 LBWDP (Load Balancing over
Widest Disjoint Paths)
LBWDP (LBWDP, 2005) is a hybrid algorithm that
takes advantages of the path selection of WDP (WDP,
2002) and the splitting mechanism of PER (PER,
2006). For finding the candidate path set, LBWDP
uses the existing WDP (Widest Disjoint Paths) (WDP,
2002) algorithm which focuses on the selection of
good paths. This approach is mainly based on two
concepts: path width and path distance. Path width
is a way to detect bottlenecks in the network and to
avoid them if possible. Path distance is original be-
cause contrary to most approaches, it is not a hop-
count measure but it is indirectly dependent on the
Figure 1: General schema of Multipath routing algorithm.
utilization ratio of each link defining the path. WDP
algorithm performs candidate paths selection based
on the computation of the width of the good disjoint
paths with regard to bottleneck links. The width of a
path is defined as the residual bandwidth of its bot-
tleneck link. The principle of WDP is to select a re-
stricted number of paths. A path is added to the sub-
set of good paths if its inclusion increases the width
of this subset. At the opposite, a path is deleted if this
does not reduce the width of the subset of good paths.
For the traffic splitting stage, LBWDP uses the PER
algoritm (PER, 2006). It consists of two steps: cal-
culating a distribution probability and selecting one
path using Gradient Method with Constraint band-
width traffic. For more details, please refer to (PER,
2006).
This traffic engineering scheme will be useful for re-
ducing the probability of congestion by minimizing
the utilization of the most heavily used link in the net-
work.
2.3 PEMS (PEriodic Multi-Step
Routing Algorithm for DS-TE)
Since MPLS TE (Traffic Engineering based on
MPLS) and DiffServ (Differentiated Services) can be
deployed concurrently in an IP backbone, a proposed
algorithm called PEMS (PEMS, 2006) is useful to
meet the customers’ various requirements and to give
the differentiated services for three classes in the DS-
TE network. Its goal is to develop a routing method
that optimizes differentiation of experienced service
of traffic classes in terms of two metrics, delay and
available bandwidth.
The classes managed by PEMS are: Expedited
Forwarding (EF) for delay sensitive traffic like VoIP
traffic, Assured Forwarding (AF) for soft bandwidth
and loss guarantee traffic like video and Best-Effort
forwarding (BE) for assuring the minimum quality
to best effort service like ftp or e-mail. PEMS aims
basically to minimize the maximum link utilization
over the network, and additionally to give different
service quality to each class, especially to ensure the
ICSOFT 2008 - International Conference on Software and Data Technologies
120