Skip to main content
Log in

An algorithm for end-to-end performance analysis of network based on traffic engineering

  • Letters
  • Published:
Journal of Electronics (China)

Abstract

Based on traffic engineering, the network topology is described with network graph. An algorithm for the derivation of data communication capability in network links and the analysis of connectivity performance between node pairs is given through standardized transformation of the original descriptive matrix for the link performance, and resolution of transitive closure for adjacent-incident matrix of network in view of randomness of network events, which provides a feasible way for analysis and improvement of network performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. D. Awduche, J. Malcolm, et al., Requirements for traffic engineering over MPLS, Request for Comments, 2702, Sept. 1999, 4–14.

  2. Men Kui, Zhang Gengdu, MPLS & Internet traffic engineering, Computer Science, 28(2001)8, 42–45, (in Chinese).

    Google Scholar 

  3. G. Swallow, MPLS advantages for traffic engineering, IEEE Communications Magazine, 37(1999)9, 54–57.

    Article  Google Scholar 

  4. D. Awduche, MPLS and traffic engineering in IP network, IEEE Communications Magazine, 37(1999)9, 42–47.

    Article  Google Scholar 

  5. D. Awduche, A framework for Internet traffic engineering, Internet Engineering Task Force Internet-Draft Working Group, May 2000.

  6. Wang Jilong, Wu Jianping, An object-oriented model of network performance monitoring system, Journal of Software, 12(2001)1, 18–25.

    Google Scholar 

  7. G. Almes, IP performance metrics: Metrics, tools, and infrastructure, http://io.advanced.org/surveyor/, 1997.

  8. Liu Huailiang, Wang Dong, et al., Study on multilevel-fuzzy synthetic assessment method to Intranet, ICeCE: New Challenges for Global Manufacturing, Xi’an, Sept. 2001.

    Google Scholar 

  9. Liu Huailiang, Wang Dong, et al., Study on assessment of Intranet security with fuzzy-AHP method, Computer Engineering, 28(2002)1, 50–52, (in Chinese).

    Google Scholar 

  10. Xu Guohua, Liu Huailiang, et al., Research on fuzzy random analysis and simulation for connectivity of CIMS network, Computer Integrated Manufacturing Systems, 8(2002)7, 538–541, (in Chinese).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

About this article

Cite this article

Liu, H., Zhang, X., Wang, D. et al. An algorithm for end-to-end performance analysis of network based on traffic engineering. J. of Electron.(China) 20, 293–298 (2003). https://doi.org/10.1007/s11767-003-0036-4

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11767-003-0036-4

Key words

Navigation