• 검색 결과가 없습니다.

Novel Packet Switching for Green IP Networks

N/A
N/A
Protected

Academic year: 2022

Share "Novel Packet Switching for Green IP Networks "

Copied!
9
0
0

로드 중.... (전체 텍스트 보기)

전체 글

(1)

A green technology for reducing energy consumption has become a critical factor in ICT industries. However, for the telecommunications sector in particular, most network elements are not usually optimized for power efficiency. Here, we propose a novel energy-efficient packet switching method for use in an IP network for reducing unnecessary energy consumption. As a green networking approach, we first classify the network nodes into either header or member nodes. The member nodes then put the routing-related module at layer 3 to sleep under the assumption that the layer in the OSI model can operate independently. The entire set of network nodes is then partitioned into clusters consisting of one header node and multiple member nodes. Then, only the header node in a cluster conducts IP routing and its member nodes conduct packet switching using a specially designed identifier, a tag. To investigate the impact of the proposed scheme, we conducted a number of simulations using well- known real network topologies and achieved a more energy- efficient performance than that achieved in previous studies.

Keywords: Green network, Power consumption, IP network, Network node clustering, Packet switching.

Manuscript received Feb. 29, 2016; revised Dec. 5, 2016; accepted Dec. 14, 2016. This work was supported by ICT R&D program of MISP/IITP (R0190-15-2027, Development of Trusted Information Infrastructure (TII) S/W Framework for Realizing Trustworthy IoT Eco- system).

Seng-Kyoun Jo (corresponding author, skjo@etri.re.kr), Young-Min Kim (injesus@etri.

re.kr), and Hyun-Woo Lee (hwlee@etri.re.kr) are with the Hyper-connected Communication Research Laboratory, ETRI, Daejeon, Rep. of Korea.

Jussi Kangasharju (jussi.kangasharju@cs.helsinki.fi) is with the Department of Computer Science, University of Helsinki, Finland.

Max Mülhäuser (max@informatik.tu-darmstadt.de) is with the Department of Computer Science, Technische Universität Darmstadt, Germany.

This is an Open Access article distributed under the term of Korea Open Government License (KOGL) Type 4: Source Indication + Commercial Use Prohibition + Change Prohibition (http://www.kogl.or.kr/news/dataView.do?dataIdx=97).

I. Introduction

Energy consumption has recently become a key factor in the evaluation of performance within the ICT industry. According to the Cisco Visual Networking Index 2015 [1], global IP traffic in telecommunication networks will approach 1.1 zettabytes per year, or 88.4 exabytes (one billion gigabytes) per month, in 2016. By 2019, it is expected that a new milestone figure of 2.0 zettabytes per year, or 168.0 exabytes per month, will be realized. However, most elements in current networks are not usually optimized for power efficiency, as described in [2]. Thus, network elements should always be powered for connectivity regardless of the network volume, status, or other factors. According to [3], network load is proportional to the traffic volume and varies significantly between peak and off-peak time periods. To minimize energy wastage across different time periods, differentiated network operation strategies are strongly encouraged to maximize energy efficiency. The authors in [4] and [5] propose sleeping and standby approaches according to the network status.

However, these approaches occasionally require additional components such as a proxy and can consume more power when the nodes toggle from power-on to power-off and back.

It is not easy to measure exactly how much power will be consumed by each component of the router architecture as any estimate depends on the vendor and manufacturer. However, according to [6]–[10], we can estimate the power consumption at layer 3, which is used in a routing engine and packet- forwarding engine as the control and forwarding plane, respectively, and occupies 32% to 60% of the total power consumption in the current IP router architecture. Thus, the total power consumption of the network is expected to be reduced if the operation of each layer in the OSI model can be independently managed in a dynamic fashion according to the network conditions that exist during peak and off-peak time periods. This assumption has become a fact through the development of cloud (or virtualization) related technologies

Novel Packet Switching for Green IP Networks

Seng-Kyoun Jo, Young-Min Kim, Hyun-Woo Lee, Jussi Kangasharju, and Max Mülhäuser

(2)

such as Network Function Virtualization [11], the purpose of which is the use of IT virtualization-related technologies to virtualize entire classes of network node functions into building blocks that may be connected together to create a communication service.

This study may be considered as a green networking approach to energy-efficient packet switching. Specifically, we propose an algorithm to minimize the power consumption of a network during off-peak periods in an IP network. Assuming that the functions of each layer in a network node can be independently controlled, the proposed algorithm first selects header nodes (HNs) to manage general IP packet processing and manages subordinate member nodes (MNs) that will temporarily suspend IP packet processing at layer 3. In addition, instead of IP routing, each MN will conduct packet switching using a specially designed tag.

The reminder of this paper is organized as follows. Section II provides an overview of related works, and the problem formulation is presented in Section III. Section IV provides the network configuration and packet switching algorithm. A performance analysis using a simulation is developed in Section V, and the results and conclusions are presented in Section VI.

II. Related Works

Energy efficiency is not a new concept, and it has been an important topic of wireless environments such as sensor networks, IoT, and mobile communication. A significant amount of research has been expended to extend the battery life of various devices. The authors in [12] analyzed the trade- off between spectrum efficiency and energy efficiency and introduced various studies within a framework of energy- efficient resource allocation in a 5G wireless network. In the area of MWSN, the authors in [13] designed a clustering algorithm to optimize the energy efficiency of mobile sensor nodes; this algorithm is employed to find the near-optimal threshold for residual energy and to reconfigure clusters.

However, due to the recent exponential growth in the volume of network traffic, the spread of access to the Internet, and the expansion of new ICT services offered by service and network providers, energy efficiency has also become a high-priority goal of wired networks.

To analyze green technologies in a wired IP network, the authors of [14] introduced base approaches such as re- engineering, dynamic adaptation, and sleeping/standby. A large amount of research related to these issues has been performed during the last several decades.

As a re-engineering approach focusing on designing energy- aware elements, the authors in [15] introduced an investigation

of the potential savings through power-aware network design and routing. The authors measured the power consumption of various configurations of widely used routers. Based on measurement results, they then created a general model for router power consumption to explore the potential impact of power-awareness in a simple space of example networks.

To achieve a dynamic adaptation, approaches have been formulated with an objective to modulate the capacities of packet processing engines and a network interface to satisfy actual traffic loads and requirements. The authors in [16]

proposed a novel approach that involved switching off some portions of the Universal Mobile Telecommunication System core networks while still guaranteeing full connectivity and maximum link utilization. As an extension of [16], the authors of [2] proposed a simple algorithm to power off the links and full routers while maintaining the QoS constraints, such as maximum link utilization. As an example of dynamic adaptation, the GreenOSPF algorithm, presented in [17], extended the existing OSPF protocol slightly to share the shortest path tree of a specific node with neighboring nodes, and it solves the above problem by switching off network elements that are excluded by the shared shortest paths.

The authors in [18] proposed reducing the router power consumption using a machine-learning technique to identify and quickly adapt to the changing traffic characteristics.

Finally, sleep/standby approaches are used to selectively drive network equipment into low standby modes, and to wake them up only when necessary. The authors in [19] investigated the effect of network connectivity proxy on energy saving by allowing idle hosts to enter a low-power sleep state while maintaining a full network presence.

Some interesting methods, focused on specific applications such as content delivery, have recently been proposed to reduce the power consumption in networks. The authors in [20]

proposed an energy-efficient framework for content delivery in networks to support multicast transport and in-network caching.

In [21], the authors also provided a survey of energy-efficient caching techniques in an information-centric network from the place, content placement, and request-to-cache routing aspects for a green ICN.

III. Problem Formulations

1. Network Energy Consumption Problem

An energy-consumption minimization network problem can be formulated using linear programming [22]. Let us consider a direct graph G(V, L), where V and L are the set of nodes and directed links, respectively. A link that connects node i to its neighbor node j is denoted by lij. The set of neighbors of node

(3)

i is denoted by {NiV l, ijL}. Each node i  V and link l  L are characterized by the energy consumption e iv( ) : VR and e ll( ) :ij LR, respectively. Note that the power consumption required to manage the hardware is not considered in the definition of ev(i). Given the traffic matrix TM = [fsd]NXN, such that fsd is the amount of traffic from source s to destination d, the above problem to be solved is as follows.

 

min ( ) ( ) ,

i

v l

ij

i V i V j N

e i e l



(1)

, , , ,

, , , ,

0, , , , ,

i i

sd

sd sd sd

ij ji

j N j N

f s d i s

f f f s d i d

s d i s d

  

    

  

 

(2)

, , , ,

ij ij ij

fCi j l  (3) L where f is the amount of traffic from s to d that is routed ijsd through link lij. Constraint (2) refers to the classical flow conservation constraints, whereas constraint (3) requires the total offered load transmitted on link lij to be less than the link capacity Cij. The above energy consumption in a network has the typical form of a capacitated multi-commodity flow problem. Accordingly, solving this problem (that is, an NP- complete problem) is not viable for large-scale networks.

2. Reformulation of Network Energy Consumption Problem In order to reformulate the original energy-consumption minimization network problem to be feasible, we introduce several primitives related to network clustering and a lemma.

Our goal is to minimize the total power consumption of a network; we begin by comparing the power consumption computed prior to clustering with the power consumption computed after clustering. Prior to clustering, all nodes and links should be turned on, and in this case, the power consumption (PC) can be formulated as follows.

() ( ).

i

v l

ij

i V i V j N

PC e i e l



(4) On the other hand, based on the traffic change, several nodes and links can be switched off after clustering and the power consumption (PCclustering) can be less than PC. As a result, we can reduce the power consumption by reducing the difference between the power consumption before clustering and the power consumption after clustering. This implies that our goal can be referred to as “maximize the power consumption reduced by clustering,” which is defined as max(PC – PCclustering).

Let us now suppose that the network consists of K clusters and VK is a set of nodes that consists of one HN and one or more MNs.

1 2 K .

VV    VV

Then, the number of HNs and the total power consumption of cluster k (PCk) is as follows.

HN kMN,

nN

n (5)

( ) MN ( ) ( ),

K i

v v l

k k ij

i V j N

PC e i n e ie l

  

 

(6)

where N is the number of nodes in the network and is equal to

HN MN; v( ) :

nn e i VR is the power consumption of an MN in which the IP-routing related operation at layer 3 is temporarily put to sleep; nHN,nkMN is the sum of the number of HNs in the network and MNs in cluster k, respectively; and,

 is a binary variable {0, 1} if lij, which is initialized to 1, is powered on.

In order to calculate the effect of clustering, we divide the power consumption of the network into the power consumption of the nodes and links. First, from the node energy perspective, the power consumption of nodes (PCn) before clustering is as follows.

( ) ( ).

n v v

i V

PC e i Ne i

 (7) The power consumption of the nodes after clustering

clustering

(PCn )is as follows.

MN

HN MN

clusteringn ( )v k v( ) v( ) v( ).

k

PC

e in e in e in e i (8) Accordingly, the amount of power consumption of the nodes reduced by clustering can be obtained as follows by using (5), (7), and (8).

HN MN

MN

( )Ne ivn e iv( )n e iv( ) n e iv( )e iv( ) . (9) Now, from the link energy perspective, we investigate the difference between the power consumption prior to clustering and after clustering. The total power consumption of the links prior to clustering is as follows.

( ).

i

l l

ij i V j N

PC e l



(10) Using (6), the total power consumption of links within cluster k after clustering is

( ),

K i

l l

k ij

i V j N

PC e l

 

(11) where  is also a binary variable {0, 1}, the value of which specifies whether lij is powered on or off. Note that (11) includes only links within the cluster. In order to consider the power consumption of the link after clustering, we need to consider the links that connect the clusters; this can be expressed as follows:

 

clustering ( ) ,

K i

l l l

k ij

k i V j N

PC PCe l

 

(12)

(4)

where  is a binary variable {0, 1} set to a value of 1 if node i and node j belong to different clusters and lij is powered on.

The amount of power consumption of the links reduced by clustering can be defined as follows by using (10)–(12).

 

( ) ( ) .

i K i

l l l

ij k ij

i V j N k i V j N

e l PCe l

 

   

(13)

Note that all links between the MNs within the cluster are switched off except the link connected to each HN after clustering. Thus, the number of links can be obtained as

 

MN, MN.

K K

i i

k

j N k j N

i V i V

n n

 

 

  

(14) Then, (13) can be rewritten using (14) as follows:

 

( ) MN ( ) ( ) .

i K i

l l l

ij ij ij

i V j N k i V j N

e l n e le l

 

  

   

(15) In conclusion, our goal is to maximize (9) and (15) from the point of view of the total power consumption of the nodes and links, respectively. According to the measurement study in [6],

( ) ( ) 0.

v v

e ie i

Thus, maximizing (9) is the same as maximizing the number of MNs (that is, minimizing the number of HNs) in the network, which is the general purpose of our proposed algorithm in this paper. Accordingly, we focus on maximizing (15) (that is, minimizing the links among clusters). To solve (15), we introduce a new concept referred to as “link centrality among clusters.”

Definition (Link centrality among clusters). If  is a ij measured traffic volume in bytes on link lij connecting to node i in cluster k to its neighbor node j within another cluster, then the link centrality among the cluster of node i is defined as

( ) ,

K i

k it

ij i V j N

C i

 

where it maxi V Kij and C ik( ) ( 1) defines how densely the traffic of node i centralizes on a specific link lij to other clusters. All links in the network are assumed to have the same capacity and the same energy consumption.

Lemma. As C ik( ) (that is, maximizes), the energy 1 consumption of links among clusters is minimized and the number of active links among clusters (that is, the number of active links among clusters,

  

k

i V K j N i in (15))

can be also minimized.

Proof. For C ik( )1, K

it i V j Ni ij

 

 

must be satisfied. This implies lij

j N j Vi,K

0 holds except for the link with the highest traffic volume; that is, there exists little traffic on the links lij(lit). Accordingly, node i in cluster k can minimize the energy consumption by allowing

the traffic carried on lij(lit). to be aggregated on the link ( t)

l t Vit  first, and then switching off the other links, ( ).

ij it

ll Then, the number of links among the clusters can be reduced by switching off lij(lit). ■

Accordingly, our goal to minimize the original problem in (1) is to reduce the number of active links among clusters that maximizes (15) while satisfying the flow conservation constraints described in (2) and (3).

IV. Network Node Clustering and Packet Switching Algorithm

1. Partitioning of an Entire Network into Clusters

The objective of our research—the creation of a packet switching algorithm—is presented in this section along with several detailed procedures. First, we classify all network nodes into either HNs or MNs. An HN is a general IP router for IP packet processing, and an MN is a special node (or router) that can perform IP packet switching using a tag whenever its function at layer 3 is in the sleep mode. Routing-related functions at layer 3 include routing and packet forwarding engines, such as IP header processing and quality of service queueing. Figure 1 illustrates the logic for energy-efficient packet switching, including the node architecture of the HNs and MNs.

A. Header Node Selections

We will begin with the simple method described in Algorithm 1 that describes the selection of HNs and configuration of clusters using the selected HNs and MNs. Regarding the selection of HNs, various criteria can be considered to define the selection policies, such as the power consumption of the network node, the network nodality, and end-to-end delay. In this study,

Fig. 1. Logic for green packet switching.

Header node Member node Header node

IP control IP control IP control

IP routing IP routing

Path establishment Path establishment

L2 transport

Tag control

Data link

Tag control

Data link

Tag control

Data link

L2 transport

Packet

Packet Packet

Packet

(5)

Fig. 2. Motivation of selection of HNs.

 

 

0.25

0 0.50

5 10 15 20 25

0.75

     

30 Node ID

Average node utilization

 

10 11 12 13

we assume that the utilization of network nodes is applied to the HN selection and node clustering, as shown in Fig. 2.

Algorithm 1 describes the HN selection procedure. First, each node sends a message including the utilization information of a node and link to its neighbor nodes. Upon receiving this message, each recipient node inserts the neighbor information into the neighbor table. After sending and receiving a message, each node calculates the difference in utilization between nodes. Finally, nodes are selected to be either HNs or MNs through a comparison with the threshold.

The threshold is a predefined value determined by the network operator and is used as the basis for an HN decision. A lower value of the threshold will result in a greater number of HNs that are candidates for selection.

Algorithm 1. Pseudo code for header node selection ui network utilization of node i

ui, j network utilization of link from i to j nodej adjacent node of node i

1: for node i = 1 to i = N do

2: sendToNeighbor (nodeij, ,u ui i j, ) 3: receiveFromNeighbor (nodeji,u uj, j i,) 4: insertNeighborTable (node uj, iui j, ujuj i,) 5: end for

6: CalUtilGap( )i

ki(uiui j, ujuj i,) k is the number of adjacent node of node i 7: if CalUtilGap ( )i uTH

uTH is pre-defined threshold value by network provider then

8: node i is selected to be a Header Node(HN) 9: else

10: node i is selected to be a Member Node(MN) 11: end if

B. Clustering with One HN and Multiple MNs

After the selection of the HNs is complete, each HN sends advertising messages to its adjacent nodes. Once neighbor nodes receive a message from an HN, the HN updates its neighbor table and selects the HN that is the least utilized

among multiple HNs. Once the nodes receive an advertising message from some HN, they then discard subsequent advertising messages. The clustering procedure is described in Algorithm 2.

Algorithm 2. Pseudo code for clustering 1: for header node i = 1 to i = N do 2: sendToMN (nodeij, ,u ui i j, ) 3: MNreceiveFromHN (nodeji, ,u ui i j, ) 4: updateNeighborTable (node uj, iui j, ) 5: end for

6: MNjoinsHN (node node j, i)

Member node j selects the least utilized header node i.

C. Tag Allocation and Distribution

After clustering, the MNs send routing information to their HN, and the HN adds this routing information to the routing entry to identify the arrival reachability through the MNs. In this step, there can be several routing entries that support the same next hop. After adding the MN information, the HN selects the shortest and non-overlapping next hop among multiple paths targeted for the same destination, and it updates the routing entry. The HN then assigns tags to the next hop that can be reached through the MNs, and the tags are distributed to cluster the MNs, as illustrated in Fig. 3.

Rather than using IP routing, we use a tag, which is a specially designed identifier within a cluster, for switching that includes the outgoing node interface. Even though the label defined in the Multi-Protocol Label Switching (MPLS) architecture [23] can be used for packet switching, we propose a new and simple identifier in order to solve the problem defined in Section I. Upon receiving tags from an HN, the MNs temporarily put the routing-related function in layer 3 to sleep and perform packet switching using a tag. If the MNs receive packets without a tag, the packets are directly forwarded to the cluster HN.

Fig. 3. Tag allocation and distribution.

a

c

b d

e f

Network Next hop Tag 10.0.0.0/8 b(b1) - 40.0.0.0/8 c(c1) - 50.0.0.0/8 f via c(c2) tag-xyz

Default e(e1) -

< Routing entry of node d >

b1 c2

e1

Tag Out I/F tag-xyz c2

··· ···

(1) Report routing entry (2) Update routing entry and reachability, assign tags (3) Distribute tags

< Tag entry of node c >

(6)

Fig. 4. Green packet switching operation.

(4) Remove tag and IP routing (1) Forward to HN

(2) Assign tag and forward

(3) Tag switching c

a s

HN

d

b e

f

d

2. Packet Switching Using a Tag

To demonstrate the operation of packet switching from a source to a destination, we consider a simple network topology with 3 clusters {a, c, d}, {b}, and {e, f}, as shown in Fig. 4.

Each HN of each cluster is expressed in bold. When node a receives packets without tags and forwards them to node d, as an operating assumption, the MN (that is, node a) forwards packets to the HN if there is no tag information in the routing entry of the MN. Upon receiving packets, node d looks up the routing entry, encapsulates it with the tag, and forwards all of the packets to node e. After tag switching, node e forwards the packets to the next hop, node f. Finally, packets with a tag arrive at node f, which removes the tag and routes the packets to the destination.

V. Performance Analysis

To investigate the performance of the proposed algorithm, we conducted several simulations using an NS-2 simulator configured with the well-known NSFNet topology with 14 nodes and 42 links, as shown in Fig. 5(a). Additionally, as described in Figs. 5(b) and 5(c) and Table 1, we include real network topologies from the Rocketfuel project given in [24];

the Exodus (3967) and Ebone (1755) networks are composed of 79 nodes and 294 links, and 87 nodes and 322 links, respectively.

For an evaluation of the energy consumption, we assume that the consumed power of the node is 600 W; 420 W are used for IP routing, whereas the residual is used for tag switching [6].

In addition, the power consumption of a link is 235 W according to [14].

Under these environments, we measured the energy efficiency, defined as the ratio of the number of links to be switched off to the total number of all links. In particular, we compared the energy efficiency of the proposed algorithm with those of the GreenOSPF [17] and ILP [2] algorithms.

Figure 6 shows the results obtained from the evaluation of

Fig. 5. Topologies used in the simulation: (a) NSFNet, (b) Exodus, and (c) Ebone.

(a) (b)

(c)

Table 1. Simulation environments.

Percentage AS # of nodes # of links Avg. nodal

degree Degree = 1 Degree > 1

Ebone 87 322 3.72 9.3 90.7

Exodus 79 294 3.75 8.7 91.3

NSF 14 42 3.00 0 100.0

the performance of the proposed algorithm under various topologies. As the offered load increases, energy efficiency is reduced in all network topologies. However, in the cases of Exodus and Ebone, both of which are scale-free networks, the energy efficiency rapidly decreases when the offered load is greater than 0.3. On the other hand, we observe less reduction in a random NSF network as the load increases. This behavior is caused by traffic congestion at hot spot nodes in the Exodus and Ebone topology with smaller offered load. In an NSF network, less congestion occurs because the nodal degree is uniformly distributed between 1 and 4. Thus, the proposed algorithm shows better performance in random networks than scale-free networks regardless of the offered load. Overall, the proposed algorithm can be applied to both random and scale- free network topologies as our objective is the reduction of power consumption during off-peak periods.

Figure 7 summarizes the energy efficiency when the offered load is 0.2. All previous algorithms attempt to reduce the energy consumption by turning off the nodes and links.

Therefore, the energy efficiency of an ILP is much higher than GreenOSPF because the ILP determines the nodes and links to be turned off through a complicated optimization technique.

Generally, turning off the network equipment allows incoming flows, passing by the elements, to be rerouted to other candidate paths, which results in paths that are much longer than the shortest paths.

The behavior described above causes the traffic to be

(7)

Fig. 6. Energy efficiency under various topologies with regards to the algorithms according to the traffic load: (a) NSF, (b) Exodus, and (c) Ebone.

0.05 0.10 0.15 0.20 0.25 0.30 0.35 0.40 0

0.2 0.4

Energy efficiency

(a)

GreenOSPF ILP

Proposed algorithm

0.05 0.10 0.15 0.20 0.25 0.30 0.35 0.40

Energy efficiency

(b)

0.05 0.10 0.15 0.20 0.25 0.30 0.35 0.40

Energy efficiency

(c) 0

0.2 0.4

0 0.2 0.4

Fig. 7. Energy efficiency under various topologies with regards to the algorithms.

NSF Exodus Ebone 0

0.2

0.4 GreenOSPF

ILP

Proposed algorithm

Energy efficiency

aggregated on the links that still turn on, and hence, the average link load for such links naturally increases, as shown in Fig. 7.

If some of the nodes begin to experience congestion as a result of the rerouting, the algorithm may no longer support the energy consumption, which is why the energy efficiency of an ILP stops at 25%. Contrary to previous approaches, the proposed algorithm simply turns off the L3 routing function while maintaining the network connectivity to the HN.

Accordingly, the candidate paths are no longer than the original shortest paths, thereby providing an opportunity to reduce the energy consumption much more than previous methods.

Figure 8 illustrates the energy efficiency under various network topologies according to the change in HN ratio by adjusting the threshold value in the HN selection procedure when the offered load is 0.4. As the number of HNs increases, the energy efficiency in an NSF also increases. As explained in Figs. 7 and 8, a random NSF network has fewer hot spot nodes and less congestion caused by rerouting after clustering. On the other hand, congestion can easily occur at several hot spot nodes in a scale-free network. We can therefore observe the optimal conditions that can maximize the energy efficiency under the given traffic load and HN ratio.

Fig. 8. Energy efficiency under various topologies with regards to the ratio of header nodes.

0.1 0.2 0.3 0.4

HN ratio 0.1

0.2 0.3

Energy efficiency

NSF Ebone Exodus

VI. Conclusions

Energy efficiency is becoming a key factor in the green ICT industry, in addition, it is essential to realize trusted network infrastructure as ICT industries continue to grow. Our research for a green network provides an algorithm to minimize the power consumption in IP networks during off-peak periods.

The proposed algorithm first configures clusters consisting of one HN and multiple MNs according to the HN selection method, and conducts packet switching using tags. The results obtained show that the proposed packet-switching scheme can obtain more energy efficient performance than previous works.

In a future study, we will investigate a trade-off between the HN selection method and performance, as well as research optimal network conditions to maximize energy efficiency.

References

[1] Cisco, Cisco Visual Networking Index: Forecast and Methodology, 2014–2019, Technical Reports, 2015.

[2] L. Chiaraviglio, M. Mellia, and F. Neri, “Reducing Power Consumption in Backbone Networks,” IEEE Int. Conf. Commun., Dresden, Germany, June 14–18, 2009, pp. 1–6.

[3] Y.-M. Kim, E.-J. Lee, and H.-S. Park, “Ant Colony Optimization Based Energy Saving Routing for Energy-Efficient Networks,”

(8)

IEEE Commun. Lett., vol. 15, no. 7, July 2011, pp. 779–781.

[4] ITU-T REC. Y.3022, Measuring Energy in Networks, Aug. 2013.

[5] M. Andrews et al., “Routing for Energy Minimization in the Speed Scaling Model,” Proc. IEEE INFOCOM, San Diego, CA, USA, Mar. 14–19, 2010, pp. 1–9.

[6] A.M. Lyons, D.T. Nelson, and T.R. Salamon, Energy Efficient Strategies for High Density Telecom Applications, Alcatel-Lucent, Technical Reports, June 2008.

[7] EU-ECONET Project, Accessed Dec. 17, 2015. http://www.

econet-project.eu

[8] J. Wu, S. Rangan, and H. Zhang, Green Communications:

Theoretical Fundamentals, Algorithms and Applications, Boca Raton, FL, USA: CRC Press, 2012.

[9] V. Acharya, Energy Consumption of IP vs Ethernet, MS thesis, Aalto University, Espoo, Finland, 2012.

[10] C. Lee et al., “Energy Efficient Network Planning: Issues and Prospects in Wired/wireless Network,” Int. Conf. ICT Convergence, Seoul, Rep. of Korea, Sept. 28–30, 2011, pp. 132–

135.

[11] J. Matias et al., “Toward an SDN-Enabled NFV Architecture,”

IEEE Commun. Mag., vol. 53, no. 4, Apr. 2015, pp. 187–193.

[12] G. Wu et al., “Recent Advances in Energy Efficient Networks and Their Application in 5G Systems,” IEEE Wireless Commun., vol.

22, no. 2, Apr. 2015, pp. 145–151.

[13] G.S. Sara, S.P. Devi, and D. Sridharan, “A Generic-Algorithm- Based Optimized Clustering for Energy-Efficient Routing in MWSN,” ETRI J., vol. 34, no. 6, Dec. 2012, pp. 922–931.

[14] R. Bolla et al., “Energy Efficiency in the Future Internet: a Survey of Existing Approaches and Trends in Energy-Aware Fixed Network Infrastructures,” IEEE Commun. Surveys Tutorials, vol.

13, no. 2, May 2011, pp. 223–244.

[15] J. Chabarek et al., “Power Awareness in Network Design and Routing,” IEEE Conf. Comput. Commun., Phoenix, AZ, USA, Apr. 13–18, 2008, pp. 1130–1138.

[16] L. Chiaraviglio et al., “Energy-Aware UMTS Access Networks,”

Int. Teletraffic Congress, Paris, France, Sept. 15–17, 2008, pp. 1–8.

[17] A. Cianfrani et al., “An Energy Saving Routing Algorithm for a Green OSPF Protocol,” IEEE Conf. Comput. Commun.

Workshop, San Diego, CA, USA, Mar. 15–19, 2010, pp. 1–5.

[18] X. Wang et al., “Dynamic Layer-1 WAN Access Architecture for Large Enterprises,” IEEE ICNC, 2015.

[19] M. Jimeno, K. Christensen, and B. Nordman, “A Network Connection Proxy to Enable Hosts to Sleep and Save Energy,”

IEEE Int. Performance, Comput. Commun. Conf., Austin, TX, USA, Dec. 7–9, 2008, pp. 101–110.

[20] J. Llorca et al., “Dynamic in-Network Caching for Energy Efficient Content Delivery,” INFOCOM, Proc. IEEE, Turin, Italy, Apr. 14–19, 2013, pp. 245–249.

[21] C. Fang et al., “A Survey of Energy Efficient Caching in Information-Centric Networking,” IEEE, Commun. Mag., vol. 52,

no. 11, Nov. 2014, pp. 122–129.

[22] L. Chiaraviglio, M. Mellia, and F. Neri, “Minimizing ISP Network Energy Cost: Formulation and Solutions,” IEEE/ACM Trans. Netw., vol. 20, no. 2, Apr. 2012, pp. 463–476.

[23] IETF RFC 3031, Multiprotocol Label Switching Architecture, Jan.

2001.

[24] N. Spring, R. Mahajan, and D. Wetherall, “Measuring ISP Topologies with Rocketfuel,” ACM SIGCOMM, Pittsburgh, PA, USA, Aug. 19–23, 2002, pp. 1–13.

Seng-Kyoun Jo received his BS degree in electronic and information engineering from the Korea Aviation University, Goyang, Rep. of Korea, in 2004. He received his MSc degree from the Department of Information and Telecommunications Engineering from Korea Advanced Institute of Science and Technology, Daejeon, Rep. of Korea, in 2006. Since 2006, he has been part of the senior engineering staff of the ETRI, Daejeon, Rep. of Korea. Further, he has been a Rapporteur of Q9/13 and co-Rapporteur of Q23/13 in ITU-T since 2013. His current research interests include green ICT, network optimization, and trust management in ICT.

Young-Min Kim received his MSc degree and PhD from the Korea Advanced Institute of Science and Technology, Daejeon, Rep. of Korea, in information and communication in 2006 and 2011, respectively. In 2011, he joined the ETRI, Daejeon, Rep. of Korea. His research mainly focuses on energy saving routing, QoS framework in telecommunication networks network, artificial intelligence, and machine learning. He is a member of IEEE.

Hyun-Woo Lee received his BS degree in electronics engineering from Korea Aviation University in 1993, Goyang, Rep. of Korea, and his MS degree and PhD in communication and information engineering from Korea Aviation University, in 1995 and 2005, respectively.

Since 1995, he has been working as a principle researcher in the Broadcasting and Media Research Laboratory of ETRI, Daejeon, Rep. of Korea, where he is currently working as the assistant vice president of the Media Research Section. His current research interests include trust information framework, trust management in ICT, and smart media.

(9)

Jussi Kangasharju received his MSc degree from Helsinki University of Technology, Finland, in 1998. He received his Diplome d'Etudes Approfondies from the Ecole Superieure des Sciences Informatiques in Sophia Antipolis, France in 1998. In 2002, he received his PhD from University of Nice Sophia Antipolis/Institut Eurecom, France. In 2002, he joined Technische Universität Darmstadt, first as post-doctoral researcher, and from 2004 onwards as assistant professor. Since June 2007, He is a professor at the Department of Computer Science at University of Helsinki, Finland. Between 2009 and 2012, he was the director of the Future Internet research program at Helsinki Institute for Information Technology (HIIT). Jussi's research interests are information-centric networks, content distribution, opportunistic networks, and green ICT.

He is a member of IEEE and ACM.

Max Mülhäuser received his PhD from the University of Karlsruhe, Germany, where he founded a research center for Digital Equipment (DEC). He is a Full Professor of Computer Science and head of the Telecooperation Lab at Technische Universität, Darmstadt, Germany.

His Lab conducts research on smart ubiquitous computing environments for the ‘pervasive Future Internet’ in three research fields: middleware and infrastructures, novel multimodal interaction concepts, and human protection in ubiquitous computing (privacy, trust, & civil security). He is also a directorate member of CASED, the center for advanced security research, and deputy speaker of the Future Internet collaborative research center MAKI. Since 1989, he has worked as either professor or visiting professor at universities in Germany, Austria, France, Canada, and the US.

참조

관련 문서

The new Nortel Networks Layer 2/3 Copper and Fiber GbE Switch Modules for IBM Eserver BladeCenter serve as a switching and routing fabric for the BladeCenter server chassis..

If we wanted to see what the IP version of the packet is, how we would do this? We only 

We propose a simple disk reconstruction method based on the Laurent expansion of the single layer potential to estimate anomalies that can be used as an initial guess for

Router should decide where the packet should send, for this router should compare the entries of routing table with the destination IP address from IP header

1) We develop a Rendezvous Node Selection and Routing Algorithm (RNSRA) to select a set of RNs and plan the sink moving tour, in which the RN can act as a store point for the

In an available slot unused by PUs, control frames are used to reserve the channel when the remaining time is not enough for SUs to finish a data packet transmission.. If a

SSID MEZ30K-****** here ****** is the last 6digits of MAC address Firewall Port forwarding/MAC filtering/IP filtering/URL filtering. # of

: [Oxford] Power is energy, especially electricity, that is obtained in large quantities from a fuel source and used to operate lights, heating, and machinery.. CNU