Home | Issues | Profile | History | Submission | Review
Vol: 59(73) No: 2 / December 2014 

Performance Design and Criterion Analysis for Efficient Data Routing
Stefano-Niko Orzen
Department of Computers, Politehnica University of Timisoara, Faculty of Automation and Computers, Bd. V. Parvan, 300223 Timisoara, Romania, e-mail: niko.orzen@cs.upt.ro


Keywords: Analysis, Criterion, Data, Design, Interaction, Performance, Routing, Session

Abstract
This paper proposes an efficient routing scheme, that deals with time management for re-routing data that must support a session communication process. As every communicating node has time limits, which it must support in order to establish a session, system management at the software level is essential in order to sustain the data traffic routing feature designed in the network, design specified by analysis criteria which formalize how information is conveyed as network packets. Overall system characteristics deal with technical methods for ensuring data security and integrity, while the availability of the session process is desired and concluded from reliability characteristics.

References
[1] Oscar Lopez, Miguel A. Laguna, Francisco J. Garcia, Reuse based Analysis and Clustering of Requirements Diagrams.
[2] Kamal A. Ahmat, Graph Theory and Optimization Problems for Very Large Networks, CoRR, 2009.
[3] J. H. Saltzer, D. P. Reed and D. D. Clark, End – to – End Arguments in System Design, ACM TOCS, Vol. 2, No. 4, pp. 277 – 288, Nov. 1984.
[4] William J. Dally, Brian Towles, Route Packets, Not Wires: On-Chip Interconnection Networks, DAC \'01, pp. 684 – 689, 2001.
[5] Andrew T. Campbell, Herman G. De Meer, Michael E. Kounavis, Kazuho Miki, John B. Vicente, Daniel Villela, A Survey of Programmable Networks, ACM SIGCOMM, Vol. 29, No. 2, pp. 7 – 23, April 1999.
[6] Tommy M. McGuire, Correct Implementation of Network Protocols from Abstract Specifications, 8 December, 1999.
[7] http://www.erg.abdn.ac.uk/~gorry/eg3561/inet-pages/tcp.html.
[8] Leslie Lamport, Robert Shostak, Marshall Pease, The Byzantine Generals Problem, ACM TOPLAS, Vol. 4, No. 3, pp/ 382 – 401, July 1982.
[9] http://www.ibm.com/developerworks/linux/library/l-cluster1/.
[10] http://www.geeks3d.com/2010048/game-engine-multi-threadingprogramming-resources/.
[11] Alice Este, Francesco Gringoli, Luca Salgarelli, Support Vector Machines for TCP Traffic Classification, Preprint submitted to Computer Networks 12 May 2009.
[12] Nelson Piedra, Janneth Chicaiza, Jorge Lopez, Jesus Garcia, Study of the Application of Neural Networks in Internet Traffic Engineering, Book2, Advanced Research in Artificial Intelligence, ISSN: 1313 – 0455, 2008.
[13] http://tycho.usno.navy.mil/NTP/img/strata.jpg.
[14] Manoj Kumar Kona, Cheng-Zhong Xu, A Framework for Network Management using Mobile Agents, IPDPS 2002.
[15] http://en.wikipedia.org/wiki/Neil_J._Gunther.
[16] JoAnn M. Paul, Brett H. Meyer, Amdahl’s Law Revisited for Single Chip, International Journal of Parallel Programming, Vol. 35, No. 2, April 2007.
[17] http://www.scenarioplus.org.uk/papers/stakeholder_taxonomy/stakeholder_taxonomy.htm.
[18] Giuliano Casale, Marco Gribaudo, Giuseppe Serazzi, Tools for Performance Evaluation of Computer Systems: Historical Evolution and Perspectives, PERFORM 2010.
[19] Jitendra Padhye, Victor Firoiu, Don Towsley, Jim Kurose, Modeling TCP Throughput: A Simple Model and its Empirical Validation, http://www.cs.umass.edu/~vfiroiu/.
[20] Tuncay Bayrak, Performance Metrics for Disaster Monitoring Systems, Natural Hazards, Vol. 58, No. 3, pp. 1193 – 1208, September 2011.