Effective Dual Decomposition Methods in Network Traffic Management with Multipaths
S Thirunavukkarasu1, K.P. Kaliyamurthie2

1S. Thirunavukkarasu, Department of Information Technology, Bharath Institute of Higher Education and Research, Tambaram, India.

2Dr. K.P. Kaliyamurthie, Professor & Dean, Department of Computer Science and Engineering, Bharath Institute of Higher Education and Research, Chennai (Tamil Nadu), India.

Manuscript received on 15 October 2019 | Revised Manuscript received on 29 October 2019 | Manuscript Published on 26 December 2019 | PP: 1276-1280 | Volume-8 Issue-12S October 2019 | Retrieval Number: K134310812S19/2019©BEIESP | DOI: 10.35940/ijitee.K1343.10812S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In today’s Internet, Traffic management has met the unhealthy operation. To get the healthy operation of an internet, they have developed several traffic management tools. Such tools are together with congestion control at end hosts, routers get the routing protocol and network operators using traffic engineering. In this paper, we have used current innovations in optimization theory to perform a start to end reformat of traffic engineering. The objective function has been proposed based on goals of end users and network operators. Hence, we combined four distributed algorithms by using all known optimization decomposition methods, where source acclimate their sending rates through multipaths, according to different classes of feedback from the links. Finally, we applied TRUMP, recent traffic management protocol, which is acclimate and strong. With the help of above protocol, we can maximize the network utilities.

Keywords: Traffic Engineering, Network Utility Maximization, Multipath Routing, Network Resource Management, TRUMP.
Scope of the Article: Ubiquitous Networks