Skip to main content

Implementation of Cross-Protect Router

  • Chapter
  • First Online:
Guide to Flow-Aware Networking

Part of the book series: Computer Communications and Networks ((CCN))

  • 508 Accesses

Abstract

The first implementation of the cross-protect router is described in this chapter. Moreover, the results of tests of an XP router prototype conducted in a laboratory are presented. These results show the advantages of the XP router over the IP router. It is shown that traffic in FAN is served fairly and the packets of streaming flows are transmitted with high priority. Moreover, test results confirm that streaming flows are served with acceptable quality even in highly loaded links, which is not observed for the classic IP network. The tests also show several problems which were not caught by the simulation studies presented before. The tests ultimately show that Flow-Aware Networking works as a concept, and that, by reaching maturity, it is ready for large-scale deployment. As a software framework for the implementation the Click Modular Router environment which is widely used for building experimental software routers and switches was chosen.

Being busy does not always mean real work. The object of all work is production or accomplishment and to either of these ends there must be forethought, system, planning, intelligence, and honest purpose, as well as perspiration. Seeming to do is not doing.

Thomas A. Edison

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Domzal, J. Dudek, P. Jurkiewicz, L. Romanski, and R. Wojcik, “The cross-protect router: implementation tests and opportunities,” IEEE Communications Magazine, vol. 52, no. 9, pp. 115–123, Sept. 2014.

    Google Scholar 

  2. Online, June 2015, http://read.cs.ucla.edu/click/click, downloaded on 2015-06-30.

  3. R. Stankiewicz, P. Cholda, and A. Jajszczyk, "Qox: What is it really?" Communications Magazine, IEEE, vol. 49, no. 4, pp. 148–158, 2011.

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to thank Piotr Jurkiewicz, Jakub Dudek, and Łukasz Romański for their support, valuable comments, and suggestions on improving the quality of this chapter.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jerzy Domżał .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Domżał, J., Wójcik, R., Jajszczyk, A. (2015). Implementation of Cross-Protect Router. In: Guide to Flow-Aware Networking. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-24975-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24975-9_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24973-5

  • Online ISBN: 978-3-319-24975-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics