Path restoration schemes for MPLS networks VICENTE ALARCON-AQUINO AND MARCELINO MINERO-MUÑOZ

I

t is well known that the Internet is based on a connectionless, unreliable service, which implies no delivery guarantee. It is also recognized that Internet growth has taken an exponential and unstoppable course; at the same time there has been an increasing demand for new and more sophisticated services. Therefore, the technology has had to undergo fundamental changes with respect to the usual practices developed in the mid-1990s. In this super-growth environment, the Internet service providers (ISPs) must find a way to adjust the dramatic growth of network traffic and number of users. To avoid having equipment specifically designed for the new Internet applications, ISPs had to adapt any commercially available equipment. As infrastructure, the asynchronous transfer mode (ATM) switching equipment was the only technology that provided the required bandwidth, packet forwarding capacities, and traffic engineering. The idea was to combine, in many ways, the effectiveness and yield of the ATM switches with the control capabilities of IP routers. The answer was the deployment of the “IP over ATM” model (IP/ATM). The IP/ATM operation supposes the overlapping of a logical topology of IP routers over a physical topology

Digital Object Identifier 10.1109/MPOT.2011.940647 Date of publication: 18 March 2011

22

© EYEWIRE

of ATM switches. The main advantage of IP/ATM is that it executes the translation from a connectionless-based IP data transfer to a connection-oriented-based ATM data transfer. However, the solution that IP/ATM introduces for meeting the cell tax problem is the increase of interconnecting IP nodes. As a result, the Internet Engineering Task Force (IETF) has proposed several service models and mechanisms to provide end-to-end quality of service (QoS). Some of these services are integrated services like resource reservation protocol (RSVP) and multiprotocol label switching (MPLS), among others. The integrated services are characterized by a resource reservation before the data transmission begins, which implies route definition. In these services, the datagram can be assigned to different classes. The MPLS technology was developed after ATM and offers several services, namely, QoS, IP traffic engineering support, and creation of virtual private networks. MPLS inte0278-6648/11/$26.00 © 2011 IEEE

grates layer 2 and layer 3 of the open systems interconnection (OSI) model without discontinuities, and therefore combines the routing control functions of the layer 3 and commutation speed of layer 2 through a network. MPLS technology may be applied to any layer 3 network protocol, although almost all of the interest is in using MPLS with IP traffic. This technology uses signaling protocols to exchange messages between hosts in a network and provides specifications for the routing, forwarding, and switching of traffic flows through a network.

MPLS components MPLS is based on the label switching, also called tag switching, technology that can be characterized by its use of label swapping packet forwarding combined with IP control protocols and a label distribution protocol (LDP). A label is a short fixed-length underlying protocolspecific identifier for a path that a packet IEEE POTENTIALS

should traverse. High-speed switching of data is possible by the insertion of these labels at the beginning of the packet, and this can be used by hardware to switch packets quickly between links. To deploy MPLS in an IP network, the shim header is inserted between the layer 2 and the layer 3 headers. Fig. 1 shows the insertion of the shim header. The label or tag field includes the physical label that identifies the packet. The EXP field is used for QoS implementations. The S field is used to indicate if label stack is present. The time-to-live (TTL) field prevents packets from looping forever in the network. Fig. 2 shows the standard components that form an MPLS network. In MPLS, data transmission through the network occurs on label switched paths (LSPs). LSPs are a sequence of labels at every node along the path from the traffic source to its destination. LSPs are established either prior to data transmission (control-driven) or upon detection of a certain flow of data (data-driven). Label switching routers (LSRs) are the devices that participate in the MPLS protocol mechanisms. LSRs are high-performance routers that provide fast packet forwarding by performing the label swapping process and are located at the core of the network. Label edge routers (LERs), on the other hand, are devices that operate at the edge of the MPLS network. LERs have very important functions in the label distribution process when a packet ingresses into the MPLS network and in the removal of labels when a packet leaves the network to the corresponding access network. The forwarding equivalence class (FEC) is an identifier for a group of packets that share the same requirements for their transport and are forwarded in the same way through an MPLS network. FECs are built with information generated by an interior gateway protocol (IGP), such as open shortest path first (OSPF). In order to support hierarchical routing, MPLS uses the label stack. The label stack is a set of labels attached to a packet organized in a last-in, first-out structure. This stack allows the MPLS network to operate in tunneling mode. This is a unique feature of MPLS for controlling the entire path of a packet without specifying the intermediate routers.

Path restoration schemes When working with real networks, path congestion and link failure are very recurrent problems. It is important for the network manager to support path protection and restoration MARCH/APRIL 2011

THERE ARE SEVERAL SCHEMES THAT ARE USED FOR COMPARISON PURPOSES WHEN A NEW ARCHITECTURE IS PROPOSED. SOME OF THESE SCHEMES ARE HASKIN, MAKAM, AND SIMPLE DYNAMIC AS WELL AS FAST REROUTING RELIABLE FAST REROUTING AND OPTIMAL GUARANTEED ALTERNATE ROUTE.

schemes. These schemes are based on the type of failure, and each one has characteristics that make it preferable over others and depends on the specific requirements of the network. There are several schemes that are used for comparison purposes when a new architecture is proposed. Some of these schemes are Haskin, Makam, and simple dynamic as well as fast rerouting (FR), reliable fast rerouting (RFR), and optimal guaranteed alternate path

Data Link Layer Header

(OGAP). These schemes use an alternate route to forward traffic around a failure that occurs in a primary route and their objectives are to minimize the time of establishment of this alternate route and to avoid the excessive lost of information. The aforementioned schemes are classified as follows: • Local repair: minimizes the amount of time required for failure propagation. Hence, if the restoration can be realized in a local manner it can be accomplished faster. • Global repair: considers that the nodes and links along the primary route are protected by one restoration route. In case of failure, the restoration scheme sends a failure indication signal (FIS) to the ingress LSR node (also known as LER), and when it receives this FIS, the alternate route is activated from this ingress LSR node. It is worth noting that path restoration schemes in reconfigurable hardware for MPLS networks have been proposed by the authors and are reported elsewhere.

Haskin scheme The Haskin path restoration scheme uses alternate routes previously established

Network Layer Header

MPLS Shim Header

Other Layer Headers and Data

32 b

20 b LABEL

3b 1b EXP

S

8b TTL

Fig. 1 MPLS shim header.

MPLS Network

LSR4

R1

LER1

LSR1 IPv4 LER LSR Router

LSR5

LSR6

LER2

LSR2

R2

LSR3 FEC 1 FEC 2 Untagged Packet Tagged Packet LSP1, LSP2

Fig. 2 MPLS components.

23

R4

R5

R6

R7

R0 Failure IPv4 LER LSR Router

R1

R2 R3 Primary Route Alternate Route

Fig. 3 Haskin scheme.

R4

R5

R6

R7

R0 Failure IPv4 LER LSR Router

R1

R2 R3 Primary Route Alternate Route Rout

Fig. 4 Makam scheme.

R4

R5

R6

R7

R0 Failure IPv4 LER LSR Router

R1

R2 R3 Primary Route Alternate Route

Fig. 5 Simple dynamic scheme.

with local repair (see Fig. 3). In this scheme the network topology allows the establishment of the alternate route between the ingress and egress LSRs (also known as LERs) of the LSP tunnel in such way that the alternate LSP does not share any resource with the route to be protected. The main idea of this scheme is to return the traffic from the point of failure on the protected LSP to the ingress LSR so that the traffic could be redirected through an alternate route between the ingress LSR and the egress LSR of the protected tunnel. The alternate route is established as follows: • The initial segment of the alternate LSP is between the last hop LSR 24

THE FAST REROUTING SCHEME ADDRESSES THE DRAWBACKS OF THE HASKIN SCHEME WITH RESPECT TO ROUND-TRIP DELAY AND PACKET DISORDER DURING RESTORATION. THESE ASPECTS ARE ADDRESSED BY A SWITCHOVER PROCEDURE INITIATED IN THE LSR THAT DETECTS A FAILURE.

before the point of failure (R2) and the ingress LSR or LER (R0) in the opposite direction of the protected LSP. • The final segment of the alternate route is defined between the ingress LSR (R0) and the egress LSR (R7), that is, R0R4-R5-R6-R7.

Makam scheme The Makam path restoration scheme uses global repair and allows dynamic and prenegotiated activation of the alternate route (see Fig. 4). However, the dynamically-established alternate routes add more time to the restoration operation compared with the prenegotiated activation.

The establishment of the alternate route for this scheme is as follows: • When a failure is detected, the node detecting the failure (R2) sends an FIS to the ingress LSR node (R0). • All packets in transit between the failure detection and the moment in which the FIS arrive to the ingress LSR node are lost. • When the ingress LSR node (R0) receives the FIS redirects the traffic through an alternate route to the egress LSR node (R7). The main difference between this scheme and the Haskin scheme is that it does not redirect the traffic from the point of failure. Instead, it redirects the traffic from the ingress LSR node (R0).

Simple dynamic scheme The simple dynamic scheme uses local repair and dynamic activation. Hence, the alternate route is established when the point of failure is detected (see Fig. 5). When a failure in the primary route occurs (R0-R1-R2-R3-R7), the node that detects the failure (R2) establishes a backup path or alternate route (R0-R1R2-R5-R6-R7) by rerouting the traffic flow through the nearest usable link toward the destination node. This scheme can consider link failures as well.

Fast rerouting scheme The FR scheme addresses the drawbacks of the Haskin scheme with respect to round-trip delay and packet disorder during restoration. These aspects are addressed by a switchover procedure initiated in the LSR that detects a failure (see Fig. 6). This switchover procedure consists of sending the packets from the LSR that detect the failure (R2) backward through the primary LSP (R1-R0). This switchover IEEE POTENTIALS

R4

R5

R6

18 17 Hold On Packets

R0 5

R1

6

7

R2

15

LER

LSR

R7

R3 16

Failure 10

11 12 13 14

IPv4 Router

9

8

4

3

2

1

Lost Packets

Buffer R1

Switchover Procedure

Primary Route

Tagged Packet

Alternate Route

Failure Indication Signal

Fig. 6 Fast rerouting scheme.

LSP to the stored packets (packet 11 to 14 in R1). According to Fig. 6 the alternate LSP is formed by the following elements: R1-R0-R4-R5-R6-R7.

procedure does not avoid the lost packets in transit between the node that detects the failure and the node with the failure (packets 1 through 4). When the nodes in the backward LSP detect these packets, they start storing the incoming packets in a local buffer (buffer R1). The last packet forwarded to the primary LSP by these nodes before initiating storage is tagged (packet 10) in order to be identified when it is on its way back. By doing this, the order of the packets is preserved since the intermediate nodes (R1 and R0) in the backward LSP examine the tagged packet and determine when to start sending through the backward

RFR, each LSR in the primary route has a buffer into which a copy of each packet is stored while it is forwarded through the primary route. In this scheme the packets in transit between R2 and the failure in R3 are stored in the buffer of R2.

Reliable and fast rerouting scheme The factors that affect the FR scheme are packet loss, traffic recovery delay, and packet disorder. The RFR scheme eliminates both packet loss and packet disorder during the restoration period (see Fig. 7). In this scheme, as soon as an LSR node in the primary route (protected route) detects a failure, a switchover is established and packets are tagged and sent back through the backward LSP. In

R4

R5

Optimal and guaranteed alternate path scheme When a failure exists in a primary LSP, the backup LSP is used and thus this becomes a new primary LSP, which is not protected by an alternate LSP. This problem is addressed by the OGAP scheme. The OGAP scheme avoids the problems created when there is a change

R6

18 17 Hold On Packets

R0 1

16

R1

1

4

R3

15

Failure 10

16 Buffer R0

LER

LSR

1 IPv4 Router

R7

R2

11

10 16 Buffer R1

5

4 1 5 2 3 4 10 Buffer R2

3

2

1 Switchover Procedure Primary Route

Tagged Packet

Alternate Route

Failure Indication Signal

Fig. 7 Reliable and fast rerouting scheme.

MARCH/APRIL 2011

25

R8

R7

R4

R5

R6

18 17 Hold On Packets

R0 1 16

R1

1

R3 4

R2

15

Failure 10

16 Buffer R0

LER

LSR

IPv4 Router

1

11

10

16

5

4 5 1 2 3 4 10 Buffer R2

Buffer R1

3

2 1

Primary Route

Switchover Procedure

New Primary Route (NPR)

Tagged Packet

Backup Route for NPR

Failure Indication Signal

Fig. 8 Optimal and guaranteed alternative path scheme.

in the backup LSP after it is calculated. The search for a backup LSP for the new primary LSP is accomplished when the traffic is being conveyed through the new primary LSP. The OGAP characteristics are a low packet disorder during restoration and the ability to handle several failures in a network, not just a single failure. According to Fig. 8, the primary route is formed by the following elements: R0-R1-R2-R3-R9. The new primary route (NPR) for the failure shown is formed by R1-R0-R4-R5-R6-R9, and a possible backup route for the NPR may be formed by R4-R0-R7-R8-R9.

OMNET11 IS AN OBJECT-ORIENTED OPEN SOURCE SOFTWARE USED TO SIMULATE, IN MODULAR FORM, DISCRETE EVENTS AND HAS A GRAPHICAL USER INTERFACE USED TO DEVELOP SIMULATIONS OF DIFFERENT COMMUNICATION NETWORKS.

Simulation results To assess the performance of the aforementioned path restoration schemes simulations in terms of arrival time to destination are carried out in OMNET11. OMNET11 is an objectoriented open source software used to simulate, in modular form, discrete events and has a graphical user interface used to develop simulations of different communication networks. It also uses a network description (NED) language for the graphical construction of the network. OMNET++ simulations can be carried out in parallel form providing results similar to those obtained in real networks. To perform the simulations we use the network topology shown in Fig. 9. Simulations for all models are carried out 26

by sending a trivial file transfer protocol (TFTP) packet from host H2 to host H3 of 28 kb in 19 fragments in order to guarantee the payload in the data link layer. This network consists of four IPv4 routers (R1, R2, R3, and R4) connected to an MPLS network that consists of 10 LSRs and four LERs (LER1, LER2, LER3, LER4). For each one of the simulated schemes, the primary route (working path) consists of the nodes R2-LER2LSR2-LSR5-LSR8-LER3-R3. In addition, for each one of the path restoration schemes a failure in the link between nodes LSR5 and LSR8 is simulated after seven fragments of the TFTP message are sent toward their destination. The remaining fragments are sent to the destination using an alternate route accord-

ing to the operation rules of each scheme. In the case of the Haskin, Makam, FR, RFR, and OGAP schemes the alternate routes (backup path) are formed by the following elements: LER2LSR1-LSR4-LSR7-LSR10-LER3. In the case of the simple dynamic scheme, the alternate route (backup path) is formed by LER2-LSR2-LSR5-LSR7-LSR10-LER3. The simulation results show that the simple dynamic scheme has the lowest arrival time when a failure in the primary route occurs (see Table 1). Furthermore, the time required to establish the alternate route is minimal, and so the packet loss is reduced when compared to Haskin and Makam schemes. Note that the label distribution setup in the analyzed MPLS network takes 170 ms for all the simulated schemes. From the results obtained we can also observe that the transit time used to send a packet from origin to destination for Haskin and Makam schemes along with packet loss is a consequence of sending back packets from the point of failure to the ingress LSR (LER2). In addition, FR and RFR schemes provide similar transit times when compared to the Haskin scheme since these schemes are Haskin-based. The only difference is that they require additional buffers in the LSR that constitute the primary LSP. As a result, these buffers involve an additional memory time processing (MTP). For simulation purposes, the buffers (with size 8) IEEE POTENTIALS

H4

200.52.207.48/28 Net_02

H3

223.27.9.0/24 MPLS_Net

LER4

included in the primary LSP add a time of 23.55 microseconds per data link layer packet in terms of MTP for a CPU with a clock frequency of 50 MHz. Moreover, the OGAP scheme provides an increased arrival time since it requires an additional time of 110 ms to establish the NPR. In this paper, the OGAP simulation is carried out without considering the activation of the NPR.

LSR9

LSR10 LSR4 LSR1

Backup Path R1 H1

Fig. 9 Simulated network for the Haskin scheme.

LER1

LSR2

LSR3

In:64 Out:65 In:63 Out:64

Conclusion

Working Path

LSR6

LSR7

In:65 Out:66

LSR8 LSR5

Failure LER2

200.57.157.160/28 Net_01

H2

R2

Out:63

In:66 Out:67

In:0

LER3

R4

R3 2) LDP Session Establishment • Determine Active/Passive Role • Send/Receive LDP Initialization Message 4) Label Switched Path Created • Send/Receive LDP Keep Alive Message LDP Process In:61 Out:62 In:374580 Out:304153 In:304153 Out:0

3) LDP Distribution and Management • Send LDP Address Message to Peers • Send LDP Request Message • Send LDP Mapping Message 1) LDP Basic Discovery Mechanism • Sens/Receive LDP Hello Message Haskin_Compare

MARCH/APRIL 2011

THE SIMULATION RESULTS SHOW THAT THE SIMPLE DYNAMIC SCHEME HAS THE LOWEST ARRIVAL TIME WHEN A FAILURE IN THE PRIMARY ROUTE OCCURS.

We have presented an overview and simulation of several path restoration schemes for MPLS networks. Each scheme has its own advantages and disadvantages that make them appropriate for different applications. These characteristics include recovery time in case of failure, packet loss, packet reordering, and recovery delay. The decision of implementing some of these schemes in a real network depends on how much resources are available and the requirements of the network user’s. Furthermore, simulation results based on OMNET11 show that the simple dynamic scheme has the lowest arrival time when compared to the other reported path restoration schemes. Future work will be focused on investigating further comparisons and enhancements of these schemes.

Read more about it • D. Haskin and R. Krishnan. (2000, May). A method for setting an alternative label switched path to handle fast reroute [Online]. Available: http:// tools.ietf.org/html/draft-haskin-mplsfast-reroute-04 • S. Makam, V. Sharma, K. Owens, and C. Huang. (1999, Oct.). Protection/restoration of MPLS networks [Online]. Available : http ://tools.ietf. org / ht m l /draft-makam-mpls-protection-00 • G. Ahn and W. Chun, “Design and implementation of MPLS network 27

received Ph.D. and D.I.C. degrees in performance moniTransit Time Memory toring of communication Path Message NPR from Time Arrival networks using wavelet Restoration Time Time Origin to Processing Time to Scheme Departure Creation Destination (MTP) Destination transforms from Imperial College London in the UnitHaskin 170 ms – 130 ms – 300 ms ed Kingdom. His current Makam 170 ms – 150 ms – 320 ms research interests include Simple Dynamic 170 ms – 90 ms – 260 ms security in communication Fast Rerouting 170 ms – 130 ms 0.376 ms 300.376 ms networks, wavelet theory (FR) applied to performance Reliable FR 170 ms – 130 ms 0.753 ms 300.753 ms moni toring of communiOGAP 170 ms 110 ms 130 ms 0.753 ms 410.753 ms cation networks, waveletbased image processing, • A. Varga. (2001). OsMNeT++ dissimulator (MNS) supporting QoS,” in Proc. and path restoration in MPLS networks. crete event simulation system [Online]. 15th IEEE Int. Conf. Information NetworkMarcelino Minero-Muñoz (marcelino. Available: https://labo4g.enstb.fr/twiki/ ing (ICOIN’01), pp. 694–699, Feb. 2001. [email protected]) received the M.Sc. pub/Simulator/SimulatorReferences/ • L. H. Gonfa, “Enhanced fast redegree in electronics from the Univeresm2001-meth48.pdf routing mechanisms for protected traffic sidad de las Americas Puebla (UDLAP), in MPLS networks,” Ph.D. dissertation, Mexico. He is currently pursuing his Universitat Politécnica de Catalunya, Ph.D. degree at Imperial College LonAbout the authors Apr. 2003. don in the United Kingdom, in the area Vicente Alarcon-Aquino (vicente.alarof intelligent systems and networks. He [email protected]) is a full-time professor in • M. Minero-Muñoz and V. Alarconwas previously a full-time professor at the Department of Computing, ElectronAquino, “Reconfigurable path restoration UDLAP in the Department of Computics, and Mechatronics at the Universischemes for MPLS networks,” J. Comput. ing, Electronics, and Mechatronics. dad de las Americas Puebla, Mexico. He Sci., vol. 8, no. 2, pp. 29–38, June 2009. Table 1. Arrival times for simulated path restoration schemes.

28

IEEE POTENTIALS

Path restoration schemes for MPLS networks

Layer Header. Other Layer. Headers and Data. Fig. 1 MPLS shim header. MPLS Network. R1. LER1. LSR4. LSR5. LSR6. LSR1. LER LSR. IPv4. Router. LSR2. LSR3. LER2. R2. FEC 1. FEC 2. Untagged Packet. Tagged Packet. LSP1, LSP2. Fig. 2 MPLS components. THERE ARE SEVERAL. SCHEMES THAT ARE USED.

1MB Sizes 2 Downloads 146 Views

Recommend Documents

Reconfigurable Path Restoration Schemes for MPLS ... - CiteSeerX
(Received November 09, 2008 / Accepted April 26, 2009). 1 Introduction. The Internet is based on a connectionless, unreliable service, which implies no delivery ...

Reconfigurable Path Restoration Schemes for MPLS ... - CiteSeerX
(Received November 09, 2008 / Accepted April 26, 2009). 1 Introduction. The Internet is based on a connectionless, unreliable service, which implies no delivery ...

Relay Selection Schemes for Dual-Hop Networks under ...
Oct 28, 2012 - share their antennas, spatial diversity can be achieved in the fashion of ..... (10). The corresponding achievable secrecy rate is expressed by. Copt = [Ck∗,D − Ck∗,E]. + . (11). The new selection metric is related to the maximiz

Energy efficient schemes for wireless sensor networks ...
Department of Computer Science. †. School of Management ... Abstract— One of the main design issues for a sensor network ..... in Sensor Information Systems.

Alternative Data Gathering Schemes for Wireless Sensor Networks
We comparatively discuss advantages and disadvantages of the four ... Index Terms: Data gathering, Data-centric storage, Wireless sensor networks. 1.

Monitoring Path Nearest Neighbor in Road Networks
paths. IEEE Transactions on Systems Science and. Cybernetics, 4(2):100–107, July 1968. [6] G. R. Hjaltason and H. Samet. Distance browsing in spatial databases. ACM Trans. Database Syst.,. 24(2):265–318, 1999. [7] C. S. Jensen, J. Kolárvr, T. B.

Monitoring Path Nearest Neighbor in Road Networks
show that our methods achieve satisfactory performance. Categories and Subject Descriptors. H.2.8 [Database Applications]: Spatial databases and. GIS. General Terms ... 5.00. Keywords. Path Nearest Neighbor, Road Networks, Spatial Databases ..... k-P

Path delays in communication networks - Springer Link
represent stations with storage capabilities, while the edges of the graph represent com- ... message time-delays along a path in a communication network.

A Survey of Key Management Schemes in Wireless Sensor Networks
F. Hu is with Computer Engineering Dept., Rochester Institute of Technology, ...... sensor networks, 3G wireless and mobile networks, and network security.

A Survey of Key Management Schemes in Wireless Sensor Networks
Wireless sensor network, key management, security, key predistribution, pairwise key, ... F. Hu is with Computer Engineering Dept., Rochester Institute of Technology, Rochester, ..... phases that perform a particular job each, including Sender Setup,

ccnp mpls pdf
Whoops! There was a problem loading more pages. ccnp mpls pdf. ccnp mpls pdf. Open. Extract. Open with. Sign In. Main menu. Displaying ccnp mpls pdf.

Color Schemes
Name. Period ______. Color Schemes. Define Color Scheme: 1. The first color schemes is: Definition: Examples of colors: 2. The second color scheme is:.

NUMERICAL DISPERSIVE SCHEMES FOR THE ...
To recover the dispersive properties of the solutions at the discrete level, we ... nonlinear problems with L2-initial data, without additional regularity hypotheses. ... Project CIT-370200-2005-10 in the PROFIT program and the SIMUMAT project ...

Discretization schemes for fractional-order ...
This work was supported in part by U.S. Army Automo- ... (CSOIS), Department of Electrical and Computer Engineering, College of .... 365. Fig. 1. Recursive Tustin discretization of s at T = 0:001 s. A. Al-Alaoui Operator Based Discretization.

Discretization schemes for fractional-order ...
fractional order in the differentiator or integrator. It should be pointed ... Here we introduce the so-called Muir-recursion originally used in geophysical data.

Energy-Aware Path Selection in Mobile Wireless Sensor Networks: A ...
Energy-Aware Path Selection in Mobile Wireless Sensor .... Next, we illustrate the credit-based approach: a node is ... R is considered as a virtual credit of.

Approximation Schemes for Capacitated ... - Research at Google
set of types of links having different capacities and costs that can be used to .... all Steiner vertices in M have degree at least 3 and are contained in the small-.

Requirements for multimedia metadata schemes
1. Introduction. Surveillance systems are used for a wide range of settings and purposes. They have been proven .... In the same year,. Annesley [2] ...... received his PhD degree in Physics, Mathematics and Computer Science at the Radboud ...

mpls tutorial pdf
File: Mpls tutorial pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. mpls tutorial pdf. mpls tutorial pdf. Open. Extract.

Mpls Healthy Corner Store Program.pdf
There was a problem previewing this document. Retrying... Download. Connect more ... Mpls Healthy Corner Store Program.pdf. Mpls Healthy Corner Store ...