Loop-Free Updates of Forwarding Tables Author : Jing Fu, Peter Sjödin and Gunnar Karlsson Publisher : IEEE Transactions on Network and Service Management.

Slides:



Advertisements
Similar presentations
Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
Advertisements

Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Chapter 4 Distributed Bellman-Ford Routing
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
Infocom 2003 An Approach to Alleviate Link Overload as Observed on an IP Backbone Tuesday, April 1 st Infocom 2003 Sundar Iyer 1,2, Supratik Bhattacharrya.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
RD-CSY /09 Distance Vector Routing Protocols.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
Berkeley slides were used for this tutorial1 Internet Networking Spring 2006 Tutorial 2 DUAL Algorithm.
Delivery, Forwarding, and Routing
A Preferred Link Based Multicast Protocol for Wireless Mobile Ad hoc Networks R. S. Sisodia, Karthigeyan. I, B. S. Manoj, and C. Siva Ram Murthy ICC 2003.
Copyright © 2012, QoS-aware Network Operating System for Software Defined Networking with Generalized OpenFlows Kwangtae Jeong, Jinwook Kim.
Analysis of RIP, OSPF, and EIGRP Routing Protocols using OPNET Group 5: Kiavash Mirzahossein Michael Nguyen Sarah Elmasry
Introduction to networking Dynamic routes. Objectives  Define dynamic routing and its properties  Describe the classes of routing protocols  Describe.
SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks Authors: Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta, Lili Qiu Published:
Routing Information Protocol (RIP). Intra-and Interdomain Routing An internet is divided into autonomous systems. An autonomous system (AS) is a group.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
U-Turn Alternates for IP/LDP Local Protection draft-atlas-ip-local-protect-uturn-00.txt Alia Atlas Gagan Choudhury
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
1 Data Link Layer Lecture 23 Imran Ahmed University of Management & Technology.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Doc.: IEEE /0636r0 Submission April 2008 L. Chu Etc.Slide 1 Symmetrical Airtime Link Metric Report and Path Loop Avoidance Date: Authors:
On Improving the Efficiency and Manageability of NotVia Ang Li †, Pierre Francois ‡, and Xiaowei Yang † † UCIrvine ‡ Université catholique de Louvain CoNext.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Distance Vector Routing
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
82 nd Taipei Protection Mechanisms for LDP P2MP/MP2MP LSP draft-zhao-mpls-mldp-protections-00.txt Quintin Zhao, Emily Chen, Huawei.
Distance Vector and Link State Routing Pragyaditya Das.
Max do Val Machado Raquel A. F. Mini Antonio A. F. Loureiro DCC/UFMG DCC/PUC Minas DCC/UFMG IEEE ICC 2009 proceedings Advisor : Han-Chieh Chao Student.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
The network layer: routing
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Authors: Jiang Xie, Ian F. Akyildiz
Dynamic Routing Protocols part2
Routing Information Protocol (RIP)
CS 457 – Lecture 12 Routing Spring 2012.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ECE 544 Protocol Design Project 2016
Network Layer Path Determination.
Dynamic Routing Protocols part2
ECE 544 Protocol Design Project 2016
Symmetrical Airtime Link Metric Report and Path Loop Avoidance
Static Routing 1st semester
Link-State Routing Protocols
Intradomain Routing Outline Introduction to Routing
Introduction to networking
COS 561: Advanced Computer Networks
COS 461: Computer Networks Spring 2014
Advanced Computer Networks
Achieving Resilient Routing in the Internet
Static Routing 2nd semester
OSPF Protocol.
Presentation transcript:

Loop-Free Updates of Forwarding Tables Author : Jing Fu, Peter Sjödin and Gunnar Karlsson Publisher : IEEE Transactions on Network and Service Management Presenter : Wen-Tse Liang Date : 2011/3/30 1

 Introduction  Transient loops  Forwarding Information  Loop-Free FIB Updates  Update order in a single forwarding tree  An algorithm to compute the loop-free order  Approaches to update a forwarding matrix  Performance Studies 2 Outline

 When the forwarding paths change, the forwarding information bases (FIBs) in the routers need to be updated. During the update process, transient loops might occur since some routers may have updated their FIBs while others have not.  Therefore, transient loops should be avoided when possible, particularly for non-urgent forwarding path changes. The events that can be considered as non- urgent include maintenance, changes of link weights and restoration after failure of protected links. 3 Introduction

 In this paper, we propose an update order to avoid transient routing loops during FIB updates.  we present several algorithms that update FIBs in accordance with this order, and discuss how these update algorithms can be applied to both decentralized routing protocols and networks with centralized control. 4 Introduction

 If NYCM updates its routing table before WASH, the packets sent by NYCM to DNVR via WASH will loop on the WASH-NYCM link. To avoid causing a transient loop between WASH and NYCM 5 Transient loops

 we define a node Na, to be an upstream node of node Nb if Na uses Nb to reach the destination. 6 Forwarding Information

 The problem of finding an update order in a forwarding matrix can be first divided into studying individual forwarding trees. Thereafter, by combining update orders in all forwarding trees, an update order for the forwarding matrix is derived.  the update order can be specified using iterations. At each iteration, a number of FIBs can be updated simultaneously or in any order. When all routers in an iteration have updated their FIBs, a new update iteration starts. Therefore, the update process is performed over a number of iterations, following a specific order. 7 Loop-Free FIB Updates

 Theorem 1 (Updatable conditions):  In tree Tt, the node is a leaf node or all its upstream nodes have been updated.  In tree Tf, the node reaches the destination directly, or all its downstream nodes in tree Tf have already been updated in tree Tt. 8 Update order in a single forwarding tree

 Theorem 2 (Simultaneous updates):  If there are several updatable nodes in a transient forwarding tree, then any update order among these nodes is loop-free. 9 Update order in a single forwarding tree

 The algorithm studies a forwarding tree and determines whether a node is updatable in an update iteration.  The first part is to decide if a node can be updated according to the first updatable condition and the second part is for the second updatable condition. 10 An algorithm to compute the loop-free order

 tradeoff between two metrics: the number of FIB updates performed in all routers in the network and the number of iterations required to perform FIB updates. 11 Approaches to update a forwarding matrix

 The first approach is to update all the updatable elements in the forwarding matrix, resulting in more FIB updates in the network. However, this approach may finish the update process in fewer iterations.  The second approach is to only update fully updatable rows. In this approach, exactly one FIB update is performed in each router. the rows with more updatable elements being preferred.  The third approach updates a minimum number of rows in each iteration.  When the number of fully updatable rows is larger than this minimum number, all fully updatable rows are updated. 12 Approaches to update a forwarding matrix

 The topology we used is from AS 1239, the Sprint network, consists of 315 routers and 975 links.  single link down events  five simultaneous link down events  resetting 20% of the link weights and  resetting all the link weights 13 Performance Studies

 Number of changed FIBs  Each curve shows the results of 100 simulation runs for a specific type of event, sorted in increasing order. 14 Performance Studies

 the ratio between the number of FIB updates and the number of changed FIBs 15 Performance Studies

 the ratio between the number of FIB updates and the number of changed FIBs 16 Performance Studies

 Number of update iterations 17 Performance Studies

 Number of update iterations 18 Performance Studies

 an iteration may take at most 350 ms (200 ms for the FIB updates and 150 ms for the notification), Performance Studies 19