E E 681 - Module 17 W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 ATM VP-based (or MPLS path) Restoration with Controlled Over-

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Optical communications & networking - an Overview
COMMUNICATION TECHNOLOGY by Shashi Bhushan School of Computer and Information Sciences.
Presented By: Pariya Raoufi. Motivations Future applications require: higher bandwidth, generate a heterogeneous mix of network traffic, low latency.
Quantitative Comparison of End-to-End Availability of Service Paths in Ring and Mesh- Restorable Networks Matthieu Clouqueur, Wayne D. Grover
Next Generation Networks Chapter 10. Knowledge Concepts QoS concepts Bandwidth needs for Internet traffic.
Dual-Plan Bandwidth Smoothing for Layered-Encoded Video Tong Gan, Kai-Kuang Ma, and Liren Zhang IEEE Trans. Multimedia, Apr
Path Protection in MPLS Networks Ashish Gupta Design and Evaluation of Fault Tolerance Algorithms with Performance Constraints.
ATM Networks An Engineering Approach to Computer Networking.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
1 EE 400 Asynchronous Transfer Mode (ATM) Abdullah AL-Harthi.
1 Token Bucket Based CAC and Packet Scheduling for IEEE Broadband Wireless Access Networks Chi-Hung Chiang
E E Module 18 M.H. Clouqueur and W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Analysis of Path Availability in Span-Restorable.
Models for Measuring and Hedging Risks in a Network Plan
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Asynchronous Transfer Mode (ATM)
IP layer restoration and network planning based on virtual protection cycles 2000 IEEE Journal on Selected Areas in Communications Reporter: Jyun-Yong.
Traffic Characterization Dr. Abdulaziz Almulhem. Almulhem©20012 Agenda Traffic characterization Switching techniques Internetworking, again.
Capacity Requirements for Network Recovery from Node Failure with Dynamic Path Restoration Gangxiang Shen and Wayne D. Grover TRLabs and University of.
ATM Dr. Abdulaziz Almulhem. Almulhem©20012 Agenda ATM Features Services Protocol ATM switching.
University of Alberta ECE Department Network Systems Gangxiang Shen, Wayne D. Grover Extending the p-Cycle Concept to Path-Segment Protection Gangxiang.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
EE 4272Spring, 2003 Chapter 11. ATM and Frame Relay Overview of ATM Protocol Architecture ATM Logical Connections ATM Cells ATM Service Categories ATM.
Broadband Communications via Satellite Presented by Eric Zucker.
1 EL736 Communications Networks II: Design and Algorithms Class11: Multi-Hour and Multi-Layer Network Design 12/05/2007.
1 EL736 Communications Networks II: Design and Algorithms Class10: Restoration and Protection Design of Resilient Networks Yong Liu 11/28/2007.
Data Communications and Networks Chapter 2 - Network Technologies - Circuit and Packet Switching Data Communications and Network.
Switching Techniques Student: Blidaru Catalina Elena.
© 2004 Mobile VCE 1 An SMR Based Advance Resource Reservation Scheme For Combined Mobility and QoS Provisioning Hao Wang The University.
End-to-end resource management in DiffServ Networks –DiffServ focuses on singal domain –Users want end-to-end services –No consensus at this time –Two.
QoS Architectures for Connectionless Networks
“A non parametric estimate of performance in queueing models with long-range correlation, with applications to telecommunication” Pier Luigi Conti, Università.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Background on Reliability and Availability Slides prepared by Wayne D. Grover and Matthieu Clouqueur TRLabs & University of Alberta © Wayne D. Grover 2002,
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1 William Stallings Data and Computer Communications 7 th Edition Chapter 11 Asynchronous Transfer Mode.
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
HIGH SPEED WIDE AREA NETWORKS BYWANJAU. Introduction  WANs – Group of LANs linked together by communication service providers over large geographically.
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
A T M (QoS).
ATM Technologies. Asynchronous Transfer Mode (ATM) Designed by phone companies Single technology meant to handle –Voice –Video –Data Intended as LAN or.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
DATA COMMUNICATION (ELA…) ASYNCHRONOUS TRANSFER MODE (ATM) 1.
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
SONET is used as a WAN. ANSI standard – SONET ITU-T standard – SDH Both are fundamentally similar and compatible.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
EE 122: Lecture 15 (Quality of Service) Ion Stoica October 25, 2001.
(Slide set by Norvald Stol/Steinar Bjørnstad
1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
WAN – Packet and Cell-switched Networks
Jntuk,vizianagaramdelhip, B-ISDN and ATM.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Switching. Circuit switching Message switching Packet Switching – Datagrams – Virtual circuit – source routing Cell Switching – Cells, – Segmentation.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
B-ISDN and ATM B-ISDN and ATM.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Network Survivability
ASYNCHORONOUS TRANSFER MODES
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
EE 122: Quality of Service and Resource Allocation
Switching Techniques.
EE 122: Lecture 7 Ion Stoica September 18, 2001.
Introduction to Survivable Rings
Switching.
Presentation transcript:

E E Module 17 W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 ATM VP-based (or MPLS path) Restoration with Controlled Over- subscription of Restoration Capacity based on work by Y. Zheng, W.D. Grover

E E Module 17 © Wayne D. Grover 2002, Differences between STM & ATM or MPLS STM (Synchronous Transfer Mode) –Transfer mode traditionally used for the Transport Layer –Example: SONET/SDH –Switching is done on OC-n level carrier signals (“switching the containers”) –Demands are served using reserved time slots (synchronous) ATM –Technology developed for the B-ISDN network –Supports multiple Classes of Service (with guaranteed Quality of Service) –Allows more efficient use of bandwidth by exploiting the statistical nature of data traffic –Switching is done on Virtual Paths Connections (VPC or VP) –Traffic is packetized and transmitted asynchronously MPLS –IETF Technology for realizing connection-oriented functions similar to ATM VP / VC constructs in an IP-based network –Uses label-switching concepts pioneered by ATM.

E E Module 17 © Wayne D. Grover 2002, STM & ATM Differences from a Restoration Viewpoint Demand decomposition: –STM: Demand bundles are broken apart for restoration –ATM: VPs must have single equal-sized backup VP Bandwidth replacement: –STM: “Perfect bandwidth replacement” is required –ATM: Some flow convergence overloads (over subscription of bandwidth) can be tolerated during restoration Impact on capacity requirement

E E Module 17 © Wayne D. Grover 2002, STM/ATM Comparison: Restoration Granularity STM: “fine grain” rerouting ATM: single backup VP AZ AZ 10 STS Before failure Possible STM restoration pattern AZ VP BW = 10 STS1 AZ Backup VP BW =10 STS1 ATM Backup VP on single route only

E E Module 17 © Wayne D. Grover 2002, STM/ATM Comparison: Bandwidth Replacement STM: B D ZA 1 3 B D ZA ATM (or MPLS): /3: 33% restoration-induced flow convergence overload ATM: Restoration flow convergence technically possible (at the expenses of a higher packet loss probability) STM: Perfect bandwidth replacement

E E Module 17 © Wayne D. Grover 2002, ATM Capacity Design: KST Algorithm An algorithm proposed in the literature (KST algorithm * ) can be used to do the capacity design of an ATM network for restoration of any failure of a single VP Each VP has a pre-assigned disjoint backup VP for which capacity is reserved Until a failure arises on the working VP, no traffic is sent on the backup VP (Corresponding bandwidth can be used for working traffic). Backup VPs are therefore referred to as “Zero bandwidth backup VPs” * R. Kawamura, K-I Sato, I. Tokizawa, “Self-healing ATM networks based on virtual path concept,” IEEE Journal on Selected Areas in Communications, vol. 12, no. 1, January ATM “pipe” Virtual Path Zero Bandwidth backup VPs

E E Module 17 © Wayne D. Grover 2002, The Problem of Backup Flow Over-Subscription The KST algorithm does not consider the fact that a physical failure can simultaneously affect several VPs When multiple VP’s fail simultaneously, restoration overload can be experienced on some spans: –Restoration over subscription factor on span j for failure of span i: * R. Kawamura, K-I Sato, I. Tokizawa, “Self-healing ATM networks based on virtual path concept,” IEEE Journal on Selected Areas in Communications, vol. 12, no. 1, January Over-subscription factors are not controlled in the design process and therefore can potentially reach high values

E E Module 17 © Wayne D. Grover 2002, Uncontrolled Over-subscription With KST algorithm the resulting over-subscription factors are not controlled in the design process As a result, worst case over-subscription factors can be very high Source of Data: Y. Zheng, W. Grover, M. MacGregor, “Broadband network design with controlled exploitation of flow convergence overloads in ATM VP-based restoration,” Proc. Canadian Conference on Broadband Research (CCBR’98). Uncontrolled peaks

E E Module 17 © Wayne D. Grover 2002, ATM Design with Controlled Over-Subscription IP1: Minimum Spare Capacity with Design Limit on Maximum Restoration Over-Subscription –Objective: –Subject to: 1) Sparing is sufficient to keep restoration over-subscription below the design limit for all failures 2) Backup VPs are sufficient to meet the target restoration for all working VPs 3) Only one backup VP can be used for each working VP, i.e. VP flows are not split

E E Module 17 © Wayne D. Grover 2002, ATM Design with Controlled Over-Subscription IP2: Minimum Over-Subscription for given Spare Capacity allocation –Objective: –Subject to: 1) Backup VPs are sufficient to meet the target restoration for all working VPs 2) Only one backup VP can be used for each working VP, i.e. VP flows are not split

E E Module 17 © Wayne D. Grover 2002, Results of IP1 with X tol = 1.0 Comparative Spare Capacity Requirements Limiting X j,i to 1.0 means: No over subscription allowed (equivalent to STM) The consequence is: Higher spare capacity requirements to guarantee full bandwidth replacement available for each physical failure The KST Algorithm has low spare capacity requirements but has no control over the maximum X j,i.

E E Module 17 © Wayne D. Grover 2002, IP1 Results: Spare Capacity Requirements vs. X tol Very high reduction of spare capacity requirement is observed when the maximum over- subscription ratio is increased The question then is: “What over-subscription ratio can we allow without too much degradation of service during span-failure states?”

E E Module 17 © Wayne D. Grover 2002, Statistics of X j,i for a given X tol X tol is only the design-limiting maximum over-subscription In a design with a worst case over-subscription X tol, what is the experience of most spans that are not at the worst case?

E E Module 17 © Wayne D. Grover 2002, Relating Over-subscription to cell-level effects How much over-subscription might be tolerable without undue cell-level effects? Criterion: “Allow the worst case over-subscription ratio to be such that a pre-failure cell- loss-probability (CLP) of would do degrade to more than 10 -5, during the restored state” Note: even this worst-case outcome would occur only for span j, upon failure of span i, where X j,i = X tol is the design-limiting instance AND the failure occurs at the design busy traffic hour AND at the growth build-out horizon of the installed equipment. Method: FIFO B (R 1,  1, b 1 ) (R 3,  3, b 3 ) (R 2,  2, b 2 ) (R N,  N, b N ) c -9 = equivalent bandwidth at which CLP=10 -9 for buffer size B Simulation Queuing Model Simulation parameters: (n,R, , b) n: number of sources R: peak rate per source  : utilization per source b: mean burst length

E E Module 17 © Wayne D. Grover 2002, Results of Equivalent Bandwidth Simulations Simulation determines the equivalent bandwidth c -5 at which CLP=10 -5 c -5 / c -9 corresponds to the over-subscription factor for which a CLP of will degrade to Results show that in many case, an over-subscription of 5 to 10% would be acceptable based on the CLP increase criterion This corresponds to a 10 to 20% reduction of spare capacity according to previous results (slide 12)

E E Module 17 © Wayne D. Grover 2002, Conclusion ATM is an alternative approach to transport networking that allows QoS control and a better exploitation of statistical nature of data traffic for higher capacity utilization However, we have seen that: –Capacity design for ATM transport networks needs to consider the possibility of multiple VP failures resulting from single physical failures otherwise potentially high overload situations could be experienced during restoration –10-20 % capacity savings can still be obtained (relative to STM) when controlled limited over-subscription is allowed in the design process (based on a CLP limit of when the original CLP is ) These concepts also apply to more recent IP-based transport networks