Off­Piste QoS­aware Routing Protocol By Yigal Eliaspur.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Universidade do Minho A Framework for Multi-Class Based Multicast Routing TNC 2002 Maria João Nicolau, António Costa, Alexandre Santos {joao, costa,
Chapter 5: Tree Constructions
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Data and Computer Communications
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
1 Traffic Engineering (TE). 2 Network Congestion Causes of congestion –Lack of network resources –Uneven distribution of traffic caused by current dynamic.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
MQ: An Integrated Mechanism for Multimedia Multicasting By De-Nian Yang Wanjiun Liao Yen-Ting Lin Presented By- Sanchit Joshi Roshan John.
1 Complexity of Network Synchronization Raeda Naamnieh.
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
2001 Winter CS215 Course Project Simulation Comparison of Routing Algorithms for Multicast with Bandwidth Reservation Zhihong Duan
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
LSRP: Local Stabilization in Shortest Path Routing Hongwei Zhang and Anish Arora Presented by Aviv Zohar.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
Teknik Routing Pertemuan 20 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Path Protection in MPLS Networks Using Segment Based Approach.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Distributed process management: Distributed deadlock
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
© 2004 Mobile VCE 1 An SMR Based Advance Resource Reservation Scheme For Combined Mobility and QoS Provisioning Hao Wang The University.
Data Communications & Computer Networks
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Network Aware Resource Allocation in Distributed Clouds.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Source specific multicast routing and QoS issues Laurentiu Barza.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Corelite Architecture: Achieving Rated Weight Fairness
A Study of Group-Tree Matching in Large Scale Group Communications
CprE 458/558: Real-Time Systems
ECE 544 Protocol Design Project 2016
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
QoS routing Finding a path that can satisfy the QoS requirement of a connection. Achieving high resource utilization.
2019/9/14 The Deep Learning Vision for Heterogeneous Network Traffic Control Proposal, Challenges, and Future Perspective Author: Nei Kato, Zubair Md.
Presentation transcript:

Off­Piste QoS­aware Routing Protocol By Yigal Eliaspur

Problem Background  The main challenge in QoS routing is to be able to respond to online requests with Reasonable response time Reasonable response time Minimal network overhead (Messages, Memory Processing time). Minimal network overhead (Messages, Memory Processing time). Minimal probability of blocking (requests failure). Minimal probability of blocking (requests failure).  A typical request is to reserve a certain resource along a path from a transaction source to a transaction destination.  The resource may be an additive resource (e.g. delay) or/and a nonadditive resource (e.g. bandwidth).  The request may be applied to Unicast or Multicast traffic.

Available Solutions  The solutions today can be partitioned to three broad classes: Source routing algorithms Source routing algorithms Transforms a distributed problem into a centralized one.Transforms a distributed problem into a centralized one. Maintaining a complete global state in each node of dynamics network resources.Maintaining a complete global state in each node of dynamics network resources. Distributed routing algorithms Distributed routing algorithms The path computation is distributed among the intermediate nodes between the source and the destination.The path computation is distributed among the intermediate nodes between the source and the destination. Single path search – usually assumes global state in each node.Single path search – usually assumes global state in each node. Multi path search (flooding) – uses only local state in each node.Multi path search (flooding) – uses only local state in each node. Hierarchical routing algorithms Hierarchical routing algorithms Each node maintains only a partial global stateEach node maintains only a partial global state To cope with the scalability problem of global state in large internetworks.To cope with the scalability problem of global state in large internetworks.

Related Work  Our OPsAR protocol (Off­Piste QoS­aware Routing) can be classified to the Multi path, distributed routing algorithms family.  Others works related to this family are: Selective flooding – multi path search will be done only on pre- computed routes. Selective flooding – multi path search will be done only on pre- computed routes. Ticket based probing - Every probing (search) message is supposed to carry at least one ticket, and thus the total number of tickets limit the multi path search. Ticket based probing - Every probing (search) message is supposed to carry at least one ticket, and thus the total number of tickets limit the multi path search. QMRP and S-QMRP (Scalable - Distributed QoS Multicast Routing Protocol): QMRP and S-QMRP (Scalable - Distributed QoS Multicast Routing Protocol): The unicast route towards the destination is checked first.The unicast route towards the destination is checked first. If that failed selective scanning mechanism is applied.If that failed selective scanning mechanism is applied. The scanning is controlled by Maximum Branching Degree and Maximum Branching Level parameters.The scanning is controlled by Maximum Branching Degree and Maximum Branching Level parameters. QOSMic - best suited to a multicast environment, since it looks for a point on a multicast tree to ``hook'' on the new receiver. QOSMic - best suited to a multicast environment, since it looks for a point on a multicast tree to ``hook'' on the new receiver.

The OPsAR Protocol  Our main motivation of OPsAR is to improve tradeoff between the overhead of the protocol and the success ratio it produces.  In OPsAR, a node keeps track of recent QoS messages to learn about resource availability to and from various target points.  The learning is reflected in the node's ``knowledge­state''.  Efficient path selection is been done by leveraging on the knowledge­state at the nodes.  The OPsAR protocol is built of 3 main stages: Try Phase – in which a single path search and reservation is applied from the transaction source to the transaction destination. Try Phase – in which a single path search and reservation is applied from the transaction source to the transaction destination. Scan Phase – in which a multi path search without reservation is applied from the transaction destination back to the source. Scan Phase – in which a multi path search without reservation is applied from the transaction destination back to the source. Try 2 Phase – in which the scan phase results are evaluated and the best candidate path is reserved from the transaction source to the destination. Try 2 Phase – in which the scan phase results are evaluated and the best candidate path is reserved from the transaction source to the destination.

Try Phase  A path search from the transaction source toward the transaction target.  Try phase follows the shortest path as long as it has the required resources.  The deviation from the shortest path takes an ``off­piste'' route that leverages on the knowledge­state to optimize the routing protocol.  Its deviation from the shortest path is bounded.  If resources cannot be reserved within that boundary, the resources which have already been reserved are released, and a request is sent to the transaction target to begin the Scan phase.

Scan Phase  The scan process is based on limited Breadth­First­Search (BFS) from the transaction target toward the transaction source.  We neither reserve resources in the Scan phase nor keep any state that relates to the specific scan.  As in the Try Phase the scanning process takes advantage of the knowledge­state to optimize the search.  The branching limitation is done by: Ticketing scheme to bound the total number of paths. Ticketing scheme to bound the total number of paths. Maximum branching degree (MBD) at each node in order to increase the variety of potential paths to traverse. Maximum branching degree (MBD) at each node in order to increase the variety of potential paths to traverse. Off-piste counter to limit the distance from the shortest path, similar to the Try phase. Off-piste counter to limit the distance from the shortest path, similar to the Try phase.  Branch is terminated during the scanning process if: Off­piste limit is reached and the unicast route does not have the resources. Off­piste limit is reached and the unicast route does not have the resources. Or when no outgoing link has the requested resources. Or when no outgoing link has the requested resources.

Try 2 Phase  If the transaction­source receives several successful scan messages, it initiates the Try 2 phase.  It chooses the ``best'' route from the successful scan messages and asks to reserve the resources along that path.  If reservation failure along the explicit route is detected,  The OPsAR tries to route the reservation request message to the transaction­destination using alternative routes that the off­piste mechanism offers.  If that fails a nack message is returned to the transaction source indicating the need to choose another explicit route from the previous scan result.

Knowledge State - definition  Each node maintains A local state in which it holds its links' status and the resource availability on them. A local state in which it holds its links' status and the resource availability on them. A bounded list of records A bounded list of records For each record the resources availability is maintained with respect to that outgoing link : For each record the resources availability is maintained with respect to that outgoing link : Max BW toward the target­node.Max BW toward the target­node. Max BW from the target­node.Max BW from the target­node.  This information is updated occasionally and is marked to identify the time of its last update.  This time is used for aging mechanism.

Knowledge State - usage  Any OPsAR protocol message traversing a node is used to update the knowledge­state (KS).  Each OPsAR protocol message includes the following relevant fields: Max BW To Origin Max BW To Origin Max BW From Origin Max BW From Origin  There are three main operation the KS is involve with: KS record creation/update KS record creation/update J J OPsAR message fields update OPsAR message fields update J Routing decision Routing decision The choice is made according to the resource availability along the various links toward the target, and according to how recent that information is.The choice is made according to the resource availability along the various links toward the target, and according to how recent that information is. This is Based on three levels of outgoing links (neighbors) maintained per target node:This is Based on three levels of outgoing links (neighbors) maintained per target node: Fresh Fresh Stale Stale Old Old

Knowledge State – Routing decision (cont.) Candidate Neighbors group Candidate Next hop Resource information input FreshunicastEnd2End FreshAllEnd2End ~Freshunicast Next Hop StaleAllEnd2End ~FreshAll AllAll

Simulation Model  NS­2 simulator  Power­Law network topology As the node degree increases, the number of nodes with that degree decreases exponentially. As the node degree increases, the number of nodes with that degree decreases exponentially.  Used the topology generator described in Osnat’s work (On the tomography of networks and multicast trees)  The generator was extended to support BW allocation. The bandwidth on the links was uniformly distributed from {10,34,45,100} Mb/s. The bandwidth on the links was uniformly distributed from {10,34,45,100} Mb/s. In order to make sure that the congestion would first occur in the core network we re­assigned the bandwidth of the endpoints to 1000Mb. In order to make sure that the congestion would first occur in the core network we re­assigned the bandwidth of the endpoints to 1000Mb. We also conducted tests with hierarchical bandwidth assignment chosen from {10Mb,100Mb,1G,10G} bits per second. We also conducted tests with hierarchical bandwidth assignment chosen from {10Mb,100Mb,1G,10G} bits per second. This backbone / metro type of over provisioning BW allocation showed almost no congestion for BW reservation requests.This backbone / metro type of over provisioning BW allocation showed almost no congestion for BW reservation requests. Therefore, the topologies simulated were only large edge networks and ISP like networks.Therefore, the topologies simulated were only large edge networks and ISP like networks.

Simulation Basis  600 nodes was used.  Transaction endpoints were chosen out of 120 edge nodes.  Most of the graphs are the result of 10,000 transactions performed on six different generated topologies.  We ran each simulation on 5 different protocol types: Traditional RSVP - Allocates the QoS requirement along the unicast route toward the transaction destination; Traditional RSVP - Allocates the QoS requirement along the unicast route toward the transaction destination; S­QMRP* - Is S-QMRP adaptation to unicast routing S­QMRP* - Is S-QMRP adaptation to unicast routing Basically it’s the same as OPsAR but without KS and Off-Piste counter support.Basically it’s the same as OPsAR but without KS and Off-Piste counter support. S­QMRP*D – Is S-QMRP* with Off-Piste counter support. S­QMRP*D – Is S-QMRP* with Off-Piste counter support. OPsAR OPsAR OPT - Implemented as a BFS which finds the shortest path that fulfills the bandwidth QoS requirements. OPT - Implemented as a BFS which finds the shortest path that fulfills the bandwidth QoS requirements. Message overhead; Message overhead;

Simulation Basis (cont.)  We performed the following simulation and evaluate their relationship to the reservation success ratio: Memory usage Memory usage Amount of concurrent transactions Amount of concurrent transactions Number of edge nodes Number of edge nodes Number of destination nodes Number of destination nodes The Cost and Performance Gain of Using Try&Scan Phases The Cost and Performance Gain of Using Try&Scan Phases Gradual Deployment within RSVP Framework Gradual Deployment within RSVP Framework

Memory Usage vs. Success Ratio

Memory Usage vs. Success Ratio (cont.)  The amount of memory sufficient to achieve about 85% of success ratio is very reasonable.  The memory is theoretically bounded by The out degree of a core node (or by the aged out threshold which is 9 in our case) The out degree of a core node (or by the aged out threshold which is 9 in our case) Times the number of possible transaction­destination nodes. Times the number of possible transaction­destination nodes.  In the largest simulation done this theoretical number was 160KB.  The average memory consumption was about 10% of the theoretical bound.  Where 60KB was limit - the actual bound set in the simulation code.

Concurrent Transactions vs. Success Ratio

Message Overhead vs. Success Ratio

Message Overhead vs. Success Ratio (cont.)  We studied all the parameter's possible combination within a specific range branching degree branching degree scanning deviation scanning deviation and number of tickets. and number of tickets.  Each simulation result generated one point in the graph.  OPsAR vs. S-QMRP* For the same amount of message overhead, the OPsAR improves the success ratio up to 30% more than S­QMRP*. For the same amount of message overhead, the OPsAR improves the success ratio up to 30% more than S­QMRP*.  OPsAR vs. RSVP Increase of overhead by five se times yields about three times the success ratio. Increase of overhead by five se times yields about three times the success ratio. Another point to consider is that the average path length is about 8 hops when deviation is allowed and the 4 hops when deviation is forbidden (e.g. RSVP). Another point to consider is that the average path length is about 8 hops when deviation is allowed and the 4 hops when deviation is forbidden (e.g. RSVP).  OPsAR vs. OPT The overhead/sucess ratio of OPT is 20.6 while the overhead/sucess ratio of the OPsAR in 200K messages, is in 29.8 which is only 30% more then the OPT. The overhead/sucess ratio of OPT is 20.6 while the overhead/sucess ratio of the OPsAR in 200K messages, is in 29.8 which is only 30% more then the OPT.

Number of Edge Nodes vs. Success Ratio

Number of Destinations Nodes vs. Success Ratio

Number of Destinations Nodes vs. Success Ratio (cont.)  We ran the simulation with a constant number of 25% edge nodes (as opposed to the 20% we usually used).  The number of candidate destination nodes varied from 1% up to the whole set of edge nodes (25%).  The candidate set of source nodes was always the whole set of edge nodes.  Only the links from those destination nodes were assigned a bandwidth capacity of 1000Mb.

The Cost and Performance Gain of Using Try&Scan Phases

The Cost and Performance Gain of Using Try&Scan Phases (cont.)  Scan Phase uses extra time and messages over Try Phase.  Our simulations showed that the time to complete a Try followed by a Scan is three times the time it takes to complete the Try phase alone.

Gradual Deployment within RSVP Framework

Gradual Deployment within RSVP Framework (cont.)  At glance, there is no inherent limitation in the protocol that prohibits its use in an incremental manner.  The ``RSVP only'' routers were selected based on their distance from the a core. The edge routers have a better chance to be chosen as ``RSVP only'' routers. The edge routers have a better chance to be chosen as ``RSVP only'' routers.  From the learning mechanism perspective, the available capacity of the links betweens ``RSVP only'' routers is ignored.  Future work can focus on deployment methods for the OPsAR protocol that will maintain the gain obtained from the learning mechanism.

Future Work  Machine learning improving The overall scheme of our protocol is an intelligent the choice of routes from a full Breadth­First­Search algorithm (BFS). The overall scheme of our protocol is an intelligent the choice of routes from a full Breadth­First­Search algorithm (BFS). Future on research can focus on improving the educated choice of routes while limiting the overhead in memory. Future on research can focus on improving the educated choice of routes while limiting the overhead in memory. We expect to find ways to use machine learning techniques to achieve that goal. We expect to find ways to use machine learning techniques to achieve that goal.  KS Aggregations Save in memory by aggregating the information, using techniques like longest prefix matching on transactions destination. Save in memory by aggregating the information, using techniques like longest prefix matching on transactions destination.  Packet losses, link/node failures Should be relatively easy using timers and retries for messages, and using soft state reservation. Should be relatively easy using timers and retries for messages, and using soft state reservation.  Additive resources Handling additive resources, like delay, requires minor changes d to the protocols presented. Handling additive resources, like delay, requires minor changes d to the protocols presented.  Tuning the KS parameters Linear increasing the fresh neighbor group did not increase the performance and sometimes cause it to be degraded. Linear increasing the fresh neighbor group did not increase the performance and sometimes cause it to be degraded. Increasing the age out threshold – does not improved the performance either even though it increase the total memory requirements. Increasing the age out threshold – does not improved the performance either even though it increase the total memory requirements. Further research must be conducted in order to explore the inter­dependencies among the various variables of OPsAR, and to automatically learn and choose the optimal values, possibly l using machine learning techniques. Further research must be conducted in order to explore the inter­dependencies among the various variables of OPsAR, and to automatically learn and choose the optimal values, possibly l using machine learning techniques.