The Power of Tuning: A Novel Approach for the Efficient Design of Survivable Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion-

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Fast Algorithms For Hierarchical Range Histogram Constructions
1 Traffic Engineering (TE). 2 Network Congestion Causes of congestion –Lack of network resources –Uneven distribution of traffic caused by current dynamic.
1 Advancing Supercomputer Performance Through Interconnection Topology Synthesis Yi Zhu, Michael Taylor, Scott B. Baden and Chung-Kuan Cheng Department.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
1 Minimum-energy broadcasting in multi-hop wireless networks using a single broadcast tree Department of Computer Science and Information Engineering National.
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
Bottleneck Routing Games in Communication Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
WiOpt’03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks March 3-5, 2003, INRIA Sophia-Antipolis, France Session : Energy Efficiency.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
ASWP – Ad-hoc Routing with Interference Consideration Zhanfeng Jia, Rajarshi Gupta, Jean Walrand, Pravin Varaiya Department of EECS University of California,
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Basic Concepts and Definitions Vector and Function Space. A finite or an infinite dimensional linear vector/function space described with set of non-unique.
WiOpt’04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks March 24-26, 2004, University of Cambridge, UK Session 2 : Energy Management.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Path Protection in MPLS Networks Using Segment Based Approach.
Multipath Routing Ph.D. Research Proposal Ron Banner Supervisor: Prof. Ariel Orda March 2004.
1 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen Dept. of Computer Science, Technion Gabi Nakibly National EW Research Center Published.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Service Profile-Aware Control Plane: Multi-Instance Fixed Point Approximation within Multi-Granularity VPN Loss Networks Perspective Project Concept Project.
Multipath Routing Algorithms for Congestion Minimization Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Cost-Performance Tradeoffs in MPLS and IP Routing Selma Yilmaz Ibrahim Matta Boston University.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
A High Performance Channel Sorting Scheduling Algorithm Based On Largest Packet P.G.Sarigiannidis, G.I.Papadimitriou, and A.S.Pomportsis Department of.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Optimization of Wavelength Assignment for QoS Multicast in WDM Networks Xiao-Hua Jia, Ding-Zhu Du, Xiao-Dong Hu, Man-Kei Lee, and Jun Gu, IEEE TRANSACTIONS.
Tunable QoS-Aware Network Survivability Jose Yallouz Joint work with Ariel Orda Department of Electrical Engineering, Technion.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Introducing a New Concept in Networking Fluid Networking S. Wood Nov Copyright 2006 Modern Systems Research.
QOS Routing: The Precomputation Perspective Ariel Orda and Alexander Sprintson Presented by: Jing, Niloufer, Tri.
An Adaptive, High Performance MAC for Long-Distance Multihop Wireless Networks Sergiu Nedevschi *, Rabin K. Patra *, Sonesh Surana *, Sylvia Ratnasamy.
Tunable QoS-Aware Network Survivability Presenter : Yen Fen Kao Advisor : Yeong Sung Lin 2013 Proceedings IEEE INFOCOM.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
Evolutionary Computing Chapter 12. / 26 Chapter 12: Multiobjective Evolutionary Algorithms Multiobjective optimisation problems (MOP) -Pareto optimality.
Shanghai Jiao Tong University Institute of Wireless Comm. Tech. (IWCT) 无线技术沙龙 Wireless Club 创 新 无 线 精 彩 无 限 Enabling Splendid Wireless A Theoretical Framework.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Survivability in IP over WDM networks YINGHUA YE and SUDHIR DIXIT Nokia Research Center, Burlington, Massachusetts.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
Network Survivability
ECE 4450:427/527 - Computer Networks Spring 2017
Symmetric Allocations for Distributed Storage
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Data and Computer Communications
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Chapter 1 Database Systems
Presentation transcript:

The Power of Tuning: A Novel Approach for the Efficient Design of Survivable Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology

Introduction u Transmission rates have increased to 10 Gbit/s and beyond. u Any failure may lead to a vast amount of data loss. u Survivability = the capability of the network to maintain service continuity in the presence of failures.

Current Survivability Schemes u Based on securing an independent resource for each network element. u This is translated into the establishment of pairs of disjoint paths. u Given a pair of disjoint paths, either 1+1 or 1:1 protection can be employed  With 1+1 protection, identical traffic is transmitted over a pair of disjoint paths.  With 1:1 protection, traffic is sent only on one (active) path.  The other (backup) path is activated only upon a failure on the active path.

Pros and cons of current survivability schemes u Pro: pairs of disjoint paths provide full (100%) protection to single network failures. u Cons: in practice, too restrictive and requires excessive redundancy.  Often, very limiting (G. Maier, A. Pattavina, S. De Patre and M. Martinelli, 2002).  Sometimes, even infeasible (N. Taft-Plotkin, B. Bellur and R. Ogier, 1999).

Tunable Survivability u Since full survivability is too restrictive, we propose tunable survivability. u Tunable survivability allows any desired degree of survivability in the range 0% to 100%.  Provides a quantitative measure to specify the desired level of survivability.  Can substantially increase the space of feasible solutions.  Enables to consider & quantify valuable tradeoffs (e.g., survivability vs. delay, survivability vs. jitter, survivability vs. bandwidth…)

Survivable connections u We adopt the widely used single link failure model.  Has been the focus of most studies on survivability. u Tunable survivability enables the establishment of p- survivable connections. s t link with “poor” performance p= survivable connection (0.999) 2 -survivable connection (0.999) 2 ≈ (0.999) 3 -survivable connection (0.999) 3 ≈ ab c d link b → d is bypassed! A single path is enough!

Survivable connections (cont.) u Connections with tunable survivability can also employ either 1+1 or 1:1 protection architecture. u However, the maximal traffic rate (bandwidth) of a survivable connection with 1+1 protection may be different than that with 1:1 protection.  Indeed, for any given survivable connection, the flow configuration induced by 1+1 protection is different than that induced by 1:1 protection.

How much is gained by employing tunable survivability? u Through comprehensive simulations on random Internet networks we demonstrate the major power of Tunable survivability. u By just slightly alleviating the requirement of full survivability, major increase in bandwidth as well as in feasibility is accomplished.  Details

Analytical results u Motivated by the simulation results we investigated the tunable survivability concept. u Established several fundamental properties of survivable connections. u Designed polynomial (optimal) algorithmic schemes for the establishment of survivable connections for 1:1 and 1+1 protection. u Derived for the tunable survivability approach a new “hybrid” protection architecture that has several advantages over both 1:1 and 1+1 protection.

Property: two paths are ENOUGH! u Claim: Given a survivable connection that admits more than two paths, it is possible to obtain the same level of survivability with only two paths.

Two paths are ENOUGH! (cont.) u Proof (sketch): u Under the single link failure model, a failure in a link that is NOT common to all paths can never fail a survivable connection.  Hence, the probability to survive a single failure is equal to the probability that all common links are operational. u It is possible to construct a pair of paths that intersect only on the common links. common (critical) links

Types of survivable connections u Most Survivable connection= A connection that has the maximum probability to survive a single failure. u Most survivable connection with a bandwidth of at least B= A survivable connection that among all connections with a bandwidth of at least B, has the maximum probability to survive a single failure. u Widest p-survivable connection= A p-survivable connection that has the maximum bandwidth.

Polynomial optimal algorithms for survivable connection u For each type of survivable connection, we designed a polynomial optimal algorithm (both for 1+1 and 1:1 protection). u Most-survivable-connection-with-a-bandwidth-of-at-least-B is established by a novel reduction to the min-cost flow problem. u This reduction constitutes an algorithmic building block for the establishment of the most survivable connection and the widest p-survivable connection.  Indeed, most survivable connection with a bandwidth of at least B=0 is a most survivable connection per se.

Polynomial optimal algorithms (cont.) u How to establish a widest p-survivable connection? u Idea : search for the largest B such that the most-survivable- connection-with-a-bandwidth-of-at-least-B is a p-survivable connection. u We show that it is sufficient to perform a binary search over the set u Therefore, the widest p-survivable connection is established within O(logN) executions of any min-cost flow algorithm.  Indeed, the above set contains 2·M elements. Therefore, a binary search over this set enables to consider O(log2·M)=O(logN) candidates.

u Up to now, only focused on 1:1 and 1+1 protection architectures. u Tunable survivability gives rise to a third protection architecture that combines 1:1 and 1+1 protection. u Advantages  Propagates data over minimum-latency paths.  Produces better congestion level (over the common links) than 1+1 protection.  Has better recovery time from a failure than 1:1 protection  For 1:1, signaling is required to perform the switch-over operation. Hybrid Protection s t e1e1 e2e2 e3e3 e4e4 e5e5 u v p1p1 p2p2

u Disadvantage  Requires additional nodal capabilities. u As with 1+1 and 1:1 protection, designed for hybrid protection optimal algorithms that establish survivable connections in a polynomial running time. Hybrid Protection (cont.) s t e1e1 e2e2 e3e3 e4e4 e5e5 u v

u Additive QoS Extensions  In many cases it is important to consider additive metrics as quality criteria for survivable connections.  Additive metrics: delay, jitter, cost…  Fortunately, all the algorithms can be modified to consider additive metrics while still admitting a polynomial running time. u Beyond the single link failure model  Establishment of p-survivable connections is an NP-hard problem.  Yet, we introduce an alternative survivability criterion for multiple failures that admits optimal (polynomial) solutions.  Approximation algorithms – good direction for future research. Extensions

Thank you!

How much is gained by employing tunable survivability? u Experiment : Generated random networks that include 10,000 Waxman topologies & 10,000 Power-law topologies.  Bandwidth Ratio  p  = the ratio between the maximum bandwidth of a p-survivable connection and the maximum bandwidth of a 1- survivable connection. Bandwidth Ratio  (p) Power-law networks Waxman networks 1:1 Protection Architecture

How much is gained? (cont.) Bandwidth Ratio  (p) 1+1 Protection Architecture Power-law networks Waxman networks level of survivability p

How much is gained? (cont.) level of survivability p Feasibility Ratio  (p) Power-law networks Waxman networks  Feasibility Ratio  (p)= the ratio between the number of networks that have at least one p-survivable connections and the number of networks that have at least one connection with full survivability.

Establishing the widest p-survivable connection u Why is it enough to perform the search over the set  If one path admits a link e then the bandwidth of the connection is at most c e.  If both paths admit a link e then the bandwidth of the connection is at most.  Hence, by definition, there exists at least one tight link e  E such that the bandwidth of the connection is either c e or. u Why O(logN) executions of a min cost flow algorithm ?  The set contains 2·M elements.  A binary search over the set enables to consider O(log2·M)=O(logN) values.

Waxman and Power-law topologies u 10,000 Waxman networks:  Source and destination are located at the diagonally opposite corner of a square area of unit dimension.  198 nodes are uniformly spread over the square.  A link between two nodes u,v exists with the following probability, which depends on the distance between them δ(u,v): where α=1.8, β=0.05. u 10,000 Power-law networks:  We assigned a number of out-degree credits to each node, using the power-law distribution β∙x -α where α=0.75 and β=0.05.  Then, we connected the nodes so that every node obtained the assigned out-degree.

Property: Only the Common Links Count u Under the single link failure model, only the links that are common to all paths can affect a survivable connection. u Therefore, the probability that a survivable connection remains operational upon a failure is equal to the probability that all its common links are operational upon that failure. u Hence, (p 1,p 2 ) is a most survivable connection if it maximizes common link

Most Survivable Connections with a Bandwidth of at Least B u Established by reduction to the min cost flow problem.  The flow demand is set to 2∙B flow units.  Since both the flow demand and the capacities are B- integral, the resulting flow is B-integral.  Hence, the flow decomposition algorithm can construct a pair of paths each with a bandwidth B. A link in the original network Links in the transformed network Discard the link C e <B B≤C e <2∙B C e ≥2∙B c e =B, w e =0 c e =B, w e =-ln(1-p e ) c e,p e The flow demand is set to 2∙B flow units. Since both the flow demand and the capacities are B-integral, the resulting flow is B-integral.

Most Survivability with a Bandwidth of at Least B (cont.) u A min cost flow maximizes the success probability of the common links.  Only the common links incurs a non-zero cost of -B∙ln(1-p e ).  Hence, a min cost flow minimizes.  hence, it maximizes A link in the original network Links in the transformed network Discard the link C e <B B≤C e <2∙B C e ≥2∙B c e =B, w e =0 c e =B, w e =-ln(1-p e ) c e,p e

u The only difference in the reduction lies for the links that have capacities in the range [B,2B]. u For 1:1 protection, only one of the paths carries B flow units. u Hence, all links that have a capacity in the range [B,2B] can be employed by both paths concurrently. A link in the original network Links in the transformed network Discard the link C e <B C e ≥B c e =B, w e =0 c e =B, w e =-ln(1-p e ) c e,p e Establishing Survivable Connections for 1:1 protection Go to 1+1 reduction