1 Distributed Partial Information Management (DPIM) for Survivable Networks Dahai Xu.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Distributed Algorithms for Secure Multipath Routing
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
Traffic Engineering Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Path Protection in MPLS Networks Ashish Gupta Design and Evaluation of Fault Tolerance Algorithms with Performance Constraints.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Bluenet a New Scatternet Formation Scheme * Huseyin Ozgur Tan * Zifang Wang,Robert J.Thomas, Zygmunt Haas ECE Cornell Univ*
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Path Protection in MPLS Networks Using Segment Based Approach.
Introduction to Protection & Restoration for OBS Copyright, 2000, SUNY, Univ. at Buffalo Presented by Zaoyang Guo & Dahai Xu.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
Multipath Routing Algorithms for Congestion Minimization Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
1 EL736 Communications Networks II: Design and Algorithms Class10: Restoration and Protection Design of Resilient Networks Yong Liu 11/28/2007.
Flow Models and Optimal Routing. How can we evaluate the performance of a routing algorithm –quantify how well they do –use arrival rates at nodes and.
Cost-Performance Tradeoffs in MPLS and IP Routing Selma Yilmaz Ibrahim Matta Boston University.
Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit.
Distributed Asynchronous Bellman-Ford Algorithm
Integrated Dynamic IP and Wavelength Routing in IP over WDM Networks Murali Kodialam and T. V. Lakshman Bell Laboratories Lucent Technologies IEEE INFOCOM.
Network Aware Resource Allocation in Distributed Clouds.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Algorithms for Allocating Wavelength Converters in All-Optical Networks Authors: Goaxi Xiao and Yiu-Wing Leung Presented by: Douglas L. Potts CEG 790 Summer.
Researchers: Preet Bola Mike Earnest Kevin Varela-O’Hara Han Zou Advisor: Walter Rusin Data Storage Networks.
SMUCSE 8344 Protection & Restoration of Optical Networks.
Lightpath Restoration in WDM Optical Networks A Survey in IEEE Network Magazine Nov/Dec 2000.
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Resource Mapping and Scheduling for Heterogeneous Network Processor Systems Liang Yang, Tushar Gohad, Pavel Ghosh, Devesh Sinha, Arunabha Sen and Andrea.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Quality of Service Routing Anunay Tiwari Anirudha Sahoo.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
1 Presented by Sarbagya Buddhacharya. 2 Increasing bandwidth demand in telecommunication networks is satisfied by WDM networks. Dimensioning of WDM networks.
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Traffic grooming in WDM Networks Dynamic Traffic Grooming in WDM Mesh Networks Using a Novel Graph Model by Hongyue Zhu, Hui Zang, Keyao Zhu, and Biswanath.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
1 Dynamic RWA Connection requests arrive sequentially. Setup a lightpath when a connection request arrives and teardown the lightpath when a connection.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
1 Minimum Interference Algorithm for Integrated Topology Control and Routing in Wireless Optical Backbone Networks Fangting Sun Mark Shayman University.
Survivability in IP over WDM networks YINGHUA YE and SUDHIR DIXIT Nokia Research Center, Burlington, Massachusetts.
William Stallings Data and Computer Communications
Constraint-Based Routing
Network Survivability, Reliability and Availability: Protection & Restoration Zilong Ye, Ph.D.
A Study of Group-Tree Matching in Large Scale Group Communications
Distributed Control Plane
ISP and Egress Path Selection for Multihomed Networks
Frank Yeong-Sung Lin (林永松) Information Management Department
Data and Computer Communications
Frank Yeong-Sung Lin (林永松) Information Management Department
Chapter 10 RWA 2019/5/9.
Eusebi Calle, Jose L Marzo, Anna Urra. L. Fabrega
Presentation transcript:

1 Distributed Partial Information Management (DPIM) for Survivable Networks Dahai Xu

2 Content Basic Concepts of Protection & Restoration Previous Work on Shared Path Protection Proposed DPIM Schemes what partial info to maintain and how? how a connection is routed under distributed control and with partial info? how a connection is routed under distributed control and with partial info? how distributed signaling is done and bandwidth (BW) allocated/deallocated? how distributed signaling is done and bandwidth (BW) allocated/deallocated? A heuristic based on Potential Backup Cost A heuristic based on Potential Backup Cost

3 Protection Path Protection Link Protection Advantages & Disadvantages

4 Path Protection Use more than one path to guarantee the data be sent successfully Dedicated Path Protection Shared Path Protection

5 Dedicated Path Protection 1+1 Protection Point-to-Point Protection & Mesh Network Protection

6 1+1 Protection

7 Mesh Network Protection

8 Shared Path Protection 1:1 Protection 1:N Protection

9 Link Protection Use an alternate path if the link failed Dedicated Link Protection: not practical Shared Link Protection: practical It may fail when a node fails

10 Advantages & Disadvantages of Protection Simple Quick: Do not require much extra process time Usually can only recover from single link fault Inefficient usage of resource

11 Restoration Path Restoration Route can be computed after failure Link Restoration Path is discovered at the end nodes of the failed link More practical than path restoration Advantages & Disadvantages of Restoration Usually can recover from multiplex element faults More efficient usage of resource Complex Slow: require extra process time to setup path and reserve resource

12 Characteristic: Protection -- the resource are reserved before the failure, they may be not used; Restoration -- the resource are reserved and used after the failure Route: Protection -- predetermined; Restoration -- can be dynamically computed Resource Efficiency: Protection -- Low; Restoration -- High Comparison between Protection & Restoration

13 Time used: Protection -- Short; Restoration -- Long Reliability: Protection -- mainly for single fault; Restoration -- can survive under multiplex faults Implementation: Protection -- Simple; Restoration -- Complex Comparison between Protection & Restoration (Cont ’ )

14 Offline Routing Arrange a set of traffic flows Integer Linear Programming(ILP) to get optimal results Heuristic Algorithms Relaxation of ILP Simulated Annealing - A stochastic hill-climbing heuristic search method. (Explore a larger area in the search space without being trapped in local optimal) Genetic Algorithm: Evolves the current population of “good solutions” toward the optimality by using carefully designed crossover and mutation operators. Tabu search

15 Online Routing of Bandwidth Guaranteed Online routing, bandwidth guaranteed path with simultaneous protection path Metrics Unlimited Link Capacity Bandwidth Consumption Limited Link Capacity Connection drop/block probability Profit / Revenue

16 Assumption Two connections whose active paths are completely link disjoint can share backup Bandwidth (BBW). The objective of the algorithm is to exploit this BBW sharing to e.g., reduce the total amount of bandwidth (TBW) consumed by the connections.

17 Information for Routing The amount of BBW sharing depends on the information available to the routing algorithm. Three important cases to be considered. No Information on how existing connections are routed Complete Per-flow/Aggregate Information Partial Aggregate Information

18 No Sharing (NS) Only know the residual (available) bandwidth on each link Residual bandwidth = Link capacity - Reserved active bandwidth (ABW) - Reserved backup bandwidth (BBW) Can be obtained from OSPF Extensions or IS­ IS Extensions Only the total used bandwidth is known (active + backup) Can not share BBW, thus waste resources.

19 Sharing with Complete Information (SCI) Know routes for the active and backup paths of all current connections. May have too much information to maintain. O(LQ). L is the average path length, Q is the number of existing connections. Permits the best sharing and provides a Performance upper-bound

20 Partial Information for Routing Know some aggregated information of each link Two schemes SPI (Sharing with Partial Information): Centralized control, knows BBW and ABW on each/every link DPIM (Distributed Partial Information Management): Distributed control, each ingress edge (source) node decides the routes.

21 Notations (I)

22 Notations (II)

23 No Sharing (NS) Remove links R e < w Determine two link disjoint paths for active/backup Formulation: standard network flow problem each link has unit cost and unit capacity s supply two units, d demand two units minimum cost flow algorithm can be used

24 Linear Programming for SCI (I) For new request (s, d, w), the least cost of using a on AP and b on BP The cost of using e on BP (1)

25 Linear Programming for SCI (II) Objective Constraints

26 SPI In SCI, can be calculated from per-flow information. Need maintain per-flow information. Not scalable. In SPI,is not known, only is known Same objective and constraints as in SCI Further improvement to be discussed in DPIM

27 Survivable Routing (SR) Distributed control with complete but aggregated information. Every edge node essentially maintains a matrix of for all links a and b Uses the active path first (APF) heuristic instead of ILP formulation Remove links whose R e <w (temporarily) Find a shortest path as AP Put back temporarily removed links, remove AP links, calculate backup cost using Eq. (1) Find a shortest (cheapest) path as BP

28 Successive SR (SSR) After is updated as a result of setting up a new connection, some existing BPs may change (route and the amount of additional BBW reserved) Such changes may in turn trigger changes to other existing BPs until an equilibrium state is reached Achieve a better BBW sharing, but with a high signaling and control overhead

29 RAFT RAFT: Resource Aggregation for Fault Tolerance Each node maintains fault management table (FMT), which list AP or BP flow on each link e. FMT must be updated each time a request initiates or terminates AP and BP route are node-disjoint by using shortest path algorithm firstly A request is accepted only if the bandwidth requirement is available on all the links on its AP and BP, otherwise it is rejected.

30 Doshi’s Each node maintains a link capacity control table (LCCT) for each local link Source nodes using Content-lock mechanism to avoid multiple demands deadlock. BP route search: Distributed breadth-first search (BFS) over a residual network In BFS, it first query the residual spare capacity in LCCT, only use the link if the link has sufficient capacity If a route is found, the source node stores it as the restoration route for the demand. If fail to find the BP route, the capacity optimization procedure is activated by changing previous BP routes

31 Su’s Each node maintains “bucket”-based link state (equivalent to ) The amount of link states is proportional to the number of failure/link, not the number of light paths AP and BP are optimized separately. AP are assumed to using minimum-hop paths, BP are optimized to reduce the wavelength redundancy The “width” of link l with respect to a failure event k* is defined as the normalized difference between the maximum bucket height and the bucket corresponding to link failure k*, which indicates the sharing capacity of links.

32 By using Bellman-Ford algorithm to identify the widest path between the end nodes of the protected link, the path that offer the most sharing. In the event that there are more than one such path candidates, the one that traverses the lease number links with width 0 was selected Su’s (Cont’)

33 DPIM-SAM Distributed Partial Information Management Edge node maintains (and exchanges) non-local information: for each link e. (O(E) information) Each node also maintains profiles of ABW and BBW for each local link e. (O(E) information)

34 Path Determination This estimated BBW may not be minimal Using ILP, or APF to find AP and BP DPIM-M-A: APF with Minimal BBW Allocation

35 Distributed Signaling Minimal BBW Allocation Maintaining Partial Information on AP and BP Send AP Set-up packet containing BP to the nodes along AP, each node having an outgoing link e in AP updates Similar way to update

36 Minimal BBW allocation

37 Connection Release Can’t be done efficiently in SPI AP Tear-Down and BBW Deallocation. Update P B e and release bw.

38 Network Topology

39 Performance Evaluation Traffic Types Incremental traffic (Established connection lasts forever) Dynamic traffic (with connection durations) Performance Metrics Unlimited Link Capacity Bandwidth Saving (Ratio): upper bound 50% Limited Link Capacity Connection drop/block probability Total Earning (Ratio) : Earning Rate matrix (independent of traffic load)

40 Simulation Results Average Bandwidth Saving Ratio Total Earning Ratio

41 Active Path First with Potential Backup Cost (APF-PBC) Challenges Integer Linear Programming (ILP) based approaches are notoriously time consuming Guarantee minimal allocation of TBW for each request, but do not guarantee an optimal result for all requests. Active path first (APF) can only achieve sub-optimal results: Does not consider the potential cost along the BP when selecting the AP

42 Main idea of APF-PBC Also uses Active Path First In selecting Active Path, Each capable link a will be assigned a cost We use as the potential backup cost (and try to minimize TBW). Intuition: PBC increases with w and Can apply to SCI and DPIM-SAM (which determine backup cost and BP differently)

43 Potential Backup Cost - Derivation is derived based on the statistical analysis of experimental data. (SCI-ILP) for the 15- node network, infinite link capacity) challenge: but do not know which link b to be used to backup link a, let alone B b and solution: guess the (weighted average) value of B b (call it x) and (call it s)

44 Derivation based on statistical analysis of B b Distribution of B b /M Distribution of B b /M  (w,s,M) is the expected value of  a (w) when s is fixed. Guess the distribution of and calculated the weighted average value of  (w,s,M) over all s to obtain  a (w)distribution of

45 Distribution of B b /M

46 Graph of  (w,s,M) & approximation Integral (curves) from adaptive Lobatto quadrature Approximation (line-fitting Y=c 1 X+c 2 )

47 Cumulative distribution function of

48 Graph of

49 Approximation of  a (w) Distribution of Effect of constants c and  on performance of APF-PBC Effect of constants c and  on performance of APF-PBC

50 Distribution of

51 Effect of constants c and  on performance of APF-PBC

52 Bandwidth consumed after 500 demands

53 Total earning after 500 demands

54 Simulation Results -PBC Average Bandwidth Saving Ratio Total Earning Ratio

55 Summary On-line Shared path protection (need to extend to other schemes) Amount of information (Complete/Partial) affects BBW sharing May use ILP or APF-based heuristics Proposed a DPIM scheme for a distributed, partial / aggregated information management (including signaling for path set-up/tear-down) Proposed a potential cost heuristic, which runs faster and better than ILP

56 Summary II Have also extended to cases with unprotected (UP) and pre-emptable (PE) connections UP: use just one path similar to an AP (i.e., no BP); affected if (and only if) the path breaks. PE: unprotected and may be affected even if a failure does not break its path A PE may use the existing BPs/BBW to carry low- priority traffic in fault-free situations A PE is similar, but not identical to a BP: can share BBW with other BPs, but cannot share with other PE The idea of potential cost can also be applied to solving other joint optimization problems with heuristics

57 Reference