1 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen Dept. of Computer Science, Technion Gabi Nakibly National EW Research Center Published.

Slides:



Advertisements
Similar presentations
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Advertisements

The strength of routing Schemes. Main issues Eliminating the buzz: Are there real differences between forwarding schemes: OSPF vs. MPLS? Can we quantify.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
~1~ Infocom’04 Mar. 10th On Finding Disjoint Paths in Single and Dual Link Cost Networks Chunming Qiao* LANDER, CSE Department SUNY at Buffalo *Collaborators:
1 Traffic Engineering (TE). 2 Network Congestion Causes of congestion –Lack of network resources –Uneven distribution of traffic caused by current dynamic.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Dynamic routing – QoS routing Other approaches to QoS routing Traffic Engineering Practical Traffic Engineering.
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Jan 29, 2006Lahore University of Management Sciences1 Seamless Detection of Link and Node Failures for Local Protection in MPLS Zartash Afzal Uzmi Computer.
The Power of Tuning: A Novel Approach for the Efficient Design of Survivable Networks Ron Banner and Ariel Orda Department of Electrical Engineering Technion-
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
October 8, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Basics Zartash Afzal Uzmi Computer Science and Engineering Department.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Network Design with (Dis)economies of Scale Lisa Zhang Joint with Matthew Andrews, Spyridon Antonakopoulos and Steve Fortune.
Path Protection in MPLS Networks Ashish Gupta Design and Evaluation of Fault Tolerance Algorithms with Performance Constraints.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
ASWP – Ad-hoc Routing with Interference Consideration June 28, 2005.
ASWP – Ad-hoc Routing with Interference Consideration Zhanfeng Jia, Rajarshi Gupta, Jean Walrand, Pravin Varaiya Department of EECS University of California,
MPLS Protection Routing: A Tutorial Zartash Afzal Uzmi.
Restoration Routing in MPLS Networks Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
MPLS Local Restoration using Optimized Aggregate Information Zartash Afzal Uzmi Computer Science and Engineering Lahore University of Management Sciences.
PROFITABLE CONNECTION ASSIGNMENT IN ALL OPTICAL WDM NETWORKS VISHAL ANAND LANDER (Lab. for Advanced Network Design, Evaluation and Research) In collaboration.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Path Protection in MPLS Networks Using Segment Based Approach.
Finding Protection Cycles in DWDM Networks 2002 IEEE ICC on Volume 5, 28 April-2 May Page(s): Reporter: Jyun-Yong Du.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
S. Suri, M, Waldvogel, P. Warkhede CS University of Washington Profile-Based Routing: A New Framework for MPLS Traffic Engineering.
Multipath Routing Algorithms for Congestion Minimization Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
QoS-Aware Path Protection in MPLS Networks Ashish Gupta Ashish Gupta Bijendra Jain Indian Institute of Technology Delhi Satish Tripathi University of California.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
SMUCSE 8344 Constraint-Based Routing in MPLS. SMUCSE 8344 Constraint Based Routing (CBR) What is CBR –Each link a collection of attributes (performance,
1 EL736 Communications Networks II: Design and Algorithms Class10: Restoration and Protection Design of Resilient Networks Yong Liu 11/28/2007.
Algorithms for Provisioning Virtual Private Networks in the Hose Model Source: Sigcomm 2001, to appear in IEEE/ACM Transactions on Networking Author: Amit.
Lecture 15. IGP and MPLS D. Moltchanov, TUT, Spring 2008 D. Moltchanov, TUT, Spring 2015.
Integrated Dynamic IP and Wavelength Routing in IP over WDM Networks Murali Kodialam and T. V. Lakshman Bell Laboratories Lucent Technologies IEEE INFOCOM.
Profile-Based Topology Control and Routing of Bandwidth-Guaranteed Flows in Wireless Optical Backbone Networks A. Kashyap, M.K. Khandani, K. Lee, M. Shayman.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Helsinki 19 May 2006 Fine Protection of Data-Paths in Multi-Layer Networks Based on the GMPLS paradigm G.Oriolo, Università Tor Vergata, Roma joint work.
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
Topology aggregation and Multi-constraint QoS routing Presented by Almas Ansari.
Workshop PRIXNET Distributed Virtual Circuit Switching protocol with auction pricing Loubna ECHABBI Dominique BARTH Laboratoire PRISM.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Network-Coding Multicast Networks With QoS Guarantees Yuanzhe Xuan and Chin-Tau Lea, Senior Member, IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19,
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
CSC Survivability Anuj Dewangan Parinda Gandhi.
Enhanced Protection using Shared Segment Backups in a Multiservice GMPLS-based Networks Anna Urra, Eusebi Calle, Jose L Marzo Institute of Informatics.
QoS Routing ISDL Quality of Service Routing Algorithms for Bandwidth-Delay Constrained Applications Yi Yang, Jogesh Muppala et al.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
Supporting DiffServ with Per-Class Traffic Engineering in MPLS.
QoS Routing and Scheduling in TDMA based Wireless Mesh Backhaul Networks Chi-Yao Hong, Ai-Chun Pang,and Jean-Lien C. Wu IEEE Wireless Communications and.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
Draft-deoliveira-diff-te-preemption-02.txt J. C. de Oliveira, JP Vasseur, L. Chen, C. Scoglio Updates: –Co-author: JP Vasseur –New preemption criterion.
Survivability in IP over WDM networks YINGHUA YE and SUDHIR DIXIT Nokia Research Center, Burlington, Massachusetts.
Constraint-Based Routing
CprE 458/558: Real-Time Systems
ISP and Egress Path Selection for Multihomed Networks
Multi-Core Parallel Routing
Kevin Lee & Adam Piechowicz 10/10/2009
Algorithms for Budget-Constrained Survivable Topology Design
Eusebi Calle, Jose L Marzo, Anna Urra. L. Fabrega
Presentation transcript:

1 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen Dept. of Computer Science, Technion Gabi Nakibly National EW Research Center Published in Infocom 2008 – mini- conference

2 Motivation IP networks are required to service real-time applications such as phone conversation These services demand high availability and reliability, and in particular – Fast restoration – Guaranteed QoS even in the case of failures IP routing protocols are not able to provide these features MPLS protection mechanisms are able to provide these features – by pre-establishment of backup LSPs We study the effectiveness of the various MPLS protections schemes

3 Outline Define the various MPLS protection schemes Define our optimization metric Define four different problem models Present algorithms for the various protections mechanisms and models Present simulations results for the various algorithms

4 The protection schemes we study 1. A Global Recovery scheme (GR) – For each LSP we find a path between the same (S,D) pair that does not use any link of the LSP – The backup path can protect against any failure along the LSP 2. A Local Recovery scheme (LR) – For each link A-B we find a path that starts at A and ends between B and D – Recovery is faster than GR (because it is initiated by the detecting node) – However, more backup LSPs are needed for the protection of each LSP S DAB S DAB a standard MPLS scheme

5 The protection schemes we study (cont.) 3. A Restricted Local Recovery scheme (RLR) – The backup path for link A-B is established between A and B 4. A Facility Local Recovery scheme (FLR) – Same as RLR, except that the new path serves all the LSPs that use the failed link S DAB AB a standard MPLS scheme

6 The protection schemes we study (cont.) 5. An extended k-facility Local Recovery scheme (EkFLR) – Same as FLR, except that the number of LSPs protected by each backup path is limited to k – Hence, we can use more backup paths for the failed LSPs 6. An Unrestricted Recovery scheme (UR) – The backup path for every link can use any route and can protect any number of LSPs AB S DAB

7 Our optimization criterion Most past research aims at minimizing the total bandwidth reserved for the backup LSPs (Spare Capacity Allocation). – Such models consider a network with unbounded capacities, and a cost function associated with bandwidth usage. We believe that network operators struggle with a different problem: – They have a network with finite link capacities and seek to maximize the traffic that can be admitted with protection. Our optimization criterion: constructing primary and backup LSPs while maximizing throughput.

8 Our four problem models A capacitated directed network We make the common “single-failure” assumption. A set of source-destination pairs with associated BW demands and profits. SplittableUnsplittable  Each flow can be split over several primary or backup paths  Each flow can be partially satisfied  One primary LSP and one backup LSP  All or nothing Primary-restrictedPrimary + Backup the primary LSPs are given in advance We also need to establish the primary LSPs (joint optimization)

9 Our results 1. We show that the splittable version of the problem is in P and we offer a polynomial time algorithm for it. 2. We show that the unsplittable version of the problem is NP-complete and has no approximation algorithm with a ratio better than |E| ½. 3. We propose an approximation algorithm with that ratio. 4. We present efficient heuristics for the various recovery schemes. 5. We compare the various recovery schemes with respect to our throughput maximization criterion. We show that UR, GR and, LR differ only marginally in their performance. Since LR has the fastest restoration time of the three schemes, it should be the scheme of choice. We show that EkFLR with k=2 has almost the same performance as RLR and should be preferred over it. Due to its lower administrative overhead (fewer backup LSPs).

10 Complexity results - summary 1. S-PRFP (Splitable, Primary restricted) 2. U-PRFP (Unsplitable, Primary restricted) 3. S-RFP (Splitable, joint primary/backup optimization) 4. U-RFP (Unplitable, joint primary/backup optimization)

11 The Splittable Primary-restricted Restorable Flow Problem (S-PRFP) It is in P for all recovery schemes. We showed it using the following linear program: – - the fraction of flow f routed over edge e when edge e fails – - the routed fraction of f Maximize the profit S-PRFP primary route is already given

12 LP common constraints The following constraints are common to all recovery schemes: (C1) = flow conservation (C2) = capacity constraints (C3) = a flow is routed on its primary LSP as long as there is no failure (C4) = a flow is not routed over a failed link S-PRFP

13 The recovery-specific LP constraints for LR This rule ensures that the backup LSP will follow the primary LSP all the way from the source to A. From node A to the destination node, the backup LSP is not constrained. S-PRFP S DAB

14 The recovery-specific LP constraints for RLR RLR-1 is similar to LR-1, except that it also ensures that the backup LSP will follow the primary LSP from B to the destination. S-PRFP S DAB

15 The recovery-specific LP constraints for UR UR-1 ensures that the backup LSP will follow the primary LSP unless it fails. In case a link on the Primary LSP fails the backup LSP is unrestricted. S-PRFP S DAB

16 The recovery-specific LP constraints for GR GR-1 ensures that the backup LSPs must be edge disjoint with the primary LSP. GR-2 and GR-3 ensures that the backup LSPs are identical for every failure. S-PRFP S DAB

17 The Splittable Restorable Flow Problem (S-RFP) Joint primary and backup LSP optimization The same linear program but without the primary LSP constraint (C-3). Can only be applied to RLR scheme. S-RFP

18 Examples for some of the constraints imposed by the LP for RLR Each link has a capacity of 10Mb/s, and each LSP needs 5Mb/s. We have 3 primary LSPs: A  E, F  J and K  O We can backup a possible failure of C-D using C-H-I-D Then, we can backup a possible failure of M-N using M-H-I-N – The LP needs to “understand” that there is no conflict on H-I because we protect against a single failure! ABC D E FGH I J KLM N O S DAB

19 The Unsplittable Primary-restricted Restorable Flow Problem (U-PRFP) There are two differences between U-PRFP and S-PRFP. 1. In U-PRFP, profit can be obtained for a flow only when its entire demand is satisfied. 2. In U-PRFP, the traffic of each flow can be restored using only a single backup LSP. U-PRFP

20 An approximation preserving reduction from the Unsplitable Flow Problem (UFP): – The construction of G: – All primary LSPs must go through (u,v) – Every pair of solutions in both problems has the same value UFP does not have an approximation better than |E| ½ – The same approximation algorithm is applicable also to U-PRFP The proof for the hardness of the Unsplittable Primary-restricted Restorable Flow Problem (U-PRFP) U-PRFP

21 The Splittable Restorable Flow Problem (S-RFP) Unlike in S-PRFP, here the primary route is not given in advance Hence, the problem is at least as computationally difficult as S-PRFP We use the same linear program but without constraint (C-3). – Because C-3 sticks the primary LSP to a given route This solves RLR and its related schemes (FLR and EkFLR) S-RFP

22 The Splittable Restorable Flow Problem (S-RFP) (cont.) However, for GR, LR, and UR we need to use path-indexed variables, – Namely, variables that indicate for each flow the routed bandwidth on every possible path in the graph. Since the number of such paths is exponential in the size of the graph, we don’t have a polynomial time solution. S-RFP

23 The Unplittable Restorable Flow Problem (U-RFP) U-RFP is at least as computationally harder as U-PRFP Therefore, it is not only NP-complete, but also cannot be approximated better than |E| ½ – Like for U-PRFP, we did find an approximation with this ratio U-RFP

24 A Practical Heuristics for U-RFP and U-PRFP Heuristic #1 – Solve the LP without the recovery requirement. – Sort the flows in non-increasing order of w f /d f (profit/bandwidth) – Apply randomized rounding to select integral flows – For each selected flow, verify that: 1. The flow can indeed be routed 2. A backup LSP can be found using the specific recovery scheme – If both conditions are satisfied, the flow is admitted U-RFP and U-PRFP

25 Some simulation results We use the BRITE simulator to simulate MPLS topologies, according to the Barabasi-Albert model This model captures two important characteristics of the topology: – Incremental growth – Preferentail connectivity (  power-law degree distribution of the MPLS routers) We also used actual ISP topologies, taken from the RocketFuel project

26 The “penalty of reliability” in the Splittable Primary- restricted model For each backup scheme we find the ratio OPT_S-PRFP/OPT_S-PFP For all schemes: it is easier to protect when load is lower optimal algorithm w/ restoration optimal algorithm w/o restoration As expected, UR is the best As expected, LR is better than RLR The advantage of GR over LR is interesting S DAB S DAB LR RLR S DAB GR

27 When the network is smaller When the network is smaller, the various schemes perform very closely, except that RLR is still inferior

28 The penalty of unsplittable backup LSPs (for primary- restricted) We see here the penalty ratio for using unsplittable backup Recall that for splittable routing we have an optimal algorithm Two different heuristics are used for the unsplittable version We see that splittable is better by 25% for all schemes With FLR the penalty is even higher, because FLR needs to find high capacity LSPs

29 The penalty of unsplittable backup LSPs (for primary- restricted) We see here the penalty ratio for using unsplittable backup – As a function of the load in the network Surprisingly, the penalty decreases as the load increases. Can be explained by the fact that the primary LSPs traverse the shortest-paths.

30 The benefit of joint optimization (primary + backup) As expected, as the load in the network increases so does the penalty of using primary LSP set in advance. The penalty increases for network with higher average degree.

31 Conclusions The first comprehensive study of maximizing restorable throughput in MPLS networks We considered 4 models of the problem and 6 restoration schemes The splittable versions are in P The unsplittable versions are all NP-complete, and they cannot be approximated within |E| ½-  LR should be the recovery scheme of choice S DAB