E E 681 - Module 20 W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Distributed Mesh Span Restoration.

Slides:



Advertisements
Similar presentations
Ch. 12 Routing in Switched Networks
Advertisements

Data and Computer Communications
Part 2: Preventing Loops in the Network
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Computer Networks with Internet Technology William Stallings
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Temporally-Ordered Routing Algorithm (TORA) IEEE INFOCOM 112/4/20031Authors.
E E Module 17 W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 ATM VP-based (or MPLS path) Restoration with Controlled Over-
W.D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Mesh-restorable Network Design (2) E E Module 13.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Internetworking.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Teknik Routing Pertemuan 20 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
E E Module 18 M.H. Clouqueur and W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Analysis of Path Availability in Span-Restorable.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss.
Routing algorithms, all distinct routes, ksp, max-flow, and network flow LPs W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 E.
Packet Switching EE3900 Data Communications and LANs Packet Switching Slide 1.
Capacity Requirements for Network Recovery from Node Failure with Dynamic Path Restoration Gangxiang Shen and Wayne D. Grover TRLabs and University of.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
University of Alberta ECE Department Network Systems Gangxiang Shen, Wayne D. Grover Extending the p-Cycle Concept to Path-Segment Protection Gangxiang.
© Rui Wang Cycle-Oriented Distributed Preconfiguration Ring-like Speed with Mesh-like Capacity for Self-planning Network Restoration 1 Sep Rui Wang.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
Network Topologies.
Data Communications & Computer Networks
LAN Overview (part 2) CSE 3213 Fall April 2017.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 7 Spanning Tree Protocol.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Copyright © Wayne D. Grover 2000 EE 681 Fall 2000 Lecture 15 Mesh-restorable Network Design (2) W. D. Grover, October 26, 2000 copyright © Wayne D. Grover.
Packet-Switching Networks Routing in Packet Networks.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Data Communications & Computer Networks, Second Edition1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Chapter 15 Interior Routing Protocols 1 Chapter 15 Interior Routing Protocols.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Routing and Routing Protocols
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
1 P-Cycles. 2 What’s a p-Cycle? A preconfigured cycle formed out of the spare capacities in the network –A p-cycle uses one unit of spare capacity on.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Cycle-Oriented Distributed Preconfiguration: Ring-like Speed with Mesh-like Capacity for Self-planning Network Restoration Wayne D.Grover, Demetrios Stamatelakis.
William Stallings Data and Computer Communications
John Doucette and Wayne D. Grover
CHAPTER 3 Architectures for Distributed Systems
ODMRP Enhancement.
Storage Virtualization
THE NETWORK LAYER.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Network Survivability
Graph theory and routing: Background for Network Design
Data and Computer Communications
PRESENTATION COMPUTER NETWORKS
TRLabs & University of Alberta © Wayne D. Grover 2002, 2003, 2004
Types of topology. Bus topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly.
Computer Networks Protocols
Presentation transcript:

E E Module 20 W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 Distributed Mesh Span Restoration

E E Module 20 © Wayne D. Grover 2002, Centralized vs. Distributed Network Configuration Network configuration: –Establishment of working paths (provisioning) –Restoration –Traffic adaptation Centralized approach: –A central command point that has a knowledge of the complete network state (full network map, link states, available capacity,…) makes routing decisions and sends commands to the nodes. Distributed approach (self-organizing): –Nodes apply simple rules in an autonomous and asynchronous manner to handle the problems of demand routing, restoration or traffic adaptation

E E Module 20 © Wayne D. Grover 2002, Centralized vs. Distributed Network Configuration Advantages of centralized approach: –The complete knowledge of the network state make it possible to find an optimal network configuration Drawbacks of centralized approach: –Diverse telemetry network required for collection of information about network state –Constant verification of database integrity is needed –Very slow due to time for commands download and validation –Can easily lead to the Centralized control is unable to achieve the 2 second restoration time widely recognized as a target for the transport network.

E E Module 20 © Wayne D. Grover 2002, Centralized vs. Distributed Network Configuration Advantages of a (distributed) self-organizing solution: –Simple (avoids the “Software mountain” problem) –Speed –Accuracy –Robustness –Resource usage efficiency Drawback: –Not necessarily optimal The rest of the lecture presents a self-organizing solution to the problem of span-restoration: The self-healing network (SHN) protocol

E E Module 20 © Wayne D. Grover 2002, Objectives of the self-healing protocol Find the maximum number of replacement paths between the end-nodes of a failed span with the least possible amount of spare capacity (For the problem of span restoration) The corresponding mathematical problem is single-commodity maximum flow: Remark: A solution to this formulation does not tell us what cross connections should be made in the nodes

E E Module 20 © Wayne D. Grover 2002, Objectives of the self-healing protocol (2) Achieve fast restoration (below 2 sec) Avoid the complexity of centralized restoration and the “software mountain” phenomenon

E E Module 20 © Wayne D. Grover 2002, Distributed Restoration: what about flooding? Flooding is a simple solution to find restoration routes However … Flooding does not help decide the number of restoration paths to establish on each route The formation of paths must be simultaneously coordinated to achieve maximum flow Flooding however can be used for the determination of minimum delay routes or broadcast of topology updates (Remember the trap topology)

E E Module 20 © Wayne D. Grover 2002, SHN Protocol: Node Interactions using Statelets Statelets: (NID,Sender,Chooser,index,repeat count) Node NID: Node Identification Sender, Chooser: Pair of nodes at the two end of the failed span (decision of attribution of sender and chooser roles will be explained later) Index: Unique number assigned to each statelet emitted by the sender Repeat count: Counting of the number of hops since statelet was emitted by sender Statelets are attributes of the transmission links

E E Module 20 © Wayne D. Grover 2002, SHN Protocol: Different node states Nodes can only be in a finite number of different states: –Pre-failure state –Sender state –Chooser state –“Tandem node” state The transition between these states depends on the changes of incoming statelets (events) –A change in an incoming statelet is called a receive statelet (RS) event The SHN protocol is an event-driven finite state machine (FSM)

E E Module 20 © Wayne D. Grover 2002, SHN Protocol: Pre-failure Node State Node Q pre-failure state (null) s s s s ssss s s s s s (null) = (Q,0,0,0,0) In pre-failure state, nodes send null statelets on all working and spare links

E E Module 20 © Wayne D. Grover 2002, SHN Protocol: Activation Span cut (null) Node Q pre-failure state w w s s ssss s s s s s w (null) (Q,Q,P,6,1) (Q,Q,P,7,1) (Q,Q,P,8,1) (Q,Q,P,5,1) (Q,Q,P,4,1) (Q,Q,P,1,1) (Q,Q,P,2,1) (Q,Q,P,3,1) state determination RS.NID = P..... state = sender A span failure is detected by the span end-nodes first. One of the nodes become the “Sender node” Statelets are sent on each available spare links up to a maximum of min(w,s i ) in each span

E E Module 20 © Wayne D. Grover 2002, (null) SHN Protocol: Basic view of Tandem Nodes role (Complete tandem node rules to be explained later) Node T i pre-failure state (null) s s s s sss s s s s s (Q,Q,P,1,1) (Q,Q,P,2,1) (Q,Q,P,3,1) s Node T 1 in Tandem node state: Selective re-broadcast Update of statelets (T 1,Q,P,1,2) (T 1,Q,P,2,2) (T 1,Q,P,3,2) (T 1,Q,P,1,2)(Q,Q,P,1,1) NID: Q replaced by Tandem node ID Repeat count increased by 1

E E Module 20 © Wayne D. Grover 2002, Node P receives first statelet (for index 2 in example): complementary statelet sent (P,Q,P,2,1) R SHN Protocol: Initiation of Reverse Linking Node P Chooser state s s s s ssss s s s s s (T i,Q,P,2,n)

E E Module 20 © Wayne D. Grover 2002, (T 1,Q,P,1,2) (T 1,Q,P,2,2) (T 1,Q,P,3,2) SHN Protocol: Reverse Linking process (null) s s s s sss s s s s s (Q,Q,P,1,1) (Q,Q,P,2,1) (Q,Q,P,3,1) s (T 2,Q,P,2,n-1) R (T 1,Q,P,1,2) (T 1,Q,P,2,2) (T,Q,P,2,n) R Request for local cross connection Node T 1 receives reverse- linking statelet and copies it to the port going to the precursor

E E Module 20 © Wayne D. Grover 2002, More details on SHN: Sender-Chooser Arbitration Node PNode Q RS.NID = P RS.NID = Q How am I ranked compared to Q? How am I ranked compared to P? I will be the chooser node I will be the sender node Other possibility: The node with the lowest number of surviving spare links becomes the sender (to minimize the volume of statelets generated)

E E Module 20 © Wayne D. Grover 2002, More details on SHN: Tandem Nodes Rules 1)Keep list of ports where precursor statelets are presently found and sort statelets by: –increasing repeat count –increasing number of the port where they appear 2)Replace precursors by better ones when better ones appear 3) Try as much as possible to re-broadcast statelets to all other spans 3a) When full re-broadcast is not possible, consider statelets in order of repeat count starting with the lowest values. 4) When complement statelet is received it is copied to the port of the precursor, all re-broadcast of forward flooding statelets for the corresponding index is stop and any subsequent appearance of a reverse linking statelet with that index is ignored

E E Module 20 © Wayne D. Grover 2002, Tandem Node Rules: Index ranking Keep list of ports where precursor statelets are presently found and sort statelets by: increasing repeat count increasing number of the port where they appear r = 3 r = 1 r = 6 r = 5 r = n Rank in the list

E E Module 20 © Wayne D. Grover 2002, Tandem Node Rules: Selective re-broadcast Try as much as possible to re-broadcast statelets to all other spans When full re-broadcast is not possible, consider statelets in order of repeat count starting with the lowest values. r = 3 r = 1 r = 6 r = 5 r =

E E Module 20 © Wayne D. Grover 2002, s Tandem Node Rules: Reverse Linking (T 1,Q,P,2,2) (T 1,Q,P,1,2) w (T 1,Q,P,2,2) (T 1,Q,P,3,2) (null) s s s s sss s s s s (Q,Q,P,1,1) (Q,Q,P,2,1) (Q,Q,P,3,1) s (T 2,Q,P,2,n-1) R (T 1,Q,P,1,2) (T,Q,P,2,n) R Request for local cross connection Node T 1 obeys rule 4: Complement statelets The complement statelet is sent to precursor Cross connection is requested Re-broadcast for that index is stopped Set the status of both ports as “working” w

E E Module 20 © Wayne D. Grover 2002, SHN Protocol: Frequent low-level effects The application of rule 3 and the effects of reverse linking results is several frequent low-level effects: –The precursor location for an index shifts –A new index appears at the node –A precursor disappears –Links are freed for more re-broadcast after reverse linking After any of these events the rebroadcast pattern is revised to follow rule 3

E E Module 20 © Wayne D. Grover 2002, SHN Protocol: Frequent low-level effects (2) The precursor location for an index shifts Index i, repeat r Index i, repeat r+1 Index i, repeat r+1 Index i, repeat r+1 Index i, repeat r-1 3 Index i, repeat r-1 Index i, repeat r Index i, repeat r Index i, repeat r

E E Module 20 © Wayne D. Grover 2002, SHN Protocol: Frequent low-level effects (3) A new index appears at a node r = 3 r = 1 r = 6 r = 5 r = r = Index 6 is not re- broadcast anymore

E E Module 20 © Wayne D. Grover 2002, SHN Protocol: High Level Behaviour At the high level what we see is: Index trees expanding Some trees are stopped because no re-broadcast possible Some trees reach the chooser node Reverse linking make successful trees collapse Freed capacity allows revision of re-broadcast patterns Eventually: –100% restoration is achieved –or … No reverse linking events occur and the sender suspends statelet flooding after some time (time-out)

E E Module 20 © Wayne D. Grover 2002, SHN Protocol: Performances Finding the maximum number of restoration paths –In no test case in over 15 test networks derived from the real world did the SHN process yield any fewer the maximum feasible number of paths in the given network Achieving fast restoration –Speed of restoration depends on the implementation –But easily realized on-demand (adaptive) “restoration” in less than 2 seconds –or, can be used for Distributed Preplanning for pre-failure self-development of fast-acting protection pre-plans (~ 100 msec or less reaction upon failure). Results of complete restoration times for one of the implementation tested in [1]

E E Module 20 © Wayne D. Grover 2002, Self-Organizing Networks: other applications “Capacity scavenging” for: –Automated service paths provisioning (“broad-band dial-up” –Network Audit (advance detection of restorability limitations and/or locations where capacity will soon be exhausted) –Improved restorability to complete node failures “Distributed Pre-planning” For more details, see: [1] W. Grover, “Self-organizing broad-band transport networks,” Proceedings of the IEEE, vol. 85, no. 10, October [2] W.D. Grover, "Distributed Restoration of the Transport Network," Chapter 11 in Telecommunications Network Management into the 21st Century, Techniques, Standards, Technologies and Applications, S.Aidarous, T. Plevyak (editors), IEEE Press, 1994, pp