Achieving Convergence-Free Routing using Failure-Carrying Packets K. Lakshminarayanan et al. Presented by Ang Li 06/29/07.

Slides:



Advertisements
Similar presentations
Jaringan Komputer Lanjut Packet Switching Network.
Advertisements

Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
Presented by Pierre-Élie Fauché 1 XL: An Efficient Network Routing Algorithm Kirill Levchenko Geoffrey M. Voelker, Ramamohan Paturi, and Stefan Savage.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Consensus Routing: The Internet as a Distributed System John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, and Thomas Anderson Presented.
HYDRO: A Hybrid Routing Protocol for Lossy and Low Power Networks draft-tavakoli-hydro-01 Stephen Dawson-Haggerty, Jonathan Hui, Arsalan Tavakoli.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
KARL NADEN – NETWORKS (18-744) FALL 2010 Overview of Research in Router Design.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Progress Report Wireless Routing By Edward Mulimba.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss.
Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers C. E. Perkins & P. Bhagwat Presented by Paul Ampadu.
Routing and Routing Protocols
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
WAN Technologies.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-1 Determining IP Routes Introducing Link-State and Balanced Hybrid Routing.
HARP-Hybrid Ad Hoc Routing Protocol Navid NIKAEIN Christian BONNET Neda NIKAEIN © 2001 Navid Nikaein Eurecom Institute.
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
Routing Concepts Warren Toomey GCIT. Introduction Switches need to know the link address and location of every station. Doesn't scale well, e.g. to several.
Routing and Routing Protocols Dynamic Routing Overview.
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
Link State Routing Protocols Last Update Copyright Kenneth M. Chipps Ph.D.
Distance Vector Routing Protocols W.lilakiatsakun.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
Dynamic Routing Protocol EIGRP Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol developed by Cisco.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
Central Control over Distributed Routing fibbing.net SIGCOMM Stefano Vissicchio 18th August 2015 UCLouvain Joint work with O. Tilmans (UCLouvain), L. Vanbever.
Internetworking Concept and Architectural Model
CCNA 3 Week 2 Link State Protocols OSPF. Copyright © 2005 University of Bolton Distance Vector vs Link State Distance Vector –Copies Routing Table to.
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Simulation of the OLSRv2 Protocol First Report Presentation.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 34 Routing Algorithms Ref: Tanenbaum pp ;
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 10 EIGRP 1.
Routing and Routing Protocols
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Version 3.1 Module 6 Routed & Routing Protocols.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
On Improving the Efficiency and Manageability of NotVia Ang Li †, Pierre Francois ‡, and Xiaowei Yang † † UCIrvine ‡ Université catholique de Louvain CoNext.
Routing Protocols Brandon Wagner.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Routing Protocols COSC 541 Data Commun. System & Networks Yue Dou.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
Inter-domain Routing Outline Border Gateway Protocol.
Single Area OSPF Module 2, Review How routing information is maintained Link-state routers apply the Dijkstra shortest path first algorithm against.
© 2002, Cisco Systems, Inc. All rights reserved..
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Routing and Routing Protocols CCNA 2 v3 – Module 6.
+ Dynamic Routing Protocols 2 nd semester
William Stallings Data and Computer Communications
Outline Introduction Routing in Mobile Ad Hoc Networks
Internet Networking recitation #4
Fisheye Routing protocol
Introduction to Internet Routing
Ad-hoc On-demand Distance Vector
Routing in Packet Networks Shortest Path Routing
Link-State Routing Protocols
COS 561: Advanced Computer Networks
Link-State Routing Protocols
COS 461: Computer Networks
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Achieving Convergence-Free Routing using Failure-Carrying Packets K. Lakshminarayanan et al. Presented by Ang Li 06/29/07

Convergence is the source of evil! Packet Loss LSA storms (high control message overhead) –High CPU utilization –Network instability What we have –Loop-free convergence –Fast convergence –Backup paths

FCP, no convergence at all! No control message exchange Routes calculated “on-demand” –When a packet meets a failure Packets carry topology information –Failure list –To avoid loop

FCP algorithm

Why FCP works? A stable and consistent Network Map –FCP falls back to normal link-state protocol when no failure –Guarantee efficiency Failure list grows monotonically –Guarantee loop-free

FCP with Source Routing To deal with inconsistent Network Map –FCP packets carry the whole path besides failure list –Differences in Network Map are reported as “failures” –Higher packet overhead

Two Properties of FCP Guaranteed Reachability –Packets are delivered within finite time if the network is still connected –Time is bounded by number of failures and network diameter Path Isolation –Routers not on the forwarding path of one packet can not affect the forwarding

Reducing Overhead of FCP Two overheads –Computation time –Packet overhead

Reducing Overhead of FCP Two overheads –Computation time Solution: precompute “secondary nexthop” & caching –Packet overhead Solution: mapping between failure list and label

Network Map Dissemination Centralized scheme –Need special care to guarantee consistency Otherwise FCP-SR is used

Pros of FCP Theoretically interesting –A new approach –Provide two layers of topology update Network Map layer Failure layer Security –Influence of a hijacked router is limited

Cons of FCP Far from practical deployment –Many details missing For e.g., how to do caching? How much caching is enough? –Inconsistent with today’s router architecture Route computation can not be carried out in linecards Idea is not new –Already in wireless context –The only thing new is the concept of Network Map