Fast recovery in IP networks using Multiple Routing Configurations Amund Kvalbein Simula Research Laboratory.

Slides:



Advertisements
Similar presentations
Responsive Yet Stable Traffic Engineering Srikanth Kandula Dina Katabi, Bruce Davie, and Anna Charny.
Advertisements

Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Path Splicing with Network Slicing
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
Path Splicing Nick Feamster, Murtaza Motiwala, Megan Elmore, Santosh Vempala.
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
Nick Feamster Georgia Tech
A Narrow Waist for Multipath Routing Murtaza Motiwala Bilal Anwer, Mukarram bin Tariq David Andersen, Nick Feamster.
Ch. 12 Routing in Switched Networks Routing in Packet Switched Networks Routing Algorithm Requirements –Correctness –Simplicity –Robustness--the.
Deployment of MPLS VPN in Large ISP Networks
IP Fast Reroute Using Tunnel-AT draft-xu-ipfrr-tunnelat-00 Mingwei Xu, Lingtao Pan, Qing Li Tsinghua University, China 75 th IETF Meeting, Stockholm July.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Restoration by Path Concatenation: Fast Recovery of MPLS Paths Anat Bremler-Barr Yehuda Afek Haim Kaplan Tel-Aviv University Edith Cohen Michael Merritt.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
Infocom 2003 An Approach to Alleviate Link Overload as Observed on an IP Backbone Tuesday, April 1 st Infocom 2003 Sundar Iyer 1,2, Supratik Bhattacharrya.
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
Volcano Routing Scheme Routing in a Highly Dynamic Environment Yashar Ganjali Stanford University Joint work with: Nick McKeown SECON 2005, Santa Clara,
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS and Traffic Engineering
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
Routing and Routing Protocols
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
QoS-Aware Path Protection in MPLS Networks Ashish Gupta Ashish Gupta Bijendra Jain Indian Institute of Technology Delhi Satish Tripathi University of California.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
1 Meeyoung Cha, Sue Moon, Chong-Dae Park Aman Shaikh Placing Relay Nodes for Intra-Domain Path Diversity To appear in IEEE INFOCOM 2006.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks Audun Fosselie Hansen Tarik Cicic Paal Engelstad Audun Fosselie Hansen – Poster,
Multi-topology protection: promises and problems G. Apostolopoulos Institute of Computer Science Foundation Of Research and Technology Hellas (FORTH)
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
Protection and Restoration Definitions A major application for MPLS.
A Snapshot on MPLS Reliability Features Ping Pan March, 2002.
IP fast reroute s olutions and challenges Amund Kvalbein.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
1 Version 3.0 Module 7 Spanning Tree Protocol. 2 Version 3.0 Redundancy Redundancy in a network is needed in case there is loss of connectivity in one.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
1 IP Fast Reroute with Interface Specific Forwarding Srihari Nelakuditi University of South Carolina, Columbia.
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Single Area OSPF Module 2, Review How routing information is maintained Link-state routers apply the Dijkstra shortest path first algorithm against.
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Prof. Alfred J Bird, Ph.D., NBCT Office – McCormick 3rd floor 607 Office Hours – Monday 3:00 to 4:00 and.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Amund Kvalbein, Audun F. Hansen,
Kevin Piper, David Perry, Tom Hoffman, Emely Pagan
Ch 13 WAN Technologies and Routing
ECE 544: Traffic engineering (supplement)
Optimal Configuration of OSPF Aggregates
CS 457 – Lecture 12 Routing Spring 2012.
Introduction to Internet Routing
Intra-Domain Routing Jacob Strauss September 14, 2006.
ISP and Egress Path Selection for Multihomed Networks
COS 561: Advanced Computer Networks
The Network Layer Network Layer Design Issues:
Routing Protocols Charles Warren.
Separating Routing Planes using Segment Routing draft-gulkohegde-spring-separating-routing-planes-using-sr-00 IETF 98 – Chicago, USA Shraddha Hegde
Wide Area Networks (WANs), Routing, and Shortest Paths
COS 461: Computer Networks
Wide Area Networks (WANs), Routing, and Shortest Paths
Routing and the Network Layer (ref: Interconnections by Perlman
COMPUTER NETWORKS CS610 Lecture-16 Hammad Khalid Khan.
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Achieving Resilient Routing in the Internet
Presentation transcript:

Fast recovery in IP networks using Multiple Routing Configurations Amund Kvalbein Simula Research Laboratory

Sept GaTech networking seminar2 Motivation Increasing use of the Internet for applications with stringent performance requirements –Telephony, videoconferencing, online games –ISPs must adhere to tough SLAs The recovery mechanisms in the Internet are not designed for these requirements –Many (most) failures are short lived –Failures are advertised too widely! –This gives slow reaction and fosters instability

Sept GaTech networking seminar3 Our approach Failure reaction should be local –To avoid instability and overhead –Challenge: avoid loops Failure reaction should be proactive –To reduce recovery times and packet loss –Challenge: minimize overhead

Sept GaTech networking seminar4 Outline Multiple Routing Configurations –The basic idea –Generating backup configurations –Forwarding Evaluation Load balancing improvement Implementation issues Wrap up

Sept GaTech networking seminar5 Multiple Routing Configurations Guaranteed protection against single link, node or SRLG failures Same mechanism for both link and node failures –Generally difficult to distinguish at neighbor A configuration is the graph and the weight function –Different weight setting in each configuration

Sept GaTech networking seminar6 The general observation An unused link can fail without consequences So can a single-connected node Several links and/or nodes can be protected in one logical topology –All nodes are still reachable Build topologies so that all elements are protected –Few such topologies are needed to protect all elements!

Sept GaTech networking seminar7 Isolated links and nodes An isolated link has infinite weight A restricted link has a high weight w r –w r is chosen so that the link is used only as a ”last resort” A node is isolated when all attached links are either isolated or restricted Traffic never goes through an isolated link or an isolated node!

Sept GaTech networking seminar8 Building backup configurations C0C0

Sept GaTech networking seminar C1C1 C2C2 C3C3 Building backup configurations

Sept GaTech networking seminar10 Forwarding

Sept GaTech networking seminar11 How many configurations are needed?

Sept GaTech networking seminar12 How long are the backup paths?

Sept GaTech networking seminar13 What about load distribution?

Sept GaTech networking seminar14 Why bother to avoid overload? - it’s only for short while… Motivation for fast rerouting –Do not loose packets –Increase stability FRR should not make it worse for unaffected traffic

Sept GaTech networking seminar15 Routing performance during FRR Given TM estimate: What decides the load distribution? –Link weights in C 0 –Structure of backup configurations –Link weights in backup configurations Three step approach –Optimize link weights in C 0 –Build backup configurations –Optimize link weights in backup configurations

Sept GaTech networking seminar16 Building backup configurations Optimize C 0 independently Identify the ”heaviest” nodes (most traffic) Build configs with good connectivity for heavy nodes

Sept GaTech networking seminar17 Optimizing link weights Heavy optimization task –Dependencies between configurations Local weight search heuristic –Based on well known Fortz/Thorup method Optimize only for most severe link failures Take advantage of configuration structure –A link failure only activates one or two backup configurations

Sept GaTech networking seminar18 Evaluation – Max link load Real and synthetic network topologies Gravity model traffic demands NetworkFailure free MRC n=5 MRC n=10 OSPF Geant Cost Sprint US (POP) German Telecom

Sept GaTech networking seminar19 Evaluation – Number of configurations

Sept GaTech networking seminar20 Implementation issues Representing backup configurations –IETF: Multi-Topology routing Can calculate independent shortest path trees in each topology Need ability to switch configuration in-flight Marking packets –Same problem as in MT-routing –Reuse of ToS/DSCP bits has been proposed

Sept GaTech networking seminar21 Summary MRC guarantees protection against any single link or node failure Modest state overhead Small path length stretch for recovered traffic Flexibility in how recovered traffic is routed Realistic to implement

Sept GaTech networking seminar22 Related work Failure Insensitive Routing (FIR) –Relies on interface-specific routing tables to infer link failures Not-via addresses –Calculates one ”configuration” for each protected element

Sept GaTech networking seminar23 MRC extensions Multi-failure protection –SRLG, uncorrelated failures –Can guarantee protection against two independent failures (at a cost) Improved configuration construction –Eliminate isolated links –Use deflection in forwarding procedure Use in TE context –Spread demands on several topologies Lab implementation –Using Quagga routing software