An efficient critical protection scheme for intra-domain routing using link characteristics

In recent years, there are substantial demands to reduce packet loss on the Internet. Among the proposed schemes, finding backup paths in advance is considered to be an effective method to reduce the reaction time. Very commonly, a backup path is chosen to be the most disjoint path from the primary path, or on the network level, a backup path is computed for each link (e.g., IPFRR). The validity of this straightforward choice is based on two things. The first thing is all the links may have the equal likelihood to fail; the second thing is, facing the high protection requirement today, it just looks weird to have links not protected or to share links between the primary and backup paths. Nevertheless, many studies have confirmed that the individual vulnerability of the links on the Internet is far from being equal. In addition, we have observed that full protection schemes (In this paper, full protection schemes means schemes (1) in which backup path is a most disjoint path from the primary path; or (2) which compute backup path for each link.) may introduce high cost (e.g., computation). In this paper, we argue that such approaches may not be cost-efficient and therefore propose a novel critical protection scheme based on link failure characteristics. Firstly, we analyze the link failure characteristics based on real world traces of CERNET2 (China Education and Research NETwork 2). The analysis results clearly show that the failure probabilities of the links in CERNET2 backbone are heavy-tailed, i.e., a small set of links causing most of the failures. Based on this observation, we find out two key parameters which strongly impact link criticality and propose a critical protection scheme for both single link failure situation and multi-link failure situation. We carefully analyze the implementation details and overhead for backup path schemes of the Internet today; the problem is formulated as an optimization problem to guarantee the routing performance and minimize the backup cost. This cost is special as it involves computational overhead. Based on this, we propose a novel Critical Protection Algorithm which is fast itself for both the single link failure and the multi-link failure versions. A comprehensive set of evaluations with randomly generated topologies, real world topologies and the real traces from CERNET2, shows that our scheme gains significant achievement over full protection in both single link failure situation and multi-link failure situation. It costs only about 30-60% of the full protection cost when the network relative availability increment is 90% of the full protection scheme.

[1]  Daniel Massey,et al.  BGP-RCN: improving BGP convergence through root cause notification , 2005, Comput. Networks.

[2]  Bruce M. Maggs,et al.  R-BGP: Staying Connected in a Connected World , 2007, NSDI.

[3]  Ralf Steinmetz,et al.  Generating realistic ISP-level network topologies , 2003, IEEE Communications Letters.

[4]  Stewart Bryant,et al.  IP Fast Reroute Using Not-via Addresses , 2006 .

[5]  Biswanath Mukherjee,et al.  Survivable WDM mesh networks , 2003 .

[6]  Jennifer Yates,et al.  Effectiveness of shared risk link group auto-discovery in optical networks , 2002, Optical Fiber Communication Conference and Exhibit.

[7]  Piotr Cholda,et al.  Network Recovery, Protection and Restoration of Optical, SONET-SDH, IP, and MPLS [Book Review] , 2005, IEEE Communications Magazine.

[8]  J. W. Suuballe,et al.  Disjoint Paths in a Network , 2022 .

[9]  Minas Gjoka,et al.  Evaluation of IP Fast Reroute Proposals , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.

[10]  Tibor Cinkler,et al.  Segment shared protection in mesh communications networks with bandwidth guaranteed tunnels , 2004, IEEE/ACM Transactions on Networking.

[11]  Chen-Nee Chuah,et al.  Characterization of Failures in an Operational IP Backbone Network , 2008, IEEE/ACM Transactions on Networking.

[12]  Stewart Bryant,et al.  Internet Engineering Task Force (ietf) a Framework for Ip and Mpls Fast Reroute Using Not-via Addresses , 2022 .

[13]  Lei Guo,et al.  Path-based routing provisioning with mixed shared protection in WDM mesh networks , 2006, Journal of Lightwave Technology.

[14]  Godfried T. Toussaint,et al.  Finding Hamiltonian Circuits in Arrangements of Jordan Curves is NP-Complete , 1994, Inf. Process. Lett..

[15]  Lei Guo,et al.  A New Link-Based Hamiltonian Cycle Protection in Survivable WDM Optical Networks , 2008, 2008 Fourth Advanced International Conference on Telecommunications.

[16]  Lei Guo,et al.  Enhanced Multicast Hamiltonian Cycle Protection in WDM optical networks , 2010, 2010 Second International Conference on Communication Systems, Networks and Applications.

[17]  Chen-Nee Chuah,et al.  Feasibility of IP restoration in a tier 1 backbone , 2004, IEEE Network.

[18]  Lei Guo,et al.  A New Differentiated Hamiltonian Cycle Protection Algorithm in Survivable WDM Mesh Networks , 2009, 2009 International Conference on Signal Processing Systems.

[19]  Ibrahim Matta,et al.  BRITE: Boston University Representative Internet Topology gEnerator: A Flexible Generator of Internet Topologies , 2000 .

[20]  Chen-Nee Chuah,et al.  Fast Local Rerouting for Handling Transient Link Failures , 2007, IEEE/ACM Transactions on Networking.

[21]  Ankit Singla,et al.  Information-centric networking: seeing the forest for the trees , 2011, HotNets-X.

[22]  Alia Atlas,et al.  Basic Specification for IP Fast Reroute: Loop-Free Alternates , 2008, RFC.

[23]  Biswanath Mukherjee,et al.  Path-protection routing and wavelength assignment (RWA) in WDM mesh networks under duct-layer constraints , 2003, TNET.

[24]  Chunming Qiao,et al.  On the complexity of and algorithms for finding the shortest path with a disjoint counterpart , 2006, IEEE/ACM Transactions on Networking.

[25]  Olivier Bonaventure,et al.  Achieving sub-second IGP convergence in large IP networks , 2005, CCRV.

[26]  A. Greenberg,et al.  Auto-discovery of shared risk link groups , 2001, OFC 2001. Optical Fiber Communication Conference and Exhibit. Technical Digest Postconference Edition (IEEE Cat. 01CH37171).

[27]  Suresh Subramaniam,et al.  Loopback recovery from double-link failures in optical mesh networks , 2004, IEEE/ACM Transactions on Networking.

[28]  Lei Guo,et al.  Local and global hamiltonian cycle protection algorithm based on abstracted virtual topology in fault-tolerant multi-domain optical networks , 2010, IEEE Transactions on Communications.

[29]  E. Ariwa,et al.  The impact of eLearning on China Education and Research Network (CERNET) , 2005 .

[30]  Piet Demeester,et al.  Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS , 2004 .

[31]  Stefan Savage,et al.  Xl: an efficient network routing algorithm , 2008, SIGCOMM '08.

[32]  L. Pósa,et al.  Hamiltonian circuits in random graphs , 1976, Discret. Math..

[33]  Xiaowei Yang,et al.  On improving the efficiency and manageability of NotVia , 2007, CoNEXT '07.

[34]  Lei Guo,et al.  Enhanced Hamiltonian Cycle Protection Algorithm in Survivable Networks , 2008, 2008 International Conference on Signal Processing, Communications and Networking.

[35]  H. T. Mouftah,et al.  Shared protection in mesh WDM networks , 2004, IEEE Communications Magazine.

[36]  Chen-Nee Chuah,et al.  Analysis of link failures in an IP backbone , 2002, IMW '02.

[37]  Mingwei Xu,et al.  Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.

[38]  Murali S. Kodialam,et al.  Dynamic routing of bandwidth guaranteed tunnels with restoration , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[39]  Wayne D. Grover,et al.  Mesh-based Survivable Transport Networks: Options and Strategies for Optical, MPLS, SONET and ATM Networking , 2003 .

[40]  Wenyu Jiang,et al.  Comparison and optimization of packet loss repair methods on VoIP perceived quality under bursty loss , 2002, NOSSDAV '02.

[41]  Balachander Krishnamurthy,et al.  Web protocols and practice , 2001 .

[42]  Stein Gjessing,et al.  Fast IP Network Recovery Using Multiple Routing Configurations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[43]  Lei Guo,et al.  A Novel Survivable Routing Algorithm With Partial Shared-Risk Link Groups (SRLG)-Disjoint Protection Based on Differentiated Reliability Constraints in WDM Optical Mesh Networks , 2007, Journal of Lightwave Technology.

[44]  Stewart Bryant,et al.  IP Fast Reroute Framework , 2010, RFC.

[45]  Chung-Lun Li,et al.  The complexity of finding two disjoint paths with min-max objective function , 1989, Discret. Appl. Math..

[46]  Narciso García,et al.  Effect of packet loss in video quality of experience , 2011, Bell Labs Technical Journal.

[47]  Chunming Qiao,et al.  Trap avoidance and protection schemes in networks with shared risk link groups , 2003 .

[48]  Daniel O. Awduche,et al.  IP over Optical Networks: A Framework , 2004, RFC.