IGP Link Weight Assignment. for Transient Link Failures

Size: px
Start display at page:

Download "IGP Link Weight Assignment. for Transient Link Failures"

Transcription

1 IGP Link Weight Assignment 1 for Transient Link Failures A. Nucci, B. Schroeder, S. Bhattacharyya, N. Taft, C. Diot Sprint Advanced Technology Labs, Burlingame, CA 941, USA Carnegie Mellon University, Pittsburgh, PA, USA bschroeder@cs.cmu.edu Abstract Intra-domain routing in IP backbone networks relies on link-state protocols such as IS-IS or OSPF. These protocols associate a weight (or cost) with each network link, and compute traffic routes based on these weights. However, proposed methods for selecting link weights largely ignore the issue of failures which arise as part of everyday network operations (maintenance, accidental, etc.). Changing link weights during a short-lived failure is impractical. However such failures are frequent enough to impact network performance. We propose a Tabu-search heuristic for choosing link weights which allow a network to function almost optimally during short link failures. The heuristic takes into account possible link failure scenarios when choosing weights, thereby mitigating the effect of such failures. We find that the weights chosen by the heuristic can reduce link overload during transient link failures by as much as at the cost of a small performance degradation in the absence of failures ( ). I. INTRODUCTION Large IP networks use a link-state protocol such as IS-IS or OSPF as their Internal Gateway Protocol (IGP) for intra-domain routing. Every link in the network is assigned a weight, and the cost of a path is measured as the sum of the weights of all links along the path. Traffic is routed between any two nodes along the minimum cost path which is computed using Dijkstra s shortest path forwarding (SPF) algorithm. Thus setting the link weights is the primary traffic engineering technique for networks running IS-IS or OSPF. Appendix included for review purposes only

2 2 Cumulative distribution Percentage Transient failures (<1min) Long failures (>1min) Failure duration (minutes) Fig. 1. Failure duration distribution in Sprint s network Jan- April Simultaneously failed links Fig. 2. Distribution of simultaneous failures in Sprint s network Jan-April 22. The distribution is shown separately for transient failures ( minutes) and longer failures ( minutes) The traffic engineering objectives of an IP backbone are largely determined by the service-level agreements (SLAs) with its customers, which typically include speed-of-light delays and lossless packet delivery. Accordingly, there are two main goals when setting link weights: keeping end-to-end delays low and ensuring that no link is overloaded. Several formalizations of the problem of selecting link weights that are optimal with respect to the above traffic engineering objectives have been shown to be NP-hard [1], [2]. A common recommendation of router vendors is to set the weight of a link to the inverse of its capacity [3]. The idea is that this will attract more traffic to high capacity links and less traffic to low capacity links, thereby yielding a good distribution of traffic load. Another common recommendation is to assign a link a weight proportional to its physical length in order to minimize propagation delays. In practice, many backbone operators use the ad-hoc approach of observing the flow of traffic through the network, and repeatedly adjusting the weight whenever the load on a link is higher or lower than desired. The problem has been addressed formally [1], [5], [6] using different techniques from operations research. We discuss related work in more detail in Section V. A drawback of most current approaches (with the notable exception of [5]) is that they view the link weight assignment problem as a static problem largely ignoring network dynamics. However in practice, one of the main challenges of a network operator is to deal with link failures that are encountered on a daily basis in large IP backbones. When a link fails, IS-IS/OSPF routing diverts the traffic over that link to alternate paths, increasing the load of or more of the other links. The most obvious way of restoring the network to its original traffic engineering objectives is to perform a network-wide recomputation and reassignment of link weights. [5] has shown that changing just a few link weights is usually sufficient to rebalance the traffic. However changing link weights during a failure may not be practical for two reasons. First, the new weights will have to be flooded to every router in the network, and every router will have to recompute its minimum cost path to every other router. This can lead to considerable instability in the network, aggravating the situation already created by the link failure. The second reason is related to the short-lived nature of most of the link failures. Figure 1 shows the distribution of inter-pop link failures in Sprint s IP backbone over a four-month period (January-April 22)[7]. We observe that as many as of the failures last less than minutes

3 3 and of the failures last even less than a minute. We define transient failures as those failures that last less than minutes. Transient failures can create rapid congestion that is harmful for the network [15]. However, they leave a human operator with insufficient time to reassign link weights before the failed link is restored. We observe from the Sprint network that transient failures are mostly isolated. Figure 2 shows the frequency of simultaneous occurence of two types of failures: transient failures (less than minutes), and all others (longer than minutes). For each, the figure plots the time during which a given number of simultaneous failures was seen on the Sprint network, computed as a fraction of the total time during which one of more failures occurred. We observe that more than of the transient failures are isolated. For the long-lived failures, only about are isolated. This is because a majority of the long-lived failures are caused by optical fiber cuts that can affect several links simultaneously. In contrast, transient failures are due to maintenance windows, line card and optical equipment failures, and router software problems. We focus on minimizing the impact of transient link failures on traffic. Accordingly, we propose an approach for assigning link weights in IS-IS/OSPF networks that takes into account the isolated failure of any possible link in the backbone. The goal is to find one set of link weights that works well in the absence of failures and, at the same time, does not overload any link during transient failures. The heuristic achieves this goal by finding weights that balance traffic evenly among alternate paths during a link failure. This approach provides considerable benefit for stable network operations since the network can function almost optimally in the presence of transient failures without requiring any weight change. This is also the only applicable approach for the kind of failures addressed in this work. We study the performance of this heuristic using a computation-based approach. For a given network topology and traffic demand matrix, we first use our heuristic to assign link weights. We then use Dijsktra s SPF algorithm to determine minimum cost routes, and compute performance metrics of interest for these routes. We validate the performance of the heuristic using an Integer Linear Program (ILP) model. Results show that the heuristic performs within of the lower bound obtained from the ILP model. It is not possible to find a single weight set that performs equally well both for transient failures and in the absence of failures. However, our algorithm finds a weight set that restricts link loads to less than during any link failure. In comparison, a traditional weight selection approach that does not consider link failures results in a maximum link load of for the same network. This improvement comes at the cost of a small increase in maximum link load in the absence of failures. However, there is no degradation in end-to-end delays across the network due to congestion. For ease of exposition we discuss this work with reference to IS-IS in this paper. Nevertheless, all the results are equally applicable to any other Internal Gateway Protocol including OSPF. The rest of the paper is organized as follows. Section II formally states the problem addressed in this work. Section III describes the Tabu Search heuristic for the link weight selection problem. Section IV analyzes the performance of the heuristic. Section V discusses related work and Section VI concludes the paper. The Integer Linear Program (ILP) model used to generate a lower bound for the heuristic is presented in the appendix.

4 J 4 II. THE LINK WEIGHT SELECTION PROBLEM The problem of computing IS-IS link weights can be formally stated as follows. We represent a network by an undirected graph where corresponds to the set of nodes and corresponds to the links connecting the nodes. Each edge has a bandwidth capacity and integer ISIS weight. Let be the cardinality of the set. Let be a traffic matrix representing the traffic demands such that correspond to traffic demand between origin node and destination node. Henceforth we will refer to an origin-destination network node pair as an O-D pair. The traffic demand between an O-D pair and is routed along the minimum cost path from to, where the cost of a path is measured as the sum of the weights of the links along the path. If multiple paths exist with the same minimum cost, the traffic demand is split equally among all these paths. The problem is to choose a single set of link weights "!#!#!# %$& so as to optimize a given objective function. The objective function is typically selected to meet the traffic engineering goals of a network. An important traffic engineering goal for IP networks is to distribute traffic evenly so that no link carries an excessive load. The load on a link is defined as the ratio of the traffic carried by the link to its capacity. A common approach is to choose routes so as to minimize maximum load over all links in the network. This is also the objective function chosen for this work. The problem of choosing link weights to minimize maximum link load is NP-Hard [1], [2]. A novel aspect of our approach to the link weight selection problem is that we consider transient link failures. We model the occurence of isolated transient failures in the network as state transitions. In the absence of any such failure, the state of the network is denoted by ')(. During the transient failure of link * (*+,.-/ """ ), the state of the network is denoted by '21. We refer to the maximum link load of the the network in any given state as the bottleneck load. Let 34 5'768 %9 be the bottleneck load in state ':6. '<; = is defined as the state with the maximum bottleneck load over all network states, i.e., 34 5' ; 5= %9>34 5' 6? A@CBDFE C HG. Henceforth we refer to state ' ( as the no-failure state, and the state ' ; 5= as the worst-failure state. The problem of selecting IS-IS weights has been traditionally addressed for state 'H(, which implies that link weights are selected to minimize 34 5'&(I [1], [5], [6]. Instead a network operator may be interested in limiting the maximum link overload due to any single-link failure event. In that case, it is appropriate to choose link weights so as to minimize 34 5'<; =. Selecting a weight set that is optimal for the network in a failure state may result in sub-optimal performance in the absence of failures. We want to meet two objectives: preventing link overloads during a failure while simultaneously minimizing performance degradation in the absence of failures. We thus choose the following objective function: K %LNMO P34 5'<(I 2QRMS34 5'T; = (1) where M U C 8 is an artificial parameter that helps in minimizing performance degradation in the absence of failures while maximizing the gain for any transient failure. Setting M to corresponds to finding link weights without considering failures. On the other hand, setting M to results in link weights that minimize the maximum load under

5 5 any failure, but completely ignore performance in the absence of failures. For very small or very large values of W (e.g., M C! or M C! ), the term in J with the large coefficient is the major objective, yielding potentially several optimal solutions that are disambiguated by the value of the other term in F. III. SEARCH HEURISTIC FOR LINK WEIGHT SELECTION In this section we present the heuristic. We start with a brief overview of the Tabu Search methodology and then describe the important elements of the heuristic. A. Overview of Tabu Search The heuristic we propose is based on the Tabu Search 'H [8] methodology. TS is an iterative procedure designed to solve optimization problems. It is based on selected concepts that unite the fields of artificial intelligence and optimization. It has been applied to a wide range of problems such as job scheduling, graph coloring and network planning, and is considered as an alternative to techniques such as simulated annealing and genetic algorithms. TS conducts a guided exploration of the space of admissible solutions, keeping track of all solutions evaluated along the way. The exploration starts from an initial solution that is generally obtained with a greedy algorithm. When a stop criterion is satisfied, the algorithm returns the best visited solution. To move from one solution to the next, TS explores the neighborhood of the last solution visited (referred to as the current solution). It generates a neighbor solution by applying a transformation, named as a move, on the current solution. The set of all admissible moves (determined by the rules guiding TS) uniquely defines the neighborhood of the current solution. At each iteration of the TS algorithm, all solutions in the neighborhood are evaluated, and the best is selected as the new current solution. TS occasionally moves from a better solution to a poorer one during the search procedure. This is in contrast to local search heuristics which move only towards better solutions but that may get stuck in local minima. Note that, in order to efficiently explore the solution space, the definition of neighborhood may change during the exploration; in this way it is possible to achieve an intensification or a diversification of the search in different solution regions. A special rule, the Tabu list, is introduced in order to prevent the algorithm from deterministically cycling among solutions already visited. The Tabu list stores the last accepted moves; while a move is stored in the Tabu list, it cannot be used to generate a new move. The choice of the Tabu List size is very important - too small a size may cause a periodic repetition of the same solutions, while too large a size may severely limit the number of applicable moves, thus preventing a good exploration of the solution space. B. TabuISIS: Tabu Search for link weight assignment The fundamental elements of the link weight assignment heuristic, TabuISIS, are described below: Precomputation Step. Before running the Tabu Search, we use an approximation to speed up the search procedure by reducing the size of the search space. Each solution in the search space consists of a set of routes for all

6 6 traffic demands. We therefore choose a criterion to filter out a subset of possible routes. This filtering is based on a hop-count threshold. Only routes with hop-counts less than the threshold are considered admissible and considered during the search procedure. This approximation is based on the intuition that Tabu Search will generally avoid very long routes that consume network resources unnecessarily. The choice of a hop-count threshold is based on the network topology under consideration. Choosing a small value for the threshold will eliminate most routes from consideration and may prevent Tabu Search from visiting the optimal solution. On the other hand, a large value of the threshold may result in a very large search space. The time taken to find the optimal solution grows exponentially with the size of the search space, thereby making the search procedure very slow. Thus the hop-count threshold allows Tabu Search to efficiently explore the search space with a reasonable computational overhead. The selection of hop-count threshold is discussed further in Section IV. Initial Solution. The choice of the initial solution is important since it can significantly affect the time taken by the search procedure to converge to the final solution. We set the initial weight of each link to be the inverse of the link capacity - a common recommendation of router vendors [3]. Moves and Neighborhood Generation. Each move corresponds to perturbing one or more of the weights in the current weight set. The first step in a move is to run Dijkstra s SPF algorithm for the current weight set, generate all minimum-cost routes and compute the traffic load for each link. We then identify two sets of links - links whose loads are within a small percentage of the maximum load (heavily loaded) and links whose loads are within a small percentage of the minimum load (lightly loaded). A link is selected at random from the heavily loaded set and its weight is increased (in order to divert traffic to other paths and reduce its load). Then, a link is selected at random from the lightly loaded link set and its weight is decreased. The goal is to attract traffic towards this link and potentially reduce the load on other, more heavily loaded, links. A new neighborhood is designed by repeating the above procedure. Evaluation of each solution. Every solution in the neigborhood is evaluated as follows. Minimum cost routes are computed using the SPF algorithm and the traffic load on each link is determined for a given traffic matrix. This evaluation is performed when there is no failure in the network and for each possible link failure. Then the objective function in equation (1) is computed. Diversification. This is needed to prevent the search procedure from indefinitely exploring a region of the solution space with only poor quality solutions. It is applied when there is no improvement in the solution after a certain number of iterations (each iteration consists of generating a new neighborhood and selecting the best solution in the neighborhood). The diversification is a modification of the move described earlier. In the case of a move, only one link each is chosen at random from the heavily loaded link set and the lightly loaded link set. For diversification, several links are picked from each set. The weights of the selected links from the heavily loaded set are increased while the weights of the selected links from the lightly loaded links are decreased. This diverts the search procedure to a different region of the solution space where it resumes the process of neigborhood

7 7 generation and solution evaluation. Tabu List. For TabuISIS, the Tabu list is used to remember the most recent moves made, consisting of the links whose weights have been changed and the increase/decrease applied to the link weight. Stop Criterion. The search procedure stops when a fixed pre-determined number of iterations is reached. The number of iterations is defined based on the size of the network in consideration, the computational time needed and the quality of solution desired. IV. RESULTS We analyze the performance of our link weight assignment heuristic using a computation-based approach. For this evaluation, we choose a network topology and a traffic matrix and compute link weights using TabuISIS. Based on these weights, the minimum-cost routes for all source-destination traffic demands are determined and the resulting load on every link is calculated. The objective function value for this heuristic solution is then compared against the lower bound obtained from the ILP model (presented in the appendix). The ILP is solved using the CPLEX software package [1]. A. Topology Fig. 3. PoP-level Sprint network The primary goal is to understand the benefits and/or tradeoffs, if any, of taking single-link failures into account when computing IS-IS link weights. For IP backbones, the failure of long-haul inter-pop links between cities is significantly more critical than link failures within a PoP, since every PoP has a highly meshed topology. Accordingly we consider a single representative topology based on the Sprint IP backbone, consisting of nodes (each corresponding to a PoP) and full-duplex links (Figure 3). Links are assigned integer weights in the range of 5 and 255, based on current practices in the Sprint network. We emphasize here that TabuISIS does not rely on the properties of any specific network topology and is therefore equally applicable to any topology or graph.

8 8 Number of Iterations Hop Count Threshold Maximum Link Load [%] Hop Count Threshold Fig. 4. Effect of hop-count threshold on number of iterations to reach final solution (left) and the maximum link load for the final solution reached (right). Both graphs are for the no-failure case ( ). B. Traffic Matrices The second input for the link weight selection problem is the traffic demands between origin-destination node pairs, represented by a traffic matrix. Unfortunately very little data exists on PoP-to-PoP traffic matrices for operational backbones. We therefore use synthetic traffic matrices for evaluating our heuristic. In this paper, results are presented for two different forms of traffic matrices: Gravity Model (GM). This form of the traffic matrix is based on the findings in [11] about the characteristics of PoP-to-PoP traffic matrices in Sprint s IP backbone. The volume of traffic from node * to node B is selected as follows: 1 6 E, G (2) 6 where 1 is the total volume of traffic originating at node *, given by 1 and $#!" is a uniform random variable between and. uniform(1,5) if! #"NE C C! uniform(8,13) if $#!"% E C! / C! uniform(2,3) if! #"NE C! / G 6 &% 6 is the share of traffic originating at node * that is destined to node B. The 6 is a random number picked according to a uniform distribution between and,!. The key idea is to create three kinds of traffic demands by volume [14]. The fan-out of traffic originating at a given PoP is then determined by equation (2) in accordance with the observations in [11]. Negative Exponential (NegExp). Each entry in the matrix is generated according to a negative exponential distribution with mean ' Mbps. This is one of the several other forms of traffic matrices that we evaluated in order to validate the generality of our results. We choose this type of traffic matrix for discussing our results because it closely approximates the distribution of traffic demands seen in the Sprint network [14].

9 9 1 Number of Admissible Routes (logscale) T=12 T=1 T=8 T=6 T= Origin-Destination Pair id Fig. 5. Number of admissible routes per origin-destination node pair for different values of hop-count threshold (T). C. Reducing the size of the search space for TabuISIS We begin our discussion of results by describing how we speed up TabuISIS by reducing the size of the search space. As mentioned in Section III, the search space is reduced in the precomputation step using a hop-count threshold. The choice of this threshold depends on the characteristics of the network topology. The hop-count threshold has to be larger than the longest minimum-hop path for any origin-destination pair across all network states ' 6 B E C G. Otherwise, there will be no admissible route between some origin-destination pair(s) in one or more network states. By counting the hop-counts for all routes in the Sprint network, we found this value to be ' ; hence the hop-count threshold has to be at least '. Figure 4 shows the tradeoff between computational overhead of TabuISIS and the quality of the solution for the Sprint network with different values of the hop-count threshold. Link weights are selected without considering failures (M ). We have verified that the behavior is similar for other values of M. The graph on the left shows the number of iterations needed by TabuISIS to reach the final solution. We observe that the number of iterations grows exponentially fast - from - for ' to for I-. This shows that the parameter is necessary for enabling TabuISIS to efficiently explore the search space with a reasonable computational overhead. The graph on the right of Figure 4 plots the maximum link load in network state ' ( for the link weight set chosen by TabuISIS. A very small value of the threshold eliminates most routes from consideration and forces TabuISIS to choose a solution with a high value of the maximum link load. For example the max-link load for the TabuISIS solution with ' is whereas it is only - when. This shows that choosing a very small value of the threshold degrades the quality of the solution found by TabuISIS. Figure 5 explains the above observations. It shows the number of admissible routes per origin-destination pair for different values of the threshold ( ). The number of admissible routes for each origin-destination pair is only around for ' and around for. This eliminates the best solutions from consideration by TabuISIS. For, this number increases ten-fold to about. Consequently the maximum link load for the final solution found

10 1 Link Load [%] 1 9 TabuISIS-NegExp 8 ILP-NegExp Links Link Load [%] 1 9 TabuISIS-GM 8 ILP-GM Links Fig. 6. Comparison of link loads for TabuISIS and the optimal ILP solution with for the NegExp traffic matrix (left) and GM traffic matrix (right). by TabuISIS reduces to -. For higher values of threshold, the number of admissible routes increases at a slower rate - from for to for I-. But at this point, the search space is so big that any further increase in its size causes the computation time of TabuISIS to grow exponentially. Based on these results, we pick the hop-count threshold to be for the Sprint network. D. Validation of TabuISIS We validate the quality of the TabuISIS solution by comparing it with the ILP model. For TabuISIS we find a set of link weights for the NegExp and GM traffic matrices, compute shortest path routes and the load on each link. For the ILP model, we generate the set of optimal routes and then compute the load on each link. Figure 6 shows the link loads for TabuISIS and the ILP model for both types of traffic matrices. TabuISIS link loads are shown as bars while the ILP solution link loads are shown as a dashed continuous line. Links are ranked on the x-axis by decreasing link loads under TabuISIS. These results were obtained with M, which corresponds to the traditional objective of minimizing maximum load in the absence of failures. For the NegExp traffic matrix, the maximum link load is for TabuISIS and - for the ILP solution - a difference of only. Moreover, the distribution of link loads in the two cases are similar. For the GM traffic matrix, both TabuISIS and the ILP model yields the same value for the maximum link load. This indicates that TabuISIS was able to find the optimal value of maximum link load achievable by any routing strategy (with respect to the given objective function). This case has a special significance which is discussed later. The distribution of link loads for TabuISIS and the ILP solution are also similar for the GM traffic matrix. Results for the no-failure case (M ) are shown for a specific reason. We will subsequently evaluate the benefits of considering link failures in weight selection by comparing against weight selection with M. Therefore, it is important to establish first that TabuISIS yields a solution of high quality for M. However, we have performed this comparison for all values of M in [,1] and found that the difference in the value of the objective function in equation 1 is less than in all cases.

11 11 15 Maximunm Link Load [%] no failure state worst failure state W Fig. 7. Variation in maximum link load with for two cases - no-failure and the worst-failure W= W=.8 End-to-End Delay [ms] Origin-Destination Pair id Fig. 8. End-to-end delays per origin-destination pair for link weights chosen with and. E. Considering link failures in weight selection Figure 7 shows the variation in maximum link load with M for the NegExp traffic matrix. The maximum link loads are shown for the no-failure state (solid line) and the worst-failure state (dotted line). A value of M corresponds to a set of weights picked without considering failures. M corresponds to selecting weights that optimize performance in the no-failure state but ignore the performance degradation during failures. On the other hand, M corresponds to optimizing performance in the worst-failure state while ignoring performance in the no-failure state. We find that when M is varied from to, the maximum link load in the no-failure state increases from to. On the other hand, the maximum link load in the no-failure case reduces from to. This indicates that that performance during failures can be significantly improved by considering failures in link weight selection. However, this is achieved at the cost of a small performance degradation in the no-failure state. The maximum link load in the worst-failure state stays the same between M C! and M. However, the maximum link load for the no-failure state increases slightly between M C! and M. Therefore M C! produces the optimal performance trade-off between the no-failure state and the worst-failure state for the Sprint network and the NegExp traffic matrix. However, the most suitable value of M depends on the combination of topology and traffic matrix. It is therefore important to do the above analysis instead of picking a random value in E C G or just using the boundary values. Service-level agreements between network operators and customers include bounds on the average end-to-end delay.

12 no failure state, W= maximum load, W= no failure state, W=.8 maximum load, W=.8 Link Load [%] 9 6 Link Load [%] Link id Link id for the Sprint network and NegExp traffic matrix. The solid bars show the loads in the absence of failures. The dashed bar for each link shows the maximum load on that link for any link failure. Fig. 9. Link loads for weights selected with and Fig. 1. Link weights selected with and Assigned Weights W= W= Link id for the NegExp traffic matrix. Therefore it is important to ensure that our approach of considering failures in weight selection does not degrade endto-end delays in the network. Figure 8 shows the end-to-end delay for each origin-destination node pair for two sets of link weights - one chosen without considering link failures (solid line) and the other chosen by considering link failures (dotted line). These delay values were computed using knowledge of link propagation delays in the Sprint network. We obsever that there are significant differences for a few O-D pairs, e.g., for O-D pair, the delay increases from ' milliseconds to - milliseconds when link failures are considered in weight selection. However, the overall difference is small: the mean and standard deviation are ' -/! - - msecs and - /! - selection, and ' -/! same in both cases ( msecs when failures are not considered in weight msecs and - /! - msecs when they are. Moreover, the maximum delay over all O-D pairs is the msec). We now examine more closely some of the changes in weight assignment and route selection for M and M C!. Figure 9 shows the distribution of link loads for weight sets selected with M and M C! for the NegExp traffic matrix. In each graph, the solid bars show the link load in the no-failure state. The dashed bar for each link shows the maximum load of this link for any single link failure. Link Ids on the x-axis correspond to the labels on links in Figure 3. The distribution of link loads in the no-failure state is very similar in both cases. The maximum load for any single failure reduces from for M to for M C! (as seen earlier in Figure 7). Moreover, the distribution of maximum link load for any single failure has less variation for M C!. To gain insights into why it helps to consider link failures in weight selection, we focus on some specific links. Figure 1 shows the link weights for M in solid bars, and M C! in dashed bars. Link - connecting nodes

13 no failure state, W= maximum load, W= no failure state, W=1 maximum load, W=1 Link Load [%] 9 6 Link Load [%] Link id Link id for the modified Sprint network and GM traffic matrix. The solid bars show the loads in the absence of failures. The dashed bar for each link shows the maximum load on that link for any link failure. Fig. 11. Link loads for weights selected with and and (Figure 3) and link - connecting nodes and ' are assigned very large weights for both M and M C!. These links are the only ones connecting node to the rest of the network. When one fails, the other has to absorb all the load exchanged between node and the rest of the network. For M, TabuISIS does not consider this failover scenario when selecting weights. But it assigns large weights to these links in order to ensure that transit traffic (i.e., traffic not destined to node ) is diverted away from these links. With M C!, TabuISIS actually considers the failover scenario and tries to increase the weights even further to mitigate overload in the event of failure of either link - or -. The link that carries the maximum load for any single-link failure is link - connecting nodes and. This maximum load is caused by the failure of link which connects nodes and. Node is connected to the rest of the network via three links - link to node, link - to node and link to node -. For M, TabuISIS assigns weights, and - respectively to links, - and. In the absence of failures, the loads on these links are well-balanced -, and ' respectively. However, when link link fails, traffic between node and of the other nodes fail over to link - resulting in a load of. When TabuISIS considers link failures (M C! ), it actually plans ahead for the possible failure of link - and assigns weights -, - and to links, - and respectively. When link fails, traffic between node and of the other network nodes fails over to link -, while the traffic between node and the rest of the nodes fails over to link. This balances the failover traffic on the two alternate paths and reduces the impact of failure on any single link. F. Topology limitations As mentioned in the last section, links - and - in Figure 3 are node s only connections to the rest of the network. When one fails, the other must absorb all of the fail-over traffic. This is a topology limitation that affects any route selection strategy. We examine a specific instance of this problem for TabuISIS and the Sprint network. In Figure 6, we found that the maximum link load for TabuISIS and the optimal ILP solution was the same for M in case of the GM traffic matrix. Therefore there was no reduction in maximum link load with M. The maximum link load for any failure corresponds to the failure of link - connecting nodes and '. When M TabuISIS would attempt to address this problem by balancing the fail-over traffic over several alternate paths. It is,

14 14 Assigned Weights W= W= Link id Fig. 12. Link weights selected with and for the GM traffic matrix. impossible to do so for this specific case since there is only link to carry this traffic. A likely solution to this topology limitation is to add a third link between node and the rest of the network. Suppose that a link is now added between nodes and in the Sprint network. Figure 11 shows the distribution of link loads for this modified topology and the GM traffic matrix for two sets of link weights computed by considering failures (M ) and ignoring failures (M ). The solid bars show link loads in the absence of failure and the dotted bar for each link shows the maximum load on that link for any single link failure. Since, there are two alternate links in the event that link - fails, TabuISIS is able to select weights that balances the failover traffic between these two paths. Consequently, the maximum link load over all links is lower for M than for M. The problem of overload due to failover traffic actually shifts away from node to links - / C and -. When M, TabuISIS assigns much larger weights to these links (Figure 12) in order to achieve a better balancing of fail-over traffic in case of a failure. The above analysis shows that the TabuISIS heuristic is useful in improving capacity planning and traffic engineering in a network. It can help in identifying where new links or link capacity upgrades are needed. Alternatively, a network operator may be able alleviate the overload problem by modifying BGP [4] policies that govern how traffic enters and leaves the network from peer networks. In the above example, if the large traffic volume between node and the rest of the network was due in part to a large external peer that is multi-homed to the Sprint network, then an operator can engineer the peer s traffic to enter the network through some other node. That will reduce the amount of traffic that fails over to link - when link - fails. V. RELATED WORK Despite the obvious importance of the IS-IS weight selection problem, a formal approach to the problem has been undertaken only recently. The first work to address this problem was done in [1] which show that the problem of finding optimal IS-IS link weights is NP-hard with respect to many objectives. [1] proposes a local search heuristic to find weights for two objective functions. The first objective function is to minimize the maximum utilization across all links and the second one is to minimize a cost function that assigns every link a cost depending on the utilization of this link. They show

15 15 for both objective functions that their heuristic can computes weight sets that lead to solutions within a few percent of a theoretical lower bound. This bound is computed using linear programming much in the same way as we have done in this paper. Some other authors have evaluated the use of other methods from operations research for the link weight assignment problem. [2] and [6] implement heuristics based on local search, simulated annealing, Lagrangean Relaxation, and evolutionary algorithms. Furthermore, they propose a new method that uses a combination of simulated allocation and linear programming. This method is not guaranteed to find a weight set for every problem instance, but is also shown to work in of the cases. The authors find that in terms of the number of overloaded links and the degree of overload all methods perform similarly well. For larger topologies the new combined method is much faster than any of the other methods. [12] proposes the use of duality in linear programming to compute link weights. However, their method is limited to the case where unequal splitting is feasible. Neither OSPF nor IS-IS currently support unequal splitting, but only even splitting on equal cost paths. All the above methods view the link weight assignment problem as a static problem ignoring the case of link failures. [5] is the first work that looks at the problem of assigning link weights in the context of traffic matrix changes and link failures. [5] is mainly concerned with computing link weights that is robust to predicted periodic changes in the traffic demands. Instead of a single demand matrix, their heuristic picks weights based on several demand matrices, each of which represents the traffic pattern during a different time of the day. They show that it is possible to find a weight setting covering demand matrices dominated by convex combinations of the given matrices. They also briefly address the issue of link failure. They conclude that there are only a few links whose failure has a significant impact on the network. They show that changing even a single link weight in the event of a link failure can sometimes yield substantial performance improvements. However, changing link weights is an impractical solution for the isolated transient failures addressed in this paper. Another paper by the same author [13] addresses the problem of how to precompute backup routes around failures after a failure has been detected. This problem is unrelated to the problem we address in this paper. VI. CONCLUSIONS AND NEW DIRECTIONS We have examined the problem of link weight assignment for short isolated link failures, and proposed a novel Tabu Search Heuristic that takes into account such failures. To the best of our knowledge this is the first work to consider transient link failures for link weight selection. The approach is likely to be attractive to IP backbone operators who encounter short link failures on a daily basis. The proposed heuristic finds a single weight set that performs well in the absence of failures but prevents severe link overloads during failures. Results indicate that the heuristic finds a solution that is within of the optimal lower bound. The maximum load on a link during any single-link failure can be reduced by as much as over an approach

16 16 that does not consider failures in weight selection. This improvement comes at the cost of a small performance degradation ( ) in the absence of failures. This paper opens up a new avenue for studying the link weight assignment problem and the interaction of routing with link failures. Both the heuristic and the ILP model presented here are based on the notion of network states where each state corresponds to either no failure or a single link failures. Therefore this notion can be easily extended to the case of multiple link failures. For example, a network may have critical groups of links which are likely to fail together because they share common optical fiber conduits. In that case, each network state corresponds to the failure of a critical group. The heuristic as well as the ILP model can be applied to such multiple link failure scenarios with relatively straightforward extensions. In addition, work remains to be done on how errors in the input traffic matrix may affect link weight selection, and how often link weights have to be updated to track changes in the traffic matrix. REFERENCES [1] B. Fortz and M. Thorup. Internet Traffic Engineering by Optimizing OSPF Weights, Proceedings of IEEE Infocom, Tel-Aviv, Israel, March 2. [2] M. Pioro, A. Szentesi, J. Harmatos, A. Juttner, P. Gajowniczek and S. Kozdrowski. On OSPF Related Network Optimisation Problems, Proceedings of IFIP ATM IP, Ilkley UK, July 2. [3] D. Oran (Editor). OSI IS-IS Intradomain Routing Protocol, IETF Request For Comments [4] S. Halabi. Internet Routing Architectures, 2nd Edition, Cisco Press, 21. [5] B. Fortz and M. Thorup. Optimizing OSPF/IS-IS Weights in a Changing World, IEEE JSAC Special Issue on Advances in Fundamentals of Network Engineering, 21. [6] J. Harmatos. A heuristic algorithm for solving the static weight assignment optimisation problem in OSPF networks, Proceedings of Global Internet Conference, Dallas USA, Nov 21. [7] G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya and C. Diot. Analysis of Link Failures in a Large IP Backbone, Proceedings of 2nd ACM Sigcomm Internet Measurement Workshop (IMW), San Francisco USA, November 22. [8] F. Glover and M. Laguna. Tabu Search, Kluwer Academic Publishers. [9] M. Krunz, B. Zhang and C. Chen. Stateless QOS Routing in IP Networks, Proceedings of Global Internet Workshop Dallas USA, November 21. [1] [11] A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya and C. Diot. Traffic Matrix Estimation: Comparisons and New Directions, Proceedings of ACM SIGCOMM Pittsburgh USA, August 22.

17 17 [12] Y. Wang, Zheng Wang and L. Zhang. Internet Traffic Engineering without Full Mesh Overlaying, Proceedings of IEEE Infocom, Anchorage USA, April 21. [13] B. Fortz and M. Thorup. Fortifying OSPF/IS-IS against link failures Technical Report available from mthorup/papers/papers.html. [14] S. Bhattacharyya, N. Taft, J. Jetcheva and C. Diot. POP-level and Access-link-level Traffic Dynamics in a Tier-1 POP, Proceedings of 1st ACM Sigcomm Internet Measurement Workshop (IMW), San Francisco USA, November 21. [15] K. Papagiannaki and C. Diot. Analyzing Link Utilizations at Small Timescales, Sprint ATL Technical Report TR3-ATL-19, January 23. APPENDIX We formulate the general routing problem with single-link failures as an Integer Linear Programming (ILP) problem. The goal is to derive a lower bound on the value of the objective function used for TabuISIS (equation 1). The IS-IS link weight selection problem is NP-Hard [1]. Hence it is computationally intractable to obtain the optimal solution. On the other hand, the general routing problem is computationally tractable. We therefore model the general routing problem to obtain a lower bound on the performance of TabuISIS. Unlike the link weight selection problem, the general routing problem directly selects routes between node pairs, instead of doing it indirectly via link weights. Also route selection is not restricted to minimum cost routes based on link weights. Instead, traffic can be arbitrarily routed along several paths between two nodes, and split in arbitrary ratios across these paths. Therefore an optimal solution to the general routing problem yields a lower bound on the objective function value for the link weight selection problem. A. Notation We aggregate all the traffic between a given origin-destination (O-D) node pair in the network into a single traffic demand. Let 8 1 be the set of all O-D pairs whose cardinality is described by and 8 1 be the set of bidirectional links belonging to the network topology whose cardinality is represented by F. The traffic demand associated with O-D pair is represented by. Let be the set of all the network states, whose cardinality is described by ' Q : )( represents the no failure case while 26 with B represents the failure case when the link 6 is broken. Let 5' 6 1 5' 6 be the set of all the feasible routes for the O-D pair in the network

18 state :6. A route in a failure network state ' is defined as feasible if it does not use the broken link. Let be the binary parameter that is equal to 1 if the * = route associated with O-D pair in the network state '<6, i.e. 1 5' 68, uses the link and otherwise. Let 1 5'2(?'76 be a binary parameter that is equal to 1 if 1 5'<(8 is equal to 5' 68 and otherwise. Note that when a link fails, we do not consider alternate routes for traffic demands that do not traverse the failed link. The rationale for this is as follows. The approach of this work is to find a single set of link weights for all network states. When a link fails, the link state protocol determines a set of alternate minimum cost routes for only the traffic demands that were being routed over the failed link. All other routes are left unchanged. We adopt the same approach in the formulation of the general routing problem in order to obtain a fair basis for evaluating TabuISIS. 18 B. Decision Variables Let 1 5'76 C represent the set of variables used to define which routes are selected by origin-destination (O-D) pair in network state ' 6. The variable 1 5' 6 is equal to 1 if the O-D pair uses the * = route in network state ' 6 ( 1 5' 6 ) and otherwise. Let 1 5' 68 9 be the fraction of traffic associated with O-D pair that is sent to the * = route in the network state ':6. The variables 5' 6 9 represent the aggregated load carried by link in network state ' 6. Let 1 5'768 C describe the feasibility of each route 1 5'<(I in each network state ' 6 ; 1 5' 68 is equal to 1 if O-D pair uses route 1 5'<(I and this route uses the broken link 6. When a link fails, all O-D pairs going over the link must be rerouted. Several feasible routes can be used to reroute this traffic. For route 1 5'<(8, let 1 5' 6 9 be the traffic associated with O-D pair that is routed over failed link 6. In other words, 1 5' 6 is equal to 1 5' ( if 1 5' 68 % and otherwise. Finally let 34 5':6 9 be the maximum link load in network state 'T6, while 34 5'<; = be the maximum link load over all the network states, i.e.34 5'); = 6 ( $ is denoted by '2; =. 34 5' 6. The corresponding network state C. Constraints Constraints associated with the maximum link load in each network state '&6 : 34 5' 6 9 5' A@< (3)

19 ' ; = ' 6 (4) where constraint (3) define the maximum link load in each network state '?6, while constraint (4) define the maximum link load over all network states. The variable 5'<(8 describes the aggregated traffic flowing on the link in the no failure state '( : 5'<(I H 1 1 5'<(8 (5) Constraints associated with routes used in ' ( and their associated traffic: 1 5'2(" (6) 1 1 5'<(I R 1 A@:*4 5'2(" (7) 1 (8) 1 where constraint (6) ensures that each O-D pair in ')( has to select at least one route to send its own traffic, while constraints (7) restricts the amount of traffic carried by each route. If 1 5'<(I, the total amount of traffic for O-D pair 1 on this route is restricted by ; if 1 5'<(8 then no part of the traffic for O-D pair 1 is sent over this route. The total amount of traffic associated with each O-D pair has to be sent using one or more routes (8). Constraints associated with routes affected by the failure of link B+ E, HG : 1 5' 6 1 5'2(" 1#( A@:* 5'<(8 A@< 6 A@2'76 L &( (9) 1 5' 6 9>- 1 5'<(8 1#( 6 A@:* 5'2(8 A@T 6 A@&' 6 L &( (1) where constraints (9,1) detect which routes used in ' ( are involved in the failure of link 6. Note that if O-D pair uses the route 1 5'<(8 and the link 6 belongs to 1 5'<(8 1 ( ( ( 1 5' 6 ). The traffic flowing on this route has to be rerouted using other feasible routes. 6 ), the route is not feasible for state 'T6

Traffic Engineering System Based on Adaptive Multipath Routing

Traffic Engineering System Based on Adaptive Multipath Routing Traffic Engineering System Based on Adaptive Multipath Routing Karthiga. S 1, Balamurugan. M. S 2 1 PG Scholar & Sri Shakthi Institute of Engineering and Technology, Chinniampalayam, Coimbatore-641062,

More information

Making IGP Routing Robust to Link Failures

Making IGP Routing Robust to Link Failures Making IGP Routing Robust to Link Failures Ashwin Sridharan and Roch Guérin ashwin@sprintlabs.com, Sprint ATL, 1 Adrian Court, Burlingame CA 94010. Tel/Fax: 650-375-4118/4079 guerin@ee.upenn.edu, University

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

Making IGP Routing Robust to Link Failures

Making IGP Routing Robust to Link Failures University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 2005 Making IGP Routing Robust to Link Failures Ashwin Sridharan Sprint Advanced

More information

Network Protection Design for MPLS Networks

Network Protection Design for MPLS Networks Network Protection Design for MPLS Networks Gaurav Agrawal, Dijiang Huang, Deep Medhi Computer Science and Electrical Engineering Department University of Missouri-Kansas City, MO 64110, USA Computer Science

More information

OSPF with Deterministic Routing

OSPF with Deterministic Routing OSPF with Deterministic Routing Sachin Bojewar Associate Professor, Vidyalankar Institute of Technology, Wadala, Mumbai, India Dnyaneshwar Dhangar Vidyalankar Institute of Technology, Wadala, Mumbai, India

More information

Design of IGP Link Weight Changes for Estimation of Traffic Matrices

Design of IGP Link Weight Changes for Estimation of Traffic Matrices Design of IGP Link Weight Changes for Estimation of Traffic Matrices Antonio Nucci, Rene Cruz, Nina Taft, Christophe Diot Sprint Advanced Technology Laboratories, Burlingame, CA, USA University of California

More information

Towards Decentralized and Adaptive Network Resource Management

Towards Decentralized and Adaptive Network Resource Management Towards Decentralized and Adaptive Network Resource Management D.Tuncer, M.Charalambides, G.Pavlou Department of Electronic & Electrical Engineering University College London London, UK N.Wang Centre for

More information

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering Hema T. Kaur, Shivkumar Kalyanaraman ECSE Department, Rensselaer Polytechnic Institute, Troy, NY-12180 {hema,shivkuma}@networks.ecse.rpi.edu

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

Optimising OSPF Routing for Link Failure Scenarios

Optimising OSPF Routing for Link Failure Scenarios Optimising OSPF Routing for Link Failure Scenarios Sadiq M. Sait, Mohammed H. Sqalli, Syed Asadullah Computer Engineering Department King Fahd University of Petroleum & Minerals Dhahran 31261, Saudi Arabia

More information

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali

More information

Deterministic Routing in OSPF for Post Single Link Failure

Deterministic Routing in OSPF for Post Single Link Failure Deterministic Routing in OSPF for Post Single Link Failure Dnyaneshwar Dhangar 1, Sachin Bojewar 2 1 (Information Technology/ Mumbai, India) 1 (Information Technology/ Mumbai, India) ABSTRACT : In the

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

International Journal of Advance Engineering and Research Development. Simulation Based Improvement Study of Overprovisioned IP Backbone Network

International Journal of Advance Engineering and Research Development. Simulation Based Improvement Study of Overprovisioned IP Backbone Network Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 8, August -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Simulation

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Adaptive Multi-topology IGP Based Traffic Engineering with Near-Optimal Network Performance

Adaptive Multi-topology IGP Based Traffic Engineering with Near-Optimal Network Performance Adaptive Multi-topology IGP Based Traffic Engineering with Near-Optimal Network Performance Ning Wang, Kin-Hon Ho, and George Pavlou Center for Communication Systems Research, University of Surrey Guildford,

More information

Network Performance Analysis of an Adaptive OSPF Routing Strategy Effective Bandwidth Estimation

Network Performance Analysis of an Adaptive OSPF Routing Strategy Effective Bandwidth Estimation International Telecommunication Symposium ITS 22, Natal, Brazil Network Performance Analysis of an Adaptive OSPF Routing Strategy Effective Bandwidth Estimation Tatiana B. Pereira and Lee L. Ling UNICAMP,

More information

Comprehensive Solution for Anomaly-free BGP

Comprehensive Solution for Anomaly-free BGP Comprehensive Solution for Anomaly-free BGP Ravi Musunuri, Jorge A. Cobb Department of Computer Science, The University of Texas at Dallas, Richardson, TX-7083-0688 musunuri, cobb @utdallas.edu Abstract.

More information

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times On the Impact of Route Processing and MRAI Timers on BGP Convergence Times Shivani Deshpande and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY 12180 Abstract Fast convergence

More information

Optimal Network Flow Allocation. EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004

Optimal Network Flow Allocation. EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004 Optimal Network Flow Allocation EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004 Problem Statement Optimal network flow allocation Find flow allocation which minimizes certain performance criterion

More information

On the Optimality of Link-State Routing Protocols

On the Optimality of Link-State Routing Protocols On the Optimality of Link-State Routing Protocols Dahai Xu, Ph.D. Florham Park AT&T Labs - Research Joint work with Mung Chiang and Jennifer Rexford (Princeton University) New Mathematical Frontiers in

More information

Quality of Service Routing

Quality of Service Routing Quality of Service Routing KNOM Tutorial 2004, Jeju, Korea, Nov. 4-5, 2004. November 5, 2004 Kwang-Hui Lee Communication Systems Lab, Changwon National University khlee@changwon.ac.kr Contents Introduction

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

BGP Routing inside an AS

BGP Routing inside an AS Hot Potatoes Heat Up BGP Routing Renata Teixeira (UC San Diego) http://www-cse.ucsd.edu/~teixeira with Aman Shaikh (AT&T), Tim Griffin(Intel), and Jennifer Rexford(AT&T) 30 th NANOG Miami, Florida BGP

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

TRAFFIC engineering has become an important issue in

TRAFFIC engineering has become an important issue in 1136 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 Routing Optimization in IP Networks Utilizing Additive and Concave Link Metrics Anton Riedl, Member, IEEE, and Dominic A. Schupke,

More information

Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes

Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes Yu Guo, Ning Wang, Kin-Hon Ho, Michael Howarth, and George Pavlou 2 Centre for Communication Systems Research, University

More information

On the Sensitivity of Transit ASes to Internal Failures

On the Sensitivity of Transit ASes to Internal Failures On the Sensitivity of Transit ASes to Internal Failures Steve Uhlig Department of Computing Science and Engineering Université catholique de Louvain, Louvain-la-neuve, B-1348, Belgium suh@info.ucl.ac.be

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation Muhammad S. Javed, Krishnaiyan Thulasiraman, Matthew A. Gaines School of Computer Science, University

More information

Precomputation Schemes for QoS Routing

Precomputation Schemes for QoS Routing 578 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 4, AUGUST 2003 Precomputation Schemes for QoS Routing Ariel Orda, Senior Member, IEEE, and Alexander Sprintson, Student Member, IEEE Abstract Precomputation-based

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modelling Yong Liu 09/19/2006 1 Outline Examples Basic Problems Routing Restriction 2 1 Example: Intra-Domain Traffic Engineering

More information

An Experimental Analysis on OSPF-TE Convergence Time

An Experimental Analysis on OSPF-TE Convergence Time An Experimental Analysis on OSPF-TE Convergence Time S. Huang* a, K. Kitayama a, F. Cugini b, F. Paolucci c, A. Giorgetti c, L. Valcarenghi c, P. Castoldi c a Osaka University, Osaka, Japan; b CNIT, Pisa,

More information

Advanced Topics UNIT 2 PERFORMANCE EVALUATIONS

Advanced Topics UNIT 2 PERFORMANCE EVALUATIONS Advanced Topics UNIT 2 PERFORMANCE EVALUATIONS Structure Page Nos. 2.0 Introduction 4 2. Objectives 5 2.2 Metrics for Performance Evaluation 5 2.2. Running Time 2.2.2 Speed Up 2.2.3 Efficiency 2.3 Factors

More information

Inter Domain QoS Routing using VS scheme

Inter Domain QoS Routing using VS scheme Inter Domain QoS Routing using VS scheme Bikramjit Walia and Girish P. Saraph, Member IEEE Department of Electrical Engineering, IIT Bombay, Powai, Mumbai-76, India Abstract Many real-time multimedia and

More information

Heuristics for the MPLS Network Design with Single Path Minimum Weight Routing

Heuristics for the MPLS Network Design with Single Path Minimum Weight Routing Heuristics for the MPLS Network Design with Single Path Minimum Weight Routing Carlos Lopes, Amaro de Sousa Institute of Telecommunications, University of Aveiro 3810-193 Aveiro, Portugal clopes@av.it.pt,

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications

Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications 2566 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 12, DECEMBER 2000 Minimum Interference Routing of Bandwidth Guaranteed Tunnels with MPLS Traffic Engineering Applications Koushik Kar,

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Chapter 7: Routing Dynamically. Routing & Switching

Chapter 7: Routing Dynamically. Routing & Switching Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based

More information

State of routing research

State of routing research State of routing research Olivier Bonaventure with Pierre François, Bruno Quoitin and Steve Uhlig Dept. Computing Science and Engineering Université catholique de Louvain (UCL) http://www.info.ucl.ac.be/people/obo

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

The Global-ISP Paradigm

The Global-ISP Paradigm The Global-ISP Paradigm Reuven Cohen Amnon Shochot Department of Computer Science Technion, Israel July 26, 2006 Abstract We present a new paradigm, called Global ISP (G-ISP). Its goal is to solve, or

More information

Module 8. Routing. Version 2 ECE, IIT Kharagpur

Module 8. Routing. Version 2 ECE, IIT Kharagpur Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and

More information

Routing Protocols. Technology Description BGP CHAPTER

Routing Protocols. Technology Description BGP CHAPTER CHAPTER 11 This chapter describes the level of support that Cisco ANA provides for routing protocols, as follows: Technology Description, page 11-1 Information Model Objects (IMOs), page 11-3 Vendor-Specific

More information

Hot Potatoes Heat Up BGP Routing

Hot Potatoes Heat Up BGP Routing Hot Potatoes Heat Up BGP Routing Renata Teixeira Laboratoire d Informatique de Paris 6 Université Pierre et Marie Curie Amsterdam Internet Routing Architecture Verio AT&T AOL Web Server UCSD Sprint User

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

Modeling the Routing of an ISP with C-BGP

Modeling the Routing of an ISP with C-BGP Modeling the Routing of an ISP with C-BGP Bruno Quoitin bruno.quoitin@uclouvain.be IP Networking Lab (INL) Computer Science & Engineering Department Université catholique de Louvain, Belgium 2009 B. Quoitin

More information

MODERN communication networks are constructed

MODERN communication networks are constructed 1000 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 4, AUGUST 2011 Cross-Layer Survivability in WDM-Based Networks Kayi Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, and Hyang-Won Lee, Member,

More information

A TABUSEARCH IMPLEMENTATION TO SOLVE THE LOGICAL TOPOLOGY DESIGN PROBLEM FOR LOW CONGESTION REQUIREMENTS

A TABUSEARCH IMPLEMENTATION TO SOLVE THE LOGICAL TOPOLOGY DESIGN PROBLEM FOR LOW CONGESTION REQUIREMENTS Master in Optical Communications and Photonic Technologies A TABUSEARCH IMPLEMENTATION TO SOLVE THE LOGICAL TOPOLOGY DESIGN PROBLEM FOR LOW CONGESTION REQUIREMENTS Optical Networks Prof. Marco Mellia Assigned

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

BW Protection. 2002, Cisco Systems, Inc. All rights reserved.

BW Protection. 2002, Cisco Systems, Inc. All rights reserved. BW Protection 2002, Cisco Systems, Inc. All rights reserved. 1 Cisco MPLS - Traffic Engineering for VPNs Amrit Hanspal Sr. Product Manager MPLS & QoS Internet Technologies Division 2 Agenda MPLS Fundamentals

More information

GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks

GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks IEEE International Conference on Ad hoc and Sensor Systems 19-22 October 2015, Dallas, USA GC-HDCN: A Novel Wireless Resource Allocation Algorithm in Hybrid Data Center Networks Boutheina Dab Ilhem Fajjari,

More information

OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES

OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING SCHEMES th GI/ITG CONFERENCE ON MEASURING, MODELLING AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS 3rd POLISH-GERMAN TELETRAFFIC SYMPOSIUM OPTIMIZATION OF IP NETWORKS IN VARIOUS HYBRID IGP/MPLS ROUTING

More information

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011 Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

THE Internet is an interconnection of separately administered

THE Internet is an interconnection of separately administered SPRINT ATL RESEARCH REPORT RR3-ATL-51677 - MAY 23 1 A Study of the Impact of BGP Dynamics on Intra-Domain Sharad Agarwal Chen-Nee Chuah Supratik Bhattacharyya Christophe Diot CS Division, ECE Department,

More information

Lecture 4 Wide Area Networks - Routing

Lecture 4 Wide Area Networks - Routing DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Routing Mei Yang Based on Lecture slides by William Stallings 1 ROUTING IN PACKET SWITCHED NETWORK key design issue for (packet) switched

More information

2007 IST Press. Reprinted with permission.

2007 IST Press. Reprinted with permission. . 2007. Robust load balancing in wireless networks. In Proceedings of the EuroFGI Workshop on IP QoS and Traffic Control, Lisbon, Portugal, 6 7 December 2007, pages 127 134. 2007 IST Press Reprinted with

More information

Deploying MPLS & DiffServ

Deploying MPLS & DiffServ Deploying MPLS & DiffServ Thomas Telkamp Director, Data Architecture & Technology Global Crossing Telecommunications, Inc. telkamp@gblx.net MPLS and DiffServ technologies are getting a lot of attention

More information

Resilient IP Backbones. Debanjan Saha Tellium, Inc.

Resilient IP Backbones. Debanjan Saha Tellium, Inc. Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research

More information

MODIFIED DIJKSTRA'S ALGORITHM WITH CROSS-LAYER QOS

MODIFIED DIJKSTRA'S ALGORITHM WITH CROSS-LAYER QOS MODIFIED DIJKSTRA'S ALGORITHM WITH CROSS-LAYER QOS Andrei B. RUS Virgil DOBROTA Adrian VEDINAS Georgeta BOANEA Melinda BARABAS Technical University of Cluj-Napoca, Communications Department, 26-28 George

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

Achieving Near-Optimal Traffic Engineering Solutions for Current OSPF/IS-IS Networks

Achieving Near-Optimal Traffic Engineering Solutions for Current OSPF/IS-IS Networks University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering March 23 Achieving Near-Optimal Traffic Engineering Solutions for Current OSPF/IS-IS

More information

BGP Routing: A study at Large Time Scale

BGP Routing: A study at Large Time Scale BGP Routing: A study at Large Time Scale Georgos Siganos U.C. Riverside Dept. of Comp. Science siganos@cs.ucr.edu Michalis Faloutsos U.C. Riverside Dept. of Comp. Science michalis@cs.ucr.edu Abstract In

More information

Optimization Techniques for Design Space Exploration

Optimization Techniques for Design Space Exploration 0-0-7 Optimization Techniques for Design Space Exploration Zebo Peng Embedded Systems Laboratory (ESLAB) Linköping University Outline Optimization problems in ERT system design Heuristic techniques Simulated

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh,

More information

A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL

A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL A FRAMEWORK FOR PERFORMANCE CHARACTERIZATION AND ENHANCEMENT OF THE OSPF ROUTING PROTOCOL H. El-Sayed, M. Ahmed, M. Jaseemuddin, D. Petriu UAE University, Al-Ain P.O.Box, UAE, helsayed@uaeu.ac.ae, CIENA

More information

CSCD 433/533 Advanced Networks Spring 2016

CSCD 433/533 Advanced Networks Spring 2016 CSCD 433/533 Advanced Networks Spring 2016 Lecture 13 Router Algorithms and Design Chapter 5 1 Topics Router Algorithms Routing in General Hierarchical routing Interior Gateway Protocols OSPF mention of

More information

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks 336 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks Vincent W. S. Wong, Member, IEEE, Mark E. Lewis,

More information

Simple Quality-of-Service Path First Protocol and Modeling Analysis*

Simple Quality-of-Service Path First Protocol and Modeling Analysis* Simple Quality-of-Service Path First Protocol and Modeling Analysis* Lin Shen, Mingwei Xu, Ke Xu, Yong Cui, Youjian Zhao Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084

More information

Maximizable Routing Metrics

Maximizable Routing Metrics Maximizable Routing Metrics Mohamed G. Gouda Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, USA gouda@cs.utexas.edu Marco Schneider SBC Technology Resources

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Algorithms for Provisioning Virtual Private Networks in the Hose Model

Algorithms for Provisioning Virtual Private Networks in the Hose Model IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 4, AUGUST 2002 565 Algorithms for Provisioning Virtual Private Networks in the Hose Model Amit Kumar, Rajeev Rastogi, Avi Silberschatz, Fellow, IEEE, and

More information

QoS Routing Extensions to OSPF

QoS Routing Extensions to OSPF QoS Routing Extensions to OSPF Jani Lakkakorpi jani.lakkakorpi@nokia.com Abstract This paper briefly describes the extensions suggested to the OSPF [1] protocol to support QoS routes. These extensions

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Kang Xi and H. Jonathan Chao April 00 New York State CENTER FOR ADVANCED TECHNOLOGY IN TELECOMMUNICATIONS Supported by the New

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

Guidelines for Interdomain Traffic Engineering

Guidelines for Interdomain Traffic Engineering Guidelines for Interdomain Traffic Engineering Nick Feamster Jay Borkenhagen Jennifer Rexford Laboratory for Computer Science AT&T IP Services Internet and Networking Systems Massachusetts Institute of

More information

Why dynamic route? (1)

Why dynamic route? (1) Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update

More information

Basic Concepts And Future Directions Of Road Network Reliability Analysis

Basic Concepts And Future Directions Of Road Network Reliability Analysis Journal of Advanced Transportarion, Vol. 33, No. 2, pp. 12.5-134 Basic Concepts And Future Directions Of Road Network Reliability Analysis Yasunori Iida Background The stability of road networks has become

More information

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering

Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering Classification and Evaluation of Constraint-Based Routing Algorithms for MPLS Traffic Engineering GET/ENST Bretagne - Département Réseaux et Services Multimédia 2 rue de la Châtaigneraie - CS 1767-35576

More information

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical

More information