国产日韩欧美一区二区三区三州_亚洲少妇熟女av_久久久久亚洲av国产精品_波多野结衣网站一区二区_亚洲欧美色片在线91_国产亚洲精品精品国产优播av_日本一区二区三区波多野结衣 _久久国产av不卡

?

Efficient Routing Protection Algorithm in Large-Scale Networks

2021-12-15 12:47:44HaijunGengHanZhangandYangyangZhang
Computers Materials&Continua 2021年2期

Haijun Geng,Han Zhang and Yangyang Zhang

1School of Software Engineering, Shanxi University, Taiyuan,030006,China

22Institute of Big Data Science and Industry, Shanxi University, Taiyuan, 030006,China

3School of Cyber Space and Technology, Beihang University, Beijing, 100191,China

4College of Engineering Northeastern University, Boston,02115, USA

Abstract: With an increasing urgent demand for fast recovery routing mechanisms in large-scale networks, minimizing network disruption caused by network failure has become critical.However, a large number of relevant studies have shown that network failures occur on the Internet inevitably and frequently.The current routing protocols deployed on the Internet adopt the reconvergence mechanism to cope with network failures.During the reconvergence process,the packets may be lost because of inconsistent routing information, which reduces the network’s availability greatly and affects the Internet service provider’s (ISP’s) service quality and reputation seriously.Therefore, improving network availability has become an urgent problem.As such, the Internet Engineering Task Force suggests the use of downstream path criterion (DC) to address all single-link failure scenarios.However, existing methods for implementing DC schemes are time consuming, require a large amount of router CPU resources,and may deteriorate router capability.Thus,the computation overhead introduced by existing DC schemes is significant, especially in large-scale networks.Therefore,this study proposes an efficient intra-domain routing protection algorithm(ERPA)in large-scale networks.Theoretical analysis indicates that the time complexity of ERPA is less than that of constructing a shortest path tree.Experimental results show that ERPA can reduce the computation overhead significantly compared with the existing algorithms while offering the same network availability as DC.

Keywords:Large-scale network; shortest path tree; time complexity; network failure;real-time and mission-critical applications

1 Introduction

In recent years,the Internet has become a widely used platform for various network applications.With the rapid development of the Internet,several real-time and mission-critical applications,such as VoIP and video and online games, are deployed [1].These applications are susceptible to network delay and interruption, which stress strict requirements on network availability [2].Moreover, even a few seconds of network discontinuity would have an adverse effect on these applications[3].However,network failures are common on the Internet.The IP networks need to reconverge when network failure occurs.The convergence time for the currently deployed intra-domain routing protocol is the order of seconds when network components are invalid.During this period, several packets may be dropped because of the inconsistent routing information [4].The Internet service provider (ISP) has strong motivations to enhance the network survivability when network failures occur [5].Therefore, improving the Internet routing availability has become an urgent problem that needs to be solved.

To improve the availability of intra-domain routing,the routing protection scheme is usually applied in the academia and industry[6].The routing protection aims to prove fast convergence when network failures have been detected [7].Existing routing protection schemes can be divided into two sub-categories depending on whether or not special cooperation between routers is required for packet forwarding.Cooperation-free schemes compute multiple next-hops for each destination, and each router selects an appropriate next-hop for standard packet forwarding independently, where care must be taken such that the induced forwarding paths are loop-free.The benefit is that they can provide not only redundant backup links but also other features, such as load balancing and high throughput.The other sub-category of schemes computes for a link to protect a multihop repair path that is agreed by all routers on that path.Thus,special cooperation mechanisms have to be used to reroute packets along that path.

In this work,we focus on the first type of scheme.We also confine our work in link-state routing networks.Most ISPs prefer link-state routing instead of distance-vector routing in their intra-domain system because of its merits, such as fast convergence and good support for metrics.Layer2 networks also incorporate link-state routing into their network architecture, such as the standardized transparent interconnection of lots of links.Furthermore, during topology changes caused by link or node failure, millisecond-level fast convergence,which poses stringent performance requirement to route computation,is preferred.

Among all of the hop-by-hop routing protection schemes,downstream path criterion(DC)[8]has been favored by the industry because of its simplicity in coping with all the single-link failure scenarios.All of the existing implementation algorithms about DC are time consuming and require a large amount of router CPU resources in large-scale networks.

However,the deployment of DC in real ISP networks is difficult because of the substantial computational overhead.Therefore, an efficient DC-based algorithm is required to be easily deployed in ISP.Thus, a lightweight IPFRR scheme is desired to provide cost-efficient routing protection effectively.Therefore, this study investigates the application of incremental shortest path first algorithm to reduce the computational overhead of the DC implementation.In particular,our contributions can be summarized as follows:

? We propose an efficient intra-domain routing protection algorithm (ERPA)in large-scale networks.

? Theoretical analysis indicates that the computation complexity of ERPA is less than that of constructing a shortest path tree (SPT).

? Theoretical analysis indicates that ERPA can provide the same network availability as DC.

? In terms of computation overhead and network availability,the theoretical analysis and experimental results are consistent.

2 Related Works

Nowadays,network failures have become routine events rather than exceptions[9].Many schemes for enhancing robustness against network failures have been proposed.Existing approaches fall in either one of the two categories:reactive and proactive approaches.The former studies the reduction of convergence time of routing protocol after the occurrence of failures, whereas the latter addresses the pre-calculating backup paths before the failures.Reactive approaches are applicable to all kinds of network failure scenarios regardless whether they are single or multiple failures.However,reactive approaches are subject to the risk of routing flap.Therefore, proactive approaches are preferred by the academia and industry.The idea of multitopology configuration method is that each router saves multiple configurations, and each configuration can protect some links to adapt to different link failures.However, the more configurations the router keeps, the more overhead it will introduce.Path splicing [10] is a classical multitopology configuration method that calculates multiple SPTs by adjusting link weights.Each spanning tree corresponds to a routing path, and packets can be forwarded among multiple spanning trees.However, a routing loop may be observed in path splitting, thereby degrading network performance.Dispath [11],which can protect all possible single fault cases in the network, is proposed in the literature.By constructing a directed acyclic graph with three disjoint edges [12], any two links in the network can be protected from failure.This study [13] investigates and proves that single- and double-fault protection algorithms are not restricted by network topology.Among the hop-by-hop proactive schemes, DC has been favored by the industry because of its simplicity in coping with all the single-link failure scenarios.However, all of the existing DC-based implementation algorithms are time consuming and require a large amount of router CPU resources.Authors propose an efficient algorithm called TBFH [14], which provides greater path diversity than ECMP with a very low overhead.In particular, TBFH computes the two best frist hop disjoint paths efficiently.We also propose a SPT-based multipath routing algorithm called DMPA [15].DMPA guarantees the loop-freeness of the induced routing path by maintaining a partial order of the routers underpinning it implicitly.The time complexity of DMPA does not depend on the degree of the calculating router.However, the network availability of TBFH and DMPA is lower than that of the DC.Unlike the aforementioned studies, our main concerns include computational efficiency and network availability, which are critical for the algorithm.Based on the existing work on this research area, we propose an algorithm whose complexity is less than that of constructing a SPT and without degrading the network availability for the first time.

3 Network Model and Problem Description

3.1 Network Model

In this section,we will first show the network model and then describe the key problems that need to be solved in this work.For ease of reading,some of the symbols used in this paper are summarized in Tab.1.A network can be expressed as a undirected graphG=(V,E),whereVandEdenote the set of nodes and the set of edges in the network, respectively.For any nodev∈/V, we useN(v) to denote all the neighbors of nodev;spt(v) represents a SPT rooted atv; andD(v,x) is the descendant of nodevinspt(v).Each link(i,j) in the network has a weightw(i,j) and a failure probabilityr(i,j).For any node pairxandy, we usecost(x,y) to indicate the shortest cost from nodexto nodey;dn(x,y) is the default next-hop from nodexto nodey; andbn(x,y) is the backup next-hop set from nodexto nodey.We will use a simple example to explain the aforementioned concepts.For example, Fig.1 presents a SPT rooted at nodec,N(c)={a,b},D(c,a)={a,h,d,g},D(c,b)={b,e,f},cost(c,d)=7,cost(c,g)=6,dn(c,g)=a,anddn(c,f)=b.

The currently deployed intra-domain routing protocols(e.g.,OSPF and IS-IS)only employ the shortest paths to forward packets.Thus, they need to reconverge when network component failures occur.The packets may be dropped because of invalid routing information.These protocols never exploit the inherent diversity of Internet topology and cannot handle network failure flexibly.Therefore, DC has been proposed to cope with all the single-link failure scenarios.The DC can be expressed as follows:

DC:For packets forwarded to a destinationd, nodec(c=d) can forward them to any of its neighboring nodexwhencost(x,d)<cost(c,d), and no forwarding loop will exist in the induced forwarding path.

Table 1:Symbols

Figure 1:SPT rooted at node c

To implement DC rule at nodec,nodecshould obtain the values ofcost(c,d)andcost(x,d).The value ofcost(c,d)can be achieved easily viaspt(c).However,to obtaincost(x,d),nodecneeds to compute a SPT for each of its neighbor.Computational complexity increases with the number of network node degree,which is particularly high when a node has a high degree in large-scale networks.Therefore,implementing the DC rule in real ISP networks is not considered a scalable method.For the actual deployment on the Internet,a DC-based scheme should introduce a small additional burden on the current deployed routing protocol.This paper is dedicated to finding an efficient DC-based scheme that is suitable for an ISP network.In particular,we focus on addressing the following problems:

Given a computing nodecand its SPTspt(c),we can find an efficient DC-based algorithmic technique in large-scale networks, and the algorithm conforms to the two following conditions:

1.The time complexity of the algorithm is less than that of constructing a SPT.

2.It can provide the same network availability with DC.

4 ERPA and its Performance

4.1 Algorithm

ERPA will be discussed in detail to solve the above problem in this section.The problem can be presented to computecost(x,d) in thespt(c).We first provide two theorems before formally describing the details of ERPA.The two following theorems describe how to compute the backup next-hop set that satisfies the DC Rule.Moreover, the computation overhead can be reduced dramatically by lessening the times of the operation.

Theorem 1:Given a computing nodecandspt(c),for any nodex∈N(c),sptnew(c,x)is the new SPT rooted at nodecwhen the weight of link(c,x) is changed to 0.For any nodev(v/=c,v/=x), ifv∈/D(spt(c),x)and ∈D(sptnew(c),x),then we can obtaincost(x,v)<cost(c,v).

Proof:Assuming thatdn(c,v)=y,y/=xin thespt(c),we havecost(c,v)=cost(c,y)+cost(y,v).

Given thatv∈D(sptnew(c),x),we can obtaincostnew(c,v)=cost(c,x)+cost(x,v).,wherecostnew(c,v)is the cost from nodecto nodevin thesptnew(c,x).Becausecost(c,x)=0 in thesptnew(c,x), we can getcostnew(c,v)=cost(x,v) (1).According to thatv∈/D(spt(c),x)andv∈D(sptnew(c),x), we can obtaincostnew(c,v)<cost(c,v)(2).Combining Eqs.(1)and(2),we havecost(x,v)<cost(c,v).

Theorem 2:Given a computing nodecandspt(c),for any nodex∈N(c),sptnew(c,x)is the new SPT rooted at nodecwhen the weight of link(c,x) is changed to 0.For any nodev(v/=c,v/=x),ifv∈/D(spt(c),x) andv∈D(sptnew(c),x),then we can obtainbn(c,v)=bn(c,v)∪{x}.

Proof:As seen in Theorem 1 and DC rule,nodexis a viable backup next-hop from nodecto nodev;therefore, we can obtainbn(c,v)=bn(c,v)∪{x}.

We will use an example to explain Theorems 1 and 2.Fig.1 shows a SPT rooted at nodec,whereas Figs.2 and 3 represent the new SPT when links(c,a) and(c,b) are changed to 0, respectively.Becausee∈/D(spt(c),a),e∈D(sptnew(c),a), nodeacan be a viable backup next-hop fromctoe.Given thatd∈/D(spt(c),b),d∈D(sptnew(c),b), nodebcan be a viable backup next-hop fromctod.Considering thatg∈/D(spt(c),b),g∈D(spt(c),b),nodebcan be a viable backup next-hop fromctog.

Figure 2:SPT rooted at node c when the weight of link (c ,a) is changed to 0

Figure 3:SPT rooted at node c when the weight of link (c ,b) is changed to 0

According to the above discussions,ERPA is proposed to compute the backup next-hop set that satisfies the DC rule.The inputs of ERPA include the network topologyG=(V,E)andspt(c),and the output is the backup next-hop set from nodecto all the other nodes in the network.First, for each neighborxofc, the weight of the link(c,v) is changed into 0 (lines 2-3), and then a new SPT is built by employing i-SPF(line 4).For any nodev(v/=c,v/=x), ifv∈/D(spt(c),x) andv∈D(sptnew(c),x), then the nodexcan be a viable backup next-hop fromctov(lines 5-9).At last, the weight of the link(c,x) is adjusted to its original value(line 10).

Algorithm ERPA Input:G= (V ,E) and spt (c )Output:v ∈V bn(c ,v)1:For v ∈N (c )do 2: weight ←w(c ,x)3: w(c ,x)←0 4:employ i-SPF to construct sptnew(c )5:For v∈/V do 6: If v ∈D spt (c ),x( )and v ∈D sptnew(c ),x(images/BZ_642_820_2501_879_2527.png)then 7: bn(c ,v)=bn(c ,v)∪ x { }.8: EndIf 9:EndFor 10: w(c ,x)←weight

4.2 Algorithm Performance and Discussion

In this section,we will show the performance of the algorithm,including the time complexity and the number of backup next-hop computed by ERPA.Theorem 3 suggests that the computational complexity of ERPA is less than that of constructing a SPT.In Theorem 4,ERPA can compute all the backup next-hop sets that satisfy the DC Rule.We will describe Theorems 3 and 4 in detail and prove their correctness.

Theorem 3:Computational complexity of ERPA is less thanO(|E|lg|V|).

Proof:To compute all the backup next-hop set from node c to other nodes in the network.ERPA needs to run the i-SPF algorithm k times,where k is the number of neighbors of node c.LetNiandMiindicate the number of nodes that must adjust their costs or parents and the number of edges attached to these nodes when the weight of link(c,i),i∈N(c) is changed to 0, respectively.Therefore, the computational complexity of ERPA is

ConsideringNi<|V|,the computational complexity of ERPA is less than that of SPF.

Theorem 4:ERPA can compute all the backup next-hop set that satisfies the DC Rule.

Proof:We will prove the theorem by contradiction.Supposing that nodev(v=/c,v=/x),v∈/D(spt(c),x)andcost(x,v)<cost(c,v)x∈/bn(c,d) exist when ERPA is terminated.For any nodex∈N(c),ifcost(x,v)<cost(c,v), thenv∈D(sptnew(c),x).Therefore, according to Theorem 2, we can obtain.Thus,x∈bn(c,v)contradicts the assumptions.

5 Performance Evaluations

In this section,we will evaluate ERPA in terms of computation overhead and network availability.To indicate the performance of ERPA,we compare the results with TBFH,DMPA,and DC.All the algorithms are implemented on a PC (Intel i7, 3.7 GHz CPU, and 8G memory).All of the experimental results correspond to the average values of 15 random experiments.To truly reflect the link failure distribution,the failure probability of links in this paper adopts Weibull distribution

We conduct the simulations on a wide space of relevant topologies, including real, inferred, and synthetic ones.The real topology includes Abilene, USLD, ITALY, NJLATA, and TORONTO [16], as well as six ISP topologies that are inferred from the measurement results from Rocketfuel [17].The parameters for real and Rocketfuel topology are summarized in Tab.2.We also use BRITE [18] to generate some topologies, the numbers of nodes range from 100 to 1000, and the average node degree ranges from 5 to 40.The detailed parameters for BRITE are shown in Tab.3.

5.1 Computation Complexity

Theoretical analysis has indicated that the time complexity of ERPA is less than that of constructing a SPT,which has a great advantage over DC,TBFH,and DMPA.To further verify computational performance,we make simulations on different types of topologies.In this section, we evaluate the computational overhead of different algorithms on three types of topologies to avoid the uncertain impact of factors on the algorithm’s performance.The computational overhead of an algorithm is defined as the ratio of computation time of the algorithm to that of constructing a SPT.

Fig.4 indicates the computational overhead obtained by different algorithms on real and Rocketfuel topologies.Fig.4 shows that ERPA has the lowest computation overhead among all the algorithms.The computation overhead of ERPA is less than building a SPT, whereas DMPA need to construct a SPT, and TBFH need to compute two SPTs.The computation overhead of DC is proportional to the degree of the network average node degree.

Table 2:Parameters for Rocketfuel Topology

Table 3:Parameters for BRITE Topology

Figure 4:Computational overhead on Real and Rocketfuel topologies

Fig.5 illustrates the relationship between the computation overhead and topology size on generated topologies when the average node degree is 8.In Fig.5, the computation overhead does not depend on the topology size for all the four simulated algorithms.The computation overhead of ERPA is lowest in the four algorithms among all the topologies.

Figure 5:Computational overhead on Brite topologies

Fig.6 shows the relationship between the computation overhead and average node degree on Brite topologies when the topology size is 1000.As the average node degree increases, the computation overhead of DC rises accordingly.Also, ERPA has exhibited the best performance among all of the tested algorithms.Therefore, the above experiment results are consistent with the theoretical analysis on computational complexity.

Figure 6:Computational overhead on Brite topologies

5.2 Network Availability

In this section, we will employ network availability as our main evaluation criterion to assess the reliability of the network.Network availabilityA(G)can be formally defined as:

whereA(s,d) is the availability of source-destinations-dpairs.We will describe the computation ofA(s,d) in the following.Supposing thatndifferent paths exist fromstod, we usepi(s,d) to denote the i-th path in them.We useAi(s,d)to indicatepi(s,d)works.The probability ofAi(s,d)can be written as:

According to the inclusion-exclusion principle,A(s,d)be expressed as:

whereSkis the total sum of the probabilities that a unique set ofkpaths fromstodare working simultaneously and can be expressed as:

Tab.4 provides the network availability provided by each protection scheme on real and inferred network topologies.The results show that ERPA has a clear advantage over TBFH and DMPA and has the same performance as DC.Therefore, the experimental results of network availability are consistent with those of the theoretical analysis.

Table 4:Network availability on Abilene and Rocketfuel topologies

Fig.7 illustrates the relationship between the network availability and the average node degree.The network availability increases with the average node degree.Notably, when the average node degree increases, all schemes provide better network availability results, whereas ERPA and DC are always better than those of DMPA and TBFH.Fig.8 shows the relationship between network availability and topology size on generated topologies when the average node degree is 6.Fig.8 shows that the network availability performance of ERPA and DC is obviously better than the two other algorithms.From the experiment, we can conclude that ERPA not only reduces the complexity of DC implementation greatly but also has the same routing availability as DC.

Figure 7:Network availability on Brite topologies

Figure 8:Network availability on Brite topologies

6 Conclusions

This study proposed an efficient scheme called ERPA to implement DC-based hop-by-hop routing protection.The computation complexity of ERPA is irrespective of the degree of the calculating router and is less than a full SPT calculation.We simulate ERPA on numerous topologies in comparison with DC,DMPA,and TBFH.The theoretical and experimental results show that ERPA can reduce the computational overhead and can provide the same network availability as DC dramatically.We are convinced that our proposed scheme ERPA takes a big step toward actual deployment.

Funding Statement:This work is supported by the National Natural Science Foundation of China(No.61702315), the Key R&D program (international science and technology cooperation project) of Shanxi Province China (No.201903D421003), the National Key Research and Development Program of China(No.2018YFB1800401).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

宜黄县| 永德县| 敖汉旗| 巴里| 虎林市| 嘉荫县| 沙湾县| 烟台市| 芒康县| 新巴尔虎左旗| 沈阳市| 日照市| 左云县| 资中县| 汉中市| 嘉峪关市| 虹口区| 高安市| 江西省| 旌德县| 苏州市| 高雄县| 郧西县| 洪洞县| 边坝县| 旌德县| 吐鲁番市| 垦利县| 于都县| 富民县| 汶上县| 出国| 丹阳市| 沅陵县| 庄浪县| 嘉善县| 惠来县| 大化| 贡觉县| 安化县| 许昌县|