999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Efficient Routing Protection Algorithm in Large-Scale Networks

2021-12-15 12:47:44HaijunGengHanZhangandYangyangZhang
Computers Materials&Continua 2021年2期

Haijun Geng,Han Zhang and Yangyang Zhang

1School of Software Engineering, Shanxi University, Taiyuan,030006,China

22Institute of Big Data Science and Industry, Shanxi University, Taiyuan, 030006,China

3School of Cyber Space and Technology, Beihang University, Beijing, 100191,China

4College of Engineering Northeastern University, Boston,02115, USA

Abstract: With an increasing urgent demand for fast recovery routing mechanisms in large-scale networks, minimizing network disruption caused by network failure has become critical.However, a large number of relevant studies have shown that network failures occur on the Internet inevitably and frequently.The current routing protocols deployed on the Internet adopt the reconvergence mechanism to cope with network failures.During the reconvergence process,the packets may be lost because of inconsistent routing information, which reduces the network’s availability greatly and affects the Internet service provider’s (ISP’s) service quality and reputation seriously.Therefore, improving network availability has become an urgent problem.As such, the Internet Engineering Task Force suggests the use of downstream path criterion (DC) to address all single-link failure scenarios.However, existing methods for implementing DC schemes are time consuming, require a large amount of router CPU resources,and may deteriorate router capability.Thus,the computation overhead introduced by existing DC schemes is significant, especially in large-scale networks.Therefore,this study proposes an efficient intra-domain routing protection algorithm(ERPA)in large-scale networks.Theoretical analysis indicates that the time complexity of ERPA is less than that of constructing a shortest path tree.Experimental results show that ERPA can reduce the computation overhead significantly compared with the existing algorithms while offering the same network availability as DC.

Keywords:Large-scale network; shortest path tree; time complexity; network failure;real-time and mission-critical applications

1 Introduction

In recent years,the Internet has become a widely used platform for various network applications.With the rapid development of the Internet,several real-time and mission-critical applications,such as VoIP and video and online games, are deployed [1].These applications are susceptible to network delay and interruption, which stress strict requirements on network availability [2].Moreover, even a few seconds of network discontinuity would have an adverse effect on these applications[3].However,network failures are common on the Internet.The IP networks need to reconverge when network failure occurs.The convergence time for the currently deployed intra-domain routing protocol is the order of seconds when network components are invalid.During this period, several packets may be dropped because of the inconsistent routing information [4].The Internet service provider (ISP) has strong motivations to enhance the network survivability when network failures occur [5].Therefore, improving the Internet routing availability has become an urgent problem that needs to be solved.

To improve the availability of intra-domain routing,the routing protection scheme is usually applied in the academia and industry[6].The routing protection aims to prove fast convergence when network failures have been detected [7].Existing routing protection schemes can be divided into two sub-categories depending on whether or not special cooperation between routers is required for packet forwarding.Cooperation-free schemes compute multiple next-hops for each destination, and each router selects an appropriate next-hop for standard packet forwarding independently, where care must be taken such that the induced forwarding paths are loop-free.The benefit is that they can provide not only redundant backup links but also other features, such as load balancing and high throughput.The other sub-category of schemes computes for a link to protect a multihop repair path that is agreed by all routers on that path.Thus,special cooperation mechanisms have to be used to reroute packets along that path.

In this work,we focus on the first type of scheme.We also confine our work in link-state routing networks.Most ISPs prefer link-state routing instead of distance-vector routing in their intra-domain system because of its merits, such as fast convergence and good support for metrics.Layer2 networks also incorporate link-state routing into their network architecture, such as the standardized transparent interconnection of lots of links.Furthermore, during topology changes caused by link or node failure, millisecond-level fast convergence,which poses stringent performance requirement to route computation,is preferred.

Among all of the hop-by-hop routing protection schemes,downstream path criterion(DC)[8]has been favored by the industry because of its simplicity in coping with all the single-link failure scenarios.All of the existing implementation algorithms about DC are time consuming and require a large amount of router CPU resources in large-scale networks.

However,the deployment of DC in real ISP networks is difficult because of the substantial computational overhead.Therefore, an efficient DC-based algorithm is required to be easily deployed in ISP.Thus, a lightweight IPFRR scheme is desired to provide cost-efficient routing protection effectively.Therefore, this study investigates the application of incremental shortest path first algorithm to reduce the computational overhead of the DC implementation.In particular,our contributions can be summarized as follows:

? We propose an efficient intra-domain routing protection algorithm (ERPA)in large-scale networks.

? Theoretical analysis indicates that the computation complexity of ERPA is less than that of constructing a shortest path tree (SPT).

? Theoretical analysis indicates that ERPA can provide the same network availability as DC.

? In terms of computation overhead and network availability,the theoretical analysis and experimental results are consistent.

2 Related Works

Nowadays,network failures have become routine events rather than exceptions[9].Many schemes for enhancing robustness against network failures have been proposed.Existing approaches fall in either one of the two categories:reactive and proactive approaches.The former studies the reduction of convergence time of routing protocol after the occurrence of failures, whereas the latter addresses the pre-calculating backup paths before the failures.Reactive approaches are applicable to all kinds of network failure scenarios regardless whether they are single or multiple failures.However,reactive approaches are subject to the risk of routing flap.Therefore, proactive approaches are preferred by the academia and industry.The idea of multitopology configuration method is that each router saves multiple configurations, and each configuration can protect some links to adapt to different link failures.However, the more configurations the router keeps, the more overhead it will introduce.Path splicing [10] is a classical multitopology configuration method that calculates multiple SPTs by adjusting link weights.Each spanning tree corresponds to a routing path, and packets can be forwarded among multiple spanning trees.However, a routing loop may be observed in path splitting, thereby degrading network performance.Dispath [11],which can protect all possible single fault cases in the network, is proposed in the literature.By constructing a directed acyclic graph with three disjoint edges [12], any two links in the network can be protected from failure.This study [13] investigates and proves that single- and double-fault protection algorithms are not restricted by network topology.Among the hop-by-hop proactive schemes, DC has been favored by the industry because of its simplicity in coping with all the single-link failure scenarios.However, all of the existing DC-based implementation algorithms are time consuming and require a large amount of router CPU resources.Authors propose an efficient algorithm called TBFH [14], which provides greater path diversity than ECMP with a very low overhead.In particular, TBFH computes the two best frist hop disjoint paths efficiently.We also propose a SPT-based multipath routing algorithm called DMPA [15].DMPA guarantees the loop-freeness of the induced routing path by maintaining a partial order of the routers underpinning it implicitly.The time complexity of DMPA does not depend on the degree of the calculating router.However, the network availability of TBFH and DMPA is lower than that of the DC.Unlike the aforementioned studies, our main concerns include computational efficiency and network availability, which are critical for the algorithm.Based on the existing work on this research area, we propose an algorithm whose complexity is less than that of constructing a SPT and without degrading the network availability for the first time.

3 Network Model and Problem Description

3.1 Network Model

In this section,we will first show the network model and then describe the key problems that need to be solved in this work.For ease of reading,some of the symbols used in this paper are summarized in Tab.1.A network can be expressed as a undirected graphG=(V,E),whereVandEdenote the set of nodes and the set of edges in the network, respectively.For any nodev∈/V, we useN(v) to denote all the neighbors of nodev;spt(v) represents a SPT rooted atv; andD(v,x) is the descendant of nodevinspt(v).Each link(i,j) in the network has a weightw(i,j) and a failure probabilityr(i,j).For any node pairxandy, we usecost(x,y) to indicate the shortest cost from nodexto nodey;dn(x,y) is the default next-hop from nodexto nodey; andbn(x,y) is the backup next-hop set from nodexto nodey.We will use a simple example to explain the aforementioned concepts.For example, Fig.1 presents a SPT rooted at nodec,N(c)={a,b},D(c,a)={a,h,d,g},D(c,b)={b,e,f},cost(c,d)=7,cost(c,g)=6,dn(c,g)=a,anddn(c,f)=b.

The currently deployed intra-domain routing protocols(e.g.,OSPF and IS-IS)only employ the shortest paths to forward packets.Thus, they need to reconverge when network component failures occur.The packets may be dropped because of invalid routing information.These protocols never exploit the inherent diversity of Internet topology and cannot handle network failure flexibly.Therefore, DC has been proposed to cope with all the single-link failure scenarios.The DC can be expressed as follows:

DC:For packets forwarded to a destinationd, nodec(c=d) can forward them to any of its neighboring nodexwhencost(x,d)<cost(c,d), and no forwarding loop will exist in the induced forwarding path.

Table 1:Symbols

Figure 1:SPT rooted at node c

To implement DC rule at nodec,nodecshould obtain the values ofcost(c,d)andcost(x,d).The value ofcost(c,d)can be achieved easily viaspt(c).However,to obtaincost(x,d),nodecneeds to compute a SPT for each of its neighbor.Computational complexity increases with the number of network node degree,which is particularly high when a node has a high degree in large-scale networks.Therefore,implementing the DC rule in real ISP networks is not considered a scalable method.For the actual deployment on the Internet,a DC-based scheme should introduce a small additional burden on the current deployed routing protocol.This paper is dedicated to finding an efficient DC-based scheme that is suitable for an ISP network.In particular,we focus on addressing the following problems:

Given a computing nodecand its SPTspt(c),we can find an efficient DC-based algorithmic technique in large-scale networks, and the algorithm conforms to the two following conditions:

1.The time complexity of the algorithm is less than that of constructing a SPT.

2.It can provide the same network availability with DC.

4 ERPA and its Performance

4.1 Algorithm

ERPA will be discussed in detail to solve the above problem in this section.The problem can be presented to computecost(x,d) in thespt(c).We first provide two theorems before formally describing the details of ERPA.The two following theorems describe how to compute the backup next-hop set that satisfies the DC Rule.Moreover, the computation overhead can be reduced dramatically by lessening the times of the operation.

Theorem 1:Given a computing nodecandspt(c),for any nodex∈N(c),sptnew(c,x)is the new SPT rooted at nodecwhen the weight of link(c,x) is changed to 0.For any nodev(v/=c,v/=x), ifv∈/D(spt(c),x)and ∈D(sptnew(c),x),then we can obtaincost(x,v)<cost(c,v).

Proof:Assuming thatdn(c,v)=y,y/=xin thespt(c),we havecost(c,v)=cost(c,y)+cost(y,v).

Given thatv∈D(sptnew(c),x),we can obtaincostnew(c,v)=cost(c,x)+cost(x,v).,wherecostnew(c,v)is the cost from nodecto nodevin thesptnew(c,x).Becausecost(c,x)=0 in thesptnew(c,x), we can getcostnew(c,v)=cost(x,v) (1).According to thatv∈/D(spt(c),x)andv∈D(sptnew(c),x), we can obtaincostnew(c,v)<cost(c,v)(2).Combining Eqs.(1)and(2),we havecost(x,v)<cost(c,v).

Theorem 2:Given a computing nodecandspt(c),for any nodex∈N(c),sptnew(c,x)is the new SPT rooted at nodecwhen the weight of link(c,x) is changed to 0.For any nodev(v/=c,v/=x),ifv∈/D(spt(c),x) andv∈D(sptnew(c),x),then we can obtainbn(c,v)=bn(c,v)∪{x}.

Proof:As seen in Theorem 1 and DC rule,nodexis a viable backup next-hop from nodecto nodev;therefore, we can obtainbn(c,v)=bn(c,v)∪{x}.

We will use an example to explain Theorems 1 and 2.Fig.1 shows a SPT rooted at nodec,whereas Figs.2 and 3 represent the new SPT when links(c,a) and(c,b) are changed to 0, respectively.Becausee∈/D(spt(c),a),e∈D(sptnew(c),a), nodeacan be a viable backup next-hop fromctoe.Given thatd∈/D(spt(c),b),d∈D(sptnew(c),b), nodebcan be a viable backup next-hop fromctod.Considering thatg∈/D(spt(c),b),g∈D(spt(c),b),nodebcan be a viable backup next-hop fromctog.

Figure 2:SPT rooted at node c when the weight of link (c ,a) is changed to 0

Figure 3:SPT rooted at node c when the weight of link (c ,b) is changed to 0

According to the above discussions,ERPA is proposed to compute the backup next-hop set that satisfies the DC rule.The inputs of ERPA include the network topologyG=(V,E)andspt(c),and the output is the backup next-hop set from nodecto all the other nodes in the network.First, for each neighborxofc, the weight of the link(c,v) is changed into 0 (lines 2-3), and then a new SPT is built by employing i-SPF(line 4).For any nodev(v/=c,v/=x), ifv∈/D(spt(c),x) andv∈D(sptnew(c),x), then the nodexcan be a viable backup next-hop fromctov(lines 5-9).At last, the weight of the link(c,x) is adjusted to its original value(line 10).

Algorithm ERPA Input:G= (V ,E) and spt (c )Output:v ∈V bn(c ,v)1:For v ∈N (c )do 2: weight ←w(c ,x)3: w(c ,x)←0 4:employ i-SPF to construct sptnew(c )5:For v∈/V do 6: If v ∈D spt (c ),x( )and v ∈D sptnew(c ),x(images/BZ_642_820_2501_879_2527.png)then 7: bn(c ,v)=bn(c ,v)∪ x { }.8: EndIf 9:EndFor 10: w(c ,x)←weight

4.2 Algorithm Performance and Discussion

In this section,we will show the performance of the algorithm,including the time complexity and the number of backup next-hop computed by ERPA.Theorem 3 suggests that the computational complexity of ERPA is less than that of constructing a SPT.In Theorem 4,ERPA can compute all the backup next-hop sets that satisfy the DC Rule.We will describe Theorems 3 and 4 in detail and prove their correctness.

Theorem 3:Computational complexity of ERPA is less thanO(|E|lg|V|).

Proof:To compute all the backup next-hop set from node c to other nodes in the network.ERPA needs to run the i-SPF algorithm k times,where k is the number of neighbors of node c.LetNiandMiindicate the number of nodes that must adjust their costs or parents and the number of edges attached to these nodes when the weight of link(c,i),i∈N(c) is changed to 0, respectively.Therefore, the computational complexity of ERPA is

ConsideringNi<|V|,the computational complexity of ERPA is less than that of SPF.

Theorem 4:ERPA can compute all the backup next-hop set that satisfies the DC Rule.

Proof:We will prove the theorem by contradiction.Supposing that nodev(v=/c,v=/x),v∈/D(spt(c),x)andcost(x,v)<cost(c,v)x∈/bn(c,d) exist when ERPA is terminated.For any nodex∈N(c),ifcost(x,v)<cost(c,v), thenv∈D(sptnew(c),x).Therefore, according to Theorem 2, we can obtain.Thus,x∈bn(c,v)contradicts the assumptions.

5 Performance Evaluations

In this section,we will evaluate ERPA in terms of computation overhead and network availability.To indicate the performance of ERPA,we compare the results with TBFH,DMPA,and DC.All the algorithms are implemented on a PC (Intel i7, 3.7 GHz CPU, and 8G memory).All of the experimental results correspond to the average values of 15 random experiments.To truly reflect the link failure distribution,the failure probability of links in this paper adopts Weibull distribution

We conduct the simulations on a wide space of relevant topologies, including real, inferred, and synthetic ones.The real topology includes Abilene, USLD, ITALY, NJLATA, and TORONTO [16], as well as six ISP topologies that are inferred from the measurement results from Rocketfuel [17].The parameters for real and Rocketfuel topology are summarized in Tab.2.We also use BRITE [18] to generate some topologies, the numbers of nodes range from 100 to 1000, and the average node degree ranges from 5 to 40.The detailed parameters for BRITE are shown in Tab.3.

5.1 Computation Complexity

Theoretical analysis has indicated that the time complexity of ERPA is less than that of constructing a SPT,which has a great advantage over DC,TBFH,and DMPA.To further verify computational performance,we make simulations on different types of topologies.In this section, we evaluate the computational overhead of different algorithms on three types of topologies to avoid the uncertain impact of factors on the algorithm’s performance.The computational overhead of an algorithm is defined as the ratio of computation time of the algorithm to that of constructing a SPT.

Fig.4 indicates the computational overhead obtained by different algorithms on real and Rocketfuel topologies.Fig.4 shows that ERPA has the lowest computation overhead among all the algorithms.The computation overhead of ERPA is less than building a SPT, whereas DMPA need to construct a SPT, and TBFH need to compute two SPTs.The computation overhead of DC is proportional to the degree of the network average node degree.

Table 2:Parameters for Rocketfuel Topology

Table 3:Parameters for BRITE Topology

Figure 4:Computational overhead on Real and Rocketfuel topologies

Fig.5 illustrates the relationship between the computation overhead and topology size on generated topologies when the average node degree is 8.In Fig.5, the computation overhead does not depend on the topology size for all the four simulated algorithms.The computation overhead of ERPA is lowest in the four algorithms among all the topologies.

Figure 5:Computational overhead on Brite topologies

Fig.6 shows the relationship between the computation overhead and average node degree on Brite topologies when the topology size is 1000.As the average node degree increases, the computation overhead of DC rises accordingly.Also, ERPA has exhibited the best performance among all of the tested algorithms.Therefore, the above experiment results are consistent with the theoretical analysis on computational complexity.

Figure 6:Computational overhead on Brite topologies

5.2 Network Availability

In this section, we will employ network availability as our main evaluation criterion to assess the reliability of the network.Network availabilityA(G)can be formally defined as:

whereA(s,d) is the availability of source-destinations-dpairs.We will describe the computation ofA(s,d) in the following.Supposing thatndifferent paths exist fromstod, we usepi(s,d) to denote the i-th path in them.We useAi(s,d)to indicatepi(s,d)works.The probability ofAi(s,d)can be written as:

According to the inclusion-exclusion principle,A(s,d)be expressed as:

whereSkis the total sum of the probabilities that a unique set ofkpaths fromstodare working simultaneously and can be expressed as:

Tab.4 provides the network availability provided by each protection scheme on real and inferred network topologies.The results show that ERPA has a clear advantage over TBFH and DMPA and has the same performance as DC.Therefore, the experimental results of network availability are consistent with those of the theoretical analysis.

Table 4:Network availability on Abilene and Rocketfuel topologies

Fig.7 illustrates the relationship between the network availability and the average node degree.The network availability increases with the average node degree.Notably, when the average node degree increases, all schemes provide better network availability results, whereas ERPA and DC are always better than those of DMPA and TBFH.Fig.8 shows the relationship between network availability and topology size on generated topologies when the average node degree is 6.Fig.8 shows that the network availability performance of ERPA and DC is obviously better than the two other algorithms.From the experiment, we can conclude that ERPA not only reduces the complexity of DC implementation greatly but also has the same routing availability as DC.

Figure 7:Network availability on Brite topologies

Figure 8:Network availability on Brite topologies

6 Conclusions

This study proposed an efficient scheme called ERPA to implement DC-based hop-by-hop routing protection.The computation complexity of ERPA is irrespective of the degree of the calculating router and is less than a full SPT calculation.We simulate ERPA on numerous topologies in comparison with DC,DMPA,and TBFH.The theoretical and experimental results show that ERPA can reduce the computational overhead and can provide the same network availability as DC dramatically.We are convinced that our proposed scheme ERPA takes a big step toward actual deployment.

Funding Statement:This work is supported by the National Natural Science Foundation of China(No.61702315), the Key R&D program (international science and technology cooperation project) of Shanxi Province China (No.201903D421003), the National Key Research and Development Program of China(No.2018YFB1800401).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 日韩精品无码免费一区二区三区| 亚洲熟女中文字幕男人总站| 欧美另类一区| 亚洲高清在线天堂精品| 国产99精品久久| 999国内精品久久免费视频| 老色鬼久久亚洲AV综合| 先锋资源久久| 中文字幕在线观| 亚洲成人精品在线| 在线视频亚洲色图| 成人精品午夜福利在线播放 | 51国产偷自视频区视频手机观看 | 国产人前露出系列视频| 毛片免费高清免费| 成人一级黄色毛片| 日本一区高清| 亚洲国产成人久久精品软件| 国产精品污污在线观看网站| 日韩无码真实干出血视频| 亚洲小视频网站| 国产一区二区三区在线精品专区| 日日噜噜夜夜狠狠视频| 亚洲精品视频免费| 91精品免费久久久| 亚洲男人在线| 高潮毛片无遮挡高清视频播放| 久操线在视频在线观看| 91精品国产91久久久久久三级| 波多野结衣无码AV在线| 在线国产91| 老熟妇喷水一区二区三区| 国产一级片网址| 欧美一区日韩一区中文字幕页| 日韩成人在线视频| 在线欧美一区| 日韩黄色在线| 国产内射在线观看| 国产精品久久精品| 人妻中文字幕无码久久一区| 99re精彩视频| AV老司机AV天堂| 欧美成人免费| 国产主播福利在线观看| 国国产a国产片免费麻豆| 免费一级毛片| 久久精品只有这里有| 毛片在线播放网址| 精品人妻系列无码专区久久| 中文字幕波多野不卡一区| 亚洲国产精品无码AV| 婷婷六月在线| 99久久免费精品特色大片| 在线观看亚洲精品福利片| 午夜少妇精品视频小电影| 国产网友愉拍精品视频| 手机精品福利在线观看| 国内精品小视频在线| 天天视频在线91频| 久久久久国色AV免费观看性色| 亚洲午夜天堂| 久久久久无码精品国产免费| 成人福利在线免费观看| 国产毛片网站| 中文字幕天无码久久精品视频免费 | a在线亚洲男人的天堂试看| 日本人真淫视频一区二区三区| 久久a级片| 九九九精品成人免费视频7| 亚洲性影院| 亚洲精品在线观看91| 久久五月视频| 91区国产福利在线观看午夜| 少妇精品在线| 国产精品尹人在线观看| 中文字幕亚洲综久久2021| 精品乱码久久久久久久| 色天天综合| 亚洲一区毛片| 亚洲成人播放| 激情国产精品一区| 久久国产V一级毛多内射|