SlideShare a Scribd company logo
ENHANCING FAULT TOLERANCE AND
REROUTING STRATEGIES IN MPLS NETWORKS
Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal
Supervisor
Dr. Kanak Saxena
Professor
Department of Computer Applications
Samrat Ashok Technological Institute
Vidisha (M.P.)
Research Scholar
Ravindra Kumar Singh
*
MULTI-PROTOCOL LABEL SWITCHING
GOALS OF MPLS
▪ Scalability of network layer routing.
▪ Using labels as a means to aggregate forwarding
information, while working in the presence of routing
hierarchies.
▪ Greater flexibility in delivering routing services.
▪ Using labels to identify particular traffic which are to
receive special services, e.g. QoS.
▪ Increased performance.
▪ Using the label-swapping paradigm to optimize network
performance.
GOALS OF MPLS CONT…
▪ Simplify integration of routers with cell switching based
technologies.
▪ Making cell switches behave as routers.
▪ By making information about physical topology
available to network layer routing procedures.
MULTI-PROTOCOL LABEL SWITCHING
INTRODUCTION TO MPLS
▪ MPLS improves internet scalability by eliminating the need
for each router and switch in a packet's path to perform
traditionally redundant address lookups and route
calculation.
▪ Improves scalability through better traffic engineering.
▪ MPLS also permits explicit backbone routing, which
specifies in advance the hops that a packet will take across
the network.
▪ This should allow more deterministic, or predictable,
performance that can be used to guarantee QoS.
▪ These paths function at layer 3 or can even be mapped
directly to layer 2 transport such as ATM or frame relay.
INTRODUCTION TO MPLS CONT…
▪ Explicit routing will give IP traffic a semblance of end-to-
end connections over the backbone.
▪ The MPLS definition of IP QoS parameters is limited.
▪ Out of 32 bits total, an MPLS label reserves just three bits
for specifying QoS.
▪ Label-switching routers (LSRs) will examine these bits and
forward packets over paths that provide the appropriate
QoS levels. But the exact values and functions of these so-
called 'experimental bits‘ remain to be defined.
▪ The MPLS label could specify whether traffic requires
constant bit rate (CBR) or variable bit rate (VBR) service,
and the ATM network will ensure that guarantees are met.
MULTI-PROTOCOL LABEL SWITCHING
ARCHITECTURE
MULTI-PROTOCOL LABEL SWITCHING
LABELS
▪ A label is short, fixed length physically continuous identifier
which is used to identify a FEC ( forwarding equivalence
class), usually of local significance.
▪ Ru can transmits a packet labeled L to Rd, if they can agree
to a binding between label L and FEC F for packets moving
from Ru to Rd.
▪ Ru (upstream LSR) → Rd (downstream LSR with
respect to a given binding).
▪ L becomes Ru’s “outgoing label” representing FEC F,
and L becomes rd’s “incoming label” representing FEC
F.
▪ Rd must make sure that the binding from label to FEC is
one-to-one.
MULTI-PROTOCOL LABEL SWITCHING
LABELS CONT…
▪ Rd must not agree with Ru1 to bind L to FEC F1, while
agreeing with some other LSR Ru2 to bind L to a different
FEC F2, unless rd can always tell, when it receives a packet
with incoming label L, whether the label was put on the
packet by Ru1 or Ru2.
L for FEC F1
L for FEC F2
Ru1
Ru2
Rd
MULTI-PROTOCOL LABEL SWITCHING
LABELED PACKET
▪ A packet into which a label has been encoded.
▪ The label resides in an encapsulation header which exists
specifically for this purpose.
▪ Or the label may reside in a existing data link or network
layer header.
▪ The particular encoding technique which is used must be
agreed to by both the entities which encodes the label and
the entity which decodes the label.
MULTI-PROTOCOL LABEL SWITCHING
LABEL DISTRIBUTION
▪ It is set of procedures by which one LSR informs another
LSRs of the bindings (label/FEC) it has made.
▪ Two LSRs which use a distribution protocol to exchange
label/FEC binding information are known as “label
distributing peers” with respect to the binding information
they exchange.
▪ There exists many different distribution protocols ( [MPLS-
BGP], [MPLS-RSVP], [MPLS-RVSP-TUNNELS],
[MPLS-CR-LDP]).
IP VERSUS MPLS
▪ In IP Routing, each router makes its own routing and
forwarding decisions.
▪ In MPLS:
▪ source router makes the routing decision.
▪ Intermediate routers make forwarding decisions.
▪ A path is computed and a “virtual circuit” is established
from ingress router to egress router.
▪ An MPLS path or virtual circuit from source to destination
is called an LSP (label switched path).
FAULT TOLERANCE IN MPLS
▪ In MPLS two basic models are used to recover from faults
▪ Protection Switching
▪ Rerouting
PROTECTION SWITCHING AND REROUTING
▪ Rerouting
▪ On-demand recovery – no preset backup paths.
▪ Example: existing recovery in IP networks.
▪ Protection
▪ Pre-determined recovery – backup paths “in advance”.
▪ Primary and backup are provisioned at the same time.
▪ IP supports rerouting .
▪ Because it is datagram service.
▪ MPLS supports rerouting as well as protection.
▪ Because it is virtual-circuit service.
REROUTING IN IP NETWORKS
▪ In traditional IP, what happens when a link or node fails?
▪ Failure information needs to be disseminated in the
network.
▪ During this time, packets may go in loops.
▪ Rerouting latency is in the order of seconds.
▪ We look for protection possibilities in an MPLS network,
but…
▪ First we need to look at the QoS requirements
QoS REQUIREMENTS
▪ Bandwidth Guaranteed Primary Paths
▪ Bandwidth Guaranteed Backup Paths
▪ BW remains provisioned in case of network failure
▪ Minimal “Protection or rerouting Latency”
▪ Protection/rerouting latency is the time that elapses
between:
▪ “the occurrence of a failure”, and
▪ “the diversion of network traffic on a new path”
rerouting is generally SLOWER than protection
PROTECTION IN MPLS
▪ First we define Protection level.
▪ Path protection
▪ Also called end-to-end protection.
▪ For each primary LSP, a node-disjoint backup LSP is set up.
▪ Upon failure, ingress node diverts traffic on the backup path.
▪ Local Protection
▪ Upon failure, node immediately upstream the failed element
diverts the traffic on a “local” backup path.
Path Protection ➔ More Latency
Local Protection ➔ Less Latency
PROTECTION IN MPLS CONT…
PATH PROTECTION
S 1 2 3 D
Primary Path
Backup Path
This type of “path Protection”
still takes 100s of ms.
We may explore “Local Protection” to
quickly switch onto backup paths!
PROTECTION IN MPLS CONT…
LOCAL PROTECTION: FAULT MODELS
A B C D
Link
Protection
A B C D
A B C D
Node
Protection
Element
Protection
PROTECTION IN MPLS CONT…
PROTECTION MODES
▪ 1+1 protection
▪ Flow sent on two separate disjoint paths
▪ Receiver responsible for choosing one of the two
▪ 1:1 protection
▪ A backup path protects a single LSP (or a portion of a
single LSP)
▪ N:1 protection
▪ A backup path protects one link or one node or both
▪ Overlapping portions of many LSPs are protected by a
single backup path
▪ Applicable for local protection only
▪ N:M protection (M<N)
COST OF THE BACKUP PATH
▪ Local Protection requires that backup paths are setup in
advance
▪ Upon failure, traffic is promptly switched onto preset
backup paths.
▪ Bandwidth must be reserved for all backup paths
▪ This results in a reduction in the number of Primary
LSPs that can otherwise be placed on the network.
▪ Can we reduce the amount of “backup bandwidth” but still
provide guaranteed backups?
MOTIVATION FOR THE RESEARCH
▪ We First look to answer the following questions:
▪ Who computes the primary path?
▪ What is the fault model (link, node, or element protection)?
▪ Where do the backup paths originate?
▪ Who computes the backup path?
▪ At what point do the backup paths merge back with the
primary path?
▪ What information is stored locally in the nodes/routers?
▪ What information is propagated through routing protocols?
▪ What if a primary path can not be fully protected?
MOTIVATION FOR THE RESEARCH CONT…
▪ Then we try to solve the following unsolved problems and
hence motivations:
▪ How can we reduce the amount of “backup bandwidth” but
still provide guaranteed backups? Thus maximizing the
bandwidth sharing.
▪ How to increase the maximum number of primary LSPs
that can be placed on the network?
▪ How to maintain the survivability of network by recovering
from failure with in the acceptable delay and minimum
packet loss while efficiently utilizing the network
resources?
MOTIVATION FOR THE RESEARCH CONT…
▪ How to enhance the fault-tolerance performance without
affecting the fault free traffic?
▪ How to solve the packet disorder problem while
rerouting the affected traffic?
RELATED WORK
▪ Jenhui Chen et al. in [26] proposed a fast path recovery mechanism,
which employs the Enhanced Interior Gateway Routing Protocol
(EIGRP) and the Diffusing Update Algorithm (DUAL) together, to
find the working and backup paths simultaneously and modify the
LDP to establish the LSP by using the routing table of EIGRP.
▪ S Sae Lor et al. in [25] proposed a novel technique for fast re-route in
hop-by-hop routing in case of single link failures. It offers full repair
coverage without requiring additional mechanisms such as tunneling
or interface-specific operations. The technique handles the failures
without jeopardizing the operable parts of a network.
▪ Sahel Alouneh et al. in [27] present a novel approach for fault
tolerance in MPLS networks using a modified (k, n) threshold
sharing scheme with multi-path routing.
RELATED WORK CONT…
▪ Jenn-Wei Lin et al. in [28] enhanced the fault-tolerant performance
of the two recovery mechanisms (protection switching and
rerouting). The proposed approach utilizes the failure free LSPs to
transmit the traffic of the failed LSP (the affected traffic).
▪ Ravindra Kumar Singh et al. in [30] proposed a new algorithm for
an optimum LSP pair selection from multiple parallel LSP pairs. It
minimizes the probability of network congestion, packet loss and
request loss by selecting the LSP which is lightly loaded and
possess upward and downward bandwidth proportional to the
service request.
RESEARCH METHODOLOGY
▪ Survey of literature, Study of various algorithms/ models/
methods of the Fault Tolerance and Rerouting currently
available.
▪ Comparison between existing algorithms/ models based on
their efficiency and methodology, complexity.
▪ Analysis of pros and cons of different Fault Tolerance and
Rerouting methods exist in the literature.
▪ Criteria for evaluating the performance factors.
▪ Creation of new algorithms/ models which removes
drawbacks of existing methods
EXPECTED OUTCOMES
▪ Implementation model for proposed work.
▪ Complete analysis of various factors affecting performances of
fault tolerance algorithm.
▪ Implementation/ simulation of newly developed algorithms/
models/ methods.
▪ Comparison of newly developed algorithms/ models/ methods
with the existing algorithms/ models/ methods.
▪ Testing & maintenance of the newly developed algorithms/
models Necessary optimization models to be designed and / or
simulated.
▪ Experiments with real world networks are reported to
demonstrate the optimality of the algorithm / model / methods.
BIBLIOGRAPHY
[1] R. Aggarwal, D. Papadimitriou, and S. Y. (Eds.). Extensions to RSVP-TE for point to multipoint
TE LSPs. IETF Draft, April 2005.
[2] G. Ahn, J . Jang, and W. Chun. An efficient rerouting scheme for MPLS-based recovery and its
performance evaluation. Telecommunication Systems, pages 481-495, 2002.
[3] D. Awduche, L. Berger, D. Gan, T. Li, V. Srinivasan, and G. Swallow. RSVP-TE: Extensions to
RSVP for LSP tunnels. IETF RFC 3209, December 2001.
[4] R. Bartog and M. Raman. A heuristic approach t o service restoration in MPLS networks. In IEEE
International Conference on Communications, ICC 2001, volume 1, pages 117-121, June 2001.
[5] R. Braden, L. Zhang, S. Berson, S. Herzog, and S. Jamin. Resource reservation protocol (RSVP)
- version 1 functional specification. IETF RFC 2205, September 1997.
[6] A. Dana, A. K. Zadeh, K. Badie, M. E. Kalantari, and N. Reyhani. LSP restoration in MPLS
network using case-based reasoning approach. In Proceedings of ICCT2003, pages 462-468,
2003.
[7] W. D. Grover and D. Stamatelakis. Cycle-oriented distributed preconfiguration: Ring-like speed
with mesh-like capacity for self-planning network restoration. In Proceedings of IEEE ICC'98,
pages 537-543, Atlanta, Georgia, June 1998.
[8] D.-K. Hong, C. S. Hong, and Dongsik-Yun. A hierarchical restoration scheme with dynamic
adjustment of restoration scope in an MPLS network. In Network Operations and Management
Symposium, pages 191-204, April 2004.
[9] C. Huang, V. Sharma, K. Owens, and S. Makam. Building reliable MPLS networks using a path
protection mechanism. IEEE Communications Magazine, pages 156 - 162, March 2002.
[10] J . Kang and M. J. Reed. Bandwith protection in MPLS networks using p-cycle structure. In
Design of Reliable Communication Networks (DRCN) 2003, pages 356-362, Banff, Alberta,
Canada, October 2003.
BIBLIOGRAPHY
[11] S.-Y. Kim. Effect of load distribution in path protection of MPLS. International Journal of
Communication Systems, 16(4):321-335, February 2003.
[12] M. Kodialam and T. V. Lakshman. Dynamic routing of locally restorable bandwidth guaranteed
tunnels using aggregated link usage information. In Proceedings of IEEE INFOCOM 2001, pages
376-385, April 2001.
[13] M. Kodialam and T. V. Lakshman. Restorable dynamic quality of service routing. IEEE
Communications Magazine, pages 72-81, June 2002.
[14] H. Mellah and A. F. Mohamed. Local path protection/restoration in MPLS-based networks. In the
9th Asia-Pacific Conference on Communications- APCC 2003, volume 2, pages 620-622,
September 2003.
[15] M. Menth, J. Milbrandt, and A. Reifert. End-to-end protection switching mechanisms for MPLS
networks. Technical Report 320, University of Wurzburg, Institute of Computer Science, February
2004.
[16] P. Pan, G. Swallow, and A. A. (Eds.). Fast reroute extensions to RSVP-TE for LSP tunnels. IETF
RFC 4090, May 2005.
[17] P.-K. Park, H.-S. Yoon, S. C. Kim, J . Park, and S. Yang. Design of a dynamic path protection
mechanism in MPLS networks. In The 6th International Conference on Advanced Communication
Technology, volume 2, pages 857-861, 2004.
[18] C. Qiao and D. Xu. Distributed partial information management (DPIM) schemes for survivable
networks – part I. In Proceedings of IgEE INFOCOM 2002, pages 302 -311, 2002.
BIBLIOGRAPHY CONT…
[19] V. Sharma, F. Hellstrand, B. Mack-Crane, S. Makam, K. Owens, C. Huang, J. Weil, B. Cain, L.
Anderson, B. Jamoussi, A. Chiu, and S. Civanlar. Framework for multi-protocol label switching
(MPLS)-based recovery. IETF RFC 3469, February 2003.
[20] D. Stamatelakis and W. D. Grover. IP layer restoration and network planning based on virtual
protection cycles. IEEE Journal on Selected Areas in Communications, 18(10):1938-1949, October
2000.
[21] D. Xu, Y. Xiong, , and C. Qiao. Novel algorithms for shared segment protection. IEEE Journal on
Selected Areas in Communication, 21(8): 1320-1331, 2003.
[22] E. Yetginer and E. Karasan. Robust path design algorithms for traffic engineering with restoration
in MPLS networks. In Proceedings of the Seventh International Symposium on Computer and
Communications – ISCC 2002, pages 933-938, 2002.
[23] S. Yoon, H. Lee, D. Choi, Y. Kim, G. Lee, and M. Lee. An efficient recovery mechanism for MPLS-
based protection LSP. In Joint 4th IEEE International Conference on ATM (ICATM 2001), pages 75-
79, Seoul, Korea, April 2001.
[24] Weili Huang, Hongyan Guo. A Fault-Tolerant Strategy for Multicasting in MPLS Networks.
International Conference on Computer Engineering and Technology (ICCET 2009), Vol. 1, pages
432-435, 2009.
[25] S Sae Lor, R Landa, and M Rio. A New Technique for Full Fast Recovery in Hop-by-Hop Routing. In
London Communications Symposium 2009.
[26] Jenhui Chen , Chung-Ching Chiou and Shih-Lin Wu. A Fast Path Recovery Mechanism for MPLS
Networks. In Networking - ICN 2005, LNCS 3421, pages 58-65, 2005.
[27] Sahel Alouneha, Anjali Agarwal and Abdeslam En-Nouaary. A novel path protection scheme for
MPLS networks using multi-path routing. In Computer Networks Volume 53, Issue 9, Pages 1530-
1545, 25 June 2009.
BIBLIOGRAPHY CONT…
[28] Lin, J.-W., Liu, H.-Y. Redirection based recovery for MPLS network systems. J. Syst. Software
(2009).
[29] Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le Roux. PLR-based heuristic for backup path
computation in MPLS networks. Computer Networks, Volume 53, pages 1467–1479, 2009.
[30] Ravindra Kumar Singh, Kanak Saxena and Reena Singh. Traffic Aware LSP Selection Method in
MPLS Networks. In Springer LNCS for International Conference on Recent Trends in Business
Administration and Information Processing 2010. Trivandrum, India
MPLS.pptx

More Related Content

Similar to MPLS.pptx

VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
Ahmad Atta
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
MPLS-jpl.ppt
MPLS-jpl.pptMPLS-jpl.ppt
MPLS-jpl.ppt
demon667714
 
MPLS QoS.pptx
MPLS QoS.pptxMPLS QoS.pptx
MPLS QoS.pptx
ekurdiaeid
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing project
vishal sharma
 
V25112115
V25112115V25112115
V25112115
IJERA Editor
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
Atakan ATAK
 
2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospf
Adi Nugroho
 
yun-MPLS.ppt
yun-MPLS.pptyun-MPLS.ppt
yun-MPLS.ppt
ssuserd0c720
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
Jay Patel
 
MPLS-extra.ppt
MPLS-extra.pptMPLS-extra.ppt
MPLS-extra.ppt
SidharthSharma546629
 
MPLS_SDN.pdf
MPLS_SDN.pdfMPLS_SDN.pdf
MPLS_SDN.pdf
mohamed590260
 
Mikrotik load balansing
Mikrotik load balansingMikrotik load balansing
Mikrotik load balansing
Кирилл Кекер
 
Advanced networking scheduling and QoS part 2
Advanced networking scheduling and QoS part 2Advanced networking scheduling and QoS part 2
Advanced networking scheduling and QoS part 2
GIST (Gwangju Institute of Science and Technology)
 
MPLS
MPLSMPLS
Segment Routing- Pre.pptx
Segment Routing-  Pre.pptxSegment Routing-  Pre.pptx
Segment Routing- Pre.pptx
ssuser0b261d2
 
Mpls hacking security Myth
Mpls hacking security MythMpls hacking security Myth
Mpls hacking security Myth
idsecconf
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
Nitin Gehlot
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
CSCJournals
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
smita gupta
 

Similar to MPLS.pptx (20)

VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
SEGMENT Routing
SEGMENT RoutingSEGMENT Routing
SEGMENT Routing
 
MPLS-jpl.ppt
MPLS-jpl.pptMPLS-jpl.ppt
MPLS-jpl.ppt
 
MPLS QoS.pptx
MPLS QoS.pptxMPLS QoS.pptx
MPLS QoS.pptx
 
ISP core routing project
ISP core routing projectISP core routing project
ISP core routing project
 
V25112115
V25112115V25112115
V25112115
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospf
 
yun-MPLS.ppt
yun-MPLS.pptyun-MPLS.ppt
yun-MPLS.ppt
 
Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
MPLS-extra.ppt
MPLS-extra.pptMPLS-extra.ppt
MPLS-extra.ppt
 
MPLS_SDN.pdf
MPLS_SDN.pdfMPLS_SDN.pdf
MPLS_SDN.pdf
 
Mikrotik load balansing
Mikrotik load balansingMikrotik load balansing
Mikrotik load balansing
 
Advanced networking scheduling and QoS part 2
Advanced networking scheduling and QoS part 2Advanced networking scheduling and QoS part 2
Advanced networking scheduling and QoS part 2
 
MPLS
MPLSMPLS
MPLS
 
Segment Routing- Pre.pptx
Segment Routing-  Pre.pptxSegment Routing-  Pre.pptx
Segment Routing- Pre.pptx
 
Mpls hacking security Myth
Mpls hacking security MythMpls hacking security Myth
Mpls hacking security Myth
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 

Recently uploaded

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 

Recently uploaded (20)

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 

MPLS.pptx

  • 1. ENHANCING FAULT TOLERANCE AND REROUTING STRATEGIES IN MPLS NETWORKS Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal Supervisor Dr. Kanak Saxena Professor Department of Computer Applications Samrat Ashok Technological Institute Vidisha (M.P.) Research Scholar Ravindra Kumar Singh *
  • 2. MULTI-PROTOCOL LABEL SWITCHING GOALS OF MPLS ▪ Scalability of network layer routing. ▪ Using labels as a means to aggregate forwarding information, while working in the presence of routing hierarchies. ▪ Greater flexibility in delivering routing services. ▪ Using labels to identify particular traffic which are to receive special services, e.g. QoS. ▪ Increased performance. ▪ Using the label-swapping paradigm to optimize network performance.
  • 3. GOALS OF MPLS CONT… ▪ Simplify integration of routers with cell switching based technologies. ▪ Making cell switches behave as routers. ▪ By making information about physical topology available to network layer routing procedures.
  • 4. MULTI-PROTOCOL LABEL SWITCHING INTRODUCTION TO MPLS ▪ MPLS improves internet scalability by eliminating the need for each router and switch in a packet's path to perform traditionally redundant address lookups and route calculation. ▪ Improves scalability through better traffic engineering. ▪ MPLS also permits explicit backbone routing, which specifies in advance the hops that a packet will take across the network. ▪ This should allow more deterministic, or predictable, performance that can be used to guarantee QoS. ▪ These paths function at layer 3 or can even be mapped directly to layer 2 transport such as ATM or frame relay.
  • 5. INTRODUCTION TO MPLS CONT… ▪ Explicit routing will give IP traffic a semblance of end-to- end connections over the backbone. ▪ The MPLS definition of IP QoS parameters is limited. ▪ Out of 32 bits total, an MPLS label reserves just three bits for specifying QoS. ▪ Label-switching routers (LSRs) will examine these bits and forward packets over paths that provide the appropriate QoS levels. But the exact values and functions of these so- called 'experimental bits‘ remain to be defined. ▪ The MPLS label could specify whether traffic requires constant bit rate (CBR) or variable bit rate (VBR) service, and the ATM network will ensure that guarantees are met.
  • 7. MULTI-PROTOCOL LABEL SWITCHING LABELS ▪ A label is short, fixed length physically continuous identifier which is used to identify a FEC ( forwarding equivalence class), usually of local significance. ▪ Ru can transmits a packet labeled L to Rd, if they can agree to a binding between label L and FEC F for packets moving from Ru to Rd. ▪ Ru (upstream LSR) → Rd (downstream LSR with respect to a given binding). ▪ L becomes Ru’s “outgoing label” representing FEC F, and L becomes rd’s “incoming label” representing FEC F. ▪ Rd must make sure that the binding from label to FEC is one-to-one.
  • 8. MULTI-PROTOCOL LABEL SWITCHING LABELS CONT… ▪ Rd must not agree with Ru1 to bind L to FEC F1, while agreeing with some other LSR Ru2 to bind L to a different FEC F2, unless rd can always tell, when it receives a packet with incoming label L, whether the label was put on the packet by Ru1 or Ru2. L for FEC F1 L for FEC F2 Ru1 Ru2 Rd
  • 9. MULTI-PROTOCOL LABEL SWITCHING LABELED PACKET ▪ A packet into which a label has been encoded. ▪ The label resides in an encapsulation header which exists specifically for this purpose. ▪ Or the label may reside in a existing data link or network layer header. ▪ The particular encoding technique which is used must be agreed to by both the entities which encodes the label and the entity which decodes the label.
  • 10. MULTI-PROTOCOL LABEL SWITCHING LABEL DISTRIBUTION ▪ It is set of procedures by which one LSR informs another LSRs of the bindings (label/FEC) it has made. ▪ Two LSRs which use a distribution protocol to exchange label/FEC binding information are known as “label distributing peers” with respect to the binding information they exchange. ▪ There exists many different distribution protocols ( [MPLS- BGP], [MPLS-RSVP], [MPLS-RVSP-TUNNELS], [MPLS-CR-LDP]).
  • 11. IP VERSUS MPLS ▪ In IP Routing, each router makes its own routing and forwarding decisions. ▪ In MPLS: ▪ source router makes the routing decision. ▪ Intermediate routers make forwarding decisions. ▪ A path is computed and a “virtual circuit” is established from ingress router to egress router. ▪ An MPLS path or virtual circuit from source to destination is called an LSP (label switched path).
  • 12. FAULT TOLERANCE IN MPLS ▪ In MPLS two basic models are used to recover from faults ▪ Protection Switching ▪ Rerouting
  • 13. PROTECTION SWITCHING AND REROUTING ▪ Rerouting ▪ On-demand recovery – no preset backup paths. ▪ Example: existing recovery in IP networks. ▪ Protection ▪ Pre-determined recovery – backup paths “in advance”. ▪ Primary and backup are provisioned at the same time. ▪ IP supports rerouting . ▪ Because it is datagram service. ▪ MPLS supports rerouting as well as protection. ▪ Because it is virtual-circuit service.
  • 14. REROUTING IN IP NETWORKS ▪ In traditional IP, what happens when a link or node fails? ▪ Failure information needs to be disseminated in the network. ▪ During this time, packets may go in loops. ▪ Rerouting latency is in the order of seconds. ▪ We look for protection possibilities in an MPLS network, but… ▪ First we need to look at the QoS requirements
  • 15. QoS REQUIREMENTS ▪ Bandwidth Guaranteed Primary Paths ▪ Bandwidth Guaranteed Backup Paths ▪ BW remains provisioned in case of network failure ▪ Minimal “Protection or rerouting Latency” ▪ Protection/rerouting latency is the time that elapses between: ▪ “the occurrence of a failure”, and ▪ “the diversion of network traffic on a new path” rerouting is generally SLOWER than protection
  • 16. PROTECTION IN MPLS ▪ First we define Protection level. ▪ Path protection ▪ Also called end-to-end protection. ▪ For each primary LSP, a node-disjoint backup LSP is set up. ▪ Upon failure, ingress node diverts traffic on the backup path. ▪ Local Protection ▪ Upon failure, node immediately upstream the failed element diverts the traffic on a “local” backup path. Path Protection ➔ More Latency Local Protection ➔ Less Latency
  • 17. PROTECTION IN MPLS CONT… PATH PROTECTION S 1 2 3 D Primary Path Backup Path This type of “path Protection” still takes 100s of ms. We may explore “Local Protection” to quickly switch onto backup paths!
  • 18. PROTECTION IN MPLS CONT… LOCAL PROTECTION: FAULT MODELS A B C D Link Protection A B C D A B C D Node Protection Element Protection
  • 19. PROTECTION IN MPLS CONT… PROTECTION MODES ▪ 1+1 protection ▪ Flow sent on two separate disjoint paths ▪ Receiver responsible for choosing one of the two ▪ 1:1 protection ▪ A backup path protects a single LSP (or a portion of a single LSP) ▪ N:1 protection ▪ A backup path protects one link or one node or both ▪ Overlapping portions of many LSPs are protected by a single backup path ▪ Applicable for local protection only ▪ N:M protection (M<N)
  • 20. COST OF THE BACKUP PATH ▪ Local Protection requires that backup paths are setup in advance ▪ Upon failure, traffic is promptly switched onto preset backup paths. ▪ Bandwidth must be reserved for all backup paths ▪ This results in a reduction in the number of Primary LSPs that can otherwise be placed on the network. ▪ Can we reduce the amount of “backup bandwidth” but still provide guaranteed backups?
  • 21. MOTIVATION FOR THE RESEARCH ▪ We First look to answer the following questions: ▪ Who computes the primary path? ▪ What is the fault model (link, node, or element protection)? ▪ Where do the backup paths originate? ▪ Who computes the backup path? ▪ At what point do the backup paths merge back with the primary path? ▪ What information is stored locally in the nodes/routers? ▪ What information is propagated through routing protocols? ▪ What if a primary path can not be fully protected?
  • 22. MOTIVATION FOR THE RESEARCH CONT… ▪ Then we try to solve the following unsolved problems and hence motivations: ▪ How can we reduce the amount of “backup bandwidth” but still provide guaranteed backups? Thus maximizing the bandwidth sharing. ▪ How to increase the maximum number of primary LSPs that can be placed on the network? ▪ How to maintain the survivability of network by recovering from failure with in the acceptable delay and minimum packet loss while efficiently utilizing the network resources?
  • 23. MOTIVATION FOR THE RESEARCH CONT… ▪ How to enhance the fault-tolerance performance without affecting the fault free traffic? ▪ How to solve the packet disorder problem while rerouting the affected traffic?
  • 24. RELATED WORK ▪ Jenhui Chen et al. in [26] proposed a fast path recovery mechanism, which employs the Enhanced Interior Gateway Routing Protocol (EIGRP) and the Diffusing Update Algorithm (DUAL) together, to find the working and backup paths simultaneously and modify the LDP to establish the LSP by using the routing table of EIGRP. ▪ S Sae Lor et al. in [25] proposed a novel technique for fast re-route in hop-by-hop routing in case of single link failures. It offers full repair coverage without requiring additional mechanisms such as tunneling or interface-specific operations. The technique handles the failures without jeopardizing the operable parts of a network. ▪ Sahel Alouneh et al. in [27] present a novel approach for fault tolerance in MPLS networks using a modified (k, n) threshold sharing scheme with multi-path routing.
  • 25. RELATED WORK CONT… ▪ Jenn-Wei Lin et al. in [28] enhanced the fault-tolerant performance of the two recovery mechanisms (protection switching and rerouting). The proposed approach utilizes the failure free LSPs to transmit the traffic of the failed LSP (the affected traffic). ▪ Ravindra Kumar Singh et al. in [30] proposed a new algorithm for an optimum LSP pair selection from multiple parallel LSP pairs. It minimizes the probability of network congestion, packet loss and request loss by selecting the LSP which is lightly loaded and possess upward and downward bandwidth proportional to the service request.
  • 26. RESEARCH METHODOLOGY ▪ Survey of literature, Study of various algorithms/ models/ methods of the Fault Tolerance and Rerouting currently available. ▪ Comparison between existing algorithms/ models based on their efficiency and methodology, complexity. ▪ Analysis of pros and cons of different Fault Tolerance and Rerouting methods exist in the literature. ▪ Criteria for evaluating the performance factors. ▪ Creation of new algorithms/ models which removes drawbacks of existing methods
  • 27. EXPECTED OUTCOMES ▪ Implementation model for proposed work. ▪ Complete analysis of various factors affecting performances of fault tolerance algorithm. ▪ Implementation/ simulation of newly developed algorithms/ models/ methods. ▪ Comparison of newly developed algorithms/ models/ methods with the existing algorithms/ models/ methods. ▪ Testing & maintenance of the newly developed algorithms/ models Necessary optimization models to be designed and / or simulated. ▪ Experiments with real world networks are reported to demonstrate the optimality of the algorithm / model / methods.
  • 28. BIBLIOGRAPHY [1] R. Aggarwal, D. Papadimitriou, and S. Y. (Eds.). Extensions to RSVP-TE for point to multipoint TE LSPs. IETF Draft, April 2005. [2] G. Ahn, J . Jang, and W. Chun. An efficient rerouting scheme for MPLS-based recovery and its performance evaluation. Telecommunication Systems, pages 481-495, 2002. [3] D. Awduche, L. Berger, D. Gan, T. Li, V. Srinivasan, and G. Swallow. RSVP-TE: Extensions to RSVP for LSP tunnels. IETF RFC 3209, December 2001. [4] R. Bartog and M. Raman. A heuristic approach t o service restoration in MPLS networks. In IEEE International Conference on Communications, ICC 2001, volume 1, pages 117-121, June 2001. [5] R. Braden, L. Zhang, S. Berson, S. Herzog, and S. Jamin. Resource reservation protocol (RSVP) - version 1 functional specification. IETF RFC 2205, September 1997. [6] A. Dana, A. K. Zadeh, K. Badie, M. E. Kalantari, and N. Reyhani. LSP restoration in MPLS network using case-based reasoning approach. In Proceedings of ICCT2003, pages 462-468, 2003. [7] W. D. Grover and D. Stamatelakis. Cycle-oriented distributed preconfiguration: Ring-like speed with mesh-like capacity for self-planning network restoration. In Proceedings of IEEE ICC'98, pages 537-543, Atlanta, Georgia, June 1998. [8] D.-K. Hong, C. S. Hong, and Dongsik-Yun. A hierarchical restoration scheme with dynamic adjustment of restoration scope in an MPLS network. In Network Operations and Management Symposium, pages 191-204, April 2004. [9] C. Huang, V. Sharma, K. Owens, and S. Makam. Building reliable MPLS networks using a path protection mechanism. IEEE Communications Magazine, pages 156 - 162, March 2002. [10] J . Kang and M. J. Reed. Bandwith protection in MPLS networks using p-cycle structure. In Design of Reliable Communication Networks (DRCN) 2003, pages 356-362, Banff, Alberta, Canada, October 2003.
  • 29. BIBLIOGRAPHY [11] S.-Y. Kim. Effect of load distribution in path protection of MPLS. International Journal of Communication Systems, 16(4):321-335, February 2003. [12] M. Kodialam and T. V. Lakshman. Dynamic routing of locally restorable bandwidth guaranteed tunnels using aggregated link usage information. In Proceedings of IEEE INFOCOM 2001, pages 376-385, April 2001. [13] M. Kodialam and T. V. Lakshman. Restorable dynamic quality of service routing. IEEE Communications Magazine, pages 72-81, June 2002. [14] H. Mellah and A. F. Mohamed. Local path protection/restoration in MPLS-based networks. In the 9th Asia-Pacific Conference on Communications- APCC 2003, volume 2, pages 620-622, September 2003. [15] M. Menth, J. Milbrandt, and A. Reifert. End-to-end protection switching mechanisms for MPLS networks. Technical Report 320, University of Wurzburg, Institute of Computer Science, February 2004. [16] P. Pan, G. Swallow, and A. A. (Eds.). Fast reroute extensions to RSVP-TE for LSP tunnels. IETF RFC 4090, May 2005. [17] P.-K. Park, H.-S. Yoon, S. C. Kim, J . Park, and S. Yang. Design of a dynamic path protection mechanism in MPLS networks. In The 6th International Conference on Advanced Communication Technology, volume 2, pages 857-861, 2004. [18] C. Qiao and D. Xu. Distributed partial information management (DPIM) schemes for survivable networks – part I. In Proceedings of IgEE INFOCOM 2002, pages 302 -311, 2002.
  • 30. BIBLIOGRAPHY CONT… [19] V. Sharma, F. Hellstrand, B. Mack-Crane, S. Makam, K. Owens, C. Huang, J. Weil, B. Cain, L. Anderson, B. Jamoussi, A. Chiu, and S. Civanlar. Framework for multi-protocol label switching (MPLS)-based recovery. IETF RFC 3469, February 2003. [20] D. Stamatelakis and W. D. Grover. IP layer restoration and network planning based on virtual protection cycles. IEEE Journal on Selected Areas in Communications, 18(10):1938-1949, October 2000. [21] D. Xu, Y. Xiong, , and C. Qiao. Novel algorithms for shared segment protection. IEEE Journal on Selected Areas in Communication, 21(8): 1320-1331, 2003. [22] E. Yetginer and E. Karasan. Robust path design algorithms for traffic engineering with restoration in MPLS networks. In Proceedings of the Seventh International Symposium on Computer and Communications – ISCC 2002, pages 933-938, 2002. [23] S. Yoon, H. Lee, D. Choi, Y. Kim, G. Lee, and M. Lee. An efficient recovery mechanism for MPLS- based protection LSP. In Joint 4th IEEE International Conference on ATM (ICATM 2001), pages 75- 79, Seoul, Korea, April 2001. [24] Weili Huang, Hongyan Guo. A Fault-Tolerant Strategy for Multicasting in MPLS Networks. International Conference on Computer Engineering and Technology (ICCET 2009), Vol. 1, pages 432-435, 2009. [25] S Sae Lor, R Landa, and M Rio. A New Technique for Full Fast Recovery in Hop-by-Hop Routing. In London Communications Symposium 2009. [26] Jenhui Chen , Chung-Ching Chiou and Shih-Lin Wu. A Fast Path Recovery Mechanism for MPLS Networks. In Networking - ICN 2005, LNCS 3421, pages 58-65, 2005. [27] Sahel Alouneha, Anjali Agarwal and Abdeslam En-Nouaary. A novel path protection scheme for MPLS networks using multi-path routing. In Computer Networks Volume 53, Issue 9, Pages 1530- 1545, 25 June 2009.
  • 31. BIBLIOGRAPHY CONT… [28] Lin, J.-W., Liu, H.-Y. Redirection based recovery for MPLS network systems. J. Syst. Software (2009). [29] Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le Roux. PLR-based heuristic for backup path computation in MPLS networks. Computer Networks, Volume 53, pages 1467–1479, 2009. [30] Ravindra Kumar Singh, Kanak Saxena and Reena Singh. Traffic Aware LSP Selection Method in MPLS Networks. In Springer LNCS for International Conference on Recent Trends in Business Administration and Information Processing 2010. Trivandrum, India