SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal Volume 1, NumberEngineering (IJCET), ISSN 0976 – 6367(Print),
  International Journal of Computer Engineering and Technology
                             of Computer 1, May -June (2010), © IAEME
  ISSN 0976 – 6375(Online)
and Technology (IJCET), ISSN 0976 – 6367(Print)                            IJCET
ISSN 0976 – 6375(Online) Volume 1                                       ©IAEME
Number 1, May - June (2010), pp. 92-102
© IAEME, http://www.iaeme.com/ijcet.html


     SHARED BANDWIDTH RESERVATION OF BACKUP
   PATHS OF MULTIPLE LSP AGAINST LINK AND NODE
                                      FAILURES
                                        P. Praba
                                    Research Scholar
                        Anna University of Technology Coimbatore
                                      Coimbatore -641 047

                               Dr. S. Balasubramanian
                                  Research Supervisor
                        Anna University of Technology Coimbatore
                                 Coimbatore -641 047

 ABSTRACT
        Resiliency has always been a main concern in the area of network engineering and
 maintenance. The main task of the Multi Protocol Label Switching (MPLS) recovery
 mechanism lies in controlling the traffic flow in the network and finding a backup path to
 reroute the traffic in the event of network failure. The bandwidth reserved on each link
 along the backup paths can be shared by all the affected service LSPs provided the
 protected failure points are not expected to fail simultaneously. To support backup path
 selection, some algorithms require extra information to be carried by routing and
 signaling protocols. In this paper, the efficiency of distributed bandwidth management of
 restoration backup path selection algorithms used for additional information distribution
 and collection are analyzed.
 INTRODUCTION
           As service providers move all their applications to IP/MPLS backbone
 networks, dynamic provisioning of bandwidth guaranteed paths with fast restoration
 capability becomes more and more crucial. In recent times, MPLS has gained a lot of
 attention due to increased restoration flexibility and high reliability for services. In MPLS
 [1], the ingress LSR encapsulates the packet with labels and forwards the packets along


                                              92
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME


label switched paths (LSPs). These LSPs behave like virtual traffic trunks to carry the
flow aggregates belonging to same “forwarding equivalence classes”. The flow
aggregates when combined with explicit routing of bandwidth guaranteed LSPs enables
service providers to traffic engineer their networks [2] and to dynamically provision
bandwidth guaranteed paths. Fast restoration allows backup paths to be setup
simultaneously with the active path thus ensures quick restoration of a LSP upon failure
        Recently there has been a great deal of work addressing restoration functionality
and schemes in IP/MPLS networks [3]–[6], [11]–[14], [16] as well as how to manage
restoration bandwidth among network and select optimized restoration paths [7]–[10].
However, all of them deal with path-based end-to-end LSP restoration and routing
protocol fast re-convergence [13], [14]. When MPLS restoration times must be
comparable to SONET restoration times, the MPLS local restoration [2] is a faster
alternative to path restoration. Local restorability means that upon a link or node failure,
the first node upstream from the failure must be able to switch the path to an alternate
preset outgoing link so that path continuity with bandwidth guarantees is restored by a
strictly local decision. Local restoration implies that to successfully route a path set-up
request, an active path and a bypass backup path for every link and node used by the
active path must be determined. The best related paper is [6], which deals with backup
bandwidth sharing for local restoration. Since the backup LSPs are pre-established, even
though they do not consume bandwidth before failure happens, the network has to reserve
enough restoration bandwidth to guarantee the LSP restoration for any failure. Without
bandwidth sharing among backup LSPs for different service LSPs, the network may need
to reserve much more bandwidth on its links than necessary
        Internet Engineering Task Force (IETF) has published RFC 4090 [2] to address
the necessary signaling extensions for supporting MPLS fast reroute, and how to use path
merging technique to share the bandwidth on common links among backup paths of the
same service LSP. However, no solution is provided on how to share bandwidth among
backup paths of different service LSPs so far. The restoration models considered in this
paper is based on the observation that the restoration bandwidth can be shared by
multiple backup LSPs so long as their protected service LSP path segments are not
susceptible to simultaneous failure[6], [8], [10], [21], [22].


                                                 93
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME


        This paper discusses the efficiency of distributed bandwidth management of
restoration path selection algorithms. This paper is organized as follows. Section II gives
an overview of the options and features of restoration models. Section III gives a review
of restoration path selection algorithms.
RESTORATION MODEL – AN OVERVIEW
A. Online Routing
     Dynamic routing of LSP segment is handled by on-line algorithms that routes both
the active path and the backup path for each link or node and simultaneously it optimizes
network resource utilization. The objective of the algorithm is to compute an active path
and a backup path for each node or link in the active path. The connection setup fails if
sufficient bandwidth is not available to setup the active path or the backup path. Only
single link or node failure is considered in this paper.
B. Restoration modes
     Two ways of restoration are end-to-end or path restoration and local restoration. In
end-to-end restoration, a disjoint backup path from the active path is provided from the
source to the destination for each request. When there is a link or node fails, the failure
information has to propagate back to the source which in turn switches all the demands to
the backup path as illustrated in Figure 1 and in Figure 2. This information propagation to
the source makes it unacceptable for many applications. In the case of local restoration,
the backup paths are setup locally and therefore failure information does not have to
propagate back to the source before connections are switched to the backup path.




 S                                           T

                                                           S                                     T
                             Primary Path
                            Backup Path                        Fault Indication Signal


    Figure 1Path Restoration                               Figure 2 Path Restoration on Link
failure



                                                 94
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME



           Backup path for the failure
           of node aand links i and j.




                S            a           b               c             T
                     i             j                            l
                                                k




                                                             Backup path for the failure
                                                             of linkl

                         Figure 3 Backup Path for Single Element Failure
         Restoration has to protect against single link or single element (node or link)
failure. The amount of resources needed to provide backup for the second mode will be
greater since a node failure results in multiple link failures. In the single link failure,
when a link fails, the two nodes that are at the end point of the link detect the failures,
and they immediately switch all the demands on to the backup path. In a single element
failure model, when a node fails assume that all the links incident on this node fails. This
is detected as in the link failure case and the demands are routed across the failed node.
The algorithms discussed in this paper can handle all single link and node failures and
does not provide a backup if the source or the destination of the traffic fails as illustrated
in Figure 3
C. Shared Reservation
         A protected LSP in a MPLS network has an active path and bandwidth reserved
along the backup paths for each link or node along the active path. The bandwidth
reserved on each link along the backup paths can be shared across multiple backup paths
of the same LSP and multiple backup paths of the different LSPs provided the protected
failure points are not expected to fail simultaneously. This type of bandwidth sharing is
referred to as Inter-demand sharing and intra-demand sharing.




                                                    95
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME


        The design objective is that the bandwidth reserved on the backup paths must be
sufficient to recover all affected service LSPs in the event of any link/node failure. Fig. 4
shows a simple example illustrating a shared reservation, which comes from [7]. The
figure shows a network with 6nodes and 7 links. Suppose LSP 1 request asking for one
unit of bandwidth from A to B arrives at node A. Node A selects A-B for the service path
and A-C-D-B for the backup path. When these LSPs are established, one unit of
bandwidth is allocated on link AB, and one unit of bandwidth is reserved on each of links
AC, CD, DB. Subsequently, another protected LSP 2 request asking one unit bandwidth
from E to F arrives at node E. Node E selects E-F for the service path and E-C-D-F for
the restoration path. In this example, when setting up the protected LSP, it is unnecessary
to reserve an additional unit of bandwidth on link CD because the two service paths AB
and EF are failure disjoint, i.e., they are not subject to simultaneous failure under the
single failure assumption. Thus, a total of five units of bandwidth are reserved to protect
both service paths against any single link failure whereas without shared reservations, a
total of six units of bandwidth would be needed. Sharing the reserved bandwidth among
the backup paths of different protected LSPs reduces the total reserved bandwidth
required.

                                         LSP 1
                   A                                                 B


                                       Backup Path

                                   C                  D


                                        Backup Path


                   E                                                 F
                                        LSP 2


                         Figure 4 Shared Reservation Example

D. Partial and Complete Routing Information
        In MPLS networks, a link state routing protocol, such as Open Shortest Path First
protocol (OSPF) or Intermediate System-Intermediate System protocol (IS-IS), is used to



                                                 96
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME


distribute network topology information to each node in a particular network routing
domain. Traditionally, these protocols have only propagated link up/down status among
the nodes. To support path computation in MPLS networks, both OSPF and IS-IS have
been extended to propagate additional information about each link, such as available
bandwidth, bandwidth in service, etc. [17], [18]. The following link state information is
flooded by the routing protocol, which is the so-called partial information from paper[8].
Note that these information are distributed via OSPF/IS-IS traffic engineering extensions.
    1)     Reserved bandwidth R[e]: This bandwidth is not used on unidirectional link
    when the network is in a non-failure condition, but may be used by the restoration
    process upon failure;
    2) Available bandwidth A[e]: This bandwidth is free to be allocated to service
    bandwidth or reserved bandwidth as new LSP requests arrive. Note that the total
    bandwidth on unidirectional link e is R[e]+A[e]+S[e] where S[e] is total consumed
    bandwidth for service paths on link. The three types of bandwidth share a common
    bandwidth pool;
    3) Administrative weight W[e]: This quantity is set by the network operator and may
    be used as a measure of the heuristic “cost” to the network. A path with a smaller
    total weight is typically preferable.
    This information is used to select the service path for each LSP request. However, to
support backup path selection, some algorithms require extra information to be carried by
routing and signaling protocols [7], [10]. There are three possible scenarios based on the
information available to the routing algorithm to achieve maximum bandwidth sharing in
the backup paths.
    The first scenario that we consider is what we call the no information scenario. In this
case, we assume that the only information that the routing algorithm has about the
network is the residual (available) bandwidth on each link. In this scenario, for each link
the amount of bandwidth utilized separately by the active and the backup paths is not
known. Only the total used bandwidth is known.
In the second scenario, we assume that that the routing algorithm has complete
information, i.e., it knows the routes for the active and backup paths of all the
connections currently in progress.


                                                 97
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME


     In the third partial information scenario, the information available to the routing
algorithm is slightly more than that in the no information scenario. The additional
information in this scenario is that for each link instead of knowing only the total
bandwidth usage, we now separately know the total bandwidth used by active paths, and
the total bandwidth used by backup paths.
FAST RESTORATION ALGORITHMS
        MPLS fast reroute is a relatively new scheme and it is still undergoing IETF
standardization process [2]. The internet draft [2] focus on the fast reroute scheme
definition and backup establishment signaling protocol, which leaves how to select the
backup paths and implementation open for vendor/carrier innovation. Much work has
been done on end-to-end and segment shared backup path selection, but few papers have
been published on MPLS fast reroute backup path selection. The basic idea of backup
path sharing and backup path control message carrying service path information has been
used before [3], [22], but both apply for end-to-end backup path sharing only. A practical
algorithm should maximize restoration bandwidth sharing among the backup paths of the
same or different service paths without scarifying performance and scalability.
        Papers [6][8] classified the routing information model as minimal information,
partial information and complete information in end-to-end restoration. In [6], a few
algorithms to compute backup paths for link/node failure on the service path with the
goal of maximizing backup bandwidth sharing were presented.
        The key idea of [6] is that restoration problems can be formulated as integer
programming problems and thus uses heuristic algorithm to solve it. The cost of backup
paths can be determined by solving shortest path problems, one for each link in the
network.Let      be the cost of using link (u, v) on the backup path if link (i, j) is used in
the active path. Fij represent the total amount of bandwidth reserved for the demand that
use (i, j) on the active path and Guv represent the total amount of bandwidth reserved for
the demand that use (u, v) on the backup path. For a current demand of b units of
bandwidth is defined as




                                                 98
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME


                 0   if Fij + b   Guv and
                                  (i, j) (u,v)
    = Fij + b – Guv      if Fij + b > Guv and Ruv Fij + b – Guv and
                                  (i, j) (u,v)
                                  Otherwise

        The backup for link (i, j) can start at node i but can end at any node on the path
from j to t. This case is handled by executing shortest path algorithm backwards starting
at the sink. To maintain intra domain sharing, each node maintains a m-vector                    that
gives the amount of bandwidth reserved for the current demand for backing up all the
links from the given node to the destination.Modifying the cost of the links in the
computation of the backup costs can be used to account for node failures. Cost of using
link (u, v) for partial information case is defined as

                 0                if        Fij + b Guv and
                                          (i, j) (u,v)
   =           Fij + b – Guv      if       Fij + b > Guv and Ruv Fij + b – Guv and
                                          (i, j) (u,v)
                                          Otherwise

         However, their algorithms assume partial aggregated information and complete
information [6] available. Also papers [6], [8] find that complete information model is
able to achieve optimized backup selection but the complete information dissemination
may not be scalable. Thus, complete information model fits for centralized algorithm.
Partial information can be easily collected via current routing information extension.
Thus, partial information model fits for distributed algorithm.
        A distributed algorithm for complete information model to MPLS fast reroute has
been proposed by [15]. The distributed bandwidth management method assumes the use
of RSVP-TE extensions [19] instead of routing protocol to collect extra information and
achieves restoration bandwidth sharing among the backup paths of different service paths
independent of the backup path selection algorithm. (CR-LDP) [20] also requires similar
extensions. The paper also designed internal node data structure and described how to
maintain those data structure at each node during LSP creation and deletion. This scheme
scales well due to two facts: (1) it does not require each LSR to maintain detailed
information on each LSP’s service path and restoration paths. Only two arrays, i.e.,


                                                 99
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME


                    and                     , are maintained at each node.                       is
maintained by the responsible node of each unidirectional link along a backup path to
keep track of the bandwidth on         that has been reserved to protect against the failure      ,
which will be updated during the signaling process of LSP creation and deletion.

                 is maintained by the responsible node of each failure along a service path
to keep track of the bandwidth on          that has been reserved to protect against the failure
itself. Then the sharable restoration bandwidth on each unidirectional link           would be



        Where                        is a conflict matrix that represents the amount of traffic
that will be rerouted on unidirectional link when failure occurs. The first of                   is
disseminated via routing protocol exchange. To distribute and collect the second part
information, three new signaling messages: TELL, ASK and REPLY were added. Then
the algorithm will reset link weights based on                             and select the disjoint
shortest path as the restoration path, where           is bandwidth requirement of the traffic
request. Similar idea has been applied in [7], [10], which assumed end-to-end shared
mesh restoration.
CONCLUSION
        We analyzed the problem of fast local restoration that requires efficient
distributed bandwidth management to setup bypass path for every node or link traversed
by the service path. The objective of routing messages or signaling extensions is to
manage the bandwidth usage for each connection and to optimize the use of network
resources while protecting against single link or node failure. Approaches based on
efficient distributed routing and signaling protocols were compared. And we conclude
that significant cost savings could be achieved through sharing of bandwidth among
backup paths of different service LSPs
REFERENCES
[1]    Rosen et al., “Multiprotocol Label Switching Architecture”, IETFRFC 3031, 2001.
[2]   P. Pan, G. Swallow, and A. Atlas, “Fast Reroute Extensions to RSVP-TE for LSP
      Tunnels”, IETF RFC 4090, 2005.



                                                100
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME


[3]   S. Kiniet al., “Shared Backup Label Switched Path Restoration”, IETFInternet draft,
      work in progress, May 2001.
[4]   V. Sharma and F. Hellstrand, “Framework for Multi-Protocol Label Switching
      MPLS-Based Recovery”, IETF RFC 3469, 2003.
[5]   C. Gruber, “Bandwidth requirements of MPLS protection mechanisms”,7th
      INFORMS TELECOM, Boca Raton, FL, 2004.
[6]   M. Kodialam and T. Lakshman, “Dynamic routing of locally restorable bandwidth
      guaranteed tunnels using aggregated link usage information”, IEEE INFOCOM,
      2001.
[7]   Li, D.Wang, C. Kalmanek, and R. Doverpike, “Efficient distributed path selection
      for shared restoration connections”, IEEE/ACM Transactions on Networking, vol.
      11, no. 5, pp. 761–771, October 2003.
[8]   M. Kodaliam and T. Lakshman, “Dynamic routing of bandwidth guaranteed tunnels
      with restoration”, IEEE INFOCOM 2000.
[9]   Y. Liu, D. Tipper, and P. Siripongwutikorn, “Approximating optimal space capacity
      allocation by successive survivable routing”, IEEEINFOCOM 2001.
[10] C. Qiao and D. Xu, “Distributed Partial Information Management(DPIM) for
      survivable networks”, INFOCOM 2002.
[11] R. Doverspike and J. Yates, “Challenges for MPLS in optical network restoration”,
      IEEE Communication Magazine, February 2001.
[12] Y. Xiong and L. Mason, “Restoration strategies and spare capacity requirements in
      self-healing ATM networks”, IEEE/ACM Transactions on Networking., vol. 7, no.
      1, February 1999.
[13] Basuand J. Riecke, “Stability issues in OSPF routing”, ACMSIGCOMM 2001.
[14] Alaettinoglu, V. Jacobson, and H. Yu, “Towards Millisecond IGP Convergence”,
      IETF Internet draft, draft-alaettinoglu-isis-convergence-00.txt, November 2000.
[15] Dongmei Wang and Guangzhi Li, “Efficient Distributed Bandwidth Management
      for MPLS Fast Reroute”, IEEE/ACM Transactions on Networking, vol. 16, no. 2,
      April 2008.




                                                101
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print),
ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME


[16] R. Sabella, M. Settembre, G. Oriolo, F. Razza, F. Ferlito, andG. Conte, “A
      multilayer solution for path provisioning in new generation optical/MPLS
      networks” ,J. Lightw. Technol., vol. 21, no.5, pp. 1141–1155.
[17] D. Katz et al., “Traffic Engineering (TE) Extensions to OSPF Version 2”, IETF
      RFC 3630, September 2003.
[18] Smitet al., “Intermediate System to Intermediate System (IS-IS) Extensions for
      Traffic Engineering (TE)”, IETF RFC 3784, June 2004.
[19] D. Awducheet al., “RSVP-TE: Extensions to RSVP for LSP Tunnels”,
      IETFRFC3209, December 2001.
[20] J. Ash et al., “LSP Modification Using CR-LDP”, IETF RFC 3214, January 2002.
[21] P. Ho, J. Tapolcai, and H. Moufth, “On achieving optimal survivable routing for
      shared protection in survivable next-generation internet”, IEEE Trans. Reliability,
      vol. 53, no. 2, pp. 216–225, June 2004.
[22] S. Han and G. Shin, “Fast restoration of real-time communication service from
      component failure in multi-hop networks”, ACM SIGCOMM1997.




                                                102

More Related Content

What's hot

IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET Journal
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
 
IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...
IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...
IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...IRJET Journal
 
Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...eSAT Publishing House
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkIOSR Journals
 
Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...IAEME Publication
 
ISPD2016_paper_11
ISPD2016_paper_11ISPD2016_paper_11
ISPD2016_paper_11LI-DE CHEN
 
Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...
Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...
Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...CSCJournals
 
Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...LeMeniz Infotech
 
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSMMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSprj_publication
 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSIJCNCJournal
 

What's hot (17)

IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of ManetsIRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
IRJET- Energy Efficient Reactive Routing to Enhance QOS of Manets
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
 
X04505122126
X04505122126X04505122126
X04505122126
 
IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...
IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...
IRJET- A Novel Approach of Balancing Routing using Hop Selection using Cluste...
 
Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
 
mn paper
mn papermn paper
mn paper
 
Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...
 
ISPD2016_paper_11
ISPD2016_paper_11ISPD2016_paper_11
ISPD2016_paper_11
 
94
9494
94
 
Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...
Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...
Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...
 
Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...
 
218
218218
218
 
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSMMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKS
 
Gi3112131218
Gi3112131218Gi3112131218
Gi3112131218
 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
 

Viewers also liked

Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesiaemedu
 
A study on the presence of fecal pollution indicator
A study on the presence of fecal pollution indicatorA study on the presence of fecal pollution indicator
A study on the presence of fecal pollution indicatoriaemedu
 
Recent research in web page classification – a review
Recent research in web page classification – a reviewRecent research in web page classification – a review
Recent research in web page classification – a reviewiaemedu
 
An analytical study on a factors affecting employee
An analytical study on a factors affecting employeeAn analytical study on a factors affecting employee
An analytical study on a factors affecting employeeiaemedu
 
Dc dc converter for ultracapacitor boosted electric vehicle
Dc dc converter for ultracapacitor boosted electric vehicleDc dc converter for ultracapacitor boosted electric vehicle
Dc dc converter for ultracapacitor boosted electric vehicleiaemedu
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’siaemedu
 
Parallel communicating flip pushdown automata systems
Parallel communicating flip pushdown automata systemsParallel communicating flip pushdown automata systems
Parallel communicating flip pushdown automata systemsiaemedu
 
Innovative hr practices in software organization
Innovative hr practices in software organizationInnovative hr practices in software organization
Innovative hr practices in software organizationiaemedu
 
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
 

Viewers also liked (9)

Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
A study on the presence of fecal pollution indicator
A study on the presence of fecal pollution indicatorA study on the presence of fecal pollution indicator
A study on the presence of fecal pollution indicator
 
Recent research in web page classification – a review
Recent research in web page classification – a reviewRecent research in web page classification – a review
Recent research in web page classification – a review
 
An analytical study on a factors affecting employee
An analytical study on a factors affecting employeeAn analytical study on a factors affecting employee
An analytical study on a factors affecting employee
 
Dc dc converter for ultracapacitor boosted electric vehicle
Dc dc converter for ultracapacitor boosted electric vehicleDc dc converter for ultracapacitor boosted electric vehicle
Dc dc converter for ultracapacitor boosted electric vehicle
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
 
Parallel communicating flip pushdown automata systems
Parallel communicating flip pushdown automata systemsParallel communicating flip pushdown automata systems
Parallel communicating flip pushdown automata systems
 
Innovative hr practices in software organization
Innovative hr practices in software organizationInnovative hr practices in software organization
Innovative hr practices in software organization
 
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
 

Similar to Shared bandwidth reservation of backup paths of multiple

Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2IAEME Publication
 
Multiple routing configuration
Multiple routing configurationMultiple routing configuration
Multiple routing configurationIAEME Publication
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetCSCJournals
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionVaideesh Ravi Shankar
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospfAdi Nugroho
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 
Fault Tolerant Congestion based Algorithms in OBS Network
Fault Tolerant Congestion based Algorithms in OBS NetworkFault Tolerant Congestion based Algorithms in OBS Network
Fault Tolerant Congestion based Algorithms in OBS NetworkCSCJournals
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
A Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksA Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksIJERA Editor
 

Similar to Shared bandwidth reservation of backup paths of multiple (20)

Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2
 
Multiple routing configuration
Multiple routing configurationMultiple routing configuration
Multiple routing configuration
 
Traffic Engineering in Metro Ethernet
Traffic Engineering in Metro EthernetTraffic Engineering in Metro Ethernet
Traffic Engineering in Metro Ethernet
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionBenchmarking Failure Recovery Time in MPLS FRR with Link Protection
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
2004 qof is_mpls_ospf
2004 qof is_mpls_ospf2004 qof is_mpls_ospf
2004 qof is_mpls_ospf
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
Fault Tolerant Congestion based Algorithms in OBS Network
Fault Tolerant Congestion based Algorithms in OBS NetworkFault Tolerant Congestion based Algorithms in OBS Network
Fault Tolerant Congestion based Algorithms in OBS Network
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
A Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksA Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical Networks
 

More from iaemedu

Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingiaemedu
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationiaemedu
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reorderingiaemedu
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challengesiaemedu
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanismiaemedu
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cmaiaemedu
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presenceiaemedu
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineeringiaemedu
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesiaemedu
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacementiaemedu
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approachiaemedu
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentiaemedu
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationiaemedu
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyiaemedu
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryiaemedu
 
A comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining techniqueA comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining techniqueiaemedu
 

More from iaemedu (20)

Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routing
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow application
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reordering
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanism
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cma
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presence
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineering
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacement
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approach
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environment
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow application
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classify
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imagery
 
A comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining techniqueA comprehensive study of non blocking joining technique
A comprehensive study of non blocking joining technique
 

Shared bandwidth reservation of backup paths of multiple

  • 1. International Journal Volume 1, NumberEngineering (IJCET), ISSN 0976 – 6367(Print), International Journal of Computer Engineering and Technology of Computer 1, May -June (2010), © IAEME ISSN 0976 – 6375(Online) and Technology (IJCET), ISSN 0976 – 6367(Print) IJCET ISSN 0976 – 6375(Online) Volume 1 ©IAEME Number 1, May - June (2010), pp. 92-102 © IAEME, http://www.iaeme.com/ijcet.html SHARED BANDWIDTH RESERVATION OF BACKUP PATHS OF MULTIPLE LSP AGAINST LINK AND NODE FAILURES P. Praba Research Scholar Anna University of Technology Coimbatore Coimbatore -641 047 Dr. S. Balasubramanian Research Supervisor Anna University of Technology Coimbatore Coimbatore -641 047 ABSTRACT Resiliency has always been a main concern in the area of network engineering and maintenance. The main task of the Multi Protocol Label Switching (MPLS) recovery mechanism lies in controlling the traffic flow in the network and finding a backup path to reroute the traffic in the event of network failure. The bandwidth reserved on each link along the backup paths can be shared by all the affected service LSPs provided the protected failure points are not expected to fail simultaneously. To support backup path selection, some algorithms require extra information to be carried by routing and signaling protocols. In this paper, the efficiency of distributed bandwidth management of restoration backup path selection algorithms used for additional information distribution and collection are analyzed. INTRODUCTION As service providers move all their applications to IP/MPLS backbone networks, dynamic provisioning of bandwidth guaranteed paths with fast restoration capability becomes more and more crucial. In recent times, MPLS has gained a lot of attention due to increased restoration flexibility and high reliability for services. In MPLS [1], the ingress LSR encapsulates the packet with labels and forwards the packets along 92
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME label switched paths (LSPs). These LSPs behave like virtual traffic trunks to carry the flow aggregates belonging to same “forwarding equivalence classes”. The flow aggregates when combined with explicit routing of bandwidth guaranteed LSPs enables service providers to traffic engineer their networks [2] and to dynamically provision bandwidth guaranteed paths. Fast restoration allows backup paths to be setup simultaneously with the active path thus ensures quick restoration of a LSP upon failure Recently there has been a great deal of work addressing restoration functionality and schemes in IP/MPLS networks [3]–[6], [11]–[14], [16] as well as how to manage restoration bandwidth among network and select optimized restoration paths [7]–[10]. However, all of them deal with path-based end-to-end LSP restoration and routing protocol fast re-convergence [13], [14]. When MPLS restoration times must be comparable to SONET restoration times, the MPLS local restoration [2] is a faster alternative to path restoration. Local restorability means that upon a link or node failure, the first node upstream from the failure must be able to switch the path to an alternate preset outgoing link so that path continuity with bandwidth guarantees is restored by a strictly local decision. Local restoration implies that to successfully route a path set-up request, an active path and a bypass backup path for every link and node used by the active path must be determined. The best related paper is [6], which deals with backup bandwidth sharing for local restoration. Since the backup LSPs are pre-established, even though they do not consume bandwidth before failure happens, the network has to reserve enough restoration bandwidth to guarantee the LSP restoration for any failure. Without bandwidth sharing among backup LSPs for different service LSPs, the network may need to reserve much more bandwidth on its links than necessary Internet Engineering Task Force (IETF) has published RFC 4090 [2] to address the necessary signaling extensions for supporting MPLS fast reroute, and how to use path merging technique to share the bandwidth on common links among backup paths of the same service LSP. However, no solution is provided on how to share bandwidth among backup paths of different service LSPs so far. The restoration models considered in this paper is based on the observation that the restoration bandwidth can be shared by multiple backup LSPs so long as their protected service LSP path segments are not susceptible to simultaneous failure[6], [8], [10], [21], [22]. 93
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME This paper discusses the efficiency of distributed bandwidth management of restoration path selection algorithms. This paper is organized as follows. Section II gives an overview of the options and features of restoration models. Section III gives a review of restoration path selection algorithms. RESTORATION MODEL – AN OVERVIEW A. Online Routing Dynamic routing of LSP segment is handled by on-line algorithms that routes both the active path and the backup path for each link or node and simultaneously it optimizes network resource utilization. The objective of the algorithm is to compute an active path and a backup path for each node or link in the active path. The connection setup fails if sufficient bandwidth is not available to setup the active path or the backup path. Only single link or node failure is considered in this paper. B. Restoration modes Two ways of restoration are end-to-end or path restoration and local restoration. In end-to-end restoration, a disjoint backup path from the active path is provided from the source to the destination for each request. When there is a link or node fails, the failure information has to propagate back to the source which in turn switches all the demands to the backup path as illustrated in Figure 1 and in Figure 2. This information propagation to the source makes it unacceptable for many applications. In the case of local restoration, the backup paths are setup locally and therefore failure information does not have to propagate back to the source before connections are switched to the backup path. S T S T Primary Path Backup Path Fault Indication Signal Figure 1Path Restoration Figure 2 Path Restoration on Link failure 94
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME Backup path for the failure of node aand links i and j. S a b c T i j l k Backup path for the failure of linkl Figure 3 Backup Path for Single Element Failure Restoration has to protect against single link or single element (node or link) failure. The amount of resources needed to provide backup for the second mode will be greater since a node failure results in multiple link failures. In the single link failure, when a link fails, the two nodes that are at the end point of the link detect the failures, and they immediately switch all the demands on to the backup path. In a single element failure model, when a node fails assume that all the links incident on this node fails. This is detected as in the link failure case and the demands are routed across the failed node. The algorithms discussed in this paper can handle all single link and node failures and does not provide a backup if the source or the destination of the traffic fails as illustrated in Figure 3 C. Shared Reservation A protected LSP in a MPLS network has an active path and bandwidth reserved along the backup paths for each link or node along the active path. The bandwidth reserved on each link along the backup paths can be shared across multiple backup paths of the same LSP and multiple backup paths of the different LSPs provided the protected failure points are not expected to fail simultaneously. This type of bandwidth sharing is referred to as Inter-demand sharing and intra-demand sharing. 95
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME The design objective is that the bandwidth reserved on the backup paths must be sufficient to recover all affected service LSPs in the event of any link/node failure. Fig. 4 shows a simple example illustrating a shared reservation, which comes from [7]. The figure shows a network with 6nodes and 7 links. Suppose LSP 1 request asking for one unit of bandwidth from A to B arrives at node A. Node A selects A-B for the service path and A-C-D-B for the backup path. When these LSPs are established, one unit of bandwidth is allocated on link AB, and one unit of bandwidth is reserved on each of links AC, CD, DB. Subsequently, another protected LSP 2 request asking one unit bandwidth from E to F arrives at node E. Node E selects E-F for the service path and E-C-D-F for the restoration path. In this example, when setting up the protected LSP, it is unnecessary to reserve an additional unit of bandwidth on link CD because the two service paths AB and EF are failure disjoint, i.e., they are not subject to simultaneous failure under the single failure assumption. Thus, a total of five units of bandwidth are reserved to protect both service paths against any single link failure whereas without shared reservations, a total of six units of bandwidth would be needed. Sharing the reserved bandwidth among the backup paths of different protected LSPs reduces the total reserved bandwidth required. LSP 1 A B Backup Path C D Backup Path E F LSP 2 Figure 4 Shared Reservation Example D. Partial and Complete Routing Information In MPLS networks, a link state routing protocol, such as Open Shortest Path First protocol (OSPF) or Intermediate System-Intermediate System protocol (IS-IS), is used to 96
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME distribute network topology information to each node in a particular network routing domain. Traditionally, these protocols have only propagated link up/down status among the nodes. To support path computation in MPLS networks, both OSPF and IS-IS have been extended to propagate additional information about each link, such as available bandwidth, bandwidth in service, etc. [17], [18]. The following link state information is flooded by the routing protocol, which is the so-called partial information from paper[8]. Note that these information are distributed via OSPF/IS-IS traffic engineering extensions. 1) Reserved bandwidth R[e]: This bandwidth is not used on unidirectional link when the network is in a non-failure condition, but may be used by the restoration process upon failure; 2) Available bandwidth A[e]: This bandwidth is free to be allocated to service bandwidth or reserved bandwidth as new LSP requests arrive. Note that the total bandwidth on unidirectional link e is R[e]+A[e]+S[e] where S[e] is total consumed bandwidth for service paths on link. The three types of bandwidth share a common bandwidth pool; 3) Administrative weight W[e]: This quantity is set by the network operator and may be used as a measure of the heuristic “cost” to the network. A path with a smaller total weight is typically preferable. This information is used to select the service path for each LSP request. However, to support backup path selection, some algorithms require extra information to be carried by routing and signaling protocols [7], [10]. There are three possible scenarios based on the information available to the routing algorithm to achieve maximum bandwidth sharing in the backup paths. The first scenario that we consider is what we call the no information scenario. In this case, we assume that the only information that the routing algorithm has about the network is the residual (available) bandwidth on each link. In this scenario, for each link the amount of bandwidth utilized separately by the active and the backup paths is not known. Only the total used bandwidth is known. In the second scenario, we assume that that the routing algorithm has complete information, i.e., it knows the routes for the active and backup paths of all the connections currently in progress. 97
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME In the third partial information scenario, the information available to the routing algorithm is slightly more than that in the no information scenario. The additional information in this scenario is that for each link instead of knowing only the total bandwidth usage, we now separately know the total bandwidth used by active paths, and the total bandwidth used by backup paths. FAST RESTORATION ALGORITHMS MPLS fast reroute is a relatively new scheme and it is still undergoing IETF standardization process [2]. The internet draft [2] focus on the fast reroute scheme definition and backup establishment signaling protocol, which leaves how to select the backup paths and implementation open for vendor/carrier innovation. Much work has been done on end-to-end and segment shared backup path selection, but few papers have been published on MPLS fast reroute backup path selection. The basic idea of backup path sharing and backup path control message carrying service path information has been used before [3], [22], but both apply for end-to-end backup path sharing only. A practical algorithm should maximize restoration bandwidth sharing among the backup paths of the same or different service paths without scarifying performance and scalability. Papers [6][8] classified the routing information model as minimal information, partial information and complete information in end-to-end restoration. In [6], a few algorithms to compute backup paths for link/node failure on the service path with the goal of maximizing backup bandwidth sharing were presented. The key idea of [6] is that restoration problems can be formulated as integer programming problems and thus uses heuristic algorithm to solve it. The cost of backup paths can be determined by solving shortest path problems, one for each link in the network.Let be the cost of using link (u, v) on the backup path if link (i, j) is used in the active path. Fij represent the total amount of bandwidth reserved for the demand that use (i, j) on the active path and Guv represent the total amount of bandwidth reserved for the demand that use (u, v) on the backup path. For a current demand of b units of bandwidth is defined as 98
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME 0 if Fij + b Guv and (i, j) (u,v) = Fij + b – Guv if Fij + b > Guv and Ruv Fij + b – Guv and (i, j) (u,v) Otherwise The backup for link (i, j) can start at node i but can end at any node on the path from j to t. This case is handled by executing shortest path algorithm backwards starting at the sink. To maintain intra domain sharing, each node maintains a m-vector that gives the amount of bandwidth reserved for the current demand for backing up all the links from the given node to the destination.Modifying the cost of the links in the computation of the backup costs can be used to account for node failures. Cost of using link (u, v) for partial information case is defined as 0 if Fij + b Guv and (i, j) (u,v) = Fij + b – Guv if Fij + b > Guv and Ruv Fij + b – Guv and (i, j) (u,v) Otherwise However, their algorithms assume partial aggregated information and complete information [6] available. Also papers [6], [8] find that complete information model is able to achieve optimized backup selection but the complete information dissemination may not be scalable. Thus, complete information model fits for centralized algorithm. Partial information can be easily collected via current routing information extension. Thus, partial information model fits for distributed algorithm. A distributed algorithm for complete information model to MPLS fast reroute has been proposed by [15]. The distributed bandwidth management method assumes the use of RSVP-TE extensions [19] instead of routing protocol to collect extra information and achieves restoration bandwidth sharing among the backup paths of different service paths independent of the backup path selection algorithm. (CR-LDP) [20] also requires similar extensions. The paper also designed internal node data structure and described how to maintain those data structure at each node during LSP creation and deletion. This scheme scales well due to two facts: (1) it does not require each LSR to maintain detailed information on each LSP’s service path and restoration paths. Only two arrays, i.e., 99
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME and , are maintained at each node. is maintained by the responsible node of each unidirectional link along a backup path to keep track of the bandwidth on that has been reserved to protect against the failure , which will be updated during the signaling process of LSP creation and deletion. is maintained by the responsible node of each failure along a service path to keep track of the bandwidth on that has been reserved to protect against the failure itself. Then the sharable restoration bandwidth on each unidirectional link would be Where is a conflict matrix that represents the amount of traffic that will be rerouted on unidirectional link when failure occurs. The first of is disseminated via routing protocol exchange. To distribute and collect the second part information, three new signaling messages: TELL, ASK and REPLY were added. Then the algorithm will reset link weights based on and select the disjoint shortest path as the restoration path, where is bandwidth requirement of the traffic request. Similar idea has been applied in [7], [10], which assumed end-to-end shared mesh restoration. CONCLUSION We analyzed the problem of fast local restoration that requires efficient distributed bandwidth management to setup bypass path for every node or link traversed by the service path. The objective of routing messages or signaling extensions is to manage the bandwidth usage for each connection and to optimize the use of network resources while protecting against single link or node failure. Approaches based on efficient distributed routing and signaling protocols were compared. And we conclude that significant cost savings could be achieved through sharing of bandwidth among backup paths of different service LSPs REFERENCES [1] Rosen et al., “Multiprotocol Label Switching Architecture”, IETFRFC 3031, 2001. [2] P. Pan, G. Swallow, and A. Atlas, “Fast Reroute Extensions to RSVP-TE for LSP Tunnels”, IETF RFC 4090, 2005. 100
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME [3] S. Kiniet al., “Shared Backup Label Switched Path Restoration”, IETFInternet draft, work in progress, May 2001. [4] V. Sharma and F. Hellstrand, “Framework for Multi-Protocol Label Switching MPLS-Based Recovery”, IETF RFC 3469, 2003. [5] C. Gruber, “Bandwidth requirements of MPLS protection mechanisms”,7th INFORMS TELECOM, Boca Raton, FL, 2004. [6] M. Kodialam and T. Lakshman, “Dynamic routing of locally restorable bandwidth guaranteed tunnels using aggregated link usage information”, IEEE INFOCOM, 2001. [7] Li, D.Wang, C. Kalmanek, and R. Doverpike, “Efficient distributed path selection for shared restoration connections”, IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 761–771, October 2003. [8] M. Kodaliam and T. Lakshman, “Dynamic routing of bandwidth guaranteed tunnels with restoration”, IEEE INFOCOM 2000. [9] Y. Liu, D. Tipper, and P. Siripongwutikorn, “Approximating optimal space capacity allocation by successive survivable routing”, IEEEINFOCOM 2001. [10] C. Qiao and D. Xu, “Distributed Partial Information Management(DPIM) for survivable networks”, INFOCOM 2002. [11] R. Doverspike and J. Yates, “Challenges for MPLS in optical network restoration”, IEEE Communication Magazine, February 2001. [12] Y. Xiong and L. Mason, “Restoration strategies and spare capacity requirements in self-healing ATM networks”, IEEE/ACM Transactions on Networking., vol. 7, no. 1, February 1999. [13] Basuand J. Riecke, “Stability issues in OSPF routing”, ACMSIGCOMM 2001. [14] Alaettinoglu, V. Jacobson, and H. Yu, “Towards Millisecond IGP Convergence”, IETF Internet draft, draft-alaettinoglu-isis-convergence-00.txt, November 2000. [15] Dongmei Wang and Guangzhi Li, “Efficient Distributed Bandwidth Management for MPLS Fast Reroute”, IEEE/ACM Transactions on Networking, vol. 16, no. 2, April 2008. 101
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 1, Number 1, May -June (2010), © IAEME [16] R. Sabella, M. Settembre, G. Oriolo, F. Razza, F. Ferlito, andG. Conte, “A multilayer solution for path provisioning in new generation optical/MPLS networks” ,J. Lightw. Technol., vol. 21, no.5, pp. 1141–1155. [17] D. Katz et al., “Traffic Engineering (TE) Extensions to OSPF Version 2”, IETF RFC 3630, September 2003. [18] Smitet al., “Intermediate System to Intermediate System (IS-IS) Extensions for Traffic Engineering (TE)”, IETF RFC 3784, June 2004. [19] D. Awducheet al., “RSVP-TE: Extensions to RSVP for LSP Tunnels”, IETFRFC3209, December 2001. [20] J. Ash et al., “LSP Modification Using CR-LDP”, IETF RFC 3214, January 2002. [21] P. Ho, J. Tapolcai, and H. Moufth, “On achieving optimal survivable routing for shared protection in survivable next-generation internet”, IEEE Trans. Reliability, vol. 53, no. 2, pp. 216–225, June 2004. [22] S. Han and G. Shin, “Fast restoration of real-time communication service from component failure in multi-hop networks”, ACM SIGCOMM1997. 102