Computers, Materials & Continua DOI:10.32604/cmc.2022.027725 | |
Article |
Efficient Routing Protection Algorithm Based on Optimized Network Topology
1School of Computer and Information Technology, Shanxi University, Shanxi, 030006, China
2School of Automation and Software Engineering, Shanxi University, Shanxi, 030006, China
3School of Computer Science and Technology, Hainan University, Haikou, 570228, China
4Department of Computer Science & Technology, Tsinghua University, Beijing, 100084, China
5Department of Urban & Regional Planning San José State University, San José, CA, 95192, USA
6Key Laboratory of Embedded System and Service Computing (Tongji University), Ministry of Education, Shanghai, 201804, China
7Institute of Fundamental and Frontier Sciences, University of Electronic Science and Technology of China, Chengdu, 610054, China
8Beijinng University of Technology, Beijing-Dublin International College, Beijing University of Technology, Beijing, 100124, China
*Corresponding Author: Jiangyuan Yao. Email: yaojy@hainanu.edu.cn
Received: 24 January 2022; Accepted: 08 March 2022
Abstract: Network failures are unavoidable and occur frequently. When the network fails, intra-domain routing protocols deploying on the Internet need to undergo a long convergence process. During this period, a large number of messages are discarded, which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers (ISP). Therefore, improving the availability of intra-domain routing is a trending research question to be solved. Industry usually employs routing protection algorithms to improve intra-domain routing availability. However, existing routing protection schemes compute as many backup paths as possible to reduce message loss due to network failures, which increases the cost of the network and impedes the methods deployed in practice. To address the issues, this study proposes an efficient routing protection algorithm based on optimized network topology (ERPBONT). ERPBONT adopts the optimized network topology to calculate a backup path with the minimum path coincidence degree with the shortest path for all source purposes. Firstly, the backup path with the minimum path coincidence with the shortest path is described as an integer programming problem. Then the simulated annealing algorithm ERPBONT is used to find the optimal solution. Finally, the algorithm is tested on the simulated topology and the real topology. The experimental results show that ERPBONT effectively reduces the path coincidence between the shortest path and the backup path, and significantly improves the routing availability.
Keywords: Routing protection algorithm; network availability; network failure; shortest path; backup path
With the development of the Internet, the range of supported applications has shown significant changes. Initially, the Internet mainly supported some non-real-time applications, such as e-mail, file transfer, etc. Nowadays, a large amount of real-time business data [1,2] is widely spread over the Internet, such as Voice over Internet Protocol (VoIP), online stock trading, remote surgery, video streaming, instant messaging, and so forth. These new applications put forward higher requirements for routing availability [3,4]. Thus, routing availability will directly affect the property security and even users’ life quality. Relevant studies have shown that network failures frequently occur [5,6], and are unavoidable. During the failure repair period, the routing protocol needs to go through a period of the convergence process. In this process, there will be routing black holes, routing loops [7–9], which lead to network interruption, packet loss, and greatly reduce routing availability. Previous studies [10] demonstrated that when an OC-48 link is disconnected for 10 s, 3 million 1KB packets will be lost. In real-time applications, it is usually required to repair the failures in milliseconds. For current intra-domain routing protocols, e.g., OSPF and IS-IS, it takes several or even tens of seconds to complete convergence, which fails to meet the requirements of real-time applications for routing availability [11]. Therefore, how to improve the availability of intra-domain routing [12] has become an urgent Internet research problem. More research are focused on the problem of how to improve the network’s ability to respond to failures quickly.
Current algorithms aiming to improve the availability of intra-domain routing can be divided into two categories [13], passive recovery algorithms and routing protection algorithms. Among them, the passive recovery algorithm [14] mainly investigates how to speed up the route convergence when the network fails, and shorten the network interruption time as much as possible. However, when the links in a network are frequently disconnected, the algorithm may cause routing instability. According to the relevant rules, the routing protection algorithm [15] calculates the backup routes in advance. When the network fails, the backup routes calculated in advance are used to forward packets, which minimizes the loss of messages and shortens the network service interruption time. In comparison, the routing protection algorithm is more favored by the academic community.
As the earliest routing protection algorithm applied to the Internet, Equal Cost Multiple Paths (ECMP) proposed that if there are multiple paths from the source node to the destination node with the same minimum cost, they can be used as a backup path. Although the algorithm is simple to implement and easy to deploy, it requires the backup path to have the same minimum cost. Therefore, the ECMP algorithm does not contribute much to routing availability. Research [16] was developed to configure the shortest path with the same cost by adjusting the link weights, but this problem was proved to be an NP-Hard problem.
In response to the problems of ECMP, the Internet Engineering Task Force (IETF) released a framework for fast rerouting. On the basis of this framework, Loop-free alternates (LFA), Not-Via-based routing protection scheme [17] and tunnel-based routing protection scheme [18] are proposed. In all routing protection schemes, LFA has received close attention from the industry for its simplicity, and has been deployed and supported by router manufacturers such as Huawei and H3C. Although LFA is simple and easy to deploy, it has a fatal disadvantage—LFA cannot protect all possible single failure scenarios in the network. In order to solve the problems, the author used the theoretical knowledge of graph theory to analyze the problem of LFA failure coverage in the paper [19]. The routing availability of LFA is increased by adjusting the cost of the link in the network, but this method does not necessarily guarantee to deal with all single failure situations. For this reason, the author theoretically analyzed in-depth relationship between LFA’s routing availability and network topology [20], and improved the single-failure protection situation of LFA by adding links.
Reference [21] was proposed to use the routing deflection algorithm to improve the routing availability, that is, first use the loop-free rule to calculate all the optional next hops from the source node to the destination node, and then use the label technology to realize the flexible forwarding of the message. Although this algorithm can improve routing availability, its implementation is complicated and expensive, making it difficult to actually deploy.
Multiple Routing Configurations (MRC) [22] proposes to save multiple configuration diagrams for each router. Each configuration includes all nodes and links. By adjusting link weights, some nodes and links are protected in this configuration. Finally, a configuration diagram for all possible single failures is constructed. When the message encounters a failure in the forwarding process, the pre-configured route can be used to forward the message. However, in real networks, this algorithm needs to consume a lot of computing resources and storage overhead.
Failure Carrying Packet (FCP) [23] proposes to store the failure information encountered in the forwarding process of the message in the header of the message. When the message reaches a node, the node first detects the failure information field in the header of the message, constructs a new topology according to the field, and then re-calculates the shortest path using the new topology, so as to realize the loop-free forwarding of messages. The major advantage of this algorithm is that it eliminates the routing convergence process. However, it has high computational complexity and large changes to the routing protocol, so it is not easy to deploy in practice.
In order to solve the problem that the existing routing protection methods have low failure protection ration and can not be deployed in practice, this paper proposes an Efficient Routing Protection Algorithm Based on Optimized Network Topology (ERPBONT).
The contributions of the paper can be summarized as follows:
1. ERPBONT is easy to implement and deploy in the real networks.
2. ERPBONT can effectively solve the problem of low failure recovery ratio caused by network failures.
3. ERPBONT can significantly reduce the path coincidence degree, and has the ability to quickly recover from the failed network.
2 Network Model and Problem Description
The network topology can be represented by an undirected connected graph [24–26]
The following details the path coincidence degree. Given a network topology
The path coincidence degree between the pair of nodes can be expressed as:
The path coincidence degree between all node pairs in the network can be expressed as:
The network model defined above is explained by a specific example. The figure on the left in Fig. 1 shows a network topology with four nodes and four links,
This paper aims to calculate two paths with the minimum coincidence degree for all source-destination pair in the network, which are the shortest path and backup path. Given a network topology
Given a network topology
Given a network topology
Eq. (1) is the objective function to minimize the path coincidence between the shortest path and the backup path. Eq. (2) indicates that the number of added links is the minimum value between 0.1 times and 5 of the number of links in the original network, where
The scientific problem solved in this paper is an NP-Hard problem, and it is difficult to obtain the optimal solution in limited computing time. Therefore, in order to reduce the deployment cost, this paper uses the heuristic method ERPBONT to calculate the approximate optimal solution. The algorithm are described in detail below.
ERPBONT is a two-stage algorithm, which is composed of adding link algorithm AddLink and Deleting Link algorithm DeleteLink. AddLink and DeleteLink expand the original network topology by adding and deleting links in the network, respectively. Through AddLink and DeleteLink, a better extended network topology can be calculated, thereby reducing the coincidence of network paths.
Algorithm 1 introduces the execution process of ERPBONT in detail. The input of the algorithm is the original network topology, the shortest path set. The output of the algorithm is the extended network topology and the backup path. First use the AddLink algorithm to calculate the final added link set
The AddLink algorithm needs to solve the following three problems: (1) How many links to be added (2) Which links to be added (3) How to set the cost of adding links. The solutions to the three problems will be described below.
As for the problem (1), adding too many links will change the original network topology and increase the cost of service providers. On the contrary, adding too few links will not significantly improve the performance of the network. This paper uses a compromise method to solve this problem, increasing the number of links to
As for the problem (2), the links added by the topology
As for the problem (3), if the link cost is set too large, the shortest path between all nodes in the network will not pass through the link, and the value of increasing the link will be lost. For any additional link
The input of the AddLink algorithm is the original network topology, the shortest path set and the initial temperature, where the initial temperature indicates the number of iterations of the algorithm, and the output is the increased link set. The variable
The Deletelink algorithm needs to solve the following two problems: (1) how many links are deleted and (2) which links are deleted. The solutions to the two problems will be described below.
For problem (1), the number of links added by the DeleteLink algorithm is
For problem (2), the deleted link can be selected from set
The input of the DeleteLink algorithm is the original network topology, the output
The following will use the form of a table to show the entire process of ERPBONT algorithm calculation on the topology of Fig. 2. The left picture of Fig. 2 represents the original topology, and the right picture is the topology optimized by the ERPBONT algorithm. The yellow edge represents the newly added link, and the red edge represents the virtual deleted link. The table only shows the change in the shortest path of the update link. A blank item indicates that the shortest path has not changed in the current state and is the same as the shortest path shown in the second column. The original topology generates links
3.5 Algorithm Complexity Analysis
Theorem 1: The time complexity of the AddLink algorithm is:
Proof: It takes
Theorem 2: The time complexity of the DeleteLink algorithm is:
Proof: The same as the AddLink proof process.
Theorem 3: The time complexity of the ERPBONT algorithm is:
Proof: ERPBONT mainly includes five steps: (1) To construct an undirected connected graph, the time complexity is
This section uses experiments to evaluate the path coincidence degree of ERPBONT, AddLink and DeleteLink. The following first introduces the network topology used in the experiment, and then describes the performance of different algorithms.
This paper uses three types of network topologies for experiments, the real network topology, the network topology published by Rocketfuel and the network topology generated by Brite. The real network topology includes Abilene, NJLATA, TORONTO and USLD [27]. The topologies published by Rocketfuel [27,28] are 1755 (Ebone), 3257 (Tiscali), and 3967 (Exodus). When using Brite to generate the topology, it is assumed that the link weights are symmetrical. Brite’s model is set to Waxman, the number of nodes is 50 to 1000, the values of alpha and beta are 0.15 and 0.2, respectively, and the average degree of nodes is set between 2 and 10. The mode is set to the router, the node position obeys heavy-tail distribution, the size of the link bandwidth is between 10 and 1024, and the link cost is the inverse of the bandwidth.
The real topology used in the experiment is shown in Tab. 2:
The Rocketfuel topology used in the experiment is shown in Tab. 3:
The Brite topology used in the experiment is shown in Tab. 4:
Figs. 3 and 4 show the path coincidence degree corresponding to different algorithms in the real network topology and the measured network topology. As shown in Figs. 3 and 4, in the real topology and measurement network topology, the ERPBONT algorithm’s performance is considerably better than the AddLink algorithm and the DeleteLink algorithm. Compared with the two algorithms, the path coincidence degree of the ERPBONT algorithm is reduced by 23.6% and 6.9%, respectively, and on the Rocketfule topology, the path coincidence degree of the ERPBONT algorithm is reduced by 17.8% and 3.7%, respectively.
Fig. 5 shows how the path coincidence degree of different algorithms changes with the size of the network topology when the average degree of nodes is 4 in the network. Fig. 6 shows the relationship between the path coincidence degree of different algorithms and the average degree of network nodes when the network topology size is 200. It can be seen from Fig. 5 that ERPBONT reduces the path overlap by 18.9% and 5.8%, respectively, compared with the AddLink algorithm and the DeleteLink algorithm. It can be seen from Fig. 6 that the path coincidence degree of ERPBONT is 9.3% and 2.1% lower than that of the AddLink algorithm and the DeleteLink algorithm, respectively.
The redundancy problem of backup path calculated by the existing routing protection methods is serious. The use of path coincidence degree as a measurement index is not considered in the selection of backup path, resulting in a large number of duplicate links between backup path and best path, which greatly reduces the routing availability. In order to solve the above problem, this paper proposes a routing protection method ERPBONT based on optimizing network topology. ERPBONT can be employed in the following scenarios, such as Voice over Internet Protocol (VoIP), online stock trading, remote surgery, video streaming, instant messaging, and so forth. ERPBONT takes the path coincidence degree as the index to select the backup path, calculates only one backup path for all source-destination pairs. ERPBONT has the minimum path coincidence degree between the backup path and the original path, which greatly improves the routing availability. According to the simulation experiment, it can be seen that the path coincidence degree of the backup path calculated by ERPBONT algorithm under the real topology and the simulated topology is significantly reduced.
At present, ERPBONT algorithm only stays in the stage of calculating the backup path to improve the routing availability. In the future, we will test the algorithm in a real network, and apply the algorithm ERPBONT to SDN network. We also consider how to improve ERPBONT to deal with the single node failures and concurrent failures scenarios in the network.
Funding Statement:This work is supported by the Hainan Provincial Natural Science Foundation of China (620RC562), the Natural Science Foundation of Shanxi Province (Grant Nos. 20210302123444,20210302123455), the China University industry university research innovation fund (No. 2021FNA02009), the Open Project Program of the Key Laboratory of Embedded System and Service Computing of Ministry of Education (Tongji University) ESSCKF 2021-04, the National Natural Science Foundation of China (Grant Nos. 61702315, 61802092), the Applied Basic Research Plan of Shanxi Province (No. 201901D211168), the Program of Hainan Association for Science and Technology Plans to Youth R&D Innovation (QCXM201910), and the Key R&D Program (International Science and Technology Cooperation Project) of Shanxi Province China (No. 201903D421003).
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the study.
1. H. J. Geng, H. Zhang, X. G. Shi, Z. L. Wang and X. Yin, “Efficient computation of loop-free alternates,” Journal of Network and Computer Applications, vol. 151, no. 5, pp. 1–12, 2020. [Google Scholar]
2. J. Tapolcai, G. Rétvári, P. Babarczi, E. R. Bérczi-Kovács, P. Kristóf et al., “Scalable and efficient multipath routing: Complexity and algorithms,” in Proc. ICNP, San Francisco, CA, USA. IEEE, pp. 376–385, 2015. [Google Scholar]
3. P. Mérindol, P. Francois, O. Bonaventure, S. Cateloin and J. J. Pansiot, “An efficient algorithm to enable path diversity in link state routing networks,” Computer Networks, vol. 55, no. 5, pp. 1132–1149, 2011. [Google Scholar]
4. S. Petale and J. Thangaraj, “Link failure recovery mechanism in software defined networks,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 7, pp. 1285–1292, 2020. [Google Scholar]
5. Y. Yang, M. Xu and Q. Li, “Tunneling on demand: A lightweight approach for IP fast rerouting against multi-link failures,” in Proc. IWQoS, Beijing, China. IEEE, pp. 1–6, 2016. [Google Scholar]
6. S. Antonakopoulos, Y. Bejerano and P. Koppol, “Full protection made easy: The DisPath IP fast reroute scheme,” IEEE/ACM Transactions on Networking, vol. 23, no. 4, pp. 1229–1242, 2015. [Google Scholar]
7. W. Braun and M. Menth, “Loop-free alternates with loop detection for fast reroute in software-defined carrier and data center networks,” Journal of Network and Systems Management, vol. 24, no. 3, pp. 470–490, 2016. [Google Scholar]
8. M. W. Xu, M. J. Hou, D. Wang and J. H. Yang, “An efficient critical protection scheme for intra-domain routing using link characteristics,” Computer Networks, vol. 57, no. 1, pp. 117–133, 2013. [Google Scholar]
9. S. Petale and J. Thangaraj, “Link failure recovery mechanism in software defined networks,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 7, pp. 1285–1292, 2020. [Google Scholar]
10. X. W. Yang and D. Wetherall, “Source selectable path diversity via routing deflections,” in Proc. SIGCOMM, Pisa, Italy, pp. 159–170, 2006. [Google Scholar]
11. J. Yallouz, O. Rottenstreich and P. Babarczi, “Optimal link-disjoint node-somewhat disjoint paths,” in Proc. ICNP, Singapore. IEEE, pp. 1–10, 2016. [Google Scholar]
12. F. Klaus-Tycho, P. Yvonne-Anne, S. Stefan and T. Gilles, “Local fast failover routing with low stretch,” ACM Sigcomm Computer Communication Review, vol. 48, no. 1, pp. 35–41, 2018. [Google Scholar]
13. K. T. Foerster, A. Kamisinski, Y. A. Pignolet, S. Schmid and G. Tredan, “Improved fast rerouting using postprocessing,” in Proc. SRDS, Lyon, France. IEEE, pp. 1–10, 2019. [Google Scholar]
14. P. Francois, C. Filsfils, J. Evans and O. Bonaventure, “Achieving sub-second igp convergence in large ip networks,” Computer Communication Review, vol. 35, no. 3, pp. 35–44, 2005. [Google Scholar]
15. M. W. Xu, Y. Yang and Q. Li, “Selecting shorter alternate paths for Tunnel-based IP fast ReRoute in linear time,” Computer Networks, vol. 56, no. 2, pp. 845–857, 2012. [Google Scholar]
16. A. Sridharan, R. Guerin and C. Diot, “Achieving near-optimal traffic engineering solutions for current ospf/is-is networks,” IEEE/ACM Transactions on Networking, vol. 13, no. 2, pp. 234–247, 2005. [Google Scholar]
17. G. Enyedi, G. Rétvári, P. Szilágyi and A. Császár, “IP fast ReRoute: Lightweight Not-Via without additional addresses,” in Proc. INFOCOM, Rio de Janeiro, BRAZIL. IEEE, pp. 2771–2775, 2009. [Google Scholar]
18. J. Zheng, H. Xu, X. Zhu, G. Chen and Y. Geng, “We’ve got you covered: Failure recovery with backup tunnels in traffic engineering,” in Proc. ICNP, Singapore. IEEE, pp. 1–10, 2016. [Google Scholar]
19. G. Rétvári, L. Csikor, J. Tapolcai, G. Enyedi, A. Császár et al., “Optimizing IGP link costs for improving IP-level resilience,” in Proc. DRCN, Krakow, Poland. IEEE, pp. 62–69, 2011. [Google Scholar]
20. G. Rétvári, J. Tapolcai, G. Enyedi and A. Császár, “Ip fast reroute: Loop free alternates revisited,” in Proc. INFOCOM, Shanghai, China. IEEE, pp. 2948–2956, 2011. [Google Scholar]
21. X. W. Yang and D. Wetherall, “Source selectable path diversity via routing deflections,” in Proc. SIGCOMM, Pisa, Italy, pp. 159–170, 2006. [Google Scholar]
22. A. Kvalbein, A. F. Hansen, T. Čičić, S. Gjessing and O. Lysne, “Fast IP network recovery using multiple routing configurations,” in Proc. INFOCOM, Barcelona, Catalunya, Spain, pp. 1–11, 2006. [Google Scholar]
23. K. Lakshminarayanan, M. Caesar, M. Rangan, T. Anderson, S. Shenker et al., “Achieving convergence-free routing using failure-carrying packets,” in Proc. SIGCOMM, Kyoto, Japan, pp. 241–252, 2007. [Google Scholar]
24. Z. L. Wang, H. Zhang, X. G. Shi, X. Yin, H. J. Geng et al., “Efficient scheduling of weighted coflows in data centers,” IEEE Transactions on Parallel and Distributed Systems, vol. 30, no. 9, pp. 2003–2017, 2019. [Google Scholar]
25. R. Jin, X. Zhou and Y. Wang, “An efficient energy routing protocol based on gradient descent method in wsns,” Journal of Information Hiding and Privacy Protection, vol. 2, no. 3, pp. 115–123, 2020. [Google Scholar]
26. S. Perumal, M. Tabassum, G. Narayana, S. Ponnan, C. Chakraborty et al., “Ann based novel approach to detect node failure in wireless sensor network,” Computers, Materials & Continua, vol. 69, no. 2, pp. 1447–1462, 2021. [Google Scholar]
27. H. J. Geng, H. Zhang and Y. Y. Zhang, “Efficient routing protection algorithm in large-scale networks,” Computers, Materials & Continua, vol. 66, no. 2, pp. 1733–1744, 2021. [Google Scholar]
28. Y. Guo, K. Huang, C. Hu, J. Yao and S. Zhou, “Traffic engineering in dynamic hybrid segment routing networks,” Computers, Materials & Continua, vol. 68, no. 1, pp. 655–670, 2021. [Google Scholar]
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |