1 EL736 Communications Networks II: Design and Algorithms Class10: Restoration and Protection Design of Resilient Networks Yong Liu 11/28/2007.

Slides:



Advertisements
Similar presentations
ITU-T Workshop on Security Seoul (Korea), May 2002 Telecommunication network reliability Dr. Chidung LAC.
Advertisements

Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Protection and Restoration in Optical Network
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
File Name Increasing IP Network Survivability: An Introduction to Protection Mechanisms Jonathan Sadler Lead Engineer - ONG SE October 22,
Jaringan Komputer Lanjut Packet Switching Network.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
9/22/2003Kevin Su Traffic Grooming in WDM Networks Kevin Su University of Texas at San Antonio.
E E Module 17 W. D. Grover TRLabs & University of Alberta © Wayne D. Grover 2002, 2003 ATM VP-based (or MPLS path) Restoration with Controlled Over-
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
Dynamic Routing and Wavelength Assignment Scheme for Protection against Node Failure Ying Wang1, Tee Hiang Cheng1,2 and Biswanath Mukherjee3 1School of.
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
Path Protection in MPLS Networks Ashish Gupta Design and Evaluation of Fault Tolerance Algorithms with Performance Constraints.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS and Traffic Engineering
Models for Measuring and Hedging Risks in a Network Plan
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
IP layer restoration and network planning based on virtual protection cycles 2000 IEEE Journal on Selected Areas in Communications Reporter: Jyun-Yong.
1 Distributed Partial Information Management (DPIM) for Survivable Networks Dahai Xu.
Capacity Requirements for Network Recovery from Node Failure with Dynamic Path Restoration Gangxiang Shen and Wayne D. Grover TRLabs and University of.
1 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen Dept. of Computer Science, Technion Gabi Nakibly National EW Research Center Published.
Comparison of MSTP and (G)ELS Benchmarking Carrier Ethernet Technologies Workshop Session AI.1: Scientific and Technical Results Krakow, Poland April 30,
Virtual Active Networks Gong Su Mar. 9, Network Computing Models Traditional: end-to-end, Client-server software at end nodes The network is but.
Control and Traffic Management Paper: Banerjee et al.: ” Generalized multiprotocol label switching: an overview of signaling enhancements and recovery.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco IP Solution Center 4.0 TRAFFIC ENGINEERING MANAGEMENT Executive.
1 Multipoint Ethernet Connection Protection
1 EL736 Communications Networks II: Design and Algorithms Class11: Multi-Hour and Multi-Layer Network Design 12/05/2007.
Table Of Contents Introduction What is WAN? Point to Point Links Circuit Switching Packet Switching WAN Virtual Circuits WAN Dialup Services WAN Devices.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
1 EL736 Communications Networks II: Design and Algorithms Class2: Network Design Problems -- Notation and Illustrations Yong Liu 09/12/2007.
Distributed Asynchronous Bellman-Ford Algorithm
1 Protection Mechanisms for Optical WDM Networks based on Wavelength Converter Multiplexing and Backup Path Relocation Techniques Sunil Gowda and Krishna.
MPLS and Traffic Engineering Ji-Hoon Yun Computer Communications and Switching Systems Lab.
Budapest University of Technology and Economics Department of Telecommunications and Media Informatics Optimized QoS Protection of Ethernet Trees Tibor.
SONET Survivability Mechanisms CSC/ECE 772: Survivable Networks Spring, 2009, Rudra Dutta.
SMUCSE 8344 Protection & Restoration of Optical Networks.
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Lightpath Restoration in WDM Optical Networks A Survey in IEEE Network Magazine Nov/Dec 2000.
Computer Networks with Internet Technology William Stallings
Slide 1 MPLS-TP Linear Protection / Author / RTP IE Fixed CET I insert classification level © Nokia Siemens Networks MPLS-TP Linear Protection.
CSC Survivability Anuj Dewangan Parinda Gandhi.
Two-layer Restoration Scheme for IP over Optical Networks with MPLS Jia Ke, L. Mason, Q. Yang ICIS, School of EEE, Nanyang Technological University
Survivable Traffic Grooming with Differentiated End-to-End Availability Guarantees in WDM Mesh Networks Proceedings of the 13th IEEE Workshop on Local.
10/6/2003Kevin Su Traffic Grooming for Survivable WDM Networks – Shared Protection Kevin Su University of Texas at San Antonio.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
CprE 458/558: Real-Time Systems (G. Manimaran)1 CprE 458/558: Real-Time Systems Real-Time Networks – WAN Packet Scheduling.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
(Slide set by Norvald Stol/Steinar Bjørnstad
1 Why Optical Layer Protection? Optical layer provides lightpath services to its client layers (e.g., SONET, IP, ATM) Protection mechanisms exist in the.
1 EL736 Communications Networks II: Design and Algorithms Class7: Location and Topological Design Yong Liu 10/24/2007.
Interconnect Networks Basics. Generic parallel/distributed system architecture On-chip interconnects (manycore processor) Off-chip interconnects (clusters.
Use Cases for High Bandwidth Query and Control of Core Networks Greg Bernstein, Grotto Networking Young Lee, Huawei draft-bernstein-alto-large-bandwidth-cases-00.txt.
1 Slides by Yong Liu 1, Deep Medhi 2, and Michał Pióro 3 1 Polytechnic University, New York, USA 2 University of Missouri-Kansas City, USA 3 Warsaw University.
BUPT COMTEST R&D CENTER Network Coding-based Protection Strategy with Data Traffic Prediction Scheduling Algorithm Shasha Liang
1 Protection in SONET Path layer protection scheme: operate on individual connections Line layer protection scheme: operate on the entire set of connections.
1 EL736 Communications Networks II: Design and Algorithms Class4: Network Design Modeling (II) Yong Liu 10/03/2007.
Survivability in IP over WDM networks YINGHUA YE and SUDHIR DIXIT Nokia Research Center, Burlington, Massachusetts.
Date of download: 6/21/2016 Copyright © 2016 SPIE. All rights reserved. Illustration for full link-disjoint protection algorithm (a) CERNET topology with.
L11. Link-path formulation
Virtual Active Networks
Protection & Restoration Design Team - CCAMP WG
ISP and Egress Path Selection for Multihomed Networks
Network Survivability
Virtual Active Networks
COS 561: Advanced Computer Networks
Optical Layer Protection Schemes
Separating Routing Planes using Segment Routing draft-gulkohegde-spring-separating-routing-planes-using-sr-00 IETF 98 – Chicago, USA Shraddha Hegde
SURVIVABILITY IN IP-OVER-WDM NETWORKS (2)
Eusebi Calle, Jose L Marzo, Anna Urra. L. Fabrega
Presentation transcript:

1 EL736 Communications Networks II: Design and Algorithms Class10: Restoration and Protection Design of Resilient Networks Yong Liu 11/28/2007

2 Outline  Resilient Network Design  Link Capacity Re-establishment  Demand Flow Re-establishment  Separated Normal and Protection Design

3 Resilient Network Design  Objective: design networks to be resilient (robust) against failure situations such that all demands can be carried when portion of network resources are temporally failed  Recovery Mechanisms:  Protection (Pre-provisioned): to resolve a conflict due to a failure prior to the failure occurring  Restoration (Post-provisioned): to resolve a failure only once the failure has occurred

4 Protection Illustration Source Destination Working path Path-protection backup (link-disjoint)

5 Classification of Protection data transmitted simultaneously on a primary path and a dedicated backup path; switch to backup path in case the primary path fails. [hot-standby]  1+1 (Full) Protection: data transmitted simultaneously on a primary path and a dedicated backup path; switch to backup path in case the primary path fails. [hot-standby]  1:1 Protection: data transmitted only on primary path; switch to backup path in case the primary path fails.  M:N Protection: M back-up paths protect N primary paths (recover from up to M failures out of N paths) Primary Backup S t N Primary M Backup S t

Restoration Illustration Source Destination Working path Restored path

7 Recovery in Traffic & Transport Networks  Traffic Network: packets/calls traversing failed links re-route on surviving links (link capacity can be used for normal and recovery traffic)  Transport Network: reserved recovery capacity for automated switch over  Resilient Network Design: how much recovery capacity needed to accommodate packets/calls re-routing?  Recovery Capacity  reserved vs. existing Can it be used for normal traffic?Can it be used for normal traffic?  dedicated vs. shared Only used for recovery of specific links/demands?Only used for recovery of specific links/demands?  integrated vs. incremental design Recovery considered when build the normal topology?Recovery considered when build the normal topology?

8 Link/Path Re-establishment  Link Re-establishment  traffic on a failed link rerouted  different flows follow same route  Path Re-establishment  end-end flows on a failed link re-established  different flows might have different routes

9 Protection Priorities  Mission Critical Traffic -- Predetermined restoration path with pre-allocated capacity  Premium Traffic -- Predetermined restoration path without pre-allocated capacity  Public Traffic -- Restoration path calculated in the fly  Low Priority Traffic -- Preemptable working paths, may be unprotected

10 Characterization of Failure States  link availability coefficients  path availability coefficients  demand volume

11 Simplest Protection: path diversity  Pro.s: zero reconfiguration  Con.s: low efficiency, doesn’t explore bandwidth on alternate paths

12 Generalized Path Diversity  surviving paths realize surviving demands

13 Link Capacity Re-establishment  failure assumption: total failure on a single link,  recover from any single link  recovery capacity reserved, shared among all possible link failures

14 Link Capacity Re-establishment

15 Hot-Standby Link Protection  recovery capacity: reserved, dedicated to each specific link  single restoration path for each link

16 Hot-Standby Link Protection

17 Demand Flow Re-establishment  restore individual flows instead of link capacities  not restricted to single link failure  recovery capacity unreserved, can also be used for normal traffic,.  more efficient solution

18 Unrestricted Reconfiguration  flows can reconfigured arbitrarily for each failure state  reconfiguration before/after failures

19 Restricted Reconfiguration  global reconfiguration incurs large overhead  restriction: don’t touch flows not on failed links  potentially less efficient solution

20 Restricted Reconfiguration

21 Path Restoration under Budget Constraint  Budget lower than lowest cost to fully recover all demand under all failure states  recover portions of demands  maximize the lowest portion among all demands under all failure states

22 Path Restoration under Budget Constraint

23 Separated Normal and Protection Design  Cheapest Solution: design normal and protection capacity and flow simultaneously in a coordinated way.  In practice:  Phase I: design normal capacity/flow;  Phase II: design protection capacity/flow for phase I solution

24 Phase I

25 Phase II

26 Protection Design with Given Capacity  link capacities given  reserve a portion of capacity to recover from any possible single link failure [reserved, shared]  to guarantee full recovery, what is the maximal portion of demand can be carried?

27 Protection Design with Given Capacity

28 Extensions  what if recovery capacity on each link is not reserved ?  solution tells lowest ratio for all demands, what about other demands with potential higher ratios?  Max-min allocation?