GMPLS Network Reliability Enhancement by ... - Semantic Scholar

5 downloads 350 Views 1MB Size Report
service recovery time can be shortened by using the presented approach. ... case, two nodes directly connected in the data plane may not be connected in the ...
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings

GMPLS Network Reliability Enhancement by Using the Dominating Nodes Approach Pawel Rozycki and Janusz Korniak University of Information Technology and Management Rzeszow, Poland E-mail: [email protected]

Abstract—The impact of the control plane architecture on reliability of the GMPLS network is studied. To improve this reliability, a method based on the graph-theoretical dominating set problem is proposed. Several algorithms to select dominating nodes are presented and evaluated for four different network topologies by using simulation methods. It is shown that the service recovery time can be shortened by using the presented approach.

I. I NTRODUCTION The evolution of the Internet requires communication technologies which satisfy growing demand for bandwidth and allow for sophisticated services. The fiber optic technology can support sufficient bandwidth. However, high bit-rate transmission requires implementing IP switching over optical crossconnects (OCXs). Moreover, optical networking technologies need to support traffic engineering techniques in order to allow for advanced services like Voice over IP, IPTV, and others. The Automatically Switched Optical Networks (ASON) and the Generalized Multiprotocol Label Switching (GMPLS) are the key technologies which satisfy the growing requirements. These technologies are developed separately: ASON in ITU-T and GMPLS in IETF. However, GMPLS can be considered as the implementation technology of the control plane for ASON. The communication infrastructure based on ASON and GMPLS combines benefits of the fiber optic technology, IP routing and traffic engineering known from MPLS. It is characteristic for ASON that functional planes can be physically separated. The main aim of this approach is the separation of signaling and management traffic form largescale user data transmission. Thus, with out-of-band signaling, the opto-electronic processing of large-scale user data can be avoided. The separation of functional planes can result in using different topologies for the data and control planes. In this case, two nodes directly connected in the data plane may not be connected in the control plane or, similarly, two nodes directly connected in the control plane may be not neighbors in the data plane. This kind of GMPLS architecture is called asymmetrical. If, however, the topologies of both planes are the same, the architecture is called symmetrical. This work has been supported by Foundation for Polish Science under Mistrz Programme.

Andrzej Jajszczyk AGH University of Science and Technology Krakow, Poland

In order to support high performance transmission of user data, the GMPLS should be characterized by a high reliability. In our work, the reliability of a GMPLS network is considered assuming out-of-band signaling and the asymmetrical architecture. Papers [2], [3] and [4] show some aspects of failure detection and notification, also for different types of architectures and applied mechanisms. Some issues of optical networks reliability are also considered in [5], [6] and [7]. The impact of control plane reliability on connection sustainability and control plane efficiency has been shown in [8]. The analysis of GMPLS network availability based on the transport network topology can be found in [9]. There exist many concepts to improve reliability of the GMPLS network. One of them is enhanced routing or signaling mechanisms for a better performance of network protection [10], [11]. In this paper, it is shown that a higher network reliability can be achieved by using optimization of the control plane topology based on the dominating nodes approach. II. O PTIMIZATION CRITERIA In order to objectively compare the GMPLS reliability several parameters are used [5]. These parameters allow describing the quality of transmission and quality of service offered by telecommunication providers. The most important, useful and easy in interpretation are the following parameters: • Mean Time To Failure (MTTF) – defined as the mean period of time when a device is working without failure; • Mean Time Between Failures (MTBF) – defined as the mean period of time between failures; • Mean Time to First Failure (MTFF); • Mean Time To Recovery or Mean Time To Repair or Mean Time To Restoration (MTTR) – defined as the mean period of time needed to repair failure or recover service; • probability of failure p; • availability A (or unavailability defined as U = 1 – A). Dependences between these parameters can be described by the following equation: MTTF MTTF = = A= MTTF + MTTR M T BF MTTR M T BF − M T T R =1− (1) M T BF M T BF

978-1-4244-3435-0/09/$25.00 ©2009 IEEE

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings

where M T BF  M T T R in most cases. The availability of the overall transmission system is represented be the following formula: n  Ai (2) A= i=1

where Ai is availability of i-th element of the transmission system and n is the number of system elements. Table I depicts typical availability values of network components. As shown, the fiber link is a component with the lowest availability. Damage of fiber links can disrupt user data transmission and services. Traffic engineering methods like restoration and protection prevent reliability degradation and keep the quality of service at an appropriate level in the case of failure of any network component. Of course, the protection and restoration procedures should recover service as fast as possible. The MTTR parameter represents how fast service recovery is achieved. Therefore, this parameter is chosen as an optimization criterion. TABLE I AVAILABILITY OF NETWORK DEVICES Network device Web server Network card IP router SDH/SONET device OXC optical switch 1000 km fiber

MTBF (h) 104 − 106 104 − 106 105 − 106 105 − 106 105 − 106 104 − 105

MTTR (h) 1 2 2 4 6 102

A > 99.99% > 99.98% > 99.998% > 99.996% > 99.994% > 99%

In order to provide high reliability of the GMPLS control plane, both the architecture and signaling procedures of the control plane can be optimized. The work [2] confirms dependency of the quality of service on the architecture. In particular, additional links between nodes in the control plane can speed up notification about failure and, therefore, improve recovery or protection procedures. The key issues related to the GMPLS recovery mechanisms can be found in [12] and RSVP-TE (ReSerVation Protocol – Traffic Engineering) extensions are described in detail in [13], [14] and [15]. The improvement is achieved when the RSVP Notify message is used instead of the RSVP PathError message. The source of this improvement is different signaling paths for the Notify and PathError messages. The PathError message pathway must be symmetrical to the Label Switched Path (LSP) of the pathway of user data. The Notify message can choose the shortest path to the destination independently of the LSP. Moreover, PathError must be processed by the RSVP module on each Label Switched Router (LSR) in the hop by hop manner, while Notify is sent directly to the destination. As a result, information about the failure reach the destination with a lower delay and protection or recovery can start faster. This improvement is especially significant in the case of end-toend protection [14]. The discussed mechanism is presented in Figure 1. Note that in this procedure the edge nodes exchange several Notify RSVP messages. The additional handshake is required in the case of protection with extra-traffic and for

Fig. 1.

Protection switching mechanism

some kinds of devices which need to reconfigure in order to receive traffic from another direction, another wavelength, etc. tzu is the period of time between the moment of failure and the moment of lost service detected by the end user (egress node), and tpu is the period of time between the moment of switching to the backup LSP and the moment of service recovery. III. D OMINATING NODES As shown in [2], additional links in the control plane are able to improve reliability parameters. Interconnection of all nodes, however, is not economically justified. Moreover, [2] suggests that links between some nodes are more important than links between other nodes, so the authors suggest to use some algorithms to assign nodes which should be directly connected. The described problem is similar to the well-known problem from the graph theory, i.e., the Dominating Set (DS) problem which is defined as the problem of searching of a set of dominating nodes D such that each node is in D or is a neighbor of D. There are several variants of this problem applicable to wireless and optical networks [16] [17]. One of the most important variants is the k-DS problem defined as follows: each node belongs to dominating set D or is at distance k or less from at least one member of D. Note that for k = 1 this problem is the same as the classical DS problem described above. In the next sections, several simple k-DS algorithms are presented and used to select dominating nodes for some topologies. Finally, efficiency of these algorithms will be compared by simulations. A. k-DS algorithms The Dominating Set problem is a classic NP-complete problem. One of techniques used to solve such a problem is a heuristic which allows to get good, but usually not optimal, solution. The simplest heuristic algorithm used in this paper, denoted as BA (Basic Algorithm) algorithm, operates as follows: 1) each node is denoted by unique identifier ID, 2) set D as an empty dominating nodes set,

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings

3) for each node n calculate number of nodes N(n,k) that are in the distance k or less than k from node n; if there exist multiple nodes with the same max N(n,k) select the node with the smallest ID, 4) find node n with max N(n,k) and add this node to D, 5) repeat step 3 until D will be k-DS. The presented algorithm is very simple and, as shown in the next section, is not optimal. Next, a more complex algorithm, denoted as EA (Easy Greedy Algorithm), introduces the set of covered nodes C defined as a set of nodes that are in D or are in the distance of k or less than k from D. Again, the simplest algorithm with C defined in such a way can be formulated as follows: 1) each node is denoted by unique identifier ID, 2) set D as an empty dominating nodes set and C as an empty covered nodes set, 3) for each node n calculate number of nodes N(n,k) that are in the distance k or less than k from node n, 4) find node n with max N(n,k) such that n is not in D and not in C; if there exist multiple nodes with the same max N(n,k) select the node with the smallest ID, 5) add node n to D, all nodes in the distance of k or less than k from node n add to C, 6) repeat steps 3-4 until D will be k-DS. The next four algorithms are variants of the EA algorithm. The first one is such that only a node that is not in the D set and is not in the C set is treated as a neighbor. This algorithm is denoted as GA1 (Greedy Algorithm type 1) and may be formulated as follows: 1) each node is denoted by unique identifier ID, 2) set D as an empty dominating nodes set and C as an empty covered nodes set, 3) for each node n calculate number of nodes N(n,k) that are in the distance k or less than k from node n and are neither D nor C set; 4) find node n with max N(n,k) such that n is not in D and not in C; if there exist multiple nodes with the same max N(n,k) select the node with the smallest ID, 5) add node n to D, all nodes in the distance of k or less than k from node n add to C, 6) repeat steps 3-4 until D will be k-DS. The next algorithm, denoted as GA2 (GA type 2), is such a modification of the GA1 algorithm that a new dominating node, found in step 4, may be the member of the covered nodes set. The next two algorithms, denoted GA3 (GA type 3) and GA4 (GA type 4), are such a modification of GA1 and GA2 algorithms, respectively, that from among candidates to be a dominating node with the same number of neighbors, the node with the largest number of directly connected neighbors is selected rather than the node with the smallest ID. The GA4 algorithm may be, therefore, formulated as follows: 1) set D as an empty dominating nodes set and C as an empty covered nodes set, 2) for each node n calculate number of nodes N(n,k) that are in the distance k or less than k from node n and are

Fig. 2. Analyzed topologies: a) NSFNET, b) Long Haul, c) Cost266, d) Nobel UE

neither D nor C set; 3) find node n with max N(n,k); if there exist multiple nodes with the same max N(n,k) select the node with the largest number of adjacent nodes, 4) add node n to D, all nodes in the distance of k or less than k from node n add to C, 5) repeat steps 3-4 until D will be k-DS. The last algorithm, denoted as EH, was described by M. El Houmaidi in [19] where it was used to calculate placement of wavelength converters in all-optical networks. B. Topologies and theirs dominating sets The algorithms described in the previous section were used to calculate dominating set nodes for several commonly used topologies such as NSFNET [18], U.S. Long Haul [19], Nobel UE [20], and Cost266 [20] (shown in Figure 2). The number of nodes and the number of links for each topology are shown in Table II. The k-DS for k = 1, 2, 3 were calculated by using all algorithms described in the previous section. Results of these calculations are shown in Table III. TABLE II A NALYZED TOPOLOGIES Topology NSFNET Long Haul Nobel UE Cost266

Nodes 14 28 28 37

Links 21 45 41 57

As mentioned above, the selected nodes might be directly connected to achieve better reliability parameters. In some cases, however, the number of selected nodes is too high or too low. For example, the dominating nodes set selected by 3-DS algorithms for the NSFNET topology includes only one node, while the 1-DS BA algorithm for the Cost266 topology selects 26 nodes. Note that the number of nodes depends also on the algorithm which is used to calculate these nodes. The

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings

TABLE III D OMINATING SET NODES FOR K -DS ALGORITHMS Topology

NSFNET

Long Haul

Nobel UE

Cost266

Algorithm BA EA GA1 GA2 GA3 GA4 HE BA EA GA1 GA2 GA3 GA4 HE BA EA GA1 GA2 GA3 GA4 HE BA EA GA1 GA2 GA3 GA4 HE

Dominating nodes k-DS k=1 k=2 1,2,3,4,5,10,11 3,5,11 1,6,8,10,11 7,8,11 1,5,8,10,13 7,8,11 1,5,9,10 1,11 1,6,8,10,11 7,8,11 1,3,5,10,11 10,11 1,4,5,9,10,11 10,11 1,2,3,4,5,8,10,12,15,16,17,20,22,25 4,8,12,16,17,25 1,4,7,10,12,15,20,22,24 4,14,16,23 1,5,7,10,12,19,22,24 4,14,16,23 1,5,6,10,12,19,22,23 4,14,16,21 1,5,7,10,12,19,22,24 4,14,16,23 1,5,8,10,12,19,22,25 4,15,16,22 4,5,8,10,12,15,17,20,22,25,27 4,16,17,25 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17, 3,5,9,10,11,12,13,14,15,16,22 18,19,20,21,22,23,24,27 2,4,6,9,12,14,17,18,19,25,27 1,6,14,16,18 1,6,9,12,14,18,19,23,25,29 1,6,14,16,18 1,6,9,14,15,16,23,24,25 1,10,14,16,18 1,6,9,12,14,18,19,23,25,28 1,6,14,16,18 1,6,9,10,14,16,20,21,23,24 4,10,14,16,18 3,4,8,9,10,14,15,16,17,18,20,21,22,24 4,9,13,14,16,22 2,4,5,6,8,9,12,13,14,15,16,18,19,20,21, 4,5,8,13,15,18,19,20,25,26,29 22,23,24,25,26,27,28,29,30,32,34 2,4,6,12,13,15,22,23,26,28,31,33,35,37 2,13,18,29,31,37 2,4,7,12,13,17,22,26,27,31,33,34 2,13,18,26,34 1,4,7,12,13,17,18,22,26,32,34 4,13,18,24,26 2,4,6,12,13,15,22,23,26,28,31,33,35,37 2,13,18,26,34 4,5,12,13,15,18,19,23,26,29,30,34 4,13,18,26,28 4,5,9,13,14,15,16,18,19,20,26,27,28,29,30,36 4,13,18,20,26,29

k parameters in the k-DS algorithms should be, therefore, carefully selected. The usefullness of these results has been verified by simulations. C. Simulation tool and used network topology The simulations are prepared with the use of the Network Simulator (NS-2) simulation environment [21], with an additional patch [22] and extensions prepared by the authors of [23]. These extensions allow to simulate GMPLS behavior with out-of-band signaling and the asymmetrical architecture. All implemented procedures and mechanisms have been tested and verified, and some results of simulations have been presented in [2], [24]. Two topologies, NSFNET and Nobel UE, have been chosen to verify influence of the selected dominating nodes on the reliability. For both topologies several simulations were run: • with the control plane topology symmetrical to the data plane topology, denoted as Ref ; • with the modified control plane topology, based on selected dominating nodes there all dominating nodes have been connected directly. For the NSFNET topology, the dominating nodes set for k = 1 was chosen, and for Nobel UE the dominating nodes set for k = 2. Moreover, the simulation with the topology based on the dominating nodes selected by the BA algorithm for k = 2 has been skipped because the number of selected nodes, and in consequence, the number of additional links were too high. The number of dominating nodes and the number of links

k=3 1 1 1 1 10 10 11 8,12,16 1,12,14 2,12,18 2,10,12 2,12,18 4,12,16 8,16 5,9,11,12,16,22 3,16 3,16 3,16 3,16 14,16 9,14,16 8,13,18,20,24,25,29 2,20,27,31 4,20,31 4,16,20 4,20,31 4,20,26 13,18,29

TABLE IV A DDITIONAL LINKS IN ANALYZED TOPOLOGIES Topology

NSFNET, k = 1

Nobel UE, k = 2

Algorithm BA EA/GA3 GA1 GA2 GA4 EH BA EA/GA1/GA3 GA2 GA4 EH

Number of dominating nodes 7 5 5 4 5 6 11 5 5 5 6

Number of additional links 14 10 10 5 7 11 43 10 10 10 14

are shown in Table IV. Note that some selected dominating nodes are directly connected in the symmetrical topology, and therefore, there is no need to connect them in the analyzed topologies. For all simulations and for a given topology same traffic and failure patterns were assumed. The pattern contains: • 10 randomly selected failures during 200 s of simulation (one failure per 20 seconds), • 800 randomly selected connections with the dedicated 1:1 end-to-end backup (80 connections per failure). The parameter that is measured is MTTR described in the previous section. The results of simulations for the NSFNET topology are shown in Figure 3, and for Nobel UE in Figure 4.

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings

the context of the optical network devices availability values, is another issue to be considered in the future work. R EFERENCES

Fig. 3.

Results of simulations for NSFNET topology and 1-DS algorithms

Fig. 4. Results of simulations for Nobel UE topology and 2-DS algorithms

In both cases, the 95% confidence intervals were calculated and presented. The results confirm that the additional links in the control plane are able to reduce MTTR. This impact depends on the number of selected nodes and, first of all, on the number of added links. Note that in the case of nodes selected by the BA algorithm for the NSFNET topology the number of additional links is 14 while for the GA1 and EA algorithms the number of links is 10 and for the GA2 algorithm, only 4 additional links. In this context, the interesting result has been obtained for the EH algorithm where as many as 11 additional links allow to reduce MTTR by only a few percent. A much better result was reached in the case of the Nobel UE topology but, again, the number of additional links was bigger than that for the GA1 and EA algorithms. IV. C ONCLUSION AND FUTURE WORK As expected, the simulations confirm the impact of the control plane topology on reliability of the GMPLS network. The additional links in the control plane are able to improve the MTTR parameter. The proposed method of determining additional links based on finding the dominating nodes allows to achieve satisfying results, but to obtain a deeper insight, the further research in this area is needed. The future work will be focused on developing of the presented method for more realistic network models with non-uniform traffic and bandwidth or delay of link represented by weighted edges in the graph. Cost-effectiveness of the proposed algorithms, especially in

[1] E. Mannie, Ed., “Generalized Multi-Protocol Label Switching (GMPLS) Architecture”, RFC3945 [2] P. Rozycki, J. Korniak, A. Jajszczyk, “Failure Detection and Notification in GMPLS Control Plane”, IEEE ICC 2007: Workshop on GMPLS Performance Evaluation: Control Plane Resilience, 24 June 2007, Glasgow. [3] J. Korniak, P. Rozycki “Signaling improvements for GMPLS control plane”, Proceedings of the 2nd Conference “Tools of the Information Technology”, 2007, Rzeszow [4] P. Rozycki, J. Korniak “End-to-end protection strategies in the GMPLS networks”, Proceedings of the 2nd Conference “Tools of the Information Technology”, 2007, Rzeszow [5] P. Cholda, “The Reliability Analysis of Recovery Procedures in GMPLSbased Optical IP Networks”, PhD Thesis, Krakow, 2005 [6] K.C.-H. Chu, M. Mezhoudi, M. Y. Hu, “Comprehensive end-to-end reliability assessment of optical network transports”, Optical Fiber Communication Conference and Exhibit, 2002 [7] M. Tornatore, G. Maier, A. Pattavina, M. Martinelli, M. Villa, A. Righetti, R. Clemente, “Availability optimization of static path-protected WDM networks”, Optical Fiber Communication Conference and Exhibit, 2003 [8] O. Komolafe, J. Sventek, “Impact of GMPLS Control Message Loss”, Journal of Lightwave Technology, vol. 26, issue 14, pp. 2029-2036 [9] J. Segovia, E. Calle, P. Vila, “Availability analysis of GMPLS connections based on physical network topology”, International Conference on Optical Network Design and Modeling, 2008. [10] R. Martnez, R. Casellas, R. Muoz, “Experimental evaluation of GMPLS enhanced routing for differentiated survivability in all-optical networks”, Journal of Optical Networking, Vol. 7, Issue 5, pp. 496-512 [11] J. Perello, S. Spadaro, J. Comellas, G. Junyent, “An Analytical Study of Control Plane Failures Impact on GMPLS Ring Optical Networks”, IEEE Communications Letters, Vol. 11, Issue 8, August 2007 pp. 695 697 [12] J. Lang, B. Rajagopalan, D. Papadimitriou, Ed., “Generalized MultiProtocol Label Switching (GMPLS) Recovery Functional Specification”, RFC4426 [13] L. Berger, Ed., “Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVPTE) Extensions”, RFC3473 [14] J.P. Lang, Ed., Y. Rekhter, Ed., D. Papadimitriou, Ed., “RSVP-TE Extensions in Support of End-to-End Generalized Multi-Protocol Label Switching (GMPLS) Recovery”, RFC4872 [15] L. Berger, I. Bryskin, D. Papadimitriou, A. Farrel, “GMPLS Segment Recovery”, RFC4873 [16] M. El Houmaidi, M. Bassiouni, and G. Li, “Dominating set algorithms for sparse placement of full and limited wavelength converters in WDM optical networks“, Journal of Optical Networking, vol. 2, Issue 6, p.162, 2003 [17] F. Dai, J. Wu, ”An extended localized algorithm for connected dominating set formulation in ad hoc wireless networks, IEEE Transactions On Parallel and Distributed Systems, vol. 15, pp. 908-920, 2004 [18] NSFNET T1 topology 1991, ftp://ftp.uu.net/inet/maps/nsfnet/ [19] M. El Houmaidi, Resource allocation schemes and performance evaluation models for wavelength multiplexed optical networks, PhD Thesis, University of Central Florida, 2005 [20] SNDlib Web Page, http://sndlib.zib.de [21] VINT project at LBL, Xerox PARC, USB and UCS/ISI The Network Simulator ns-2 http://www.isi.edu/nsnam/ns/ [22] C. Callegari, F.Vitucci, RSVP-TE patch for MNS/ns-2 http:// netgroupserv.iet.unipi.it/rsvp-te ns/ [23] J. Korniak, P. Rozycki, “GMPLS – simulation tools”, Proceedings of the 1st Conference “Tools of Information Technology”, Rzeszow, Poland, 2006 [24] J. Korniak, P. Rozycki, “Performance examination of the segment recovery in GMPLS”, 14th Polish Teletraffic Symposium 2007, 20-21 September 2007, Zakopane

2009 IEEE International Confernece on Communications ICC 2009

Proceedings

Dresden, Germany 14-18 June 2009

CFP09ICC-USB

2009 IEEE International Conference on Communications Copyright © 2009 by the Institute of Electrical and Electronic Engineers, Inc. All rights reserved. Copyright and Reprint Permissions Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. IEEE Catalog Number: ISBN 13: Library of Congress No.: ISSN:

CFP09ICC-USB 978-1-4244-3435-0 81-649547 1938-1883

Printed copies of this publication are available from: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected]

Produced by IEEE eXpress Conference Publishing For information on producing a conference proceedings and receiving an estimate, contact [email protected] http://www.ieee.org/conferencepublishing

Suggest Documents