Label Switched Paths Re-configuration under Time-Varying Traffic

0 downloads 0 Views 102KB Size Report
process. We present a mixed integer LP formulation of this problem, a more efficient heuristic, as well as results on test networks. Keywords: traffic engineering ...
Label Switched Paths Re-configuration under Time-Varying Traffic Conditions Sandford Bessler Telecommunications Research Center Vienna(ftw) Donau-City Str. 1, A-1220 Vienna, Austria phone: (+43) 1 505283043, fax: (+43) 1 5052830 99 email: [email protected]

Abstract Multiprotocol label switching (MPLS) has several advantages over destination-based IP routing protocols: it allows to setup end to end paths explicitly (also called label switched paths, LSP), to better monitor the traffic on these LSPs, to perform admission control, etc. While routing along a LSP is considered faster than IP routing, the operation of changing a LSP pipe requires processing and bandwidth resources in the network. This paper investigates cost optimized ways for re-dimensioning existing LSP pipes, to accommodate changing traffic demands. In the presented model the goal is to maximize the amount of carried traffic, while keeping the number of LSP modifications at a minimimum. The presented off-line procedure can be made part of a periodical traffic engineering process. We present a mixed integer LP formulation of this problem, a more efficient heuristic, as well as results on test networks. Keywords: traffic engineering, multi-commodity flows, MPLS, QoS routing, LSP re-optimization, signaling costs, multihour traffic

1

Introduction

This paper presents techniques for traffic engineering in QoS- supported IP networks. The approach followed in this paper is based on a centralized optimal routing scheme that, if used in conjunction with the multiprotocol label switching (MPLS) technology, opens the possibility for online admission control and dynamic route assignment. MPLS is an enabling technology for IP networks, with application in traffic engineering. It basically consists of an IP packet forwarding mechanism, a label distribution protocol, control procedures to set-up and tear down Label Switched Paths, and a constraint based routing scheme, especially when path selection methods use other criteria than a metric.[1, 7, 10, 11, 17] A lot of research work has been done in adapting and reformulating different routing problems in ATM and IP

networks in the context of the new MPLS technology. Some approaches used flow optimization algorithms to minimize the maximum link utilization and to reduce in this way congestion [18]. Kodialam and Lakshman [4] solves a series of max-flow problems to find out the critical links in which interference to other paths is likely to occur. The approach followed in this paper is mostly related to the works of Mitra and Ramakrishnan [6] and Suri et al.[2]. The routing problem is equivalent to a linear multicommodity flow problem, for which efficient algorithms exist [19]. Some authors refer to it as the optimal routing, because the obtained solution is a bifurcated multicommodity flow (MCF) that can be reached only by having the knowledge of the whole traffic demands in the network (centralized routing). As observed in [2], splitting an aggregated demand (commodity) on several paths does not imply splitting any individual flow resulted form an online bandwidth request. Moreover, the load sharing capability of MPLS routing is one of the main advantages over OSPF routing (and have lead to a new protocol, OSPF-OMP) [12], so that the requirement for single path routing in some works [20, 18] is imposed only for administrative and simplicity reasons. There are basically two possibilities to achieve a feasible flow-path allocation for any aggregated traffic matrix (we denote also demand matrix): one is to allow variable link capacities leading to a network dimensioning problem. In the studied model, the part of demand exceeding the network capacity is allowed to be lost, without producing earnings. The resulting flows become the bandwidth of the created or modified LSP tunnels and are the basis for admission control of QoS traffic.

1.1 The need for re-optimization A major contribution in this paper is the optimization with the additional goal of minimizing changes to the existing Label Switched Paths (LSP) created in a previous planning step. These changes are associated with signaling costs that reduce the revenues obtained by routing additional traffic into the network. In [9], the authors analyze the traffic streams in a large

point of presence (POP). Because of large (15 to 30% ) time of day traffic variations in the studied network, the authors see the need to have a load balancing policy over the time scale of a few hours and reroute mainly large streams (called ”elephants”). An even larger benefit of the procedure presented here isn’t in the time of day traffic variations, that are well understood and for which alternate paths are available, but for the new business models requiring flexible, unanticipated bandwidth provisioning. To our knowledge there are very few works that describe the whole life cycle of traffic engineering activities using MPLS, in the time range of hours to days. Scoglio et al. [3] adapt the MPLS network topology based on the current traffic load. The decision to set-up or tear down LSP is taken dynamically at the arrival of a bandwidth request, and is based on thresholds that depend on IP routing versus LSP signaling costs. Carpenter et al. [18] address the robustness of the flow allocation to the LSP at forecast uncertainty. They describe a procedure for creating new paths and allocating the new traffic again. There are basically two possibility to cope with the bandwidth reserves in the network: either to offer only a part of the link capacity and reserve the rest for nonMPLS traffic, or to scale up the traffic matrix, until it is constrained by the link capacities [20].

1.2

out double counting, and rerouting smoothly the traffic on the new path. The scheduling functional block shown in Figure 1 is needed to smoothen the signaling load, as the number of changes can be quite large. At service invocation time, a process of traffic aggregation takes place in the ingress routers: packet classification is used to map the packets in ”forwarding equivalence classes” (FEC) The packets related to a SLA are marked accordingly and are forwarded to the appropriate LSP tunnel. If RSVP is used in the access network, the micro-flow requests can be associated to existing aggregated pipes.

Topology

CB route generation All LSP candidates Planning period LSP ReEvent dimensioning

Changed LSPs

Traffic matrix

Forecasting

LSP scheduler RSVP_TE

LSP Statistics

SLAs

Architectural aspects

It seems that the deployment of MPLS technology to engineer data streams with QoS requirements such as bandwidth, delay, loss probability is still in a beginning stage. One reason for that is the missing of an agreed service management architecture to provide the information for traffic engineering decisions. The Service Level Specification (SLS), studied for example in the Tequila project [15] is the key for the ability to manage bandwidth requests such as ”the customer wants a 2 MBit/s video connection between 8pm and 11 pm to a certain video server ” or ”the customer requests to push daily 2 MBit/s into the network between 8am and 4pm” (hose model). In the general case, the customer that subscribes to a service which requires QoS provisioning, delegates to the service provider the negotiation of a service level agreement (SLA) with the network provider. At the network provider, the SLS subscription should trigger the traffic forecasting and network dimensioning update processes. If we refer specifically to the MPLS technology, an offline LSP dimensioning procedure is triggered by the new traffic matrix, and calculates the LSP changes, as shown in Figure 1. In order to enforce these changes, the extended resource reservation protocol RSVP-TE [16] can be used. All the functions needed for the enforcement of the LSP changes resulted from the optimization are supported by RSVP-TE: create a new LSP, destroy a LSP, increase the bandwidth of a LSP, decrease the bandwidth of a LSP. The last two operations are done internally by creating a new path, maintaining the old reservation with-

Figure 1: LSP re-configuration architecture

2 Problem Formulation In this section we formulate the multi-commodity flow problem (MCF) in a MPLS-enabled IP network and add constrains related to existing LSP pipes. Consider a network with N nodes and U links with available capacity cu . cu represents in practice the part of the link capacity allocated to MPLS pipes. Another part of the link capacity could carry best effort traffic or IP routed traffic that can be allocated optimally in a subsequent step like it is done in [6]. The commodities are defined by the triple source, destination node and the traffic class (e.g video, VoIP, etc.). It has to be noted that only the edge nodes (called ingress and egress nodes) of the network are traffic sources or sinks, the other core nodes process only transit traffic. The MPLS technology allows to setup explicit routes (ERO) that carry QoS traffic. In the followed approach, a preprocessing step performs the constraint based routing, i.e. selects for each commodity k a number of path alternatives p(k) satisfying QoS requirements, link and node preferences, node disjunction or resilience requirements. p(k) represents the maximal set of paths per commodity, including therefore the existing paths. In case of persist-

ing traffic bottlenecks for example, it should be possible to augment the set of paths. A large number of paths will however increase the signaling and scheduling overhead, as well as the bandwidth fragmentation, that is the part of the LSP bandwidth that remains unused because individual bandwidth requests are larger. For the reason of explicit routing, we use the path formulation of the MCF problem [19]. For each j from j = 1, 2..., p(k) let Pjk be the j-th path with Pjk (u) = 1 if u ∈ Pjk and 0 otherwise. The variables of the problem are the flows xkj that are carried on some of the p(k) paths and sum up to the demand dk . At the end of the procedure, the flows and the corresponding paths lead to the setup of MPLS tunnels of bandwidth xkj . Assuming that each flow unit brings a revenue of ekj , we define the objective to be maximized as the revenues earned by carrying as much as possible of the demands dk [6]. The novel aspect in the formulation of the MCF problem is the additional constraint to express that each new solution has to take into consideration an existing set of tunnels x0kj calculated in the previous planning step. One cannot simply tear-down the existing tunnels, first because they carry traffic all the time, and second, because of the large amount of signaling traffic created with these changes. Therefore, we introduce into the objective function the penalty ckj of changing the bandwidth of the existing tunnel x0kj . ½ yjk

=

subject to : K p(k) X X

Pjk (u)xkj ≤ cu , u ∈ U

p(k)

X

xkj ≤ dk , k = 1, ...K

(5)

j=1

xkj ≥ 0, j = 1, ..., p(k), k = 1, ..., K

x0kj (1 − zjk ) + yjk ≤ xkj ≤ (yjk − zjk )M + x0kj , j = 1, . . . , p(k), k ∈ K (7) The unity costs ckj may depend on the individual path, being proportional for example to the number of router nodes on the path. For simplicity reasons, we assume that the costs for both creation and re-dimensioning of an LSP are equal. The inequalities (4) state that the flow on each link should not exceed the reserved link capacity cu . There are |U | capacity constraints. The inequalities (5) express the admission constraints: the calculated flows sum up in the best case to the traffic demand dk . The slack represents the lost traffic, i.e. the part of the demand traffic that is rejected.

(1)

We started the experiments with the small network topology showed in the figure and used in [3].

55

88 66

11

44 77

22 33



zjk )

+

yjk



xkj



(yjk

j = 1, . . . , p(k),



zjk )M k∈K

+

x0kj ,

K p(k) X X k=1 j=1

ekj xkj − ckj yjk

99

10 10

(2)

where M is a large constant. We can easily check that if xkj = x0kj then yjk = 0, otherwise yjk is one. The problem REOPT can now be formulated as follows:

max

(6)

2.1 Numerical results

0 if xkj = x0kj 1 otherwise

The binary variable yjk are set to one, only if the corresponding tunnels xokj have to be re-dimensioned, or a new tunnel corresponding to another path j has to be created. (1) is a non-linear constraint as encountered in problems with fixed costs [13]. Standard solvers like CPLEX [14] have difficulties with such nonlinear constraints. With some tricks we obtain the following inequalities equivalent of (1), which require two binary variables yjk and zjk : x0kj (1

(4)

k=1 j=1

(3)

Figure 2: Example network topology Two explicit paths for each of the eight commodities 17, 1-8, 1-10, 2-7, 2-9, 2-10, 1-9 and 2-8 have been (manually) preselected, however this process can be done automatically in practice. The selected routes are intended to be a constant superset, as long as the topology remains

Commodity 1-7 1-8 1-10 2-7 2-9 2-10 1-9 2-8 Total

dk 50 35 25 50 30 25 30 35 280

xk1 , xk2 30, 20 30, 5 20, 5 10, 40 5, 25 15, 10 30, 0 10, 25 280

Commodity 1-7 1-8 1-10 2-7 2-9 2-10 1-9 2-8 Total

Table 1: Demands, initial flow distribution ckj 9.3 12.4 20 24

Net earnings 460 437 392 372

Changes 8 7 5 4

Lost Mbs 0 6 22.7 27.2

Table 2: 25% demand variation, impact of unit change costs unchanged. We consider a single QoS traffic class, although several QoS traffic classes do not have any impact on the model, they affect only the assignment of path candidates to commodities. The link capacities have been set to 100 in order to create a moderately loaded network. A first run creates a flow distribution x, that is set to x0. In a first experiment with the test network, we simulated a traffic shift situation by increasing the traffic form node 1 to the other commodities by about 25% and decreasing the traffic from node 2 also by 25%. This is in conformance with the observation in [9] that large streams display large variations during the day and that a load balancing strategy has to be achieved to reroute mainly the few large traffic flows (”elephants”). In Table 2 we show the impact of changing the relationship between revenue and change costs on the solution. With ekj constant end equal to 1.9, the amount of lost traffic increases when changes become expensive. As expected, the net earnings decrease, the amount of changes decreases with making them expensive. The initial flow allocated on the link 1-4 has contributions from demands on the commodities 1-7, 1-8, 2-7, 2-8 so that the residual capacity on the link 1-4 is zero. Some of the demands (on commodities 1-7, 1-8) increased, the other (2-7, 2-8) decreased. After the optimization run with ckj = 20 and 25% demand variation, the residual capacity of link 1-4 changes to 20.5, because of rerouting of some commodities on other LSPs. In Table 3 the calculated flows for ckj = 20 are shown. The behavior of the procedure is as expected, it redistributes the traffic on other paths, but does it with minimal changes. We can even improve the solution by reducing the number of changes indicated in the variable y, if we

dk 62.5 43.7 31 37.5 22 20 38 27 281.7

xk1 , xk2 30, 32.5* 30, 5 20, 5 10, 27.5* 5, 17* 10*, 10 30, 0 10, 17* 259

Table 3: Solution for ckj = 20. Changed LSPs are marked with *

make the following observation: the current model always requires to change the LSP bandwidth if the new demand is lower than the old demand ! During the search this is needed to allow the eventual size increase of another LSP. However, once the final solution is found, for those decreasing demands dk we could set the total flow to the old value x0, in case the link capacity constraints on that path are fulfilled. With other words, when a traffic demand decreases, we reduce the size of the corresponding tunnels, only in case that bandwidth is needed elsewhere. This ”lazy” assignment, shown in the pseudo-code below, will keep LSP sizes according to a peak traffic value if the residual path capacity res is large enough. However as soon as some higher traffic demands have to be accommodated, the oversized tunnels are changed to the actual needs. In order to illustrate the behavior above, we have run the optimization procedure repeatedly, changing the demands randomly between 50% and 150% . After each iteration, we apply the ”lazy assignment procedure”: do for all 1 ≤ j ≤ p(k), 1 ≤ k ≤ K such that xkj < x0kj res ← minu/Pjk (u)=1 (cu −

PK Pp(i) i=1

l=1

Pli (u)xil )

if res ≥ x0kj −xkj then xkj ← x0kj & yjk ← 0 end The results for the commodity 1-7 during 10 reoptimization periods are shown in Figure 3. We can observe that the total flow follows the demand until the fourth planning period. After that, the decrease in demand and the existing residual capacity allow to maintain a higher reserved bandwidth (denoted here with the total flow) according to out ”lazy” changes. Comparing the demand and total flow for the commodity 1-8 for example, we can see in Figure 4 both the case of high demand that is too costly to carry (lost traffic) and the case of an over-dimensioned tunnel that is too costly to change when the demand decreases.

80 70 60 50 40 30 20 10 0

demand total flow LSP 1-4-6-7 LSP 1-5-8-7

1

2

3

4

5

6

7

8

9 10

lost 134 97 138 211 174 213 144 206 114 245

P

(x) 1305 1181 1225 1190 1150 1166 1164 1158 1257 1182

P (y) 33 38 31 27 22 23 27 26 33 25

Lost 123 91 113 202 161 185 141 191 113 232

P

(x) 1316 1187 1250 1199 1163 1194 1167 1173 1259 1195

P (y 33 37 30 26 23 23 26 25 31 23

Table 4: Comparison between linear relaxation (left) and integer solution (right) (Core NSF network [6]). Figure 3: Demand and flow variation of commodity 1-7

50 45 40 35 30 25 20 15 10 5 0

demand total flow

1

2

3

4

5

6

7

8

9 10

Figure 4: Demand and flow variation of commodity 1-8

2.2

A LP relaxation heuristic

In the link-path flow formulation used above, the number of variables and constraints depends on the number of links U , commodities K and preselected path alternatives p(k). As an example, for a network with 10 ingress and 10 egress nodes, and 3 QoS traffic classes, we obtain K=300 commodities (full traffic matrix). If 3 paths are preselected for each commodity we have: 900 xkj variables, 1800 binary variables and more than 2000 constraints. The binary constraints make the problem intractable for large instances. Therefore, we compared the problem REOPT with the following heuristic based on a linear relaxation. We remove the integrability constraints and solve the LP problem. In a subsequent step, we analyze the obtained LP solution for each commodity. Let us define the net profit for an increasing flow by (xkj − x0kj )ekj − ckj . If this expression is negative, the change is not worth to be done, therefore we set yjk = 0 and xkj = x0kj Otherwise, we perform the change setting

L/O 62 -22 76 -174 48 52 13 7 -45 111

P (x) 1377 1400 1357 1336 1353 1336 1309 1368 1334 1380

P

(y) 14 6 13 8 18 21 8 10 14 14

Lost 134 187 213 86 161 202 145 203 135 259

P (x) 1305 1190 1220 1075 1240 1186 1177 1172 1154 1232

P

(y 33 24 21 26 23 25 20 20 26 22

Table 5: Impact of the lazy dimensioning (left) on the number of LSP, admitted and lost traffic. (Core NSF network [6])

yjk = 1. For decreasing flows, we apply the ”lazy assignment procedure”. We compared the integer and the relaxed solutions on the network example Core NSF used in [6]. The network has 8 nodes, 20 links, 64 commodities and one traffic class. For most commodities we can choose between 2 routes. To create test instances, we started with one demand matrix and one initial solution x0, then changed the demand matrix randomly to values between 50% to 150% and the initial solution between 75% to 125% and repeated the experiment 10 times with both algorithms, using the CPLEX solver. Table 4 shows the number of changes, the total flow admitted and the lost bandwidth for both algorithms. The exact (integer) procedure produces on the average 7,9% less LSPs changes and 2,8% less lost traffic than the heuristic. Also for this network example, if we apply the ”lazy dimensioning” scheme during 10 periods to LSP reconfiguration, the number of changed tunnels is drastically reduced from an average of 24 to an average of 12.6. (Table 5). Note that, when the difference between total demand and admitted traffic becomes negative, we have instead of a lost traffic - a number of over-dimensioned tunnels.

3

Conclusions and future work

We have presented a multi-commodity flow formulation for the problem of periodical re-optimization of QoS flows taking into consideration existing LSP tunnels. The model uses explicit routes resulting in a link-path formulation. This approach allows to build an off-line traffic engineering system that creates optimized transitions from one LSP configuration to the next one. The resulting number of LSP changes is dependent on ”signaling” costs parameters. A ”lazy” tunnel dimensioning scheme allows the LSP tunnels to adapt gradually to real traffic increases, but keep the bandwidth unchanged in case of periodical traffic oscillations. Future research will focus on the scheduling of LSP changes into the network in order to limit the signaling traffic load. Finally, the algorithms discussed above will be integrated into a closed loop traffic engineering system, that considers service level agreements, novel methods for traffic forecasting.

Acknowledgments This work has been done at ftw, the Telecommunications Research Center Vienna, within the project ”Performance Management over wired Networks: End to End Architecture and Realization”, a project funded by the Austrian government.

References [1] X.Xiao, A. Hannan, B. Bailey, LM Ni, Traffic Engineering with MPLS in Internet, IEEE Network, March April 2000 [2] S. Suri, M. Waldvogel, PR Warkhede, Profile based routing: A new framework for MPLS traffic engineering,Proceedings of QofIS 2001 [3] C. Scoglio, JC de Oliveira, IF Akyldiz, G. Uhl, A new Threshold-based policy for label switching path (LSP) setup in MPLS networks,, in Proceedings ITC17, 2001 Brazil [4] M. Kodialam, T.V. Lakshman, Minimum interference routing with applications to MPLS Traffic Engineering,INFOCOM 2000. [5] Quality of Service Based routing: Apostopoloulos G, R.Guerin, S.Kamat, S.K.Triphati, A Performance Perspective,In Proceedings of SIGCOMM, pages 1728, Vancouver, Ontario, CANADA, September 1998. [6] D. Mitra, KG Ramakrishnan, Techniques for Traffic Engineering of Multiservice, Multipriority Networks, BLTJ Vol. 6 No.1, 2001

[7] IETF Draft, http://www.research.att.com/ jrex/jerry/annex6tewg-qos-routing-03.txt.pdf [8] Grenville Armitage, MPLS: The magic behind the myths IEEE Comm. Mag. Jan 2000 [9] S. Bhattacharyya, C. Diot J. Jetcheva, N. Taft, Pop-Level and Access-Link-Level Traffic Dynamics in a Tier-1 POP, Technical Report TR01-ATL020201, Sprint Labs, February 2001. Available at http://www.sprintlabs.com/PEOPLE/nina/papers.html. [10] A Framework for Internet Traffic Engineering, draft-ietf-tewg-framework-05.txt [11] G.Ash, Traffic Engineering and QoS Methods for IP-, ATM-, and TDM-Based Multiservice Networks, ¡draft-ietf-tewg-qos-routing-01.txt¿ [12] C. Villamizar, MPLS Optimized Multipath, http://fictitious.org/internet-drafts/mpls-omp/mplsomp.html [13] C.H: Papadimitriou, K. Steiglitz, Combinatorial Optimization: Algorithms and Complexity, Prentice Hall, 1982. [14] CPLEX Solver, www.ilog.com [15] Tequila Project, http://www.ist-tequila.org/, Deliverable D1.1 - Functional architecture definition and top level design [16] D. Awduche et al., RFC 3209 - RSVP-TE: Extensions to RSVP for LSP Tunnels [17] Bruce Davie, Yakov Rekhter, MPLS - technolgy and Applications, Academic Press 2000 [18] T. Carpenter, K.R Krishnan, D. Shallcross, Enhancements to Traffic Engineering for Multiprotocol Switching, ITC17, Brazil [19] Gondran, M. Minoux, Graphs and Algorithms, 1984 [20] G. Hasslinger, S. Schnitter, Algorithms for traffic engineering, INFORMS 2002

Suggest Documents