• No results found

An incremental algorithm for calculation of backup-paths in link-state networks: Brief announcement

N/A
N/A
Protected

Academic year: 2022

Share "An incremental algorithm for calculation of backup-paths in link-state networks: Brief announcement"

Copied!
1
0
0

Loading.... (view fulltext now)

Full text

(1)

Brief Announcement: An Incremental Algorithm for Calculation of Backup-Paths in Link-State Networks

Pierre Fransson and Lenka Carr-Motyˇckov ´a

Lule ˚a University of Technology SE–971 87 Lule ˚a, Sweden {

pierre, lenka

}

@sm.luth.se

Categories and Subject Descriptors: F.2.2: Routing and layout

General Terms: Algorithms, Performance, Reliability.

Keywords: Routing, link-state networks, backup-paths.

Link-state routing algorithms, such as OSPF (Open Short- est Path First) and IS-IS are popular and widely used intra- domain routing protocols. Link-state routing is generally seen as quite efficient at recalculating routing paths when the network topology changes due to component outages and has been able to cope well with the requirements of tra- ditional Internet applications. However, newer applications (such as Voice-over-IP) have more stringent requirements re- garding convergence times. In trying to cope with these new requirements, it can be noted that it is hard to reach suffi- ciently fast reaction times, i.e.,≈ 100 milliseconds, using the normal link-state mechanism; flooding of LSAs followed by recalculation of theSP T :s. A possible solution when fast re- action times are necessary, is instead to precompute backup paths that can be immediately used by routers as soon as a failure is detected. Herein we present a new algorithm for calculation of backup-paths available through directly connected neighbors, in link-state routing networks. The algorithm can be implemented in todays link-state routing protocols, e.g., Open Shortest Path First (OSPF), with a minimum of modification to such protocols.

The algorithm, hereafter referred to as the backup-algorithm, is based on a minimalistic strategy. Only using backup- paths that are available by forwarding packets to other di- rectly connected neighbors and letting those neighbors for- ward the packets along their ordinary forwarding paths.

This approach requires a minimum of modification to link- state routing protocols, since it only relies on a method of detecting a failed neighbor. Other than that there is no kind of signaling that takes place between routers. Keep- ing modification to a minimum is an important issue when adding functionality to existing routing protocols, since the amount of modification needed to a large extent determines

Copyright is held by the author/owner.

PODC’04, July 25–28, 2004, St. Johns, Newfoundland, Canada.

ACM 1-58113-802-4/04/0007.

how easy it will be to deploy the functionality into existing networks.

The backup-algorithm is a derivative of the incremental algorithm and like it, it requires that a shortest path tree (SP Tinit) has already been produced. In order to ensure that it is possible for sources to reroute a packet destined for destinationu, via neighbor m, when neighbor n (on the ordinary shortest path) has failed, the incremental Dijkstra algorithm is augmented/modified in a couple of aspects so that the failed neighborn is guaranteed to be circumvented.

Because the failed neighbor is avoided, it is possible to com- pute the minimum cost backup-paths that are available by simply forwarding packets to directly connected neighbors.

The most important change compared to the ordinary in- cremental algorithm, is that the backup-path algorithm uses the knowledge of which subtree (Tn) a vertex belongs to in the original shortest path tree. Instead of just updating the current cost estimate of a path from the source s to a ver- texu, as is done in the incremental algorithm, current cost estimates for paths through all subtrees inSP Tinitare also recorded. The cost estimate used to determine if the vertex is added to the “backup”-shortest path tree, is the minimum current cost estimate of all current cost estimates through all available subtrees. This allows the algorithm to select an alternate path (i.e., through another subtree) when the min- imum current cost estimate implies a path that is infeasible, e.g., traversing the failed neighbor.

Using a Fibonacci heap, the running time of Dijkstra’s algorithm isO(V lg V + E) which results in a running time for a brute force algorithm of O(NV lg V + NE). If the graph is a clique, i.e., |N| = |V | − 1, both the backup- algorithm and the brute force algorithm have the same run- ning time O(V2lgV ). If |N| < |V | then the running time of the backup-algorithm is better than the brute force algo- rithm. Finally, if|N|2 < |V |, the running time for backup- algorithm becomes O(V lg V ) + O(E) + O(V√

V lg(√ V )), which is slightly larger than the running time of Dijkstra’s algorithm. The memory consumption of the backup algo- rithm depends on how the vertices of the initial shortest path tree are distributed amongst the subtrees. The worst case memory consumption arises from a very unbalanced distribution, in which case the asymptotical memory growth becomesO(N(V − N) = O(NV − N2). However, if the ver- tex distribution is balanced, the memory growth becomes O(N(V/N)) = O(V ), which is on par with the memory con- sumption of Dijkstra’s algorithm.

References

Related documents

To motivate the idea of edge-wise immunization consider a social network of organisms sus- ceptible to a disease that is spread via links represented using a graph theoretical

inlämningsuppgifter.” När frågan om guider på hur man använder Blackboard kom upp gav Sara intrycket av att hon inte tyckte att de främst skulle vara riktade mot studenterna och

In these grippers, two opposing parallel axis fingers (or jaws) move toward and away from each other by using a linear motion system that keeps both gripper attachments

In this paper we present a novel non-iterative algorithm for identifying linear time-invariant discrete time state-space models from frequency response data.. We show that the

Furthermore if the frequency response measurements are corrupted with stochastic noise the algorithm is consistent (the true model is recovered as the number of measurements tend

Besides recording the distance from the source to every vertex, u.d, and the predecessor of every vertex, u.π, Dijkstra’s algorithm must be modified to record u.db, u.πb and

Table F.2: The total number of memory accesses for a worst case lookup in HyperCuts (spf ac = 1, 4) when tested on core router databases. One memory access is

We evaluate and analyze the performance of the different schedulers including the basic schedulers and the proposed schedulers in the situation of different capacity constraints