12
@IJRTER-2016, All Rights Reserved 192 Disjoint Multipath Routing for Failure Recovery in IP Networks Using Edged Spanning Tree with Wakeup Mrs. K.Shobana 1 ,Mrs. N.Tamilarasi 2 1 Department of Computer Science,Sri Akilandeswari Women’s College. 2 MCA., M.Phil., B.Ed., SET.,Department of Computer Science,Sri Akilandeswari Women’s College. Abstract—Internet faces many challenges due to link failures. In most of the existing system the failure recovery is made with the help of finding another path to reach the destination but this recovery path may leads to loop formation. In-order to avoid the infinite loop formation we have selected the spanning tree. The contribution of this paper is given as the first contribution of this paper is constructing disjoint paths for failure recovery and multipath routing. The infrastructure necessary for reactive failure recovery schemes is exploited to provide disjoint paths for multipath routing during link failure time. The second contribution of this paper is about the overhead occurred in finding the multipath. The last contribution of this paper is reducing energy usage by keeping the nodes to standby state and wakeup the nodes whenever there is a necessary for the nodes to transmit the packets using the line cards. We illustrate how the spanning trees rooted at a destination may be employed to achieve multipath routing and IP fast recovery. In this method we keeps the host processor in a standby mode, which only consumes a small fraction of power but will reduce the traffic by saving the wakeup time. The traffic formed is considerably reduced during wakeup in standby to sleep mode when compared to sleep to wakeup mode. We propose a new line card design with two major changes. A separate power supply is dedicated to the CPU and its circuits related to it to keep them running during line card is at sleep state and then the nodes on the selected path are made to wakeup. Index Terms—Independent spanning tree, dual link failures, disjoint multipath routing, power efficiency, wakeup time. I. INTRODUCTION In the last few decades, communication has changed the world. Thanks to the massive improvement of both Internet and mobile telephony, now it takes almost no time to find the decent information or reach somebody almost anywhere. Moreover, corporations have changed and nowadays the whole economy depends more or less on communication networks. Since communication networks mesh the world, they need to be quite huge in size. Naturally, in a system huge enough, sooner or later a failure occurs. It is a natural desire that if after the failure of some resources transporting information is still possible, network should remain operable. Mechanisms providing this self-healing aspect are called recovery mechanisms. There are two fundamentally different types of recovery. One approach, called restoration, reactively deals with the failure after it occurred. Although some precomputation can take place, the way of bypassing the failed resource is computed only after the failure. The main advantage of this approach is its simplicity and robustness. Since the failed resource is exactly known, it can well adapt to all the situations. Unfortunately, since significant part of the operation is done only after the failure, this approach. In order to overcome the problems of restoration, protection techniques are applied. Protection techniques are proactive, since they find the way of bypassing some failures long before they happen. Naturally, since preparing to arbitrary number of failures is next to impossible, these techniques prepare to only a given number and given type of failures.

Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

@IJRTER-2016, All Rights Reserved 192

Disjoint Multipath Routing for Failure Recovery in IP Networks Using

Edged Spanning Tree with Wakeup

Mrs. K.Shobana1,Mrs. N.Tamilarasi

2

1Department of Computer Science,Sri Akilandeswari Women’s College.

2MCA., M.Phil., B.Ed., SET.,Department of Computer Science,Sri Akilandeswari Women’s College.

Abstract—Internet faces many challenges due to link failures. In most of the existing system the failure

recovery is made with the help of finding another path to reach the destination but this recovery path

may leads to loop formation. In-order to avoid the infinite loop formation we have selected the spanning

tree. The contribution of this paper is given as the first contribution of this paper is constructing disjoint

paths for failure recovery and multipath routing. The infrastructure necessary for reactive failure

recovery schemes is exploited to provide disjoint paths for multipath routing during link failure time.

The second contribution of this paper is about the overhead occurred in finding the multipath. The last

contribution of this paper is reducing energy usage by keeping the nodes to standby state and wakeup

the nodes whenever there is a necessary for the nodes to transmit the packets using the line cards. We

illustrate how the spanning trees rooted at a destination may be employed to achieve multipath routing

and IP fast recovery. In this method we keeps the host processor in a standby mode, which only

consumes a small fraction of power but will reduce the traffic by saving the wakeup time. The traffic

formed is considerably reduced during wakeup in standby to sleep mode when compared to sleep to

wakeup mode. We propose a new line card design with two major changes. A separate power supply is

dedicated to the CPU and its circuits related to it to keep them running during line card is at sleep state

and then the nodes on the selected path are made to wakeup.

Index Terms—Independent spanning tree, dual link failures, disjoint multipath routing, power

efficiency, wakeup time.

I. INTRODUCTION

In the last few decades, communication has changed the world. Thanks to the massive improvement of

both Internet and mobile telephony, now it takes almost no time to find the decent information or reach

somebody almost anywhere. Moreover, corporations have changed and nowadays the whole economy

depends more or less on communication networks.

Since communication networks mesh the world, they need to be quite huge in size. Naturally, in a

system huge enough, sooner or later a failure occurs. It is a natural desire that if after the failure of some

resources transporting information is still possible, network should remain operable. Mechanisms

providing this self-healing aspect are called recovery mechanisms.

There are two fundamentally different types of recovery. One approach, called restoration, reactively

deals with the failure after it occurred. Although some precomputation can take place, the way of

bypassing the failed resource is computed only after the failure. The main advantage of this approach is

its simplicity and robustness.

Since the failed resource is exactly known, it can well adapt to all the situations. Unfortunately, since

significant part of the operation is done only after the failure, this approach.

In order to overcome the problems of restoration, protection techniques are applied. Protection

techniques are proactive, since they find the way of bypassing some failures long before they happen.

Naturally, since preparing to arbitrary number of failures is next to impossible, these techniques prepare

to only a given number and given type of failures.

Page 2: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 193

Before further discussing recovery techniques, it is important to deal first with the two most common

ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is

the basic object of routing. Therefore, this type of routing is called connection oriented. In these

networks, all the paths are managed separately and it is possible to establish two paths between the same

two endpoints, which were computed in fundamentally different ways. This approach provides quite

high control on forwarding, making it relatively easy to bypass a failed resource. In connection oriented

networks typically both protection and restoration techniques are applied.

On the other hand, it is possible to send data in a connectionless manner, without explicitly establishing

the paths. This scheme can be applied mostly in packet switched networks, where the transported

information is split into small pieces called packets. Each packet has a header with the information

needed for forwarding it to the proper destination. Typically, packets contain a destination address, and

they are forwarded based on this address. Therefore, the assumption in the sequential that the next hop is

determined by the destination.

A routing is the same problem as computing a proper partial order for each node as a destination. In the

common case, when links have lengths and packets are forwarded along the shortest path, this partial

order is a total order; packets are forwarded to a node with smaller distance to the destination. If a failure

occurs, closer nodes may become unavailable. Therefore, restoration in packet switched networks

typically means recomputing the partial orders. Protection in these networks is usually not used,

although it would mean to switch to another, precomputed order.

This lack of protection is a growing problem nowadays due to the development of Internet. Current

Internet is based on Internet Protocol (IP), a typical connectionless, packet switched protocol, with

forwarding (typically) based on the destination address, and with extremely robust restoration but no

protection. Thus, the recovery provided by IP is quite slow, it can take several seconds even in the

simplest but very common case, when a single failure occurs. This slow recovery is acceptable for the

traditional elastic traffic, which IP was designed for.

Unfortunately, current IP networks are used to transport real-time traffic too, such as the traffic of

(video)telephoning (e.g., 3G, 4G mobile networks), on-line gaming, TV broadcasting or even business

critical stock exchange transactions. These types of traffic need to avoid seconds of service disruption.

Moreover, currently several companies use Virtual Private Networks (VPN) in order to interconnect

their geographically separated divisions. The quality of service of these VPNs is typically defined in a

contract called Service Level Agreement (SLA).

Since some of these companies use several real-time or delay sensitive applications (like continuous

database connection or remote desktop), these SLAs can be quite strict with serious consequences, if the

service provider fails to fulfill their requirements. In order to provide such VPN connections on pure IP,

a native protection scheme is indispensable.

The Internet takes an increasingly central role in the communication infrastructure. Traditional

application data were delivered in a manner of best efforts. However, the demands of delay-sensitive

applications, such as voice over IP (VoIP), video streaming, and gaming, have been increasing. These

applications require more continuous availability compared to data applications. Availability is not only

related to failure recovery, but also to QoS such as end-to-end delay or available bandwidth. Multipath

routing is one of the promising schemes to improve availability. Most currently deployed routing

protocols select only a single path for the traffic between a source-destination pair. However, single path

routing takes additional time to compute a new path after a failure and when congested, and may not

provide sufficient bandwidth to the application even when alternate paths exist between the source and

the destination. Multipath routing can overcome these problems by forwarding to alternate paths and

flexibly splitting traffic among multiple paths when the primary path does not meet availability. The

Page 3: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 194

well-known benefits of multipath routing include flexibility in meeting application performance

requirements, improving end-to-end reliability, and avoiding congested paths [1].

Traditionally networks are built to handle peak traffic demands and varying traffic loads, the network

may have excess capacity beyond the current requirements. The excess capacity results in wasted energy

and there is a growing interest in reducing the energy consumption in networks. By providing increased

number of options for routing traffic, multipath is expected to enable increased energy savings in

networks. Multipath routing (MPR) is an effective strategy to achieve robustness, load balancing,

congestion reduction, and low power consumption. Disjoint multipath routing provides increased

security and bandwidth compared to non disjoint multipath routing as link- or node-disjoint paths are

employed.

Multipath routing in IP networks is mostly limited to equal-cost multi-paths (ECMP). Recently, some

sophisticated routers offer multipath routing [3], however they are limited to two kinds: The source-

based forwarding, which provides only single-path routing for a source; and the forwarding the packets

on the selected path must be made to standby to awake mode in-order to reduce the power consumed by

the node at idle state.

A. Previous work

The most commonly used method for finding the multipath in Internet is ECMP. Equal cost multipath

routing provides the path but it does not provide the path which is disjoint. The solutions applied during

failure for fast recovery are: ECMP, using MPLS tunnels or multihop repair paths for routing around

failed links, fast rerouting framework for IP networks, multiple routing configurations, failure

insensitive routing (FIR), and tunneling using not-via addresses. These solutions does not provide

protection and as well as it does not provide guaranteed recovery except in case of single link failure.

This paper shows how to construct the three independent trees for handling arbitrary dual link failures

and for finding the multipath routing. In addition, they listed three conjectures in their paper.

1) Vertex conjecture: Any -vertex-connected graph has vertex-independent spanning trees rooted at an

arbitrary vertex .

2) Edge conjecture: Any -edge-connected graph has edge independent spanning trees rooted at an

arbitrary vertex .

II. EDGED INDEPENDENT SPANNING TREE

A spanning tree is a subset of Graph G, which has all the vertices covered with minimum possible

number of edges. Hence, a spanning tree does not have cycles and it cannot be disconnected. By this

definition the conclusion is that every connected & undirected Graph G has at least one spanning tree. A

disconnected graph do not have any spanning tree, as it cannot spanned to all its vertices.

A. General properties of spanning tree

The conclusion is that one graph can have more than one spanning trees. Below are few properties

is spanning tree of given connected graph G.

1. A connected graph G can have more than one spanning tree.

2. All possible spanning trees of graph G, have same number of edges and vertices.

3. Spanning tree does not have any cycle (loops)

4. Removing one edge from spanning tree will make the graph disconnected i.e. spanning tree is

minimally connected.

5. Adding one edge to a spanning tree will create a circuit or loop i.e. spanning tree is maximally

acyclic.

Page 4: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 195

B. Mathematical properties of spanning tree

Spanning tree has n-1 edges, where n is number of nodes (vertices).From a complete graph, by

removing maximum e-n+1 edges, we can construct a spanning tree.A complete graph can have

maximum nn-2

number of spanning trees.

So the conclusion in that spanning trees are subset of a connected Graph G and disconnected

Graphs do not have spanning tree.

C. Computing a Spanning Tree

There are many algorithms to compute a spanning tree for a connected graph. The first is an example of

a vertex-centric algorithm.

1. Pick an arbitrary node and mark it as being in the tree.

2. Repeat until all nodes are marked as in the tree:

(a) Pick an arbitrary node u in the tree with an edge e to a node w not in the tree. Add e to the spanning

tree and mark w as in the tree.

The iteration is done for n−1 times in Step 2, because there are n−1 vertices that have to be added to

the tree. The efficiency of the algorithm is determined by how efficiently the qualifying path has been

found.

The second algorithm is edge-centric.

1. Start with the collection of singleton trees, each with exactly one node.

2. As long as there are more than one tree, connect two trees together with an edge in the graph.

This second algorithm also performs n steps, because it has to add n – 1 edges to the trees until we have

a spanning tree. Its efficiency is determined by how quickly an edge would connect two trees or would

connect two nodes already in the same tree.

D. Minimum Spanning Tree (MST)

In a weighted graph, a minimum spanning tree is a spanning tree that has minimum weight that all

other spanning trees of the same graph. In real world situations, this weight can be measured as distance,

congestion, traffic load or any arbitrary value denoted to the edges.

E. Cycle Property

Let C is a subset of E be a cycle, and e be an edge of maximal weight in C. The e does not need to be in

an MST. Assume we have a spanning tree, and edge e from the cycle property connects vertices u and

w. If e is not in the spanning tree, then, indeed, it is not necessary. If e is in the spanning tree, then

another MST is constructed without e. Edge e splits the spanning tree into two subtrees. There must be

another edge e’ from C connecting the two subtrees. Removing e and adding e’ instead yields another

spanning tree, and one which does not contain e. It has equal or lower weight to the first MST, since e’

must have less or equal weight than e.

The cycle property is the basis for Kruskal’s algorithm.

1. Sort all edges in increasing weight order.

2. Consider the edges in order. If the edge does not create a cycle, add it to the spanning tree. Otherwise

discard it. Stop, when n − 1 edges have been added, because then we must have spanning tree. It is a

straightforward application of the cycle property. Sorting the edges will take O(e * log(e)) steps with

most appropriate sorting algorithms. The complexity of the second part of the algorithm depends on how

efficiently we can check if adding an edge will create a cycle or not. This can be O(n * log(n)) or even

more efficient if we use a so-called union-find data structure.

Page 5: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 196

F. Spanning Tree Protocol

The Spanning Tree Protocol was originally developed by Radia Perlman for the Digital Equipment

Corporation (DEC) in 1983 (Menga, 2004) and was first published in 1985 (Perlman, 1985) The IEEE

standard version of the protocol, 802.1D was published in 1990 and was superseded by RSTP 802.1W in

the 2004 version (Iveson, 2013). STP currently exists in the original Digital Equipment Corporation

(DEC) implementation and the Institute of Electrical and Electronic Engineers (IEEE) standard which

was developed from the latter and is almost exclusively used in networks today (Menga, 2004).

Prior to STP introduction any switch architecture which had a loop would end up with duplicate

frames flooding between switches causing an outage; this is commonly referred to as a "broadcast

storm". The Spanning Tree algorithm(STA) solved the problems associated with this physical loop by

creating a logical blocking solution by stopping normal switch forwarding (Bahethi, 2014). Once the

root bridge has been selected, each non-root bridge determines the best path to reach the root bridge

while blocking any other paths which introduce loops on the network.

In a converged STP, each port is either in a forwarding or blocking state. Ports which are considered

the best path to the root bridge are placed into a forwarding state while all other ports are placed into a

blocking state. On their first initialization, each switch generates a unique bridge ID used by spanning

tree to uniquely identify the bridge. The bridge ID is a combination of the bridge MAC address plus a 2-

byte bridge priority field, where the priority field can be altered by a network administrator to directly

affect whether or not a bridge becomes the root bridge. The switch with the lowest bridge ID is the root

bridge. When the bridge ID has been determined, this bridge begins to generate configuration Bridge

Protocol Data Units (BPDUs) assuming that is the root bridge.

There are two types of BPDUs used in spanning tree, configuration BPDUs and Topology Change

Notification (TCN) BPDUs. Configuration BPDUs are originated by the Root Bridge and flow outward

along the active paths that radiate from the root bridge. TCN BPDUs flow upstream (towards the root

bridge) to alert the root bridge that the active topology has changed (Rossi, 2000).

G. Configuration BPDUs

This type of BPDU is the main communication mechanism for STP and is used to determine the root

bridge and whether or not a port should be forwarding or blocking state. The configuration BPDU has

various fields which are used to indicate important parameters for the generation of the final STP by the

Spanning Tree Algorithm (STA).

On receiving a configuration BPDU containing a lower root bridge ID, the bridge immediately considers

this lower root bridge ID as the new root bridge and begins propagating the configuration BPDUs

received from this bridge. Therefore in a network with multiple bridges, the bridge with the lowest

bridge ID will eventually become the root bridge to all bridges.

Configuration BPDUs are generated by the root bridge only. Configuration BPDUs for nonroot bridges

are generated only when a configuration BPDU originated by the root bridge are received via the root

port of the non-root bridge. The non-root bridge updates fields, such as root path cost, bridge ID and

port ID in the received configuration BPDU and then propagates the updated configuration BPDU out

all forwarding ports, except the root port upon which the BPDU was generated. This ensures that

configuration BPDUs are propagated throughout the entire network. After the root bridge has been

selected each non-root bridge attempts to build a topology that forms the lowest-cost path to the root

bridge. The lower this cost the more preferable the link. Depending on bandwidth each logical port has a

default cost associated with it, as defined in the IEEE standard. This cost can be modified to influence

root port selection.

Page 6: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 197

Table 1 Default STP Costs

Bandwidth(Mbps) Cost

4 250

10 100

16 62

100 19

155 14

622 6

1000 4

10000 2

Every port within STP transitions through several states upon port initialization. Data from the user is

only forwarded when a port is in the forwarding state. This approach is taken to prevent any loops from

forming even for a short period, as a broadcast storm can bring down a network in seconds. There are

five spanning tree port states, which are as follows:

1. Disabled State

A port is disabled when the port is down. This may be because the port has been

administratively shut down or because of some issue with processing BPDUs. A port

transitions from this state to the blocking state moving immediately to a listening state after

it is initialised at the Layer 2 level.

2. Listening State

This is the phase where most of the important groundwork of generating a loop-free

topology is carried out. Within this phase, spanning tree goes through the following

processes:

i. Root Bridge Election

The bridge with the lowest bridge ID is selected as the root bridge.

ii. Root Port Selection

A single root port is selected from every non-root bridge providing the closest path to the root bridge.

iii. Designated bridge (port) selection for each segment

Each switch determines whether or not it represents the shortest path to the root bridge for each

network segment attached to the non-root switch this excludes the network segment attached to the

root port. If this is the case, it configures itself as the designated bridge for the segment and configures

the port as a designated port. Designated ports are placed into a forwarding state, while all other non-

designated ports are placed into a blocking state. An exception to this configuration is if a non-

designated port represents the root port on another switch. If this is the case, the root port on the other

switch remains in a forwarding state, as well as remaining the designated port on the local switch.

Whether root bridge election or a root port selection, the same STA selection process is used for all

decisions. Priority criteria are processed one by one, by comparing the configuration BPDUs received

on a port with the configuration BPDUs that are sent out a port.

3. Learning State

The bridge is accepting user data without forwarding it during the learning phase. The local MAC

address table is populated on each bridge, so that once traffic is forwarded, the bridge does not need to

flood a lot of traffic.

4. Forwarding State

Depending on whether a port has been selected as either a root port or designated port, it is placed

into the forwarding state. A port will remain in a forwarding state until a topology change occurs, where

the port transitions to the listening phase and performs the appropriate selection processes.

Page 7: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 198

5. Blocking

Where a port is found not to represent the shortest path to the root bridge it is placed in the blocking

state. This is where the port is being blocked from sending or receiving any user data while still sending

and receiving configuration BPDUs.

Timers determine how quickly or slowly a spanning-tree topology can react to a link or bridge

failure converging to a new topology. There are three spanning-tree timers which are as follows:

1. Hello timer

The Interval between the generation of each configuration BPDU. The default is two seconds.

2. Max age timer

This timer controls the validity of a configuration BPDU after being received. The default is 20 seconds,

meaning that if a configuration BPDU is not received within 20 seconds of the previous configuration

BPDU, the previous configuration BPDU is no longer valid and a new root bridge must be selected.

3. Forward delay

This timer controls the amount of time spent by a bridge port in each of the listening and learning states

before transitioning into a blocking to a forwarding state.

A majority of BPDUs on a healthy network should be configuration BPDUs, although all bridged

networks see at least a few of the second type of BPDU, the Topology Change Notification (TCN)

BPDU. TCN BPDUs play a key role in handling changes in the active topology.

The TCN BPDU is much simpler than the configuration BPDU consisting of only three fields. TCN

Fig 1 Topology Change Notification working towards the root bridge

BPDUs are identical to the first three fields of a configuration BPDU with the exception of a single bit

in the type field, with the type field containing one of two hexadecimal values 0x00 (Binary: 0000 0000)

indicating a configuration BPDU or 0x80 (Binary: 1000 0000) indicating a TCN BPDU. Configuration

BPDUs are only originated by the root bridge, but a TCN BPDU will be

generated by any switch in the network when either of two things happens: A port has gone into

forwarding state and a port has gone from forwarding or learning state into blocking state

While the TCN BPDU is important, it doesn't give the other switches a lot of detail. The TCN

doesn't say exactly what happened, just that something happened".

When a bridge receives the topology TCN it will send a Topology Change

Acknowledgement(TCA) on its designated port towards the downstream switch. It will create a TCN

itself and send it on its root port as well.(Molenaarin, 2014)

When the root bridge receives the TCN, the root will also respond with an acknowledgement, taking

the form of a configuration BPDU with the topology change bit/flag set. This indicates to all receiving

bridges that the aging time for their MAC address tables should be changed from the default of 300

seconds/5 minutes to the forward delay spanning tree timer value (default 15 seconds).

A Portfast enabled port changing STP state cannot result in the generation of a TCN BPDU. The

most common usage of Portfast is when a single PC is connected directly to the bridge port, and since

Page 8: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 199

such a port going into forwarding state (or leaving it) doesn't impact STP operation, there's no need to

alert the entire network about it.(Bryant, 2015)

H. Recent Spanning Tree Developments

The IEEE has published a number of new specifications relating to STP, which include both Rapid

Spanning Tree Protocol (RSTP) 802.1W and Multiple Spanning Tree (MST) 802.1S specifications.

The RSTP specification is the most significant development for spanning tree in recent times. RSTP

has depreciated the 802.1D standard and redefines the states that bridge ports can be in, as well as how

bridges detect failure and the associated convergence time. RSTP aims to reduce convergence times and

also includes standards-based implementations of PortFast, UplinkFast, and BackboneFast.

Fig 2 Topology Change Acknowledgement from Root Bridge

The MST specification relates to how spanning tree interacts with topologies that include multiple

Virtual Local Area Networks (VLANs). Modes of operation can be defined on Cisco Catalyst switches,

which determine how the switch maintains STP for multiple VLANs.

The following lists the common STP modes of operation:

1. Common Spanning Tree (CST)

This standard dictated that a single spanning-tree instance should be used for multiple VLANs. The

reason for defining CST is to ensure interoperability with non-802.1Q bridges, as all STP

communication is sent untagged on the native VLAN. By having only one spanning tree instance each

switch CPU needs to deal only with a single STP instance, although this has the drawback of being

unable to use implement load sharing.

2. Cisco Per-VLAN spanning tree (PVST+)

This is a proprietary standard developed by Cisco, which allows multiple STP instances to operate in a

Layer 2 network, while also allowing load sharing. This standard operates a unique STP instance per

VLAN. Although allowing the load sharing, the implementation is flawed as a single STP instance is

required for each VLAN, even if VLANs share the same STP topology. This has a detrimental effect on

CPUs in network environments which could support hundreds or thousands of VLANs.

3. Multiple Spanning Tree (MST)

MST is a combination of both 802.1Q and PVST+. It allows the user to map a configurable number of

VLANs to a single STP instance, meaning that all VLANs that share the same STP topology can be

supported by just one STP instance. Load sharing is achieved by having multiple STP instances, but the

number of STP instances that must be maintained on each switch can be matched to the number of

different logical topologies required for the network to implement load sharing (Menga, 2004).

Where a port is found not to represent the shortest path to the root bridge it is placed in the blocking

state. This is where the port is being blocked from sending or receiving any user data while still sending

and receiving configuration BPDUs.

Page 9: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

@IJRTER-2016, All Rights Reserved

III.

As three-edge connectivity is required to tolerate any dual link failures, the network will be three

connected.

Fig 3 Example of a Edged Spanning Tree

Fig 4 (a) Red tree. (b) Blue tree. (c) Green tree.

The assumption is that the network employs the link

aware of the network topology. The following terms

vertex, link and edge.

IV. DISJOINT

A. Routing through multiple paths

Instead of using single path to reach the destination the

same destination over multiple consecutive ports

B. Failure Recovery

In any approaches the decisions for selecting the node for forwarding the packet is based on the

destination address in the packet header and the incoming interface over which the packet was received.

The assumption is that all packets will be routed on t

overhead bit (SF) that indicates if the packet has seen a second failure or not. Thus, if a packet is

received on an incoming edge that is present in the red tree, it is assumed that the packet

failures. The SF bit is ignored and route the packet

C. Findings of Overhead bit

1) One Link Failure:

If a link is failed in the red tree then the packet will be rerouted

tree on which the packet is rerouted is dete

packet will be rerouted on the blue tree. If

In both these situations, when the packet is rerouted from the

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016

III. MODEL OF THE NETWORK

edge connectivity is required to tolerate any dual link failures, the network will be three

Fig 3 Example of a Edged Spanning Tree

Fig 4 (a) Red tree. (b) Blue tree. (c) Green tree.

assumption is that the network employs the link-state protocol, hence all nodes in the network are

he following terms are used such as network and graph, node and

DISJOINT MULTIPATH ROUTING

rough multiple paths

path to reach the destination the multiple subflows are established to reach the

same destination over multiple consecutive ports.

In any approaches the decisions for selecting the node for forwarding the packet is based on the

destination address in the packet header and the incoming interface over which the packet was received.

that all packets will be routed on the red tree by default. Every packet carries a one

overhead bit (SF) that indicates if the packet has seen a second failure or not. Thus, if a packet is

received on an incoming edge that is present in the red tree, it is assumed that the packet

and route the packet on the red tree.

If a link is failed in the red tree then the packet will be rerouted either on the blue or the green tree. The

is rerouted is determined by the color of the edge. Thus, if

packet will be rerouted on the blue tree. If the link is green, the packet will be rerouted on the green tree.

, when the packet is rerouted from the red to blue/green tree, the SF bit is set to 0.

International Journal of Recent Trends in Engineering & Research (IJRTER)

2016 [ISSN: 2455-1457]

200

edge connectivity is required to tolerate any dual link failures, the network will be three-edge

state protocol, hence all nodes in the network are

such as network and graph, node and

are established to reach the

In any approaches the decisions for selecting the node for forwarding the packet is based on the

destination address in the packet header and the incoming interface over which the packet was received.

he red tree by default. Every packet carries a one

overhead bit (SF) that indicates if the packet has seen a second failure or not. Thus, if a packet is

received on an incoming edge that is present in the red tree, it is assumed that the packet has seen no

the blue or the green tree. The

if the link is blue, the

is green, the packet will be rerouted on the green tree.

to blue/green tree, the SF bit is set to 0.

Page 10: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 201

2) Two Link Failures:

A node that receives a packet over the blue (green) incoming interface would forward the packet over

the blue (green) tree. If the blue (green) forwarding link is not available and the SF bit in the packet is

set to 0, this implies thatthe packet has seen one failure. Hence, the packet is rerouted to

the green (blue) tree with the SF bit set to 1. If the blue (green)

forwarding link is not available and the SF bit in the packet is

set to 1, then the packet is dropped.

V. CONSTRUCTING THE SPANNING TREE

Given a graph that is three-edge-connected and a destination Vertex d , the outline of our approach to

compute the three edge independent spanning trees rooted at a destination is as follows:

1) a) Given a graph, prune edges to consider a minimally three-edge-connected graph.

b) Divide the resultant graph into two-vertex-connected components. Thus, every component is

three-edge and two-vertex-connected (3E-2V, for short). For a given destination, identify a root vertex

in each component. This root vertex is the vertex through which every path from a vertex in the

component to the destination must traverse. For the rest of the paper, the assumption is that a two-

vertex- and minimally three-edge-connected graph.

2) Construct three edge-independent spanning trees in each 3E-2V component rooted at r.

3) Merge the trees constructed in each 3E-2V component to get the final three edge-independent

spanning trees for destination vertex d .

VI. POWER CONSUMPTION THROUGH WAKEUP MECHANISM

A. Line Cards

A line card or digital line card is a modular electronic circuit designed to fit on a separate printed

circuit board (PCB) and interface with a telecommunications access network. A line card typically

interfaces the twisted pair cable of a plain old telephone service (POTS) local loop to the public

switched telephone network (PSTN). Telephone line cards perform multiple tasks, such as analog-to-

digital and digital-to-analog conversion of voice, off-hook detection, ring supervision, line integrity

tests, and other BORSCHT functions. In some telephone exchange designs, the line cards generate

ringing current and decode DTMF signals. The line card in a subscriber loop carrier is called a

subscriber line interface card (SLIC).

B. FPGA

A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a

customer or a designer after manufacturing – hence "field-programmable". The FPGA configuration is

generally specified using a hardware description language (HDL), similar to that used for an application-

specific integrated circuit (ASIC). (Circuit diagrams were previously used to specify the configuration,

as they were for ASICs, but this is increasingly rare. FPGAs contain an array of programmable logic

blocks, and a hierarchy of reconfigurable interconnects that allow the blocks to be "wired together", like

many logic gates that can be inter-wired in different configurations. Logic blocks can be configured to

perform complex combinational functions, or merely simple logic gates like AND and XOR. In most

FPGAs, logic blocks also include memory elements, which may be simple flip-flops or more complete

blocks of memory.

C. Sleep/Wakeup Mechanism for Power Saving

Power-saving schemes for network devices can be divided into two categories, namely, uncoordinated

sleeping and coordinated sleeping. In uncoordinated sleeping, link interfaces sleep based on local

decisions alone. A straightforward strategy is opportunistically putting interfaces to sleep when links are

idle. While this might be reasonable for low-speed LANs with large packet inter-arrival time, it does not

Page 11: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 202

apply to high speed links effectively. To improve this, Buffer-and-burst is proposed to deliberately

buffer traffic in the upstream router to create more idle time between traffic bursts for the downstream

router to sleep. Indeed, for low-level CMOS circuits, the power mode transition can be made in very

short time via techniques such as clock gating and power gating. However, it is not that easy for a high-

end router to change its power state globally in such short period, since a high-end router usually

consists of numerous heterogeneous sub modules and needs extra driver software to achieve global

synchronization with additional delay.

Unlike uncoordinated sleeping, in coordinated sleeping, the sleep/wakeup decisions are made

collaboratively at network level. Power is conserved by aggregating traffic into fewer links and putting

idle links to sleep. Coordinated sleeping relies on a centralized controller to collect the link status from

distributed network nodes, and make corresponding sleep/wakeup decisions periodically. The figure

exemplifies how coordinated sleeping works.

VIII. EVALUATION OF A MULTIPATH

A. No Failures

The average path lengths is computed in the network when there are no failures. This default path length

from node to the destination under the specific routing approach. Then, the average path length under no

failures in the network is computed in all four approaches.

B. One-Link Failures We are only interested in computing the average path length when a link failure affects the default path.

All other single-link failure scenarios do not affect the routing schemes.

C. Two-Link Failures

The tunneling approach and our approach handle failures differently; the former is a link-level recovery,

while the trees directly reroute toward the destination. Hence, it is not possible to compare a particular

two-link failure scenario across the schemes as a two-link failure encountered when tunneling may not

be seen when the trees are employed, and vice versa.

VII. CONCLUSION

We have provided an algorithm to construct three edge-independent spanning trees. We show how the

three edge-independent trees can be used for routing in an IP network. We develop a routing scheme that

is capable of providing the disjoint multipath routing using only the destination address in the packet

header. We also develop three routing approaches using the trees which provides very minimal packet

overhead. All of the routing schemes developed are guaranteed to withstand any arbitrary dual link

failures in the network. To support fast line card wakeup, we made penetrating measurement on the boot

procedure of line cards. We propose corresponding designs including separating the on-board CPU

power supply from the other parts of a line card, setting up a minimized hardware configurations. In

future we can provide multiple link failure solutions and also low power image and video

compression techniques are need to be design aiming to increase the battery life and strong

cryptographic algorithm need to be implement.

REFERENCES 1. J. He and J. Rexfored, “Towards Internet-wide multipath routing," IEEE Network, vol. 22, pp. 1621, March 2008.

2. G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyyam, and C. Diot, “Analysis of link failures in an IP backbone," in

Proc. the Internet Measurement Workshop, Marseille, France, Nov 2002.

3. Cisco, “Cisco express forwarding,” 2006 [Online]. Available: http://www.cisco.com/c/en/us/support/docs/routers/12000-

series-routers/47321-ciscoef.html

4. S. Bryant, M. Shand, and S. Previdi, “IP fast reroute using Notvia addresses," Internet draft,

http://tools.ietf.org/html/draft-ietf-rtgwg-ipfrr-notvia-addresses-00.txt, December 2006.

Page 12: Disjoint Multipath Routing for Failure Recovery in IP ... · ways of routing. In a (virtual) circuit switched network a path for transporting is established, which is the basic object

International Journal of Recent Trends in Engineering & Research (IJRTER)

Volume 02, Issue 08; August - 2016 [ISSN: 2455-1457]

@IJRTER-2016, All Rights Reserved 203

5. S. Bryant and M. Shand, “A framework for loop-free convergence," Internet draft, http://tools.ietf.org/html/draft-bryant-

shand-lf-conv-frmwk-03.txt, October 2006.

6. A. Gopalan and S. Ramasubramanian, “Fast recovery from link failures in ethernet networks,” in Proc. 9th Int. Conf.

Design Rel. Commun. Netw., Mar. 2013 [Online]. Available: http://www2.engr.arizona.edu/~srini/papers/Srini-2013-

DRCN.pdf, Invited Paper

7. S. Ramasubramanian, M. Harkara, and M. Krunz, “Linear time distributed construction of colored trees for disjoint

multipath routing,” Comput. Netw., vol. 51, no. 10, pp. 2854–2866, Jul. 2007.

8. P. Thulasiraman, S. Ramasubramanian, and M. Krunz, “Disjoint multipath routing in dual homing networks using

colored trees,” in Proc. IEEE GLOBECOM Wireless Ad Hoc Sensor Netw. Symp., San Francisco, CA, USA, Nov.–Dec.

2006, pp. 1–5.

9. P. Thulasiraman, S. Ramasubramanian, and M. Krunz, “Disjoint multipath routing to two distinct drains in a multi-drain

sensor network,” in Proc. IEEE INFOCOM, Anchorage, AK, USA, May 2007, pp.643–651.

10. A. Iselt, A. Kirstadter, A. Pardigon, and T. Schwabe, “Resilient routing using ECMP and MPLS,” in Proc. HPSR,

Phoenix, AZ, USA, Apr. 2004, pp. 345–349.

11. C. Reichert, Y. Glickmann, and T. Magedanz, “Two routing algorithms for failure protection in IP networks,” in Proc.

10th IEEE ISCC, June 2005, pp. 97–102.

12. M. Shand and S. Bryant, “IP fast reroute framework,” IETF Internet Draft draft-ietf-rtgwg-ipfrr-framework-08.txt, Feb.

2008.

13. A. Kvalbein, A. F. Hansen, T. Čičić, S. Gjessing, and O. Lysne, “Fast IP network recovery using multiple routing

configurations,” in Proc. IEEE INFOCOM, Apr. 2006, pp. 1–11.

14. A. F. Hansen, O. Lysne, and S. Gjessing, “Fast proactive recovery from concurrent failures,” in Proc. IEEE ICC, Jun.

2007, pp.

15. L.J.Wobker,“Power consumption in high-end routing

systems.”[Online].Available:http://www.nanog.org/meetings/nanog54/presentations/Wednesday/Wobker.pdf

16. M. Gupta, S. Grover, and S. Singh, “A feasibility study for power management in lan switches,” in Proc. 12th IEEE Int.

Conf. Network Protocols, ICNP 2004, Oct. 2004, pp. 361–371.

17. M. Gupta and S. Singh, “Dynamic ethernet link shutdown for energy conservation on ethernet links,” in Proc. IEEE Int.

Conf. Communications, ICC '07, Jun. 2007, pp. 6156–6161.

18. J. Kathuria, M. Ayoubkhan, and A. Noor, “A review of clock gating techniques,” MIT Int. J. Electron. Commun. Eng.,

vol. 1, no. 2, pp.106–114, 2011.

19. T. Vivek, O. Sentieys, and S. Derrien, “Wakeup time and wakeup energy estimation in power-gated logic clusters,” in

Proc. 24th Int. Conf. VLSI Design (VLSI Design), Jan. 2011, pp. 340–345.

20. N. Vasić, P. Bhurat, D. Novaković, M. Canini, S. Shekhar, and D. Kostić, “Identifying and using energy-critical paths,”

in Proc. ACM CoNEXT '11, 2011, pp. 18:1–18:12.

21. B. Heller, S. Seetharaman, P. Mahadevan, Y. Yiakoumis, P. Sharma, S. Banerjee, and N. McKeown, “Elastictree: Saving

energy in data center networks,” in Proc. USENIX NSDI'10, 2010, pp. 17–17.

22. CIDR Report for 21 Apr 15. [Online]. Available: http://www.cidr-report. org/

23. J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, “BGP routing stability of popular destinations,” in Proc. 2nd ACM

SIGCOMM Workshop on Internet Measurement, 2002, pp. 197–202.

24. W. Fang and L. Peterson, “Inter-as traffic patterns and their implications,” in Proc. IEEE Global Telecommunications

Conf., GLOBECOM'99, 1999, vol. 3, pp. 1859–1868.

25. A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True, “Deriving traffic demands for operational ip

networks: Methodology and experience,” IEEE/ACM Trans. Netw., vol. 9, no. 3, pp. 265–280, 2001.