scispace - formally typeset
Proceedings ArticleDOI

Fast IP Network Recovery Using Multiple Routing Configurations

Reads0
Chats0
TLDR
This paper presents a new recovery scheme called Multiple Routing Configurations (MRC), based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure.
Abstract: 
As the Internet takes an increasingly central role in our communications infrastructure, the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, we present a new recovery scheme called Multiple Routing Configurations (MRC). MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. Our proposed scheme guarantee s recovery in all single failure scenarios, using a single mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. It can be implemented with only minor changes to existing solutions. In this paper we present MRC, and analyze its performance with respect to scalability, backup path lengths, and load distribution after a failure.

read more

Citations
More filters
Journal ArticleDOI

Adaptive forwarding in named data networking

TL;DR: The design of NDN's adaptive forwarding is outlined, its potential benefits are articulated, and open research issues are identified.
Journal ArticleDOI

Hybrid SDN Networks: A Survey of Existing Approaches

TL;DR: A comprehensive up-to-date survey of the research and development in the field of hybrid SDN networks is presented and guidelines for future research on hybridSDN networks are derived.
Journal ArticleDOI

Path splicing

TL;DR: This work evaluates path splicing for intradomain routing using slices generated from perturbed link weights and finds that splicing achieves reliability that approaches the best possible using a small number of slices, for only a small increase in latency and no adverse effects on traffic in the network.
Proceedings Article

Ensuring connectivity via data plane mechanisms

TL;DR: The design, called Data-Driven Connectivity (DDC) ensures routing connectivity via data plane mechanisms, which will allow networks to provide a much higher degree of availability, while still providing flexible routing control.

Internet Engineering Task Force (IETF)

TL;DR: This document describes an extension to the basic IP fast reroute mechanism, described in RFC 5286, that provides additional backup connectivity for point-to-point link failures when none can be provided by the basic mechanisms.
References
More filters
Journal ArticleDOI

Routing of multipoint connections

TL;DR: In this article, a weighted greedy algorithm is proposed for a version of the dynamic Steiner tree problem, which allows endpoints to come and go during the life of a connection.
Proceedings ArticleDOI

BRITE: an approach to universal topology generation

TL;DR: The goal is to produce a topology generation framework which improves the state of the art and is based on the design principles of representativeness, inclusiveness, and interoperability.
Journal ArticleDOI

The design philosophy of the DARPA Internet Protocols

TL;DR: This paper attempts to capture some of the early reasoning which shaped the Internet protocols.
Journal ArticleDOI

Delayed Internet routing convergence

TL;DR: This paper presents a two-year study of Internet routing convergence through the experimental instrumentation of key portions of the Internet infrastructure, including both passive data collection and fault-injection machines at Internet exchange points, and describes several unexpected properties of convergence.
Book

The design philosophy of the DARPA internet protocols

TL;DR: The TCP/IP protocol suite was first proposed fifteen years ago as discussed by the authors, and has been used widely in military and commercial systems, but it is difficult to deduce from these why the protocol is as it is.