SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Int. J. Advanced Networking and Applications
Volume: 06 Issue: 06 Pages: 2529-2532 (2015) ISSN: 0975-0290
2529
Performance Evaluation of Source Routing
over MPLS Networks for Failure Detection
and Recovery
AamaniNemtur, Mohamed El-Sharkawy and Maher Rizkalla
Electrical and Computer Engineering
Purdue School of Engineering and Technology
723 W Michigan St
Indianapolis, IN 46202, USA
-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------
Multi-Protocol Label Switching is an emerging technology which is the initial step for the forthcoming
generation of Communication. It uses Labels in order to identify the packets unlike the conventional IP Routing
Mechanism which uses the routing table at each router to route the packet. There exits certain methods which are
used to recover the failure of any link and/or node failure in the given Network. It uses the techniques of FRR
with the help of RSVP/CR-LDP to overcome the link and/or node failures in the network.
On the other hand there are certain limitations/Drawbacks of using the above mechanisms for Failure
Detection and Recovery which are multiple protocols such as RSVP/CR-LDP over OSPF/IS-IS and complex
algorithms to generate backup path since each router works individually in order to create a backup tunnel. So to
overcome the listed limitations, this paper discusses a relatively new technique for MPLS Network which is
Source Routing. Source Routing is the technique in which the source plays the role of directing the packet to the
destination and no other router plays the role of routing the packet in the network. Using OPNET Modeler 17.5
tool for implementing source routing when there is a network failure is performed and the results are compared
by implementing RSVP/CR-LDP over the same failed network.
Keywords: Multi-Protocol Label Switching, IP Routing, OPNET, FRR and RSVP/CR-LDP.
------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: April 29, 2015 Date of Acceptance: May 24, 2015
------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Source Routing is a type of routing where sender of
the packet determines the entire path through which the
packet should travel to reach the destination. Source
Routing is the replacement of the other signaling protocols
like RSVP/CR-LDP in the case of failure detection and
recovery. Source Routing mainly uses stack of labels and
the important difference is to use a Domain Wide Label
(DWL) for the communication. A Domain Wide FEC to
bind a label is always desired. In Domain wide FEC to
label binding, a label is always bound to the same FEC on
all the network links. This label is generally called as
Domain Wide Label. The difference between Local Label
and Domain wide label is in the former one multiple FECs
can map to a particular label on different links whereas in
later same FECs map to the label on all the links.
Fig. 1: Source Routing
DWL Allows a way to support Source Routed LSP in
an LDP enabled network using stack of labels. The Source
contains the entire stack of labels through which the packet
should be passed through. Since the labels are constant
throughout the network this routing is possible over MPLS
Networks [2, 3, 4, 6 and 7] . Label Stack is updated based
on the route the packet needs to travel and the path is
computed at the source. So other LSRs does not push
another label as in the other signaling protocols but just pop
the label of its own from the label stack and forwards the
packet with the remaining stack of labels.
Fig. 2: Label Stack Mechanism in Source Routing.
1. Protection Lists:
It is the list of segments encoding the detour path from
the protecting node S to the repair node R avoiding the link
which is failed.
Int. J. Advanced Networking and Applications
Volume: 06 Issue: 06 Pages: 2529-2532 (2015) ISSN: 0975-0290
2530
2. Protection Techniques for Link Failure using LFA:
If a path to a destination D from a neighbor N of S does
not contain S (i.e. N is a loop-free alternate of S for the
failure of link S-F), then S can pre-install a repair
forwarding information to deviate the packet data to node
N uponthe failure of S-E. In the case of LFA applicability,
the protection list is empty. A protecting router S needs to
send the protected packet as is to its LFA neighbor N.
Fig. 3: LFA Mechanism in MPLS Network.
3. Protection Techniques for Link Failure using RLFA:
If there is no LFA neighbor which is not on the path of
the failed link, then Source may create a virtual LFA by
using a tunnel to carry the packet to a point in the network
that is not a direct neighbor of S, and from which the
packet will be delivered to the destination without looping
back to S. The Remote LFA proposal [4] calls such a
tunnel a repair tunnel. The tail-end of this tunnel (R) is
called a ”remote LFA”.
Fig. 4: RLFA Mechanism in MPLS Network.
The difference between LFA and RLFA is there will be
some cases where the neighboring node may not be
present to form a backup path as mentioned in the concept
of LFA.In the below figure source s needs to send data to
node d. Suppose there is a link failure between s-a. So the
alternate path to reach node d is through node b. But
because ECMP,node b tend to send date to node d again
through the path b-s-a-d.So there occurs loss of data and
results in performance degradation. In this case the
importance virtual tunnel is realized where the virtual
repair tunnel is created between node S to node e and from
node e the data is flown to the destination d. In this case
there is very less scope of loss of data in the network.
Fig. 5: Repair Tunnel in RLFA
4. Advantages of Source Routing:
Zero Signaling and Maintenance overhead: Since all the
routing work is done at the source there is no signaling
required and also no maintenance required in the network.
Only the start end of the LSP needs to maintain the state.
Other LSRs on the LSP are not even aware of the
existence of such LSPs.
Zero Signaling Delay: In Source Routing LSPs are
immediately used after the stack of labels is determined. It
inherits the concept of make before break.
II. Proposed Work:
In this paper, the Implementation of MPLS Network with
FRR Techniques with both RSVP and CR-LDP is presented
for both node and link protection. In order to evaluate the
network performance in the MPLS with node and link
failure backup tunnels are to be pre-computed and they are
maintained in order to use them during the network failures.
Source Routing is implemented over the same network
which issued to analyze the performance of RSVP and CR-
LDP. Simulations are carried on by failing the link in one
case and node in the second case. This performance is
compared with the performance of the network with the
RSVP and CR-LDP Signaling Protocols. All the
Implementation is carried using Network Simulation tool
OPNET Modeler 17.5 [5].
Fig. 6: OPNET Simulation Network.
III. SIMULATIONS:
The Network Simulation tool OPNET 17.5 Modeler is
used to generate the results for the MPLS Based Network.
OPNET provides several modules for the simulation
comprising a vast collection of Network protocols and
network elements. The main feature of OPNET is that it
provides various real-life network configuration capabilities
that make the simulation environment close to reality. The
advantages of OPNET compared to other simulators include
GUI interface, comprehensive library of network protocols
and models, graphical interface to view the results,
availability of documentation for the user to develop the
network models etc. The Network used for the study has 6
LSRs and one Ingress and one Egress Router are setup and
the source signal is obtained from one of the five
workstations (voice, video, mail, HTTP, File) as mentioned
in Figure 6.
In the above network implementation which is designed
using OPNET Modeler there are in total 6 LSRs and 2
Switches and in the source side we have 5 Workstations. In
the Receiver side there 2 receiving work stations and other 3
are servers.
In order to implement the MPLS Network first important
thing to do is to create Dynamic LSPs across the MPLS
Domain and setup the link parameters. The Signaling
protocol RSVP-TE and CR-LDP is selected in the list of
protocols listed in OPNET Modeler.
Int. J. Advanced Networking and Applications
Volume: 06 Issue: 06 Pages: 2529-2532 (2015) ISSN: 0975-0290
2531
Link Failure Protection: In the network a particular link
is forcibly made to fail and the option of failing that node
for a particular time frame is provided by the tool. The
network performance is been studied without deploying
any repair mechanism after failing the node.
Fig. 7: Traffic Received when no FRR.
The above graphs show the traffic received. If there is
no repair technique deployed in the network there is a
complete loss of data in the time frame in which link is
made to fail.
If there is LFA Mechanism which is deployed in the
network which uses the Source Routing then there will be
not much disturbance in the traffic received even in the
time frame in which the link is in fail state.
Fig. 8: Traffic Received when LFA is
Implemented using Source Routing
If RLFA Mechanism is deployed in the network which
uses the Source Routing then the traffic received has better
performance which means the loss of data is less.
The comparison graph of the traffic received during the
link fail in the network with RSVP, CR-LDP, LFA Source
Routing, and RLFA Source Routing is as shown in Figure
10.
Fig. 9: Traffic Received when RLFA is
Implemented using Source Routing.
Fig. 10: Comparison of traffic Received in all 3
cases.
The Y-axis is the average packets received. The graph
clearly shows that the performance of CR-LDP is very
lessas compared to other 3 techniques. The difference in the
packets received is mainly concentrated in the time frame of
5 to 10 sec where the link is made to fail. It shows that
implementing RLFA Technique over the network which
uses Source Routing has much better performance over
RSVP and LFA Technique.
Voice Packet Delay Voice packet delay variation is the
difference in end to end one way delay between selected
packets in a flow with any lost packets being ignored. The
Voice packet delay in case of Source Routing in the MPLS
Network is shown below.
Fig. 11: Voice Packet Delay in Source Routing.
The comparison graph of the Voice Packet Delay during
the link fail in the network with RSVP, CR-LDP and Source
Routing is as shown below:
Fig. 12: Comparison of Voice Packet Delay in 3 cases.
The comparison graph clearly shows that the delay is
much lower in the case of Source Routing because in the
case of source routing the virtual tunnel is automatically
created after the study of the network at the source. So the
decision of creating the backup path at the point of failure
delays the packet to reach the destination which happens in
the case of RSVP and CR-LDP.
Int. J. Advanced Networking and Applications
Volume: 06 Issue: 06 Pages: 2529-2532 (2015) ISSN: 0975-0290
2532
Voice Jitter: Jitter is the time variation between the packets
that are arriving due to Route changes in the network,
Congestion in the network and timing drift.
Fig. 13: Voice Jitter in Source Routing.
The comparison graph of the Voice Jitter during the
link fail in the network with RSVP, CR-LDP and Source
Routing is as shown below.
Fig. 14: Comparison of Voice Jitter in all 3 cases.
The above graph shows that the disturbance in the voice
signal in the case of Source routing is much lower almost
close to 0. The jitter is very high in case of CR-LDP
Signaling Protocol. Since there is no congestion in the
network during Source routing because of the virtual link
created around PLR. This virtual link is pre-computed so
the packet which needs to flow though the link which is
failed automatically goes through the virtual repair tunnel
instead of waiting for the tunnel creation with certain
handshake signals like RESV and RESP messages in
RSVP Protocol.
IV.CONCLUSION
This Paper explains about the MPLS Network and various
repair mechanisms which are been used in order to
enhance the network performance in conditions of network
Failure in both RSVP and CR-LDP Signaling protocols
over MPLS Network. Source Routing is implemented in
the MPLS Network with LFA and RLFA Technique. All
the performance metrics such as traffic received, Voice
Packet Delay, Voice Jitter shows that RLFA Based Source
Routing has best performance compared to Conventional
RSVP and CR-LDP Signaling mechanisms.
References:
[1] Csikor, L. and Retvari, G.,”IP fast reroute with remote
Loop-Free Alternates: The unit link cost case”, 663-
669, October, 1991.
[2] Yu Tao and Chen Shanzhi and Li Xin and Qin Zhen,
”Increasing IP network survivability in harsh scenarios
with dynamic source routing”, 1-4, September, 2007.
[3] Rasiah, P. and Jong-Moon Chung, ”Traffic engineering
optimal routing for LSP setup in MPLS”, III-272-III-
275 vol.3, 2000.
[4] Jong-Moon Chung,”Analysis of MPLS traffic
engineering”, 550-553 vol.2, August, 2002.
[5] Chang, Xinjie, Network Simulations with OPNET,
Phoenix, Arizona, USA.
[6] Y. Xiao, H. Jiang, B. Liu, Y. Li, and X. Li, “A novel
failure detection mechanism for fault-tolerant MPLS
network," in Advanced Computer Theory and
Engineering(ICACTE), 3rd International Conference,
vol. 1, pp. V1{168{V1{172, August2010.
[7] A. Bongale, N. Nithin, and L. Jyothi, Tra_c
prioritization in MPLS enabled OSPFnetwork," in
World Congress on Information and Communication
Technologies (WICT), pp. 132{137, October 2012.

Mais conteúdo relacionado

Mais procurados

Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
seanraz
 
Internet Traffic Engineering
Internet Traffic EngineeringInternet Traffic Engineering
Internet Traffic Engineering
jonassm
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
CU
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in Contiki
Tania Ellinidou
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
Kashif Latif
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
Nitin Gehlot
 

Mais procurados (20)

Multi-Protocol Label Switching
Multi-Protocol Label SwitchingMulti-Protocol Label Switching
Multi-Protocol Label Switching
 
Internet Traffic Engineering
Internet Traffic EngineeringInternet Traffic Engineering
Internet Traffic Engineering
 
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA  Routing Fundamentals -  EIGRP, OSPF and RIPCCNA  Routing Fundamentals -  EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guide
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in Contiki
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
Multiprotocol label switching
Multiprotocol label switchingMultiprotocol label switching
Multiprotocol label switching
 
MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)MPLS (Multiprotocol Label Switching)
MPLS (Multiprotocol Label Switching)
 
Mpls101
Mpls101Mpls101
Mpls101
 
Ijariie1150
Ijariie1150Ijariie1150
Ijariie1150
 
Mpls 1
Mpls 1Mpls 1
Mpls 1
 
Multi-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and ApplicationsMulti-Protocol Label Switching: Basics and Applications
Multi-Protocol Label Switching: Basics and Applications
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
segment routing MPLS SDN NFV World Congress - Paris 2017
segment routing MPLS SDN NFV World Congress - Paris 2017segment routing MPLS SDN NFV World Congress - Paris 2017
segment routing MPLS SDN NFV World Congress - Paris 2017
 
Introduction to segment routing
Introduction to segment routingIntroduction to segment routing
Introduction to segment routing
 
Wireless LANs
Wireless LANsWireless LANs
Wireless LANs
 

Destaque (12)

Analysis of Yeezus Digipak
Analysis of Yeezus DigipakAnalysis of Yeezus Digipak
Analysis of Yeezus Digipak
 
Buddhism Way To Peace
Buddhism Way To PeaceBuddhism Way To Peace
Buddhism Way To Peace
 
Career development
Career developmentCareer development
Career development
 
pubspresentations (1)
pubspresentations (1)pubspresentations (1)
pubspresentations (1)
 
Nancy sanchez
Nancy sanchezNancy sanchez
Nancy sanchez
 
info_package__4_
info_package__4_info_package__4_
info_package__4_
 
Rakimania - Atelier Alicante
Rakimania - Atelier AlicanteRakimania - Atelier Alicante
Rakimania - Atelier Alicante
 
Design Process
Design Process Design Process
Design Process
 
Last Mile Delivery Solutions final
Last Mile Delivery Solutions finalLast Mile Delivery Solutions final
Last Mile Delivery Solutions final
 
Papan suis utama (psu)
Papan suis utama (psu)Papan suis utama (psu)
Papan suis utama (psu)
 
Career Development Theories
Career Development TheoriesCareer Development Theories
Career Development Theories
 
Career management & Development
Career management & Development Career management & Development
Career management & Development
 

Semelhante a Performance Evaluation of Source Routing over MPLS Networks for Failure Detection and Recovery

Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...
Kimberly Jones
 
Network Level Redundancy for Campus LAN
Network Level Redundancy for Campus LANNetwork Level Redundancy for Campus LAN
Network Level Redundancy for Campus LAN
ijtsrd
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
friv4schoolgames
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
Anil Nembang
 

Semelhante a Performance Evaluation of Source Routing over MPLS Networks for Failure Detection and Recovery (20)

Thesis Slides
Thesis SlidesThesis Slides
Thesis Slides
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
 
IRJET- Secured LAN Network Topology of a Small Office with Redundancy
IRJET-  	  Secured LAN Network Topology of a Small Office with RedundancyIRJET-  	  Secured LAN Network Topology of a Small Office with Redundancy
IRJET- Secured LAN Network Topology of a Small Office with Redundancy
 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.com
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...Disadvantages And Disadvantages Of Wireless Networked And...
Disadvantages And Disadvantages Of Wireless Networked And...
 
C0343015019
C0343015019C0343015019
C0343015019
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
 
Network Level Redundancy for Campus LAN
Network Level Redundancy for Campus LANNetwork Level Redundancy for Campus LAN
Network Level Redundancy for Campus LAN
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
MENOG-Segment Routing Introduction
MENOG-Segment Routing IntroductionMENOG-Segment Routing Introduction
MENOG-Segment Routing Introduction
 
ccna 4 final 2012
ccna 4 final 2012ccna 4 final 2012
ccna 4 final 2012
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
Integrating Multimedia Services Over Software Defined Networking
Integrating Multimedia Services Over Software Defined NetworkingIntegrating Multimedia Services Over Software Defined Networking
Integrating Multimedia Services Over Software Defined Networking
 
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
IRJET- QOS Aware Manet Routing Protocol for Multimedia Traffic in an Adaptive...
 

Mais de Eswar Publications

Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 

Mais de Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Performance Evaluation of Source Routing over MPLS Networks for Failure Detection and Recovery

  • 1. Int. J. Advanced Networking and Applications Volume: 06 Issue: 06 Pages: 2529-2532 (2015) ISSN: 0975-0290 2529 Performance Evaluation of Source Routing over MPLS Networks for Failure Detection and Recovery AamaniNemtur, Mohamed El-Sharkawy and Maher Rizkalla Electrical and Computer Engineering Purdue School of Engineering and Technology 723 W Michigan St Indianapolis, IN 46202, USA -------------------------------------------------------------------ABSTRACT-------------------------------------------------------------- Multi-Protocol Label Switching is an emerging technology which is the initial step for the forthcoming generation of Communication. It uses Labels in order to identify the packets unlike the conventional IP Routing Mechanism which uses the routing table at each router to route the packet. There exits certain methods which are used to recover the failure of any link and/or node failure in the given Network. It uses the techniques of FRR with the help of RSVP/CR-LDP to overcome the link and/or node failures in the network. On the other hand there are certain limitations/Drawbacks of using the above mechanisms for Failure Detection and Recovery which are multiple protocols such as RSVP/CR-LDP over OSPF/IS-IS and complex algorithms to generate backup path since each router works individually in order to create a backup tunnel. So to overcome the listed limitations, this paper discusses a relatively new technique for MPLS Network which is Source Routing. Source Routing is the technique in which the source plays the role of directing the packet to the destination and no other router plays the role of routing the packet in the network. Using OPNET Modeler 17.5 tool for implementing source routing when there is a network failure is performed and the results are compared by implementing RSVP/CR-LDP over the same failed network. Keywords: Multi-Protocol Label Switching, IP Routing, OPNET, FRR and RSVP/CR-LDP. ------------------------------------------------------------------------------------------------------------------------------------------------ Date of Submission: April 29, 2015 Date of Acceptance: May 24, 2015 ------------------------------------------------------------------------------------------------------------------------------------------------ I. INTRODUCTION Source Routing is a type of routing where sender of the packet determines the entire path through which the packet should travel to reach the destination. Source Routing is the replacement of the other signaling protocols like RSVP/CR-LDP in the case of failure detection and recovery. Source Routing mainly uses stack of labels and the important difference is to use a Domain Wide Label (DWL) for the communication. A Domain Wide FEC to bind a label is always desired. In Domain wide FEC to label binding, a label is always bound to the same FEC on all the network links. This label is generally called as Domain Wide Label. The difference between Local Label and Domain wide label is in the former one multiple FECs can map to a particular label on different links whereas in later same FECs map to the label on all the links. Fig. 1: Source Routing DWL Allows a way to support Source Routed LSP in an LDP enabled network using stack of labels. The Source contains the entire stack of labels through which the packet should be passed through. Since the labels are constant throughout the network this routing is possible over MPLS Networks [2, 3, 4, 6 and 7] . Label Stack is updated based on the route the packet needs to travel and the path is computed at the source. So other LSRs does not push another label as in the other signaling protocols but just pop the label of its own from the label stack and forwards the packet with the remaining stack of labels. Fig. 2: Label Stack Mechanism in Source Routing. 1. Protection Lists: It is the list of segments encoding the detour path from the protecting node S to the repair node R avoiding the link which is failed.
  • 2. Int. J. Advanced Networking and Applications Volume: 06 Issue: 06 Pages: 2529-2532 (2015) ISSN: 0975-0290 2530 2. Protection Techniques for Link Failure using LFA: If a path to a destination D from a neighbor N of S does not contain S (i.e. N is a loop-free alternate of S for the failure of link S-F), then S can pre-install a repair forwarding information to deviate the packet data to node N uponthe failure of S-E. In the case of LFA applicability, the protection list is empty. A protecting router S needs to send the protected packet as is to its LFA neighbor N. Fig. 3: LFA Mechanism in MPLS Network. 3. Protection Techniques for Link Failure using RLFA: If there is no LFA neighbor which is not on the path of the failed link, then Source may create a virtual LFA by using a tunnel to carry the packet to a point in the network that is not a direct neighbor of S, and from which the packet will be delivered to the destination without looping back to S. The Remote LFA proposal [4] calls such a tunnel a repair tunnel. The tail-end of this tunnel (R) is called a ”remote LFA”. Fig. 4: RLFA Mechanism in MPLS Network. The difference between LFA and RLFA is there will be some cases where the neighboring node may not be present to form a backup path as mentioned in the concept of LFA.In the below figure source s needs to send data to node d. Suppose there is a link failure between s-a. So the alternate path to reach node d is through node b. But because ECMP,node b tend to send date to node d again through the path b-s-a-d.So there occurs loss of data and results in performance degradation. In this case the importance virtual tunnel is realized where the virtual repair tunnel is created between node S to node e and from node e the data is flown to the destination d. In this case there is very less scope of loss of data in the network. Fig. 5: Repair Tunnel in RLFA 4. Advantages of Source Routing: Zero Signaling and Maintenance overhead: Since all the routing work is done at the source there is no signaling required and also no maintenance required in the network. Only the start end of the LSP needs to maintain the state. Other LSRs on the LSP are not even aware of the existence of such LSPs. Zero Signaling Delay: In Source Routing LSPs are immediately used after the stack of labels is determined. It inherits the concept of make before break. II. Proposed Work: In this paper, the Implementation of MPLS Network with FRR Techniques with both RSVP and CR-LDP is presented for both node and link protection. In order to evaluate the network performance in the MPLS with node and link failure backup tunnels are to be pre-computed and they are maintained in order to use them during the network failures. Source Routing is implemented over the same network which issued to analyze the performance of RSVP and CR- LDP. Simulations are carried on by failing the link in one case and node in the second case. This performance is compared with the performance of the network with the RSVP and CR-LDP Signaling Protocols. All the Implementation is carried using Network Simulation tool OPNET Modeler 17.5 [5]. Fig. 6: OPNET Simulation Network. III. SIMULATIONS: The Network Simulation tool OPNET 17.5 Modeler is used to generate the results for the MPLS Based Network. OPNET provides several modules for the simulation comprising a vast collection of Network protocols and network elements. The main feature of OPNET is that it provides various real-life network configuration capabilities that make the simulation environment close to reality. The advantages of OPNET compared to other simulators include GUI interface, comprehensive library of network protocols and models, graphical interface to view the results, availability of documentation for the user to develop the network models etc. The Network used for the study has 6 LSRs and one Ingress and one Egress Router are setup and the source signal is obtained from one of the five workstations (voice, video, mail, HTTP, File) as mentioned in Figure 6. In the above network implementation which is designed using OPNET Modeler there are in total 6 LSRs and 2 Switches and in the source side we have 5 Workstations. In the Receiver side there 2 receiving work stations and other 3 are servers. In order to implement the MPLS Network first important thing to do is to create Dynamic LSPs across the MPLS Domain and setup the link parameters. The Signaling protocol RSVP-TE and CR-LDP is selected in the list of protocols listed in OPNET Modeler.
  • 3. Int. J. Advanced Networking and Applications Volume: 06 Issue: 06 Pages: 2529-2532 (2015) ISSN: 0975-0290 2531 Link Failure Protection: In the network a particular link is forcibly made to fail and the option of failing that node for a particular time frame is provided by the tool. The network performance is been studied without deploying any repair mechanism after failing the node. Fig. 7: Traffic Received when no FRR. The above graphs show the traffic received. If there is no repair technique deployed in the network there is a complete loss of data in the time frame in which link is made to fail. If there is LFA Mechanism which is deployed in the network which uses the Source Routing then there will be not much disturbance in the traffic received even in the time frame in which the link is in fail state. Fig. 8: Traffic Received when LFA is Implemented using Source Routing If RLFA Mechanism is deployed in the network which uses the Source Routing then the traffic received has better performance which means the loss of data is less. The comparison graph of the traffic received during the link fail in the network with RSVP, CR-LDP, LFA Source Routing, and RLFA Source Routing is as shown in Figure 10. Fig. 9: Traffic Received when RLFA is Implemented using Source Routing. Fig. 10: Comparison of traffic Received in all 3 cases. The Y-axis is the average packets received. The graph clearly shows that the performance of CR-LDP is very lessas compared to other 3 techniques. The difference in the packets received is mainly concentrated in the time frame of 5 to 10 sec where the link is made to fail. It shows that implementing RLFA Technique over the network which uses Source Routing has much better performance over RSVP and LFA Technique. Voice Packet Delay Voice packet delay variation is the difference in end to end one way delay between selected packets in a flow with any lost packets being ignored. The Voice packet delay in case of Source Routing in the MPLS Network is shown below. Fig. 11: Voice Packet Delay in Source Routing. The comparison graph of the Voice Packet Delay during the link fail in the network with RSVP, CR-LDP and Source Routing is as shown below: Fig. 12: Comparison of Voice Packet Delay in 3 cases. The comparison graph clearly shows that the delay is much lower in the case of Source Routing because in the case of source routing the virtual tunnel is automatically created after the study of the network at the source. So the decision of creating the backup path at the point of failure delays the packet to reach the destination which happens in the case of RSVP and CR-LDP.
  • 4. Int. J. Advanced Networking and Applications Volume: 06 Issue: 06 Pages: 2529-2532 (2015) ISSN: 0975-0290 2532 Voice Jitter: Jitter is the time variation between the packets that are arriving due to Route changes in the network, Congestion in the network and timing drift. Fig. 13: Voice Jitter in Source Routing. The comparison graph of the Voice Jitter during the link fail in the network with RSVP, CR-LDP and Source Routing is as shown below. Fig. 14: Comparison of Voice Jitter in all 3 cases. The above graph shows that the disturbance in the voice signal in the case of Source routing is much lower almost close to 0. The jitter is very high in case of CR-LDP Signaling Protocol. Since there is no congestion in the network during Source routing because of the virtual link created around PLR. This virtual link is pre-computed so the packet which needs to flow though the link which is failed automatically goes through the virtual repair tunnel instead of waiting for the tunnel creation with certain handshake signals like RESV and RESP messages in RSVP Protocol. IV.CONCLUSION This Paper explains about the MPLS Network and various repair mechanisms which are been used in order to enhance the network performance in conditions of network Failure in both RSVP and CR-LDP Signaling protocols over MPLS Network. Source Routing is implemented in the MPLS Network with LFA and RLFA Technique. All the performance metrics such as traffic received, Voice Packet Delay, Voice Jitter shows that RLFA Based Source Routing has best performance compared to Conventional RSVP and CR-LDP Signaling mechanisms. References: [1] Csikor, L. and Retvari, G.,”IP fast reroute with remote Loop-Free Alternates: The unit link cost case”, 663- 669, October, 1991. [2] Yu Tao and Chen Shanzhi and Li Xin and Qin Zhen, ”Increasing IP network survivability in harsh scenarios with dynamic source routing”, 1-4, September, 2007. [3] Rasiah, P. and Jong-Moon Chung, ”Traffic engineering optimal routing for LSP setup in MPLS”, III-272-III- 275 vol.3, 2000. [4] Jong-Moon Chung,”Analysis of MPLS traffic engineering”, 550-553 vol.2, August, 2002. [5] Chang, Xinjie, Network Simulations with OPNET, Phoenix, Arizona, USA. [6] Y. Xiao, H. Jiang, B. Liu, Y. Li, and X. Li, “A novel failure detection mechanism for fault-tolerant MPLS network," in Advanced Computer Theory and Engineering(ICACTE), 3rd International Conference, vol. 1, pp. V1{168{V1{172, August2010. [7] A. Bongale, N. Nithin, and L. Jyothi, Tra_c prioritization in MPLS enabled OSPFnetwork," in World Congress on Information and Communication Technologies (WICT), pp. 132{137, October 2012.