SlideShare a Scribd company logo
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011



      Performance Comparison of Rerouting Schemes of
           Multi Protocol Label Switching Network.
                                    Dr. Yogesh P Kosta 1, Minesh P Thaker 1,Bhaumik Nagar 2
                        1
                            VTP Dept of E&C Engg, Charotar Institute of Technology-Changa Gujarat, India
                                     Email: mineshthaker.ec@ecchanga.ac.in ypkosta@yahoo.com
                              2
                                IT Centre, National Institute of Design, Paldi ,Ahmedabad, Gujarat, India
                                                      Email : bhaumik_n@nid.edu


Abstract—In this paper, we attempt to present a comparison
through rigorous studies (existing conventional models)
following software based modeling and verifications through
simulations in terms of various traffic parameters such as
packet loss, Recovery Time (Latency), reordering of packets
including recovery time for various widely used path recovery
models for the purpose of end-to-end recovery of LSPs in
MPLS domains using NS2 simulator.

Index Terms—MPLS .path -recovery, software modeling
and simulations ,traffic engineering, LSP (Label Switch
Path), end-to-end delay, recovery time.

                             I.INTRODUCTION
           Traffic engineering is basically the process of                               Figure 1 Makam’s Model
optimizing the network(s) to maximize its overall performance
[10] that ultimately leads to improved efficiency. Multi Protocol               B . HASKIN’s Model(Global Path repair with RNT)
Label Switching (MPLS) being one such technology for                                              This scheme was introduced by Haskin
increasing the efficacy. This technology of forwarding data                     in the draft [2] and When global recovery is used as in
packets (of a fixed size labels) is based upon a pre-determined                 Makam’s model, the PSL has to be informed about a
path that the data packet needs to traverse, where thencoming                   failure in the working path before traffic can be switched
packet labels are examined to determine the next hop (or the                    over to the recovery path.
next part of the journey), the old label is then replaced with a
new one (label) and once again it is forwarded to the next hop,
and the journey continues till it reaches its destination.
           The rest of this paper is organized as follows. Under
section 2, we briefly describe various path recovery models
that we have evaluated. Under section 3, we discuss the
important issues relating to previous studies on the subject
and explaining our work. Section 4 presents the Simulation
environment used for evaluation of the said protocols.
Section 5 helps consolidate our simulation results and our
specific observation. Finally, section 6 concludes the paper.

      II. MPLS PATH RECOVERY AND REPAIRING MODELS
   In this section we have briefly described the path
recovery schemes that we investigated. A detailed discussion
and comparison of path recovery schemes are availed at [ 1].
                                                                                A different concern for Haskin’s model is the less
This work is being submitted in requirements against partial fulfillment
for the degree of ME in CSE of Gujarat University                               efficient use of resources, as the total length of the recovery
                                                                                path gets longer than the original working path.
 A. MAKAM’s Models (Global Path Repairing)
One of the first proposed models for MPLS recovery was                          C. Fast Reroute Model
presented by Makam in the draft [2].The model provides                              As shown in the fig 3 The fast reroute [4],[5],[6] shall
end- to-end protection for a LSP by setting up aglobal                          be used end-to-end then recovery paths needs to be pre-setup
recovery path between the ingress and egress LSR.

© 2011 ACEEE                                                               17
DOI: 01.IJCSI.02.01.49
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011

for each link or node in the working path. This is one-to-one                       IV.SIMULATION ENVIRONMENT
backup model without merging for local path protection. In
this technique switch over time can be increased but more                     We have used network simulator ns2 for simulation,
resources are required.                                              most widely used network simulator and freely
                                                                     downloadable. In order to compare the results we use
 D. Fast reroute one-to-one backup Model (Local Repair)              CBR traffic flow and a UDP agent with the following
         As shown in fig 4 the fast reroute [7],[8] one-to-          characteristics: packet size = 1500 bits, source rate=
one technique a separate backup LSP, called a detour                 512Kbps, burst time=0 and idle time =0, Tprop = 10msec,
LSP is computed for each LSR in a protected path.                    and BW(lsp)=BW(back)= BW( alt) = 10Mbps..
These detour LSPs are set up to use node recovery if
possible otherwise link recovery. To fully protect an LSP                     V. SIMULATION RESULTS AND OBSERVATION
that traverses N nodes, there could be as many as N-1
detours.                                                              A. . Packet Loss:
                                                                               The graph in figure 5 shows the number of dropped
                                                                     packets for the different models and depending on which
                                                                     link that breaks. In both Haskins model and the fast reroute
                                                                     model, traffic is switched onto a pre-setup backup path by
                                                                     the LSR that detects the failure, so for both of those models
                                                                     the only packets that are dropped are the ones dropped during
                                                                     the failure detection time.
                                                                         For Makam’s and the best effort model, the number
                                                                     of dropped packages increases the further away from the
                                                                     ingress LSR the failure occurs. This is because the FIS has
                                                                     to be sent back to the ingress before traffic can be switched
                                                                     to the backup path. In Makam’s model the number of
                                                                     dropped packages is the same as for Haskin and fast reroute
                                                                     only if the failure occurs on the link out from the ingress,
                                                                     this is because in this case no FIS has to be sent before
                                                                     traffic can be forwarded on the backup path. For the best
                                                                     effort model, the number of dropped packages is large
                                                                     because packages are dropped during the failure detection
                                                                     time, the time for the FIS to be sent to the ingress router.
                                                                      B.Full Restoration Time
                                                                          The graph in fig 6 shows the Full Restoration Time,
                                                                     measured from the last packet that was sent over the link
                                                                     before it breaks is received by node 10, until the first packet
                                                                     that is using the backup path is received by this node. The
                                                                     time for Haskin’s and Makam’s models are the same, this
                                                                     time is larger than fast reroute in all cases where the failure
                                                                     occurs on a different link then on the ingress node. The
                                                                     time increases for these models the further away from the
                                                                     ingress node the failure occurs, this is because the FIS or
                                                                     reversed traffic has to be sent upstream to the ingress before
                                                                     it can be switched over on the global recovery path. For the
                                                                     best effort model, the Full Restoration time is further
                                                                     increased by the time to calculate and setup the backup path.
                                                                     For the reroute model the Full Restoration time decreases
                                                                     the closer to the egress LSR the failure occurs. This is partly
                                                                     because the closer to the egress the failure occurs, the shorter
                    III. PREVIOUS WORK                               the new setup backup path can be.
           In this section we analyze the most relevant               C. Pre-reserved backup resources
previous studies concerning. Path recovery schemes for                        The chart in figure 7 shows the number of resources
MPLS network performance comparisons. Most of the                    reserved for backup traffic in the network before the failure
previous work is limited on performing simulations for               occurs. Both the best effort and rerouting model setup the
MPLS networks with Packet loss and end-to-end delay.In               backup path on demand after the failure has occurred, and
this paper, we observed and commented on the behavior                therefore no backup resources are reserved before the
of each path repairing schemes.                                      failure in those models. Makam’s models holds five

© 2011 ACEEE                                                    18
DOI: 01.IJCSI.02.01.49
ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011

resources reserved for the global backup path.                        Having compared the performance of above four rerouting
Haskin’smodel holds five resources for the global backup              techniques Haskin model has got fast path recovery than
path and three for the reversed path, a total of eight. The           Makams’s model. But uses more resources ,also Haskin has
fast reroute holds eight resources reserved                           low packet loss ratio, less number of disordered packets than
for the backup path.                                                  Mkam’s model. As far as two Fast reroute with one-to-one
                                                                      techniques are concerned Fast reroute without merging was
 D. Packets Disordered:                                               much faster as far as restoration time is concerned with
         Figure 8 presents the packet disorder result for             respect to Fat reroute with merging. But as far as resources
the these schemes. Note that the packet disorder that we              utilizations are concerned Fast reroute with merging uses
consider here is the disorder produced during the restoration         less resources than Fast reroute without merging.
period which does not include the disorder produced by the            If we compare global Path repair and Local Path Repair
retransmission of lost packets by a high level protocol (i.e.,        techniques the local path repair is good at fast rerouting where
TCP).Makam’s and other schemes do not introduce more                  as Global path is poor at fast rerouting or at full restoration
packet disorder but cause more packet losses. It is evident           time.Similarly As far as Packet disordering is concern Haskin
from the figure that Fast reroute and Fast reroute 1to1 has           is very good .
low packet disorder than Haskin.
                                                                                             VII. FUTURE    WORK

                                                                                In this simulation study, we have not used large
                                                                      no of nodes and simulation time was 100s. Increasing both
                                                                      or either of them will increase computational time which
                                                                      was limited due to various reasons. Thus, in future we will
                                                                      try to carry out more vigorous simulation so as to
                                                                      gain     better understanding of such networks and
                                                                      subsequently helps in development of new protocols or
                                                                      modification in existing protocols.

                                                                                                 REFERENCES
                                                                      [1] S.Makam, V.Sharma, K.Owens, C.Huang “Protection/
                                                                      Restoration of MPLS Networks” draft-makam-mpls-protection-
                                                                      00.txt October 1999
                                                                      [2]D. Haskin, R.Krishnan
                                                                      “A Method for Setting an Alternative Label Switched Paths to
                                                                      Handle Fast Reroute” draft-haskin-mpls-fast-reroute-05.txt
                                                                      November 2000
                                                                      [3 E. Rosen, A.Vishwanathan, and R. Callon “Multi Protocol Label
                                                                      Switching architecture.” RFC 3031, January 2001
                                                                      [4]D. Haskin and R. Krishnan. “A Method for Setting an Alternative
                                                                      Label Switched Paths to Handle Fast Reroute. Internet draft <draft-
                                                                      haskin-mpls-fast-reroute-05.txt>, “ November 2000.
                                                                      [5] Makam, V. Sharma, K. Owens, and C. Huang.” Protection/
                                                                      Restoration of MPLS Networks. Internet draft <draft-makam-mpls-
                                                                      protection-00.txt>” October 1999
                                                                      [6 K. Owens, V. Sharma, S. Makam, and C. Huang. “A path
                                                                      protection/Restoration Mechanism for MPLS Networks. internet
                                                                      draft <draft-chang-mpls-protection-03.txt>” July 2001.
                                                                      [7] S Shew “Fast Restoration of MPLS Label Switched Paths.,
                                                                      Internet draft <draft-shew-lsp-restoration-00.txt>” October1999.
                                                                      [8]L. Hundessa and J. Domingo. “Reliable and Fast Rerouting
                                                                      mechanism for a protected label Switched Path.” Proceedings of
                                                                      the IEEE GLOBECOM ’02, November 2002
                                                                      [9] Nortel networks “introduction to multi protocol label switching”
                                                                      white paper April 2001

        Figure 9 Topology used for simulationVI. Conclusion




© 2011 ACEEE                                                     19
DOI: 01.IJCSI.02.01.49

More Related Content

PDF
Hn analysis
PDF
SpeedIT : GPU-based acceleration of sparse linear algebra
PDF
On Redundant Multipath Operating System Support for Wireless Mesh Networks
PDF
Lecture5c
PDF
Fw3111471149
PDF
Signalling in GSM BSS
PDF
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
PDF
Dw24779784
Hn analysis
SpeedIT : GPU-based acceleration of sparse linear algebra
On Redundant Multipath Operating System Support for Wireless Mesh Networks
Lecture5c
Fw3111471149
Signalling in GSM BSS
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
Dw24779784

What's hot (19)

PDF
Stefano Giordano
PDF
05 Bcmsn Spanning Tree
PDF
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
PDF
Gq2411921196
PDF
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
Ethernet Alliance Tech Exploration Forum Keynote
PDF
Ak25214217
PDF
Evaluation aodv
PDF
Backbone nodes based stable routing for mobile ad hoc networks
PDF
Bs24461465
PDF
Extended summary of nonorthogonal random access for 5g mobile communication s...
PDF
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
PDF
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...
PDF
Ijcta2011020605
PDF
Hi3114131415
PDF
Dq31784792
PDF
A Fault-tolerant Switch for Next Generation Computer Networks
PDF
A novel estimation based backoff algorithm in the ieee
Stefano Giordano
05 Bcmsn Spanning Tree
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...
Gq2411921196
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
Welcome to International Journal of Engineering Research and Development (IJERD)
Ethernet Alliance Tech Exploration Forum Keynote
Ak25214217
Evaluation aodv
Backbone nodes based stable routing for mobile ad hoc networks
Bs24461465
Extended summary of nonorthogonal random access for 5g mobile communication s...
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...
Ijcta2011020605
Hi3114131415
Dq31784792
A Fault-tolerant Switch for Next Generation Computer Networks
A novel estimation based backoff algorithm in the ieee
Ad

Viewers also liked (20)

PDF
Gravitational Based Hierarchical Clustering Algorithm
PDF
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...
PDF
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...
PDF
Data Management In Cellular Networks Using Activity Mining
PDF
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
PDF
Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...
PDF
Image Fusion of Video Images and Geo-localization for UAV Applications
PDF
Physical Layer Technologies And Challenges In Mobile Satellite Communications
PDF
IEEE-Communications-Mag-CSDCYorkU
PDF
2020 Strategy Document_FinalExport_JA
PDF
Pamoja Tuwalee - 1
PDF
Abcnews go com_international_inside_mysterious_underground_c
PPTX
Water pollution 11
PPS
A Ti Mujer
PDF
Le DPP devrait-il être obligatoire en Belgique
PDF
PPT
20160823 ww perspektif-baru-energy
PPT
Ssm lecture-14 (motivation of the sales force)
PPTX
New Testament Survey no.6 : John - His Gospel Account
PDF
Cets 2015 shell buehlman systemmap challenge
Gravitational Based Hierarchical Clustering Algorithm
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...
Data Management In Cellular Networks Using Activity Mining
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...
Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...
Image Fusion of Video Images and Geo-localization for UAV Applications
Physical Layer Technologies And Challenges In Mobile Satellite Communications
IEEE-Communications-Mag-CSDCYorkU
2020 Strategy Document_FinalExport_JA
Pamoja Tuwalee - 1
Abcnews go com_international_inside_mysterious_underground_c
Water pollution 11
A Ti Mujer
Le DPP devrait-il être obligatoire en Belgique
20160823 ww perspektif-baru-energy
Ssm lecture-14 (motivation of the sales force)
New Testament Survey no.6 : John - His Gospel Account
Cets 2015 shell buehlman systemmap challenge
Ad

Similar to Performance Comparison of Rerouting Schemes of Multi Protocol Label Switching Network (20)

PDF
2004 qof is_mpls_ospf
PDF
Shared bandwidth reservation of backup paths of multiple lsp against link and...
PDF
Shared bandwidth reservation of backup paths of multiple
PDF
shashank_hpca1995_00386533
DOCX
Exploiting cooperative relay for high performance communications in mimo ad h...
PDF
Networks
PDF
Avoiding packet loss in gateway reallocation in mobile wimax networks
PDF
Avoiding packet loss in gateway reallocation in mobile wimax networks
PDF
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
PDF
Mit6 02 f12_chap18
PDF
Affect of parallel computing on multicore processors
PDF
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
PDF
A Survey on Cross Layer Routing Protocol with Quality of Service
PDF
Energy efficiency in ieee 802.11 standard wlan through mwtdp
PDF
Energy efficiency in ieee 802.11 standard wlan through
PDF
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
PDF
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
PDF
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
PDF
Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...
2004 qof is_mpls_ospf
Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple
shashank_hpca1995_00386533
Exploiting cooperative relay for high performance communications in mimo ad h...
Networks
Avoiding packet loss in gateway reallocation in mobile wimax networks
Avoiding packet loss in gateway reallocation in mobile wimax networks
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
Mit6 02 f12_chap18
Affect of parallel computing on multicore processors
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
A Survey on Cross Layer Routing Protocol with Quality of Service
Energy efficiency in ieee 802.11 standard wlan through mwtdp
Energy efficiency in ieee 802.11 standard wlan through
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...
Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...

More from IDES Editor (20)

PDF
Power System State Estimation - A Review
PDF
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
PDF
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
PDF
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
PDF
Line Losses in the 14-Bus Power System Network using UPFC
PDF
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
PDF
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
PDF
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
PDF
Selfish Node Isolation & Incentivation using Progressive Thresholds
PDF
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
PDF
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
PDF
Cloud Security and Data Integrity with Client Accountability Framework
PDF
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
PDF
Low Energy Routing for WSN’s
PDF
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
PDF
Rotman Lens Performance Analysis
PDF
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
PDF
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
PDF
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Power System State Estimation - A Review
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Line Losses in the 14-Bus Power System Network using UPFC
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Selfish Node Isolation & Incentivation using Progressive Thresholds
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Cloud Security and Data Integrity with Client Accountability Framework
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Enhancing Data Storage Security in Cloud Computing Through Steganography
Low Energy Routing for WSN’s
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Rotman Lens Performance Analysis
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectroscopy.pptx food analysis technology
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

Performance Comparison of Rerouting Schemes of Multi Protocol Label Switching Network

  • 1. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 Performance Comparison of Rerouting Schemes of Multi Protocol Label Switching Network. Dr. Yogesh P Kosta 1, Minesh P Thaker 1,Bhaumik Nagar 2 1 VTP Dept of E&C Engg, Charotar Institute of Technology-Changa Gujarat, India Email: mineshthaker.ec@ecchanga.ac.in ypkosta@yahoo.com 2 IT Centre, National Institute of Design, Paldi ,Ahmedabad, Gujarat, India Email : bhaumik_n@nid.edu Abstract—In this paper, we attempt to present a comparison through rigorous studies (existing conventional models) following software based modeling and verifications through simulations in terms of various traffic parameters such as packet loss, Recovery Time (Latency), reordering of packets including recovery time for various widely used path recovery models for the purpose of end-to-end recovery of LSPs in MPLS domains using NS2 simulator. Index Terms—MPLS .path -recovery, software modeling and simulations ,traffic engineering, LSP (Label Switch Path), end-to-end delay, recovery time. I.INTRODUCTION Traffic engineering is basically the process of Figure 1 Makam’s Model optimizing the network(s) to maximize its overall performance [10] that ultimately leads to improved efficiency. Multi Protocol B . HASKIN’s Model(Global Path repair with RNT) Label Switching (MPLS) being one such technology for This scheme was introduced by Haskin increasing the efficacy. This technology of forwarding data in the draft [2] and When global recovery is used as in packets (of a fixed size labels) is based upon a pre-determined Makam’s model, the PSL has to be informed about a path that the data packet needs to traverse, where thencoming failure in the working path before traffic can be switched packet labels are examined to determine the next hop (or the over to the recovery path. next part of the journey), the old label is then replaced with a new one (label) and once again it is forwarded to the next hop, and the journey continues till it reaches its destination. The rest of this paper is organized as follows. Under section 2, we briefly describe various path recovery models that we have evaluated. Under section 3, we discuss the important issues relating to previous studies on the subject and explaining our work. Section 4 presents the Simulation environment used for evaluation of the said protocols. Section 5 helps consolidate our simulation results and our specific observation. Finally, section 6 concludes the paper. II. MPLS PATH RECOVERY AND REPAIRING MODELS In this section we have briefly described the path recovery schemes that we investigated. A detailed discussion and comparison of path recovery schemes are availed at [ 1]. A different concern for Haskin’s model is the less This work is being submitted in requirements against partial fulfillment for the degree of ME in CSE of Gujarat University efficient use of resources, as the total length of the recovery path gets longer than the original working path. A. MAKAM’s Models (Global Path Repairing) One of the first proposed models for MPLS recovery was C. Fast Reroute Model presented by Makam in the draft [2].The model provides As shown in the fig 3 The fast reroute [4],[5],[6] shall end- to-end protection for a LSP by setting up aglobal be used end-to-end then recovery paths needs to be pre-setup recovery path between the ingress and egress LSR. © 2011 ACEEE 17 DOI: 01.IJCSI.02.01.49
  • 2. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 for each link or node in the working path. This is one-to-one IV.SIMULATION ENVIRONMENT backup model without merging for local path protection. In this technique switch over time can be increased but more We have used network simulator ns2 for simulation, resources are required. most widely used network simulator and freely downloadable. In order to compare the results we use D. Fast reroute one-to-one backup Model (Local Repair) CBR traffic flow and a UDP agent with the following As shown in fig 4 the fast reroute [7],[8] one-to- characteristics: packet size = 1500 bits, source rate= one technique a separate backup LSP, called a detour 512Kbps, burst time=0 and idle time =0, Tprop = 10msec, LSP is computed for each LSR in a protected path. and BW(lsp)=BW(back)= BW( alt) = 10Mbps.. These detour LSPs are set up to use node recovery if possible otherwise link recovery. To fully protect an LSP V. SIMULATION RESULTS AND OBSERVATION that traverses N nodes, there could be as many as N-1 detours. A. . Packet Loss: The graph in figure 5 shows the number of dropped packets for the different models and depending on which link that breaks. In both Haskins model and the fast reroute model, traffic is switched onto a pre-setup backup path by the LSR that detects the failure, so for both of those models the only packets that are dropped are the ones dropped during the failure detection time. For Makam’s and the best effort model, the number of dropped packages increases the further away from the ingress LSR the failure occurs. This is because the FIS has to be sent back to the ingress before traffic can be switched to the backup path. In Makam’s model the number of dropped packages is the same as for Haskin and fast reroute only if the failure occurs on the link out from the ingress, this is because in this case no FIS has to be sent before traffic can be forwarded on the backup path. For the best effort model, the number of dropped packages is large because packages are dropped during the failure detection time, the time for the FIS to be sent to the ingress router. B.Full Restoration Time The graph in fig 6 shows the Full Restoration Time, measured from the last packet that was sent over the link before it breaks is received by node 10, until the first packet that is using the backup path is received by this node. The time for Haskin’s and Makam’s models are the same, this time is larger than fast reroute in all cases where the failure occurs on a different link then on the ingress node. The time increases for these models the further away from the ingress node the failure occurs, this is because the FIS or reversed traffic has to be sent upstream to the ingress before it can be switched over on the global recovery path. For the best effort model, the Full Restoration time is further increased by the time to calculate and setup the backup path. For the reroute model the Full Restoration time decreases the closer to the egress LSR the failure occurs. This is partly because the closer to the egress the failure occurs, the shorter III. PREVIOUS WORK the new setup backup path can be. In this section we analyze the most relevant C. Pre-reserved backup resources previous studies concerning. Path recovery schemes for The chart in figure 7 shows the number of resources MPLS network performance comparisons. Most of the reserved for backup traffic in the network before the failure previous work is limited on performing simulations for occurs. Both the best effort and rerouting model setup the MPLS networks with Packet loss and end-to-end delay.In backup path on demand after the failure has occurred, and this paper, we observed and commented on the behavior therefore no backup resources are reserved before the of each path repairing schemes. failure in those models. Makam’s models holds five © 2011 ACEEE 18 DOI: 01.IJCSI.02.01.49
  • 3. ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 01, Feb 2011 resources reserved for the global backup path. Having compared the performance of above four rerouting Haskin’smodel holds five resources for the global backup techniques Haskin model has got fast path recovery than path and three for the reversed path, a total of eight. The Makams’s model. But uses more resources ,also Haskin has fast reroute holds eight resources reserved low packet loss ratio, less number of disordered packets than for the backup path. Mkam’s model. As far as two Fast reroute with one-to-one techniques are concerned Fast reroute without merging was D. Packets Disordered: much faster as far as restoration time is concerned with Figure 8 presents the packet disorder result for respect to Fat reroute with merging. But as far as resources the these schemes. Note that the packet disorder that we utilizations are concerned Fast reroute with merging uses consider here is the disorder produced during the restoration less resources than Fast reroute without merging. period which does not include the disorder produced by the If we compare global Path repair and Local Path Repair retransmission of lost packets by a high level protocol (i.e., techniques the local path repair is good at fast rerouting where TCP).Makam’s and other schemes do not introduce more as Global path is poor at fast rerouting or at full restoration packet disorder but cause more packet losses. It is evident time.Similarly As far as Packet disordering is concern Haskin from the figure that Fast reroute and Fast reroute 1to1 has is very good . low packet disorder than Haskin. VII. FUTURE WORK In this simulation study, we have not used large no of nodes and simulation time was 100s. Increasing both or either of them will increase computational time which was limited due to various reasons. Thus, in future we will try to carry out more vigorous simulation so as to gain better understanding of such networks and subsequently helps in development of new protocols or modification in existing protocols. REFERENCES [1] S.Makam, V.Sharma, K.Owens, C.Huang “Protection/ Restoration of MPLS Networks” draft-makam-mpls-protection- 00.txt October 1999 [2]D. Haskin, R.Krishnan “A Method for Setting an Alternative Label Switched Paths to Handle Fast Reroute” draft-haskin-mpls-fast-reroute-05.txt November 2000 [3 E. Rosen, A.Vishwanathan, and R. Callon “Multi Protocol Label Switching architecture.” RFC 3031, January 2001 [4]D. Haskin and R. Krishnan. “A Method for Setting an Alternative Label Switched Paths to Handle Fast Reroute. Internet draft <draft- haskin-mpls-fast-reroute-05.txt>, “ November 2000. [5] Makam, V. Sharma, K. Owens, and C. Huang.” Protection/ Restoration of MPLS Networks. Internet draft <draft-makam-mpls- protection-00.txt>” October 1999 [6 K. Owens, V. Sharma, S. Makam, and C. Huang. “A path protection/Restoration Mechanism for MPLS Networks. internet draft <draft-chang-mpls-protection-03.txt>” July 2001. [7] S Shew “Fast Restoration of MPLS Label Switched Paths., Internet draft <draft-shew-lsp-restoration-00.txt>” October1999. [8]L. Hundessa and J. Domingo. “Reliable and Fast Rerouting mechanism for a protected label Switched Path.” Proceedings of the IEEE GLOBECOM ’02, November 2002 [9] Nortel networks “introduction to multi protocol label switching” white paper April 2001 Figure 9 Topology used for simulationVI. Conclusion © 2011 ACEEE 19 DOI: 01.IJCSI.02.01.49