TY - GEN
T1 - A cross-layer approach for IP network protection
AU - Zheng, Qiang
AU - Zhao, Jing
AU - Cao, Guohong
PY - 2012/10/1
Y1 - 2012/10/1
N2 - Backup paths are widely used to protect IP links from failures. Existing solutions such as the commonly used independent and Shared Risk Link Group models do not accurately reflect the correlation between IP link failures, and thus may not choose reliable backup paths. We propose a cross-layer approach for IP link protection. We develop a correlated failure probability (CFP) model to quantify the impact of an IP link failure on the reliability of backup paths. With the CFP model, we propose two algorithms for selecting backup paths. The first algorithm focuses on choosing the backup paths with minimum failure probability. The second algorithm further considers the bandwidth constraint and aims at minimizing the traffic disruption caused by failures. It also ensures that the rerouted traffic load on each IP link does not exceed the usable bandwidth to avoid interfering with the normal traffic. Simulations based on real ISP networks show that our approach can choose backup paths that are more reliable and achieve better protection.
AB - Backup paths are widely used to protect IP links from failures. Existing solutions such as the commonly used independent and Shared Risk Link Group models do not accurately reflect the correlation between IP link failures, and thus may not choose reliable backup paths. We propose a cross-layer approach for IP link protection. We develop a correlated failure probability (CFP) model to quantify the impact of an IP link failure on the reliability of backup paths. With the CFP model, we propose two algorithms for selecting backup paths. The first algorithm focuses on choosing the backup paths with minimum failure probability. The second algorithm further considers the bandwidth constraint and aims at minimizing the traffic disruption caused by failures. It also ensures that the rerouted traffic load on each IP link does not exceed the usable bandwidth to avoid interfering with the normal traffic. Simulations based on real ISP networks show that our approach can choose backup paths that are more reliable and achieve better protection.
UR - http://www.scopus.com/inward/record.url?scp=84866655367&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84866655367&partnerID=8YFLogxK
U2 - 10.1109/DSN.2012.6263944
DO - 10.1109/DSN.2012.6263944
M3 - Conference contribution
AN - SCOPUS:84866655367
SN - 9781467316248
T3 - Proceedings of the International Conference on Dependable Systems and Networks
BT - 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012
T2 - 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012
Y2 - 25 June 2012 through 28 June 2012
ER -