Internet Draft
Internet Draft Gerald R. Ash
AT&T Labs
October 1999
Expires: April 2000
Routing Guidelines for Efficient Routing Methods
<draft-ash-itu-sg2-routing-guidelines-00.txt>
STATUS OF THIS MEMO:
This document is an Internet-Draft and is in full conformance with all
provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Task Force
(IETF), its areas, and its working groups. Note that other groups may also
distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and
may be updated, replaced, or obsoleted by other documents at any time. It
is inappropriate to use Internet-Drafts as reference material or to cite
them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft
Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
Distribution of this memo is unlimited.
ABSTRACT:
This draft presents the ongoing work in ITU-T SG2 Question 2/2 on
Recommendation E.352 "Routing Guidelines for Efficient Routing Methods."
Routing policies typically used in ATM- and IP-based networks do not fully
consider the possible instabilities and drastic loss of throughput that can
occur under congestion. Use of bandwidth reservation and avoidance of long
paths are recommended under such congestion, which can lead to more
efficient use of network resources. Also, there is an emphasis in ATM- and
IP-based networks on the use of state-dependent-routing (SDR) methods.
However, the flooding methods typically used by these SDR methods to
disseminate network status information can lead to inefficient use of
network resources. Use of event-dependent-routing (EDR) methods and/or more
efficient dissemination of network status information are recommended as
other possible approaches to consider. Finally, QoS routing rules are
recommended to ensure service performance quality, such as avoidance of
excessive transfer delay by limiting the number of satellite hops in an
end-to-end connection.
***************************************************************************
NOTE: A MICROSOFT WORD VERSION OF THIS DRAFT (WITH THE FIGURES) IS
AVAILABLE ON REQUEST
***************************************************************************
Ash [Page 1]
Internet Draft Routing Guidelines for Efficient Rtg Methods Oct 99
Table of Contents
Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.0 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.0 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3.0 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . 3
4.0 References . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
5.0 Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . 4
6.0 Recommended Routing Methods . . . . . . . . . . . . . . . . . . 5
6.1 Bandwidth Reservation Methods . . . . . . . . . . . . . . . . . 6
6.2 Route Selection . . . . . . . . . . . . . . . . . . . . . . . . 8
6.3 QoS Routing . . . . . . . . . . . . . . . . . . . . . . . . . . 9
7.0 Examples of Recommended Routing Methods. . . . . . . . . . . . 10
7.1 Example of Bandwidth Reservation Methods . . . . . . . . . . . 10
7.2 Example of Route Selection Methods . . . . . . . . . . . . . . 11
8.0 Author's Address . . . . . . . . . . . . . . . . . . . . . . 12
ANNEX A - TDM-BASED INTRANETWORK ROUTING METHODS . . . . . . . . . 12
A.1 Fixed Routing . . . . . . . . . . . . . . . . . . . . . . . . 12
A.2 Time-Dependent Routing . . . . . . . . . . . . . . . . . . . . 13
A.3 State-Dependent Routing . . . . . . . . . . . . . . . . . . . 14
A.4 Event-Dependent Routing . . . . . . . . . . . . . . . . . . . 15
ANNEX B - BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . . . 15
Ash [Page 2]
Internet Draft Routing Guidelines for Efficient Rtg Methods Oct 99
1.0 Introduction
There are many network operators who have implemented multiple networks
using different protocols, which include Public Switched Telephone Networks
(PSTNs) which use Time Division Multiplexing (TDM) technology, Asynchronous
Transfer Mode (ATM) technology, and/or Internet Protocol (IP) technology.
Various routing protocols are used in TDM-, ATM-, and IP-based networks. In
TDM-based networks, for example, Recommendation E.350 describes fixed and
dynamic routing methods for use in TDM-based networks. In ATM-based
networks, for example, the Private Network-to-Network Interface (PNNI)
standard adopted by the ATM Forum [ATM960055] provides for exchange of node
and link status information, automatic update and synchronization of
topology databases, and dynamic route selection based on topology and status
information. In IP-based networks, for example, the open shortest route
first (OSPF) and other standards adopted by the Internet Engineering Task
Force [M98, S95] provide for many of the same features as PNNI, but in a
connectionless IP-based packet network. OSPF also provides for exchange of
node and link status information, automatic update and synchronization of
topology databases, and dynamic route selection based on topology and status
information.
This Recommendation addresses guidelines for efficient routing methods that
have been studied, learned, and implemented over many years of experience in
TDM-based networks. These routing guidelines and methods are applicable as
well to ATM- and IP-based networks, and are recommended for these networks.
It is noted in the Recommendation that routing policies typically used in
ATM- and IP-based networks do not fully consider the possible instabilities
and drastic loss of throughput that can occur under congestion. Use of
bandwidth reservation and avoidance of long paths are recommended under such
congestion, which can lead to more efficient use of network resources.
Also, there is an emphasis in ATM- and IP-based networks on the use of
state-dependent-routing (SDR) methods. However, the flooding methods
typically used by these SDR methods to disseminate network status
information can lead to inefficient use of network resources. Use of
event-dependent-routing (EDR) methods and/or more efficient dissemination of
network status information are recommended as other possible approaches to
consider. Finally, QoS routing rules are recommended to ensure service
performance quality, such as avoidance of excessive transfer delay by
limiting the number of satellite hops in an end-to-end connection.
2.0 Scope
This Recommendation provides guidelines for the design of routing methods
within TDM-, ATM-, and IP-based networks, and makes particular
recommendations on bandwidth reservation, route selection, and QoS routing.
It recommends these guidelines based on established practice, particularly
as applied within TDM-based PSTN networks, and addresses the cases when
PSTN's evolve to incorporate IP- or ATM-based technology. Guidelines on
routing methods are covered in Section 6, and examples are given in Section
7 for the use of the routing methods.
3.0 Definitions
Link: a bandwidth transmission medium between nodes that
is engineered as a unit;
Ash [Page 3]
Internet Draft Routing Guidelines for Efficient Rtg Methods Oct 99
Destination node: terminating node within a given network;
Node: a network element (switch, router/switch, exchange)
providing switching and routing capabilities, or an
aggregation of such network elements representing a
network;
O-D pair: an originating node to destination node pair for a
given connection/bandwidth-allocation request;
Originating node: originating node within a given network;
Route: a concatenation of links providing a
connection/bandwidth-allocation between an O-D pair;
Route set: a set of routes connecting the same O-D pair;
Routing table: describes the route choices and selection rules to
select one route out of the route set for a
connection/bandwidth-allocation request
Traffic stream: a class of connection requests with the same
traffic characteristics;
Via node: an intermediate node in a route within a given
network.
4.0 References
[E.164] ITU-T Recommendation, The International Telecommunications
Numbering Plan.
[E.170] ITU-T Recommendation, Traffic Routing.
[E.177] ITU-T Recommendation, B-ISDN Routing.
[E.350] ITU-T Recommendation, Dynamic Routing Interworking.
[E.351] ITU-T Recommendation, Routing of Multimedia Connections Across
TDM-, ATM-, and IP-Based Networks
[E.412] ITU-T Recommendation, Network Management Controls.
[E.525] ITU-T Recommendation, Designing Networks to Control Grade of
Service.
[E.529] ITU-T Recommendation, Network Dimensioning Using End-to-End GOS
Objectives.
5.0 Abbreviations
AAR Automatic Alternate Routing
ABR Available Bit Rate
AESA ATM End System Address
ARR Automatic Rerouting
AS Autonomous System
ATM Asynchronous Transfer Mode
BGP Border Gateway Protocol
B-ISDN Broadband Integrated Services Digital Network
BW Bandwidth
CAC Call Admission Control
CBR Constant Bit Rate
CCS Common Channel Signaling
Ash [Page 4]
Internet Draft Routing Guidelines for Efficient Rtg Methods Oct 99
DADR Distributed Adaptive Dynamic Routing
DAR Dynamic Alternate Routing
DCR Dynamically Controlled Routing
DIFFSERV Differentiated Services
DN Destination Node
DNHR Dynamic Nonhierarchical Routing
DTL Designated Transit List
EDR Event Dependent Routing
FR Fixed Routing
GCAC Generic Call Admission Control
GOS Grade of Service
IETF Internet Engineering Task Force
IP Internet Protocol
LLR Least Loaded Routing
LSA Link State Advertisement
LSP Label Switched Path
MPLS Multiprotocol Label Switching
N-ISDN Narrowband Integrated Services Digital Network
ODR Optimized Dynamic Routing
ON Originating Node
OSPF Open Shortest Route First
PNNI Private Network-to-Network Interface
PSTN Public Switched Telephone Network
PTSE PNNI Topology State Elements
QoS Quality of Service
RP Routing Processor
RSVP Resource Reservation Protocol
RTNR Real-Time Network Routing
SCP Service Control Point
SDR State-Dependent Routing
STR State- and Time-Dependent Routing
TDR Time-Dependent Routing
UBR Unassigned Bit Rate
VBR Variable Bit Rate
VC Virtual Circuit
VN Via Node
WIN Worldwide Intelligent Network (Routing)
6.0 Recommended Routing Methods
Routing policies typically used in ATM- and IP-based networks do not fully
consider the possible instabilities and drastic loss of throughput that can
occur under congestion. In this Section we recommend the use of bandwidth
reservation and avoidance of long paths under such congestion to more
efficiently use network resources.
Also, there is an emphasis in ATM- and IP-based networks on the use of SDR
methods. However, the flooding methods typically used by these SDR methods
to disseminate network status information can lead to inefficient use of
network resources. Use of EDR methods and/or more efficient dissemination of
network status information are recommended as other possible approaches to
consider.
Finally, QoS routing rules are recommended to ensure service performance
quality, such as avoidance of excessive transfer delay by limiting the
number of satellite hops in end-to-end connections for delay-sensitive
Ash [Page 5]
Internet Draft Routing Guidelines for Efficient Rtg Methods Oct 99
connections to at most one hop.
6.1 Bandwidth Reservation Methods
Bandwidth reservation (the TDM-network terminology is "trunk reservation")
gives preference to the preferred traffic by allowing it to seize any idle
bandwidth in a link, while allowing the non-preferred routing traffic to
only seize bandwidth if there is a minimum level of idle bandwidth
available, where the minimum-bandwidth threshold is called the reservation
level. P. J. Burke [Bur61] first analyzed bandwidth reservation behavior
from the solution of the birth-death equations for the bandwidth
reservation model. Burke's model showed the relative lost-traffic level for
preferred traffic, which is not subject to bandwidth reservation
restrictions, as compared to non-preferred traffic, which is subject to the
restrictions. Figure 1 illustrates the percent lost traffic of preferred
and non-preferred traffic on a typical link with 10 percent traffic
overload. It is seen that the preferred traffic lost traffic is near zero,
whereas the non-preferred lost traffic is much higher, and this situation is
maintained across a wide variation in the percentage of the preferred
traffic load. Hence, bandwidth reservation protection is robust to traffic
variations and provides significant dynamic protection of particular streams
of traffic.
Bandwidth reservation is a crucial technique used in nonhierarchical
networks to prevent "instability," which can severely reduce throughput in
periods of congestion, perhaps by as much as 50 percent of the
traffic-carrying capacity of a network [E.525]. The phenomenon of
instability has an interesting mathematical solution to network flow
equations, which has been presented in several studies [NaM73, Kru82,
Aki84]. It is shown in these studies that nonhierarchical networks exhibit
two stable states, or bistability, under congestion and that networks can
transition between these stable states in a network congestion condition
that has been demonstrated in simulation studies. A simple explanation of
how this bistable phenomenon arises is that under congestion, a network is
often not able to complete a connection request on the direct or shortest
route, which consist in this example of a single link. If alternate routing
is allowed, such as on longer, multiple-link routes, which are assumed in
this example to consist of two links, then the connection request might be
completed on a two-link route selected from among a large number of two-link
route choices, only one of which needs sufficient idle bandwidth on both
links to be used to route the connection. Because this two-link connection
now occupies resources that could perhaps otherwise be used to complete two
one-link connections, this is a less efficient use of network resources
under congestion. In the event that a large fraction of all connections
cannot complete on the direct link but instead occupy two-link routes, the
total network throughput capacity is reduced by one-half because most
connections take twice the resources needed. This is one stable state; that
is, most or all connections use two links. The other stable state is that
most or all connections use one link, which is the desired condition. .
Bandwidth reservation is used to prevent this unstable behavior by having
the preferred traffic on a link be the direct traffic on the primary,
shortest route, and the non-preferred traffic, subjected to bandwidth
reservation restrictions as described above, be the alternate-routed traffic
on longer routes. In this way the alternate-routed traffic is inhibited from
Ash [Page 6]
Internet Draft Routing Guidelines for Efficient Rtg Methods Oct 99
selecting longer alternate routes when sufficient idle trunk capacity is not
available on all links of an alternate-routed connection, which is the
likely condition under network and link congestion. Mathematically, the
studies of bistable network behavior have shown that bandwidth reservation
used in this manner to favor direct shortest connections eliminates the
bistability problem in nonhierarchical networks and allows such networks to
maintain efficient utilization under congestion by favoring connections
completed on the shortest route. For this reason, dynamic trunk reservation
is universally applied in nonhierarchical networks [E.529], and often in
hierarchical networks [Mum76].
There are differences in how and when bandwidth reservation is applied,
however, such as whether the bandwidth reservation for direct-routed
connections is in place at all times or whether it is dynamically triggered
to be used only under network or link congestion. This is a complex network
throughput trade-off issue, because bandwidth reservation can lead to some
loss in throughput under normal, low-congestion conditions. This loss in
throughput arises because if bandwidth is reserved for connections on the
shortest route, but these calls do not arrive, then the capacity is
needlessly reserved when it might be used to complete alternate-routed
traffic that might otherwise be blocked. However, under network congestion,
the use of bandwidth reservation is critical to preventing network
instability, as explained above [E.525].