Shared Backup Path Optimization in Telecommunication Networks



Similar documents
A Fast Path Recovery Mechanism for MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks

Recovery Modeling in MPLS Networks

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

2004 Networks UK Publishers. Reprinted with permission.

A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks

Disjoint Path Algorithm for Load Balancing in MPLS network

Load Balancing by MPLS in Differentiated Services Networks

A New Forwarding Policy for Load Balancing in Communication Networks

MPLS Part II - Recovery

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming

Multiple Layer Traffic Engineering in NTT Network Service

Maximizing Restorable Throughput in MPLS Networks

Traffic optimization in a backbone

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

THE Differentiated Services and Multiprotocol Label Switching (MPLS) working groups of IETF are proposing

A Load Balancing Scheme for Congestion Control in MPLS Networks

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Path Selection Methods for Localized Quality of Service Routing

Path Selection Analysis in MPLS Network Based on QoS

Traffic protection in MPLS networks using an off-line flow optimization model

A Performance Study of IP and MPLS Traffic Engineering Techniques under Traffic Variations

Efficient Distributed Bandwidth Management for MPLS Fast Reroute

Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network

Cost-optimal design of VoIP networks using the VPN concept

IP Traffic Engineering over OMP technique

Supporting End-to-End QoS in DiffServ/MPLS Networks

Optimization of IP Load-Balanced Routing for Hose Model

Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE

Multi Protocol Label Switching (MPLS) is a core networking technology that

A Resilient Path Management for BGP/MPLS VPN

Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints

How To Provide Qos Based Routing In The Internet

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Dynamic Sizing of Label Switching Paths in MPLS Networks

Online Traffic Engineering using Least Interference Optimization

PART III. OPS-based wide area networks

Path Protection with Pre-identification for MPLS Networks

Traffic Engineering With Traditional IP Routing Protocols

Implementing VPN over MPLS

MPLS Traffic Engineering in ISP Network

On Providing Survivable QoS Services in the Next Generation Internet

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information

Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator

Analysis of an Artificial Hormone System (Extended abstract)

Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks

ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL

A Heuristic Approach to Service Restoration in MPLS Networks

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints

Policy-Based Fault Management for Integrating IP over Optical Networks

Shared Backup Network Provision for Virtual Network Embedding

A simulation study of GELS for Ethernet over WAN

The Design of Segment-based Protection Algorithms

Performance Analysis of MPLS TE Queues for QoS Routing

IP Core Transport Network

A Passive Method for Estimating End-to-End TCP Packet Loss

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK

A hierarchical multicriteria routing model with traffic splitting for MPLS networks

An Emulation Study on PCE with Survivability: Protocol Extensions and Implementation

Evaluation And Implementation Of The Open Shortest Path First (OSPF) Routing Protocol

Multi-protocol Label Switching

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning

Didier Colle, Pim Van Heuven, Chris Develder, Steven Van den Berghe, Ilse Lievens, Mario Pickavet, Piet Demeester

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

A Hybrid Fault-Tolerant Algorithm for MPLS Networks

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

LOAD BALANCING IN WDM NETWORKS THROUGH DYNAMIC ROUTE CHANGES

A Localized Adaptive Proportioning Approach to QoS Routing

Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

An Efficient Primary-Segmented Backup Scheme for Dependable Real-Time Communication in Multihop Networks

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers

Performance Analysis of a Traffic Engineering Solution for Multi-Layer Networks based on the GMPLS Paradigm

Traffic Engineering in SDN/OSPF Hybrid Network

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

Optimal Mixtures of Different Types of Recovery Schemes in Optical Networks

How To Share Bandwidth On A Diffserv Network

Building MPLS VPNs with QoS Routing Capability i

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*

Network Protection with Multiple Availability Guarantees

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing

H3C SR8800 RPR Technology White Paper

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology.

Fast Reroute Techniques in MPLS Networks. George Swallow

A Reactive Scheme for Traffic Engineering in MPLS Networks

Analyzing Distribution of Traffic Capacity

Towards Load Balancing in SDN Networks During DDoS attacks

Transcription:

Shared Backup Path Optimization in Telecommunication Networks Balázs Gábor Józsa and Dániel Orincsay Abstract This paper presents new approaches for off-line global path optimization in telecommunication networks where backup paths use shared bandwidth reservation. This problem arises when a service provider wants to find optimal paths for interruption-critical traffic flows within its network in order to improve the resource utilization. In this paper we focus on protected traffic flows, where each traffic demand has an active working path and a backup path for restoration. With the help of an off-line global path optimization process the network load can be reduced, even if on-line routing algorithms optimize the placement of traffic flows, because the sequential optimal local routing decisions may result in a globally suboptimal routing of the flows. We introduce a number of different approaches for solving the above problem, which can be used in several types of networks (e.g., Asynchronous Transfer Mode, Multiprotocol Label Switching, Wavelength Division Multiplexing) that allows such traffic engineering features as bandwidth guarantees and backup paths. We investigate the algorithms through empirical tests based on practical size randomly generated networks as well as on real-world backbone network topologies. The results show that using the proposed methods the resource utilization can be improved significantly. Keywords: global path optimization, backup path, shared protection, spare capacity allocation, IP and MPLS 1 Introduction Nowadays, network customers need guaranteed bandwidth from Internet Service Providers (ISPs)besides the typical best-effort services, moreover, protection of such traffic that should not be interrupted by failures is also necessary. During normal operation, traffic flows use the so-called active paths that are protected by preestablished disjoint backup paths where the traffic flows can be switched quickly when a link failure is detected. This technique can be used in several types of networks (e.g., Asynchronous Transfer Mode, Multiprotocol Label Switching, Wavelength Division Multiplexing)that support the above-mentioned traffic engineering feature [1]. In the literature various terms are used for the above two kinds of paths; in this paper we use terms active and working path interchangeably as well as terms backup, recovery, and restoration path. More disjoint backup paths can be used for one active path, with the result that we can tolerate more failures at one time. Due to the rare failures, we assume that only one link fails at one time (single failure), therefore we consider one backup path per active path. To guarantee the same quality for traffic flows when a network component fails, the reserved bandwidth for a backup path must be equal to the bandwidth of the active path. There are different approaches of protection and restoration techniques [2]. 1+1 protection means that data is sent over both (active and backup)paths simultaneously, which is the fastest and most secure method but it doubles the network load. In 1:1 protection each active path has a hot-standby backup path whose resource reservations are independent from the other paths. This type of protection is simple and fast but it requires high amount of resources (double amount compared to the case without protection). The resource reservation can be reduced significantly without reliability degradation in the following way: in case of a single failure, among two disjoint active paths at most one can fail, thus they can share their bandwidth reservation on the common links of their backup paths (see Figure 1). This is called shared backup reservation (also called shared protection)that has been studied extensively in the literature [3, 4, 5, 6, 7, 8, 9] and it seems to be a good compromise between protection and bandwidth consumption. ISPs are not only interested in providing reliable services with quality guarantees but on the other hand, they aspire to improve the network performance, therefore optimal placement of traffic flows within their networks is also very important. There are two quite different ways of path optimization. Using on-line optimization (e.g., [10])we establish the paths immediately for the arriving traffic demands based on optimal local decision Budapest University of Technology and Economics, Department of Telecommunication and Telematics, High Speed Networks Laboratory, H-1117 Magyar tudósok körútja 2, Budapest, Hungary; Ericsson Research, Traffic Analysis and Network Performance Laboratory, POB 107, H-1300 Budapest, Hungary. E-mail: {jozsa, orincsay} @ttt-atm.ttt.bme.hu Fax: +36-1-437-7767 Phone: +36-1-437-7179

s 1 t 1 active path of demand 1 (10 Mbps) backup path of demand 1 (10 Mbps) s 2 10 Mbps reservation is enough instead of 15 Mbps t 2 backup path of demand 2 (5 Mbps) active path of demand 2 (5 Mbps) Figure 1: Shared backup link without a priori knowledge of future demands. After some successive on-demand path establishment the overall network performance may be far from the optimal, thus global off-line optimization (e.g., [11])is needed, where we search for a better path set for the known traffic demands. Although the global path optimization problem applying backup capacity sharing has been studied in the literature, novel approaches can be introduced in this area. In this paper we deal with the global path optimization problem with shared backup paths, and we show that network load can be decreased significantly with the use of the proposed path calculation methods. The rest of the paper is structured as follows. Section 2 gives the formal problem statement. In Section 3 we describe different approaches for solving the problem of global path optimization with shared backup paths. We compare the approaches by simulation on practical size randomly generated networks as well as on real-world IP backbone network topologies and present numerical results in Section 4. Finally, in Section 5 the conclusions are drawn. 2 Problem Definition In the current global optimization problem we search for an active and a backup path set for the set of traffic demands so that the overall bandwidth reservation using shared backup reservation would be minimal. We represent the telecommunication network by a directed graph with edge capacities (c(e i )for edge e i )denoting the reservable bandwidth of the corresponding link. A demand d is given by its source and destination nodes and by its required bandwidth bw(d). The result of path search is two disjoint paths per demand (p a (d)and p b (d)for demand d), in other words, two ordered set of edges without common elements. The reserved capacity on edge e i consists of two parts. The first part is reserved for the active paths: bw(d). (1) d: e i p a(d) The second part is the reservation for the backup paths, i.e., the maximal backup traffic on edge e i in case of any link failure. This part of reservation can be calculated with the help of the backup reservation matrix (BRM)where the rows and the columns denote the edges of the graph. The element a ij of BRM is the required backup reservation for backup paths on edge e j in case of failure of edge e i : a ij := d: e i p a(d) e j p b (d) bw(d). (2) To sum up, the backup bandwidth reservation (in case of shared reservations)on edge e j is equal with max i a ij that is the maximal possible backup traffic on edge e j in case of a link failure. The task is to search for two path sets for which the total reservation is minimal. We assume that active paths use shortest paths, therefore the formal problem is: to minimize j max a ij. (3) i The more precise problem formulation can be found in the literature, e.g., in [5].

3 Algorithms In the following three sections we present three basic approaches whose purpose is to decrease the reservations for backup paths, consequently to increase the total network throughput. It is a common step of these algorithms to route a traffic demand with active and backup paths. We solve this problem by applying a simple procedure based on the well-known Dijkstra s Shortest Path Search algorithm. Since we want the active path to be minimal length in the current circumstances (which is nowadays a general requirement in telecommunication networks), we route it first. Naturally, in each path selection phase only such links could be used that have enough free capacity to satisfy the bandwidth request of the given traffic demand. In order to select a disjoint backup path, we prune the links of the found active path, and then run Dijkstra s algorithm again. In addition, various weight functions may be applied making these calculations more intelligent, which is an important feature in the detailed algorithms. 3.1 Cut Down Maximums (CDM) This approach is a postprocessing method, because its starting-point is a complete network configuration (e.g., calculated by [11]), where both active and backup paths are specified, moreover reservations of backup paths are shared. A main difference between this novel heuristic and the similar published algorithms [4, 5] is that we allow to re-route the active paths as well. As we mentioned, the concrete allocation for backup paths on a particular edge e j is determined by the maximum value of column j in the backup reservation matrix (BRM). The idea of Cut Down Maximums (CDM)method is the following: let s try to cut down the maximum value in a given column while the increase of other maximum values is not significant; in other words the sum of column maximums decreases. Thus, in case of each successful cutdown the total network load decreases, which is our aim after all. In this way, any set of paths that are initially not optimized for reservation sharing can be modified afterwards in such a way that the resulting configuration would have a significantly lower load value. This idea can be realized in practice in various ways; in this paper we present a concrete implementation, which can be completed later with additional heuristic steps, or whose existing components can be fine-tuned. In a step, the algorithm searches for the maximum value of column j (that corresponds to the backup reservation of the edge e j ). Let us suppose that this value can be found in the row i. This means that if a failure occurs on edge e i the traffic on edge e j increases with this maximum value, due to demands whose active and backup paths use edge e i and e j, respectively. So, we select a (previously routed)demand randomly (among these ones), and try to re-route it. To reduce the maximum, we have two possible alternatives: force this demand not to use edge e i in its active path, or force this demand not to use edge e j in its backup path. In the current implementation we try to fulfill both conditions, i.e., we increase the weight of the above edges during path calculations. This way, in many cases the new paths avoid the critical edges, resulting in a smaller a ij value, consequently cutting down the maximum value of column j. We apply the detailed method sequentially to each column (i.e., from the first to the last)over and over again, while significant improvement occurs. 3.2 Adaptive Method (AM) The second approach does not require an initial configuration of paths, it starts from an empty network with traffic demands. Paths are established one after other, applying the usual Dijkstra s algorithm based routing method. The main feature of Adaptive Method (AM)is a special, adaptive weight function. When routing new demands, the BRM changes continuously, so the applied weight function is based always on the actual values of BRM. Thus, each particular path calculation can be adapted to the current network situation, i.e., we route each traffic demand greedily resulting in its optimal placement in the actual network configuration. The main purpose of the adaptive weight function is to keep the column maximums of BRM (that determine the required reservations for backup paths)on a low level. This weight function is basically different for the active and backup paths of a given demand. The two ideas are the following: in case of an active path, the weight of edge e i is proportional to the average of relative required backup a ij j max reservations in row i: w(e i ) 1+ k a kj c(e j ) j c(e,and j)

in case of a backup path, the weight of edge e j is proportional to the average of relative required backup i: e reservations (corresponding to active path): w(e j ) i p a a ij p a max i a ij The aim of the first weight function is to direct the active paths on edges whose average relative required reservations (in the corresponding row)is low. Similarly, with the help of the second weight function we force the backup paths to use edges where the reservations (corresponding to the edges of active path)are relatively lower. In this way, the probability of a new, higher maximum value is reduced relevantly. It is important to emphasize that this method routes a traffic demand only once, the selected paths do not change any more. Another useful consequence is that the required running time is very low. 3.3 Iterative Method (IM) The basic idea of Iterative Method (IM)is to iteratively re-calculate all backup paths in the network. In this method we distinguish two backup reservation matrices (BRMs). BRM actual contains always the current a ij values, while BRM stored shows a preserved state. Similarly to the CDM algorithm (Section 3.1), the algorithm starts from an initial network configuration. Stores the actual BRM (BRM stored := BRM actual ), and re-route all backup paths based on this preserved BRM (with the help of the weight function detailed in Section 3.2). Then each iteration cycle consists of two steps: the algorithm combines the new BRM values with the previously stored values: BRM stored := p BRM actual +(1 p) BRM stored, and re-calculates the backup paths. As we mentioned, the applied weight function (for backup paths)is the same as in the case of AM, thus it aims to avoid the links with relatively higher reservation values. During combination of the stored and the new BRM, the relative weight p of the new BRM is decreasing in each iteration cycle. This results in the very dynamic start of the algorithm, getting nearer to the optimum fast. On the other hand, with the help of the increasing ratio of the stored BRM, the oscillation of the reservation values can be avoided. 3.4 Combination of Algorithms Since the described three algorithms are based on different approaches, it seems to be a natural idea to combine them in order to get a more effective method. Since the Adaptive Method begins from an empty network, it is practical to start with this procedure. Then also the Iterative or the Cut Down Maximum method can be applied, or the combination of all three methods can be tested. 4 Numerical Results 4.1 Simulation Model During simulations we tested our novel algorithms on various network situations. We generated random topologies with the help of [12] having 10 to 50 nodes, and by changing the node degree between 3 and 4. Besides, we performed simulations on real network topologies taken from [13]. For a particular network topology, we generated many sets of traffic demands randomly, in order to get an overall picture of the attainable performance gain of the presented algorithms. Analyzing the algorithms, the main measure is the free network capacity that is the sum of the unreserved capacities of links per the sum of the total capacities of links. We also use term total network load that contains the working capacity as well as the reserved capacity for backup paths also called spare capacity in the literature ; practically this value equals 1 minus the free network capacity. Generally, we evaluated the methods in the interval where the total network load without shared backup reservations was between 60 and 90%. In order to reach such high network load values, we had to generate 2 or 3 traffic demands between each node-pair (which well represents the current trend of distinguishing more types of traffic classes). Each demand had a random bandwidth in the interval 1 to 200 Mbit/s (while a link capacity was usually the OC48 standard: 2.5 Gbit/s), which resulted in a number of traffic flows per links of 20-200. 4.2 Comparison of Algorithms In this section we evaluate the results of simulations performed on 30-node random networks with an average 3.5 links per nodes (node degree). As we can see in Figure 2, the total network load without shared recovery paths changes from 60 to 90% (represented on axis x). Axis y shows the increased free capacity of network applying the different heuristics.

We consider the following case as reference: the concrete paths of demands are specified by such a global optimization algorithm (see [11])that does not take the possibility of reservation sharing into account during the path calculation, in other words backup reservations are shared simply by the BRM without any heuristic optimization method, which we refer as Simple Method (SM). 70 Free Network Capacity [%] 65 60 55 50 45 40 AM+CDM AM CDM IM SM 35 60 70 80 90 Total Network Load without Sharing Backup Paths [%] Figure 2: Different optimization algorithms for sharing backup paths Since CDM method and IM start from an initial network configuration, they have to be combined with a method that is able to provide this initial path structure. We deal with two cases: the paths are specified by the above-mentioned global optimization algorithm, which is the default case; or the Adaptive Method (AM) selects paths for the demands, which results in such a state that is nearer to the optimal. After setting up an initial configuration of paths, the Cut Down Maximums (CDM)algorithm or the Iterative Method (IM)(or both)can be applied in order to improve the potential of backup reservation sharing. Figure 2 depicts the result of this simulation scenario. We can see that the least efficient method, namely IM can increase the free capacity more than 2%; combining it with AM (AM+IM)we get nearly the same result (that is why it is not included in figure). Using CDM about 4.5% capacity saving can be reached; investigating IM+CDM and AM+IM+CDM combinations (not included in figure)we found that the attainable performance gain does not differ significantly. The reason of this, that in a step IM calculates the paths based on a constant BRM, thus it cannot adjust itself well to the problem instances. Applying only the Adaptive Method (AM) 5% improvement can be reached in average, which is a very surprising result since it does not require any route re-calculation. AM combined with CDM can provide the best utilization of the network, the attainable improvement exceeds the 7% value at high initial load. To summarize, if the time consumption is not critical, we propose to use AM+CDM for solving the global path optimization problem with shared backup reservation, however, at larger networks its running time may be too high, therefore in this case AM is preferred instead of AM+CDM. Above this 30-node simulation scenario, we analyzed the operation of algorithms also in case of other network sizes. The results (that are not detailed here)were very similar, some tendencies can be recognized, i.e., the potential of backup path sharing is directly proportional to: the network size (number of nodes), the node degree, and the number of traffic classes (number of traffic flows per node-pair). As we thought, the different heuristic methods can increase significantly the total free capacity of the network. An interesting issue is the analysis of the optimized backup paths. We found that for all presented algorithms these paths are longer in average than in the case of SM, consequently we expected that without reservation sharing, the presented algorithms result in different total free capacity values. As we can see in Table 1, the originally 10.45% free capacity decreases to 5-6% in case of IM and CDM; moreover applying the AM, about 25% additional network capacity would be necessary in order to configure the demands without backup reservation sharing.

Reservation sharing SM IM CDM AM AM+CDM On 42.10% 44.32% 47.78% 48.89% 49.90% Off 10.45% 6.03% 5.27% -25.19% -23.52% Table 1: Free capacity values applying different algorithms 4.3 Further Investigations In this section we investigate two published algorithms (detailed in [3])in which the shared backup reservation paradigm is implemented. Important to emphasize, that these algorithms just like our SM are not specialized to shared backup reservation based optimization, they only have the ability to utilize this technology. In Table 2 we can see the numerical comparison of the two above-mentioned algorithms, i.e., Simulated Allocation ++ (SA++)and Iterative Capacity Splitting ++ (ICS++), besides our Simple Method (SM), and two proposed algorithms, i.e., the Adaptive Method (AM), and its combination with Cut Down Maximums (AM+CDM). The first measure is the total free capacity in the network after the optimization, and the other one is the running time (on a computer with 433 MHz processor). Four different network examples were tested. Network SA++ ICS++ SM AM AM+CDM 13 nodes 34.87% 36.01% 37.65% 45.69% 46.24% 0.52 s 0.80 s 0.31 s 0.38 s 3.94 s 30 nodes 38.11% 38.50% 40.47% 48.57% 49.78% 21.66 s 33.70 s 4.55 s 6.71 s 229.54 s 50 nodes 40.59% 40.56% 42.87% 50.05% 51.07% 186.12 s 362.80 s 26.04 s 36.85 s 1389.55 s 25 nodes 41.89% 42.46% 42.16% 45.94% 46.62% (AT&T) 9.05 s 12.69 s 2.38 s 3.22 s 50.10 s Table 2: Comparison to other algorithms The first 3 (13-node, 30-node, 50-node)networks have randomly generated topology, while the last one is the AT&T IP Backbone Network 2Q2000 (available at [13]). Since the first two algorithms were not directly available for us, we could investigate only limited number of traffic situations, i.e., the results are averages of 4 different sets of traffic demands (per networks). Although only a small number of examples were investigated, the tendencies are very clear, our proposed algorithms can solve the problem efficiently. As we can see in Table 2, the quality of the results of SA++, ICS++, and SM have no relevant difference (only in running time). This was expected because none of these algorithms optimize the shared backup reservation. Using AM the total free capacity is significantly higher compared to the three above-mentioned algorithms, while the running time remains at a low level. AM combined with CDM improves the network performance in a certain degree, but it is time consuming, consequently we do not propose to use it at large networks or in cases when the time is critical. 5 Conclusion This paper addressed the global path optimization of bandwidth guaranteed traffic flows concentrating on the possibility of shared backup reservations. We presented three algorithms that can solve the above problem efficiently. During the investigation of the available performance improvement applying our proposed methods, we performed many simulations on various network examples. The results showed that all algorithms can extend considerably the network throughput, furthermore we experienced that combining the algorithms, a higher degree of backup reservation sharing can be reached. We propose using Adaptive Method that improves the network performance nearly to the highest degree, while its running time is at a low level. If the time consumption is unimportant, applying AM combined with CDM we can reach even better network utilization. We compared the proposed AM and AM+CDM to other published algorithms as well as to our reference method, and it has turned out that our proposed algorithms give significantly better solutions for the problem. Our future tasks can include the optimization of the parameters of the proposed algorithms, and the development of novel heuristic methods based on our results so far.

References [1] D. Awduche, J. Malcolm, J. Agogbua, M. O Dell, and J. McManus. Requirements for Traffic Engineering Over MPLS. Internet Engineering Task Force, Request for Comments: 2702, September 1999. [2] V. Sharma, et al. Framework for MPLS-based Recovery. Internet Engineering Task Force, Internet Draft, March 2001., Work in Progress. [3] T. Cinkler, P. Laborczi, and Á. Horváth. Protection through Thrifty Configuration. ITC 16, 16th International Teletraffic Congress, Edinburgh, United Kingdom, June 1999. [4] R. Kawamura, K. Sato, and I. Tokizawa. Self-Healing ATM Networks Based on Virtual Path Concept. IEEE Journal on Selected Areas in Communications, Vol. 12, No. 1, 1994, pp. 120-127. [5] Y. Xiong, and L. Mason. Restoration Strategies and Spare Capacity Requirements in Self-Healing ATM Networks. Proceedings of Infocom 97, Kobe, Japan, April, 1997. [6] Y. Zheng, W. D. Grover, and M. H. MacGregor. Dependence of Network Capacity Requirements on the Allowable Flow Convergence Overloads in ATM Backup VP Restoration. Electronics Letters, Vol. 33, No. 5, Feb. 27, 1997, pp. 362-363. [7] W. D. Grover, and Y. Zheng. VP-Based ATM Network Design with Controlled Over-Subscription of Restoration Capacity. Proceedings of 1st Int l Workshop on Design of Reliable Communication Networks (DRCN 98), Brugge, Belgium, May 17-20, 1998. [8] M. Kodialam, and T. V. Lakshman. Minimum Interference Routing with Applications to MPLS Traffic Engineering. Proceedings IEEE INFOCOM 2000, Piscataway, NJ, USA, 2000. [9] S. Kini, M. Kodialam, T. V. Lakshman, and C. Villamizar. Shared backup Label Switched Path restoration. Internet Engineering Task Force, Internet Draft, November 2000., Work in Progress. [10] D. Orincsay, and J. Harmatos. On-demand optimization of protected LSP-tunnels in MPLS networks. Submitted to IFIP 2001, Budapest, Hungary. [11] B. G. Józsa, Z. Király, G. Magyar, and Á. Szentesi. An Efficient Algorithm for Global Path Optimization in MPLS Networks. Submitted to Optimization and Engineering, November 2000. [12] B. G. Józsa, and D. Orincsay. Random Graph Generator (for telecommunication networks). Technical Report, Ericsson Research, TrafficLab, Budapest, Hungary, 1999. [13] Russ Haynal s ISP Page. http://navigators.com/isp.html